Skip to main content

puppet versus chef

I would like to learn more about both "products" and identify strengths or weaknesses of either product and hopefully come away with another useful skillset.  As an added bonus, I'll become more familiar with Ruby at some point along the way.

This is my initial write-up... which began 1 day after I decided to start looking into this particular challenge.
I anticipate I will have a much different perception in a few days or weeks.  Unfortunately the post will follow a somewhat familiar format.  The format helped me become informed when others used it, so I guess it makes sense that I would do the same.

One thing I have to comment on.. it's is amazing how pleasant the Puppet folks seem to be towards Chef, and vice-versa.  Makes me almost feel guilty picking one over the other. ;-)

Manuals and documentation
Winner: Puppet
So, using the Google, BarnesAndNoble.com and KindleStore I found the following:

Puppet - There are a few publications out there, available both electronically and in paper form.
  -- Pro Puppet (James Turnbull, Apress Publishing)
  -- Puppet 2.7 Cookbook (John Arundel, Packt Publishing)

Chef... not so much?
-- Test Driven Infrastructure with Chef (Stephen Nelson-Smith, O'Reilly Publishing)

So, to no fault of opscode, "chef" as it turns out is a difficult product name if you want differentiate yourself from the culinary folks.  Worse yet, when I searched the Kindle store for "opscode" - the Pro Puppet book was one of the 3 results (Test Driven Infrastructre and Configuration Managment - High Impact Strategies were the other 2)

"Programming Interface"
Winner: Chef
I know close to nothing about "writing code" in the real world.  I am probably rather good at shell scripting and I can throw some PHP together to do some cool stuff.
Both platforms claim you do not need to know how to "program" or need to have a lot of Ruby experience.  I declared Chef the winner because of Puppet's use of the DSL (a bit of an ironic choice words I used ;-).  Some claim that Chef's use of Ruby makes it more difficult to simply "get in there" and start using the product, as opposed to Puppet's DSL implementation of Ruby which has an easier learning curve.  Time will tell.

Current Customers
Winner: Puppet
It shouldn't be about "who you know...", but Puppet has some big names who have endorsed them.  Sun/Oracle, Rackspace, SugarCRM, Twitter -- All very huge players in the tech industry.

Employer Demand ;-)
Winner: Puppet
Let's check the job sites, shall we?

              ||  Puppet   ||   Chef
----------------------------------
Monster ||    126     ||      722
Dice       ||    298     ||     184
Well, again... the search string "Chef" returns a LOT of useless data!

Vendor Website
Winner: Puppet
Puppet has a much simpler layout/design which seems to get you more information about getting started and finding documentation.  Opscode appears to have more of a sales driven website.
http://puppetlabs.com/

http://www.opscode.com/chef/

Comments

Popular posts from this blog

P2V using dd for KVM-QEMU guest

Preface: I have certainly not exhaustively tested this process.  I had a specific need and found a specific solution that worked. Situation:  I was issued a shiny new laptop running Red Hat Enterprise Linux 7 (with Corp VPN, certs, Authentication configuration, etc...)  The image was great, but I needed more flexibility on my bare metal.  So, my goal was to P2V the corporate image so I could just run it as a VM. * Remove corporate drive and install new SSD * install corp drive in external USB-3 case * Install RHEL 7 on new SSD * dd old drive to a disk-image file in a temp location which will be an image which is the same size as your actual drive (unless you have enough space in your destination to contain a temp and converted image) * convert the raw disk-image to a qcow file while pushing it to the final location - this step should reduce the disk size - however, I believe it will only reduce/collapse zero-byte blocks (not just free space - i.e. if you de...

Sun USS 7100 foo

TIP: put ALL of your LUNs into a designated TARGET and INITIATOR group when you create them.  If you leave them in the "default" group, then everything that does an discovery against the array will find them :-( I'm struggling to recognize a reason that a default should even be present on the array. Also - who, exactly, is Sun trying to kid.  The USS is simply a box.. running Solaris .. with IPMP and ZFS.  Great.  If you have ever attempted to "break-in" or "p0wn" your IBM HMC, you know that there are people out there that can harden a box - then.. there's Sun.  After a recent meltdown at the office I had to get quite intimate with my USS 7110 and learned quite a bit.  Namely: there's a shell ;-) My current irritation is how they attempt to "warn you" away from using the shell (my coverage expired a long time ago to worry about that) and then how they try to hide things, poorly. I was curious as to what version of SunOS it ...

Extending SNMP to run arbitrary shell script

Why are we here... This is not likely something I would have pursued under normal circumstances.  I happen to be working for a customer/client who is not afforded a lot of flexibility to accomplish their goals.  In this case, the rigor is justified.  They have to sometimes be fairly creative with how they solve problems. In this case they would like to utilize an existing snmp implementation to execute a command (or shell script) on a remote system.  They came to me with the idea of using Net-SNMP extend. https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/sect-System_Monitoring_Tools-Net-SNMP-Extending.html NOTE:  This is NOT a good implementation strategy in the "real world"  it will simply allow you to test the functionality.  There are a TON of security implications which would need to be taken in to consideration. Implementation Steps: [root@rh7tst01 ~]# yum -y install net-snmp net-snmp-utils ...