Alarcón,

On 5/6/15 11:56 AM, Alarcón Vladimir wrote:
> As requested, I will do a write-up of the high-level architecture,
> and a list of features in phases.
> 
> In terms of security I think the command-line interface could be
> secured by definition since it will be only available on the prod
> environment (or qa, or test, or dev respectively). In prod I only use
> vlans. The whole set of machines is isolated from other network
> segments all the time. To access them the firewall only allows me to
> get into the machines through a specific port, but this will depend
> on the security on each environment.
> 
> The web interface is probably a little bit different. We will
> probably like to allow users to connect remotely, but from a secured
> net segment only available though a vpn or similar. In any case, it
> will be available over HTTPS only and will need to have user/pass
> security at the very least. Other options can be considered.

Were you envisioning a web-based interface to this tool, or are you
talking about some other kind of UI?

I personally don't need any web-based UI for something like this, but
others may appreciate a point-and-click interface. The good news about
command-line tools is that they are usually trivially scriptable via GUIs.

> On the "Informing the LB question", the tool architecture as I see it
> will include "hooks" (related to events), so custom scripts could be
> added to suit specific needs of each installation/environment. This
> way the end user could the hooks to implement integration points to
> other systems.

Perfect. I happen to use a fleet of httpds with mod_jk as my
load-balancers, but others may use something else.

Providing hooks to listen for various events would be the perfect way to
customize this kind of tool for a particular environment.

-chris

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to