On Monday, November 4, 2013 10:36:01 AM UTC-6, tujwww wrote:
>
> puppetdb also expose facts etc. details via api calls too, you might want 
> to check that out.
>
> take a look at hiera-gpg puppet module to store hiera variables in 
> encrypted form, it will provide enough security on hiera/git side.
>
>

I would strongly recommend securing access to PuppetDB's REST API.  I think 
by default it is accessible only from the host machine, and that may be 
good enough, but check that I'm right.  Certainly your master should run on 
a machine that is secured to only personnel authorized to have the 
information that it serves.

I cannot recommend using hiera-gpg with Puppet 3 if you make heavy use of 
parameterized classes (which is typical these days).  Hiera-gpg will 
decrypt its data file not only for each datum stored therein, but also for 
every hiera lookup miss (to verify that it is indeed a miss).  Puppet 3 
performs a hiera lookup for at least each class parameter that is not 
assigned in a class declaration, and that can exact an excruciating 
performance penalty when many of those lookups fall through to hiera-gpg.


John

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to puppet-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/puppet-users/525bbd6f-bea0-4751-b1a1-f4a00ba98b05%40googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to