Forge Home

hyperic_agent

Module for installing and managing VMWare vFabric Hyperic agent

8,685 downloads

8,220 latest version

4.1 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Support the Puppet Community by contributing to this module

You are welcome to contribute to this module by suggesting new features, currency updates, or fixes. Every contribution is valuable to help ensure that the module remains compatible with the latest Puppet versions and continues to meet community needs. Complete the following steps:

  1. Review the module’s contribution guidelines and any licenses. Ensure that your planned contribution aligns with the author’s standards and any legal requirements.
  2. Fork the repository on GitHub, make changes on a branch of your fork, and submit a pull request. The pull request must clearly document your proposed change.

For questions about updating the module, contact the module’s author.

Version information

  • 2.1.0 (latest)
  • 2.0.0
released Oct 18th 2015
This version is compatible with:
  • Puppet Enterprise >= 3.3.0 < 2015.3.0
  • Puppet >= 3.0.0 < 5.0.0
  • ,

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'petems-hyperic_agent', '2.1.0'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add petems-hyperic_agent
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install petems-hyperic_agent --version 2.1.0

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download

Documentation

petems/hyperic_agent — version 2.1.0 Oct 18th 2015

Hyperic Puppet Module

Build Status

Table of Contents

  1. Overview
  2. Module Description - What the module does and why it is useful
  3. Setup - The basics of getting started with hyperic
  4. Usage - Configuration options and additional functionality
  5. Reference - An under-the-hood peek at what the module is doing and how
  6. Limitations - OS compatibility, etc.
  7. Development - Guide for contributing to the module

Overview

This module is a refactored version of https://github.com/spacepants/puppet-hyperic. The change of namespace meant I changed it to a new module and added it to the forge.

Puppet module for installing, configuring, and managing VMWare's Hyperic OS & application monitoring agent from the official VMWare repository.

Module Description

This module manages the installation of the Hyperic agent and allows you to automatically deploy the latest version of the agent to your machines and configure the agent to report in to your server.

If you'd prefer, you can also disable the repo after the agent's been installed, or opt out of repo management altogether.

Note that you'll need your preferred distro of Java on the machine. While it isn't a direct dependency, the puppetlabs-java module works well for this purpose.

Setup

What hyperic affects

By default, this module will:

  • Create a hyperic user belonging to a vfabric group.
  • Install the appropriate rpm gpg key for the latest (5.3) vFabric version.
  • Set up the yum repository for vFabric 5.3.
  • Install the vFabric Hyperic agent.
  • Configure the agent.properties and agent.scu files.
  • Set up and enable the Hyperic agent service.

Beginning with hyperic

You'll need your preferred distro of Java on the machine. While it isn't a direct dependency, the puppetlabs-java module works well for this purpose.

By default, the Hyperic installer encrypts the agent password on first startup. By preencrypting both the password value in agent.properties and the key in agent.scu, we can ensure a stable value that puppet can manage. The included default parameters will set the password to its default of "hqadmin". To set this to the password for your server, you can either run

./bin/hq-agent.sh set-property agent.setup.camPword your-password-here

which will encrypt the appropriate values in agent.properties and agent.scu. Or you can just copy over values from one of your currently installed and configured machines.

Usage

This module includes a single class:

include 'hyperic_agent'

You'll more than likely want to provide the appropriate values for your server including, as mentioned above, the encrypted password and key which you can do like so:

class { 'hyperic_agent':
  server_ip      => '1.2.3.4',
  server_login   => 'hq-username',
  server_enc_pw  => 'encrypted-password-here',
  server_enc_key => 'your-encrypted-key-here',
}

You'll probably also want to specify your $JAVA_HOME path, which you can do like so:

class { 'hyperic_agent':
  java_home => '/your/path/to/jre'
}

You can specify which versions of vFabric or the Hyperic agent to install like so:

class { 'hyperic_agent':
  agent_version   => '4.6.6.1.EE-1',
  vfabric_version => '5.1',
}

You can specify a local mirror or alternative source of the repo like so:

class { 'hyperic_agent':
  repo_path => 'http://path.to.your.local/repo/',
}

To disable the repo once the agent's been installed, you can specify it like so: (Note that this will also change the package ensure parameter from 'latest' to 'present'.)

class { 'hyperic_agent':
  enable_repo => false,
}

To opt out of repo management altogether, you'd specify it like so:

class { 'hyperic_agent':
  manage_repo => false,
}

If your Hyperic setup is a beautiful, unique snowflake, you can customize pretty much any parameter in agent.properties you need to like so:

class { 'hyperic_agent':
  server_ip       => '1.2.3.4',
  server_port     => '1234',
  server_secure   => 'no',
  server_ssl_port => '5678',
  server_login    => 'hq-username',
  server_enc_pw   => 'encrypted-password-here',
  server_enc_key  => 'your-encrypted-key-here',
}

Reference

This module uses stahnma's really nice rpm gpg key checker, which checks to see if the gpg key is already installed, and if not, installs it.

Limitations

This module currently only works with vFabric version 5.1, 5.2, and 5.3 on RedHat and CentOS 5 and 6, and vFabric version 5 on RedHat and CentOS 5.

Development

If you'd like to other features or anything else, check out the contributing guidelines in CONTRIBUTING.md.