On 10/24/14 12:01 PM, Tim Skirvin wrote:
         I've started investigating hiera-eyaml as a tool for managing
secrets within our puppet repository.  It looks pretty promising,
especially in connection with 'show_diff => false'.  For those that
haven't seen it:

     http://puppetlabs.com/blog/encrypt-your-data-using-hiera-eyaml

         That said, I'm not sure what its performance implications are, and
how many decryption calls we can afford.  Has anybody played with this
enough to be able to know how how these decryption calls will affect
performance problems?

         More concretely: I'm currently supporting ~1250 nodes with two
fairly-hefty puppet servers, but we're not managing much in the way of
secrets.  If I were to, say, start managing the root password on all of
our nodes using this tool, should I expect our entirely environment to
melt down?

                                     - Tim Skirvin (tskir...@fnal.gov)


My experience is the same as Christopher's though our frontend servers pull 50+ encrypted keys for everything from db credentials to third party shared secrets per environment. I didn't notice a change when we switched to eyaml, but I also coupled it with a upgrade to Ruby 1.9.3 from 1.8.7. Also we have only 150 nodes.

I'd say start slowly or on your stage master, but don't be surprised if adding a few keys fails to impact performance.

Ramin

--
You received this message because you are subscribed to the Google Groups "Puppet 
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to puppet-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/puppet-users/544AA729.4070804%40badapple.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to