Cfengine3 Tutorial
Cfengine3 Tutorial
Cfengine3 Tutorial
A CFEngine AS workbook
Table of Contents
1 System automation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Managing diverse and challenging environments seamlessly and
invisibly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Managing expectations - a theory of promises. . . . . . . . . . . . . . . . . . . . 1
1.3 Why automation? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Scaling up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.5 How do you view CFEngine? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
7 Network services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
7.1 CFEngine network services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
7.2 How services work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
7.2.1 Remote file distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
7.2.2 Remote execution of cf-agent . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
7.3 Remote access explained . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
7.3.1 Server connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
7.3.2 Remote access troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
7.3.3 Key exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.3.4 Time windows (races) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
7.3.5 Other users than root . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
7.3.6 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
8 Knowledge Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.1 Promises and Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.2 The basics of knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
8.3 Annotating promises. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
8.4 A promise model of topic maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
8.5 What topic maps offer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
8.6 The nuts and bolts of topic maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
8.6.1 Topic map definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
8.7 Example of topics promises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
8.7.1 Analyzing and indexing the policy . . . . . . . . . . . . . . . . . . . . . . . . . 51
8.7.2 cf-know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
8.8 Modeling configuration promises as topic maps . . . . . . . . . . . . . . . . . 53
9 More... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Chapter 1: System automation 1
1 System automation
1.1 Managing diverse and challenging environments seamlessly and
invisibly
The future is never far away. Our dream of a future in which smart computing devices are
embedded into the very fabric of our environment has crept slowly into being. Today, smart
operating systems like Linux and Windows are used on embedded devices and mobile phones.
Mark Weiser of Xerox PARC once wrote:
”The most profound technologies are those that disappear. They weave them-
selves into the fabric of every day life until they are indistinguishable from it.”
Today many are talking about Cloud Computing as another manifestation of this dream,
in which computing service is not only everywhere, but nowhere – or more correctly, spread
out across the planet in data centers, instead of our offices and homes. This is one aspect
of making computing into something we take for granted. At the foundations of any such
technology are the tools required to implement mass configuration with surgical precision.
CFEngine is such a tool.
CFEngine was designed to enable scalable configuration management, for the whole system
life-cycle, in any kind of environment. Almost every other system for configuration assumes
that there will be a reliable network in place and that changes will be pushed out top-down
from an authoritative node. Those systems are useless in environments like
• Mobile systems with partial or unreliable connectivity (e.g. a submarine).
• Systems where bandwidths are very low (e.g. a satellite or space probe).
• Systems where computing power is very low (e.g. ad hoc sensors or kitchen appliances).
CFEngine does not need reliable infrastructure. It works opportunistically in almost any
environment, using few resources. It has few software dependencies. So, not only does it
work in all of the traditional fixed-plan scenarios, but it is capable of working in totally ad hoc
deployment: an temporary incident room, a submarine drifting on and off line, a satellite or a
robot explorer.
One could argue ‘well I don’t need that kind of system, because my network is reliable’.
However, your network is not as reliable as you think, and mobility is an increasingly important
topic. Even with a very strong redundant network, the services that support the network can
be paralyzed by any of a number of failed dependencies or mishaps. It is crucial in a modern
pervasive environment that systems remain available, fault tolerant and as far as possible
independent of external requirements. This is how to build scalable and reliable services.
CFEngine works in all the places you think it should, and all the new places you haven’t
even thought of yet. How do we know? Because it is based on almost 20 years of careful
research and experience.
1.4 Scaling up
In the past, the only way to scale up system numbers was to make all systems identical. This
is no longer true.
In the late 1960s journalist and futurist Alvin Toffler sketched a pretty compelling vision
of the western world and its post-industrial future. His book Future Shock, which appeared in
1970, was really a reaction to the cold-war fears about a communist industrial state in which
mass production made everything and everyone identical and indistinguishable. His book was
Chapter 1: System automation 3
really a rebuttal to all those who argued that industrialization and mass production implied
that everything had to be exactly the same, and I recommend reading it - it is very well written
and has many lessons for us today. But from his rather long diatribe, I wrote down a single
sentence which for me sums up the lesson that we have failed to learn:
”As technology becomes more sophisticated, the cost of introducing variations
declines.”
In other words, any half-decent technology for mass production would help us to be more
sophisticated and multifaceted, not less. In an age when you can get business cards printed on
demand from an ATM at the airport, and personalized coffee mugs in the blink of an eye, there
is no reason to perpetuate the myth that massive infrastructure requires monolithic replication,
and yet people still do. Network engineers do, and system administrators do. They even say
that this is essential for scalability.
The importance of Toffler’s message was that the economics of mass production are not at
odds with the economics of adaptation, but 40 years later, we are still re-learning that lesson.
For many users, CFEngine is simply a configuration tool – i.e. software for deploying and
patching systems according to a policy. Policy is described using promises – indeed, every
statement in CFEngine 3 is a promise to be kept at some time or location. More than this,
4 CFEngine 3 Tutorial
however, CFEngine is not like most automation tools that ‘roll out’ an image of some software
once and hope for the best. Every promise that you make in CFEngine is continuously verified
and maintained. It is not a one-off operation, but an encapsulated process that repairs itself
should anything deviate from the policy.
That clearly places CFEngine in the realm of automation, which often begs the question:
so it’s just another scripting language? Certainly CFEngine contains a powerful scripting
language, but it is not like any other. CFEngine is not a low level language like Perl, Python
or Ruby; it is a language of promises, in which you express very high level intentions about the
system and the inner details figure out the algorithms needed to implement the result. We’ll
return to this below.
For many, CFEngine is a tool for implementing security hardening procedures on systems,
and monitoring them continuously thereafter. This is certainly a major application area.
CFEngine has a reputation for being reliable and secure. That is because its basic design
is secure: it is not possible to send information about policy to CFEngine from outside the
system. If access has been granted, it is only possible to send a few simple protocol requests
of limited length to the server. This makes the design safer than most firewalls. Most servers
fail security tests because it is possible to send data to them.
The ability to describe almost any kind of policy for a system means that we can suggest
promises that a system should make and comply with. Thus CFEngine can also be thought of
as a compliance engine. It is easily used to comply with frameworks like SOX, ‘EUROSOX’
(the EU 8th Data Directive), ITIL and standards like ISO 17799, ISO 20000, etc.
Finally, although CFEngine was not initially conceived for monitoring, it contains one of the
most flexible and lightweight monitoring engines around. You can extract data about system
configuration, usage, resources and log data and turn this into readable reports. CFEngine’s
ability to discover and extract information about the system, combined with its reporting
means that you can turn the system into a simple Configuration Management Database.
In the Community edition, monitoring is a zero-touch background process. With CFEngine
commercial extensions, there is almost no limit to the kind of monitoring promises you can
make, and without the embarrassing resource spikes that many monitoring systems produce.
Above all, CFEngine is aimed to promote human understanding of complex processes. Its
promises are easily documentable using comments that the system remembers and reminds us
about in error reporting. It hides irrelevant and transitory details of implementation so that the
intentions behind the promises are highlighted for all to see. This means that the knowledge
of your organization can be encoded into the CFEngine language.
WHY DOES KNOWLEDGE MATTER? There are two reasons: the first is that technical
descriptions are hard to remember. You might understand your configuration decisions when
you are writing them, but a few months later when something goes wrong, you will probably
have forgotten what you were thinking. That costs you time and effort to diagnose. The
second reason is that organizations are fragile to the loss of those individuals who code policy.
If they leave, often there is no one left who can understand or fix the system. Only with proper
documentation is it possible to immunize against loss.
Chapter 2: The components of CFEngine 5
2.1 Installation
To install CFEngine, you will need a few packages. You require:
OpenSSL Open source Secure Sockets Layer for encryption.
URL: http://www.openssl.org
Tokyo Cabinet (version 1.4.42 or later)
Lightweight flat-file database system.
URL: http://fallabs.com/tokyocabinet/
PCRE Perl Compatible Regular Expression library.
URL: http://www.pcre.org/
On Windows machines, you need to install the basic Cygwin DLL from
http://www.cygwin.com in order to run CFEngine.
Additional functionality (some of which is available only in commercial extensions) also
becomes available if other libraries are present, e.g. OpenLDAP, client libraries for MySQL
and PostgreSQL, etc. It is possible to run CFEngine without these, but related functionality
will be missing.
Unless you have purchased ready-to-run binaries, or are using a package distribution, you
will need to compile CFEngine. For this you will also need a build environment with gcc, flex,
and bison.
The preferred method of installation is then
tar zxf CFEngine-x.x.x.tar.gz
cd CFEngine-x.x.x
./configure
make
make install
This results in binaries being installed in ‘/var/cfengine/bin’.
/var/cfengine
/var/cfengine/bin
/var/cfengine/inputs
/var/cfengine/outputs
A trusted cache of the input files must now be maintained in the ‘inputs’ subdirectory.
When CFEngine is invoked by the scheduler, it expects to read only from this directory. It
is up to the user to keep this cache updated, on each host (this is arranged by the default
configuration files).
6 CFEngine 3 Tutorial
Unlike CFEngine 2, CFEngine 3 does not recognize the CF-INPUTS environment variable.
The ‘outputs’ directory is now a record of spooled run-reports. These are often mailed to
the administrator by cf-execd, or can be copied to another central location and viewed in an
alternative browser.
If the network is not working, CFEngine just skips these parts and continues with what it
can do. It is fault tolerant and opportunistic.
cf-promises
The promise verifier and compiler. This is used to pre-check a set of configuration
promises before attempting to execute.
cf-agent
This is the instigator of change. The agent is the part of CFEngine that manip-
ulates system resources.
Chapter 2: The components of CFEngine 7
cf-serverd
The server is able to share files and receive requests to execute existing policy
on an individual machine. It is not possible to send (push) new information to
CFEngine from outside.
cf-execd
This is a scheduling daemon (which can either supplement or replace cron). It
also works as a wrapper, executing and collecting the output of cf-agent and
E-mailing it if necessary to a system account.
cf-runagent
This is a helper program that can talk to cf-serverd and request that it execute
cf-agent with its existing policy. It can thus be used to simulate a push of
changes to CFEngine hosts, if their policy includes that they check for updates.
cf-report
This generates summary and other reports in a variety of formats for export or
integration with other systems.
cf-know
This agent can generate an ISO standard Topic Map from a number of promises
about system knowledge. It is used for rendering documentation as a ‘semantic
web’.
the system will function seamlessly as planned. This is how it works in a human
organization, and this is how is works for computers too.
Deploy Deploying really means implementing the policy that was already decided. In
transaction systems, one tries to push out changes one by one, hence ‘deploying’
the decision. In CFEngine you simply publish your policy (in CFEngine parlance
these are ‘promise proposals’) and the machines see the new proposals and can
adjust accordingly. Each machine runs an agent that is capable of implementing
policies and maintaining them over time without further assistance.
Manage Once a decision is made, unplanned events will occur. Such incidents traditionally
set off alarms and humans rush to make new transactions to repair them. In
CFEngine, the autonomous agent manages the system, and you only have to deal
with rare events that cannot be dealt with automatically.
Audit In traditional configuration systems, the outcome is far from clear after a one-
shot transaction, so one audits the system to determine to discover what actually
happened. In CFEngine, changes are not just initiated once, but locally audited
and maintained. Decision outcomes are assured by design in CFEngine and main-
tained automatically, so the main worry is managing conflicting intentions. Users
can sit back and examine regular reports of compliance generated by the agents,
without having to arrange for new ‘roll out’ transactions.
ROLL-OUT and ROLL-BACK? You should not think of CFEngine as a roll-out system, i.e.
one that attempts to force out absolute changes and perhaps reverse them in case of error.
Roll-out and roll-back are theoretically flawed concepts that only sometimes work in practice.
With CFEngine, you publish a sequences of policy revisions, always moving forward (because
like it or not, time only goes in one direction). All of the desired-state changes are managed
locally by each individual computer, and continuously repaired to ensure on-going compliance
with policy.
The figure below shows how decisions flow through the parts of a system.
• It makes sense to have a single point of coordination. Decisions are therefore usually made
in a single location (the Policy Definition Point). The history of decisions and changes
can be tracked by a version control system of your choice (e.g. Subversion, CVS, etc.).
