On 10/24/14 12:01 PM, Tim Skirvin wrote:
> I've started investigating hiera-eyaml as a tool for managing
> secrets within our puppet repository. It looks pretty promising,
> especially in connection with 'show_diff => false'. For those that
> haven't seen it:
>
>
http://puppetlabs.com/blog/encrypt-your-data-using-hiera-eyaml
>
> That said, I'm not sure what its performance implications are, and
> how many decryption calls we can afford. Has anybody played with this
> enough to be able to know how how these decryption calls will affect
> performance problems?
>
> More concretely: I'm currently supporting ~1250 nodes with two
> fairly-hefty puppet servers, but we're not managing much in the way of
> secrets. If I were to, say, start managing the root password on all of
> our nodes using this tool, should I expect our entirely environment to
> melt down?
>
> - Tim Skirvin (
tski...@fnal.gov)
>
My experience is the same as Christopher's though our frontend servers
pull 50+ encrypted keys for everything from db credentials to third
party shared secrets per environment. I didn't notice a change when we
switched to eyaml, but I also coupled it with a upgrade to Ruby 1.9.3
from 1.8.7. Also we have only 150 nodes.
I'd say start slowly or on your stage master, but don't be surprised if
adding a few keys fails to impact performance.
Ramin