Docs: Installing Puppet


Installing Puppet

Installing Puppet

This document covers open source releases of Puppet. See here for instructions on installing Puppet Enterprise.

Pre-Install

Check the following before you install Puppet.

OS/Ruby Version

Deployment Type

Decide on a deployment type before installing:

Agent/master
Agent nodes pull their configurations from a puppet master server. Admins must manage node certificates, but will only have to maintain manifests and modules on the puppet master server(s), and can more easily take advantage of features like reporting and external data sources.

You must decide in advance which server will be the master; install Puppet on it before installing on any agents. The master should be a dedicated machine with a fast processor, lots of RAM, and a fast disk.

Standalone
Every node compiles its own configuration from manifests. Admins must regularly sync Puppet manifests and modules to every node.

Network

In an agent/master deployment, you must prepare your network for Puppet’s traffic.

  • Firewalls: The puppet master server must allow incoming connections on port 8140, and agent nodes must be able to connect to the master on that port.
  • Name resolution: Every node must have a unique hostname. Forward and reverse DNS must both be configured correctly. Instructions for configuring DNS are beyond the scope of this guide. If your site lacks DNS, you must write an /etc/hosts file on each node.

Note: The default master hostname is puppet. Your agent nodes will be ready sooner if this hostname resolves to your puppet master.

Installing Puppet

The best way to install Puppet varies by operating system. Use the links below to skip to your OS’s instructions.


Enterprise Linux (and Derivatives)

These instructions apply to Enterprise Linux (EL) variants, including but not limited to:

  • Red Hat Enterprise Linux 5 and 6
  • CentOS 5 and 6
  • Scientific Linux 5 and 6
  • Ascendos 5 and 6

These distributions are also supported by Puppet Enterprise.

Users of out-of-production EL systems (i.e. RHEL 4) may need to compile their own copy of Ruby before installing, or use an older snapshot of EPEL.

1. Choose a Package Source

EL 5 and 6 releases can install Puppet from Puppet Labs’ official repo, or from EPEL.

Using Puppet Labs’ Packages

Puppet Labs provides an official package repo at yum.puppetlabs.com. It contains up-to-date packages, and can install Puppet and its prerequisites without requiring any other external repositories.

To use the Puppet Labs repo, follow the instructions here.

Using EPEL

The Extra Packages for Enterprise Linux (EPEL) repo includes Puppet and its prerequisites. These packages are usually older Puppet versions with security patches. As of April 2012, EPEL was shipping a Puppet version from the prior, maintenance-only release series.

To install Puppet from EPEL, follow EPEL’s own instructions for enabling their repository on all of your target systems.

2. Install the Puppet Master

Skip this step for a standalone deployment.

On your puppet master node, run sudo yum install puppet-server. This will install Puppet and an init script (/etc/init.d/puppetmaster) for running a test-quality puppet master server.

3. Install Puppet on Agent Nodes

On your other nodes, run sudo yum install puppet. This will install Puppet and an init script (/etc/init.d/puppet) for running the puppet agent daemon.

For a standalone deployment, install this same package on all nodes.

4. Configure and Enable

Continue reading here and follow any necessary post-install steps.


Debian and Ubuntu

These instructions apply to Debian, Ubuntu, and derived Linux distributions, including

  • Debian 6 “Squeeze” (current stable release) (also supported by Puppet Enterprise)
  • Debian “Wheezy” (current testing distribution)
  • Debian “Sid” (current unstable distribution)
  • Ubuntu 12.04 LTS “Precise Pangolin” (also supported by Puppet Enterprise)
  • Ubuntu 10.04 LTS “Lucid Lynx” (also supported by Puppet Enterprise)
  • Ubuntu 8.04 LTS “Hardy Heron”
  • Ubuntu 12.10 “Quantal Quetzal”
  • Ubuntu 11.10 “Oneiric Ocelot”

Users of out-of-production versions may have vendor packages of Puppet available, but cannot use the Puppet Labs packages.

1. Choose a Package Source

Debian and Ubuntu systems can install Puppet from Puppet Labs’ official repo, or from the OS vendor’s default repo.

