<div dir="ltr">Count me in for a meetup. <div><br></div><div>We're doing some things with Satellite 6 and Puppet/hiera/r10k that may be interesting. I've been spending some time rewriting modules into the roles/profiles pattern as well.</div><div><br></div><div>Matt</div></div><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Jun 11, 2015 at 10:36 PM, Scott Merrill <span dir="ltr"><<a href="mailto:skippy@skippy.net" target="_blank">skippy@skippy.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">><br>
> I don't necessarily mind that they depend on a forge-based module. stdlib and concat are already dependencies required for some forge-based modules I'm using. To that end, I've separated the forge-based modules to /etc/puppet/modules and the home-grown modules to /var/lib/puppet/modules. The thinking is that the modules in /etc/puppet/modules should not be touched, while the ones in /var/lib/puppet/modules are expected to be changed, updated, etc.<br>
<br>
</span>That’s a very interesting approach to module management. I like it, and I suspect it will work very well for you as you get more and more Puppet experience; but I think you’ll eventually hit a wall in terms of module management.<br>
<br>
The tool we use is Librarian Puppet: <a href="http://librarian-puppet.com/" rel="noreferrer" target="_blank">http://librarian-puppet.com/</a> This is basically like Ruby’s “bundler” command for Puppet modules. It allows you to define a single file that enumerates all of your Puppet modules. You can reference Puppet Forge modules, GitHub.com modules, and even internal-only git URLs for your home-grown not-for-public-consumption stuff.<br>
<br>
Librarian Puppet is not without its warts, but I think it’s the best solution available right now.<br>
<br>
Another technology to look at is r10k: <a href="http://docs.puppetlabs.com/pe/latest/r10k.html" rel="noreferrer" target="_blank">http://docs.puppetlabs.com/pe/latest/r10k.html</a> We’re not using this currently, but it’ s something that Puppet Labs is working on energetically. It solves a different problem than Librarian Puppet, but it uses Librarian Puppet to do its work.<br>
<span class=""><br>
>> (The role/profile/tech pattern of Puppet modules is one attempt to provide guidance around how and when modules can reach outside of their own boundaries. If you’re not yet familiar with this pattern, do check it out. A “myapp” profile might be justified to handle bridging both the “myapp” tech module and the sudo module.)<br>
><br>
> I'll have to look into this, thanks.<br>
><br>
<br>
</span>It all started here: <a href="http://www.craigdunn.org/2012/05/239/" rel="noreferrer" target="_blank">http://www.craigdunn.org/2012/05/239/</a><br>
<br>
Additional useful links:<br>
<a href="http://sysadvent.blogspot.com/2012/12/day-13-configuration-management-as-legos.html" rel="noreferrer" target="_blank">http://sysadvent.blogspot.com/2012/12/day-13-configuration-management-as-legos.html</a><br>
<a href="http://garylarizza.com/blog/2014/02/17/puppet-workflow-part-1/" rel="noreferrer" target="_blank">http://garylarizza.com/blog/2014/02/17/puppet-workflow-part-1/</a><br>
<a href="http://garylarizza.com/blog/2014/02/17/puppet-workflow-part-2/" rel="noreferrer" target="_blank">http://garylarizza.com/blog/2014/02/17/puppet-workflow-part-2/</a><br>
<a href="http://puppetlunch.com/puppet/roles-and-profiles.html" rel="noreferrer" target="_blank">http://puppetlunch.com/puppet/roles-and-profiles.html</a><br>
<a href="https://puppetlabs.com/presentations/designing-puppet-rolesprofiles-pattern" rel="noreferrer" target="_blank">https://puppetlabs.com/presentations/designing-puppet-rolesprofiles-pattern</a><br>
<span class=""><br>
<br>
>><br>
>> Another option would be to make a design decision within your Puppet manifests that *all* sudo configurations will be handled via Hiera. This appears to be well supported by the saz module.<br>
>><br>
>> <a href="https://github.com/saz/puppet-sudo#using-hiera" rel="noreferrer" target="_blank">https://github.com/saz/puppet-sudo#using-hiera</a><br>
>><br>
>> This makes it consistent within your modules that Hiera is the sole source of truth for sudo. This can get a little more complicated, though, if you want specific rules enabled on some servers but not others. It’s possible, depending on your Hiera hierarchy configuration, but takes a lot of careful planning.<br>
><br>
> I've been thinking about that. I like the sole source of truth for sudo. I was inadvertently working that direction, and the heira configuration got messy really quickly. It also created that separation between the myapp module and the configuration that myapp requires to function properly. I'd like to keep those things within a single logical container if possible. In my heira config are a handful of "TODO: move this sudoers declaration to myappX module" to clean up the mess I made.<br>
><br>
> You're right about it being a design decision - something I need to ponder on a little more.<br>
<br>
</span>You’re often going to run into the “this thing belongs in module X, but it is defined in module Y” problem. Roles and profiles help with this somewhat, but you need to be pretty diligent.<br>
<br>
You also need to be open minded to the fact that the solution you choose today might not be the best solution in six months. The great thing about Puppet (and other config management tools) is that they *should* facilitate refactoring cleanly. You can re-jigger the Puppet implementation in various ways while ensuring that the on-server implementation doesn’t change at all.<br>
<br>
I’ve been thinking about starting a Puppet users Meetup. If there’s sufficient interest, please speak up and I’ll make it happen.<br>
<br>
Cheers,<br>
Scott<br>
<div class="HOEnZb"><div class="h5"><br>
<br>
<br>
_______________________________________________<br>
colug-432 mailing list<br>
<a href="mailto:colug-432@colug.net">colug-432@colug.net</a><br>
<a href="http://lists.colug.net/mailman/listinfo/colug-432" rel="noreferrer" target="_blank">http://lists.colug.net/mailman/listinfo/colug-432</a><br>
</div></div></blockquote></div><br></div>