Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

KeyDescriptionExampleCreated byData-typeDatafile:

Used by:

profile::networking::rpfilterBefore we used multiple routing-tables on our hosts we had to turn off rpfilter to allow asymmetric routing. Now this should be turned on.trueN/ABooleannetworking.yamlAll
profile::networking::management::ipv4::prefixesA list over IPv4 prefixes for networks where management stations are found. Used to configure the firewall for SSH, stats-pages etc.

- '192.0.2.0/26'

N/AList of stringsnetworking.yamlAll
profile::networking::management::ipv6::prefixesA list over IPv6 prefixes for networks where management stations are found. Used to configure the firewall for SSH, stats-pages etc.- '2001:db8:beef:701::/64'N/AList of stringsnetworking.yamlAll
profile::ntp::serversA list over ntp servers to use.

- 'ntp.ntnu.no'

N/A

List of stringscommon.yamlAll
profile::keepalived::vrrp_passwordA password used to secure the vrrp instances'724EuvohTGOdlcFnLlDV'pwgen -s -1 20Stringcommon.yaml 
classesA list over puppet classes which should be installed on a node. Used when we do not have an ENC, but it is always required. It is thus recommended to have an empty list here if an ENC is used.[ ]N/AList of stringscommon.yaml or node-specific file.All
profile::productionlevelWhich production-level is this installation? "prod", "test" or "dev"?'dev'N/AStringcommon.yamlAll
profile::baseconfig::smtp_relayAn SMTP relay which the server can use to send mail'smtp.example.com'N/AStringcommon.yamlAll
profile::baseconfig::maildomainThe domain the server sends mail from'example.com'N/AStringcommon.yamlAll

Networks

The networks used in the deployment are all described in hiera to ensure that all configuration retrieves the same values when configuring anything network specific. There are one key in hiera which lists all networks:

...

KeyDescriptionExampleCreated byData-typeDatafile:Used by:
profile::haproxy::web::profileWhich web profile  should this haproxy node have'management'N/AStringnode-specificrole::bootstrap, role::balancer::*
profile::haproxy::${profile}::ipv4The IPv4 address used in front og the loadbalancer used for managemnet services'192.0.2.151' N/AStringnetworking.yamlrole::bootstrap, role::puppet::db, role::puppet::server, role::mysql, role::balancer::management
profile::haproxy::${profile}::ipv4::idThe VRRP id used by the IPv4 VRRP instance.11N/AIntegernetworking.yamlrole::bootstrap, role::balancer::management
profile::haproxy::${profile}::ipv4::priorityThe VRRP priority used by the IPv4 VRRP instance.10 N/AIntegernetworking.yamlrole::bootstrap, role::balancer::management
profile::haproxy::${profile}::ipv6The IPv4 address used in front og the loadbalancer used for managemnet services'2001:db8:beef:707::7b1'N/AStringnetworking.yamlrole::bootstrap, role::puppet::db, role::puppet::server, role::mysql, role::balancer::management 
profile::haproxy::${profile}::ipv6::idThe VRRP id used by the IPv6 VRRP instance. 12N/AIntegernetworking.yamlrole::bootstrap, role::balancer::management
profile::haproxy::${profile}::ipv6::priorityThe VRRP priority used by the IPv6 VRRP instance.10N/AIntegernetworking.yamlrole::bootstrap, role::balancer::management
profile::haproxy::${profile}::domainsWhich domains haproxy should forward for in frontend "ft_web" for given profile

-'foo.com'

-'bar.foo.com'

N/AList of stringscommon.yamlrole::balancer::*
profile::haproxy::management::apicertA .pem certificate bundle with private key, CAcert and server certtl;dr

cat private_key.key server.crt ca.crt > haproxy_web.pem

The order is important!

TLS from CertManager: Choose the "as Certificate (w/ issuer after)" alternative

Multiline stringcerts.yamlrole::bootstrap, role::balancer::management
profile::haproxy::services::apicertA .pem certificate bundle with private key, CAcert and server certtl;dr

cat private_key.key server.crt ca.crt > haproxy_web.pem

The order is important!

TLS from CertManager: Choose the "as Certificate (w/ issuer after)" alternative

Multiline stringcerts.yamlrole::bootstrap, role::balancer::services
profile::haproxy::${profile}::webcertA .pem certificate bundle with private key, CAcert and server certtl;dr

cat private_key.key server.crt ca.crt > haproxy_web.pem

The order is important!

TLS from CertManager: Choose the "as Certificate (w/ issuer after)" alternative

Multiline stringcerts.yaml

role::balancer::*

 

profile::haproxy::management::apicert::certfileFilepath and name for the apicert bundle'/etc/ssl/private/haproxy_web.pem'N/AStringcerts.yamlrole::balancer::web

...