Skip to content

Latest commit

 

History

History
154 lines (97 loc) · 8.88 KB

README.md

File metadata and controls

154 lines (97 loc) · 8.88 KB

Puppet Enterprise (pe) Cloud Deployment Module (cdm)

Puppet Enterprise Cloud Deployment Module is a fusion of puppetlabs/peadm and Terraform.

This project was referred to as autope prior to October 15, 2021.

Table of Contents

  1. Description
  2. Setup - The basics of getting started with pecdm
  3. Usage - Configuration options and additional functionality
  4. Limitations - OS compatibility, etc.
  5. Development - Guide for contributing to the module

Description

The pecdm Bolt project demonstrates how you can link together automation tools to take advantage of their strengths, e.g. Terraform for infrastructure provisioning and Puppet for infrastructure configuration. We take puppetlabs/peadm and a Terraform module (GCP, AWS, Azure) to facilitate rapid and repeatable deployments of Puppet Enterprise built upon the Standard, Large or Extra Large architecture w/ optional fail over replica.

Expectations and support

The pecdm Bolt project is developed by Puppet's Solutions Architecture team, intended as an internal tool to make the deployment of disposable stacks of Puppet Enterprise easy to deploy for the reproduction of customer issues, internal development, and demonstrations. Independent use is not recommended for production environments but with a comprehensive understanding of how Puppet Enterprise, Puppet Bolt, and Terraform work, plus high levels of comfort with the modification and maintenance of Terraform code and the infrastructure requirements of a full Puppet Enterprise deployment it could be referenced as an example for building your own automated solution.

The pecdm Bolt project is an internal tool, and is NOT supported through Puppet Enterprise's standard or premium support.puppet.com service.

If you are a Puppet Enterprise customer and come upon this project and wish to provide feedback, submit a feature request, or bugfix then please do so through the Issues and Pull Request components of the GitHub project.

The project is under active development and yet to release an initial version. There is no guarantee yet on a stable interface from commit to commit and those commits may include breaking changes.

Setup

What pecdm affects

Types of things you'll be paying your cloud provider for

  • Instances of various sizes
  • Load balancers
  • Networks

Setup Requirements

Deploying upon GCP

Deploying upon AWS

Deploying upon Azure

Common Requirements

Beginning with pecdm

  1. Clone this repository: git clone https://github.com/puppetlabs/puppetlabs-pecdm.git && cd puppetlabs-pecdm
  2. Install module dependencies: bolt module install --no-resolve (manually manages modules to take advantage of functionality that allows for additional content to be deployed that does not adhere to the Puppet Module packaging format, e.g. Terraform modules)
  3. Run plan: bolt plan run pecdm::provision project=example ssh_user=john.doe firewall_allow='[ "0.0.0.0/0" ]'
  4. Wait. This is best executed from a bastion host or alternatively, a fast connection with strong upload bandwidth

Usage

Parameter requirements

  • lb_ip_mode: Default is private, which will result in load balancer creation that is only accessible from within the VPC where PE is provisioned. To access the load balancer your agents will need to reside within the same VPC as PE or have its VPC peered so private IPs can be routed between PE and the agent's VPC. If you set this parameter to public on AWS then the ELB creation will associate a public IP, potentially accessible from the internet. On GCP, setting parameter to public will result in PE deployment failure due to GCP not providing DNS entires for internet facing load balancers.

Windows Native SSH workaround

Due to bolt being unable to authenticate with ed25519 keys over SSH transport on Windows you must utilize the Native ssh transport when running pecdm from a Windows workstation. This is done automatically on provisioning if your current project directory lacks an inventory.yaml. If you choose to maintain your own inventory.yaml file than add the below configuration example.

ssh:
  native-ssh: true
  ssh-command: 'ssh' 

Adding user specific deployment requirements

There are an infinite number of requirements and options for provisioning and deployment to the cloud that each individual has, it is impossible for pecdm or peadm to support them all and they are often not applicable from one user to another so inappropriate to be added to pecdm. To adapt to this need we develop both modules in a way that makes it possible to compose their individual subcomponents into your own specific implementation.

An example repository which illustrates this composability can be found at ody/example-pe_provisioner. This Bolt Project models a hypothetical Example organization which is provisioning PE on Google Cloud Platform and uses the individual subplans in pecdm sandwiched around some custom code and a Terraform module that will create DNS records for each provisioned component in Cloud DNS using a user owned domain.

Example: params.json

The command line will likely serve most uses of pecdm but if you wish to pass a longer list of IP blocks that are authorized to access your PE stack than creating a params.json file is going to be a good idea, instead of trying to type out a multi value array on the command line. The value that will ultimately be set for the GCP firewall will always include the internal network address space to ensure everything works no matter what is passed in by the user.

{
    "project"        : "example",
    "ssh_user"       : "john.doe",
    "version"        : "2019.0.4",
    "provider"       : "google',
    "firewall_allow" : [ "71.236.165.233/32", "131.252.0.0/16", 140.211.0.0/16 ]

}

How to execute plan with params.json: bolt plan run pecdm::provision --params @params.json

Deploying examples

Deploy standard architecture on AWS with the developer role using a MFA enabled user

This can also be used to deploy PE's large architecture without a fail over replica on AWS

source scripts/aws_bastion_mfa_export.sh -p development

bolt plan run pecdm provider=aws architecture=standard

Please note that for bolt to authenticate to the AWS-provisioned VMs you need to enable ssh agent like so:

$ eval `ssh-agent`
$ ssh-add

For more information about setting environment variables, please take a look at the detailed instructions on the scripts/README file

Destroying examples

Destroy GCP stack

The number of options required are reduced when destroying a stack

bolt plan run pecdm::destroy provider=google

Destroy AWS stack

The number of options required are reduced when destroying a stack

bolt plan run pecdm::destroy provider=aws

Upgrading examples

Upgrade is currently non-functional

Upgrade a AWS stack

bolt plan run pecdm::upgrade provider=aws ssh_user=centos version=2021.1.0

Limitations

Only supports what peadm supports and not all supporting Terraform modules have parity with each other.