Things are moving very fast in OpenStack; it might be useful to take a short break and write down a little bit of retrospective; it will help to see what happened in Puppet OpenStack project during the last months.
Main points : Environment variables driven process 8 steps process Deploy OpenStack using upstream Puppet modules Works for both bare metal and virtualized deployments What is devtest and how does it work ? Devtest is the upstream way to deploy Openstack with TripleO. In simple words it takes you from a fresh bare metal server to an overcloud (understand OpenStack… Read more →
This post is originally published on Emilien Macchi’s blog. During the last OpenStack Summit, I had the pleasure to participate to the Infra sessions and we agreed at how to make functional testing for both Puppet OpenStack and Puppet Infra modules, which is a real proof of collaboration between both groups. However, I met some people still wondering how to… Read more →
Our Vancouver week just ended and I think it was a very productive Summit for the Puppet OpenStack folks. This blog post summarizes what we did this week, and what we plan for the next release.
We are proud to announce the first stable release of Software Factory. We have been operating a deployment that is hosting some projects along SF itself for a long time already. And since the platform has been proven stable enough for us, and consistently upgraded without much outage, it’s a good opportunity to look back at what we built and… Read more →
As OpenStack matures as a solution, there is a growing need to effectively deploy OpenStack in a prescriptive manner. To achieve this, numerous deployers have adopted Puppet to be their configuration tool of choice and it has grown to be the most widely used tool when deploying OpenStack. The community effort to automate the deployment of OpenStack using Puppet has… Read more →
Puppet is a key component in server deployment and configuration automation. When nodes successfully get provisioned by a Puppet master they retrieve all sorts of data, some which might be both confidentials and criticals. It is then mandatory to ensure that only authorized instances or nodes are allowed to retrieve such data. In today elastic systems and cloud era, it… Read more →