Local Disk Depot - Customizing the Software Environment: Customizing the Software Environment
LISA '93 Proceedings of the 7th USENIX conference on System administration
LISA '93 Proceedings of the 7th USENIX conference on System administration
Depot-Lite: A Mechanism for Managing Software
LISA '94 Proceedings of the 8th USENIX conference on System administration
LISA '97 Proceedings of the 11th USENIX conference on System administration
A Retrospective on Twelve Years of LISA Proceedings
LISA '99 Proceedings of the 13th USENIX conference on System administration
It's Elementary, Dear Watson: Applying Logic Programming To Convergent System Management Processes
LISA '99 Proceedings of the 13th USENIX conference on System administration
An Expectant Chat About Script Maturity
LISA '00 Proceedings of the 14th USENIX conference on System administration
The Maelstrom: Network Service Debugging via "Ineffective Procedures"
LISA '01 Proceedings of the 15th USENIX conference on System administration
Global Impact Analysis of Dynamic Library Dependencies
LISA '01 Proceedings of the 15th USENIX conference on System administration
Holistic Quota Management: The Natural Path to a Better, More Efficient Quota System
LISA '02 Proceedings of the 16th USENIX conference on System administration
An Analysis of RPM Validation Drift
LISA '02 Proceedings of the 16th USENIX conference on System administration
Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management
LISA '03 Proceedings of the 17th USENIX conference on System administration
Hi-index | 0.00 |
We manage several large UNIX program repositories through a community effort of volunteerism and advocacy. Our effort requires a carefully crafted interplay between administrative policy and tools that operate within the limits of that policy. Rather than restricting administrators' actions, our tools reinforce their own use by making it easier and more effective to comply with policy than to dissent. Our tool SLINK provides a small number of commands that aid in synthesizing user environments from sets of disjoint software package trees. SLINK's commands, while more powerful than typical UNIX commands, refuse to violate predefined policy restrictions, thus protecting the user environment even from mistakes of root users. Our administrative policy and SLINK allow us to employ an arbitrarily large number of volunteer administrators without degrading system behavior or utilizing large amounts of staff time.