
Implement Red Hat products, wherever it makes sense. Use Red Hat’s Open Decision Framework where possible or practical. Improve the process and consistency of implementing automation for infrastructure provisioning, orchestration and monitoring. With our leading indicators clearly defined, we drafted the following goals, in order of importance:Įnable engineers to easily automate the configuration of systems and applications as needed, avoiding unnecessary complexity. Make use of existing sources of truth rather than hard-coding or duplicating ( e.g.
RED HAT IDM ONEWAYSYNC OFFLINE
Support shared data and secrets between deployment models (IaaS, PaaS, etc.).įacilitate offline application and CM development. workloads ( IaaS, PaaS, and eventually Serverless), and on-demand environments.Īlign with open hybrid cloud program requirements, including scalability and resiliency requirements.īe environment and instance agnostic these should not enforce application environment strategies. using OpenStack in our new datacenter) including modern application.

To make matters worse, our development teams weren't effectively communicating with each other about how they were using both Puppet and Ansible simultaneously, due once again to a lack of standards and governance, with no central guidelines to follow.Īfter assessing each of these business challenges, we set to work on establishing key objectives for our success as we transitioned to Ansible, based on the things we thought our best-in-class Configuration Management should be and do:ĭrive consistency, reusability, and a predictable system state through loose coupling and standard patterns.īe modern, supportable, usable, focused on security and projected future needs (e.g. And lastly, Puppet and Ansible are both used to provide some non-virtual machine config management, creating more inefficiencies and confusion. Related to challenges with inconsistency, our development teams were using Ansible "as needed" with no real use of given standards or best practices to guide its use.
RED HAT IDM ONEWAYSYNC CODE
We recognized that the Puppet code had not been maintained over time. In addition, Puppet code was often forked, so there were several branches of master Puppet code and some people were making changes in their branches but not bringing those changes back to the master copy. Ansible’s implementation would allow us to fix another concern: implementing enterprise security standards, specific to configuration management.Īt the time, our environment was inconsistent and frankly, spotty at best. We made a point to adopt a true Red Hat solution for configuration management and focused our attention on Ansible as a replacement. For starters, our then-current configuration management solution, Puppet, was not what most of our team wanted to use, nor what we were recommending to customers.



Red Hat IT worked to remove much of that complexity and drive consistency by directly involving infrastructure, software, information security engineers, and enterprise architects across the organization to create a set of clearly defined standards and best practices.īut, before we get into our successes with this collaboration, it’s important to begin with a clear description of the business problems we faced, and what specific challenges we needed to address.
RED HAT IDM ONEWAYSYNC SOFTWARE
As in most IT organizations, configuration management can be complex and crosses both infrastructure and software development disciplines.
