Run a container-based deployment of Puppet Infrastructure.
To get started, you will need an installation of Docker Compose on the host on which you will run your Puppet Infrastructure.
Once you have Docker Compose installed, you can start the stack with
DNS_ALT_NAMES=puppet,host.exmple.com docker-compose up -d
The value of DNS_ALT_NAMES
must list all the names, as a comma-separated
list, under which the Puppet server in the stack can be reached from
agents. It must include puppet
as that is used by PuppetDB to communicate
with the Puppet server. The value of DNS_ALT_NAMES
only has an effect the
first time you start the stack, as it is placed into the server's SSL
certificate. If you need to change it after that, you will need to properly
revoke the server's certificate and restart the stack with the changed
DNS_ALT_NAMES
value.
When you first start the Puppet Infrastructure, the stack will create a
volumes/
directory with a number of sub-directories to store the
persistent data that should survive the restart of your infrastructure. This
directory is created right next to the Docker Compose file and contains the
following sub-directories:
code/
: the Puppet code directory.puppet/
: Puppet configuration files, includingpuppet/ssl/
containing certificates for your infrastructure. This directory is populated with default configuration files if they are not present when the stack starts up. You can make configuration changes to your stack by editing files in this directory and restarting the stack.puppetdb/ssl/
: certificates in use by the PuppetDB instance in the stack.puppetdb-postgres/
: the data files for the PostgreSQL instance used by PuppetDBserverdata/
: persistent data for Puppet Server- Note: On OSX, you must add the
volumes
directory to "File Sharing" underPreferences>File Sharing
in order for these directories to be created and volume-mounted automatically. There is no need to add each sub directory.
Complete instructions for provisiong a server with LCOW support are in README-windows.md
Due to permissions issues with Postgres on Docker for Windows, an external volume and a slightly different configuration is required.
To create the stack:
PS> docker volume create --name puppetdb-postgres-volume -d local
puppetdb-postgres-volume
PS> $ENV:DNS_ALT_NAMES = 'puppet,host.exmple.com'
PS> docker-compose -f .\docker-compose.yml -f .\docker-compose.windows.yml up
Creating pupperware_postgres_1 ... done
Creating pupperware_puppet_1 ... done
Creating pupperware_puppetdb_1 ... done
Attaching to pupperware_postgres_1, pupperware_puppet_1, pupperware_puppetdb_1
postgres_1 | The files belonging to this database system will be owned by user "postgres".
postgres_1 | This user must also own the server process.
postgres_1 |
...
To delete the stack:
PS> docker-compose down
Removing network pupperware_default
...
PS> docker volume rm puppetdb-postgres-volume
puppetdb-postgres-volume
The script bin/puppet
(or bin\puppet.ps1
on Windows) makes it easy to run puppet
commands on the
puppet master. For example, ./bin/puppet config print autosign --section master
prints the current setting for autosigning, which is true
by
default. In a similar manner, any other task that you would perform on a
puppet master by running puppet x y z ...
can be achieved against the
stack by running ./bin/puppet x y z ...
.
The postgresql instance uses password authentication for communication with the puppetdb instance. If you need to change the postgresql password, you'll need to do the following:
- update the password in postgresql:
docker-compose exec postgres /bin/bash -c "psql -U \$POSTGRES_USER -c \"ALTER USER \$POSTGRES_USER PASSWORD '$dbpassword'\";"
- update values for
PUPPETDB_PASSWORD
andPOSTGRES_PASSWORD
in docker-compose.yml - rebuild and restart containers affected by these changes:
docker-compose up --detach --build
This repo contains some simple tests that can be run with RSpec. To run these tests you need to have Ruby, Docker, and Docker Compose installed on the machine where you're running the tests. The tests depend on the 'rspec' and 'json' rubygems. The tests are known to run on at least ruby 1.9.3-p551 and as new as ruby 2.4.3p205.
NOTE These tests will start and stop the cluster running from the current checkout of Pupperware, so be careful where you run them from.
To run the tests:
bundle install --with test
bundle exec rspec spec
This repo contains some simple tests that can be run with bolt To run the tests you need to set a few things up first:
- Install
bolt
on your workstation - Create two CentOS 7 virtual machines. In your
.ssh/config
, alias one asdocker
and the other asagent1
by adding the following and adjusting the IP addresses given asHostName
:
Host docker
HostName IP1
ForwardAgent yes
User centos
Host agent1
HostName IP2
User centos
- Log into both
docker
andagent1
withssh
at least once to make sure you can access them and to add them to your known hosts file - Run
bolt plan run --tty stack::install
. This will install Docker Compose ondocker
, and the Puppet agent onagent1
Once the setup is completed, run the tests with bolt plan run --tty stack::test
.
The containers used in pupperware are generated based on dockerfiles in the repos for puppetserver and puppetdb. Published containers can be found on dockerhub.
See LICENSE file.
Please open tickets for any issues in the Puppet JIRA with the component set to 'Container'.
If you have questions or comments about pupperware, feel free to send a message to the puppet-users mailing list or reach out in the #puppet channel in the puppet community slack.