Using Puppet Labs’ Packages

Puppet Labs provides an official package repo at apt.puppetlabs.com. It contains up-to-date packages, and can install Puppet and its prerequisites without requiring any other external repositories.

To use the Puppet Labs repo, follow the instructions here.

Using Vendor Packages

Debian and Ubuntu distributions include Puppet in their default package repos. No extra steps are necessary to enable it.

Older OS versions will have outdated Puppet versions, which are updated only with security patches. As of April 2012:

  • Debian unstable’s Puppet was current.
  • Debian testing’s Puppet was nearly current (one point release behind the current version).
  • Debian stable’s Puppet was more than 18 months old, with additional security patches.
  • The latest Ubuntu’s Puppet was nearly current (one point release behind).
  • The prior (non-LTS) Ubuntu’s Puppet was nine months old, with additional security patches.
  • The prior LTS Ubuntu’s Puppet was more than two years old, with additional security patches.

2. Install the Puppet Master

Skip this step for a standalone deployment.

On your puppet master node, run sudo apt-get install puppetmaster. This will install Puppet, its prerequisites, and an init script (/etc/init.d/puppetmaster) for running a test-quality puppet master server.

If you are using vendor packages, a puppetmaster-passenger package may be available. If you install this package instead of puppetmaster, it will automatically configure a production-capacity web server for the Puppet master, using Passenger and Apache. In this configuration, do not use the puppetmaster init script; instead, control the puppet master by turning the Apache web server on and off or by disabling the puppet master vhost.

3. Install Puppet on Agent Nodes

On your other nodes, run sudo apt-get install puppet. This will install Puppet and an init script (/etc/init.d/puppet) for running the puppet agent daemon.

For a standalone deployment, run sudo apt-get install puppet-common on all nodes instead. This will install Puppet without the agent init script.

4. Configure and Enable

Continue reading here and follow any necessary post-install steps.


Fedora

These instructions apply to Fedora releases, including:

  • Fedora 17
  • Fedora 16

Users of out-of-production versions may have vendor packages of Puppet available, but cannot use the Puppet Labs packages.

1. Choose a Package Source

Fedora systems can install Puppet from Puppet Labs’ official repo, or from the OS vendor’s default repo.

Using Puppet Labs’ Packages

Puppet Labs provides an official package repo at yum.puppetlabs.com. It contains up-to-date packages, and can install Puppet and its prerequisites without requiring any other external repositories.

To use the Puppet Labs repo, follow the instructions here.

Using Vendor Packages

Fedora includes Puppet in its default package repos. No extra steps are necessary to enable it.

These packages are usually older Puppet versions with security patches. As of April 2012, both current releases of Fedora had Puppet versions from the prior, maintenance-only release series.

2. Install the Puppet Master

Skip this step for a standalone deployment.

On your puppet master node, run sudo yum install puppet-server. This will install Puppet and an init script (/etc/init.d/puppetmaster) for running a test-quality puppet master server.

3. Install Puppet on Agent Nodes

On your other nodes, run sudo yum install puppet. This will install Puppet and an init script (/etc/init.d/puppet) for running the puppet agent daemon.

For a standalone deployment, install this same package on all nodes.

4. Configure and Enable

Continue reading here and follow any necessary post-install steps.


Mac OS X

1. Download the Package

OS X users should install Puppet with official Puppet Labs packages. Download them here. You will need:

  • The most recent Facter package
  • The most recent Hiera package
  • The most recent Puppet package

2. Install Facter

Mount the Facter disk image, and run the installer package it contains.

3. Install Hiera

Mount the Hiera disk image, and run the installer package it contains.

4. Install Puppet

Mount the Puppet disk image, and run the installer package it contains.

5. Configure and Enable

The OS X packages are currently fairly minimal, and do not create launchd jobs, users, or default configuration or manifest files. You will have to:

  • Manually create a puppet group, by running sudo puppet resource group puppet ensure=present.
  • Manually create a puppet user, by running sudo puppet resource user puppet ensure=present gid=puppet shell='/sbin/nologin'.
  • If you intend to run the puppet agent daemon regularly, or if you intend to automatically run puppet apply at a set interval, you must create and register your own launchd services. See the post-installation instructions for a model.

