Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Vagrant: Multi (virtual) machine with Puppet roles

DZone's Guide to

Vagrant: Multi (virtual) machine with Puppet roles

· Database Zone ·
Free Resource

Compliant Database DevOps and the role of DevSecOps DevOps is becoming the new normal in application development, and DevSecOps is now entering the picture. By balancing the desire to release code faster with the need for the same code to be secure, it addresses increasing demands for data privacy. But what about the database? How can databases be included in both DevOps and DevSecOps? What additional measures should be considered to achieve truly compliant database DevOps? This whitepaper provides a valuable insight. Get the whitepaper

I’ve been playing around with setting up a neo4j cluster using Vagrant and HAProxy and one thing I wanted to do was define two different roles for the HAProxy and neo4j machines.

When I was working at uSwitch Nathan had solved a similar problem, but with AWS VMs, by defining the role in an environment variable in the VM’s spin up script.

In retrospect I think I might have been able to do that by using the shell provisioner and calling that before the puppet provisioner but Nathan, Gareth Rushgrove and Gregor Russbuelt suggested that using facter might be better.

When I initially looked at the ‘Custom Facts’ section of the docs I thought it was only possible to set facts for the Vagrant file as a whole but you can actually do it on a per VM basis which is neat.

I added a method called ‘provision_as_role’ to the ‘Vagrant::Config::V2::Root’ class:

module Vagrant
  module Config
    module V2
      class Root
        def provision_as_role(role)
          vm.provision :puppet do |puppet|
            puppet.manifests_path = "puppet/manifests"
            puppet.module_path = "puppet/modules"
            puppet.manifest_file  = "base.pp"
            puppet.facter = { "role" => role.to_s }
          end 
        end
      end
    end
  end
end

and then passed in a role depending on the VM in my Vagrantfile:

require File.join(File.dirname(__FILE__), 'lib', 'root.rb')
 
Vagrant.configure("2") do |config|  
  config.vm.box = "precise64"
  config.vm.box_url = "http://files.vagrantup.com/precise64.box"
 
  config.vm.define :neo01 do |neo| 
    neo.vm.hostname = "neo01"
    neo.vm.network :private_network, ip: "192.168.33.101"    
    neo.provision_as_role :neo
  end
 
  config.vm.define :lb01 do |lb|
    lb.vm.hostname = "lb01"
    lb.vm.network :private_network, ip: "192.168.33.104"    
    lb.provision_as_role :lb
  end
end

We can now access the variable ‘$role’ in our puppet code which I used like so:

puppet/base.pp

class all_the_things {
  exec { 'apt-get update': command => '/usr/bin/apt-get update'; }
  package { 'curl': ensure => '7.22.0-3ubuntu4', }
  class { 'apt': }
}
 
node default {
  class { 'all_the_things': }
  class { $role:
    require => Class['all_the_things']
  }
}

The ‘neo’ and ‘lb’ classes look like this:

class neo {
  class { 'java': version => '7u25-0~webupd8~1', }
  class { 'neo4j': require     => Class['java'], }
}
class lb {
  class { 'haproxy':  }
}

The full code is on github but it’s behaving a bit weirdly in some scenarios so I’m still trying to get it properly working.



Compliant Database DevOps and the role of DevSecOps DevOps is becoming the new normal in application development, and DevSecOps is now entering the picture. By balancing the desire to release code faster with the need for the same code to be secure, it addresses increasing demands for data privacy. But what about the database? How can databases be included in both DevOps and DevSecOps? What additional measures should be considered to achieve truly compliant database DevOps? This whitepaper provides a valuable insight. Get the whitepaper

Topics:

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}