Skip to main content

Configuration management and implicit dependency setup for Docker containers in SaltStack.

Project description

Salt Container-Map

Configuration management and implicit dependency setup for Docker containers in SaltStack.

Project: https://github.com/merll/salt-container-map

Docs: Basic usage is provided in the state module. Details about container configurations are available in the docs for Docker-Map.

Overview

This package contains SaltStack modules for configuring Docker containers. They do not replace, but complement Salt’s built-in dockerio module in the following aspects:

  • Container dependencies that have to be followed during startup and shutdown do not have to be modelled via require or require_in. Instead, these are implicitly defined through their shared volumes and links.

  • For the purpose of sharing data between containers, virtual volumes can be created via a minimal runnable image (tianon/true obtained from the public Docker registry). These are considered during the dependency check and become adjusted with necessary file system permissions during startup.

  • When the configuration of a container is modified, the affected containers and their dependents can automatically be shut down and recreated.

  • Image updates can also result in an automated shutdown and recreation of containers and their dependents, without explicit watch or onchanges.

An example is documented in the state module.

Installation

Besides the usual package installation, a few simple post-installation steps are required. They are described in the docs.

Modules

Custom renderer

Container configurations can be set in both pillars and states. Pillars have the advantage that they are loaded automatically before any state (e.g. container_map.updated) or execution module uses it. Usually the disadvantage is that pillars cannot refer to other pillars. This package however provides a custom renderer lazy_yaml along with custom tags !pillar and !grain, which are resolved to their values on the minion just before the container maps and their configurations are instantiated.

By default, container maps are loaded from a pillar container_maps. This can be changed in the configuration by setting the configuration value container_map.pillar_name.

State and execution module

The modules distributed to the minions provide the functionality as outlined in the overview. A usage example is included in the state module documentation.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

salt-container-map-0.2.1.tar.gz (21.8 kB view details)

Uploaded Source

Built Distribution

salt_container_map-0.2.1-py2.7.egg (53.9 kB view details)

Uploaded Egg

File details

Details for the file salt-container-map-0.2.1.tar.gz.

File metadata

File hashes

Hashes for salt-container-map-0.2.1.tar.gz
Algorithm Hash digest
SHA256 3285d849bbd12ac9a3e7fce84ada37a7a19f53807b56b3c81a5df3bc53504bff
MD5 45191006458df8ed235faf1d945791db
BLAKE2b-256 33f39ad1409e0627d9b687da6e5c4c523887eeec4274a01a30a2b3e9dba2d085

See more details on using hashes here.

File details

Details for the file salt_container_map-0.2.1-py2.7.egg.

File metadata

File hashes

Hashes for salt_container_map-0.2.1-py2.7.egg
Algorithm Hash digest
SHA256 35bfa6a95108465fa4f34fa7d1959e4624c28dbec5608523c6eddbdc77771ded
MD5 75dc2d78cf3e26b881f59446897ae383
BLAKE2b-256 d03bd305d0c24a7202c845fb5413bd7a701ea00c126391088c7469af595b4926

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page