Book Image

Extending SaltStack

Book Image

Extending SaltStack

Overview of this book

Salt already ships with a very powerful set of tools, but that doesn't mean that they all suit your needs perfectly. By adding your own modules and enhancing existing ones, you can bring the functionality that you need to increase your productivity. Extending SaltStack follows a tutorial-based approach to explain different types of modules, from fundamentals to complete and full-functioning modules. Starting with the Loader system that drives Salt, this book will guide you through the most common types of modules. First you will learn how to write execution modules. Then you will extend the configuration using the grain, pillar, and SDB modules. Next up will be state modules and then the renderers that can be used with them. This will be followed with returner and output modules, which increase your options to manage return data. After that, there will be modules for external file servers, clouds, beacons, and finally external authentication and wheel modules to manage the master. With this guide in hand, you will be prepared to create, troubleshoot, and manage the most common types of Salt modules and take your infrastructure to new heights!
Table of Contents (21 chapters)
Extending SaltStack
Credits
Foreword
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Using external authentication


In its default setup, users only communicate with Salt with one user: usually either root or salt. Any user who has access to log in as that user will be able to issue Salt commands. This may be OK with smaller setups, but it does not scale well at all. Larger organizations will want each user to manage Salt with their own login, and be able to set access controls on a per-user basis. There are also other programs, including Salt API, which require the use of external authentication modules.

External authentication (or auth or eauth) modules allow individual users to have their own permissions to the various components of Salt. The simplest is probably the pam module, in part because other existing access control mechanisms can be configured inside PAM itself. Unfortunately, PAM is rarely used outside of Linux, so other modules are needed on other platforms.

Authenticating credentials

On the surface, an auth module doesn't need to do much. It only needs to accept...