Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering SaltStack

You're reading from   Mastering SaltStack Use Salt to the fullest

Arrow left icon
Product type Paperback
Published in Nov 2016
Publisher Packt
ISBN-13 9781786467393
Length 378 pages
Edition 2nd Edition
Arrow right icon
Author (1):
Arrow left icon
Joseph Hall Joseph Hall
Author Profile Icon Joseph Hall
Joseph Hall
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Essentials Revisited FREE CHAPTER 2. Diving into Salt Internals 3. Managing States 4. Exploring Salt SSH 5. Managing Tasks Asynchronously 6. Taking Advantage of Salt Information Systems 7. Taking Salt Cloud to the Next Level 8. Using Salt with REST 9. Understanding the RAET and TCP Transports 10. Strategies for Scaling 11. Monitoring with Salt 12. Exploring Best Practices 13. Troubleshooting Problems

Using the master API


The master API has a somewhat confusing name for users that are used to traditional Unix terminology. Because the master is what steers a Salt infrastructure, the API that is used to configure it is called the wheel system. To put it clearly, Salt's wheel system bears no relation or resemblance to the wheel group found in many Unix and Linux distributions.

Like most of Salt, the wheel system is pluggable. However, while a few modules do exist, most of them will never be used by most end users. For our purposes, we'll focus on the ones that are used.

The Salt keys

The part of the wheel system that is most commonly seen by administrators is key management. When keys are accepted, rejected, or deleted, that action is usually performed by the wheel system. The key module doesn't actually do much: it creates keys when necessary, moves them between directories as requested, and fires events along the event bus when doing so.

Configuration

The config module is used to manage the...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime