Wha?
Am I missing a configuration option in the manual to somehow disable SSL certificate validation? Does everybody add a cron job to their puppet master to stop the puppetmaster daemon and blow away its SSL directory then restart it at exactly 12:00AM every day, and the same on the instances at exactly 12:02AM every day? Or are we the only people on the planet who actually use Amazon's auto-scaling feature *plus* use Puppet at the same time? Curious penguins are... curious!
This actually sounds like a useful tool. Is this something you're (or
would) consider releasing as OSS for others to make use of?
I've put my autosign script up on a GitHub gist and at least one other
has considered it useful so I've included a header releasing it under
Apache 2.0 license.
--
You received this message because you are subscribed to a topic in the Google Groups "Puppet Users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/puppet-users/m_fffsKR9aM/unsubscribe.
To unsubscribe from this group and all its topics, send an email to puppet-users+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/85960579c1c0eab21f9068aa33299130%40undergrid.net.
For more options, visit https://groups.google.com/d/optout.
Can you somehow get list of active nodes from balancer? You could use
that list in a daily cron to do a 'puppet cert clean' and remove all
other certificates?
--
You received this message because you are subscribed to the Google Groups "Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to puppet-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/80ef1916-4434-4405-a357-62345d111618%40googlegroups.com.
hey,
if you dont use cross aws/datacenter and only aws i would recommend to use use ops-works.. its chef based but for aws only its quite nice
--
You received this message because you are subscribed to the Google Groups "Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to puppet-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/a43e189b-61c0-498c-b687-56d216c375aa%40googlegroups.com.
Am I missing a configuration option in the manual to somehow disable SSL certificate validation? Does everybody add a cron job to their puppet master to stop the puppetmaster daemon and blow away its SSL directory then restart it at exactly 12:00AM every day, and the same on the instances at exactly 12:02AM every day? Or are we the only people on the planet who actually use Amazon's auto-scaling feature *plus* use Puppet at the same time? Curious penguins are... curious!We have enabled the Amazon SNS notifications from Autoscaling, and subscribed a SQS queue to the SNS topic. We have a written a small daemon, which runs on the puppet master and consumes from that queue, and calls "puppet cert clean" when it receives messages about instances being terminated by autoscaling.
We also have it listen for instance launch messages and add their certnames into /etc/puppet/autosign.conf and call "puppet cert sign" on them, which is also useful for security (you don't have to turn on auto signing for everything that way).
--
You received this message because you are subscribed to a topic in the Google Groups "Puppet Users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/puppet-users/m_fffsKR9aM/unsubscribe.
To unsubscribe from this group and all its topics, send an email to puppet-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/45c97a85-6783-4239-b04d-bf7b378bfa2c%40googlegroups.com.
I use a different approach to clean up certificates and the node on the puppet dashboard, but it is a ugly hack. I'm writing something in python to read the autoscaling termination message posted to SNS->SQS and I should have something up tonight. I will share here and get feedback, I'm planning to replace my ugly hack by this python script.
On Wed, May 28, 2014 at 3:05 AM, Hugh Cole-Baker <hu...@fanduel.com> wrote:
Here is the code that we use to pull Auto Scaling messages off an SQS queue and add/remove the respective nodes to autosign.conf and sign or clean up their certificates.It's copied and pasted out of a larger application that handles various events from Auto Scaling and applies changes to other systems than Puppet, so some parts may be missing, but it should be understandable... It assumes that all the instance hostnames will be <AS group name>-<hex digits from instance ID> and the domain appended will be based on the AWS region like 'east.internal'. You'd have to change the code in message.py to alter that behaviour.
--
You received this message because you are subscribed to a topic in the Google Groups "Puppet Users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/puppet-users/m_fffsKR9aM/unsubscribe.
To unsubscribe from this group and all its topics, send an email to puppet-users+unsubscribe@googlegroups.com.
I think, you need to use master less configuration, it is more robust solution and more suitable for autoscaling env. Just keep puppet and puppet modules on ami or check out on first boot.
On Saturday, May 24, 2014 8:54:04 AM UTC+3, Bad Tux wrote:
Wha?
Uhm, okay. So I need to solve this problem so that my new instances can get deployed. Only thing I can think of is to trash the ssl directories on both the puppet master and all of the clients, and then run puppet again. Note that all the instances and puppet are in a "puppet" network security group that was created by CloudFormation, and instances not part of the "puppet" security group cannot connect to the puppet master, so we *know* that we're talking to the puppet master, and the puppet master *knows* we're actual hosts that can talk to it, and besides all of these instances are inside a virtual private cloud that is inaccessible to the wider Internet except via port 8080 between the load balancer and the application instances (again enforced by the security groups mechanism) so there's no way an outsider could talk to the puppet server anyhow, but... puppet insists on validating these SSL certificates before letting the instances talk to it. Even though that's a totally useless exercise given that Amazon's enforcing the ACL's at the virtual network (firewall) layer to prevent anybody unauthorized from getting anywhere near that puppet port or puppet IP address.Am I missing a configuration option in the manual to somehow disable SSL certificate validation? Does everybody add a cron job to their puppet master to stop the puppetmaster daemon and blow away its SSL directory then restart it at exactly 12:00AM every day, and the same on the instances at exactly 12:02AM every day? Or are we the only people on the planet who actually use Amazon's auto-scaling feature *plus* use Puppet at the same time? Curious penguins are... curious!
--
You received this message because you are subscribed to the Google Groups "Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to puppet-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/2daac4c2-18c8-4b90-b144-01524acf200c%40googlegroups.com.