We set up a separate root CA and used it to sign certificates on our
puppetmasters. The puppetmasters then act as intermediate CAs and any
client can connect to any puppetmaster. We then threw the
puppetmasters behind our load balancer.

Interesting idea!

LDAP sucks a LOT when it breaks, and it seems to break a lot. The
puppetmaster is much less volatile in my experience. I'm a big fan of
puppetizing the puppetmaster; it makes it much easier when there's
only a single process used for configuring servers. It hasn't caused
any huge problems in our environment. Remember, if the puppetmasters
is misconfigured badly enough that it isn't passing out configs,
worst-case scenario is that you can't deploy new configs. Just log in
to the puppetmaster and fix by hand. Whereas, with LDAP logins, worst
case is you *can't* log in and fix (yikes!)

Yeah. In this case, our LDAP servers are also our puppetmaster servers, so they share responsibilities. Hence why I wanted to keep those boxes un-managed.

-Matt

--
You received this message because you are subscribed to the Google Groups "Puppet 
Users" group.
To post to this group, send email to puppet-us...@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to