Book Image

Learning Puppet Security

Book Image

Learning Puppet Security

Overview of this book

Table of Contents (17 chapters)
Learning Puppet Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Configuring hosts to report log data


Now that we've been through the work of Puppetizing the host infrastructure for Logstash, let's take a look at how to Puppetize the collection on our hosts. There are a large number of ways to do this that contain various tradeoffs on things such as local parsing and the size of the shipping solution.

For this exercise, we'll use Redis as a message queue. This is the recommended configuration if you wish to use a message queue based system, if you wish to use a message queue and do not have one installed. It has the downside of having added complexity due to needing Redis installed. However, our Redis installation in this example is quite simple using a community module.

This is a well-supported and tested configuration. There are other possible message queues one could use instead of Redis, so if your environment has one set up, by all means use that one.

The first step is to get Redis installed. There are a stack of community modules that can do this....