mirror of
https://github.com/valitydev/salt.git
synced 2024-11-07 00:55:19 +00:00
added link to grains security FAQ to targeting and pillar topics.
This commit is contained in:
parent
efede904a7
commit
2870af2ba3
@ -295,7 +295,7 @@ https://github.com/saltstack-formulas/salt-formula
|
||||
.. _faq-grain-security:
|
||||
|
||||
Is Targeting using Grain Data Secure?
|
||||
=====================================
|
||||
-------------------------------------
|
||||
|
||||
Because grains can be set by users that have access to the minion configuration
|
||||
files on the local system, grains are considered less secure than other
|
||||
|
@ -85,6 +85,10 @@ by their ``os`` grain:
|
||||
|
||||
company: Foo Industries
|
||||
|
||||
.. important::
|
||||
See :ref:`Is Targeting using Grain Data Secure? <faq-grain-security>` for
|
||||
important security information.
|
||||
|
||||
The above pillar sets two key/value pairs. If a minion is running RedHat, then
|
||||
the ``apache`` key is set to ``httpd`` and the ``git`` key is set to the value
|
||||
of ``git``. If the minion is running Debian, those values are changed to
|
||||
|
@ -22,6 +22,10 @@ to a custom grain, grain data is refreshed.
|
||||
Grains resolve to lowercase letters. For example, ``FOO``, and ``foo``
|
||||
target the same grain.
|
||||
|
||||
.. important::
|
||||
See :ref:`Is Targeting using Grain Data Secure? <faq-grain-security>` for
|
||||
important security information.
|
||||
|
||||
Match all CentOS minions:
|
||||
|
||||
.. code-block:: bash
|
||||
|
Loading…
Reference in New Issue
Block a user