Well said and I agree. When I suggested to Taki some years ago to add some basic SQL stuff to LPI1 it was because I think of LPI1 as a junior systems management role. More than only OS but also some basic knowledge of day to day operations. Definitely not a DBA role, but being able to install an application, LAMP or otherwise, should be one iof his day to day duties.
Kind regards, Jeroen Baten Op 12-10-17 om 05:55 schreef Bryan Smith: > DISCLAIMER: _Any posts by myself on lpi-examdev are as a peer among > peers, and are only designed to provoke considerations, and should not > be taken as an endorsement or anything other than simple, individual, > professional consideration for further discussion._ > > Alessandro Selli wrote: >> Simone Piccardi wrote: >>> I propose the removal of topic 105.3: "SQL data management" because it >>> has nothing to do with Linux. >>> It's true that knowing about SQL basis is needed for a sysadmin, like >>> knowing about switching loops. For both I just don't think they are >>> topics for a Linux specific certification. >> >> I agree. The response I get from people attending LPIC-2 related classes >> is regularly of surprise if not amazement when SQL is introduced. >> It is true that Apache (LPI-202) too is not specifically a Linux OS >> component, but it's relationship to Linux is stronger, and the main use of >> SQL engines is together with a web server and a dinamic http content >> generator language like PHP; why then not putting PHP too into the basket? >> Well, because LPI is an OS certification, not a webmaster certification. > > In my view, when considering any revision of LPI objectives for > 2018-2019, we need to be asking ourselves this question ... > > "What is the sysadmin of the 2020s doing day-in, day-out?" > > E.g., and this is purposely a bit argumentative, but I'll make it as a > good example ... > > In the 2020s, is there really such a concept of a "webmaster" any more? > > We're looking at an entire merger of many technologies, from Java and > Application Stacks, including vertically packaged applications in > things like Containers, to the end-game of full DevOps in total > deployment and life cycle. > > E.g., an argument in favor of removing things like SQL would be ... > > "A sysadmin needs to learn more about application services than > database services, in 2020." > > And more 'gray" would be ... > > "A sysadmin needs to learn more about supporting language and database > bindings and clients, than any language or database synatx." > > If you're seeing a repeat theme here, it's the change we're in the > middle of. The definitions of technologies themselves, in what > sysadmins do and use, have changed in just a decade. > > It's no longer about just SQL or PHP or other things. It's about > provisioning and deployment, scalability and sizing, platform life > cycle tied in with application life cycle, etc... The traditional > sysadmin has changed more in just the past 5 years than in 25 years > prior. > > So maybe it starts by stepping back and saying, "After user-level and > OS-level, generic POSIX (UNIX/Linux) concepts, we're only going to > cover provisioning and deployment, but nothing beyond." After that, > we can start to look at how everything is changing. > > E.g., at some point one has to start considering if Docker and > Kubernetes, even basic version control like Git and related support, > is as essential as, say, APT-DPKG and DNF/YUM-RPM. > > Again ... in the 2020s. > >> Then also email servers (LPI-202), LDAP (LPI-202) and proxy servers >> (LPI-202) are not Linux-specific, but they are more general tools than SQL >> engines and are more strongly related to the OS: sendmail and mail >> commands are almost as old tools as Unix, sendmail is a Unix >> requirement too, LDAP can be selected as a user authentication backend, >> perhaps proxy server are more like SQL: a useful tool indeed, but not >> strongly related to Linux. > > Technical Nitpick: LDAP isn't primarily used for authentication. > > Deeper Discussion ... > > LDAP authentication is usually the far less used implementation, as > it's just centralized hashes. Kerberos or another, GSSAPI compatible > solution is preferred, if not integrated (e.g., IPA aka Enterprise > IdM), for authentication (and even authorization / Roles). > > It's actually LDAP's centralized, network-wide authority of POSIX > (UNIX/Linux) attributes (typically IETF RFC2307) that is its primary > purpose. > > I.e.., You're going to find a lot of sysadmins who have worked in an > enterprise environment that always setup systems to use some sort of > centralized, network-wide authority via LDAP -- a means to have > network wide-defined objects in a tree (or set of trees) that is the > authority. > > Under some security standards (Financial, US Federal, etc...), it is a > security finding not to have a network-wide, authoritative, > centralized object store, instead of locally defined and/or > enumerated. > > E.g., Common Security Finding ... > > A locally enumerated UID/GID from, say, AD SIDs with Winbind (or SSSD > in a similar most), a lot of the 'free' tools (e.g., Centrify, Quest, > et al.), etc... is a security finding. There is a requirement that > those UIDs/GIDs, along with homedir, shell and other POSIX > (UNIX/Linux) attributes (e.g., IETF RFC2307) -- which cannot be > enumerated locally -- be defined and standardized in a centralized > repository. > > Hence the common use of LDAP, whether ... > - AD w/Identity Management for UNIX (IDMU) -- thru 2012R2+ ** > - LDAP: OpenLDAP, 389 (aka RHDS), et al. > or ... > - IPA (aka Enterprise IdM), although the services hasn't been well > ported (because most other platforms than Fedora-based are still > integrating the 389 stack, having ignored it for the past decade and > sticking with OpenLDAP) > > Common Industry Standard: All other LInux and UNIX tests I've ever > take include a basic configuration of some tool that sets up NSS, PAM, > etc... so they can reference network objects via LDAP. > > E.g., under Linux, replacing many of the legacy (and poorly > maintained) PAM and other components, the System Security Services > Daemon (SSSD) is a modular system of different providers for different > facilities (e.g., NSS, PAM, etc...), and is considered the equivalent > to Windows' Local Security Authority (LSA) and its modules equivalent > Security Service Providers (SSPs). > > NOTE: A common misconception is that SSSD requires IPA. IPA requires > SSSD, but SSSD functions without IPA, and can connect to many things. > E.g., one of SSSD's first components was to support connecting to and > reading AD-IDMU's POSIX (UNIX/Linux) attributes (IETF RFC2307 support > in AD). > > **AD-IDMU has been deprecated in 2012R2 and removed in 2016. The main > reason was because Microsoft found only 1-2% of Windows admins were > populating those POSIX attributes. Microsoft now recommends either > buying a proprietary connector (w/typically costly, CALs), or > implementing [open source] IPA with its AD-Forest Trust model (keeping > schema separate -- just like an External AD Forest), for AD > exchange/support. > >> Maybe SQL too should be moved to LPI-202? > > It really all depends what people define as "sysadmin" for the 2020s. > > I have my views, but I won't share them. I'd rather point out the > change in the "sysadmin" role over the past 5 years, as well as other > things (e.g., LDAP usage), and let others decide. > > > -- > Bryan J Smith - http://www.linkedin.com/in/bjsmith > E-mail: b.j.smith at ieee.org or me at bjsmith.me > _______________________________________________ > lpi-examdev mailing list > lpi-examdev@lpi.org > http://list.lpi.org/cgi-bin/mailman/listinfo/lpi-examdev > -- Jeroen Baten | EMAIL : jba...@i2rs.nl ____ _ __ | web : www.i2rs.nl | )|_)(_ | tel : +31 (0)345 - 75 26 28 _|_/_| \__) | Molenwindsingel 46, 4105 HK, Culemborg, the Netherlands _______________________________________________ lpi-examdev mailing list lpi-examdev@lpi.org http://list.lpi.org/cgi-bin/mailman/listinfo/lpi-examdev