Skip to content

An opinionated control repository and steps for setting it up in PE

License

Notifications You must be signed in to change notification settings

joelschoenberg/control-repo

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Table of contents

Join the #ramp-up channel on Puppet Community Slack

Our Puppet Community Slack is a great way to interact with other Puppet users. The #ramp-up channel is specifically for users who are new to Puppet Enterprise and using this repository. Other channels in the Puppet Community Slack are great for asking general Puppet questions.

Before starting

This control-repo and the steps below are intended to be used with a new installation of PE 2016.1.z.

Warning: When using an existing PE installation any existing code or modules in /etc/puppetlabs/code will be copied to a backup directory /etc/puppetlabs/code_bak_<timestamp> in order to allow deploying code from Code Manager.

What you get from this control-repo

When you finish the instructions below, you will have the beginning of a best practices installation of PE including:

  • A Git server
  • The ability to push code to your Git server and have it automatically deployed to your PE master
  • A config_version script that outputs the most recent SHA of your code each time you run puppet agent -t
  • Optimal tuning of PE settings for this configuration
  • Working and example roles and profiles code

How to set it all up

Copy this repo into your own Git server

GitLab

  1. On a new server, install GitLab.
  1. After GitLab is installed, sign into the web UI with the user root.
  • The first time you visit the UI it will force you to enter a password for the root user.
  1. In the GitLab UI, create a group called puppet.
  1. In the GitLab UI, make yourself a user to edit and push code.

  2. From your laptop or development machine, make an SSH key and link it with your GitLab user.

  1. In the GitLab UI, add your user to the puppet group.
  1. In the GitLab UI, create a project called control-repo and set its Namespace to the puppet group.

  2. On your laptop, clone this PuppetLabs-RampUpProgram control repo.

  • git clone https://github.com/PuppetLabs-RampUpProgram/control-repo.git
  • cd control-repo
  1. On your laptop, remove the origin remote.
  • git remote remove origin
  1. On your laptop, add your GitLab repo as the origin remote.
  • git remote add origin <SSH URL of your GitLab repo>
  1. On your laptop, push the production branch of the repo from your machine up to your Git server.
  • git push origin production

Stash

Coming soon!

GitHub

Coming soon!

Configure PE to use the control-repo

Install PE

  1. Download the latest version of the PE installer for your platform
  1. SSH into your Puppet master and copy the installer tarball into /tmp
  2. Expand the tarball and cd into the directory
  3. Run puppet-enterprise-installer to install

If you run into any issues or have more questions about the installer you can see our docs here:

http://docs.puppetlabs.com/pe/latest/install_basic.html

Get the control-repo deployed on your master

At this point you have our control-repo code deployed into your Git server. However, we have one final challenge: getting that code onto your Puppet master. In the end state the master will pull code from the Git server via Code Manager, however, at this moment your Puppet master does not have credentials to get code from the Git server.

We will set up a deploy key in the Git server that will allow an SSH key we make to deploy the code and configure everything else.

  1. On your Puppet master, make an SSH key for r10k to connect to GitLab
mkdir /etc/puppetlabs/puppetserver/ssh
/usr/bin/ssh-keygen -t rsa -b 2048 -C 'code_manager' -f /etc/puppetlabs/puppetserver/ssh/id-control_repo.rsa -q -N ''
cat /etc/puppetlabs/puppetserver/ssh/id-control_repo.rsa.pub
  1. In the GitLab UI, create a deploy key on the control-repo project
  • Paste in the public key from above
  1. Login to the PE console
  2. Navigate to the Nodes > Classification page
  • Click on the PE Master group
  • Click the Classes tab
  • Add the puppet_enterprise::profile::master
    • Set the r10k_remote to the SSH URL from the front page of your GitLab repo
    • Set the r10k_private_key parameter to /etc/puppetlabs/puppetserver/ssh/id-control_repo.rsa
  • Commit your changes
  1. On your Puppet master
  • Run:

    puppet agent -t
    r10k deploy environment -pv
    puppet agent -t
    
  1. Navigate back to the Nodes > Classification page
  • Near the top of the page select "add a group"
  • Type role::all_in_one_pe for the group name
    • Click the Add Group button
  • Click the add membership rules, classes and variables link that appears
    • Below Pin specific nodes to the group type your master's FQDN into the box
      • Click pin node
  • Select the Classes tab
    • On the right hand side, click the Refresh link
      • Wait for this to complete
    • In the add new classes box type role::all_in_one_pe
      • Click add class
  • Commit your changes
  1. On your Puppet master
  • Run:

    puppet agent -t
    echo 'code_manager_mv_old_code=true' > /opt/puppetlabs/facter/facts.d/code_manager_mv_old_code.txt
    puppet agent -t
    
  1. Code Manager is configured and has been used to deploy your code

Setup a webhook in your Git server

Independent of which Git server you choose you will grab the webhook URL from your master. Then each Git Server will have similar but slightly different ways to add the webhook.

  1. On your Puppet master
  • cat /etc/puppetlabs/puppetserver/.puppetlabs/webhook_url.txt

Gitlab

  1. In your Git server's UI, navigate to the control-repo repository
  • In the left hand pane, scroll to the bottom and select settings
  • In the left hand pane, select webhooks
  1. Paste the above webhook URL into the URL field
  2. In the trigger section mark the checkbox for push events only
  3. Disable SSL verification on the webhook
  • Since Code Manager uses a self-signed cert from the Puppet CA it is not generally trusted
  1. After you created the webhook use "test webhook" or similar functionality to confirm it works

Test Code Manager

One of the components setup by this control-repo is that when you "push" code to your Git server, the git server will inform the Puppet master to deploy the branch you just pushed.

  1. On your Puppet Master, tail -f /var/log/puppetlabs/puppetserver/puppetserver.log.
  2. On your laptop in a separate terminal window:
  • Add a new file

    touch test_file
    git add test_file
    git commit -m "adding a test_file"
    git push origin production
    
  1. Allow the push to complete and then wait a few seconds for everything to sync over.
  • On your Puppet Master, ls -l /etc/puppetlabs/code/environments/production.
    • Confirm test_file is present
  1. In your first terminal window review the puppetserver.log to see the type of logging each sync will create.

About

An opinionated control repository and steps for setting it up in PE

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Ruby 45.3%
  • Puppet 36.4%
  • Pascal 9.4%
  • Shell 8.9%