All Projects → sous-chefs → Consul

sous-chefs / Consul

Licence: apache-2.0
Development repository for the consul cookbook

Programming Languages

ruby
36898 projects - #4 most used programming language

Projects that are alternatives of or similar to Consul

Ruby build
Development repository for the ruby_build cookbook
Stars: ✭ 124 (-34.04%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Users
Development repository for the users cookbook
Stars: ✭ 138 (-26.6%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Grafana
Development repository for the grafana cookbook
Stars: ✭ 69 (-63.3%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Git
Development repository for the git cookbook
Stars: ✭ 117 (-37.77%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Docker
Development repository for the docker cookbook
Stars: ✭ 1,253 (+566.49%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Percona
Development repository for the percona cookbook
Stars: ✭ 117 (-37.77%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Etcd
Development repository for the etcd cookbook
Stars: ✭ 71 (-62.23%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Powershell
Development repository for the powershell cookbook
Stars: ✭ 104 (-44.68%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Graphite
Development repository for the graphite cookbook
Stars: ✭ 160 (-14.89%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Iis
Development repository for the iis cookbook
Stars: ✭ 79 (-57.98%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Homebrew
Development repository for the homebrew cookbook
Stars: ✭ 137 (-27.13%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Nagios
Development repository for the nagios cookbook
Stars: ✭ 127 (-32.45%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Openssh
Development repository for the openssh cookbook
Stars: ✭ 108 (-42.55%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Logrotate
Development repository for the logrotate cookbook
Stars: ✭ 122 (-35.11%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Chef Splunk
Development repository for the chef-splunk cookbook
Stars: ✭ 70 (-62.77%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Erlang
Development repository for the erlang cookbook
Stars: ✭ 78 (-58.51%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Rvm
Development repository for the rvm cookbook
Stars: ✭ 525 (+179.26%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Nginx
Development repository for the nginx cookbook
Stars: ✭ 528 (+180.85%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Rsyslog
Development repository for the rsyslog cookbook
Stars: ✭ 66 (-64.89%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource
Openvpn
Development repository for the openvpn cookbook
Stars: ✭ 102 (-45.74%)
Mutual labels:  hacktoberfest, chef, chef-cookbook, chef-resource

Consul Cookbook

Cookbook Version CI State OpenCollective OpenCollective License

Application cookbook which installs and configures Consul.

Consul is a tool for discovering and configuring services within your infrastructure. This is an application cookbook which takes a simplified approach to configuring and installing Consul. Additionally, it provides Chef primitives for more advanced configuration.

Maintainers

This cookbook is maintained by the Sous Chefs. The Sous Chefs are a community of Chef cookbook maintainers working together to maintain important cookbooks. If you’d like to know more please visit sous-chefs.org or come chat with us on the Chef Community Slack in #sous-chefs.

Basic Usage

For most infrastructure we suggest first starting with the default recipe. This installs and configures Consul from the latest supported release. It is also what is used to certify platform support through the use of our integration tests.

This cookbook provides node attributes which are used to fine tune the default recipe which installs and configures Consul. These values are passed directly into the Chef resource/providers which are exposed for more advanced configuration.

Out of the box the following platforms are certified to work and are tested using our Test Kitchen configuration. Additional platforms may work, but your mileage may vary.

  • RHEL/CentOS 7 & 8
  • Ubuntu 16.04, 18.04 & 20.04
  • Debian 9 & 10
  • Windows Server 2012 R2

Client

Out of the box the default recipe installs and configures the Consul agent to run as a service in client mode. The intent here is that your infrastructure already has a quorum of servers. In order to configure Consul to connect to your cluster you would supply an array of addresses for the Consul agent to join. This would be done in your wrapper cookbook:

node.default['consul']['config']['start_join'] = %w{c1.internal.corporate.com c2.internal.corporate.com c3.internal.corporate.com}

Server

This cookbook is designed to allow for the flexibility to bootstrap a new cluster. The best way to do this is through the use of a wrapper cookbook which tunes specific node attributes for a production server deployment.

The Consul cluster cookbook is provided as an example.

Advanced Usage

As explained above this cookbook provides Chef primitives in the form of resource/provider to further manage the install and configuration of Consul. These primitives are what is used in the default recipe, and should be used in your own wrapper cookbooks for more advanced configurations.

Configuration

It is very important to understand that each resource/provider has defaults for some properties. Any changes to a resource's default properties may need to be also changed in other resources. The best example is the Consul configuration directory.

In the example below we're going to change the configuration file from the default (/etc/consul.json) to one that may be on a special volume. It is obvious that we need to change the path where consul_config writes its file to, but it is less obvious that this needs to be passed into consul_service.

