Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Puppet 8 for DevOps Engineers

You're reading from  Puppet 8 for DevOps Engineers

Product type Book
Published in Jun 2023
Publisher Packt
ISBN-13 9781803231709
Pages 416 pages
Edition 1st Edition
Languages
Concepts
Author (1):
David Sandilands David Sandilands
Profile icon David Sandilands
Toc

Table of Contents (22) Chapters close

Preface 1. Part 1 – Introduction to Puppet and the Basics of the Puppet Language
2. Chapter 1: Puppet Concepts and Practices 3. Chapter 2: Major Changes, Useful Tools, and References 4. Chapter 3: Puppet Classes, Resource Types, and Providers 5. Chapter 4: Variables and Data Types 6. Chapter 5: Facts and Functions 7. Part 2 – Structuring, Ordering, and Managing Data in the Puppet Language
8. Chapter 6: Relationships, Ordering, and Scope 9. Chapter 7: Templating, Iterating, and Conditionals 10. Chapter 8: Developing and Managing Modules 11. Chapter 9: Handling Data with Puppet 12. Part 3 – The Puppet Platform and Bolt Orchestration
13. Chapter 10: Puppet Platform Parts and Functions 14. Chapter 11: Classification and Release Management 15. Chapter 12: Bolt for Orchestration 16. Chapter 13: Taking Puppet Server Further 17. Part 4 – Puppet Enterprise and Approaches to the Adoption of Puppet
18. Chapter 14: A Brief Overview of Puppet Enterprise 19. Chapter 15: Approaches to Adoption 20. Index 21. Other Books You May Enjoy

Lab – use eyaml to store a secret

In this lab, the puppet-hiera_eyaml module has been used to set up eyaml with default pkcs keys, with a global Hiera setup to look at the node name, OS, and common values. In site.pp, a Hiera lookup is performed to look up the value of secret::examplefiles, which is used as content to create a /var/tmp/secret_example file on the Puppet primary server. The lookup has a default of not set. In this lab, you will encrypt a secret and add it within the OS level so the content of the file changes.

SSH to the primary server and elevate to root:

ssh centos@<primary_host>
sudo su -

Run the eyaml encrypt –p command from within the /etc/puppetlabs/puppet directory and enter a secret of your choice at the prompt:

cd /etc/puppetlabs/puppet
eyaml encrypt -p

Copy the output after the string starting with ENC[ and paste it into the data section at /etc/puppetlabs/puppet/data/os/RedHat.eyaml so it contains something like this:

...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime