![](https://secure.gravatar.com/avatar/48bfe696ac1cbf068a4de2b752e281c6.jpg?s=120&d=mm&r=g)
ansible
On 28 сент. 2014 г., at 3:46, Darius Seroka dariusjs@gmail.com wrote:
salt stack > pulp > puppet
-- Regards, Darius Jan Seroka dariusjs@gmail.com
On Sat, Sep 27, 2014 at 2:13 AM, Adam Armstrong adama@memetic.org wrote: THE POWER OF PUPPET COMPELS YOU
On 2014-09-26 21:42, Michael Loftis wrote: Oh and word is THIS one still isn't quite final too. Coz yanno I love having to patch thousands of boxes.
On Fri, Sep 26, 2014 at 12:07 PM, Adam Armstrong adama@memetic.org wrote: Seems the first lot of patches didn't work, so they patched them all again!
YAY!
adam.
On 2014-09-25 07:57, tonto@decoygaming.com.au wrote:
Hey all,
This isn't technically about Observium but felt it was worth bringing to your attention.
https://www.us-cert.gov/ncas/current-activity/2014/09/24/Bourne-Again-Shell-...
A bash exploit has been announced that allows remote code execution. Updates are available for Debian/Ubuntu/RHEL via APT/YUM.
Might be an idea to patch your Observium boxes.
Regards, Matt "Tonto" Harper - DecoyGaming _______________________________________________ observium mailing list observium@observium.org http://postman.memetic.org/cgi-bin/mailman/listinfo/observium
observium mailing list observium@observium.org http://postman.memetic.org/cgi-bin/mailman/listinfo/observium
observium mailing list observium@observium.org http://postman.memetic.org/cgi-bin/mailman/listinfo/observium
observium mailing list observium@observium.org http://postman.memetic.org/cgi-bin/mailman/listinfo/observium