Inside of a recipe in your wrapper cookbook you'll want to do something like the following block of code. It uses the validated input from the configuration resource and passes it into the service resource. This ensures that we're using the same data.

config = consul_config '/data/consul/default.json'
consul_service 'consul' do
  config_file config.path
end

Security

The default recipe makes the Consul configuration writable by the consul service user to avoid breaking existing implementations. You can make this more secure by setting the node['consul']['config']['owner'] attribute to root, or set the owner property of consul_config explicitly:

# attributes file
default['consul']['config']['owner'] = 'root'

or

# recipe file
consul_config '/etc/consul/consul.json' do
  owner 'root'
end

Watches/Definitions

In order to provide an idempotent implementation of Consul watches and definitions. We write these out as a separate configuration file in the JSON file format. The provider for both of these resources are identical in functionality.

Below is an example of writing a Consul service definition for the master instance of Redis. We pass in several parameters and tell the resource to notify the proper instance of the Consul service to reload.

consul_definition 'redis' do
  type 'service'
  parameters(tags: %w{master}, address: '127.0.0.1', port: 6379)
  notifies :reload, 'consul_service[consul]', :delayed
end

A check definition can easily be added as well. You simply have to change the type and pass in the correct parameters. The definition below checks memory utilization using a script on a ten second interval.

consul_definition 'mem-util' do
  type 'check'
  parameters(script: '/usr/local/bin/check_mem.py', interval: '10s')
  notifies :reload, 'consul_service[consul]', :delayed
end

A service definition with an integrated check can also be created. You will have to define a regular service and then add a check as a an additional parameter. The definition below checks if the vault service is healthy on a 10 second interval and 5 second timeout.

consul_definition 'vault' do
  type 'service'
  parameters(
    port:  8200,
    address: '127.0.0.1',
    tags: ['vault', 'http'],
    check: {
      interval: '10s',
      timeout: '5s',
      http: 'http://127.0.0.1:8200/v1/sys/health'
    }
  )
  notifies :reload, 'consul_service[consul]', :delayed
end

Finally, a watch is created below to tell the agent to monitor to see if an application has been deployed. Once that application is deployed a script is run locally. This can be used, for example, as a lazy way to clear a HTTP disk cache.

consul_watch 'app-deploy' do
  type 'event'
  parameters(handler: '/usr/local/bin/clear-disk-cache.sh')
  notifies :reload, 'consul_service[consul]', :delayed
end

A keen eye would notice that we are delaying the reload of the Consul service instance. The reason we do this is to minimize the number of times we need to tell Consul to actually reload configurations. If there are several definitions this may save a little time off your Chef run.

ACLs

The consul_acl resource allows management of Consul ACL rules. Supported actions are :create and :delete. The :create action will update/insert as necessary.

The consul_acl resource requires the Diplomat Ruby API gem to be installed and available to Chef before using the resource. This can be accomplished by including consul::client_gem recipe in your run list. If you are using Chef Infra Client 15.8+ you will need to make sure you are using at least version 2.2.6 of the diplomat gem.

In order to make the resource idempotent and only notify when necessary, the id field is always required (defaults to the name of the resource). If type is not provided, it will default to "client". The acl_name and rules attributes are also optional; if not included they will be empty in the resulting ACL.

The example below will create a client ACL token with an ID of the given UUID, Name of "AwesomeApp Token", and Rules of the given string.

consul_acl '49f06aa9-782f-465a-becf-44f0aaefd335' do
  acl_name 'AwesomeApp Token'
  type 'client'
  rules <<-EOS.gsub(/^\s{4}/, '')
    key "" {
      policy = "read"
    }
    service "" {
      policy = "write"
    }
  EOS
  auth_token node['consul']['config']['acl_master_token']
end

Execute

The command-line agent provides a mechanism to facilitate remote execution. For example, this can be used to run the uptime command across your fleet of nodes which are hosting a particular API service.

consul_execute 'uptime' do
  options(service: 'api')
end

Warning on git based installs

Consul v1.0 states that Go 1.9 is a requirement. The default go installation uses 1.5, so you may need to override a ['go']['version'] attribute to allow the git installation to work reliably.

All of the options available on the command-line can be passed into the resource. This could potentially be a very dangerous operation. You should absolutely understand what you are doing. By the nature of this command it is impossible for it to be idempotent.

Contributors

This project exists thanks to all the people who contribute.

Backers

Thank you to all our backers!

https://opencollective.com/sous-chefs#backers

Sponsors

Support this project by becoming a sponsor. Your logo will show up here with a link to your website.

https://opencollective.com/sous-chefs/sponsor/0/website https://opencollective.com/sous-chefs/sponsor/1/website https://opencollective.com/sous-chefs/sponsor/2/website https://opencollective.com/sous-chefs/sponsor/3/website https://opencollective.com/sous-chefs/sponsor/4/website https://opencollective.com/sous-chefs/sponsor/5/website https://opencollective.com/sous-chefs/sponsor/6/website https://opencollective.com/sous-chefs/sponsor/7/website https://opencollective.com/sous-chefs/sponsor/8/website https://opencollective.com/sous-chefs/sponsor/9/website

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].