Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Puppet 4 Essentials, Second Edition

You're reading from   Puppet 4 Essentials, Second Edition Acquire skills to manage your IT infrastructure effectively with Puppet

Arrow left icon
Product type Paperback
Published in Dec 2015
Publisher
ISBN-13 9781785881107
Length 246 pages
Edition 2nd Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Felix Frank Felix Frank
Author Profile Icon Felix Frank
Felix Frank
Martin Alfke Martin Alfke
Author Profile Icon Martin Alfke
Martin Alfke
Arrow right icon
View More author details
Toc

Table of Contents (10) Chapters Close

Preface 1. Writing Your First Manifests FREE CHAPTER 2. The Master and Its Agents 3. A Peek under the Hood – Facts, Types, and Providers 4. Modularizing Manifests with Classes and Defined Types 5. Extending Your Puppet Infrastructure with Modules 6. Leveraging the Full Toolset of the Language 7. New Features from Puppet 4 8. Separating Data from Code Using Hiera Index

The Puppet Master

Many Puppet-based workflows are centered on the master, which is the central source of configuration data and authority. The master hands instructions to all the computer systems in the infrastructure (where agents are installed). It serves multiple purposes in the distributed system of Puppet components.

The master will perform the following tasks:

  • Storing and compiling manifests
  • Serving as the SSL certification authority
  • Processing reports from the agent machines
  • Gathering and storing information about the agents

As such, the security of your master machine is paramount. The requirements for hardening are comparable to those of a Kerberos Key Distribution Center.

During its first initialization, the Puppet master generates the CA certificate. This self-signed certificate will be distributed among and trusted by all the components of your infrastructure. This is why its private key must be protected very carefully. New agent machines request individual certificates, which are...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image