Forge Home

chrony

Manage chrony daemon on Linux

1,823,528 downloads

70,986 latest version

5.0 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Version information

  • 0.3.2 (latest)
  • 0.3.1
  • 0.3.0
  • 0.2.6
  • 0.2.5
  • 0.2.4
  • 0.2.3
  • 0.2.2
  • 0.2.1
  • 0.2.0
  • 0.1.2
  • 0.1.1
  • 0.1.0
  • 0.0.9
  • 0.0.8
  • 0.0.7
  • 0.0.6
  • 0.0.5
  • 0.0.4
  • 0.0.3
  • 0.0.2
  • 0.0.1
released Apr 25th 2019
This version is compatible with:
  • Puppet Enterprise 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x, 2019.0.x, 2018.1.x
  • Puppet >= 5.5.8 < 7.0.0
  • , , , SLES, Archlinux
This module has been deprecated by its author since Oct 30th 2020.

The reason given was: This module has been migrated to Vox Pupuli

The author has suggested puppet-chrony as its replacement.

Start using this module

Documentation

aboe/chrony — version 0.2.5 Apr 25th 2019

puppet-chrony

Build Status Coverage Status pdk version Puppet Forge Puppet Forge - downloads Puppet Forge - scores

Table of Contents

  1. Overview
  2. Module Description - What the module does and why it is useful
  3. Setup - The basics of getting started with chrony
  4. Usage - Configuration options and additional functionality
  5. Reference - An under-the-hood peek at what the module is doing and how
  6. Limitations - OS compatibility, etc.

Overview

Chrony Puppet Module

Manage chrony time daemon on Archlinux and Redhat

Module Description

The Chrony module handles running chrony in Archlinux and Redhat systems with systemd.

Setup

What chrony affects

  • chrony package.
  • chrony configuration file.
  • chrony key file.
  • chrony service.

Requirements

  • Puppet 4.6.1 or later. Puppet 3 was supported up until release 0.2.0.

Beginning with chrony

include '::chrony' is all you need to get it running. If you wish to pass in parameters like which servers to use then you can use:

class { '::chrony':
  servers => ['ntp1.corp.com', 'ntp2.corp.com' ],
}

Usage

All interaction with the chrony module can be done through the main chrony class.

I just want chrony, what's the minimum I need?

include '::chrony'

I just want to tweak the servers, nothing else.

class { '::chrony':
  servers => [ 'ntp1.corp.com', 'ntp2.corp.com', ],
}

I'd like to make sure a secret password is used for chronyc:

class { '::chrony':
  servers         => [ 'ntp1.corp.com', 'ntp2.corp.com', ],
  chrony_password => 'secret_password',
}

I'd like to use NTP authentication:

class { '::chrony':
  keys            => [
    '25 SHA1 HEX:1dc764e0791b11fa67efc7ecbc4b0d73f68a070c',
  ],
  servers         => {
    'ntp1.corp.com' => ['key 25', 'iburst'],
    'ntp2.corp.com' => ['key 25', 'iburst'],
  },
}

I'd like chronyd to auto generate a command key at startup:

class { '::chrony':
   chrony_password    => 'unset',
   config_keys_manage => false,
}

Allow some hosts

class { '::chrony':
  queryhosts  => [ '192.168/16', ],
}

Reference

Classes

  • chrony: Main class, includes all the rest.
  • chrony::install: Handles the packages.
  • chrony::config: Handles the configuration and key file.
  • chrony::service: Handles the service.

Parameters

The following parameters are available in the chrony module

chrony_password

This sets the chrony password to be used in the key file. By default a short fixed string is used. If set explicitly to 'unset' then no password will setting will be added to the keys file by puppet.

commandkey

This sets the key ID used by chronyc to authenticate to chronyd.

config

This sets the file to write chrony configuration into.

config_template

This determines which template puppet should use for the chrony configuration.

config_keys

This sets the file to write chrony keys into.

config_keys_owner

Specify unix owner of chrony keys file, defaults to 0.

config_keys_group

Specify unix group of chrony keys files, defaults to 0 on ArchLinux and chrony on Redhat.

config_keys_mode

Specify unix mode of chrony keys files, defaults to 0644 on ArchLinux and 0640 on Redhat.

config_keys_template

This determines which template puppet should use for the chrony key file.

keys

An array of key lines. These are printed as-is into the chrony key file.

local_stratum

Override the stratum of the server which will be reported to clients when the local reference is active. Defaults to 10

log_options

Specify which information is to be logged.

package_ensure

This can be set to 'present' or 'latest' or a specific version to choose the chrony package to be installed.

package_name

This determines the name of the package to install.

peers

This selects the servers to use for NTP peers (symmetric association). It is an array of servers.

servers

This selects the servers to use for NTP servers. It can be an array of servers or a hash of servers to their respective options.

refclocks

This should be a Hash of hardware reference clock drivers to use. They hash can either list a single list of options for the driver, or any array of multiple options if the same driver is used for multiple hardware clocks.

Example:

refclocks = { 'PPS' => [ '/dev/pps0 lock NMEA refid GPS',
                         '/dev/pps1:clear refid GPS2' ],
              'SHM' => '0 offset 0.5 delay 0.2 refid NMEA noselect' }

makestep_updates, makestep_seconds

This configures the makestep parameter of chronyd. Usually, chronyd never steps the time, but applies a slew after the initial synchronization. This setting configures for how many updates the time may be stepped if the adjustment is larger than specified seconds.

For virtual machines which are suspended and resumed for a prolonged time, stepping the time may be wanted. In this case, set makestep_updates to -1 to allow stepping the time for any update.

queryhosts

This adds the networks, hosts that are allowed to query the daemon.

service_enable

This determines if the service should be enabled at boot.

service_ensure

This determines if the service should be running or not.

service_manage

This selects if puppet should manage the service in the first place.

service_name

This selects the name of the chrony service for puppet to manage.

mailonchange

Specify the mail you wanna alert when chronyd execute a sync grater than threshold.

threshold

Specify the time limit for triggering events.

lock_all

Force chrony to only use RAM & prevent swapping.

Limitations

This module has been built on and tested against Puppet 3.2.3 and higher.

The module has been tested on:

  • Arch Linux
  • Red Hat
  • Debian (9)
  • Suse 12.3