Open source Puppet 6.10

Puppet is configured in an agent-master architecture, in which a master node controls configuration information for a fleet of managed agent nodes.

Note: Previous versions of Puppet offered a standalone architecture, in which agents compiled their own catalogs using the Puppet apply application. We no longer recommend this configuration, because it's challenging to maintain and secure.  
Master-agent communication follows this pattern:
  1. An agent node sends facts to the master and requests a catalog.

  2. The master compiles and returns the node’s catalog using the sources of information the master has access to.

  3. The agent applies the catalog to the node by checking each resource the catalog describes. If it finds resources that are not in their desired state, it makes the changes necessary to correct them. Or, in no-op mode, it assesses what changes would be needed to reconcile the catalog.

  4. The agent sends a report back to the master.

Communication and security in agent-master installations

Masters and agents communicate by HTTPS using SSL certificates.

Puppet includes a built-in certificate authority for managing certificates. Agents automatically request certificates through the master’s HTTP endpoint, and you use the puppetserver ca command to inspect requests and sign new certificates.

If you leave us your email, we may contact you regarding your feedback. For more information on how Puppet uses your personal information, see our privacy policy.
Back to top
The page rank or the 1 our of 5 rating a user has given the page.
The email address of the user submitting feedback.
The URL of the page being ranked/rated.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Mobile
Tablet
Desktop
Wide
Extra Wide