puppet 6.22.1-x64-mingw32 → 6.23.0-x64-mingw32
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of puppet might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/Gemfile.lock +14 -14
- data/ext/osx/puppet.plist +2 -0
- data/lib/puppet/application/agent.rb +12 -5
- data/lib/puppet/application/apply.rb +2 -1
- data/lib/puppet/application/device.rb +2 -1
- data/lib/puppet/application/resource.rb +2 -1
- data/lib/puppet/application/script.rb +2 -1
- data/lib/puppet/configurer/downloader.rb +2 -1
- data/lib/puppet/defaults.rb +5 -3
- data/lib/puppet/file_serving/fileset.rb +14 -2
- data/lib/puppet/functions/all.rb +1 -1
- data/lib/puppet/functions/camelcase.rb +1 -1
- data/lib/puppet/functions/capitalize.rb +2 -2
- data/lib/puppet/functions/downcase.rb +2 -2
- data/lib/puppet/functions/get.rb +5 -5
- data/lib/puppet/functions/group_by.rb +13 -5
- data/lib/puppet/functions/lest.rb +1 -1
- data/lib/puppet/functions/new.rb +100 -100
- data/lib/puppet/functions/partition.rb +4 -4
- data/lib/puppet/functions/require.rb +5 -5
- data/lib/puppet/functions/sort.rb +3 -3
- data/lib/puppet/functions/tree_each.rb +7 -9
- data/lib/puppet/functions/type.rb +4 -4
- data/lib/puppet/functions/upcase.rb +2 -2
- data/lib/puppet/http/resolver/server_list.rb +15 -4
- data/lib/puppet/http/service/compiler.rb +69 -0
- data/lib/puppet/http/service/file_server.rb +2 -1
- data/lib/puppet/indirector/catalog/compiler.rb +1 -0
- data/lib/puppet/indirector/file_metadata/rest.rb +1 -0
- data/lib/puppet/parser/functions/fqdn_rand.rb +14 -6
- data/lib/puppet/pops/types/p_sem_ver_type.rb +8 -2
- data/lib/puppet/pops/types/p_sensitive_type.rb +10 -0
- data/lib/puppet/provider/package/nim.rb +11 -6
- data/lib/puppet/provider/service/systemd.rb +13 -3
- data/lib/puppet/provider/service/windows.rb +38 -0
- data/lib/puppet/provider/user/directoryservice.rb +25 -12
- data/lib/puppet/reference/configuration.rb +1 -1
- data/lib/puppet/transaction/additional_resource_generator.rb +1 -1
- data/lib/puppet/type/file.rb +19 -1
- data/lib/puppet/type/file/selcontext.rb +1 -1
- data/lib/puppet/type/service.rb +18 -38
- data/lib/puppet/type/tidy.rb +21 -2
- data/lib/puppet/type/user.rb +38 -20
- data/lib/puppet/util/selinux.rb +30 -4
- data/lib/puppet/version.rb +1 -1
- data/locales/puppet.pot +109 -101
- data/man/man5/puppet.conf.5 +272 -252
- data/man/man8/puppet-agent.8 +1 -1
- data/man/man8/puppet-apply.8 +1 -1
- data/man/man8/puppet-catalog.8 +1 -1
- data/man/man8/puppet-config.8 +1 -1
- data/man/man8/puppet-describe.8 +1 -1
- data/man/man8/puppet-device.8 +1 -1
- data/man/man8/puppet-doc.8 +1 -1
- data/man/man8/puppet-epp.8 +1 -1
- data/man/man8/puppet-facts.8 +1 -1
- data/man/man8/puppet-filebucket.8 +1 -1
- data/man/man8/puppet-generate.8 +1 -1
- data/man/man8/puppet-help.8 +1 -1
- data/man/man8/puppet-key.8 +1 -1
- data/man/man8/puppet-lookup.8 +1 -1
- data/man/man8/puppet-man.8 +1 -1
- data/man/man8/puppet-module.8 +1 -1
- data/man/man8/puppet-node.8 +1 -1
- data/man/man8/puppet-parser.8 +1 -1
- data/man/man8/puppet-plugin.8 +1 -1
- data/man/man8/puppet-report.8 +1 -1
- data/man/man8/puppet-resource.8 +1 -1
- data/man/man8/puppet-script.8 +1 -1
- data/man/man8/puppet-ssl.8 +1 -1
- data/man/man8/puppet-status.8 +1 -1
- data/man/man8/puppet.8 +2 -2
- data/spec/fixtures/ssl/127.0.0.1-key.pem +107 -57
- data/spec/fixtures/ssl/127.0.0.1.pem +52 -31
- data/spec/fixtures/ssl/bad-basic-constraints.pem +57 -35
- data/spec/fixtures/ssl/bad-int-basic-constraints.pem +57 -35
- data/spec/fixtures/ssl/ca.pem +57 -35
- data/spec/fixtures/ssl/crl.pem +28 -18
- data/spec/fixtures/ssl/ec-key.pem +11 -11
- data/spec/fixtures/ssl/ec.pem +33 -24
- data/spec/fixtures/ssl/encrypted-ec-key.pem +12 -12
- data/spec/fixtures/ssl/encrypted-key.pem +108 -58
- data/spec/fixtures/ssl/intermediate-agent-crl.pem +28 -19
- data/spec/fixtures/ssl/intermediate-agent.pem +57 -36
- data/spec/fixtures/ssl/intermediate-crl.pem +31 -21
- data/spec/fixtures/ssl/intermediate.pem +57 -36
- data/spec/fixtures/ssl/pluto-key.pem +107 -57
- data/spec/fixtures/ssl/pluto.pem +52 -30
- data/spec/fixtures/ssl/request-key.pem +107 -57
- data/spec/fixtures/ssl/request.pem +47 -26
- data/spec/fixtures/ssl/revoked-key.pem +107 -57
- data/spec/fixtures/ssl/revoked.pem +52 -30
- data/spec/fixtures/ssl/signed-key.pem +107 -57
- data/spec/fixtures/ssl/signed.pem +52 -30
- data/spec/fixtures/ssl/tampered-cert.pem +52 -30
- data/spec/fixtures/ssl/tampered-csr.pem +47 -26
- data/spec/fixtures/ssl/unknown-127.0.0.1-key.pem +107 -57
- data/spec/fixtures/ssl/unknown-127.0.0.1.pem +50 -29
- data/spec/fixtures/ssl/unknown-ca-key.pem +107 -57
- data/spec/fixtures/ssl/unknown-ca.pem +55 -33
- data/spec/integration/application/resource_spec.rb +30 -0
- data/spec/lib/puppet/test_ca.rb +2 -2
- data/spec/unit/application/agent_spec.rb +7 -2
- data/spec/unit/configurer/downloader_spec.rb +6 -0
- data/spec/unit/configurer_spec.rb +23 -0
- data/spec/unit/file_serving/fileset_spec.rb +60 -0
- data/spec/unit/gettext/config_spec.rb +12 -0
- data/spec/unit/http/service/compiler_spec.rb +123 -0
- data/spec/unit/indirector/catalog/compiler_spec.rb +14 -10
- data/spec/unit/parser/functions/fqdn_rand_spec.rb +15 -1
- data/spec/unit/pops/types/p_sem_ver_type_spec.rb +18 -0
- data/spec/unit/pops/types/p_sensitive_type_spec.rb +18 -0
- data/spec/unit/provider/package/nim_spec.rb +42 -0
- data/spec/unit/provider/service/init_spec.rb +1 -0
- data/spec/unit/provider/service/openwrt_spec.rb +3 -1
- data/spec/unit/provider/service/systemd_spec.rb +42 -8
- data/spec/unit/provider/service/windows_spec.rb +202 -0
- data/spec/unit/provider/user/directoryservice_spec.rb +67 -35
- data/spec/unit/ssl/state_machine_spec.rb +19 -5
- data/spec/unit/transaction/additional_resource_generator_spec.rb +0 -2
- data/spec/unit/transaction_spec.rb +18 -20
- data/spec/unit/type/file/selinux_spec.rb +3 -3
- data/spec/unit/type/service_spec.rb +59 -188
- data/spec/unit/type/tidy_spec.rb +17 -7
- data/spec/unit/type/user_spec.rb +45 -0
- data/spec/unit/util/selinux_spec.rb +87 -16
- data/tasks/generate_cert_fixtures.rake +2 -2
- metadata +4 -2
data/man/man5/puppet.conf.5
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
.\" generated with Ronn/v0.7.3
|
2
2
|
.\" http://github.com/rtomayko/ronn/tree/0.7.3
|
3
3
|
.
|
4
|
-
.TH "PUPPETCONF" "5" "
|
4
|
+
.TH "PUPPETCONF" "5" "June 2021" "Puppet, Inc." "Puppet manual"
|
5
5
|
\fBThis page is autogenerated; any changes will get overwritten\fR
|
6
6
|
.
|
7
7
|
.SH "Configuration settings"
|
@@ -42,7 +42,7 @@ See the configuration guide \fIhttps://puppet\.com/docs/puppet/latest/config_abo
|
|
42
42
|
A lock file to indicate that a puppet agent catalog run is currently in progress\. The file contains the pid of the process that holds the lock on the catalog run\.
|
43
43
|
.
|
44
44
|
.IP "\(bu" 4
|
45
|
-
\fIDefault\fR: $statedir/agent_catalog_run\.lock
|
45
|
+
\fIDefault\fR: \fB$statedir/agent_catalog_run\.lock\fR
|
46
46
|
.
|
47
47
|
.IP "" 0
|
48
48
|
.
|
@@ -50,7 +50,7 @@ A lock file to indicate that a puppet agent catalog run is currently in progress
|
|
50
50
|
A lock file to indicate that puppet agent runs have been administratively disabled\. File contains a JSON object with state information\.
|
51
51
|
.
|
52
52
|
.IP "\(bu" 4
|
53
|
-
\fIDefault\fR: $statedir/agent_disabled\.lock
|
53
|
+
\fIDefault\fR: \fB$statedir/agent_disabled\.lock\fR
|
54
54
|
.
|
55
55
|
.IP "" 0
|
56
56
|
.
|
@@ -58,7 +58,7 @@ A lock file to indicate that puppet agent runs have been administratively disabl
|
|
58
58
|
Whether to allow a new certificate request to overwrite an existing certificate request\. If true, then the old certificate must be cleaned using \fBpuppetserver ca clean\fR, and the new request signed using \fBpuppetserver ca sign\fR\.
|
59
59
|
.
|
60
60
|
.IP "\(bu" 4
|
61
|
-
\fIDefault\fR:
|
61
|
+
\fIDefault\fR: \fBfalse\fR
|
62
62
|
.
|
63
63
|
.IP "" 0
|
64
64
|
.
|
@@ -69,7 +69,7 @@ Affects how we cache attempts to load Puppet resource types and features\. If tr
|
|
69
69
|
If this setting is set to false, then types and features will only be checked once, and if they are not available, the negative result is cached and returned for all subsequent attempts to load the type or feature\. This behavior is almost always appropriate for the server, and can result in a significant performance improvement for types and features that are checked frequently\.
|
70
70
|
.
|
71
71
|
.IP "\(bu" 4
|
72
|
-
\fIDefault\fR:
|
72
|
+
\fIDefault\fR: \fBtrue\fR
|
73
73
|
.
|
74
74
|
.IP "" 0
|
75
75
|
.
|
@@ -77,7 +77,7 @@ If this setting is set to false, then types and features will only be checked on
|
|
77
77
|
Whether log files should always flush to disk\.
|
78
78
|
.
|
79
79
|
.IP "\(bu" 4
|
80
|
-
\fIDefault\fR:
|
80
|
+
\fIDefault\fR: \fBtrue\fR
|
81
81
|
.
|
82
82
|
.IP "" 0
|
83
83
|
.
|
@@ -100,7 +100,7 @@ If a certificate request is not autosigned, it will persist for review\. An admi
|
|
100
100
|
For info on autosign configuration files, see the guide to Puppet\'s config files \fIhttps://puppet\.com/docs/puppet/latest/config_file_autosign\.html\fR\.
|
101
101
|
.
|
102
102
|
.IP "\(bu" 4
|
103
|
-
\fIDefault\fR: $confdir/autosign\.conf
|
103
|
+
\fIDefault\fR: \fB$confdir/autosign\.conf\fR
|
104
104
|
.
|
105
105
|
.IP "" 0
|
106
106
|
.
|
@@ -111,37 +111,39 @@ The search path for \fBglobal\fR modules\. Should be specified as a list of dire
|
|
111
111
|
These are the modules that will be used by \fIall\fR environments\. Note that the \fBmodules\fR directory of the active environment will have priority over any global directories\. For more info, see \fIhttps://puppet\.com/docs/puppet/latest/environments_about\.html\fR
|
112
112
|
.
|
113
113
|
.IP "\(bu" 4
|
114
|
-
\fIDefault\fR: $codedir/modules:/opt/puppetlabs/puppet/modules
|
114
|
+
\fIDefault\fR: \fB$codedir/modules:/opt/puppetlabs/puppet/modules\fR
|
115
115
|
.
|
116
116
|
.IP "" 0
|
117
117
|
.
|
118
118
|
.SS "binder_config"
|
119
119
|
The binder configuration file\. Puppet reads this file on each request to configure the bindings system\. If set to nil (the default), a $confdir/binder_config\.yaml is optionally loaded\. If it does not exists, a default configuration is used\. If the setting :binding_config is specified, it must reference a valid and existing yaml file\.
|
120
120
|
.
|
121
|
-
.
|
122
|
-
\fIDefault\fR:
|
123
|
-
|
121
|
+
.IP "\(bu" 4
|
122
|
+
\fIDefault\fR: ``
|
123
|
+
.
|
124
|
+
.IP "" 0
|
124
125
|
.
|
125
126
|
.SS "bucketdir"
|
126
127
|
Where FileBucket files are stored\.
|
127
128
|
.
|
128
129
|
.IP "\(bu" 4
|
129
|
-
\fIDefault\fR: $vardir/bucket
|
130
|
+
\fIDefault\fR: \fB$vardir/bucket\fR
|
130
131
|
.
|
131
132
|
.IP "" 0
|
132
133
|
.
|
133
134
|
.SS "ca_fingerprint"
|
134
135
|
The expected fingerprint of the CA certificate\. If specified, the agent will compare the CA certificate fingerprint that it downloads against this value and reject the CA certificate if the values do not match\. This only applies during the first download of the CA certificate\.
|
135
136
|
.
|
136
|
-
.
|
137
|
-
\fIDefault\fR:
|
138
|
-
|
137
|
+
.IP "\(bu" 4
|
138
|
+
\fIDefault\fR: ``
|
139
|
+
.
|
140
|
+
.IP "" 0
|
139
141
|
.
|
140
142
|
.SS "ca_name"
|
141
143
|
The name to use the Certificate Authority certificate\.
|
142
144
|
.
|
143
145
|
.IP "\(bu" 4
|
144
|
-
\fIDefault\fR:
|
146
|
+
\fIDefault\fR: \fBPuppet CA: $certname\fR
|
145
147
|
.
|
146
148
|
.IP "" 0
|
147
149
|
.
|
@@ -149,7 +151,7 @@ The name to use the Certificate Authority certificate\.
|
|
149
151
|
The port to use for the certificate authority\.
|
150
152
|
.
|
151
153
|
.IP "\(bu" 4
|
152
|
-
\fIDefault\fR: $serverport
|
154
|
+
\fIDefault\fR: \fB$serverport\fR
|
153
155
|
.
|
154
156
|
.IP "" 0
|
155
157
|
.
|
@@ -157,7 +159,7 @@ The port to use for the certificate authority\.
|
|
157
159
|
The server to use for certificate authority requests\. It\'s a separate server because it cannot and does not need to horizontally scale\.
|
158
160
|
.
|
159
161
|
.IP "\(bu" 4
|
160
|
-
\fIDefault\fR: $server
|
162
|
+
\fIDefault\fR: \fB$server\fR
|
161
163
|
.
|
162
164
|
.IP "" 0
|
163
165
|
.
|
@@ -165,7 +167,7 @@ The server to use for certificate authority requests\. It\'s a separate server b
|
|
165
167
|
The default TTL for new certificates\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
166
168
|
.
|
167
169
|
.IP "\(bu" 4
|
168
|
-
\fIDefault\fR:
|
170
|
+
\fIDefault\fR: \fB5y\fR
|
169
171
|
.
|
170
172
|
.IP "" 0
|
171
173
|
.
|
@@ -173,7 +175,7 @@ The default TTL for new certificates\. This setting can be a time interval in se
|
|
173
175
|
The CA certificate\.
|
174
176
|
.
|
175
177
|
.IP "\(bu" 4
|
176
|
-
\fIDefault\fR: $cadir/ca_crt\.pem
|
178
|
+
\fIDefault\fR: \fB$cadir/ca_crt\.pem\fR
|
177
179
|
.
|
178
180
|
.IP "" 0
|
179
181
|
.
|
@@ -181,7 +183,7 @@ The CA certificate\.
|
|
181
183
|
The certificate revocation list (CRL) for the CA\.
|
182
184
|
.
|
183
185
|
.IP "\(bu" 4
|
184
|
-
\fIDefault\fR: $cadir/ca_crl\.pem
|
186
|
+
\fIDefault\fR: \fB$cadir/ca_crl\.pem\fR
|
185
187
|
.
|
186
188
|
.IP "" 0
|
187
189
|
.
|
@@ -189,7 +191,7 @@ The certificate revocation list (CRL) for the CA\.
|
|
189
191
|
The root directory for the certificate authority\.
|
190
192
|
.
|
191
193
|
.IP "\(bu" 4
|
192
|
-
\fIDefault\fR: /var/lib/jenkins/\.puppetlabs/etc/puppet/ssl/ca
|
194
|
+
\fIDefault\fR: \fB/var/lib/jenkins/\.puppetlabs/etc/puppet/ssl/ca\fR
|
193
195
|
.
|
194
196
|
.IP "" 0
|
195
197
|
.
|
@@ -197,7 +199,7 @@ The root directory for the certificate authority\.
|
|
197
199
|
The CA private key\.
|
198
200
|
.
|
199
201
|
.IP "\(bu" 4
|
200
|
-
\fIDefault\fR: $cadir/ca_key\.pem
|
202
|
+
\fIDefault\fR: \fB$cadir/ca_key\.pem\fR
|
201
203
|
.
|
202
204
|
.IP "" 0
|
203
205
|
.
|
@@ -205,22 +207,23 @@ The CA private key\.
|
|
205
207
|
The CA public key\.
|
206
208
|
.
|
207
209
|
.IP "\(bu" 4
|
208
|
-
\fIDefault\fR: $cadir/ca_pub\.pem
|
210
|
+
\fIDefault\fR: \fB$cadir/ca_pub\.pem\fR
|
209
211
|
.
|
210
212
|
.IP "" 0
|
211
213
|
.
|
212
214
|
.SS "catalog_cache_terminus"
|
213
215
|
How to store cached catalogs\. Valid values are \'json\', \'msgpack\' and \'yaml\'\. The agent application defaults to \'json\'\.
|
214
216
|
.
|
215
|
-
.
|
216
|
-
\fIDefault\fR:
|
217
|
-
|
217
|
+
.IP "\(bu" 4
|
218
|
+
\fIDefault\fR: ``
|
219
|
+
.
|
220
|
+
.IP "" 0
|
218
221
|
.
|
219
222
|
.SS "catalog_terminus"
|
220
223
|
Where to get node catalogs\. This is useful to change if, for instance, you\'d like to pre\-compile catalogs and store them in memcached or some other easily\-accessed store\.
|
221
224
|
.
|
222
225
|
.IP "\(bu" 4
|
223
|
-
\fIDefault\fR:
|
226
|
+
\fIDefault\fR: \fBcompiler\fR
|
224
227
|
.
|
225
228
|
.IP "" 0
|
226
229
|
.
|
@@ -228,7 +231,7 @@ Where to get node catalogs\. This is useful to change if, for instance, you\'d l
|
|
228
231
|
The inventory file\. This is a text file to which the CA writes a complete listing of all certificates\.
|
229
232
|
.
|
230
233
|
.IP "\(bu" 4
|
231
|
-
\fIDefault\fR: $cadir/inventory\.txt
|
234
|
+
\fIDefault\fR: \fB$cadir/inventory\.txt\fR
|
232
235
|
.
|
233
236
|
.IP "" 0
|
234
237
|
.
|
@@ -236,7 +239,7 @@ The inventory file\. This is a text file to which the CA writes a complete listi
|
|
236
239
|
The certificate directory\.
|
237
240
|
.
|
238
241
|
.IP "\(bu" 4
|
239
|
-
\fIDefault\fR: $ssldir/certs
|
242
|
+
\fIDefault\fR: \fB$ssldir/certs\fR
|
240
243
|
.
|
241
244
|
.IP "" 0
|
242
245
|
.
|
@@ -256,7 +259,7 @@ When certificate_revocation is set to \'leaf\', Puppet verifies certs against th
|
|
256
259
|
When certificate_revocation is set to \'false\', Puppet disables all certificate revocation checking and does not attempt to download the CRL\.
|
257
260
|
.
|
258
261
|
.IP "\(bu" 4
|
259
|
-
\fIDefault\fR:
|
262
|
+
\fIDefault\fR: \fBchain\fR
|
260
263
|
.
|
261
264
|
.IP "" 0
|
262
265
|
.
|
@@ -284,7 +287,7 @@ The special value \fBca\fR is reserved, and can\'t be used as the certname for a
|
|
284
287
|
Defaults to the node\'s fully qualified domain name\.
|
285
288
|
.
|
286
289
|
.IP "\(bu" 4
|
287
|
-
\fIDefault\fR:
|
290
|
+
\fIDefault\fR: \fBthe Host\'s fully qualified domain name, as determined by Facter\fR
|
288
291
|
.
|
289
292
|
.IP "" 0
|
290
293
|
.
|
@@ -292,7 +295,7 @@ Defaults to the node\'s fully qualified domain name\.
|
|
292
295
|
The list of ciphersuites for TLS connections initiated by puppet\. The default value is chosen to support TLS 1\.0 and up, but can be made more restrictive if needed\. The ciphersuites must be specified in OpenSSL format, not IANA\.
|
293
296
|
.
|
294
297
|
.IP "\(bu" 4
|
295
|
-
\fIDefault\fR:
|
298
|
+
\fIDefault\fR: \fBECDHE\-ECDSA\-AES128\-GCM\-SHA256:ECDHE\-RSA\-AES128\-GCM\-SHA256:ECDHE\-ECDSA\-AES256\-GCM\-SHA384:ECDHE\-RSA\-AES256\-GCM\-SHA384:ECDHE\-ECDSA\-CHACHA20\-POLY1305:ECDHE\-RSA\-CHACHA20\-POLY1305:DHE\-RSA\-AES128\-GCM\-SHA256:DHE\-RSA\-AES256\-GCM\-SHA384:DHE\-RSA\-CHACHA20\-POLY1305:ECDHE\-ECDSA\-AES128\-SHA256:ECDHE\-RSA\-AES128\-SHA256:ECDHE\-ECDSA\-AES128\-SHA:ECDHE\-RSA\-AES128\-SHA:ECDHE\-ECDSA\-AES256\-SHA384:ECDHE\-RSA\-AES256\-SHA384:ECDHE\-ECDSA\-AES256\-SHA:ECDHE\-RSA\-AES256\-SHA:DHE\-RSA\-AES128\-SHA256:DHE\-RSA\-AES256\-SHA256:AES128\-GCM\-SHA256:AES256\-GCM\-SHA384:AES128\-SHA256:AES256\-SHA256\fR
|
296
299
|
.
|
297
300
|
.IP "" 0
|
298
301
|
.
|
@@ -300,7 +303,7 @@ The list of ciphersuites for TLS connections initiated by puppet\. The default v
|
|
300
303
|
The file in which puppet agent stores a list of the classes associated with the retrieved configuration\. Can be loaded in the separate \fBpuppet\fR executable using the \fB\-\-loadclasses\fR option\.
|
301
304
|
.
|
302
305
|
.IP "\(bu" 4
|
303
|
-
\fIDefault\fR: $statedir/classes\.txt
|
306
|
+
\fIDefault\fR: \fB$statedir/classes\.txt\fR
|
304
307
|
.
|
305
308
|
.IP "" 0
|
306
309
|
.
|
@@ -308,7 +311,7 @@ The file in which puppet agent stores a list of the classes associated with the
|
|
308
311
|
The directory in which serialized data is stored on the client\.
|
309
312
|
.
|
310
313
|
.IP "\(bu" 4
|
311
|
-
\fIDefault\fR: $vardir/client_data
|
314
|
+
\fIDefault\fR: \fB$vardir/client_data\fR
|
312
315
|
.
|
313
316
|
.IP "" 0
|
314
317
|
.
|
@@ -316,7 +319,7 @@ The directory in which serialized data is stored on the client\.
|
|
316
319
|
Where FileBucket files are stored locally\.
|
317
320
|
.
|
318
321
|
.IP "\(bu" 4
|
319
|
-
\fIDefault\fR: $vardir/clientbucket
|
322
|
+
\fIDefault\fR: \fB$vardir/clientbucket\fR
|
320
323
|
.
|
321
324
|
.IP "" 0
|
322
325
|
.
|
@@ -324,7 +327,7 @@ Where FileBucket files are stored locally\.
|
|
324
327
|
The directory in which client\-side YAML data is stored\.
|
325
328
|
.
|
326
329
|
.IP "\(bu" 4
|
327
|
-
\fIDefault\fR: $vardir/client_yaml
|
330
|
+
\fIDefault\fR: \fB$vardir/client_yaml\fR
|
328
331
|
.
|
329
332
|
.IP "" 0
|
330
333
|
.
|
@@ -335,7 +338,7 @@ Code to parse directly\. This is essentially only used by \fBpuppet\fR, and shou
|
|
335
338
|
The main Puppet code directory\. The default for this setting is calculated based on the user\. If the process is running as root or the user that Puppet is supposed to run as, it defaults to a system directory, but if it\'s running as any other user, it defaults to being in the user\'s home directory\.
|
336
339
|
.
|
337
340
|
.IP "\(bu" 4
|
338
|
-
\fIDefault\fR:
|
341
|
+
\fIDefault\fR: \fBUnix/Linux: /etc/puppetlabs/code \-\- Windows: C:\eProgramData\ePuppetLabs\ecode \-\- Non\-root user: ~/\.puppetlabs/etc/code\fR
|
339
342
|
.
|
340
343
|
.IP "" 0
|
341
344
|
.
|
@@ -343,7 +346,7 @@ The main Puppet code directory\. The default for this setting is calculated base
|
|
343
346
|
Whether to use colors when logging to the console\. Valid values are \fBansi\fR (equivalent to \fBtrue\fR), \fBhtml\fR, and \fBfalse\fR, which produces no color\.
|
344
347
|
.
|
345
348
|
.IP "\(bu" 4
|
346
|
-
\fIDefault\fR:
|
349
|
+
\fIDefault\fR: \fBansi\fR
|
347
350
|
.
|
348
351
|
.IP "" 0
|
349
352
|
.
|
@@ -351,7 +354,7 @@ Whether to use colors when logging to the console\. Valid values are \fBansi\fR
|
|
351
354
|
The main Puppet configuration directory\. The default for this setting is calculated based on the user\. If the process is running as root or the user that Puppet is supposed to run as, it defaults to a system directory, but if it\'s running as any other user, it defaults to being in the user\'s home directory\.
|
352
355
|
.
|
353
356
|
.IP "\(bu" 4
|
354
|
-
\fIDefault\fR:
|
357
|
+
\fIDefault\fR: \fBUnix/Linux: /etc/puppetlabs/puppet \-\- Windows: C:\eProgramData\ePuppetLabs\epuppet\eetc \-\- Non\-root user: ~/\.puppetlabs/etc/puppet\fR
|
355
358
|
.
|
356
359
|
.IP "" 0
|
357
360
|
.
|
@@ -359,7 +362,7 @@ The main Puppet configuration directory\. The default for this setting is calcul
|
|
359
362
|
The configuration file for the current puppet application\.
|
360
363
|
.
|
361
364
|
.IP "\(bu" 4
|
362
|
-
\fIDefault\fR: $confdir/${config_file_name}
|
365
|
+
\fIDefault\fR: \fB$confdir/${config_file_name}\fR
|
363
366
|
.
|
364
367
|
.IP "" 0
|
365
368
|
.
|
@@ -367,7 +370,7 @@ The configuration file for the current puppet application\.
|
|
367
370
|
The name of the puppet config file\.
|
368
371
|
.
|
369
372
|
.IP "\(bu" 4
|
370
|
-
\fIDefault\fR:
|
373
|
+
\fIDefault\fR: \fBpuppet\.conf\fR
|
371
374
|
.
|
372
375
|
.IP "" 0
|
373
376
|
.
|
@@ -389,9 +392,10 @@ In general, the duration should be greater than the \fBruninterval\fR\. Setting
|
|
389
392
|
.P
|
390
393
|
If the agent downloads a new CRL, the agent will use it for subsequent network requests\. If the refresh request fails or if the CRL is unchanged on the server, then the agent run will continue using the local CRL it already has\.This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
391
394
|
.
|
392
|
-
.
|
393
|
-
\fIDefault\fR:
|
394
|
-
|
395
|
+
.IP "\(bu" 4
|
396
|
+
\fIDefault\fR: ``
|
397
|
+
.
|
398
|
+
.IP "" 0
|
395
399
|
.
|
396
400
|
.SS "csr_attributes"
|
397
401
|
An optional file containing custom attributes to add to certificate signing requests (CSRs)\. You should ensure that this file does not exist on your CA puppet master; if it does, unwanted certificate extensions may leak into certificates created with the \fBpuppetserver ca generate\fR command\.
|
@@ -406,7 +410,7 @@ Custom attributes can be used by the CA when deciding whether to sign the certif
|
|
406
410
|
Extension requests will be permanently embedded in the final certificate\. Extension OIDs must be in the "ppRegCertExt" (\fB1\.3\.6\.1\.4\.1\.34380\.1\.1\fR), "ppPrivCertExt" (\fB1\.3\.6\.1\.4\.1\.34380\.1\.2\fR), or "ppAuthCertExt" (\fB1\.3\.6\.1\.4\.1\.34380\.1\.3\fR) OID arcs\. The ppRegCertExt arc is reserved for four of the most common pieces of data to embed: \fBpp_uuid\fR (\fB\.1\fR), \fBpp_instance_id\fR (\fB\.2\fR), \fBpp_image_name\fR (\fB\.3\fR), and \fBpp_preshared_key\fR (\fB\.4\fR) \-\-\- in the YAML file, these can be referred to by their short descriptive names instead of their full OID\. The ppPrivCertExt arc is unregulated, and can be used for site\-specific extensions\. The ppAuthCert arc is reserved for two pieces of data to embed: \fBpp_authorization\fR (\fB\.1\fR) and \fBpp_auth_role\fR (\fB\.13\fR)\. As with ppRegCertExt, in the YAML file, these can be referred to by their short descriptive name instead of their full OID\.
|
407
411
|
.
|
408
412
|
.IP "\(bu" 4
|
409
|
-
\fIDefault\fR: $confdir/csr_attributes\.yaml
|
413
|
+
\fIDefault\fR: \fB$confdir/csr_attributes\.yaml\fR
|
410
414
|
.
|
411
415
|
.IP "" 0
|
412
416
|
.
|
@@ -414,7 +418,7 @@ Extension requests will be permanently embedded in the final certificate\. Exten
|
|
414
418
|
Where the CA stores certificate requests\.
|
415
419
|
.
|
416
420
|
.IP "\(bu" 4
|
417
|
-
\fIDefault\fR: $cadir/requests
|
421
|
+
\fIDefault\fR: \fB$cadir/requests\fR
|
418
422
|
.
|
419
423
|
.IP "" 0
|
420
424
|
.
|
@@ -422,7 +426,7 @@ Where the CA stores certificate requests\.
|
|
422
426
|
Whether to send the process into the background\. This defaults to true on POSIX systems, and to false on Windows (where Puppet currently cannot daemonize)\.
|
423
427
|
.
|
424
428
|
.IP "\(bu" 4
|
425
|
-
\fIDefault\fR:
|
429
|
+
\fIDefault\fR: \fBtrue\fR
|
426
430
|
.
|
427
431
|
.IP "" 0
|
428
432
|
.
|
@@ -430,7 +434,7 @@ Whether to send the process into the background\. This defaults to true on POSIX
|
|
430
434
|
This setting has been deprecated\. Use of any value other than \'hiera\' should instead be configured in a version 5 hiera\.yaml\. Until this setting is removed, it controls which data binding terminus to use for global automatic data binding (across all environments)\. By default this value is \'hiera\'\. A value of \'none\' turns off the global binding\.
|
431
435
|
.
|
432
436
|
.IP "\(bu" 4
|
433
|
-
\fIDefault\fR:
|
437
|
+
\fIDefault\fR: \fBhiera\fR
|
434
438
|
.
|
435
439
|
.IP "" 0
|
436
440
|
.
|
@@ -438,7 +442,7 @@ This setting has been deprecated\. Use of any value other than \'hiera\' should
|
|
438
442
|
The default source for files if no server is given in a uri, e\.g\. puppet:///file\. The default of \fBrest\fR causes the file to be retrieved using the \fBserver\fR setting\. When running \fBapply\fR the default is \fBfile_server\fR, causing requests to be filled locally\.
|
439
443
|
.
|
440
444
|
.IP "\(bu" 4
|
441
|
-
\fIDefault\fR:
|
445
|
+
\fIDefault\fR: \fBrest\fR
|
442
446
|
.
|
443
447
|
.IP "" 0
|
444
448
|
.
|
@@ -452,7 +456,7 @@ This setting\'s value can be an absolute or relative path\. An absolute path wil
|
|
452
456
|
In either case, the path can point to a single file or to a directory of manifests to be evaluated in alphabetical order\.
|
453
457
|
.
|
454
458
|
.IP "\(bu" 4
|
455
|
-
\fIDefault\fR: \./manifests
|
459
|
+
\fIDefault\fR: \fB\./manifests\fR
|
456
460
|
.
|
457
461
|
.IP "" 0
|
458
462
|
.
|
@@ -460,7 +464,7 @@ In either case, the path can point to a single file or to a directory of manifes
|
|
460
464
|
Boolean; whether to generate the default schedule resources\. Setting this to false is useful for keeping external report processors clean of skipped schedule resources\.
|
461
465
|
.
|
462
466
|
.IP "\(bu" 4
|
463
|
-
\fIDefault\fR:
|
467
|
+
\fIDefault\fR: \fBtrue\fR
|
464
468
|
.
|
465
469
|
.IP "" 0
|
466
470
|
.
|
@@ -468,7 +472,7 @@ Boolean; whether to generate the default schedule resources\. Setting this to fa
|
|
468
472
|
The root directory of devices\' $confdir\.
|
469
473
|
.
|
470
474
|
.IP "\(bu" 4
|
471
|
-
\fIDefault\fR: $confdir/devices
|
475
|
+
\fIDefault\fR: \fB$confdir/devices\fR
|
472
476
|
.
|
473
477
|
.IP "" 0
|
474
478
|
.
|
@@ -476,7 +480,7 @@ The root directory of devices\' $confdir\.
|
|
476
480
|
Path to the device config file for puppet device\.
|
477
481
|
.
|
478
482
|
.IP "\(bu" 4
|
479
|
-
\fIDefault\fR: $confdir/device\.conf
|
483
|
+
\fIDefault\fR: \fB$confdir/device\.conf\fR
|
480
484
|
.
|
481
485
|
.IP "" 0
|
482
486
|
.
|
@@ -484,7 +488,7 @@ Path to the device config file for puppet device\.
|
|
484
488
|
The root directory of devices\' $vardir\.
|
485
489
|
.
|
486
490
|
.IP "\(bu" 4
|
487
|
-
\fIDefault\fR: $vardir/devices
|
491
|
+
\fIDefault\fR: \fB$vardir/devices\fR
|
488
492
|
.
|
489
493
|
.IP "" 0
|
490
494
|
.
|
@@ -492,7 +496,7 @@ The root directory of devices\' $vardir\.
|
|
492
496
|
Which diff command to use when printing differences between files\. This setting has no default value on Windows, as standard \fBdiff\fR is not available, but Puppet can use many third\-party diff tools\.
|
493
497
|
.
|
494
498
|
.IP "\(bu" 4
|
495
|
-
\fIDefault\fR:
|
499
|
+
\fIDefault\fR: \fBdiff\fR
|
496
500
|
.
|
497
501
|
.IP "" 0
|
498
502
|
.
|
@@ -500,7 +504,7 @@ Which diff command to use when printing differences between files\. This setting
|
|
500
504
|
Which arguments to pass to the diff command when printing differences between files\. The command to use can be chosen with the \fBdiff\fR setting\.
|
501
505
|
.
|
502
506
|
.IP "\(bu" 4
|
503
|
-
\fIDefault\fR: \-u
|
507
|
+
\fIDefault\fR: \fB\-u\fR
|
504
508
|
.
|
505
509
|
.IP "" 0
|
506
510
|
.
|
@@ -508,7 +512,7 @@ Which arguments to pass to the diff command when printing differences between fi
|
|
508
512
|
Which digest algorithm to use for file resources and the filebucket\. Valid values are md5, sha256, sha384, sha512, sha224\. Default is md5\.
|
509
513
|
.
|
510
514
|
.IP "\(bu" 4
|
511
|
-
\fIDefault\fR:
|
515
|
+
\fIDefault\fR: \fBmd5\fR
|
512
516
|
.
|
513
517
|
.IP "" 0
|
514
518
|
.
|
@@ -516,7 +520,7 @@ Which digest algorithm to use for file resources and the filebucket\. Valid valu
|
|
516
520
|
If true, turns off all translations of Puppet and module log messages, which affects error, warning, and info log messages, as well as any translations in the report and CLI\.
|
517
521
|
.
|
518
522
|
.IP "\(bu" 4
|
519
|
-
\fIDefault\fR:
|
523
|
+
\fIDefault\fR: \fBfalse\fR
|
520
524
|
.
|
521
525
|
.IP "" 0
|
522
526
|
.
|
@@ -527,7 +531,7 @@ Whether to disallow an environment\-specific main manifest\. When set to \fBtrue
|
|
527
531
|
This setting requires \fBdefault_manifest\fR to be set to an absolute path\.
|
528
532
|
.
|
529
533
|
.IP "\(bu" 4
|
530
|
-
\fIDefault\fR:
|
534
|
+
\fIDefault\fR: \fBfalse\fR
|
531
535
|
.
|
532
536
|
.IP "" 0
|
533
537
|
.
|
@@ -550,7 +554,7 @@ Valid values for this setting are:
|
|
550
554
|
\fBundefined_resources\fR \-\-\- disables warnings about non existing resources\.
|
551
555
|
.
|
552
556
|
.IP "\(bu" 4
|
553
|
-
\fIDefault\fR: []
|
557
|
+
\fIDefault\fR: \fB[]\fR
|
554
558
|
.
|
555
559
|
.IP "" 0
|
556
560
|
.
|
@@ -561,7 +565,7 @@ A comma\-separated list of alternate DNS names for Puppet Server\. These are ext
|
|
561
565
|
In order to handle agent requests at a given hostname (like "puppet\.example\.com"), Puppet Server needs a certificate that proves it\'s allowed to use that name; if a server shows a certificate that doesn\'t include its hostname, Puppet agents will refuse to trust it\. If you use a single hostname for Puppet traffic but load\-balance it to multiple Puppet Servers, each of those servers needs to include the official hostname in its list of extra names\.
|
562
566
|
.
|
563
567
|
.P
|
564
|
-
\fBNote:\fR The list of alternate names is locked in when the server\'s certificate is signed\. If you need to change the list later, you can\'t just change this setting; you also need to regenerate the certificate\. For more information on that process, see the
|
568
|
+
\fBNote:\fR The list of alternate names is locked in when the server\'s certificate is signed\. If you need to change the list later, you can\'t just change this setting; you also need to regenerate the certificate\. For more information on that process, see the cert regen docs \fIhttps://puppet\.com/docs/puppet/latest/ssl_regenerate_certificates\.html\fR\.
|
565
569
|
.
|
566
570
|
.P
|
567
571
|
To see all the alternate names your servers are using, log into your CA server and run \fBpuppetserver ca list \-\-all\fR, then check the output for \fB(alt names: \.\.\.)\fR\. Most agent nodes should NOT have alternate names; the only certs that should have them are Puppet Server nodes that you want other agents to trust\.
|
@@ -570,7 +574,7 @@ To see all the alternate names your servers are using, log into your CA server a
|
|
570
574
|
Whether to document all resources when using \fBpuppet doc\fR to generate manifest documentation\.
|
571
575
|
.
|
572
576
|
.IP "\(bu" 4
|
573
|
-
\fIDefault\fR:
|
577
|
+
\fIDefault\fR: \fBfalse\fR
|
574
578
|
.
|
575
579
|
.IP "" 0
|
576
580
|
.
|
@@ -587,16 +591,17 @@ When defined in the \fB[user]\fR section, the environment refers to the path tha
|
|
587
591
|
Given that the context and effects vary depending on the config section \fIhttps://puppet\.com/docs/puppet/latest/config_file_main\.html#config\-sections\fR in which the \fBenvironment\fR setting is defined, do not set it globally\.
|
588
592
|
.
|
589
593
|
.IP "\(bu" 4
|
590
|
-
\fIDefault\fR:
|
594
|
+
\fIDefault\fR: \fBproduction\fR
|
591
595
|
.
|
592
596
|
.IP "" 0
|
593
597
|
.
|
594
598
|
.SS "environment_data_provider"
|
595
599
|
The name of a registered environment data provider used when obtaining environment specific data\. The three built in and registered providers are \'none\' (no data), \'function\' (data obtained by calling the function \'environment::data()\') and \'hiera\' (data obtained using a data provider configured using a hiera\.yaml file in root of the environment)\. Other environment data providers may be registered in modules on the module path\. For such custom data providers see the respective module documentation\. This setting is deprecated\.
|
596
600
|
.
|
597
|
-
.
|
598
|
-
\fIDefault\fR:
|
599
|
-
|
601
|
+
.IP "\(bu" 4
|
602
|
+
\fIDefault\fR: ``
|
603
|
+
.
|
604
|
+
.IP "" 0
|
600
605
|
.
|
601
606
|
.SS "environment_timeout"
|
602
607
|
How long the Puppet server should cache data it loads from an environment\.
|
@@ -619,7 +624,7 @@ Setting this to a number that will keep your most actively used environments cac
|
|
619
624
|
Once you set \fBenvironment_timeout\fR to a non\-zero value, you need to tell Puppet server to read new code from disk using the \fBenvironment\-cache\fR API endpoint after you deploy new code\. See the docs for the Puppet Server administrative API \fIhttps://puppet\.com/docs/puppetserver/latest/admin\-api/v1/environment\-cache\.html\fR\.
|
620
625
|
.
|
621
626
|
.IP "\(bu" 4
|
622
|
-
\fIDefault\fR:
|
627
|
+
\fIDefault\fR: \fB0\fR
|
623
628
|
.
|
624
629
|
.IP "" 0
|
625
630
|
.
|
@@ -627,7 +632,7 @@ Once you set \fBenvironment_timeout\fR to a non\-zero value, you need to tell Pu
|
|
627
632
|
How Puppet interprets the \fBenvironment_timeout\fR setting when \fBenvironment_timeout\fR is neither \fB0\fR nor \fBunlimited\fR\. If set to \fBfrom_created\fR, then the environment will be evicted \fBenvironment_timeout\fR seconds from when it was created\. If set to \fBfrom_last_used\fR then the environment will be evicted \fBenvironment_timeout\fR seconds from when it was last used\.
|
628
633
|
.
|
629
634
|
.IP "\(bu" 4
|
630
|
-
\fIDefault\fR:
|
635
|
+
\fIDefault\fR: \fBfrom_created\fR
|
631
636
|
.
|
632
637
|
.IP "" 0
|
633
638
|
.
|
@@ -638,7 +643,7 @@ A search path for directory environments, as a list of directories separated by
|
|
638
643
|
This setting must have a value set to enable \fBdirectory environments\.\fR The recommended value is \fB$codedir/environments\fR\. For more details, see \fIhttps://puppet\.com/docs/puppet/latest/environments_about\.html\fR
|
639
644
|
.
|
640
645
|
.IP "\(bu" 4
|
641
|
-
\fIDefault\fR: $codedir/environments
|
646
|
+
\fIDefault\fR: \fB$codedir/environments\fR
|
642
647
|
.
|
643
648
|
.IP "" 0
|
644
649
|
.
|
@@ -646,7 +651,7 @@ This setting must have a value set to enable \fBdirectory environments\.\fR The
|
|
646
651
|
Whether each resource should log when it is being evaluated\. This allows you to interactively see exactly what is being done\.
|
647
652
|
.
|
648
653
|
.IP "\(bu" 4
|
649
|
-
\fIDefault\fR:
|
654
|
+
\fIDefault\fR: \fBfalse\fR
|
650
655
|
.
|
651
656
|
.IP "" 0
|
652
657
|
.
|
@@ -688,7 +693,7 @@ Generally, an ENC script makes requests to an external data source\.
|
|
688
693
|
For more info, see the ENC documentation \fIhttps://puppet\.com/docs/puppet/latest/nodes_external\.html\fR\.
|
689
694
|
.
|
690
695
|
.IP "\(bu" 4
|
691
|
-
\fIDefault\fR:
|
696
|
+
\fIDefault\fR: \fBnone\fR
|
692
697
|
.
|
693
698
|
.IP "" 0
|
694
699
|
.
|
@@ -696,7 +701,7 @@ For more info, see the ENC documentation \fIhttps://puppet\.com/docs/puppet/late
|
|
696
701
|
Whether to enable a pre\-Facter 4\.0 release of Facter (distributed as the "facter\-ng" gem)\. This is not necessary if Facter 3\.x or later is installed\. This setting is still experimental\.
|
697
702
|
.
|
698
703
|
.IP "\(bu" 4
|
699
|
-
\fIDefault\fR:
|
704
|
+
\fIDefault\fR: \fBfalse\fR
|
700
705
|
.
|
701
706
|
.IP "" 0
|
702
707
|
.
|
@@ -704,7 +709,7 @@ Whether to enable a pre\-Facter 4\.0 release of Facter (distributed as the "fact
|
|
704
709
|
Where Puppet should look for facts\. Multiple directories should be separated by the system path separator character\. (The POSIX path separator is \':\', and the Windows path separator is \';\'\.)
|
705
710
|
.
|
706
711
|
.IP "\(bu" 4
|
707
|
-
\fIDefault\fR: $vardir/lib/facter:$vardir/facts
|
712
|
+
\fIDefault\fR: \fB$vardir/lib/facter:$vardir/facts\fR
|
708
713
|
.
|
709
714
|
.IP "" 0
|
710
715
|
.
|
@@ -712,7 +717,7 @@ Where Puppet should look for facts\. Multiple directories should be separated by
|
|
712
717
|
The node facts terminus\.
|
713
718
|
.
|
714
719
|
.IP "\(bu" 4
|
715
|
-
\fIDefault\fR:
|
720
|
+
\fIDefault\fR: \fBfacter\fR
|
716
721
|
.
|
717
722
|
.IP "" 0
|
718
723
|
.
|
@@ -720,7 +725,7 @@ The node facts terminus\.
|
|
720
725
|
Where the fileserver configuration is stored\.
|
721
726
|
.
|
722
727
|
.IP "\(bu" 4
|
723
|
-
\fIDefault\fR: $confdir/fileserver\.conf
|
728
|
+
\fIDefault\fR: \fB$confdir/fileserver\.conf\fR
|
724
729
|
.
|
725
730
|
.IP "" 0
|
726
731
|
.
|
@@ -728,22 +733,23 @@ Where the fileserver configuration is stored\.
|
|
728
733
|
The minimum time to wait between checking for updates in configuration files\. This timeout determines how quickly Puppet checks whether a file (such as manifests or puppet\.conf) has changed on disk\. The default will change in a future release to be \'unlimited\', requiring a reload of the Puppet service to pick up changes to its internal configuration\. Currently we do not accept a value of \'unlimited\'\. To reparse files within an environment in Puppet Server please use the environment_cache endpoint
|
729
734
|
.
|
730
735
|
.IP "\(bu" 4
|
731
|
-
\fIDefault\fR:
|
736
|
+
\fIDefault\fR: \fB15s\fR
|
732
737
|
.
|
733
738
|
.IP "" 0
|
734
739
|
.
|
735
740
|
.SS "forge_authorization"
|
736
741
|
The authorization key to connect to the Puppet Forge\. Leave blank for unauthorized or license based connections
|
737
742
|
.
|
738
|
-
.
|
739
|
-
\fIDefault\fR:
|
740
|
-
|
743
|
+
.IP "\(bu" 4
|
744
|
+
\fIDefault\fR: ``
|
745
|
+
.
|
746
|
+
.IP "" 0
|
741
747
|
.
|
742
748
|
.SS "freeze_main"
|
743
749
|
Freezes the \'main\' class, disallowing any code to be added to it\. This essentially means that you can\'t have any code outside of a node, class, or definition other than in the site manifest\.
|
744
750
|
.
|
745
751
|
.IP "\(bu" 4
|
746
|
-
\fIDefault\fR:
|
752
|
+
\fIDefault\fR: \fBfalse\fR
|
747
753
|
.
|
748
754
|
.IP "" 0
|
749
755
|
.
|
@@ -751,7 +757,7 @@ Freezes the \'main\' class, disallowing any code to be added to it\. This essent
|
|
751
757
|
Causes validation of loaded legacy Ruby functions (3x API) to raise errors about illegal constructs that could cause harm or that simply does not work\. This flag is on by default\. This flag is made available so that the validation can be turned off in case the method of validation is faulty \- if encountered, please file a bug report\.
|
752
758
|
.
|
753
759
|
.IP "\(bu" 4
|
754
|
-
\fIDefault\fR:
|
760
|
+
\fIDefault\fR: \fBtrue\fR
|
755
761
|
.
|
756
762
|
.IP "" 0
|
757
763
|
.
|
@@ -759,7 +765,7 @@ Causes validation of loaded legacy Ruby functions (3x API) to raise errors about
|
|
759
765
|
Whether or not to enable all features currently being developed for future major releases of Puppet\. Should be used with caution, as in development features are experimental and can have unexpected effects\.
|
760
766
|
.
|
761
767
|
.IP "\(bu" 4
|
762
|
-
\fIDefault\fR:
|
768
|
+
\fIDefault\fR: \fBfalse\fR
|
763
769
|
.
|
764
770
|
.IP "" 0
|
765
771
|
.
|
@@ -767,7 +773,7 @@ Whether or not to enable all features currently being developed for future major
|
|
767
773
|
When true, causes Puppet applications to print an example config file to stdout and exit\. The example will include descriptions of each setting, and the current (or default) value of each setting, incorporating any settings overridden on the CLI (with the exception of \fBgenconfig\fR itself)\. This setting only makes sense when specified on the command line as \fB\-\-genconfig\fR\.
|
768
774
|
.
|
769
775
|
.IP "\(bu" 4
|
770
|
-
\fIDefault\fR:
|
776
|
+
\fIDefault\fR: \fBfalse\fR
|
771
777
|
.
|
772
778
|
.IP "" 0
|
773
779
|
.
|
@@ -775,7 +781,7 @@ When true, causes Puppet applications to print an example config file to stdout
|
|
775
781
|
Whether to just print a manifest to stdout and exit\. Only makes sense when specified on the command line as \fB\-\-genmanifest\fR\. Takes into account arguments specified on the CLI\.
|
776
782
|
.
|
777
783
|
.IP "\(bu" 4
|
778
|
-
\fIDefault\fR:
|
784
|
+
\fIDefault\fR: \fBfalse\fR
|
779
785
|
.
|
780
786
|
.IP "" 0
|
781
787
|
.
|
@@ -792,7 +798,7 @@ The \fBgraphdir\fR setting determines where Puppet will save graphs\. Note that
|
|
792
798
|
See your graphing software\'s documentation for details on opening \.dot files\. If you\'re using GraphViz\'s \fBdot\fR command, you can do a quick PNG render with \fBdot \-Tpng <DOT FILE> \-o <OUTPUT FILE>\fR\.
|
793
799
|
.
|
794
800
|
.IP "\(bu" 4
|
795
|
-
\fIDefault\fR:
|
801
|
+
\fIDefault\fR: \fBfalse\fR
|
796
802
|
.
|
797
803
|
.IP "" 0
|
798
804
|
.
|
@@ -800,7 +806,7 @@ See your graphing software\'s documentation for details on opening \.dot files\.
|
|
800
806
|
Where to save \.dot\-format graphs (when the \fBgraph\fR setting is enabled)\.
|
801
807
|
.
|
802
808
|
.IP "\(bu" 4
|
803
|
-
\fIDefault\fR: $statedir/graphs
|
809
|
+
\fIDefault\fR: \fB$statedir/graphs\fR
|
804
810
|
.
|
805
811
|
.IP "" 0
|
806
812
|
.
|
@@ -808,7 +814,7 @@ Where to save \.dot\-format graphs (when the \fBgraph\fR setting is enabled)\.
|
|
808
814
|
The group Puppet Server will run as\. Used to ensure the agent side processes (agent, apply, etc) create files and directories readable by Puppet Server when necessary\.
|
809
815
|
.
|
810
816
|
.IP "\(bu" 4
|
811
|
-
\fIDefault\fR:
|
817
|
+
\fIDefault\fR: \fBpuppet\fR
|
812
818
|
.
|
813
819
|
.IP "" 0
|
814
820
|
.
|
@@ -816,7 +822,7 @@ The group Puppet Server will run as\. Used to ensure the agent side processes (a
|
|
816
822
|
The hiera configuration file\. Puppet only reads this file on startup, so you must restart the puppet server every time you edit it\.
|
817
823
|
.
|
818
824
|
.IP "\(bu" 4
|
819
|
-
\fIDefault\fR: $confdir/hiera\.yaml\. However, for backwards compatibility, if a file exists at $codedir/hiera\.yaml, Puppet uses that instead
|
825
|
+
\fIDefault\fR: \fB$confdir/hiera\.yaml\. However, for backwards compatibility, if a file exists at $codedir/hiera\.yaml, Puppet uses that instead\.\fR
|
820
826
|
.
|
821
827
|
.IP "" 0
|
822
828
|
.
|
@@ -824,7 +830,7 @@ The hiera configuration file\. Puppet only reads this file on startup, so you mu
|
|
824
830
|
Where individual hosts store and look for their certificates\.
|
825
831
|
.
|
826
832
|
.IP "\(bu" 4
|
827
|
-
\fIDefault\fR: $certdir/$certname\.pem
|
833
|
+
\fIDefault\fR: \fB$certdir/$certname\.pem\fR
|
828
834
|
.
|
829
835
|
.IP "" 0
|
830
836
|
.
|
@@ -832,7 +838,7 @@ Where individual hosts store and look for their certificates\.
|
|
832
838
|
Where the host\'s certificate revocation list can be found\. This is distinct from the certificate authority\'s CRL\.
|
833
839
|
.
|
834
840
|
.IP "\(bu" 4
|
835
|
-
\fIDefault\fR: $ssldir/crl\.pem
|
841
|
+
\fIDefault\fR: \fB$ssldir/crl\.pem\fR
|
836
842
|
.
|
837
843
|
.IP "" 0
|
838
844
|
.
|
@@ -840,7 +846,7 @@ Where the host\'s certificate revocation list can be found\. This is distinct fr
|
|
840
846
|
This setting is deprecated\.
|
841
847
|
.
|
842
848
|
.IP "\(bu" 4
|
843
|
-
\fIDefault\fR: $ssldir/csr_$certname\.pem
|
849
|
+
\fIDefault\fR: \fB$ssldir/csr_$certname\.pem\fR
|
844
850
|
.
|
845
851
|
.IP "" 0
|
846
852
|
.
|
@@ -848,7 +854,7 @@ This setting is deprecated\.
|
|
848
854
|
Where individual hosts store and look for their private key\.
|
849
855
|
.
|
850
856
|
.IP "\(bu" 4
|
851
|
-
\fIDefault\fR: $privatekeydir/$certname\.pem
|
857
|
+
\fIDefault\fR: \fB$privatekeydir/$certname\.pem\fR
|
852
858
|
.
|
853
859
|
.IP "" 0
|
854
860
|
.
|
@@ -856,7 +862,7 @@ Where individual hosts store and look for their private key\.
|
|
856
862
|
Where individual hosts store and look for their public key\.
|
857
863
|
.
|
858
864
|
.IP "\(bu" 4
|
859
|
-
\fIDefault\fR: $publickeydir/$certname\.pem
|
865
|
+
\fIDefault\fR: \fB$publickeydir/$certname\.pem\fR
|
860
866
|
.
|
861
867
|
.IP "" 0
|
862
868
|
.
|
@@ -864,7 +870,7 @@ Where individual hosts store and look for their public key\.
|
|
864
870
|
The maximum amount of time to wait when establishing an HTTP connection\. The default value is 2 minutes\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
865
871
|
.
|
866
872
|
.IP "\(bu" 4
|
867
|
-
\fIDefault\fR:
|
873
|
+
\fIDefault\fR: \fB2m\fR
|
868
874
|
.
|
869
875
|
.IP "" 0
|
870
876
|
.
|
@@ -872,7 +878,7 @@ The maximum amount of time to wait when establishing an HTTP connection\. The de
|
|
872
878
|
Whether to write HTTP request and responses to stderr\. This should never be used in a production environment\.
|
873
879
|
.
|
874
880
|
.IP "\(bu" 4
|
875
|
-
\fIDefault\fR:
|
881
|
+
\fIDefault\fR: \fBfalse\fR
|
876
882
|
.
|
877
883
|
.IP "" 0
|
878
884
|
.
|
@@ -880,7 +886,7 @@ Whether to write HTTP request and responses to stderr\. This should never be use
|
|
880
886
|
The list of extra headers that will be sent with http requests to the master\. The header definition consists of a name and a value separated by a colon\.
|
881
887
|
.
|
882
888
|
.IP "\(bu" 4
|
883
|
-
\fIDefault\fR: []
|
889
|
+
\fIDefault\fR: \fB[]\fR
|
884
890
|
.
|
885
891
|
.IP "" 0
|
886
892
|
.
|
@@ -888,7 +894,7 @@ The list of extra headers that will be sent with http requests to the master\. T
|
|
888
894
|
The maximum amount of time a persistent HTTP connection can remain idle in the connection pool, before it is closed\. This timeout should be shorter than the keepalive timeout used on the HTTP server, e\.g\. Apache KeepAliveTimeout directive\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
889
895
|
.
|
890
896
|
.IP "\(bu" 4
|
891
|
-
\fIDefault\fR:
|
897
|
+
\fIDefault\fR: \fB4s\fR
|
892
898
|
.
|
893
899
|
.IP "" 0
|
894
900
|
.
|
@@ -896,7 +902,7 @@ The maximum amount of time a persistent HTTP connection can remain idle in the c
|
|
896
902
|
The HTTP proxy host to use for outgoing connections\. The proxy will be bypassed if the server\'s hostname matches the NO_PROXY environment variable or \fBno_proxy\fR setting\. Note: You may need to use a FQDN for the server hostname when using a proxy\. Environment variable http_proxy or HTTP_PROXY will override this value\.
|
897
903
|
.
|
898
904
|
.IP "\(bu" 4
|
899
|
-
\fIDefault\fR:
|
905
|
+
\fIDefault\fR: \fBnone\fR
|
900
906
|
.
|
901
907
|
.IP "" 0
|
902
908
|
.
|
@@ -907,7 +913,7 @@ The password for the user of an authenticated HTTP proxy\. Requires the \fBhttp_
|
|
907
913
|
Note that passwords must be valid when used as part of a URL\. If a password contains any characters with special meanings in URLs (as specified by RFC 3986 section 2\.2), they must be URL\-encoded\. (For example, \fB#\fR would become \fB%23\fR\.)
|
908
914
|
.
|
909
915
|
.IP "\(bu" 4
|
910
|
-
\fIDefault\fR:
|
916
|
+
\fIDefault\fR: \fBnone\fR
|
911
917
|
.
|
912
918
|
.IP "" 0
|
913
919
|
.
|
@@ -915,7 +921,7 @@ Note that passwords must be valid when used as part of a URL\. If a password con
|
|
915
921
|
The HTTP proxy port to use for outgoing connections
|
916
922
|
.
|
917
923
|
.IP "\(bu" 4
|
918
|
-
\fIDefault\fR:
|
924
|
+
\fIDefault\fR: \fB3128\fR
|
919
925
|
.
|
920
926
|
.IP "" 0
|
921
927
|
.
|
@@ -923,7 +929,7 @@ The HTTP proxy port to use for outgoing connections
|
|
923
929
|
The user name for an authenticated HTTP proxy\. Requires the \fBhttp_proxy_host\fR setting\.
|
924
930
|
.
|
925
931
|
.IP "\(bu" 4
|
926
|
-
\fIDefault\fR:
|
932
|
+
\fIDefault\fR: \fBnone\fR
|
927
933
|
.
|
928
934
|
.IP "" 0
|
929
935
|
.
|
@@ -931,7 +937,7 @@ The user name for an authenticated HTTP proxy\. Requires the \fBhttp_proxy_host\
|
|
931
937
|
The time to wait for data to be read from an HTTP connection\. If nothing is read after the elapsed interval then the connection will be closed\. The default value is 10 minutes\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
932
938
|
.
|
933
939
|
.IP "\(bu" 4
|
934
|
-
\fIDefault\fR:
|
940
|
+
\fIDefault\fR: \fB10m\fR
|
935
941
|
.
|
936
942
|
.IP "" 0
|
937
943
|
.
|
@@ -939,7 +945,7 @@ The time to wait for data to be read from an HTTP connection\. If nothing is rea
|
|
939
945
|
The HTTP User\-Agent string to send when making network requests\.
|
940
946
|
.
|
941
947
|
.IP "\(bu" 4
|
942
|
-
\fIDefault\fR:
|
948
|
+
\fIDefault\fR: \fBPuppet/6\.23\.0 Ruby/2\.5\.1\-p57 (x86_64\-linux)\fR
|
943
949
|
.
|
944
950
|
.IP "" 0
|
945
951
|
.
|
@@ -947,7 +953,7 @@ The HTTP User\-Agent string to send when making network requests\.
|
|
947
953
|
Whether the puppet run should ignore errors during pluginsync\. If the setting is false and there are errors during pluginsync, then the agent will abort the run and submit a report containing information about the failed run\.
|
948
954
|
.
|
949
955
|
.IP "\(bu" 4
|
950
|
-
\fIDefault\fR:
|
956
|
+
\fIDefault\fR: \fBtrue\fR
|
951
957
|
.
|
952
958
|
.IP "" 0
|
953
959
|
.
|
@@ -955,7 +961,7 @@ Whether the puppet run should ignore errors during pluginsync\. If the setting i
|
|
955
961
|
Skip searching for classes and definitions that were missing during a prior compilation\. The list of missing objects is maintained per\-environment and persists until the environment is cleared or the master is restarted\.
|
956
962
|
.
|
957
963
|
.IP "\(bu" 4
|
958
|
-
\fIDefault\fR:
|
964
|
+
\fIDefault\fR: \fBfalse\fR
|
959
965
|
.
|
960
966
|
.IP "" 0
|
961
967
|
.
|
@@ -963,7 +969,7 @@ Skip searching for classes and definitions that were missing during a prior comp
|
|
963
969
|
Boolean; whether puppet agent should ignore schedules\. This is useful for initial puppet agent runs\.
|
964
970
|
.
|
965
971
|
.IP "\(bu" 4
|
966
|
-
\fIDefault\fR:
|
972
|
+
\fIDefault\fR: \fBfalse\fR
|
967
973
|
.
|
968
974
|
.IP "" 0
|
969
975
|
.
|
@@ -971,7 +977,7 @@ Boolean; whether puppet agent should ignore schedules\. This is useful for initi
|
|
971
977
|
The type of private key\. Valid values are \fBrsa\fR and \fBec\fR\. Default is \fBrsa\fR\.
|
972
978
|
.
|
973
979
|
.IP "\(bu" 4
|
974
|
-
\fIDefault\fR:
|
980
|
+
\fIDefault\fR: \fBrsa\fR
|
975
981
|
.
|
976
982
|
.IP "" 0
|
977
983
|
.
|
@@ -979,7 +985,7 @@ The type of private key\. Valid values are \fBrsa\fR and \fBec\fR\. Default is \
|
|
979
985
|
The bit length of keys\.
|
980
986
|
.
|
981
987
|
.IP "\(bu" 4
|
982
|
-
\fIDefault\fR:
|
988
|
+
\fIDefault\fR: \fB4096\fR
|
983
989
|
.
|
984
990
|
.IP "" 0
|
985
991
|
.
|
@@ -987,7 +993,7 @@ The bit length of keys\.
|
|
987
993
|
Where puppet agent stores the last run report summary in yaml format\.
|
988
994
|
.
|
989
995
|
.IP "\(bu" 4
|
990
|
-
\fIDefault\fR: $statedir/last_run_summary\.yaml
|
996
|
+
\fIDefault\fR: \fB$statedir/last_run_summary\.yaml\fR
|
991
997
|
.
|
992
998
|
.IP "" 0
|
993
999
|
.
|
@@ -995,7 +1001,7 @@ Where puppet agent stores the last run report summary in yaml format\.
|
|
995
1001
|
Where Puppet Agent stores the last run report, by default, in yaml format\. The format of the report can be changed by setting the \fBcache\fR key of the \fBreport\fR terminus in the routes\.yaml \fIhttps://puppet\.com/docs/puppet/latest/config_file_routes\.html\fR file\. To avoid mismatches between content and file extension, this setting needs to be manually updated to reflect the terminus changes\.
|
996
1002
|
.
|
997
1003
|
.IP "\(bu" 4
|
998
|
-
\fIDefault\fR: $statedir/last_run_report\.yaml
|
1004
|
+
\fIDefault\fR: \fB$statedir/last_run_report\.yaml\fR
|
999
1005
|
.
|
1000
1006
|
.IP "" 0
|
1001
1007
|
.
|
@@ -1003,7 +1009,7 @@ Where Puppet Agent stores the last run report, by default, in yaml format\. The
|
|
1003
1009
|
The LDAP attributes to include when querying LDAP for nodes\. All returned attributes are set as variables in the top\-level scope\. Multiple values should be comma\-separated\. The value \'all\' returns all attributes\.
|
1004
1010
|
.
|
1005
1011
|
.IP "\(bu" 4
|
1006
|
-
\fIDefault\fR:
|
1012
|
+
\fIDefault\fR: \fBall\fR
|
1007
1013
|
.
|
1008
1014
|
.IP "" 0
|
1009
1015
|
.
|
@@ -1014,7 +1020,7 @@ The search base for LDAP searches\. It\'s impossible to provide a meaningful def
|
|
1014
1020
|
The LDAP attributes to use to define Puppet classes\. Values should be comma\-separated\.
|
1015
1021
|
.
|
1016
1022
|
.IP "\(bu" 4
|
1017
|
-
\fIDefault\fR:
|
1023
|
+
\fIDefault\fR: \fBpuppetclass\fR
|
1018
1024
|
.
|
1019
1025
|
.IP "" 0
|
1020
1026
|
.
|
@@ -1022,7 +1028,7 @@ The LDAP attributes to use to define Puppet classes\. Values should be comma\-se
|
|
1022
1028
|
The attribute to use to define the parent node\.
|
1023
1029
|
.
|
1024
1030
|
.IP "\(bu" 4
|
1025
|
-
\fIDefault\fR:
|
1031
|
+
\fIDefault\fR: \fBparentnode\fR
|
1026
1032
|
.
|
1027
1033
|
.IP "" 0
|
1028
1034
|
.
|
@@ -1033,7 +1039,7 @@ The password to use to connect to LDAP\.
|
|
1033
1039
|
The LDAP port\.
|
1034
1040
|
.
|
1035
1041
|
.IP "\(bu" 4
|
1036
|
-
\fIDefault\fR:
|
1042
|
+
\fIDefault\fR: \fB389\fR
|
1037
1043
|
.
|
1038
1044
|
.IP "" 0
|
1039
1045
|
.
|
@@ -1041,7 +1047,7 @@ The LDAP port\.
|
|
1041
1047
|
The LDAP server\.
|
1042
1048
|
.
|
1043
1049
|
.IP "\(bu" 4
|
1044
|
-
\fIDefault\fR:
|
1050
|
+
\fIDefault\fR: \fBldap\fR
|
1045
1051
|
.
|
1046
1052
|
.IP "" 0
|
1047
1053
|
.
|
@@ -1049,7 +1055,7 @@ The LDAP server\.
|
|
1049
1055
|
Whether SSL should be used when searching for nodes\. Defaults to false because SSL usually requires certificates to be set up on the client side\.
|
1050
1056
|
.
|
1051
1057
|
.IP "\(bu" 4
|
1052
|
-
\fIDefault\fR:
|
1058
|
+
\fIDefault\fR: \fBfalse\fR
|
1053
1059
|
.
|
1054
1060
|
.IP "" 0
|
1055
1061
|
.
|
@@ -1057,7 +1063,7 @@ Whether SSL should be used when searching for nodes\. Defaults to false because
|
|
1057
1063
|
The LDAP attributes that should be stacked to arrays by adding the values in all hierarchy elements of the tree\. Values should be comma\-separated\.
|
1058
1064
|
.
|
1059
1065
|
.IP "\(bu" 4
|
1060
|
-
\fIDefault\fR:
|
1066
|
+
\fIDefault\fR: \fBpuppetvar\fR
|
1061
1067
|
.
|
1062
1068
|
.IP "" 0
|
1063
1069
|
.
|
@@ -1065,7 +1071,7 @@ The LDAP attributes that should be stacked to arrays by adding the values in all
|
|
1065
1071
|
The search string used to find an LDAP node\.
|
1066
1072
|
.
|
1067
1073
|
.IP "\(bu" 4
|
1068
|
-
\fIDefault\fR: (&(objectclass=puppetClient)(cn=%s))
|
1074
|
+
\fIDefault\fR: \fB(&(objectclass=puppetClient)(cn=%s))\fR
|
1069
1075
|
.
|
1070
1076
|
.IP "" 0
|
1071
1077
|
.
|
@@ -1073,7 +1079,7 @@ The search string used to find an LDAP node\.
|
|
1073
1079
|
Whether TLS should be used when searching for nodes\. Defaults to false because TLS usually requires certificates to be set up on the client side\.
|
1074
1080
|
.
|
1075
1081
|
.IP "\(bu" 4
|
1076
|
-
\fIDefault\fR:
|
1082
|
+
\fIDefault\fR: \fBfalse\fR
|
1077
1083
|
.
|
1078
1084
|
.IP "" 0
|
1079
1085
|
.
|
@@ -1084,7 +1090,7 @@ The user to use to connect to LDAP\. Must be specified as a full DN\.
|
|
1084
1090
|
An extra search path for Puppet\. This is only useful for those files that Puppet will load on demand, and is only guaranteed to work for those cases\. In fact, the autoload mechanism is responsible for making sure this directory is in Ruby\'s search path
|
1085
1091
|
.
|
1086
1092
|
.IP "\(bu" 4
|
1087
|
-
\fIDefault\fR: $vardir/lib
|
1093
|
+
\fIDefault\fR: \fB$vardir/lib\fR
|
1088
1094
|
.
|
1089
1095
|
.IP "" 0
|
1090
1096
|
.
|
@@ -1092,7 +1098,7 @@ An extra search path for Puppet\. This is only useful for those files that Puppe
|
|
1092
1098
|
Where each client stores the CA certificate\.
|
1093
1099
|
.
|
1094
1100
|
.IP "\(bu" 4
|
1095
|
-
\fIDefault\fR: $certdir/ca\.pem
|
1101
|
+
\fIDefault\fR: \fB$certdir/ca\.pem\fR
|
1096
1102
|
.
|
1097
1103
|
.IP "" 0
|
1098
1104
|
.
|
@@ -1100,7 +1106,7 @@ Where each client stores the CA certificate\.
|
|
1100
1106
|
Where Puppet should store translation files that it pulls down from the central server\.
|
1101
1107
|
.
|
1102
1108
|
.IP "\(bu" 4
|
1103
|
-
\fIDefault\fR: $vardir/locales
|
1109
|
+
\fIDefault\fR: \fB$vardir/locales\fR
|
1104
1110
|
.
|
1105
1111
|
.IP "" 0
|
1106
1112
|
.
|
@@ -1108,7 +1114,7 @@ Where Puppet should store translation files that it pulls down from the central
|
|
1108
1114
|
From where to retrieve translation files\. The standard Puppet \fBfile\fR type is used for retrieval, so anything that is a valid file source can be used here\.
|
1109
1115
|
.
|
1110
1116
|
.IP "\(bu" 4
|
1111
|
-
\fIDefault\fR:
|
1117
|
+
\fIDefault\fR: \fBpuppet:///locales\fR
|
1112
1118
|
.
|
1113
1119
|
.IP "" 0
|
1114
1120
|
.
|
@@ -1140,22 +1146,23 @@ emerg
|
|
1140
1146
|
crit
|
1141
1147
|
.
|
1142
1148
|
.IP "\(bu" 4
|
1143
|
-
\fIDefault\fR:
|
1149
|
+
\fIDefault\fR: \fBnotice\fR
|
1144
1150
|
.
|
1145
1151
|
.IP "" 0
|
1146
1152
|
.
|
1147
1153
|
.SS "logdest"
|
1148
1154
|
Where to send log messages\. Choose between \'syslog\' (the POSIX syslog service), \'eventlog\' (the Windows Event Log), \'console\', or the path to a log file\. Multiple destinations can be set using a comma separated list (eg: \fB/path/file1,console,/path/file2\fR)
|
1149
1155
|
.
|
1150
|
-
.
|
1151
|
-
\fIDefault\fR:
|
1152
|
-
|
1156
|
+
.IP "\(bu" 4
|
1157
|
+
\fIDefault\fR: ``
|
1158
|
+
.
|
1159
|
+
.IP "" 0
|
1153
1160
|
.
|
1154
1161
|
.SS "logdir"
|
1155
1162
|
The directory in which to store log files
|
1156
1163
|
.
|
1157
1164
|
.IP "\(bu" 4
|
1158
|
-
\fIDefault\fR:
|
1165
|
+
\fIDefault\fR: \fBUnix/Linux: /var/log/puppetlabs/puppet \-\- Windows: C:\eProgramData\ePuppetLabs\epuppet\evar\elog \-\- Non\-root user: ~/\.puppetlabs/var/log\fR
|
1159
1166
|
.
|
1160
1167
|
.IP "" 0
|
1161
1168
|
.
|
@@ -1163,7 +1170,7 @@ The directory in which to store log files
|
|
1163
1170
|
Whether Puppet should manage the owner, group, and mode of files it uses internally\. \fBNote\fR: For Windows agents, the default is \fBfalse\fR for versions 4\.10\.13 and greater, versions 5\.5\.6 and greater, and versions 6\.0 and greater\.
|
1164
1171
|
.
|
1165
1172
|
.IP "\(bu" 4
|
1166
|
-
\fIDefault\fR:
|
1173
|
+
\fIDefault\fR: \fBtrue\fR
|
1167
1174
|
.
|
1168
1175
|
.IP "" 0
|
1169
1176
|
.
|
@@ -1173,15 +1180,16 @@ The entry\-point manifest for puppet master\. This can be one file or a director
|
|
1173
1180
|
.P
|
1174
1181
|
Setting a global value for \fBmanifest\fR in puppet\.conf is not allowed (but it can be overridden from the commandline)\. Please use directory environments instead\. If you need to use something other than the environment\'s \fBmanifests\fR directory as the main manifest, you can set \fBmanifest\fR in environment\.conf\. For more info, see \fIhttps://puppet\.com/docs/puppet/latest/environments_about\.html\fR
|
1175
1182
|
.
|
1176
|
-
.
|
1177
|
-
\fIDefault\fR:
|
1178
|
-
|
1183
|
+
.IP "\(bu" 4
|
1184
|
+
\fIDefault\fR: ``
|
1185
|
+
.
|
1186
|
+
.IP "" 0
|
1179
1187
|
.
|
1180
1188
|
.SS "masterport"
|
1181
1189
|
The default port puppet subcommands use to communicate with Puppet Server\. (eg \fBpuppet facts upload\fR, \fBpuppet agent\fR)\. May be overridden by more specific settings (see \fBca_port\fR, \fBreport_port\fR)\.
|
1182
1190
|
.
|
1183
1191
|
.IP "\(bu" 4
|
1184
|
-
\fIDefault\fR:
|
1192
|
+
\fIDefault\fR: \fB8140\fR
|
1185
1193
|
.
|
1186
1194
|
.IP "" 0
|
1187
1195
|
.
|
@@ -1189,7 +1197,7 @@ The default port puppet subcommands use to communicate with Puppet Server\. (eg
|
|
1189
1197
|
Sets the max number of logged/displayed parser validation deprecation warnings in case multiple deprecation warnings have been detected\. A value of 0 blocks the logging of deprecation warnings\. The count is per manifest\.
|
1190
1198
|
.
|
1191
1199
|
.IP "\(bu" 4
|
1192
|
-
\fIDefault\fR:
|
1200
|
+
\fIDefault\fR: \fB10\fR
|
1193
1201
|
.
|
1194
1202
|
.IP "" 0
|
1195
1203
|
.
|
@@ -1197,7 +1205,7 @@ Sets the max number of logged/displayed parser validation deprecation warnings i
|
|
1197
1205
|
Sets the max number of logged/displayed parser validation errors in case multiple errors have been detected\. A value of 0 is the same as a value of 1; a minimum of one error is always raised\. The count is per manifest\.
|
1198
1206
|
.
|
1199
1207
|
.IP "\(bu" 4
|
1200
|
-
\fIDefault\fR:
|
1208
|
+
\fIDefault\fR: \fB10\fR
|
1201
1209
|
.
|
1202
1210
|
.IP "" 0
|
1203
1211
|
.
|
@@ -1205,7 +1213,7 @@ Sets the max number of logged/displayed parser validation errors in case multipl
|
|
1205
1213
|
Sets the max number of logged/displayed parser validation warnings in case multiple warnings have been detected\. A value of 0 blocks logging of warnings\. The count is per manifest\.
|
1206
1214
|
.
|
1207
1215
|
.IP "\(bu" 4
|
1208
|
-
\fIDefault\fR:
|
1216
|
+
\fIDefault\fR: \fB10\fR
|
1209
1217
|
.
|
1210
1218
|
.IP "" 0
|
1211
1219
|
.
|
@@ -1213,7 +1221,7 @@ Sets the max number of logged/displayed parser validation warnings in case multi
|
|
1213
1221
|
The maximum allowed UID\. Some platforms use negative UIDs but then ship with tools that do not know how to handle signed ints, so the UIDs show up as huge numbers that can then not be fed back into the system\. This is a hackish way to fail in a slightly more useful way when that happens\.
|
1214
1222
|
.
|
1215
1223
|
.IP "\(bu" 4
|
1216
|
-
\fIDefault\fR:
|
1224
|
+
\fIDefault\fR: \fB4294967290\fR
|
1217
1225
|
.
|
1218
1226
|
.IP "" 0
|
1219
1227
|
.
|
@@ -1221,7 +1229,7 @@ The maximum allowed UID\. Some platforms use negative UIDs but then ship with to
|
|
1221
1229
|
The maximum amount of time the Puppet agent should wait for its certificate request to be signed\. A value of \fBunlimited\fR will cause puppet agent to ask for a signed certificate indefinitely\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
1222
1230
|
.
|
1223
1231
|
.IP "\(bu" 4
|
1224
|
-
\fIDefault\fR:
|
1232
|
+
\fIDefault\fR: \fBunlimited\fR
|
1225
1233
|
.
|
1226
1234
|
.IP "" 0
|
1227
1235
|
.
|
@@ -1229,7 +1237,7 @@ The maximum amount of time the Puppet agent should wait for its certificate requ
|
|
1229
1237
|
The maximum amount of time the puppet agent should wait for an already running puppet agent to finish before starting a new one\. This is set by default to 1 minute\. A value of \fBunlimited\fR will cause puppet agent to wait indefinitely\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
1230
1238
|
.
|
1231
1239
|
.IP "\(bu" 4
|
1232
|
-
\fIDefault\fR:
|
1240
|
+
\fIDefault\fR: \fB1m\fR
|
1233
1241
|
.
|
1234
1242
|
.IP "" 0
|
1235
1243
|
.
|
@@ -1243,7 +1251,7 @@ When a class has a failed dependency, every resource in the class generates a no
|
|
1243
1251
|
If true, all messages caused by a class dependency failure are merged into one message associated with the class\.
|
1244
1252
|
.
|
1245
1253
|
.IP "\(bu" 4
|
1246
|
-
\fIDefault\fR:
|
1254
|
+
\fIDefault\fR: \fBfalse\fR
|
1247
1255
|
.
|
1248
1256
|
.IP "" 0
|
1249
1257
|
.
|
@@ -1251,22 +1259,23 @@ If true, all messages caused by a class dependency failure are merged into one m
|
|
1251
1259
|
Whether to create the necessary user and group that puppet agent will run as\.
|
1252
1260
|
.
|
1253
1261
|
.IP "\(bu" 4
|
1254
|
-
\fIDefault\fR:
|
1262
|
+
\fIDefault\fR: \fBfalse\fR
|
1255
1263
|
.
|
1256
1264
|
.IP "" 0
|
1257
1265
|
.
|
1258
1266
|
.SS "module_groups"
|
1259
1267
|
Extra module groups to request from the Puppet Forge\. This is an internal setting, and users should never change it\.
|
1260
1268
|
.
|
1261
|
-
.
|
1262
|
-
\fIDefault\fR:
|
1263
|
-
|
1269
|
+
.IP "\(bu" 4
|
1270
|
+
\fIDefault\fR: ``
|
1271
|
+
.
|
1272
|
+
.IP "" 0
|
1264
1273
|
.
|
1265
1274
|
.SS "module_repository"
|
1266
1275
|
The module repository
|
1267
1276
|
.
|
1268
1277
|
.IP "\(bu" 4
|
1269
|
-
\fIDefault\fR:
|
1278
|
+
\fIDefault\fR: \fBhttps://forgeapi\.puppet\.com\fR
|
1270
1279
|
.
|
1271
1280
|
.IP "" 0
|
1272
1281
|
.
|
@@ -1274,7 +1283,7 @@ The module repository
|
|
1274
1283
|
The directory into which module tool data is stored
|
1275
1284
|
.
|
1276
1285
|
.IP "\(bu" 4
|
1277
|
-
\fIDefault\fR: $vardir/puppet\-module
|
1286
|
+
\fIDefault\fR: \fB$vardir/puppet\-module\fR
|
1278
1287
|
.
|
1279
1288
|
.IP "" 0
|
1280
1289
|
.
|
@@ -1287,15 +1296,16 @@ Setting a global value for \fBmodulepath\fR in puppet\.conf is not allowed (but
|
|
1287
1296
|
.SS "name"
|
1288
1297
|
The name of the application, if we are running as one\. The default is essentially $0 without the path or \fB\.rb\fR\.
|
1289
1298
|
.
|
1290
|
-
.
|
1291
|
-
\fIDefault\fR:
|
1292
|
-
|
1299
|
+
.IP "\(bu" 4
|
1300
|
+
\fIDefault\fR: ``
|
1301
|
+
.
|
1302
|
+
.IP "" 0
|
1293
1303
|
.
|
1294
1304
|
.SS "named_curve"
|
1295
1305
|
The short name for the EC curve used to generate the EC private key\. Valid values must be one of the curves in \fBOpenSSL::PKey::EC\.builtin_curves\fR\. Default is \fBprime256v1\fR\.
|
1296
1306
|
.
|
1297
1307
|
.IP "\(bu" 4
|
1298
|
-
\fIDefault\fR:
|
1308
|
+
\fIDefault\fR: \fBprime256v1\fR
|
1299
1309
|
.
|
1300
1310
|
.IP "" 0
|
1301
1311
|
.
|
@@ -1303,16 +1313,17 @@ The short name for the EC curve used to generate the EC private key\. Valid valu
|
|
1303
1313
|
List of host or domain names that should not go through \fBhttp_proxy_host\fR\. Environment variable no_proxy or NO_PROXY will override this value\. Names can be specified as an FQDN \fBhost\.example\.com\fR, wildcard \fB*\.example\.com\fR, dotted domain \fB\.example\.com\fR, or suffix \fBexample\.com\fR\.
|
1304
1314
|
.
|
1305
1315
|
.IP "\(bu" 4
|
1306
|
-
\fIDefault\fR:
|
1316
|
+
\fIDefault\fR: \fBlocalhost, 127\.0\.0\.1\fR
|
1307
1317
|
.
|
1308
1318
|
.IP "" 0
|
1309
1319
|
.
|
1310
1320
|
.SS "node_cache_terminus"
|
1311
1321
|
How to store cached nodes\. Valid values are (none), \'json\', \'msgpack\', or \'yaml\'\.
|
1312
1322
|
.
|
1313
|
-
.
|
1314
|
-
\fIDefault\fR:
|
1315
|
-
|
1323
|
+
.IP "\(bu" 4
|
1324
|
+
\fIDefault\fR: ``
|
1325
|
+
.
|
1326
|
+
.IP "" 0
|
1316
1327
|
.
|
1317
1328
|
.SS "node_name"
|
1318
1329
|
How the puppet master determines the client\'s identity and sets the \'hostname\', \'fqdn\' and \'domain\' facts for use in the manifest, in particular for determining which \'node\' statement applies to the client\. Possible values are \'cert\' (use the subject\'s CN in the client\'s certificate) and \'facter\' (use the hostname that the client reported in its facts)\.
|
@@ -1321,7 +1332,7 @@ How the puppet master determines the client\'s identity and sets the \'hostname\
|
|
1321
1332
|
This setting is deprecated, please use explicit fact matching for classification\.
|
1322
1333
|
.
|
1323
1334
|
.IP "\(bu" 4
|
1324
|
-
\fIDefault\fR:
|
1335
|
+
\fIDefault\fR: \fBcert\fR
|
1325
1336
|
.
|
1326
1337
|
.IP "" 0
|
1327
1338
|
.
|
@@ -1332,7 +1343,7 @@ The fact name used to determine the node name used for all requests the agent ma
|
|
1332
1343
|
The explicit value used for the node name for all requests the agent makes to the master\. WARNING: This setting is mutually exclusive with node_name_fact\. Changing this setting also requires changes to the default auth\.conf configuration on the Puppet Master\. Please see http://links\.puppet\.com/node_name_value for more information\.
|
1333
1344
|
.
|
1334
1345
|
.IP "\(bu" 4
|
1335
|
-
\fIDefault\fR: $certname
|
1346
|
+
\fIDefault\fR: \fB$certname\fR
|
1336
1347
|
.
|
1337
1348
|
.IP "" 0
|
1338
1349
|
.
|
@@ -1366,7 +1377,7 @@ The three main node data plugins are:
|
|
1366
1377
|
\fBclassifier\fR (formerly \fBconsole\fR) \-\-\- Specific to Puppet Enterprise\. Uses the PE console for node data\."
|
1367
1378
|
.
|
1368
1379
|
.IP "\(bu" 4
|
1369
|
-
\fIDefault\fR:
|
1380
|
+
\fIDefault\fR: \fBplain\fR
|
1370
1381
|
.
|
1371
1382
|
.IP "" 0
|
1372
1383
|
.
|
@@ -1380,7 +1391,7 @@ When running in noop mode, Puppet will check whether each resource is in sync, l
|
|
1380
1391
|
\fBImportant note:\fR The \fBnoop\fR metaparameter \fIhttps://puppet\.com/docs/puppet/latest/metaparameter\.html#noop\fR allows you to apply individual resources in noop mode, and will override the global value of the \fBnoop\fR setting\. This means a resource with \fBnoop => false\fR \fIwill\fR be changed if necessary, even when running puppet agent with \fBnoop = true\fR or \fB\-\-noop\fR\. (Conversely, a resource with \fBnoop => true\fR will only be simulated, even when noop mode is globally disabled\.)
|
1381
1392
|
.
|
1382
1393
|
.IP "\(bu" 4
|
1383
|
-
\fIDefault\fR:
|
1394
|
+
\fIDefault\fR: \fBfalse\fR
|
1384
1395
|
.
|
1385
1396
|
.IP "" 0
|
1386
1397
|
.
|
@@ -1388,7 +1399,7 @@ When running in noop mode, Puppet will check whether each resource is in sync, l
|
|
1388
1399
|
Perform one configuration run and exit, rather than spawning a long\-running daemon\. This is useful for interactively running puppet agent, or running puppet agent from cron\.
|
1389
1400
|
.
|
1390
1401
|
.IP "\(bu" 4
|
1391
|
-
\fIDefault\fR:
|
1402
|
+
\fIDefault\fR: \fBfalse\fR
|
1392
1403
|
.
|
1393
1404
|
.IP "" 0
|
1394
1405
|
.
|
@@ -1396,7 +1407,7 @@ Perform one configuration run and exit, rather than spawning a long\-running dae
|
|
1396
1407
|
Where puppet agent stores the password for its private key\. Generally unused\.
|
1397
1408
|
.
|
1398
1409
|
.IP "\(bu" 4
|
1399
|
-
\fIDefault\fR: $privatedir/password
|
1410
|
+
\fIDefault\fR: \fB$privatedir/password\fR
|
1400
1411
|
.
|
1401
1412
|
.IP "" 0
|
1402
1413
|
.
|
@@ -1407,7 +1418,7 @@ The shell search path\. Defaults to whatever is inherited from the parent proces
|
|
1407
1418
|
This setting can only be set in the \fB[main]\fR section of puppet\.conf; it cannot be set in \fB[server]\fR, \fB[agent]\fR, or an environment config section\.
|
1408
1419
|
.
|
1409
1420
|
.IP "\(bu" 4
|
1410
|
-
\fIDefault\fR:
|
1421
|
+
\fIDefault\fR: \fBnone\fR
|
1411
1422
|
.
|
1412
1423
|
.IP "" 0
|
1413
1424
|
.
|
@@ -1415,7 +1426,7 @@ This setting can only be set in the \fB[main]\fR section of puppet\.conf; it can
|
|
1415
1426
|
The file containing the PID of a running process\. This file is intended to be used by service management frameworks and monitoring systems to determine if a puppet process is still in the process table\.
|
1416
1427
|
.
|
1417
1428
|
.IP "\(bu" 4
|
1418
|
-
\fIDefault\fR: $rundir/${run_mode}\.pid
|
1429
|
+
\fIDefault\fR: \fB$rundir/${run_mode}\.pid\fR
|
1419
1430
|
.
|
1420
1431
|
.IP "" 0
|
1421
1432
|
.
|
@@ -1423,7 +1434,7 @@ The file containing the PID of a running process\. This file is intended to be u
|
|
1423
1434
|
Where Puppet should store plugins that it pulls down from the central server\.
|
1424
1435
|
.
|
1425
1436
|
.IP "\(bu" 4
|
1426
|
-
\fIDefault\fR: $libdir
|
1437
|
+
\fIDefault\fR: \fB$libdir\fR
|
1427
1438
|
.
|
1428
1439
|
.IP "" 0
|
1429
1440
|
.
|
@@ -1431,7 +1442,7 @@ Where Puppet should store plugins that it pulls down from the central server\.
|
|
1431
1442
|
Where Puppet should store external facts that are being handled by pluginsync
|
1432
1443
|
.
|
1433
1444
|
.IP "\(bu" 4
|
1434
|
-
\fIDefault\fR: $vardir/facts\.d
|
1445
|
+
\fIDefault\fR: \fB$vardir/facts\.d\fR
|
1435
1446
|
.
|
1436
1447
|
.IP "" 0
|
1437
1448
|
.
|
@@ -1439,7 +1450,7 @@ Where Puppet should store external facts that are being handled by pluginsync
|
|
1439
1450
|
Where to retrieve external facts for pluginsync
|
1440
1451
|
.
|
1441
1452
|
.IP "\(bu" 4
|
1442
|
-
\fIDefault\fR:
|
1453
|
+
\fIDefault\fR: \fBpuppet:///pluginfacts\fR
|
1443
1454
|
.
|
1444
1455
|
.IP "" 0
|
1445
1456
|
.
|
@@ -1447,7 +1458,7 @@ Where to retrieve external facts for pluginsync
|
|
1447
1458
|
What files to ignore when pulling down plugins\.
|
1448
1459
|
.
|
1449
1460
|
.IP "\(bu" 4
|
1450
|
-
\fIDefault\fR: \.svn CVS \.git \.hg
|
1461
|
+
\fIDefault\fR: \fB\.svn CVS \.git \.hg\fR
|
1451
1462
|
.
|
1452
1463
|
.IP "" 0
|
1453
1464
|
.
|
@@ -1455,7 +1466,7 @@ What files to ignore when pulling down plugins\.
|
|
1455
1466
|
From where to retrieve plugins\. The standard Puppet \fBfile\fR type is used for retrieval, so anything that is a valid file source can be used here\.
|
1456
1467
|
.
|
1457
1468
|
.IP "\(bu" 4
|
1458
|
-
\fIDefault\fR:
|
1469
|
+
\fIDefault\fR: \fBpuppet:///plugins\fR
|
1459
1470
|
.
|
1460
1471
|
.IP "" 0
|
1461
1472
|
.
|
@@ -1463,7 +1474,7 @@ From where to retrieve plugins\. The standard Puppet \fBfile\fR type is used for
|
|
1463
1474
|
Whether plugins should be synced with the central server\. This setting is deprecated\.
|
1464
1475
|
.
|
1465
1476
|
.IP "\(bu" 4
|
1466
|
-
\fIDefault\fR:
|
1477
|
+
\fIDefault\fR: \fBtrue\fR
|
1467
1478
|
.
|
1468
1479
|
.IP "" 0
|
1469
1480
|
.
|
@@ -1474,7 +1485,7 @@ A command to run after every agent run\. If this command returns a non\-zero ret
|
|
1474
1485
|
The preferred means of serializing ruby instances for passing over the wire\. This won\'t guarantee that all instances will be serialized using this method, since not all classes can be guaranteed to support this format, but it will be used for all classes that support it\.
|
1475
1486
|
.
|
1476
1487
|
.IP "\(bu" 4
|
1477
|
-
\fIDefault\fR:
|
1488
|
+
\fIDefault\fR: \fBjson\fR
|
1478
1489
|
.
|
1479
1490
|
.IP "" 0
|
1480
1491
|
.
|
@@ -1485,22 +1496,23 @@ A command to run before every agent run\. If this command returns a non\-zero re
|
|
1485
1496
|
The directory where catalog previews per node are generated\.
|
1486
1497
|
.
|
1487
1498
|
.IP "\(bu" 4
|
1488
|
-
\fIDefault\fR: $vardir/preview
|
1499
|
+
\fIDefault\fR: \fB$vardir/preview\fR
|
1489
1500
|
.
|
1490
1501
|
.IP "" 0
|
1491
1502
|
.
|
1492
1503
|
.SS "priority"
|
1493
1504
|
The scheduling priority of the process\. Valid values are \'high\', \'normal\', \'low\', or \'idle\', which are mapped to platform\-specific values\. The priority can also be specified as an integer value and will be passed as is, e\.g\. \-5\. Puppet must be running as a privileged user in order to increase scheduling priority\.
|
1494
1505
|
.
|
1495
|
-
.
|
1496
|
-
\fIDefault\fR:
|
1497
|
-
|
1506
|
+
.IP "\(bu" 4
|
1507
|
+
\fIDefault\fR: ``
|
1508
|
+
.
|
1509
|
+
.IP "" 0
|
1498
1510
|
.
|
1499
1511
|
.SS "privatedir"
|
1500
1512
|
Where the client stores private certificate information\.
|
1501
1513
|
.
|
1502
1514
|
.IP "\(bu" 4
|
1503
|
-
\fIDefault\fR: $ssldir/private
|
1515
|
+
\fIDefault\fR: \fB$ssldir/private\fR
|
1504
1516
|
.
|
1505
1517
|
.IP "" 0
|
1506
1518
|
.
|
@@ -1508,7 +1520,7 @@ Where the client stores private certificate information\.
|
|
1508
1520
|
The private key directory\.
|
1509
1521
|
.
|
1510
1522
|
.IP "\(bu" 4
|
1511
|
-
\fIDefault\fR: $ssldir/private_keys
|
1523
|
+
\fIDefault\fR: \fB$ssldir/private_keys\fR
|
1512
1524
|
.
|
1513
1525
|
.IP "" 0
|
1514
1526
|
.
|
@@ -1516,7 +1528,7 @@ The private key directory\.
|
|
1516
1528
|
Whether to enable experimental performance profiling
|
1517
1529
|
.
|
1518
1530
|
.IP "\(bu" 4
|
1519
|
-
\fIDefault\fR:
|
1531
|
+
\fIDefault\fR: \fBfalse\fR
|
1520
1532
|
.
|
1521
1533
|
.IP "" 0
|
1522
1534
|
.
|
@@ -1524,7 +1536,7 @@ Whether to enable experimental performance profiling
|
|
1524
1536
|
The public key directory\.
|
1525
1537
|
.
|
1526
1538
|
.IP "\(bu" 4
|
1527
|
-
\fIDefault\fR: $ssldir/public_keys
|
1539
|
+
\fIDefault\fR: \fB$ssldir/public_keys\fR
|
1528
1540
|
.
|
1529
1541
|
.IP "" 0
|
1530
1542
|
.
|
@@ -1532,7 +1544,7 @@ The public key directory\.
|
|
1532
1544
|
Whether to print the Puppet stack trace on some errors\. This is a noop if \fBtrace\fR is also set\.
|
1533
1545
|
.
|
1534
1546
|
.IP "\(bu" 4
|
1535
|
-
\fIDefault\fR:
|
1547
|
+
\fIDefault\fR: \fBfalse\fR
|
1536
1548
|
.
|
1537
1549
|
.IP "" 0
|
1538
1550
|
.
|
@@ -1546,7 +1558,7 @@ Despite the name, both puppet agent and puppet master will use this file as the
|
|
1546
1558
|
For control over logging destinations, see the \fB\-\-logdest\fR command line option in the manual pages for puppet master, puppet agent, and puppet apply\. You can see man pages by running \fBpuppet <SUBCOMMAND> \-\-help\fR, or read them online at https://puppet\.com/docs/puppet/latest/man/\.
|
1547
1559
|
.
|
1548
1560
|
.IP "\(bu" 4
|
1549
|
-
\fIDefault\fR: $logdir/puppetd\.log
|
1561
|
+
\fIDefault\fR: \fB$logdir/puppetd\.log\fR
|
1550
1562
|
.
|
1551
1563
|
.IP "" 0
|
1552
1564
|
.
|
@@ -1554,7 +1566,7 @@ For control over logging destinations, see the \fB\-\-logdest\fR command line op
|
|
1554
1566
|
Whether to send reports after every transaction\.
|
1555
1567
|
.
|
1556
1568
|
.IP "\(bu" 4
|
1557
|
-
\fIDefault\fR:
|
1569
|
+
\fIDefault\fR: \fBtrue\fR
|
1558
1570
|
.
|
1559
1571
|
.IP "" 0
|
1560
1572
|
.
|
@@ -1562,7 +1574,7 @@ Whether to send reports after every transaction\.
|
|
1562
1574
|
Whether the \'http\' report processor should include the system certificate store when submitting reports to HTTPS URLs\. If false, then the \'http\' processor will only trust HTTPS report servers whose certificates are issued by the puppet CA or one of its intermediate CAs\. If true, the processor will additionally trust CA certificates in the system\'s certificate store\.
|
1563
1575
|
.
|
1564
1576
|
.IP "\(bu" 4
|
1565
|
-
\fIDefault\fR:
|
1577
|
+
\fIDefault\fR: \fBfalse\fR
|
1566
1578
|
.
|
1567
1579
|
.IP "" 0
|
1568
1580
|
.
|
@@ -1570,7 +1582,7 @@ Whether the \'http\' report processor should include the system certificate stor
|
|
1570
1582
|
The port to communicate with the report_server\.
|
1571
1583
|
.
|
1572
1584
|
.IP "\(bu" 4
|
1573
|
-
\fIDefault\fR: $serverport
|
1585
|
+
\fIDefault\fR: \fB$serverport\fR
|
1574
1586
|
.
|
1575
1587
|
.IP "" 0
|
1576
1588
|
.
|
@@ -1578,7 +1590,7 @@ The port to communicate with the report_server\.
|
|
1578
1590
|
The server to send transaction reports to\.
|
1579
1591
|
.
|
1580
1592
|
.IP "\(bu" 4
|
1581
|
-
\fIDefault\fR: $server
|
1593
|
+
\fIDefault\fR: \fB$server\fR
|
1582
1594
|
.
|
1583
1595
|
.IP "" 0
|
1584
1596
|
.
|
@@ -1586,7 +1598,7 @@ The server to send transaction reports to\.
|
|
1586
1598
|
The directory in which to store reports\. Each node gets a separate subdirectory in this directory\. This setting is only used when the \fBstore\fR report processor is enabled (see the \fBreports\fR setting)\.
|
1587
1599
|
.
|
1588
1600
|
.IP "\(bu" 4
|
1589
|
-
\fIDefault\fR: $vardir/reports
|
1601
|
+
\fIDefault\fR: \fB$vardir/reports\fR
|
1590
1602
|
.
|
1591
1603
|
.IP "" 0
|
1592
1604
|
.
|
@@ -1599,8 +1611,11 @@ This setting is relevant to puppet master and puppet apply\. The puppet master w
|
|
1599
1611
|
.P
|
1600
1612
|
See the report reference for information on the built\-in report handlers; custom report handlers can also be loaded from modules\. (Report handlers are loaded from the lib directory, at \fBpuppet/reports/NAME\.rb\fR\.)
|
1601
1613
|
.
|
1614
|
+
.P
|
1615
|
+
To turn off reports entirely, set this to \fBnone\fR
|
1616
|
+
.
|
1602
1617
|
.IP "\(bu" 4
|
1603
|
-
\fIDefault\fR:
|
1618
|
+
\fIDefault\fR: \fBstore\fR
|
1604
1619
|
.
|
1605
1620
|
.IP "" 0
|
1606
1621
|
.
|
@@ -1608,7 +1623,7 @@ See the report reference for information on the built\-in report handlers; custo
|
|
1608
1623
|
The URL that reports should be forwarded to\. This setting is only used when the \fBhttp\fR report processor is enabled (see the \fBreports\fR setting)\.
|
1609
1624
|
.
|
1610
1625
|
.IP "\(bu" 4
|
1611
|
-
\fIDefault\fR:
|
1626
|
+
\fIDefault\fR: \fBhttp://localhost:3000/reports/upload\fR
|
1612
1627
|
.
|
1613
1628
|
.IP "" 0
|
1614
1629
|
.
|
@@ -1616,7 +1631,7 @@ The URL that reports should be forwarded to\. This setting is only used when the
|
|
1616
1631
|
Where host certificate requests are stored\.
|
1617
1632
|
.
|
1618
1633
|
.IP "\(bu" 4
|
1619
|
-
\fIDefault\fR: $ssldir/certificate_requests
|
1634
|
+
\fIDefault\fR: \fB$ssldir/certificate_requests\fR
|
1620
1635
|
.
|
1621
1636
|
.IP "" 0
|
1622
1637
|
.
|
@@ -1624,7 +1639,7 @@ Where host certificate requests are stored\.
|
|
1624
1639
|
The file in which puppet agent stores a list of the resources associated with the retrieved configuration\.
|
1625
1640
|
.
|
1626
1641
|
.IP "\(bu" 4
|
1627
|
-
\fIDefault\fR: $statedir/resources\.txt
|
1642
|
+
\fIDefault\fR: \fB$statedir/resources\.txt\fR
|
1628
1643
|
.
|
1629
1644
|
.IP "" 0
|
1630
1645
|
.
|
@@ -1632,7 +1647,7 @@ The file in which puppet agent stores a list of the resources associated with th
|
|
1632
1647
|
The configuration file that defines the rights to the different rest indirections\. This can be used as a fine\-grained authorization system for \fBpuppet master\fR\. The \fBpuppet master\fR command is deprecated and Puppet Server uses its own auth\.conf that must be placed within its configuration directory\.
|
1633
1648
|
.
|
1634
1649
|
.IP "\(bu" 4
|
1635
|
-
\fIDefault\fR: $confdir/auth\.conf
|
1650
|
+
\fIDefault\fR: \fB$confdir/auth\.conf\fR
|
1636
1651
|
.
|
1637
1652
|
.IP "" 0
|
1638
1653
|
.
|
@@ -1640,7 +1655,7 @@ The configuration file that defines the rights to the different rest indirection
|
|
1640
1655
|
Whether to send updated facts after every transaction\. By default puppet only submits facts at the beginning of the transaction before applying a catalog\. Since puppet can modify the state of the system, the value of the facts may change after puppet finishes\. Therefore, any facts stored in puppetdb may not be consistent until the agent next runs, typically in 30 minutes\. If this feature is enabled, puppet will resubmit facts after applying its catalog, ensuring facts for the node stored in puppetdb are current\. However, this will double the fact submission load on puppetdb, so it is disabled by default\.
|
1641
1656
|
.
|
1642
1657
|
.IP "\(bu" 4
|
1643
|
-
\fIDefault\fR:
|
1658
|
+
\fIDefault\fR: \fBfalse\fR
|
1644
1659
|
.
|
1645
1660
|
.IP "" 0
|
1646
1661
|
.
|
@@ -1648,7 +1663,7 @@ Whether to send updated facts after every transaction\. By default puppet only s
|
|
1648
1663
|
Enables having extended data in the catalog by storing them as a hash with the special key \fB__ptype\fR\. When enabled, resource containing values of the data types \fBBinary\fR, \fBRegexp\fR, \fBSemVer\fR, \fBSemVerRange\fR, \fBTimespan\fR and \fBTimestamp\fR, as well as instances of types derived from \fBObject\fR retain their data type\.
|
1649
1664
|
.
|
1650
1665
|
.IP "\(bu" 4
|
1651
|
-
\fIDefault\fR:
|
1666
|
+
\fIDefault\fR: \fBtrue\fR
|
1652
1667
|
.
|
1653
1668
|
.IP "" 0
|
1654
1669
|
.
|
@@ -1656,7 +1671,7 @@ Enables having extended data in the catalog by storing them as a hash with the s
|
|
1656
1671
|
The YAML file containing indirector route configuration\.
|
1657
1672
|
.
|
1658
1673
|
.IP "\(bu" 4
|
1659
|
-
\fIDefault\fR: $confdir/routes\.yaml
|
1674
|
+
\fIDefault\fR: \fB$confdir/routes\.yaml\fR
|
1660
1675
|
.
|
1661
1676
|
.IP "" 0
|
1662
1677
|
.
|
@@ -1664,7 +1679,7 @@ The YAML file containing indirector route configuration\.
|
|
1664
1679
|
Where Puppet PID files are kept\.
|
1665
1680
|
.
|
1666
1681
|
.IP "\(bu" 4
|
1667
|
-
\fIDefault\fR:
|
1682
|
+
\fIDefault\fR: \fBUnix/Linux: /var/run/puppetlabs \-\- Windows: C:\eProgramData\ePuppetLabs\epuppet\evar\erun \-\- Non\-root user: ~/\.puppetlabs/var/run\fR
|
1668
1683
|
.
|
1669
1684
|
.IP "" 0
|
1670
1685
|
.
|
@@ -1672,7 +1687,7 @@ Where Puppet PID files are kept\.
|
|
1672
1687
|
How often puppet agent applies the catalog\. Note that a runinterval of 0 means "run continuously" rather than "never run\." This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
1673
1688
|
.
