Afternoon,

I'm searching for documentation or hints on how to achieve a somewhat
more complex SSL setup than is provided "out of the box".  I've looked
around via Google and don't see anything immediately obvious.

I guess the most logical place to start is to state my aims:

    1) Run a pair of puppetmaster boxes in each security context,
        with these looked after by a single and central puppetmaster.
        This will configure Puppet and things like Passenger for us,
        plus setup scheduled jobs to pull manifests out of VCS.

    2) Have clients be able to talk to either puppetmaster within
        their specific security context, and then use something to
        perform IP failover for availability reasons.

I am therefore guessing we need to run a CA on the internal server
acting as the puppetmaster, and use that to build a suitable chain of
trust?  Where does that leave me for using things like 'puppet cert'
and can any of the tools already shipped with Puppet assist in getting
this all operational?  Conversely am I likely to encounter resistance
from Puppet tools in trying to achieve these aims?

Has anyone implemented an identical or similar solution, did you
document it anywhere publicly, what problems did you encounter, and do
you have any tips?

Many Thanks,
 - Alex

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-us...@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to