• Decisions are made by editing CFEngine’s policy file ‘promises.cf’ (or one of its included
sub-files). This process is carried out off-line.
• Once decisions have been formalized and coded, this new policy is copied manually (a
human decision) to a decision distribution point, which by default is located in the directory
‘/var/cfengine/masterfiles’ on all policy distribution servers.
In this introduction, we shall assume that there is only one central policy distribution
server, a specially-appointed server which is referred to simple as the policy server.
• Every client machine contacts the policy server and downloads these updates. The policy
server can be replicated if the number of clients is very large, but we shall assume here
that there is only one policy server.
Once a client machine has a copy of the policy, it extracts only those promise proposals
that are relevant to it, and implements any changes without human assistance. This is how
CFEngine manages change.
WHY DO THIS? CFEngine tries to minimize dependencies by decoupling processes. By
following this pull-based architecture, CFEngine will tolerate network outages and will recover
from deployment errors easily. By placing the burden of responsibility for decision at the top,
and for implementation at the bottom, we avoid needless fragility and keep two independent
quality assurance processes apart.
This procedure applies to all hosts, but you should bootstrap the hub (policy server) first.
Find the hostname or IP address of the hub, here we assume the address is ’123.456.789.123’
(do not bootstrap with a localhost address).
CFEngine will output diagnostic information upon bootstrap (written to command line and
syslog; cf-agent will also return a value: ERROR: 1, SUCCESS: 0). Error messages will be
displayed if bootstrapping failed, pursue these to get and indication of what went wrong and
correct accordingly. If all is well you should see the following in the output:
As an alternative to installing binary packages, the following steps outline the procedure
when you have built from source (available from http://cfengine.com/source˙
code). You will then need to copy the distributed policy files that were installed in
‘/var/cfengine/share/CoreBase/’ to a policy distribution point, like this:
1. Decide on your policy server.
2. Become root or Administrator on that server.
3. Create the policy source directory and populate the cache:
host# /var/cfengine/bin/cf-key
host# cp /var/cfengine/share/CoreBase/*.cf /var/cfengine/masterfiles/
host# /var/cfengine/bin/cf-agent --bootstrap --policy-server 123.456.789.123
CFEngine should be up and running on your system after the bootstrap. It will copy its de-
fault policy files into ‘/var/cfengine/masterfiles’ on the hub (policy server) provided that
the directory is empty (fresh install). This directory is the definition point for your policy, mean-
ing that clients will contact the hub and copy these files to their ‘/var/cfengine/inputs’
directory. Note that the policy hub also works as a client against itself, so it too will copy from
‘/var/cfengine/masterfiles’ to ‘/var/cfengine/inputs’. You should browse the files in
‘/var/cfengine/masterfiles’ to see what they contain, and perhaps make some alterations
to adapt to your environment.
To see which CFEngine processes are running:
Note: If you have manually configured a different location for the CFEngine work directory,
you will need to adapt these lines above to replace ‘/var/ CFEngine’ with the path you have
configured; e.g. Debian based packages feel that ‘/var/ lib/CFEngine’ is the right location
for this.
Chapter 3: Bodies and bundles 11
3.1 Bodies
Promises are the fundamental statements in CFEngine. Promises are the policy atoms. If
there is no promise, nothing happens.
However, promises can become quite complicated and readability becomes an issue, so it
is useful to have a way of breaking them down into independent components. The structure
of a promise is this:
Promiser This is the object that formally makes the promise. It is always the affected
object, since objects can only make promises about their own state or behavior in
CFEngine.
Promisee (optional)
This is a possible stakeholder, someone who is interested in the outcome of the
promise. It is used as documentation, and it is used for reasoning in the commercial
CFEngine product.
Promise body
Everything else about a promise is defined in the body of the promise. We use
this word in the sense of ‘body of a contract’ or the ‘body of a document’ (like
¡body¿) tags in HTML, for example.
A promise body is a list of declarations of the following form:
CFEngine˙attribute˙type =¿ user˙defined˙value or template
”/tmp/promiser” # Promiser
The attachment is declared like this, with a ‘type’ that matches the left hand side of the
declaration in the promise:
body perms myexample
–
mode =¿ ”644”;
owners =¿ – ”mark”, ”sarah”, ”angel” ˝;
12 CFEngine 3 Tutorial
promiser
LVALUE =¿ RVALUE
..
promiser
..
Body attachments are required items. You cannot choose to put the attachments in-line.
This is a lesson that was learned from CFEngine 2. Readability is quickly lost if too many
details are placed in-line.
Chapter 3: Bodies and bundles 13
3.2 Bundles
A bundle is a simple concept. A bundle is merely a collection of promises in a ‘sub-routine-
like’ container. The purpose of bundles is to allow you greater flexibility to break down the
contents of your policies and give them names. Bundles also allow you to re-use promise code
by parameterizing it.
Like bodies, bundles also have ‘types’. Bundles belong to the agent that is used to keep
the promises in the bundle. So cf-agent has bundles declared as
bundle agent my˙name
–
˝
The cf-serverd program has bundles declared as:
bundle server my˙name
–
˝
and so on.
14 CFEngine 3 Tutorial
Type this in to a file, e.g. ‘emacs ˜/test.cf’. Then check the syntax like this
/var/cfengine/bin/cf-promises -f ˜/test.cf
If all is well there should be no output. Now execute as follows:
/var/cfengine/bin/cf-agent -f ˜/test.cf
You should see this:
R: Hello world
The ‘R:’ tells you this is the output from a report (as opposed to a log ‘L:’, or the quoted
output of some embedded program ‘Q:’).
This is not a typical CFEngine program, primarily because CFEngine is not normally meant to
print messages except in exceptional circumstances. As a starter however, it is reassuring to
see some output.
16 CFEngine 3 Tutorial
If you repeat the command immediately nothing will happen. But if you wait a minute, it
will work again. Run the command in verbose mode (use the -v or the --verbose switch) to
see why:
/var/cfengine/bin/cf-agent --verbose -f ˜/test.cf
Now you will see:
cf3¿ =========================================================
cf3¿ reports in bundle hello (1)
cf3¿ =========================================================
cf3¿
cf3¿ XX Nothing promised here [lock.hello.reports..Hello˙worl] (0/1
minutes elapsed)
cf3¿
This tells you that CFEngine believes it is too soon to try to keep this promise again. The
time it sets on this is determined by the ifelapsed parameter, which can be set individually
for every promise. You can also ask CFEngine to ignore these locks using the ‘-K’ option.
