Module for managing Apache Zookeeper




318,683 latest version

5.0 quality score

Version information

  • 1.0.0 (latest)
  • 0.8.7
  • 0.8.6
  • 0.8.5
  • 0.8.4
  • 0.8.3
  • 0.8.2
  • 0.8.1
  • 0.8.0
  • 0.7.7
  • 0.7.6
  • 0.7.5
  • 0.7.4
  • 0.7.3
  • 0.7.2
  • 0.7.1
  • 0.7.0
  • 0.6.1
  • 0.6.0
  • 0.5.5
  • 0.5.4
  • 0.5.3
  • 0.5.2
  • 0.5.1
  • 0.5.0
  • 0.4.2
  • 0.4.1
  • 0.4.0
  • 0.3.9
  • 0.3.8
  • 0.3.7
  • 0.3.6
  • 0.3.5
  • 0.3.4
  • 0.3.3
  • 0.3.2
  • 0.3.1
  • 0.3.0
  • 0.2.4
  • 0.2.3
released Apr 14th 2020
This version is compatible with:
  • Puppet Enterprise 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x, 2019.0.x, 2018.1.x
  • Puppet >= 5.5.8 < 7.0.0
  • RedHat

Start using this module

Tags: zookeeper


deric/zookeeper — version 1.0.0 Apr 14th 2020


Forge Build Status Puppet Forge

A puppet receipt for Apache Zookeeper. ZooKeeper is a high-performance coordination service for maintaining configuration information, naming, providing distributed synchronization, and providing group services.


  • Puppet
  • Binary or ZooKeeper source code archive

Compatibility matrix:

puppet-zookeeper Puppet 3.x Puppet 4.x Puppet 5.x Puppet 6.x
0.7.x :heavy_check_mark: :heavy_check_mark: :question: :x:
0.8.x :x: :heavy_check_mark: :heavy_check_mark: :x:
1.0.x :x: :x: :heavy_check_mark: :heavy_check_mark:

Basic Usage:

class { 'zookeeper': }

Cluster setup

When running ZooKeeper in the distributed mode each node must have unique ID (1-255). The easiest way how to setup multiple ZooKeepers, is by using Hiera.


zookeeper::id: '1'


zookeeper::id: '2'


zookeeper::id: '3'

A ZooKeeper quorum should consist of odd number of nodes (usually 3 or 5). For defining a quorum it is enough to list all IP addresses of all its members.

class { 'zookeeper':
  servers => {
    1 => '',
    2 => '',
    3 => '',

In case that an array is passed as servers, first ZooKeeper will be assigned ID = 1. This would produce following configuration:


where first port is election_port and second one leader_port. Both ports could be customized for each ZooKeeper instance.

class { 'zookeeper':
  election_port => 2889,
  leader_port   => 3889,
  servers       => {
    1 => '',
    2 => '',
    3 => '',


Observers were introduced in ZooKeeper 3.3.0. To enable this feature simply state which of ZooKeeper servers are observing:

class { 'zookeeper':
  servers   => ['', '', '', '', ''],
  observers => ['', '']

Note: Currently observer server needs to be listed between standard servers (this behavior might change in feature).

Set binding interface

By default ZooKeeper should bind to all interfaces. When you specify client_ip only single interface will be used. If $::ipaddress is not your public IP (e.g. you are using Docker) make sure to setup correct IP:

class { 'zookeeper':
  client_ip => $::ipaddress_eth0

or in Hiera:

zookeeper::client_ip: "%{::ipaddress_eth0}"

This is a workaround for a a Facter issue.

ZooKeeper service

Use service_provider to override Puppet detection for starting service.

class { 'zookeeper':
  service_provider    => 'init',
  manage_service_file => false,

Some reasonable values are:

  • init
  • systemd
  • runit
  • exhibitor - zookeeper process and config will be managed by exhibitor (https://github.com/soabase/exhibitor). Exhibitor is not managed by this module.
  • none - service won't be installed

Parameter manage_service_file controls whether service definition should be managed by Puppet (default: false). Currently supported for systemd and init.

Systemd Unit 'After' and 'Want' control

By default the module will create the following Unit section in /etc/systemd/system/multi-user.target.wants/zookeeper.service

Description=Apache ZooKeeper

Both After and Want (omitted when using the module defaults) can be controled using this module.

E.g on CentOS 7 those might have to be configured for 'netwrok-online.target' using the following syntax:

class { 'zookeeper':
   systemd_unit_after => 'network-online.target',
   systemd_unit_want => 'network-online.target',

Which will modify the Unit section to look like:

Description=Apache ZooKeeper


  • id - cluster-unique zookeeper's instance id (1-255)
  • datastore
  • datalogstore - specifying this configures the dataLogDir ZooKeeper config values and allows for transaction logs to be stored in a different location, improving IO performance
  • log_dir
  • purge_interval - automatically will delete ZooKeeper logs (available since ZooKeeper 3.4.0)
  • snap_retain_count - number of snapshots that will be kept after purging (since ZooKeeper 3.4.0)
  • min_session_timeout - the minimum session timeout in milliseconds that the server will allow the client to negotiate. Defaults to 2 times the tickTime (since ZooKeeper 3.3.0)
  • max_session_timeout - the maximum session timeout in milliseconds that the server will allow the client to negotiate. Defaults to 20 times the tickTime (since ZooKeeper 3.3.0)
  • global_outstanding_limit - ZooKeeper will throttle clients so that there is no more than global_outstanding_limit outstanding requests in the system.
  • manage_service (default: true) whether Puppet should ensure running service
  • manage_service_file when enabled on RHEL 7.0 a systemd config will be managed
  • ensure_account controls whether zookeeper user and group will be ensured (set to false to disable this feature)
  • install_method controls whether ZooKeeper is installed from binary (package) or source (archive) packages
  • archive_version allows to specify an arbitrary version of ZooKeeper when using source packages
  • archive_install_dir controls the installation directory when using source packages (defaults to /opt)
  • archive_symlink controls the name of a version-independent symlink when using source packages
  • archive_dl_url allows to change the download URL for source packages (defaults to apache.org)
  • systemd_path where to put systemd service files (applies only if manage_service_file and service_provider == 'systemd')
  • restart_on_change whether ZooKeeper service should be restarted on configuration files change (default: true)
  • remove_host_principal whether to remove host from Kerberos principal (default: false)
  • remove_realm_principal whether to remove relam from Kerberos principal (default: false)
  • whitelist_4lw Fine grained control over the set of commands ZooKeeper can execute (an array e.g. whitelist_4lw = ['*'])

and many others, see the params.pp file for more details.

If your distribution has multiple packages for ZooKeeper, you can provide all package names as an array.

class { 'zookeeper':
  packages => ['zookeeper', 'zookeeper-java']


ZooKeeper uses log4j, following variables can be configured:

class { 'zookeeper':
  console_threshold     => 'INFO',
  rollingfile_threshold => 'INFO',
  tracefile_threshold   => 'TRACE',
  maxfilesize           => '256MB',
  maxbackupindex        => 20,

Threshold supported values are: ALL, DEBUG, ERROR, FATAL, INFO, OFF, TRACE and WARN.



By default console, rolling file and trace logging can be configured. Additional log appenders (vulgo log methods) can be configured by adding a hash extra_appenders. The following sets up syslog logging and points the root logger towards syslog (note that you must have syslog listening on port 514/udp for this to work):

class { 'zookeeper':
  log4j_prop      => 'INFO,SYSLOG',
  extra_appenders => {
    'Syslog' => {
      'class'                    => 'org.apache.log4j.net.SyslogAppender',
      'layout'                   => 'org.apache.log4j.PatternLayout',
      'layout.conversionPattern' => "${hostname} zookeeper[id:%X{myid}] - %-5p [%t:%C{1}@%L][%x] - %m%n",
      'syslogHost'               => 'localhost',
      'facility'                 => 'user',

Hiera Support

All parameters could be defined in hiera files, e.g. common.yaml, Debian.yaml or zookeeper.yaml:

zookeeper::id: 1
zookeeper::client_port: 2181
zookeeper::datastore: '/var/lib/zookeeper'
zookeeper::datalogstore: '/disk2/zookeeper'

Cloudera package

In Cloudera distribution ZooKeeper package does not provide init scripts (same as in Debian). Package containing init scripts is called zookeeper-server and the service as well. Moreover there's initialization script which should be called after installation. So, the configuration might look like this:

class { 'zookeeper':
  packages             => ['zookeeper', 'zookeeper-server'],
  service_name         => 'zookeeper-server',
  initialize_datastore => true

Managing repository

For RedHat family currently we support also managing a cloudera yum repo versions 4, and 5. It can be enabled with repo parameter:

class { 'zookeeper':
  repo   => 'cloudera',
  cdhver => '5',

Custom RPM repository

Optionally you can specify a custom repository, using a hash configuration.

class { 'zookeeper':
  cdhver     => '5',
  repo       =>  {
    name  => 'myrepo',
    url   => 'http://cusom.url',
    descr => 'description'

Source package

Source packages provide the ability to install arbitrary versions of ZooKeeper on any platform. Note that you'll likely have to use the manage_service_file in order to be able to control the ZooKeeper service (because source packages do not install service files).

class { 'zookeeper':
  install_method  => 'archive',
  archive_version => '3.4.8',

Optionally you can specify a proxy_server:

class { 'zookeeper':
  install_method  => 'archive',
  archive_version => '3.4.8',
  proxy_server    => ''

Java installation

Default: false

By changing these two parameters you can ensure, that given Java package will be installed before ZooKeeper packages.

class { 'zookeeper':
  install_java => true,
  java_package => 'openjdk-7-jre-headless'


Librarian (recommended)

For puppet-librarian just add to Puppetfile

from Forge:

mod 'deric-zookeeper'

latest (development) version from GitHub

mod 'deric-zookeeper', git: 'git://github.com/deric/puppet-zookeeper.git'


If you are versioning your puppet conf with git just add it as submodule, from your repository root:

git submodule add git://github.com/deric/puppet-zookeeper.git modules/zookeeper


  • stdlib > 2.3.3 - function ensure_resources is required
  • puppet-archive > 0.4.4 - provides capabilities to use archives instead of binary packages

Acceptance testing

Fastest way is to run tests on prepared Docker images:

BEAKER_set=debian9-6.3 bundle exec rake acceptance

For examining system state set Beaker's ENV variable BEAKER_destroy=no:

BEAKER_destroy=no BEAKER_set=default bundle exec rake acceptance

and after finishing tests connect to container:

docker exec -it adoring_shirley bash

When host machine is NOT provisioned (puppet installed, etc.):

PUPPET_install=yes BEAKER_set=debian-8 bundle exec rake acceptance

Run on specific OS (see spec/acceptance/nodesets), to see available sets:

rake beaker:sets

Supported platforms

  • Debian/Ubuntu
  • RedHat/CentOS/Fedora

Tested on:

  • Debian (8, 9, 10)
  • Ubuntu (16.04, 18.04)
  • RHEL (6, 7)
  • CentOS (6, 7)