Boltello - requesting feedback

Hello All,

I hope this post finds readers in the Foreman community healthy and well. These are challenging times, indeed.

I’m Gerard Ryan. As a long time community lurker – and occasional question-asker in IRC – I’d like to formally introduce myself. I’ve been developing with Puppet for 9 years and have followed Foreman development for nearly as long.

My post today announces a project I’ve tinkered wth over the years called “boltello”.

Boltello started out as a simple BASH script which used a collection of puppet modules to build the Master of Masters and shipped tarballs of proxy certificates around with SSH. Once certificates were generated and distributed, the script would then bootstrap each compile master to the MoM to receive its configuration. That solution developed into its own puppet module over time and when Bolt was first announced I realized I could accomplish more powerful and more controlled orchestration with ease. Bolt is agent-less, yet natively understands Puppet – it seemed like a great match.

I’m seeking community feedback on this project in its current state and any suggestions or critiques would be helpful!

https://github.com/superfantasticawesome/boltello

Thanks for reading my post!

My best,
Gerard

3 Likes

Hi Gerard,
First of all, welcome to the community.
We have a community demo tomorrow, would you like to come along and demo this / talk about this for a few minutes? Foreman Community Demo #85

1 Like

Hi and yes!
How do I join?

1 Like

Excellent!

Hit the edit button and add yourself to the demo:

New user, not sure if I’m able to edit that post… however, I’ll definitely be present!

Thanks @gerard.ryan I will add you to the agenda and DM you a meeting link in 2 mins.

Thanks for the demo today @gerard.ryan ! I enjoyed seeing what you have done with boltello, it’s a neat project and powerful tool for sure.

1 Like

Thank you WB, that’s encouraging!

@gerard.ryan thanks for that. I only just watched the recording, but it looks very nice.

This does fill a gap that we’ve never been able to fill. I’ve talked about this in some presentations, but I’ll repeat it here. In theory all the installer modules present the basic module layer and the foreman-installer fills the role layer. Then the answers define the profile layer. What you’ve done here, is essentially write a different profile + role layer. This is very much what I like to see and something I often encourage. Using the modules directly is IMHO a supported use case.

Scaling the PuppetCA that way is nice and also how I used to do it back in the day when I still ran production environments (something I still miss because it’s super useful to know as an installer maintainer). IMHO it should be the default, but I never had time to implement it. I see you’ve used nginx but Apache is already present on Capsules. Any thoughts on using that? I also assume (didn’t check it) that you enable the PuppetCA feature on the Smart Proxy. Does that still work with signing?

I’ve opened a few issues and PRs in the repo itself, but I also would like to ask you what we can do in the modules themselves to better support this.

For what it’s worth: puppet-katello and puppet-foreman_proxy_content are being refactored to slowly allow more modular installations. It’s still a long term goal for me to be able to deploy Candlepin, Foreman+Katello and Pulp all on different servers to allow independent scaling. I’d also very much like to get your opinion on that.

1 Like

Hi ekohl, thanks for your thoughtful and insightful note.

I agree that nginx is superfluous with all the apache in the stack and I’ve got a little research and testing to do in order to port the nginx reverse proxy to apache… but it’s straightforward enough.

As far as the abstractions of role/profile, I was really hoping the developer team would see value in my approach. The core strength of the foreman-installer is the collection of puppet modules that comprise the installer… Don’t get me wrong, Kafo is amazing; however, there’s an enormous gap between:

  • the published “scenarios”
  • the atomic controls available on the command line
  • the exposed puppet class parameters and attendant hiera data available via custom-hiera.yaml

Exposing the complete Hiera backend by using “fall-through/override” configurations (e.g., “profiles”) offers lots of benefits for me as an end user as I get more flexibility in how I deliver katello. I can also preview new releases in nonprod before rolling changes out to prod… complete with any tweaks changes.

One issue I’ve had is capturing a complete and accurate metadata dump from the installer. I’ve found that I cannot entirely rely on the log dump to /var/log/foreman-installer/{katello,foreman-proxy-content}.log as some of the data is incorrect (certs module: ‘generate’ boolean; foreman_proxy_content module: pulp resources for pulpnode, as a couple examples).

Despite that challenge, I’ve created a vanilla “capsule” role, which overrides the default roles/proxy.yaml file in boltello. This “profile” delivers a proxy server just as it would be configured by foreman-installer. I thought it would be helpful in two ways: it provides an opportunity to mix up the deployment toplogy, as well as providing a comparative example for creating additional profiles, if anyone wants to do that :slight_smile:

PuppetCA feature on the Smart Proxy. Does that still work with signing?

I flag that feature off in Hiera and allow the Master of Masters to sign certificates natively. The ca requests are proxied back to the MoM and all other puppet traffic managed by the compile master. I initially tried to make this work, but got frustrated with certificate issues and dropped it. I have always wanted to make this work.

Thanks for the Apache suggestion; I am actively working on it.

Another use case I’ve wanted to tackle is standalone PostGreSQL.
Implementing it as a role should be easy.

1 Like

Agreed.

Yes, the challenge is to find a balance between being able to completely tweak all details and keeping it simple for new users. As you’ve discovered, the path we’ve taken is to make the modules very complete, but hide some options via Hiera. For this reason alone I consider the use of our modules outside our installer a supported use case.

1 Like

I’ve added a Vagrantfile to the project to make it easier to spin up katello resources.

Encountering a Tomcat issue where candlepin throws a port 8443 error, using katello 3.17/foreman 2.2. it’s resolved with an additional puppet run; however it is unclear why.

My guess would be SELinux due to https://tickets.puppetlabs.com/browse/PUP-10548. The short summary is that Puppet calculates the SELinux contexts before the main run. It doesn’t see any contexts that were installed via packages during the run. See our hook for a workaround.

Various conditionals are defined here:

I haven’t looked too deep into the ticket but would deferred functions in Puppet6 resolve this?

Example in use:
https://github.com/superfantasticawesome/boltello/blob/7cd2e61cf7eaaa9e5594a44da496487cc9fc9be8/modules/boltello_builder/manifests/versionlock.pp#L33

No, it’s really a bug in the file type.

Remote databases capability added. Currently installs postgresql and mongodb on one instance; however, I will likely add the ability to split these roles out to separate instances. I believe pulp will dropping mongodb in the near future and migrating wholly to postgresql; but I have not run database system/services under any significant load to determine if it’s really necessary.

https://github.com/superfantasticawesome/boltello/tree/database

2 Likes

Nice! It’s still on my agenda to properly support a remote database server as a scenario in the regular installer.

1 Like

Starting the following service(s):
rh-mongodb34-mongod, postgresql (foreman), postgresql (candlepin), qdrouterd, qpidd, rh-redis5-redis, squid, pulp_celerybeat, pulp_resource_manager, pulp_streamer, pulp_workers, smart_proxy_dynflow_core, tomcat, dynflow-sidekiq@orchestrator, foreman, httpd, puppetserver, dynflow-sidekiq@worker, dynflow-sidekiq@worker-hosts-queue, foreman-proxy
\ starting rh-mongodb34-mongod
rh-mongodb34-mongod is remote and is UP.
| starting postgresql (foreman)
postgresql (foreman) is remote and is UP.
/ starting postgresql (candlepin)
postgresql (candlepin) is remote and is UP