Before the ‘Hello world’ string, you see the class expression ‘cfengine˙3::’. This is how
CFEngine makes decisions. The promise to print the message will only apply if this condition
is true. To see that this class is true for the execution, look at the verbose output from the
command you just typed. You will see something like this:
Defined Classes = ( any verbose˙mode Tuesday Hr08 Morning Min48
Min45˙50 Q4 Hr08˙Q4 Day7 July Yr2009 Lcycle˙2 GMT˙Hr6 linux atlas
undefined˙domain 64˙bit linux˙2˙6˙27˙23˙0˙1˙default x86˙64
linux˙x86˙64 linux˙x86˙64˙2˙6˙27˙23˙0˙1˙default
linux˙x86˙64˙2˙6˙27˙23˙0˙1˙default˙˙1˙SMP˙2009˙05˙26˙17˙02˙05˙˙0400
compiled˙on˙linux˙gnu localhost˙localdomain localhost net˙iface˙lo
net˙iface˙wlan0 ipv4˙192˙168˙1˙100 ipv4˙192˙168˙1 ipv4˙192˙168
ipv4˙192 fe80˙˙21c˙bfff˙fe6e˙70ef CFEngine˙3˙0˙2b4 CFEngine˙3˙0
CFEngine 3 SuSE lsb˙compliant suse suse˙n/a suse˙11˙1 suse˙11
agent )
i.e. a list of all the currently defined classes. Any one of these classes (or a combination)
could have been used to label the promise. That is the way CFEngine points to which promises
will be kept in which scenarios.
A final thing to note: if you try to process this using the ‘cf-promises -r’ command, you
will see something like this:
atlas$ ˜/LapTop/CFEngine3/trunk/src/cf-promises -r -f ˜/test.cf
Summarizing promises as text to ˜/test.cf.txt
Summarizing promises as html to ˜/test.cf.html
The ‘-r’ option produces a report. Examine the files produced:
cat ˜/test.cf.txt
firefox ˜/test.cf.html
You will see a summary of how CFEngine interprets the files, either in HTML or text. All
the CFEngine components will produce debugging file with an expanded view when using this
option (e.g. for the configuration file named ‘promise˙output˙agent.h’, they will create the
files ‘promise˙output˙agent.html’ and ‘promise˙output˙agent.txt’).
”/tmp/testfile” # promiser
This example shows how additional attributes are added to the body of the promise. The
right hand side of the perms declaration is a template which we have called ‘m()’, which uses
a parameter. The template is defined below the bundle of promises that uses it, showing how
we can create re-usable sets of parameters. In this case, the example is trivial, but we have
barely begun. When things get more sophisticated, we shall hide a huge amount of detail in
these parameters, thus keeping the main promise uncluttered and its intention clear.
In every ‘promise constraint’ of the form ‘left-hand-side =¿ right-hand-side’, the left
hand side is a CFEngine reserved word, and the right hand side is a decision you make, possibly
expressed in terms of standard templates.
Now execute cf-agent with this promise:
host$ /var/cfengine/bin/cf-agent -f /tmp/test.cf -I
-¿ Object /tmp/testfile had permission 600, changed it to 612
18 CFEngine 3 Tutorial
host$ ls -l /tmp/testfile
-rw---x-w- 1 mark users 33 2009-06-30 06:06 /tmp/testfile
The ‘-I’ flag tells CFEngine to ‘inform’ us about changes only. This provides a digestible
amount of output that is more than the default (which is to only report un-fixable problems or
explicit reports). We see that CFEngine creates the file as ordered, and sets the permissions
appropriately. Now try to change the permissions:
host$ chmod 400 /tmp/testfile
host$ ls -l /tmp/testfile
-r-------- 1 mark users 33 2009-06-30 06:06 /tmp/testfile
host$ ls -l /tmp/testfile
-rw---x-w- 1 mark users 33 2009-06-30 06:06 /tmp/testfile
Once again, remember the comment about locking and ifelapsed from the previous
example.
Notice that this promise does not have a class expression like cfengine˙3::. The default
class any:: applies if nothing is stated, which means ‘anytime, anyplace, anywhere’.
”/tmp/shadow”
comment =¿ ”Set the root password”,
edit˙line =¿ set˙user˙field(”root”,2,”xyajd673j.ajhfu”);
This is all we need to see on first inspection to understand the promise that is being made.
Chapter 4: How to execute and test a CFEngine policy 19
files:
”/var/cfengine/inputs”
These promises contain several attributes in their bodies that we have not seen yet. The
copy˙from attribute tells CFEngine how to source (copy) a file from a master location. The
depth˙search tells it to search recursively through the sub-directories and their files.
Try changing the source files and executing the agent.
Again there are library reusable templates:
#
20 CFEngine 3 Tutorial
Here is an exercise: try using the reference manual to look up the elements in this example.
See if you can understand all the parts.
4.5 Reporting
CFEngine contains a report generator called ‘cf-report’. It is configured using control pa-
rameters described in the next chapter. Try:
host$ /var/cfengine/bin/cf-reports
host$ ls ˜/.cfagent/reports
host$ mywebbrowser ˜/.cfagent/reports/performance.html
Most of these reports will be blank at the start, until you have run CFEngine on some
significant promises.
4.6 cf-execd
CFEngine contains a service for running the agent with its default configuration in
‘WORKDIR/inputs/promises.cf’ called the exec-daemon. If you execute the binary directly
it will go into the background and execute ‘cf-agent’ every five minutes by default, with its
default policy.
You can try running it in the foreground:
host$ /var/cfengine/bin/cf-execd -F
When you run CFEngine like this, any output that comes from CFEngine is collected and
placed in ‘WORKDIR/outputs’. If you have configured an email address and your host is running
an SMTP service, then it will be sent as email. To configure this you would add a control
body to the ‘promises.cf’ file
body executor control
–
splaytime =¿ ”1”;
mailto =¿ ”cfengine˙mail@example.org”;
smtpserver =¿ ”localhost”;
mailmaxlines =¿ ”30”;
˝
These other lines change different aspects of the hard-wired behavior of the executor, e.g. a
load-balancing time delay before execution of the agent, a mail address, the name or IP address
of an SMTP (mail) service, and the maximum number of lines of output to be included in any
email sent.
