Rapid parallel systems deployment: techniques for overnight clustering
LISA'08 Proceedings of the 22nd conference on Large installation system administration conference
Federated access control and workflow enforcement in systems configuration
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Homogeneity as an advantage: it takes a community to protect an application
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
Supporting software evolution in component-based FOSS systems
Science of Computer Programming
A logical approach to data-aware automated sequence generation
Transactions on Computational Science XV
Simulating upgrades of complex systems: The case of Free and Open Source Software
Information and Software Technology
Hi-index | 0.00 |
Configuration management tools have become quite adept at representing target configurations at a point in time. While a point-in-time model helps with system configuration tasks, it cannot represent the complete scope of configuration tasks needed to manage a complex environment over time. In this paper, we introduce a mechanism for representing changes over time in target configurations and show how it alleviates several common administrative problems. We discuss the motivating factors, design, and implementation of this approach in Bcfg2. We also describe how this approach can be applied to other tools.