Continue reading here and follow any necessary post-install steps.


Windows

See the Windows installation instructions.


On *nix platforms without native packages available, you can install Puppet with Ruby’s gem package manager.

1. Ensure Prerequisites are Installed

Use your OS’s package tools to install both Ruby and RubyGems. In some cases, you may need to compile and install these yourself.

On Linux platforms, you should also ensure that the LSB tools are installed; at a minimum, we recommend installing lsb_release. See your OS’s documentation for details about its LSB tools.

2. Install Puppet

To install Puppet and Facter, run:

$ sudo gem install puppet

3. Configure and Enable

Installing with gem requires some additional steps:

  • Manually create a puppet group, by running sudo puppet resource group puppet ensure=present.
  • Manually create a puppet user, by running sudo puppet resource user puppet ensure=present gid=puppet shell='/sbin/nologin'.
  • Create and install init scripts for the puppet agent and/or puppet master services. See the ext/ directory in the Puppet source for example init scripts (Red Hat, Debian, SUSE, systemd, FreeBSD, Gentoo, Solaris).
  • Manually create an /etc/puppet/puppet.conf file.
  • Locate the Puppet source on disk, and manually copy the auth.conf file from the /conf directory to /etc/puppet/auth.conf.
  • If you get the error require: no such file to load when trying to run Puppet, define the RUBYOPT environment variable as advised in the post-install instructions of the RubyGems User Guide.

Continue reading here and follow any necessary post-install steps.


This is almost never recommended, but may be necessary in some cases.

1. Ensure Prerequisites are Installed

Use your OS’s package tools to install Ruby. In some cases, you may need to compile and install it yourself.

On Linux platforms, you should also ensure that the LSB tools are installed; at a minimum, we recommend installing lsb_release. See your OS’s documentation for details about its LSB tools.

If you wish to use Puppet ≥ 3.2 with parser = future enabled, you should also install the rgen gem.

2. Download Puppet and Facter

  • Download Puppet here.
  • Download Facter here.

3. Install Facter

Unarchive the Facter tarball, navigate to the resulting directory, and run:

$ sudo ruby install.rb

4. Install Puppet

Unarchive the Puppet tarball, navigate to the resulting directory, and run:

$ sudo ruby install.rb

5. Configure and Enable

Installing from a tarball requires some additional steps:

  • Manually create a puppet group, by running sudo puppet resource group puppet ensure=present.
  • Manually create a puppet user, by running sudo puppet resource user puppet ensure=present gid=puppet shell='/sbin/nologin'.
  • Create and install init scripts for the puppet agent and/or puppet master services. See the ext/ directory in the Puppet source for example init scripts (Red Hat, Debian, SUSE, systemd, FreeBSD, Gentoo, Solaris).
  • Manually create an /etc/puppet/puppet.conf file.

Continue reading here and follow any necessary post-install steps.


This is recommended only for developers and testers.

See Running Puppet from Source.


Post-Install

Perform the following tasks after you finish installing Puppet.

Configure Puppet

Puppet’s main configuration file is found at /etc/puppet/puppet.conf. See Configuring Puppet for more details.

Most users should specify the following settings:

On Agent Nodes

Settings for agent nodes should go in the [agent] or [main] block of puppet.conf.

  • server: The hostname of your puppet master server. Defaults to puppet.
  • report: Most users should set this to true.
  • pluginsync: Most users should set this to true.
  • certname: The sitewide unique identifier for this node. Defaults to the node’s fully qualified domain name, which is usually fine.

On Puppet Masters

Settings for puppet master servers should go in the [master] or [main] block of puppet.conf.

Note: puppet masters are usually also agent nodes; settings in [main] will be available to both services, and settings in the [master] and [agent] blocks will override the settings in [main].

  • dns_alt_names: A list of valid hostnames for the master, which will be embedded in its certificate. Defaults to the puppet master’s certname and puppet, which is usually fine. If you are using a non-default setting, set it before starting the puppet master for the first time.

On Standalone Nodes

Settings for standalone puppet nodes should go in the [main] block of puppet.conf.

Puppet’s default settings are generally appropriate for standalone nodes. No additional configuration is necessary unless you intend to use centralized reporting or an external node classifier.

Start and Enable the Puppet Services

Some packages do not automatically start the puppet services after installing the software. You may need to start them manually in order to use Puppet.

With Init Scripts

Most packages create init scripts called puppet and puppetmaster, which run the puppet agent and puppet master services.

You can start and permanently enable these services using Puppet:

$ sudo puppet resource service puppet ensure=running enable=true
$ sudo puppet resource service puppetmaster ensure=running enable=true

Note: If you have configured puppet master to use a production web server, do not use the default init script; instead, start and stop the web server that is managing the puppet master service.

With Cron

Standalone deployments do not use services with init scripts; instead, they require a cron task to regularly run puppet apply on a main manifest (usually the same /etc/puppet/manifests/site.pp manifest that puppet master uses). You can create this cron job with Puppet:

$ sudo puppet resource cron puppet-apply ensure=present user=root minute=30 command='/usr/bin/puppet apply $(puppet --configprint manifest)'

In an agent/master deployment, you may wish to run puppet agent with cron rather than its init script; this can sometimes perform better and use less memory. You can create this cron job with Puppet:

$ sudo puppet resource cron puppet-agent ensure=present user=root minute=30 command='/usr/bin/puppet agent --onetime --no-daemonize --splay'

With Launchd

Apple recommends you use launchd to manage the execution of services and daemons. You can define a launchd service with XML property lists (plists), and manage it with the launchctl command line utility. If you’d like to use launchd to manage execution of your puppet master or agent, download the following files and copy each into /Library/LaunchDaemons/:

Set the correct owner and permissions on the files. Both must be owned by the root user and both must be writable only by the root user:

$ sudo chown root:wheel /Library/LaunchDaemons/com.puppetlabs.puppet.plist
$ sudo chmod 644 /Library/LaunchDaemons/com.puppetlabs.puppet.plist
$ sudo chown root:wheel /Library/LaunchDaemons/com.puppetlabs.puppetmaster.plist
$ sudo chmod 644 /Library/LaunchDaemons/com.puppetlabs.puppetmaster.plist

Make launchd aware of the new services:

$ sudo launchctl load -w /Library/LaunchDaemons/com.puppetlabs.puppet.plist
$ sudo launchctl load -w /Library/LaunchDaemons/com.puppetlabs.puppetmaster.plist

Note that the files we provide here are responsible only for initial launch of a puppet master or puppet agent at system start. How frequently each conducts a run is determined by Puppet’s configuration, not the plists.

See the OS X launchctl man page for more information on how to stop, start, and manage launchd jobs.

Sign Node Certificates

In an agent/master deployment, an admin must approve a certificate request for each agent node before that node can fetch configurations. Agent nodes will request certificates the first time they attempt to run.

  • Periodically log into the puppet master server and run sudo puppet cert list to view outstanding requests.
  • Run sudo puppet cert sign <NAME> to sign a request, or sudo puppet cert sign --all to sign all pending requests.

An agent node whose request has been signed on the master will run normally on its next attempt.

Change Puppet Master’s Web Server

In an agent/master deployment, you must configure the puppet master to run under a scalable web server after you have done some reasonable testing. The default web server is simpler to configure and better for testing, but cannot support real-life workloads.

A replacement web server can be configured at any time, and does not affect the configuration of agent nodes.

Next

Now that you have installed and configured Puppet:

Learn to Use Puppet

If you have not used Puppet before, you should read the Learning Puppet series and experiment, either with the Learning Puppet VM or with your own machines. This series will introduce the concepts underpinning Puppet, and will guide you through the process of writing Puppet code, using modules, and classifying nodes.

Install Optional Software

You can extend and improve Puppet with other software:

  • Puppet Dashboard is an open-source report analyzer, node classifier, and web GUI for Puppet.
  • The stdlib module adds extra functions, an easier way to write custom facts, and more.
  • For Puppet 2.6 and 2.7, the Hiera data lookup tool can help you separate your data from your Puppet manifests and write cleaner code.
  • User-submitted modules that solve common problems are available at the Puppet Forge. Search here first before writing a new Puppet module from scratch; you can often find something that matches your need or can be quickly hacked to do so.

↑ Back to top