remctl endpoints

Jeffrey Altman jaltman at secure-endpoints.com
Thu Aug 9 18:44:25 EDT 2012


On 8/9/2012 5:52 PM, Russ Allbery wrote:
> We run remctld on literally every system we manage (since we expose
> commands to run and lock Puppet and to install packages with aptitude or
> yum).  We also expose remctl interfaces for every service that we run, so
> any central server doing something like mail services or AFS or web
> services has a corresponding set of remctl interfaces exposed to manage or
> manipulate parts of that service.
> 
> That's the main reason why I've never pursued anything with SRV records:
> my mental model is mostly that every system runs remctld and exposes
> interfaces to manage those services, and load balancing and availability
> happens via load balancing for the service and connecting to the relevant
> hostname.

I view remctl as a protocol and not a service.  Its the applications
that are implemented on top of remctl that are worth searching for.
Just as it would make little sense to have an http srv record.

Jeffrey Altman


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 487 bytes
Desc: OpenPGP digital signature
Url : http://mailman.mit.edu/pipermail/kerberos/attachments/20120809/4cddf4f1/attachment.bin


More information about the Kerberos mailing list