Chapter 4: How to execute and test a CFEngine policy 21
You should start to see a pattern in the way CFEngine is configured. In the next chapter,
we’ll look at these general matters.
Chapter 5: A simple crash course in concepts 23
type:
classes::
attribute˙1 =¿ value˙1,
attribute˙2 =¿ value˙2,
...
attribute˙n =¿ value˙n;
We speak of a promiser (the abstract object making the promise), the promisee is the abstract
object to whom the promise is made, and then there is a list of associations that we call the
‘body’ of the promise, which together with the promiser-type tells us what it is all about.
The promiser is always the object affected by the promise.
Not all of these elements are necessary every time. Some promises contain a lot of implicit
behavior. In other cases we might want to be much more explicit. For example, the simplest
reports promise looks like this:
reports:
”hello world”;
commands:
This promise has default attributes for everything except the ‘promiser’, i.e. the command
string that promises to execute. A more complex promise contains many attributes:
# Promise type
files:
# attribute =¿ value
comment =¿ ”This comment follows the rule for knowledge integration”,
perms =¿ owner(”@(usernames)”),
create =¿ ”true”;
The list of promisees is not used by CFEngine except for documentation, just as the
comment attribute (which can be added to any promise) has no actual function other than to
provide more information to the user in error tracing and auditing.
You see several kinds of object in this example. All literal strings (e.g. ”true”) in CFEngine
3 must be quoted. This provides absolute consistency and makes type-checking easy and error-
correction powerful. All function-like objects (e.g. users(”..”)) are either built-in special
functions or parameterized templates which contain the ‘meat’ of the right hand side.
inputs =¿ –
”update.cf”,
”site.cf”,
”library.cf”
˝;
˝
#######################################################
ifelapsed =¿ ”15”;
˝
#######################################################
#######################################################
–
splaytime =¿ ”1”;
mailto =¿ ”cfengine˙mail@example.org”;
smtpserver =¿ ”localhost”;
mailmaxlines =¿ ”30”;
˝
#######################################################
–
reports =¿ – ”performance”, ”last˙seen”, ”monitor˙history” ˝;
build˙directory =¿ ”/tmp/nerves”;
report˙output =¿ ”html”;
˝
#######################################################
#######################################################
–
allowconnects =¿ – ”127.0.0.1” , ”::1” ˝;
allowallconnects =¿ – ”127.0.0.1” , ”::1” ˝;
trustkeysfrom =¿ – ”127.0.0.1” , ”::1” ˝;
5.3 Variables
Variables (or ”variable definitions”) are also promises – the promise to represent their values.
We can write these in any promise bundle. CFEngine recognizes two object types: scalars and
lists (lists contain 0 or more objects), as well as three data-types (string, integer and real).
Typing in CFEngine is dynamic, as in Perl and other scripting languages. Thus variables of
any data-type may be used as strings.
The ‘¡type¿’ indicates that any kind of bundle applies here. Scalar variables are referenced
by ‘$(name)’ (or ‘$–name˝’) and they represent a single value at a time.
• Scalars that are written without a context, e.g. ‘$(myvar)’ are local to the current
bundle.
• Scalars are globally available everywhere provided one uses the context to verify them e.g.
‘$(context.myvar)’ may be written to access the variable ‘myvar’ in bundle ‘context’.
An entire list is referred to with the at symbol ‘@’, but it does not usually make sense to
use this reference in a string. For instance
reports:
cfengine˙3::
means nothing and cannot be expanded (it does not generate an error, but instead inserts the
text @(my slist) into the string); but if we use the scalar reference to a list variable, CFEngine
will iterate over the values in the list essentially making this into a list of promises.
To summarize:
• Scalar references to local list variables imply iteration, e.g. suppose we have local list
variable ‘@(list)’, then the scalar ‘$(list)’ implies an iteration over every value of the
list.
• Lists can be passed in their entirety in any context where a list is expected as ‘@(list)’.,
e.g.
vars:
The declaration order does not matter – CFEngine will execute the promise to assign the
variable ‘@(shortlist)’ before the promise to assign the variable ‘@(longlist)’.
• Only local lists can be expanded directly. Thus ‘$(list)’ can be expanded but not
‘$(context.list)’. Global list references have to be mapped into a local context if you
want to use them for iteration. See the reference manual for more information.
See the reference manual for information on the ‘getindices’ function and other details
of associative arrays.
28 CFEngine 3 Tutorial
5.4 Decisions
CFEngine decisions are made behind the scenes and the results of certain true/false proposi-
tions are cached in Booleans referred to as ‘classes’. There are no if-then-else statements in
CFEngine; all decisions are made with classes.
CFEngine runs on every computer individually and each time it wakes up the underlying
generic agent platform discovers and classifies properties of the environment or context in
which it runs. This information is effectively cached and may be used to make decisions about
configuration.
Classes fall into hard (discovered) and soft (user-defined) types. A single hard class can be
one of several things:
• The name of an operating system architecture e.g. ultrix, sun4, etc.
• The unqualified name of a particular host. If your system returns a fully qualified
domain name for your host, CFEngine truncates it at the first dot. Note:
www.sales.company.com and www.research.company.com have the same unqualified
name – www.
• The name of a user-defined group of hosts.
• A day of the week (in the form Monday, Tuesday, Wednesday, ..).
• An hour of the day, current time zone (in the form Hr00, Hr01 ... Hr23).
• An hour of the day GMT (in the form GMT˙Hr00, GMT˙Hr01 ... GMT˙Hr23). This is
consistent the world over, in case you need virtual simultaneity of change coordination.
• Minutes in the hour (in the form Min00, Min17 ... Min45).
• A five minute interval in the hour (in the form Min00˙05, Min05˙10 ... Min55˙00)
• The quarter-hour (in the form Q1, Q2, Q3, Q4).
• A day of the month (in the form Day1, Day2, ... Day31).
• A month (in the form January, February, ... December).
