remctl endpoints
Jeffrey Altman
jaltman at secure-endpoints.com
Thu Aug 9 18:44:25 EDT 2012
On 8/9/2012 5:52 PM, Russ Allbery wrote:
> We run remctld on literally every system we manage (since we expose
> commands to run and lock Puppet and to install packages with aptitude or
> yum). We also expose remctl interfaces for every service that we run, so
> any central server doing something like mail services or AFS or web
> services has a corresponding set of remctl interfaces exposed to manage or
> manipulate parts of that service.
>
> That's the main reason why I've never pursued anything with SRV records:
> my mental model is mostly that every system runs remctld and exposes
> interfaces to manage those services, and load balancing and availability
> happens via load balancing for the service and connecting to the relevant
> hostname.
I view remctl as a protocol and not a service. Its the applications
that are implemented on top of remctl that are worth searching for.
Just as it would make little sense to have an http srv record.
Jeffrey Altman
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 487 bytes
Desc: OpenPGP digital signature
Url : http://mailman.mit.edu/pipermail/kerberos/attachments/20120809/4cddf4f1/attachment.bin
More information about the Kerberos
mailing list