Install Puppet Automation on Red hat Enterprise Linux /CentOS 6.5


What is Puppet?

If you are managing hundreds to thousands servers, Automation is meaningful to you.
And Puppet is the server/client tool that orchestrate your infrastructure. Puppet works in a way that you can define your desired state of your system and services, files or directories in puppet master, and reset of your servers as puppet agent, will check in by default every 30 minutes and get their new configuration if any exist for them. So basically Puppet holds the control of config files in your servers and since you can consider everything in Linux as file, Puppet is the tool to manage the files.

Some of the Puppet capabilities:

  • Set cron jobs
  • Install or remove packages
  • Ensure services are running
  • Control files
  • Execute commands


I have demonstrated below how to implement puppet in your environment both online and offline for those servers that are not connected to internet via local repositories. 

Online Method

Installing Puppet Master 

1. Download and install the puppetlabs rpm to add appropriate yum repository for puppet installation:

# rpm -ivh

2. Now we are ready to install puppet master:

# yum -y install puppet-server

3. After installation done, it's time to generate certificate and start puppet server:

# puppet master --verbose --no-daemonize

Info: Creating a new SSL key for ca
Info: Creating a new SSL certificate request for ca
Info: Certificate Request fingerprint (SHA256): 64:A3:74:65:14:80:A0:A9:7F:6A:A5:C2:48:D3:57:98:12:B9:E7:65:7D:5A:45:7E:0F:36:59:77:06:0B:7E:F9
Notice: Signed certificate request for ca
Info: Creating a new certificate revocation list
Info: Creating a new SSL key for centos6.lab.local
Info: csr_attributes file loading from /etc/puppet/csr_attributes.yaml
Info: Creating a new SSL certificate request for centos6.lab.local
Info: Certificate Request fingerprint (SHA256): 17:95:82:A2:B7:68:F1:3E:D9:89:7E:01:C5:F6:AA:9B:CA:72:C4:9D:28:E9:C0:6E:5D:2D:93:7C:F6:EB:93:19
Notice: centos6.lab.local has a waiting certificate request
Notice: Signed certificate request for centos6.lab.local
Notice: Removing file Puppet::SSL::CertificateRequest centos6.lab.local at '/var/lib/puppet/ssl/ca/requests/centos6.lab.local.pem'
Notice: Removing file Puppet::SSL::CertificateRequest centos6.lab.local at '/var/lib/puppet/ssl/certificate_requests/centos6.lab.local.pem'
Notice: Starting Puppet master version 3.8.2

We can see new SSL key and certificate have been created. Now we press "ctrl+c" to exit the setup:

^CNotice: Caught INT; storing stop

4. Add the certificate name to puppet config file. To check the certificate name:

# puppet cert list --all
+ "centos6.lab.local" (SHA256) A3:AE:51:03:A9:01:3C:CE:36:B1:FB:C7:C7:7D:A3:0F:66:6F:99:1F:BE:E4:C8:DB:BB:08:6E:7C:20:DA:24:B0 (alt names: "DNS:centos6.lab.local", "DNS:puppet", "DNS:puppet.lab.local")

In my case the cert name is "centos6.lab.local" (same as my hostname). Now add the cert name to puppet config under [main] section:

# vim /etc/puppet/puppet.conf

    # The Puppet log directory.
    # The default value is '$vardir/log'.
    logdir = /var/log/puppet

    # Where Puppet PID files are kept.
    # The default value is '$vardir/run'.
    rundir = /var/run/puppet

    # Where SSL certificates are kept.
    # The default value is '$confdir/ssl'.
    ssldir = $vardir/ssl

    certname = centos6.lab.local

5. If hostname of your server is not "puppet", then need to add dns_alt_names to puppet config:

# vim /etc/puppet/puppet.conf

    # The Puppet log directory.
    # The default value is '$vardir/log'.
    logdir = /var/log/puppet

    # Where Puppet PID files are kept.
    # The default value is '$vardir/run'.
    rundir = /var/run/puppet

    # Where SSL certificates are kept.
    # The default value is '$confdir/ssl'.
    ssldir = $vardir/ssl

    certname = centos6.lab.local
    dns_alt_names = puppet, 

6. Install apache httpd server and Ruby Passenger application server:

# yum install httpd httpd-devel mod_ssl openssl-devel libcurl-devel zlib-devel rubygems ruby-devel apr-devel apr-util-devel gcc gcc-c++

7. Install ruby gem Rack Passenger:

# gem install rack passenger
Successfully installed rack-1.6.4
Building native extensions.  This could take a while...
Successfully installed rake-10.4.2
Successfully installed passenger-5.0.16
3 gems installed
Installing ri documentation for rack-1.6.4...
Installing ri documentation for rake-10.4.2...
Installing ri documentation for passenger-5.0.16...
Installing RDoc documentation for rack-1.6.4...
Installing RDoc documentation for rake-10.4.2...
Installing RDoc documentation for passenger-5.0.16...

8. Install the puppet master rack application:

# mkdir -p /usr/share/puppet/rack/puppetmasterd/public /usr/share/puppet/rack/puppetmasterd/tmp

# cp /usr/share/puppet/ext/rack/ /usr/share/puppet/rack/puppetmasterd/

# chown puppet:puppet /usr/share/puppet/rack/puppetmasterd/

9. Create puppet apache virtual host:

# cp /usr/share/puppet/ext/rack/example-passenger-vhost.conf /etc/httpd/conf.d/puppetmaster.conf 

Now edit puppetmaster config file and modify the SSL Certificate and DocumentRoot directives: 

# vim /etc/httpd/conf.d/puppetmaster.conf 

# This Apache 2 virtual host config shows how to use Puppet as a Rack
# application via Passenger. See
# for more information.

# You can also use the included file to run Puppet with other Rack
# servers instead of Passenger.

# you probably want to tune these settings
PassengerHighPerformance on
PassengerMaxPoolSize 12
PassengerPoolIdleTime 1500
# PassengerMaxRequests 1000
PassengerStatThrottleRate 120
RackAutoDetect Off
RailsAutoDetect Off

Listen 8140

<VirtualHost *:8140>
        SSLEngine on
        SSLProtocol             ALL -SSLv2 -SSLv3
        SSLHonorCipherOrder     on

        SSLCertificateFile      /var/lib/puppet/ssl/certs/centos6.lab.local.pem
        SSLCertificateKeyFile   /var/lib/puppet/ssl/private_keys/centos6.lab.local.pem
        SSLCertificateChainFile /var/lib/puppet/ssl/ca/ca_crt.pem 
        SSLCACertificateFile    /var/lib/puppet/ssl/ca/ca_crt.pem
        # If Apache complains about invalid signatures on the CRL, you can try disabling
        # CRL checking by commenting the next line, but this is not recommended.
        SSLCARevocationFile    /var/lib/puppet/ssl/ca/ca_crl.pem 
        # Apache 2.4 introduces the SSLCARevocationCheck directive and sets it to none
        # which effectively disables CRL checking; if you are using Apache 2.4+ you must
        # specify 'SSLCARevocationCheck chain' to actually use the CRL.
        # SSLCARevocationCheck chain
        SSLVerifyClient optional
        SSLVerifyDepth  1
        # The `ExportCertData` option is needed for agent certificate expiration warnings
        SSLOptions +StdEnvVars +ExportCertData

        # This header needs to be set if using a loadbalancer or proxy
        RequestHeader unset X-Forwarded-For

        RequestHeader set X-SSL-Subject %{SSL_CLIENT_S_DN}e
        RequestHeader set X-Client-DN %{SSL_CLIENT_S_DN}e
        RequestHeader set X-Client-Verify %{SSL_CLIENT_VERIFY}e

        DocumentRoot /usr/share/puppet/rack/puppetmasterd/public
        RackBaseURI /
        <Directory /etc/puppet/rack/>
                Options None
                AllowOverride None
                Order allow,deny
                allow from all

10. Now it's time to install apache module for passenger:

# passenger-install-apache2-module 

Welcome to the Phusion Passenger Apache 2 module installer, v5.0.16.

This installer will guide you through the entire installation process. It
shouldn't take more than 3 minutes in total.

Here's what you can expect from the installation process:

 1. The Apache 2 module will be installed for you.
 2. You'll learn how to configure Apache.
 3. You'll learn how to deploy a Ruby on Rails application.

Don't worry if anything goes wrong. This installer will advise you on how to
solve any problems.

Press Enter to continue, or Ctrl-C to abort. 

Press Enter to continue:

Installation through RPMs recommended

It looks like you are on a Red Hat or CentOS operating system, with SELinux
enabled. SELinux is a security mechanism for which special Passenger-specific
configuration is required. We supply this configuration as part of
our Passenger RPMs.

However, Passenger is currently installed through gem or tarball and does not
include any SELinux configuration. Therefore, we recommend that you:

 1. Uninstall your current Passenger install.
 2. Reinstall Passenger through the RPMs that we provide:

What would you like to do?

Press Ctrl-C to exit this installer so that you can install RPMs (recommended)
Press Enter to continue using this installer anyway

This means SELinux is enabled in server. We can disable it by changing "enforcing" to "disabled" in selinux config file:

# vim /etc/selinux/config

You need to reboot the server now to completely disable SElinux. And run "passenger-install-apache2-module" again after server comes up.

Now in this stage, choose 'Ruby' in the list below and press Enter:

Which languages are you interested in?

Use <space> to select.
If the menu doesn't display correctly, press '!'

 > (*)  Ruby
   ( )  Python
   ( )  Node.js
   ( )  Meteor

Once you see following message:

Almost there!

Please edit your Apache configuration file, and add these lines:

   LoadModule passenger_module /usr/lib/ruby/gems/1.8/gems/passenger-5.0.16/buildout/apache2/
   <IfModule mod_passenger.c>
     PassengerRoot /usr/lib/ruby/gems/1.8/gems/passenger-5.0.16
     PassengerDefaultRuby /usr/bin/ruby

open another terminal to the server and add mentioned block at the end of your httpd.conf file:

# vim /etc/httpd/conf/httpd.conf
#    ServerName
#    ErrorLog logs/
#    CustomLog logs/ common

LoadModule passenger_module /usr/lib/ruby/gems/1.8/gems/passenger-5.0.16/buildout/apache2/
   <IfModule mod_passenger.c>
     PassengerRoot /usr/lib/ruby/gems/1.8/gems/passenger-5.0.16
     PassengerDefaultRuby /usr/bin/ruby

save the file and return to the previous terminal with the message and hit the Enter. Then you should see a confirmation similar to below:

Validating installation...

 * Checking whether this Passenger install is in PATH... ✓
 * Checking whether there are no other Passenger installations... ✓
 * Checking whether Apache is installed... ✓
 * Checking whether the Passenger module is correctly configured in Apache... ✓

Everything looks good. :-)

11. Finally, restart apache and make sure puppetmaster service is stopped:

# /etc/init.d/puppetmaster stop

# /etc/init.d/httpd restart
Stopping httpd:                                            [FAILED]
Starting httpd:                                              [  OK  ]

# chkconfig puppetmaster off
# chkconfig httpd on
# chkconfig --list|egrep 'puppetmaster|httpd'
httpd           0:off   1:off   2:on    3:on    4:on    5:on    6:off
puppetmaster    0:off   1:off   2:off   3:off   4:off   5:off   6:off

12. Make sure to open port 8140 in your firewall if you are using firewall in order for puppet master to be accessible to other servers: 

# iptables -I INPUT -p tcp -m tcp --dport 8140 -j ACCEPT
# iptables-save > /etc/sysconfig/iptables
# /etc/init.d/iptables restart

