2017-10-12 0:55 GMT-03:00 Bryan Smith <[email protected]>:

> DISCLAIMER:  _Any posts by myself on lpi-examdev are as a peer among
> peers, and are only designed to provoke considerations, and should not
> be taken as an endorsement or anything other than simple, individual,
> professional consideration for further discussion._
>
> Alessandro Selli wrote:
> > Simone Piccardi wrote:
> >> I propose the removal of topic 105.3: "SQL data management" because it
> >> has nothing to do with Linux.
> >> It's true that knowing about SQL basis is needed for a sysadmin, like
> >> knowing about switching loops. For both I just don't think they are
> >> topics for a Linux specific certification.
> >
> > I agree.  The response I get from people attending LPIC-2 related classes
> > is regularly of surprise if not amazement when SQL is introduced.
> >   It is true that Apache (LPI-202) too is not specifically a Linux OS
> > component, but it's relationship to Linux is stronger, and the main use
> of
> > SQL engines is together with a web server and a dinamic http content
> > generator language like PHP; why then not putting PHP too into the
> basket?
> > Well, because LPI is an OS certification, not a webmaster certification.
>
> In my view, when considering any revision of LPI objectives for
> 2018-2019, we need to be asking ourselves this question ...
>
> "What is the sysadmin of the 2020s doing day-in, day-out?"
>
> E.g., and this is purposely a bit argumentative, but I'll make it as a
> good example ...
>
> In the 2020s, is there really such a concept of a "webmaster" any more?
>
> We're looking at an entire merger of many technologies, from Java and
> Application Stacks, including vertically packaged applications in
> things like Containers, to the end-game of full DevOps in total
> deployment and life cycle.
>
> E.g., an argument in favor of removing things like SQL would be ...
>
> "A sysadmin needs to learn more about application services than
> database services, in 2020."
>
> And more 'gray" would be ...
>
> "A sysadmin needs to learn more about supporting language and database
> bindings and clients, than any language or database synatx."
>
> If you're seeing a repeat theme here, it's the change we're in the
> middle of.  The definitions of technologies themselves, in what
> sysadmins do and use, have changed in just a decade.
>
> It's no longer about just SQL or PHP or other things.  It's about
> provisioning and deployment, scalability and sizing, platform life
> cycle tied in with application life cycle, etc...  The traditional
> sysadmin has changed more in just the past 5 years than in 25 years
> prior.
>
> So maybe it starts by stepping back and saying, "After user-level and
> OS-level, generic POSIX (UNIX/Linux) concepts, we're only going to
> cover provisioning and deployment, but nothing beyond."  After that,
> we can start to look at how everything is changing.
>
> E.g., at some point one has to start considering if Docker and
> Kubernetes, even basic version control like Git and related support,
> is as essential as, say, APT-DPKG and DNF/YUM-RPM.
>
> Again ... in the 2020s.
>
> > Then also email servers (LPI-202), LDAP (LPI-202) and proxy servers
> > (LPI-202) are not Linux-specific, but they are more general tools than
> SQL
> > engines and are more strongly related to the OS: sendmail and mail
> > commands are almost as old tools as Unix, sendmail is a Unix
> > requirement too, LDAP can be selected as a user authentication backend,
> > perhaps proxy server are more like SQL: a useful tool indeed, but not
> > strongly related to Linux.
>
> Technical Nitpick:  LDAP isn't primarily used for authentication.
>
> Deeper Discussion ...
>
> LDAP authentication is usually the far less used implementation, as
> it's just centralized hashes.  Kerberos or another, GSSAPI compatible
> solution is preferred, if not integrated (e.g., IPA aka Enterprise
> IdM), for authentication (and even authorization / Roles).
>
> It's actually LDAP's centralized, network-wide authority of POSIX
> (UNIX/Linux) attributes (typically IETF RFC2307) that is its primary
> purpose.
>
> I.e.., You're going to find a lot of sysadmins who have worked in an
> enterprise environment that always setup systems to use some sort of
> centralized, network-wide authority via LDAP -- a means to have
> network wide-defined objects in a tree (or set of trees) that is the
> authority.
>
> Under some security standards (Financial, US Federal, etc...), it is a
> security finding not to have a network-wide, authoritative,
> centralized object store, instead of locally defined and/or
> enumerated.
>
> E.g., Common Security Finding ...
>
> A locally enumerated UID/GID from, say, AD SIDs with Winbind (or SSSD
> in a similar most), a lot of the 'free' tools (e.g., Centrify, Quest,
> et al.), etc... is a security finding.  There is a requirement that
> those UIDs/GIDs, along with homedir, shell and other POSIX
> (UNIX/Linux) attributes (e.g., IETF RFC2307) -- which cannot be
> enumerated locally -- be defined and standardized in a centralized
> repository.
>
> Hence the common use of LDAP, whether ...
>  - AD w/Identity Management for UNIX (IDMU) -- thru 2012R2+ **
>  - LDAP:  OpenLDAP, 389 (aka RHDS), et al.
>     or ...
>  - IPA (aka Enterprise IdM), although the services hasn't been well
> ported (because most other platforms than Fedora-based are still
> integrating the 389 stack, having ignored it for the past decade and
> sticking with OpenLDAP)
>
> Common Industry Standard:  All other LInux and UNIX tests I've ever
> take include a basic configuration of some tool that sets up NSS, PAM,
> etc... so they can reference network objects via LDAP.
>
> E.g., under Linux, replacing many of the legacy (and poorly
> maintained) PAM and other components, the System Security Services
> Daemon (SSSD) is a modular system of different providers for different
> facilities (e.g., NSS, PAM, etc...), and is considered the equivalent
> to Windows' Local Security Authority (LSA) and its modules equivalent
> Security Service Providers (SSPs).
>
> NOTE:  A common misconception is that SSSD requires IPA.  IPA requires
> SSSD, but SSSD functions without IPA, and can connect to many things.
> E.g., one of SSSD's first components was to support connecting to and
> reading AD-IDMU's POSIX (UNIX/Linux) attributes (IETF RFC2307 support
> in AD).
>
> **AD-IDMU has been deprecated in 2012R2 and removed in 2016.  The main
> reason was because Microsoft found only 1-2% of Windows admins were
> populating those POSIX attributes.  Microsoft now recommends either
> buying a proprietary connector (w/typically costly, CALs), or
> implementing [open source] IPA with its AD-Forest Trust model (keeping
> schema separate -- just like an External AD Forest), for AD
> exchange/support.
>
> > Maybe SQL too should be moved to LPI-202?
>
> It really all depends what people define as "sysadmin" for the 2020s.
>
> I have my views, but I won't share them.  I'd rather point out the
> change in the "sysadmin" role over the past 5 years, as well as other
> things (e.g., LDAP usage), and let others decide.
>
>
> --
> Bryan J Smith  -  http://www.linkedin.com/in/bjsmith
> E-mail:  b.j.smith at ieee.org  or  me at bjsmith.me
> _______________________________________________
> lpi-examdev mailing list
> [email protected]
> http://list.lpi.org/cgi-bin/mailman/listinfo/lpi-examdev
>


I think that there are still certain tasks of DB's to be considered. For
example:
- Dump
- Set and reset Password users
- LOAD DATA

On both posgresql and mariadb/mysql...

-- 
--
Sergio Belkin
LPIC-2 Certified - http://www.lpi.org
_______________________________________________
lpi-examdev mailing list
[email protected]
http://list.lpi.org/cgi-bin/mailman/listinfo/lpi-examdev

Reply via email to