Instructions


Fill out this sheet as you progress through the lab and discussions. Hold your worksheets until the end to turn them in as a final submission packet.

Downloads

The worksheet has been provided below. The document(s) can be transposed to the desired format so long as the content is preserved. For example, the .txt could be transposed to a .md file.

Unit 8 Recording

Discussion Post #1

Read about configuration management here: https://en.wikipedia.org/wiki/Configuration_management

  • What overlap of terms and concepts do you see from this week’s meeting?

  • What are some of the standards and guidelines organizations involved with configuration management?

    • Do you recognize them from other IT activities?

Discussion Post #2

Review the SRE guide to treating configurations as code.
Read as much as you like, but focus down on the “Practical Advice” section: https://google.github.io/building-secure-and-reliable-systems/raw/ch14.html#treat_configuration_as_code

  • What are the best practices that you can use in your configuration management adherence?

  • What are the security threats and how can you mitigate them?

  • Why might it be good to know this as you design a CMDB or CI/CD pipeline?


Submit your input by following the link below.

The discussion posts are done in Discord Forums.

Definitions


System Lifecycle

Configuration Drift

Change management activities

  • CMDB
  • CI
  • Baseline

Build book

Run book

Hashing

  • md5sum
  • sha<x>sum

IaC

Orchestration

Automation

AIDE

Digging Deeper


  1. Review more of the SRE books from Google: https://sre.google/books/ to try to find more useful change management practices and policies.

Reflection Questions


  1. How does the idea of control play into configuration management? Why is it so important?

  2. What questions do you still have about this week?

  3. How are you going to use what you’ve learned in your current role?