Book Image

Puppet Essentials

By : Felix Frank
Book Image

Puppet Essentials

By: Felix Frank

Overview of this book

<p>With this book, you'll be up and running with using Puppet to manage your IT systems. Dive right in with basic commands so that you can use Puppet right away, and then blitz through a series of illustrative examples to get to grips with all the most important aspects and features of Puppet.</p> <p>Install Puppet, write your first manifests, and then immediately put the Puppet tools to real work. Puppet Essentials reveals the innovative structure and approach of Puppet through step-by-step instructions to follow powerful use cases. Learn common troubleshooting techniques and the master/agent setup as well as the building blocks for advanced functions and topics that push Puppet to the limit, including classes and defined types, modules, resources, and leveraging the flexibility and expressive power implemented by Facter and the Hiera toolchain. Finally, send Puppet to the skies with practical guidance on how to use Puppet to manage a whole application cloud.</p>
Table of Contents (16 chapters)
Puppet Essentials
Credits
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Index

The Puppet master


Many Puppet-based workflows are centered around the master, which is a central source of configuration data and authority. The master hands instructions to all computer systems in the infrastructure (where agents are installed). It serves multiple purposes in the distributed system of Puppet components.

The master will perform the following tasks:

  • Storing and compiling manifests

  • Serving as the SSL certification authority

  • Processing reports from the agent machines

  • Gathering and storing information about the agents

As such, the security of your master machine is paramount, which is not unlike a Kerberos Key Distribution Center.

During its first initialization, the Puppet master generates the CA certificate. This self-signed certificate will be distributed among and trusted by all pieces of your infrastructure. This is why its private key must be protected very carefully. New agent machines request individual certificates, which are signed with the CA certificate.

Tip

It's a good idea...