Forge Home


Module for managing Apache Zookeeper


1,752 latest version

5.0 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Version information

  • 1.5.0 (latest)
  • 1.4.0
  • 1.3.0
  • 1.2.1
  • 1.2.0
  • 1.1.0
  • 1.0.0
  • 0.8.7
  • 0.8.6
  • 0.8.5
  • 0.8.4
  • 0.8.3
  • 0.8.2
  • 0.8.1
  • 0.8.0
  • 0.7.7
  • 0.7.6
  • 0.7.5
  • 0.7.4
  • 0.7.3
  • 0.7.2
  • 0.7.1
  • 0.7.0
  • 0.6.1
  • 0.6.0
  • 0.5.5
  • 0.5.4
  • 0.5.3
  • 0.5.2
  • 0.5.1
  • 0.5.0
  • 0.4.2
  • 0.4.1
  • 0.4.0
  • 0.3.9
  • 0.3.8
  • 0.3.7
  • 0.3.6
  • 0.3.5
  • 0.3.4
  • 0.3.3
  • 0.3.2
  • 0.3.1
  • 0.3.0
  • 0.2.4
  • 0.2.3
released Aug 8th 2023
This version is compatible with:
  • Puppet Enterprise 2023.7.x, 2023.6.x, 2023.5.x, 2023.4.x, 2023.3.x, 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x, 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x
  • Puppet >= 6.1.0 < 9.0.0
  • , , , , ,

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'deric-zookeeper', '1.5.0'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add deric-zookeeper
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install deric-zookeeper --version 1.5.0

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Tags: zookeeper


deric/zookeeper — version 1.5.0 Aug 8th 2023


Forge Static & Spec Tests Puppet Forge

A puppet receipt for Apache Zookeeper. ZooKeeper is a high-performance coordination service for maintaining configuration information, naming, providing distributed synchronization, and providing group services.


  • Puppet
  • Binary or ZooKeeper source code archive

Basic Usage:

class { 'zookeeper': }

Cluster setup

When running ZooKeeper in the distributed mode each node must have unique ID (1-255). The easiest way how to setup multiple ZooKeepers, is by using Hiera.


zookeeper::id: '1'


zookeeper::id: '2'


zookeeper::id: '3'

A ZooKeeper quorum should consist of odd number of nodes (usually 3 or 5). For defining a quorum it is enough to list all IP addresses of all its members.

class { 'zookeeper':
  servers => {
    1 => '',
    2 => '',
    3 => '',

In case that an array is passed as servers, first ZooKeeper will be assigned ID = 1. This would produce following configuration:


where first port is election_port and second one leader_port. Both ports could be customized for each ZooKeeper instance.

class { 'zookeeper':
  election_port => 2889,
  leader_port   => 3889,
  servers       => {
    1 => '',
    2 => '',
    3 => '',


Observers were introduced in ZooKeeper 3.3.0. To enable this feature simply state which of ZooKeeper servers are observing:

class { 'zookeeper':
  servers   => ['', '', '', '', ''],
  observers => ['', '']

Note: Currently observer server needs to be listed between standard servers (this behavior might change in feature).

Set binding interface

By default ZooKeeper should bind to all interfaces. When you specify client_ip only single interface will be used. If $::ipaddress is not your public IP (e.g. you are using Docker) make sure to setup correct IP:

class { 'zookeeper':
  client_ip => $::ipaddress_eth0

or in Hiera:

zookeeper::client_ip: "%{::ipaddress_eth0}"

This is a workaround for a a Facter issue.

ZooKeeper service

Use service_provider to override Puppet detection for starting service.

class { 'zookeeper':
  service_provider    => 'init',
  manage_service_file => false,

Some reasonable values are:

  • init
  • systemd
  • runit
  • exhibitor - zookeeper process and config will be managed by exhibitor ( Exhibitor is not managed by this module.
  • none - service won't be installed

Parameter manage_service_file controls whether service definition should be managed by Puppet (default: false). Currently supported for systemd and init.

Systemd Unit 'After' and 'Want' control

By default the module will create the following Unit section in /etc/systemd/system/

Description=Apache ZooKeeper

Both After and Want (omitted when using the module defaults) can be controled using this module.

E.g on CentOS 7 those might have to be configured for '' using the following syntax:

class { 'zookeeper':
   systemd_unit_after => '',
   systemd_unit_want => '',

Which will modify the Unit section to look like:

Description=Apache ZooKeeper


  • id - cluster-unique zookeeper's instance id (1-255)
  • datastore
  • datalogstore - Defining dataLogDir allows ZooKeeper transaction logs to be stored in a different location, might improve I/O performance (e.g. if path is mounted on dedicated disk)
  • log_dir
  • purge_interval - automatically will delete ZooKeeper logs (available since ZooKeeper 3.4.0)
  • snap_retain_count - number of snapshots that will be kept after purging (since ZooKeeper 3.4.0)
  • min_session_timeout - the minimum session timeout in milliseconds that the server will allow the client to negotiate. Defaults to 2 times the tickTime (since ZooKeeper 3.3.0)
  • max_session_timeout - the maximum session timeout in milliseconds that the server will allow the client to negotiate. Defaults to 20 times the tickTime (since ZooKeeper 3.3.0)
  • global_outstanding_limit - ZooKeeper will throttle clients so that there is no more than global_outstanding_limit outstanding requests in the system.
  • manage_service (default: true) whether Puppet should ensure running service
  • manage_service_file when enabled on RHEL 7.0 a systemd config will be managed
  • ensure_account controls whether zookeeper user and group will be ensured (set to false to disable this feature)
  • install_method controls whether ZooKeeper is installed from binary (package) or source (archive) packages
  • archive_version allows to specify an arbitrary version of ZooKeeper when using source packages
  • archive_install_dir controls the installation directory when using source packages (defaults to /opt)
  • archive_symlink controls the name of a version-independent symlink when using source packages
  • archive_dl_url allows to change the download URL for source packages (defaults to
  • systemd_path where to put systemd service files (applies only if manage_service_file and service_provider == 'systemd')
  • restart_on_change whether ZooKeeper service should be restarted on configuration files change (default: true)
  • remove_host_principal whether to remove host from Kerberos principal (default: false)
  • remove_realm_principal whether to remove relam from Kerberos principal (default: false)
  • whitelist_4lw Fine grained control over the set of commands ZooKeeper can execute (an array e.g. whitelist_4lw = ['*'])

and many others, see the params.pp file for more details.

If your distribution has multiple packages for ZooKeeper, you can provide all package names as an array.

class { 'zookeeper':
  packages => ['zookeeper', 'zookeeper-java']


ZooKeeper uses log4j, following variables can be configured:

class { 'zookeeper':
  console_threshold     => 'INFO',
  rollingfile_threshold => 'INFO',
  tracefile_threshold   => 'TRACE',
  maxfilesize           => '256MB',
  maxbackupindex        => 20,

Threshold supported values are: ALL, DEBUG, ERROR, FATAL, INFO, OFF, TRACE and WARN.



By default console, rolling file and trace logging can be configured. Additional log appenders (vulgo log methods) can be configured by adding a hash extra_appenders. The following sets up syslog logging and points the root logger towards syslog (note that you must have syslog listening on port 514/udp for this to work):

class { 'zookeeper':
  log4j_prop      => 'INFO,SYSLOG',
  extra_appenders => {
    'Syslog' => {
      'class'                    => '',
      'layout'                   => 'org.apache.log4j.PatternLayout',
      'layout.conversionPattern' => "${hostname} zookeeper[id:%X{myid}] - %-5p [%t:%C{1}@%L][%x] - %m%n",
      'syslogHost'               => 'localhost',
      'facility'                 => 'user',

Hiera Support

All parameters could be defined in hiera files, e.g. common.yaml, Debian.yaml or zookeeper.yaml:

zookeeper::id: 1
zookeeper::client_port: 2181
zookeeper::datastore: '/var/lib/zookeeper'
zookeeper::datalogstore: '/disk2/zookeeper'

Custom RPM repository

Optionally you can specify a custom repository, using a hash configuration.

class { 'zookeeper':
  repo       =>  {
    name      => 'myrepo',
    url       => 'http://custom.url',
    descr     => 'description'
    sslverify => 1,
    gpgcheck  => true,

Source package

Source packages provide the ability to install arbitrary versions of ZooKeeper on any platform. Note that you'll likely have to use the manage_service_file in order to be able to control the ZooKeeper service (because source packages do not install service files).

class { 'zookeeper':
  install_method  => 'archive',
  archive_version => '3.4.8',

Optionally you can specify a proxy_server:

class { 'zookeeper':
  install_method  => 'archive',
  archive_version => '3.4.8',
  proxy_server    => ''

Java installation

Default: false

By changing these two parameters you can ensure, that given Java package will be installed before ZooKeeper packages.

class { 'zookeeper':
  install_java => true,
  java_package => 'openjdk-7-jre-headless'


Librarian (recommended)

For puppet-librarian just add to Puppetfile

from Forge:

mod 'deric-zookeeper'

latest (development) version from GitHub

mod 'deric-zookeeper', git: 'git://'


If you are versioning your puppet conf with git just add it as submodule, from your repository root:

git submodule add git:// modules/zookeeper


  • stdlib > 2.3.3 - function ensure_resources is required
  • puppet-archive > 0.4.4 - provides capabilities to use archives instead of binary packages

Acceptance testing

Fastest way is to run tests on prepared Docker images:

BEAKER_set=debian9-6.3 bundle exec rake acceptance

For examining system state set Beaker's ENV variable BEAKER_destroy=no:

BEAKER_destroy=no BEAKER_set=default bundle exec rake acceptance

and after finishing tests connect to container:

docker exec -it adoring_shirley bash

When host machine is NOT provisioned (puppet installed, etc.):

PUPPET_install=yes BEAKER_set=debian-8 bundle exec rake acceptance

Run on specific OS (see spec/acceptance/nodesets), to see available sets:

rake beaker:sets

Supported platforms

  • Debian/Ubuntu
  • RedHat/CentOS/Fedora/Rocky

Tested on:

  • Debian (8, 9, 10)
  • Ubuntu (16.04, 18.04)
  • RHEL (6, 7)
  • CentOS (6, 7)
  • SLES (12)