• A year (in the form Yr1997, Yr2004).
• A shift in Night,Morning,Afternoon,Evening, which fall into six hour blocks starting
at 00:00 hours.
• A ‘lifecycle index’, which is the year number modulo 3 (used in long term resource mem-
ory).
• An arbitrary user-defined string.
• The IP address octets of any active interface (in the form ipv4˙192˙0˙0˙1,
ipv4˙192˙0˙0, ipv4˙192˙0, ipv4˙192).
To see all of the classes define on a particular host, run
host# cf-promises -v
as a privileged user. Note that some of the classes are set only if a trusted
link can be established with cfenvd, i.e. if both are running with privilege, and the
‘/var/cfengine/state/env˙data’ file is secure. More information about classes can be
found in connection with allclasses.
User-defined or soft classes are defined in bundles. Bundles of type common yield classes
that are global in scope, whereas in all other bundle types classes are local. Soft classes are
Chapter 5: A simple crash course in concepts 29
evaluated when the bundle is evaluated. They can be based on test functions or simply from
other classes:
reports:
alt˙class::
Classes may be combined with the operators listed here in order from highest to lowest prece-
dence:
‘()’ The parenthesis group operator.
‘!’ The NOT operator.
‘.’ The AND operator.
‘&’ The AND operator (alternative).
‘—’ The OR operator.
‘——’ The OR operator (alternative).
So the following expression would be only true on Mondays or Wednesdays from 2:00pm to
2:59pm on Windows XP systems:
(Monday—Wednesday).Hr14.WinXP::
Consider the following more advanced example. Promises in bundles of type ‘common’ are
global in scope – all other promises are local to the scope of their bundle.
#################################
bundle common g
–
classes:
#################################
#################################
reports:
zero.!one.two::
Here we see that class ‘zero’ is global while classes ‘one’ and ‘two’ are local. The report
‘Success’ result is therefore true because only ‘zero’ and ‘two’ are in scope in the ‘ls˙2’
bundle (and the class expression for bundle ‘ls˙2’ requires that both ‘zero’ and ‘two’ be true
and that ‘one’ not be true).
Chapter 5: A simple crash course in concepts 31
5.5 Loops
If you are looking for loops in CFEngine then we need to reprogram you a little, as you are
thinking like a programmer! CFEngine is not a programming language that is meant to give
you low level control, but rather a set of declarations that embody processes. It’s the difference
between the gears on a bicycle and the automated transmission in a transporter.
Loops are executed implicitly in CFEngine, but there is no visible mechanism for it – because
that would steal attention from the intention of the promises. The way to express them is
through lists.
Loops are really a way to iterate a variable over a list. Try the following.
–
bundlesequence =¿ – ”example” ˝;
˝
###########################################################
–
vars:
# This is a list
reports:
cfengine˙3::
”$(component) is $(array[$(component)])”;
/var/cfengine/bin/cf-agent -f ./unit˙loops.cf -K
You see from this that, if we refer to a list variable using the scalar reference operator
‘$()’, CFEngine interprets this to mean “please iterate over all values of the list”. Thus, we
have effectively a ‘foreach’ loop, without the attendant syntax.
The central idea behind this scheme is to set up a regular cron job on every system which
executes cf-agent at frequent intervals. Each time cf-agent is started, it evaluates time
classes and executes the shell commands defined in its configuration file. In this way we
use cf-agent as a wrapper for the cron scripts, so that we can use CFEngine’s classes to
control jobs for multiple hosts. CFEngine’s time classes are at least as powerful as cron’s
time specification possibilities, and they add control over location too. This does not restrict
you in any way, See Section 6.5 [Building flexible time classes], page 36. The only price is the
overhead of parsing the CFEngine configuration file which is insignificant.
DO I NEED TO USE CRON? No. With CFEngine’s cf-execd you don’t have to use
cron – CFEngine can schedule itself. Whether you choose to run cf-execd in daemon mode,
or in wrapper mode is entirely up to you. In the commercial versions of CFEngine, the exec
daemon has sophisticated features for reliability. In the Community Edition, you might feel
comfortable having something independent watching over CFEngine, especially during binary
updates during which live programs can die from faults.
34 CFEngine 3 Tutorial
promise-type :
time-based classes::
Promise
For example:
bundle agent example
–
commands:
Hr12.Q1::
Q2::
”/path/otherscript”;
# Exec during the intervals 00:10 through 00:15 and 12:45 through 12:55
# (English says ‘‘and’’, but logic says ‘‘if this interval or that is true’’
Hr00.Min10˙15——Hr12.Min45˙55::
”/path/amongstourscripts”;
If you want to get fancy, you can set parameters for the execution of the script by building a
container for it that traps its output and privileges (this applies to root only, since only root
has this power to change privilege).
bundle agent example
–
commands:
Hr12.Q1::
contain =¿ jail(”nobody”,”true”);
˝
# ...
The ‘contain’ment body provides a safe and flexible environment in which to embed scripts.
The time resolution of the classes is limited by how often you execute CFEngine either
using cron or cf-execd. Five minutes is the recommended scheduling interval.
–
splaytime =¿ ”10”; # Minutes
˝
If this number is non-zero, cf-execd goes to sleep after parsing its configuration file and
reading the clock. Every machine’s cf-execd will go to sleep for a different length of time,
which is no longer than the time specified.
A hashing algorithm, based on the fully qualified name of the host, is used to compute a
unique time for hosts. The shorter the interval, the more clustered the hosts will be. The
longer the interval, the lighter the load on your servers. This ‘splaying’ of the run times will
lighten the load on servers, even if they come from domains not under your control but have
a similar cron policy.
36 CFEngine 3 Tutorial
In the first three examples, the left hand sides of the assignments are effectively the ORed
result of the right hand side. Thus if any classes in the braces is defined, the left hand side
class will become defined. This provides a flexible and readable way of specifying intervals of
time within a program, without having to use ‘—’ and ‘.’ operators everywhere.
7 Network services
This chapter describes how you can set up a CFEngine network service to handle remote file
distribution and remote execution of CFEngine without having to open your hosts to possible
attack using the rsh protocols.
willing. In other words, CFEngine simulates a ‘push’ model by polling each client and running
the local CFEngine configuration script giving the host the chance to ‘pull’ any updated files
from the remote server, but leaving it up to the client machine to decide whether or not it
wants to update.