Installing Puppet Agent

1. Install puppet client in other servers that you would like to be managed by puppet master:

# rpm -ivh

# yum -y install puppet

2. if you are not using DNS server, make sure to manually add the pupper master entry to hosts file of agent as well as adding agent's hostname to master's hosts file so both master and agent can ping each other via hostname:

In the agent server: 

# echo " centos6.lab.local centos6 puppet " >> /etc/hosts 

In puppet master:

# echo " puppetagent.lab.local puppetagent " >> /etc/hosts 

3. Add the master server entry to the agent's puppet config file:

# echo "server =" >> /etc/puppet/puppet.conf

4. Start the puppet agent:

# /etc/init.d/puppet start

Starting puppet agent:                                   [  OK  ]

# chkconfig puppet on

5. In this point, if everything goes good, you should be able to see the agent certificate at the puppet master. Run following in the master:

# puppet cert list -all

  "puppetagent.lab.local" (SHA256) 8A:29:5D:25:22:34:D5:D1:7A:E9:87:00:2F:45:4B:47:17:22:ED:0E:53:2A:F3:0F:A6:2B:8F:C4:4C:1F:CF:31
+ "centos6.lab.local"  (SHA256) A3:AE:51:03:A9:01:3C:CE:36:B1:FB:C7:C7:7D:A3:0F:66:6F:99:1F:BE:E4:C8:DB:BB:08:6E:7C:20:DA:24:B0 (alt names: "DNS:centos6.lab.local", "DNS:puppet", "DNS:puppet.lab.local")

6. We can see our agent certificate is seen by master but a "+" is missing next to it meaning master needs to sign the agent certificate to officially accept it as a managed server:

# puppet cert sign --all
Notice: Signed certificate request for puppetagent.lab.local

Notice: Removing file Puppet::SSL::CertificateRequest puppetagent.lab.local at '/var/lib/puppet/ssl/ca/requests/puppetagent.lab.local.pem'

7. Issue following command to check if our agent can connect to master:

# puppet agent -tv 
Info: Retrieving pluginfacts
Info: Retrieving plugin
Info: Caching catalog for puppetagent.lab.local
Info: Applying configuration version '1440784754'
Notice: Finished catalog run in 0.05 seconds

8. Now that communication has been established, we can try our first magic with puppet. In the master create the main manifest as below:

# vim /etc/puppet/manifests/site.pp

file {'/tmp/puppet_test':                                        
  ensure  => present,                                            
  mode    => 0644,                                               
  content => "Hello from Puppet! I am : ${hostname}!\n",

9. Now in the agent server, run below command:

# puppet agent -tv
Info: Retrieving pluginfacts
Info: Retrieving plugin
Info: Caching catalog for puppetagent.lab.local
Info: Applying configuration version '1440784977'
Notice: /Stage[main]/Main/File[/tmp/puppet_test]/ensure: created
Info: Creating state file /var/lib/puppet/state/state.yaml
Notice: Finished catalog run in 0.14 seconds

and check to see if /tmp/puppet_test is created with desired content:

# cat /tmp/puppet_test
Hello from Puppet! I am : puppetagent!

And Bingo! Congratulation! You have just setup your puppet automation for your environment. 

Offline Method 

If your server have no access to internet for puppet installation, you need to download the whole puppet repository which is applicable to your specific Linux, e.g. puppet repository for CentOS 6.5.

Then create a local repo accessible to puppet master and agents in order to use "yum" package installation method.

After you have setup your local repo, you need to create a yum repo config file in the yum.repos.d directory of both master and agent with following content:

My sample yum repo file for my local puppet repository:
  # cat /etc/yum.repos.d/puppet.repo

name=Puppet products

name=Puppet deps

name=Puppet devel

name=Puppet pc1

and then update the yum database to make sure it can see the puppet packages: 

# yum update

After this has been done, the rest is same as installation instruction above in the online method section.


Popular posts from this blog

Linux and AIX user non expiry and force password change at first login

Rebuild your new Yum repository after changing the packages

Running Docker Wildfly/JBoss Application Server in Debug mode via Eclipse