Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering SaltStack

You're reading from   Mastering SaltStack Take charge of SaltStack to automate and configure enterprise-grade environments

Arrow left icon
Product type Paperback
Published in Aug 2015
Publisher
ISBN-13 9781785282164
Length 306 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Joseph Hall Joseph Hall
Author Profile Icon Joseph Hall
Joseph Hall
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Reviewing a Few Essentials 2. Diving into Salt Internals FREE CHAPTER 3. Exploring Salt SSH 4. Managing Tasks Asynchronously 5. Taking Salt Cloud to the Next Level 6. Using Salt with REST 7. Understanding the RAET Protocol 8. Strategies for Scaling 9. Monitoring with Salt 10. Exploring Best Practices 11. Troubleshooting Problems Index

Using the Master API

The Master API has a somewhat confusing name for users that are used to traditional Unix terminology. Because the Master is what steers a Salt infrastructure, the API that is used to configure it is called the Wheel system. To put it clearly, Salt's Wheel system bears no relation or resemblance to the wheel group found in many Unix and Linux distributions.

Like most of Salt, the Wheel system is pluggable. However, while a few modules do exist, most of them will never be used by most end-users. For our purposes, we'll focus on the ones that are used.

The Salt keys

The part of the Wheel system that is most commonly seen by administrators is key management. When keys are accepted, rejected, or deleted, that action is usually performed by the Wheel system. The key module doesn't actually do much: it creates keys when necessary, moves them between directories as requested, and fires events along the event bus when doing so.

Configuration

The config module is used...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime