Software to automate the management and configuration of any infrastructure or application at scale. Get access to the Salt software package repository here:
Go to file
2012-12-31 11:45:31 +01:00
conf Add fileserver_backend option to default config 2012-12-27 14:21:56 -07:00
debian version update 2012-12-19 23:28:57 -08:00
doc Remove sentence from development virtualenv docs 2012-12-27 23:32:48 -06:00
pkg updated to 0.11.1 for security vulnerability fix 2012-12-20 10:24:41 -07:00
salt win_status: minor cleanup (for Pull Request #3080) 2012-12-31 11:45:31 +01:00
scripts Add freeze_support on salt-minion script 2012-09-10 14:13:02 -05:00
tests Merge pull request #3071 from s0undt3ch/hotfix/pylint/C0103 2012-12-30 20:22:42 -08:00
.gitignore ignore 'tmp' directory created by integration test 2012-07-01 03:46:43 +05:30
.pylintrc Merge branch 'develop' of github.com:saltstack/salt into hotfix/pylint/C0103 2012-12-30 15:58:16 +00:00
.travis.yml Fix stateconf test failing in 2.6 because OrderedDict was not available. 2012-11-16 22:45:12 +00:00
AUTHORS adding myself to authors file 2012-12-17 18:11:23 +01:00
HACKING.rst Update HACKING.rst instructions for running the tests 2012-10-17 11:48:41 -04:00
LICENSE Change from British LICENCE to American LICENSE spelling to match spelling in LICENSE file and packaging files 2011-07-27 18:09:56 -06:00
MANIFEST.in Gather everything under the tests 2012-10-24 20:59:33 -06:00
README.rst updated readme file for typos and clarity 2012-10-24 11:25:23 -07:00
requirements.txt Removed the comment in requirements.txt to get fpm to work 2012-12-04 15:48:52 +01:00
setup.py Only change to setup.py if not already there. 2012-12-30 18:03:02 +00:00
tox.ini - tox boilerplate for when py3k matters 2012-05-30 16:07:12 -06:00

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

=============
What is Salt?
=============

.. image:: https://secure.travis-ci.org/saltstack/salt.png?branch=develop
   :target: http://travis-ci.org/saltstack/salt

.. rubric:: Were not just talking about NaCl.

Distributed Remote Execution
============================

Salt is a distributed remote execution system used to execute commands and
query data. It was developed in order to bring the best solutions found in the
world of remote execution together and make them better, faster and more
malleable. Salt accomplishes this via its ability to handle larger loads of
information, and not just dozens, but hundreds, or even thousands of individual
servers. It handles them quickly and through a simple yet manageable interface.

Simplicity
==========

Versatility between massive scale deployments and smaller systems may seem
daunting, but Salt is very simple to set up and maintain, regardless of the
size of the project. The architecture of Salt is designed to work with any
number of servers, from a handful of local network systems to international
deployments across disparate datacenters. The topology is a simple
server/client model with the needed functionality built into a single set of
daemons. While the default configuration will work with little to no
modification, Salt can be fine-tuned to meet specific needs.

Granular Controls
=================

Salt also introduces powerful granular controls to the realm of remote execution. 
By default, commands are executed in parallel. However, using more advanced 
options, commands can be executed in batch groups or even in serial. By using 
simple built-in filters or regular expression matching, systems can be targeted by 
hostname, metadata or system properties such as number of cpus or OS type.

Building on Proven Technology
=============================

Salt takes advantage of a number of technologies and techniques. The networking
layer is built with the excellent `ZeroMQ`_ networking library. Salt itself
contains a viable, and transparent, ZeroMQ broker inside the daemon. Salt uses
public keys for authentication with the master daemon, then uses faster AES
encryption for payload communication. This means that authentication and
encryption are also built into Salt. Salt takes advantage of communication via
the most excellent `msgpack`_ library, enabling fast and light network traffic.

.. _`ZeroMQ`: http://www.zeromq.org/

.. _`msgpack`: http://msgpack.org/


Python Client Interface
=======================

Salt execution routines can be written as plain Python modules and the data
collected from execution can be sent back to the master server, or any
arbitrary program. Salt can be called from a simple Python API, or from the
command line. This makes it easy to execute one-off commands as well as
operate as an integral part of a larger application.


Fast, Flexible, Scalable, Secure
================================

The result is a system that can execute commands across groups of
varying size, from very few to very many servers at considerably high
speed. We consider speed to be a feature, not an afterthought. Salts
unique architecture brings together the best of the remote execution
world, amplifies its capabilities and expands its range, resulting in
this system that is as versatile as it is practical. Last but not least,
security is an intrinsic part of Salt and something not just
influencing how source code is written and how tests are done, but
also something that defines the overall architecture and has heavy
influence on the core design tenets.

Open
====

Salt is developed under the `Apache 2.0 license`_, and can be used for
open and proprietary projects. Please submit your expansions back to
the Salt project so that we can all benefit together as Salt grows.
Finally, please sprinkle some Salt around your systems and let the
deliciousness come forth.

.. _`Apache 2.0 license`: http://www.apache.org/licenses/LICENSE-2.0.html