Also, in contrast to programs like rdist which distribute files over many hosts, CFEngine
does not require any general root access to a system using the ‘.rhosts’ file or the
‘/etc/hosts.equiv’ file. It is sufficient to run the daemon as root. You can not run it by
adding it to the ‘/etc/inetd.conf’ file on your system however. The restricted functionality
of the daemon protects your system from attempts to execute general commands as the root
user using rsh.
To remotely access files on a server you use a copy˙from attribute in a ‘files’ promise:
bundle agent example
–
files:
”/var/cfengine/inputs”
perms =¿ m(”600”),
copy˙from =¿ remote˙cp(”$(master˙location)”,”localhost”),
depth˙search =¿ recurse(”inf”),
action =¿ immediate;
# Library template
Assuming that the cf-serverd daemon is running on server- host, cf-agent will make contact
with the daemon and attempt to obtain information about the file. During this process,
CFEngine verifies that the system clocks of the two hosts are reasonably synchronized. If they
are not, it will not permit remote copying unless denybadclocks is false in the server control
body.
If cf-agent determines that a file needs to be updated from a remote server it begins
copying the remote file to a new file on the same filesystem as the destination-file. This file
has the suffix ‘.cfnew’.
Only when the file has been successfully collected will cf- agent make a copy of the old
file, (see repository in the Reference manual), and rename the new file into place. This
behavior is designed to avoid race-conditions which can occur during network connections
and indeed any operations which take some time. If files were simply copied directly to their
Chapter 7: Network services 39
new destinations it is conceivable that a network error could interrupt the transfer leaving a
corrupted file in place. cf-agent places a timeout of a few seconds on network connections
to avoid hanging processes.
Normally the daemon sleeps, waiting for connections from the network. Such a connection
may be initiated by a request for remote files from a running cf-agent program on another
host, or it might be initiated by the program cf-runagent which simply asks the host running
the daemon to run cf-agent or cf-execd program locally.
output....
A client program
Both cf-agent and cf-runagent are clients that can connect to the server.
Permission to connect to the server, and
The server control body must grant access to your computer and public key by
name or IP address, by listing it in one of the lists (see below).
Your public key must be trusted by the server, and you must
trust the server’s public key
By mutually trusting each others’ keys, client and server agree to use that key as
a sufficient identifier for the computer.
Permission to access something
Your host name or IP address must be mentioned in an access promise inside a
server bundle, made by the file that you are trying to access.
If all of the above criteria are met, connection will be established and data will be transferred
between client and server. The client can only send short requests, following the CFEngine
protocol. The server can return data in a variety of forms, usually files, but sometimes console
output.
3. Make sure you have created valid keys for the hosts using cf-key.
4. If you are using secure copy, make sure that you have created a key file and that you have
distributed and installed it to all participating hosts in your cluster.
Always remember that you can run CFEngine in verbose or debugging modes to see how the
authentication takes place:
cf-agent -v
cf-serverd -v
Chapter 7: Network services 41
cf-agent reports that access is denied regardless of the nature of the error, to avoid giving
away information which might be used by an attacker. To find out the real reason for a denial,
use verbose ‘-v’ or even debugging mode ‘-d2’.
–
access:
”/path/file”
On the client side, i.e. cf-runagent and cf-agent, there are three issues:
1. Choosing which server to connect to.
2. Trusting the identity of any previously unknown servers, i.e. trusting the server’s public
key to be its and no one else’s. (The issues here are the same as for the server.)
3. Choosing whether data transfers should be encrypted (with encrypt).
Because there are two clients for connecting to cf-serverd (cf-agent and cf-runagent),
there are also two ways on managing trust of server keys by a client. One is an automated
option, setting the option trustkey in a copy˙from stanza, e.g.
42 CFEngine 3 Tutorial
Another way is to run cf-runagent in interactive mode. When you run cf-runagent,
unknown server keys are offered to you interactively (as with ssh) for you to accept or deny
manually:
localhost.pub -¿ root-128.39.74.71.pub
This would be a silly way to transfer keys between nearby hosts that you control yourself,
but if transferring to long distance, remote hosts it might be an easier way to manage trust.
7.3.6 Encryption
CFEngine provides encryption for keeping file contents private during transfer. It is assumed
that users will use this judiciously. There is nothing to be gained by encrypting the transfer of
public files – overt use of encryption just contributes to global warming, burning unnecessary
CPU cycles without offering any security.
The main role for encryption in configuration management is for authentication. CFEngine
always uses encrypted for authentication, so none of the encryption settings affect the security
of authentication.
Chapter 8: Knowledge Management 45
8 Knowledge Management
A unique aspect of CFEngine, that is fully developed in the commercial editions of the software,
its ability to enable integrated knowledge management as part of an automation process, and
to use its configuration technology as a ‘semantic’ documentation engine.
Knowledge has quite a lot in common with configuration: what after all is knowledge
but a configuration of ideas in our minds, or on some representation medium (paper, silicon
etc). It is a coded pattern, preferably one that we can agree on and share with others. Both
knowledge and configuration management are about describing patterns. A simple knowledge
model can be used to represent a policy or configuration; conversely, a simple model of policy
configuration can manufacture a knowledge structure just as it might manufacture a filesystem
or a set of services.
files:
”/var/cfengine/inputs”
handle =¿ ”update˙policy”,
comment =¿ ”Update the CFEngine input files from the policy server”,
perms =¿ system(”600”),
copy˙from =¿ rcp(”$(master˙location)”,”$(policy˙server)”),
depth˙search =¿ recurse(”inf”),
file˙select =¿ input˙files,
action =¿ immediate;
Chapter 8: Knowledge Management 47
If a promise affects another promise in some way, you can make the affected one promise one
of the promisees, like this:
access:
handle =¿ ”serve˙updates”,
admit =¿ – ”217.77.34.*” ˝;
Conversely, if a promise might depend on another in some (even indirect) way, document this
too.
files:
”/var/cfengine/inputs”
handle =¿ ”update˙policy”,
comment =¿ ”Update the CFEngine input files from the policy
server”,
depends˙on =¿ – ”serve˙updates” ˝,
perms =¿ system(”600”),
copy˙from =¿ rcp(”$(master˙location)”,”$(policy˙server)”),
depth˙search =¿ recurse(”inf”),
file˙select =¿ input˙files,
action =¿ immediate;
This use of annotation is the first level of documentation in CFEngine. The annotations are
used internally by CFEngine to provide meaningful error messages with context and to compute
dependencies that reveal the existence of process chains. These can be turned into a topic
map for browsing the policy relationships is a web browser, using cf-know.
The CFEngine Knowledge Map is only available in commercial editions of the software,
where the necessary support to set up and maintain this technology can be provided.
So let us spend a while showing how to encode knowledge in topic maps using cf-know.
The kind of result you can expect is shown in the pictures below. The example figures show
typical pages generated by the knowledge agent cf-know. The first of these shows how we
use the technology to power the web knowledge base in the commercial CFEngine product.
In this use, all of the data are based on documentation for the CFEngine software, and
most of the relationships are manually entered.
For a second example, consider how CFEngine can generate such a knowledge map analysis
of its own configuration (self-analysis). The data in the images below describe the CFEngine
configuration promises. One such page is generated, for instance, for each policy promise, and
pages are generated for reports from different computers etc. You can also create you own
‘topic pages’ for any local (enterprise) information that you have.
In this example, the promise has been given the promise-handle update˙policy, and the
associations and the lower graph shows how this promise relates to other promises through
its documented dependencies (these are documented from the promisees and depends˙on
attributes of other promises.).
The example page shows two figures, one above the other. The upper figure shows the
thirty nearest topics (of any kind) that are related to this one. Here the relationships are
unspecific. This diagram can reveal pathways to related information that are often unexpected,
and illustrates relationships that broaden one’s understanding of the place the current promise
occupies within the whole.
Although the graphical illustrations are just renderings of semantic associations shown more
fully in text, they are useful for visualizing several levels of depth in the associative network.
This can be surprisingly useful for brainstorming and reasoning alike. In particular, one can see
the other promises that could be affected if we were to make a change to the current promise.
Such impact analyses can be crucial to planning change and release management of policy.
Chapter 8: Knowledge Management 49
A knowledge base is a slightly improved implementation of a Topic Map which is an ISO
standard technology. A topic map works like an index that can point to many different kinds
of external resources, and may contain simple text and images internally. So you use it to bind
together documents of any kind. A CFEngine knowledge base is not a new document format,
it is an overlay map that joins ideas and resources together, and displays relationships.
granularity of meaning. Contexts represent a set of topics that might be relevant, which in
turn encompass a set of occurrences of resources that contain actual information about the
topics in that context. The primacy of topics in this stems from their ability to form networks
by association.
The classic approach to information modeling is to build a hierarchical decomposition of
non-overlapping objects. Data are manipulated into non-overlapping containers which often
prove to be overly restrictive. Topic maps allow us to avoid the kinds of mistakes that have
led to monstrosities like the Common Information Model (CIM) with its thousands of strictly
non-overlapping type categories.
Each topic allows us to effectively ‘shine a light’ onto the occurrences of information that
highlight the concepts pertinent to the topic somehow.
###################################################
bundle knowledge tm
–
topics:
services::
occurrences:
Chapter 8: Knowledge Management 51
httpd::
”http://www.apache.org”
represents =¿ – ”website” ˝;
###################################################
–
forward˙relationship =¿ ”$(f)”;
backward˙relationship =¿ ”$(b)”;
associates =¿ – $(name) ˝;
˝
The simplified things interface is similar, but uses fixed relations:
bundle knowledge company˙knowledge
–
things:
regions::
countries::
”UK” synonyms =¿ – ”Great Britain” ˝,
is˙located˙in =¿ – ”EMEA”, ”Europe” ˝;
locations::
”London˙1” is˙located˙in =¿ – ”London”, ”UK” ˝;
”New˙Jersey” is˙located˙in =¿ – ”USA” ˝;
networks::
8.7.2 cf-know
CFEngine’s knowledge agent cf-know allows you to make promises about knowledge and its
inter-relationships. It is not specifically a generic topic map language: rather it provides a
powerful configuration language for managing a knowledge base that can be compiled into a
topic map.
To build a topic map from a set of knowledge promises in ‘knowledge.cf’, you would
write:
# cf-know -b -f ./knowledge.cf
The syntax of this file is hinted at below. The full ISO standard topic map model is
too rich to be a useful tool for system knowledge management. However, this is where
powerful configuration management can help to simplify the process: encoding a topic map is
a complex problem in configuration, which is exactly what CFEngine is for. CFEngine’s topic
map promises have the following form:
”Other topic”;
occurrences:
Topic˙name:: # Topic
Chapter 8: Knowledge Management 53
any::
˝
This system configuration promise can be mapped by CFEngine into a number of other
promise proposals intended for the cf-know agent. Suppressing some of the details, we have:
type˙files::
”/var/cfengine/inputs”
association =¿ a(”promise made in bundle”,”update”,”bundle
contains promise”);
”/var/cfengine/inputs”
association =¿ a(”specifies body type”,”perms”,”is specified in”);
”/var/cfengine/inputs”
association =¿ a(”specifies body type”,”mode”,”is specified in”);
”/var/cfengine/inputs”
association =¿ a(”specifies body type”,”copy˙from”,”is specified
in”);
# etc ...
54 CFEngine 3 Tutorial
occurrences:
˙var˙CFEngine˙inputs::
”promise˙output˙common.html#promise˙˙var˙CFEngine˙inputs˙update˙cf˙13”
represents =¿ – ”promise definition” ˝;
Note that in this mapping, the actual promise (viewed as a real world entity) is an occurrence
of the topic ‘promise’; at the same time each promise could be discussed as a different topic
allowing meta-modeling of the entity-relation model in the real-world data. Conversely the
topics themselves become configuration items or ‘promisers’ in the promise model. The effect
is to create a navigable semantic web for traversing the policy; this documents the structure
and intention of the policy using a small ontology of standard concepts and can be extended
indefinitely by human domain experts.
Chapter 9: More... 55
9 More...
You will find extensive help, examples and documentation as part of the commercial CFEngine
support. Visit the website http://www.cfengine.com for more details.