Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows PowerShell Desired State Configuration Revealed

Buy

Desired State Configuration (DSC) is a powerful configuration management platform that makes it easier than ever to perform cross-platform configuration management of your infrastructure, whether on-premise or in the cloud. DSC provides the management platform and Application Programming Interface (API) that can be used with any programming language. Windows PowerShell Desired State Configuration Revealed will take you through this new technology from start to finish and demonstrates the DSC interfaces through Windows PowerShell.

DSC allows you to manage target devices by simply declaring what state you want them to be in, using new declarative language extensions, rather than writing detailed instructions to get them into that state. This makes continuous delivery in Windows easier than ever before. In an environment where changes and deployments are happening all the time, DSC makes the necessary adjustments to the system so you don’t have to.

Windows PowerShell Desired State Configuration Revealed starts with an overview of the configuration management features in Windows, followed by a discussion of the architecture of DSC and its components. You’ll then explore DSC’s built-in features and resources, followed by some of the different methods provided for delivering configuration information within your ecosystem, and learn about configuration monitoring and reporting. In the latter part of the book, you’ll find out how to get more power out of DSC by writing your own custom DSC resources, including a range of useful examples, and the book concludes with vital information on deploying and troubleshooting DSC in a production environment, along with some expert tips and tricks you might find useful along the way.

Windows PowerShell Desired State Configuration Revealed is your one-stop guide to this new technology and how it can change your working life for the better.

What you’ll learn

  • Why continuous delivery and configuration management are important
  • Architecture and components of DSC
  • How to build the infrastructure required to automate configuration management
  • How to use built-in resources and create configuration documents
  • How to create custom DSC resources
  • How to troubleshoot DSC configuration and custom resource issues

Who this book is for

Windows PowerShell Desired State Configuration Revealed is for IT administrators, developers and DevOps engineers working in Windows-based data center environments. With a little prior PowerShell scripting experience, this book can be used as an in-depth reference to creating, customizing and extending DSC in Windows. IT administrators with limited scripting experience will also find this book a useful overview of what DSC offers and how to use DSC resources to automate configuration management and deployment.

DSC is available as part of Windows 8.1 and Windows Server 2012 R2. You can also get DSC on Windows 7, Windows Server 2008 R2 or Windows Server 2012 by installing Windows Management Framework 4.0.

Table of Contents

Part I: Introduction to Windows PowerShell

Chapter 1: Beginning Windows PowerShell

Chapter 2: Introducing Windows Remote Management and CIM

Part II: Desired State Configuration

Chapter 3: Introducing Desired State Configuration

Chapter 4: Getting Started with DSC

Chapter 5: Using Built-in DSC Resources

Chapter 6: Building Advanced DSC Configurations

Part III: Advanced DSC Concepts and Tips

Chapter 7: DSC Configuration Delivery Modes

Chapter 8: Monitoring, Correcting, and Reporting Configuration

Chapter 9: Building Custom DSC Resources

Chapter 10: Troubleshooting Common DSC Issues

Chapter 11: DSC - From the Field

Appendix A: DSC Community Resources

Appendix B: WMF 5.0 and DSC for Linux

(HTML tags aren't allowed.)

Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

Advanced C / Book and Disk
Advanced C / Book and Disk
C has become one of the most frequently used computer languages. The first C language was developed by Dennis Ritchie at Bell Laboratories in 1972 and ran on a DEC PDP-11. The ANSI standard for C, which replaced the standard written by Kernighan and Ritchie in 1978, is only a few years old.

C’s structure is similar to PL/I (a
...
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013, Proceedings (Lecture Notes in Computer Science)
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the proceedings of the 6th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2013, held in Washington, DC, USA in April 2013. The total of 57 contributions, which consists of papers and posters, included in this volume was carefully reviewed and selected from 137 submissions....


Network: Theorizing Knowledge Work in Telecommunications
Network: Theorizing Knowledge Work in Telecommunications
How does a telecommunications company function when its right hand often doesn't know what its left hand is doing? How do rapidly expanding, interdisciplinary organizations hold together and perform their knowledge work? In this book, Clay Spinuzzi draws on two warring theories of work activity - activity theory and actor-network theory - to...
Citrix XenDesktop Cookbook - Third Edition
Citrix XenDesktop Cookbook - Third Edition

Over 40 engaging recipes that will help you implement a full-featured XenDesktop® 7.6 architecture and its main satellite components

About This Book

  • Implement, configure, and optimize the migration from a physical to a VDI architecture using XenDesktop 7.6
  • Publish desktops and...
Mastering Data Mining: The Art and Science of Customer Relationship Management
Mastering Data Mining: The Art and Science of Customer Relationship Management
"Berry and Linoff lead the reader down an enlightened path of best practices." -Dr. Jim Goodnight, President and Cofounder, SAS Institute Inc.

"This is a great book, and it will be in my stack of four or five essential resources for my professional work." -Ralph Kimball, Author of The Data Warehouse Lifecycle
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy