Hey Sean, First - congrats on wrangling your Macs with Puppet! Next, I understand and have shared your pain regarding timely imaging of workstations and Puppet cert-wrangling. Generally, I've seen folks do one of a couple of things:
1. Autosign 2. Utilize a CGI script to sign/revoke certs on the master (which can largely be replaced through the use of the `puppet cert` face) 3. Use the same private key everywhere and change the individual node_name Numbers 1 and 2 are largely process around signing individual certs for every node. You COULD even backup the $ssldir on your clients, image the machine, install puppet, restore the $ssldir, and then run Puppet again and Puppet will work fine for your clients. Number 3 is a bit different. With #3, you would have the SAME private cert for EVERY node in your infrastructure. Because of this, the certname must be THE SAME for every node. When you do this, however, Puppet treats every node as if it were the SAME node - so you need a way to de-couple the name of the node as Puppet knows it with the name of the node as the Certificate knows it. The solution is the 'node_name_fact' and 'node_name_value' configuration item in puppet.conf --> http://docs.puppetlabs.com/references/stable/configuration.html#nodenamefact You would essentially ship the private cert around to EVERY node, set the node_name_{fact,value} in puppet.conf, and then Puppet would treat each machine as a separate node (even though the certificate is the same everywhere). Obviously there are security implications for this, but some people prefer it to Autosigning. Hopefully, this should help you on your way. On Wed, Apr 11, 2012 at 8:31 AM, Sean McGrath <seanc.mcgr...@gmail.com>wrote: > Firstly my apologies for posting this if it has been answered > elsewhere and I missed it while looking. > > I'm starting to look at using Puppet to manage our fleet of Mac's > running OS X in our lab environment and I'm quite impressed with it > from my testing so far. > > I have tested the functionality of the autosign.conf file with the > hostnames of the trusted clients in it. > > However, if I re-image one of the Mac's as we occasionally do that > destroys the client certificate that it uses for the puppetca request. > Thus the puppet master see's a request with a different certificate > from a node with a hostname that has had its trust relationship > established with a different certificate. > > This is probably a noob question but I haven't been able to figure it > out. How do I get around this in an automated manner. I don't want to > have to revoke certificates each time I re-image a Mac so they can be > re-trusted by the puppet master. Is there something like a root > certificate I could build into the image to establish the trust > relationship easily and securely each time a Mac is re-imaged? > > many thanks > > Sean > > -- > You received this message because you are subscribed to the Google Groups > "Puppet Users" group. > To post to this group, send email to puppet-users@googlegroups.com. > To unsubscribe from this group, send email to > puppet-users+unsubscr...@googlegroups.com. > For more options, visit this group at > http://groups.google.com/group/puppet-users?hl=en. > > -- Gary Larizza Professional Services Engineer Puppet Labs -- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.