Pre-generating all the certs would be very time consuming with hundreds of
machines to deal with. Also, we would need to create a specific image for
each machine which would be an even bigger nightmare from my understanding.

We used the serial number as the hostname since the serial number on the
device does not change. Uuidgen generates a new string each time it is run.

What I am trying to accomplish is the ability to have a device communicate
with the puppetmaster server without need of intervention from me. I need to
be able to have a tech at a remote location completely re-image a device and
run puppet without having to wait for me do do something with the certs.

Is there a way to install a 'generic' cert on all the clients that I can
make part of my image so that no matter what happens to the client, it will
always have the correct cert?

-kurt

On Tue, Jun 30, 2009 at 2:24 PM, Nigel Kersten <nig...@google.com> wrote:

>
> On Tue, Jun 30, 2009 at 2:03 PM, engle<kurt.en...@gmail.com> wrote:
> >
> > Well, that is what we are doing right now. However, when dealing with
> > potentially hundred of machines, this gets a little awkward and
> > unmanageable. We are a school district and spend most of the summer
> > imaging hundreds of Macs. This is the case every summer. As these
> > machines change their function during the year, they will have to be
> > re-imaged thus prompting action on the cert. If we could just image
> > them with a cert already installed, then there would be no issue.
>
> Why can't you do this? Pre-generate all the certs, and add them in as
> part of your imaging process?
>
> Alternatively, stop the mapping between serial and certname, and use a
> UUID or something for the certname, and work out some way of cleaning
> out your obsolete certificates.
>
> >
> > The timing of when a device gets re-imaged and when the cert is
> > deleted is key and hard to achieve in our environment. We do not have
> > the expertise throughout our staff to allow a sudo operation to delete
> > the cert.
> >
> > What is the process of using a common cert on all the puppet clients?
> > I would like to test this out to see if it would work for our
> > environment.
> >
> > Thanks
> >
> > -kurt
> >
> > On Jun 30, 11:36 am, Mike Renfro <ren...@tntech.edu> wrote:
> >> On 6/30/2009 1:26 PM, engle wrote:
> >>
> >> > So, would it be best to use a single cert for all of the clients or is
> >> > there a better way to deal with this sort of setup?
> >>
> >> Run
> >>
> >>    puppetca --clean host.to.be.imaged
> >>
> >> on the puppetmaster as it's being imaged? If you're doing the reimaging,
> >> should just be one extra step in your procedure. If you're not the one
> >> doing the reimaging, can you set up a sudo entry on the puppetmaster to
> >> allow the other folks to clean old certs? Or set up a simple web form to
> >> clean a particular cert?
> >>
> >> Other than that, I guess another option would be to save the puppet ssl
> >> directory before the client drive gets reformatted, and restore it back
> >> to the drive before puppet starts up again.
> >>
> >> I'd be wary of using the same certs on multiple systems unless they were
> >> in an isolated environment (and possibly even then). Same reason as for
> >> not using the same ssh host key for all your systems.
> >>
> >> --
> >> Mike Renfro  / R&D Engineer, Center for Manufacturing Research,
> >> 931 372-3601 / Tennessee Technological University
> > >
> >
>
>
>
> --
> Nigel Kersten
> nig...@google.com
> System Administrator
> Google, Inc.
>
> >
>

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to