There may be a scenario where having a minion running in the context of the current, logged-in user would be useful. For example, the normal minion running under the service account would perform machine-wide, administrative tasks. The minion running under the user context could be launched when the user logs in and would be able to perform configuration tasks as if it were the user itself.
The steps required to do this are as follows:
Create new root_dir
Set root_dir permissions
Create directory structure
Write minion config
Start the minion
Register the minion as a service (optional)
Note
The Salt Project has created a powershell script that will configure an
additional minion on the system for you. It can be found in the root of the
Salt installation. The script is named multi-minion.ps1
. You can get
help on how to use the script by running the following in a PowerShell
prompt:
Get-Help .\multi-minion.ps1 -Detailed
The following guide explains these steps in more detail.
root_dir
¶The minion requires a root directory to store config, cache, logs, etc. The user
must have full permissions to this directory. The easiest way to do this is to
put the root_dir
in the Local AppData directory ($env:LocalAppData
).
New-Item -Path "$env:LocalAppData\Salt Project\Salt" -Type Directory
root_dir
permissions¶The user running Salt requires full access to the root_dir
. If you have
placed the root_dir in a location that the user does not have access to, you'll
need to give the user full permissions to that directory. Replace the
<placeholder variables> in this example with your own configuration information.
$RootDir = "<new root_dir location>"
$User = "<user running salt>"
$acl = Get-Acl -Path "$RootDir"
$access_rule = New-Object System.Security.AccessControl.FileSystemAccessRule($User, "Modify", "Allow")
$acl.AddAccessRule($access_rule)
Set-Acl -Path "$RootDir" -AclObject $acl
Salt expects a certain directory structure to be present to avoid unnecessary messages in the logs. This is usually handled by the installer. Since you're running your own instance, you need to do it. Make sure the following directories are present:
root_dir\conf\minion.d
root_dir\conf\pki
root_dir\var\log\salt
root_dir\var\run
root_dir\var\cache\salt\minion\extmods\grains
root_dir\var\cache\salt\minion\proc
$RootDir = "<new root_dir location>"
$cache_dir = "$RootDir\var\cache\salt\minion"
New-Item -Path "$RootDir\conf" -Type Directory
New-Item -Path "$RootDir\conf\minion.d" -Type Directory
New-Item -Path "$RootDir\conf\pki" -Type Directory
New-Item -Path "$RootDir\var\log\salt" -Type Directory
New-Item -Path "$RootDir\var\run" -Type Directory
New-Item -Path "$cache_dir\extmods\grains" -Type Directory
New-Item -Path "$cache_dir\proc" -Type Directory
The minion will need its own config, separate from the system minion config.
This config tells the minion where everything is located in the file structure
and also defines the master and minion id. Create a minion config file named
minion
in the conf directory.
New-Item -Path "$env:LocalAppData\Salt Project\Salt\conf\minion" -Type File
Make sure the config file has at least the following contents:
master: <ip address, dns name, etc>
id: <minion id>
root_dir: <root_dir>
log_file: <root_dir>\val\log\salt\minion
utils_dirs:
- <root_dir>\var\cache\salt\minion\extmods
winrepo_dir: <root_dir>\srv\salt\win\repo
winrepo_dir_ng: <root_dir>\srv\salt\win\repo-ng
file_roots:
base:
- <root_dir>\srv\salt
- <root_dir>\srv\spm\salt
pillar_roots:
base:
- <root_dir>\srv\pillar
- <root_dir>\srv\spm\pillar
thorium_roots:
base:
- <root_dir>\srv\thorium
Everything is now set up to run the minion. You can start the minion as you would normally, but you need to specify the full path to the config file you created above.
salt-minion.exe -c <root_dir>\conf
You can also register the minion as a service, but you need to understand the implications of doing so.
You will need to have administrator privileges to register this minion service.
You will need the password to the user account that will be running the minion.
If the user password changes, you will have to update the service definition to reflect the new password.
The minion runs all the time under the user context, whether that user is logged in or not.
This requires great trust from the user as the minion will be able to perform operations under the user's name without the user knowing, whether they are logged in or not.
If you decide to run the new minion under the Local System account, it might as well just be a normal minion.
The helper script does not support registering the second minion as a service.
To register the minion as a service, use the ssm.exe
binary that came with
the Salt installation. Run the following commands, replacing <service-name>
,
<root_dir>
, <user_name>
, and <password>
as necessary:
ssm.exe install <service-name> "salt-minion.exe" "-c `"<root_dir>\conf`" -l quiet"
ssm.exe set <service-name> Description "Salt Minion <user_name>"
ssm.exe set <service-name> Start SERVICE_AUTO_START
ssm.exe set <service-name> AppStopMethodConsole 24000
ssm.exe set <service-name> AppStopMethodWindow 2000
ssm.exe set <service-name> AppRestartDelay 60000
ssm.exe set <service-name> ObjectName ".\<user_name>" "<password>"