- From: "Gottesman, Eric" <
>
- To: Chef List <
>
- Subject: [chef] Re: Chef deregistration via an external client
- Date: Wed, 25 Feb 2015 18:29:43 +0000
- Accept-language: en-US
- Authentication-results: spf=none (sender IP is )
;
Could you maybe tail the autoscale logs instead, and have a more HA-oriented system (a Jenkins cluster maybe) run the deletes?
Disclaimer: I haven’t used AWS in a bit.
On Feb 24, 2015, at 8:01 AM, Ed Ropple <
">
> wrote:
Hi,
My use case is pretty straightforward: I have an auto-scaling group creating and destroying instances and I want to ensure that they are always properly removed from Chef. I cannot rely on the auto-scaled instances to de-register themselves because AWS
does not in all cases allow an instance to run any init.d or upstart jobs on system termination. But an auto-scaling group can send an SNS notification (chaining to an SQS queue), and so I'm trying--mostly failing at the moment--to have a "watchdog" machine,
equipped with Chef credentials, that can clean up the instances (`knife node delete` and `knife client delete`) recorded as terminated in this queue. I don't much like this strategy for cleanup, but it seems like my only option; suggestions, of course, are
greatly welcomed.
The `acls/containers` path is a new one on me, but looks promising. I can't find much documentation for it; Google keeps feeding me dead or domain-switched links to the Chef site and making navigation frustrating. Am I correct in intuiting that these are the
base permissions for all objects of the given class, such that if I add `dereg` to .delete.actors in acls/containers/clients.json that that will be honored across all newly instantiated clients?
Thanks for your help--I greatly appreciate it.
-Ed
|
Archive powered by MHonArc 2.6.16.