|
1674
1689
|
.IP "\(bu" 4
|
1675
|
-
\fIDefault\fR:
|
1690
|
+
\fIDefault\fR: \fB30m\fR
|
1676
1691
|
.
|
1677
1692
|
.IP "" 0
|
1678
1693
|
.
|
@@ -1680,7 +1695,7 @@ How often puppet agent applies the catalog\. Note that a runinterval of 0 means
|
|
1680
1695
|
The maximum amount of time an agent run is allowed to take\. A Puppet agent run that exceeds this timeout will be aborted\. A value of 0 disables the timeout\. Defaults to 1 hour\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
1681
1696
|
.
|
1682
1697
|
.IP "\(bu" 4
|
1683
|
-
\fIDefault\fR:
|
1698
|
+
\fIDefault\fR: \fB1h\fR
|
1684
1699
|
.
|
1685
1700
|
.IP "" 0
|
1686
1701
|
.
|
@@ -1688,7 +1703,7 @@ The maximum amount of time an agent run is allowed to take\. A Puppet agent run
|
|
1688
1703
|
Where the serial number for certificates is stored\.
|
1689
1704
|
.
|
1690
1705
|
.IP "\(bu" 4
|
1691
|
-
\fIDefault\fR: $cadir/serial
|
1706
|
+
\fIDefault\fR: \fB$cadir/serial\fR
|
1692
1707
|
.
|
1693
1708
|
.IP "" 0
|
1694
1709
|
.
|
@@ -1696,7 +1711,7 @@ Where the serial number for certificates is stored\.
|
|
1696
1711
|
The puppet master server to which the puppet agent should connect\.
|
1697
1712
|
.
|
1698
1713
|
.IP "\(bu" 4
|
1699
|
-
\fIDefault\fR:
|
1714
|
+
\fIDefault\fR: \fBpuppet\fR
|
1700
1715
|
.
|
1701
1716
|
.IP "" 0
|
1702
1717
|
.
|
@@ -1704,7 +1719,7 @@ The puppet master server to which the puppet agent should connect\.
|
|
1704
1719
|
The directory in which serialized data is stored, usually in a subdirectory\.
|
1705
1720
|
.
|
1706
1721
|
.IP "\(bu" 4
|
1707
|
-
\fIDefault\fR: $vardir/server_data
|
1722
|
+
\fIDefault\fR: \fB$vardir/server_data\fR
|
1708
1723
|
.
|
1709
1724
|
.IP "" 0
|
1710
1725
|
.
|
@@ -1712,7 +1727,7 @@ The directory in which serialized data is stored, usually in a subdirectory\.
|
|
1712
1727
|
The list of puppet master servers to which the puppet agent should connect, in the order that they will be tried\.
|
1713
1728
|
.
|
1714
1729
|
.IP "\(bu" 4
|
1715
|
-
\fIDefault\fR: []
|
1730
|
+
\fIDefault\fR: \fB[]\fR
|
1716
1731
|
.
|
1717
1732
|
.IP "" 0
|
1718
1733
|
.
|
@@ -1720,7 +1735,7 @@ The list of puppet master servers to which the puppet agent should connect, in t
|
|
1720
1735
|
The default port puppet subcommands use to communicate with Puppet Server\. (eg \fBpuppet facts upload\fR, \fBpuppet agent\fR)\. May be overridden by more specific settings (see \fBca_port\fR, \fBreport_port\fR)\.
|
1721
1736
|
.
|
1722
1737
|
.IP "\(bu" 4
|
1723
|
-
\fIDefault\fR:
|
1738
|
+
\fIDefault\fR: \fB8140\fR
|
1724
1739
|
.
|
1725
1740
|
.IP "" 0
|
1726
1741
|
.
|
@@ -1728,7 +1743,7 @@ The default port puppet subcommands use to communicate with Puppet Server\. (eg
|
|
1728
1743
|
Whether to log and report a contextual diff when files are being replaced\. This causes partial file contents to pass through Puppet\'s normal logging and reporting system, so this setting should be used with caution if you are sending Puppet\'s reports to an insecure destination\. This feature currently requires the \fBdiff/lcs\fR Ruby library\.
|
1729
1744
|
.
|
1730
1745
|
.IP "\(bu" 4
|
1731
|
-
\fIDefault\fR:
|
1746
|
+
\fIDefault\fR: \fBfalse\fR
|
1732
1747
|
.
|
1733
1748
|
.IP "" 0
|
1734
1749
|
.
|
@@ -1736,7 +1751,7 @@ Whether to log and report a contextual diff when files are being replaced\. This
|
|
1736
1751
|
Where the CA stores signed certificates\.
|
1737
1752
|
.
|
1738
1753
|
.IP "\(bu" 4
|
1739
|
-
\fIDefault\fR: $cadir/signed
|
1754
|
+
\fIDefault\fR: \fB$cadir/signed\fR
|
1740
1755
|
.
|
1741
1756
|
.IP "" 0
|
1742
1757
|
.
|
@@ -1746,9 +1761,10 @@ Tags to use to filter resources\. If this is set, then only resources not tagged
|
|
1746
1761
|
.SS "sourceaddress"
|
1747
1762
|
The address the agent should use to initiate requests\.
|
1748
1763
|
.
|
1749
|
-
.
|
1750
|
-
\fIDefault\fR:
|
1751
|
-
|
1764
|
+
.IP "\(bu" 4
|
1765
|
+
\fIDefault\fR: ``
|
1766
|
+
.
|
1767
|
+
.IP "" 0
|
1752
1768
|
.
|
1753
1769
|
.SS "splay"
|
1754
1770
|
Whether to sleep for a random amount of time, ranging from immediately up to its \fB$splaylimit\fR, before performing its first agent run after a service restart\. After this period, the agent runs periodically on its \fB$runinterval\fR\.
|
@@ -1763,7 +1779,7 @@ With \fBsplay\fR enabled, it waits any amount of time up to its \fB$splaylimit\f
|
|
1763
1779
|
If you restart an agent\'s puppet service with \fBsplay\fR enabled, it recalculates its splay period and delays its first agent run after restarting for this new period\. If you simultaneously restart a group of puppet agents with \fBsplay\fR enabled, their checkins to your puppet masters can be distributed more evenly\.
|
1764
1780
|
.
|
1765
1781
|
.IP "\(bu" 4
|
1766
|
-
\fIDefault\fR:
|
1782
|
+
\fIDefault\fR: \fBfalse\fR
|
1767
1783
|
.
|
1768
1784
|
.IP "" 0
|
1769
1785
|
.
|
@@ -1771,7 +1787,7 @@ If you restart an agent\'s puppet service with \fBsplay\fR enabled, it recalcula
|
|
1771
1787
|
The maximum time to delay before an agent\'s first run when \fBsplay\fR is enabled\. Defaults to the agent\'s \fB$runinterval\fR\. The \fBsplay\fR interval is random and recalculated each time the agent is started or restarted\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
1772
1788
|
.
|
1773
1789
|
.IP "\(bu" 4
|
1774
|
-
\fIDefault\fR: $runinterval
|
1790
|
+
\fIDefault\fR: \fB$runinterval\fR
|
1775
1791
|
.
|
1776
1792
|
.IP "" 0
|
1777
1793
|
.
|
@@ -1779,16 +1795,17 @@ The maximum time to delay before an agent\'s first run when \fBsplay\fR is enabl
|
|
1779
1795
|
The domain which will be queried to find the SRV records of servers to use\.
|
1780
1796
|
.
|
1781
1797
|
.IP "\(bu" 4
|
1782
|
-
\fIDefault\fR:
|
1798
|
+
\fIDefault\fR: \fBci\-jenkins\-setup\-platform\.svc\.cluster\.local\fR
|
1783
1799
|
.
|
1784
1800
|
.IP "" 0
|
1785
1801
|
.
|
1786
1802
|
.SS "ssl_client_ca_auth"
|
1787
1803
|
Certificate authorities who issue server certificates\. SSL servers will not be considered authentic unless they possess a certificate issued by an authority listed in this file\. If this setting has no value then the Puppet master\'s CA certificate (localcacert) will be used\.
|
1788
1804
|
.
|
1789
|
-
.
|
1790
|
-
\fIDefault\fR:
|
1791
|
-
|
1805
|
+
.IP "\(bu" 4
|
1806
|
+
\fIDefault\fR: ``
|
1807
|
+
.
|
1808
|
+
.IP "" 0
|
1792
1809
|
.
|
1793
1810
|
.SS "ssl_client_header"
|
1794
1811
|
The header containing an authenticated client\'s SSL DN\. This header must be set by the proxy to the authenticated client\'s SSL DN (e\.g\., \fB/CN=puppet\.puppetlabs\.com\fR)\. Puppet will parse out the Common Name (CN) from the Distinguished Name (DN) and use the value of the CN field for authorization\.
|
@@ -1797,7 +1814,7 @@ The header containing an authenticated client\'s SSL DN\. This header must be se
|
|
1797
1814
|
Note that the name of the HTTP header gets munged by the web server common gateway interface: an \fBHTTP_\fR prefix is added, dashes are converted to underscores, and all letters are uppercased\. Thus, to use the \fBX\-Client\-DN\fR header, this setting should be \fBHTTP_X_CLIENT_DN\fR\.
|
1798
1815
|
.
|
1799
1816
|
.IP "\(bu" 4
|
1800
|
-
\fIDefault\fR:
|
1817
|
+
\fIDefault\fR: \fBHTTP_X_CLIENT_DN\fR
|
1801
1818
|
.
|
1802
1819
|
.IP "" 0
|
1803
1820
|
.
|
@@ -1808,7 +1825,7 @@ The header containing the status message of the client verification\. This heade
|
|
1808
1825
|
Note that the name of the HTTP header gets munged by the web server common gateway interface: an \fBHTTP_\fR prefix is added, dashes are converted to underscores, and all letters are uppercased\. Thus, to use the \fBX\-Client\-Verify\fR header, this setting should be \fBHTTP_X_CLIENT_VERIFY\fR\.
|
1809
1826
|
.
|
1810
1827
|
.IP "\(bu" 4
|
1811
|
-
\fIDefault\fR:
|
1828
|
+
\fIDefault\fR: \fBHTTP_X_CLIENT_VERIFY\fR
|
1812
1829
|
.
|
1813
1830
|
.IP "" 0
|
1814
1831
|
.
|
@@ -1816,29 +1833,31 @@ Note that the name of the HTTP header gets munged by the web server common gatew
|
|
1816
1833
|
A lock file to indicate that the ssl bootstrap process is currently in progress\.
|
1817
1834
|
.
|
1818
1835
|
.IP "\(bu" 4
|
1819
|
-
\fIDefault\fR: $ssldir/ssl\.lock
|
1836
|
+
\fIDefault\fR: \fB$ssldir/ssl\.lock\fR
|
1820
1837
|
.
|
1821
1838
|
.IP "" 0
|
1822
1839
|
.
|
1823
1840
|
.SS "ssl_server_ca_auth"
|
1824
1841
|
The setting is deprecated and has no effect\. Ensure all root and intermediate certificate authorities used to issue client certificates are contained in the server\'s \fBcacert\fR file on the server\.
|
1825
1842
|
.
|
1826
|
-
.
|
1827
|
-
\fIDefault\fR:
|
1828
|
-
|
1843
|
+
.IP "\(bu" 4
|
1844
|
+
\fIDefault\fR: ``
|
1845
|
+
.
|
1846
|
+
.IP "" 0
|
1829
1847
|
.
|
1830
1848
|
.SS "ssl_trust_store"
|
1831
1849
|
A file containing CA certificates in PEM format that puppet should trust when making HTTPS requests\. This \fBonly\fR applies to https requests to non\-puppet infrastructure, such as retrieving file metadata and content from https file sources, puppet module tool and the \'http\' report processor\. This setting is ignored when making requests to puppet:// URLs such as catalog and report requests\.
|
1832
1850
|
.
|
1833
|
-
.
|
1834
|
-
\fIDefault\fR:
|
1835
|
-
|
1851
|
+
.IP "\(bu" 4
|
1852
|
+
\fIDefault\fR: ``
|
1853
|
+
.
|
1854
|
+
.IP "" 0
|
1836
1855
|
.
|
1837
1856
|
.SS "ssldir"
|
1838
1857
|
Where SSL certificates are kept\.
|
1839
1858
|
.
|
1840
1859
|
.IP "\(bu" 4
|
1841
|
-
\fIDefault\fR: $confdir/ssl
|
1860
|
+
\fIDefault\fR: \fB$confdir/ssl\fR
|
1842
1861
|
.
|
1843
1862
|
.IP "" 0
|
1844
1863
|
.
|
@@ -1846,7 +1865,7 @@ Where SSL certificates are kept\.
|
|
1846
1865
|
The directory where Puppet state is stored\. Generally, this directory can be removed without causing harm (although it might result in spurious service restarts)\.
|
1847
1866
|
.
|
1848
1867
|
.IP "\(bu" 4
|
1849
|
-
\fIDefault\fR: $vardir/state
|
1868
|
+
\fIDefault\fR: \fB$vardir/state\fR
|
1850
1869
|
.
|
1851
1870
|
.IP "" 0
|
1852
1871
|
.
|
@@ -1854,7 +1873,7 @@ The directory where Puppet state is stored\. Generally, this directory can be re
|
|
1854
1873
|
Where puppet agent and puppet master store state associated with the running configuration\. In the case of puppet master, this file reflects the state discovered through interacting with clients\.
|
1855
1874
|
.
|
1856
1875
|
.IP "\(bu" 4
|
1857
|
-
\fIDefault\fR: $statedir/state\.yaml
|
1876
|
+
\fIDefault\fR: \fB$statedir/state\.yaml\fR
|
1858
1877
|
.
|
1859
1878
|
.IP "" 0
|
1860
1879
|
.
|
@@ -1865,7 +1884,7 @@ How long the Puppet agent should cache when a resource was last checked or synce
|
|
1865
1884
|
This setting affects the usage of \fBschedule\fR resources, as the information about when a resource was last checked (and therefore when it needs to be checked again) is stored in the \fBstatefile\fR\. The \fBstatettl\fR needs to be large enough to ensure that a resource will not trigger multiple times during a schedule due to its entry expiring from the cache\.
|
1866
1885
|
.
|
1867
1886
|
.IP "\(bu" 4
|
1868
|
-
\fIDefault\fR:
|
1887
|
+
\fIDefault\fR: \fB32d\fR
|
1869
1888
|
.
|
1870
1889
|
.IP "" 0
|
1871
1890
|
.
|
@@ -1873,7 +1892,7 @@ This setting affects the usage of \fBschedule\fR resources, as the information a
|
|
1873
1892
|
Whether to compile a static catalog \fIhttps://puppet\.com/docs/puppet/latest/static_catalogs\.html#enabling\-or\-disabling\-static\-catalogs\fR, which occurs only on a Puppet Server master when the \fBcode\-id\-command\fR and \fBcode\-content\-command\fR settings are configured in its \fBpuppetserver\.conf\fR file\.
|
1874
1893
|
.
|
1875
1894
|
.IP "\(bu" 4
|
1876
|
-
\fIDefault\fR:
|
1895
|
+
\fIDefault\fR: \fBtrue\fR
|
1877
1896
|
.
|
1878
1897
|
.IP "" 0
|
1879
1898
|
.
|
@@ -1887,7 +1906,7 @@ By default this uses the \'puppetdb\' backend\.
|
|
1887
1906
|
You can adjust the backend using the storeconfigs_backend setting\.
|
1888
1907
|
.
|
1889
1908
|
.IP "\(bu" 4
|
1890
|
-
\fIDefault\fR:
|
1909
|
+
\fIDefault\fR: \fBfalse\fR
|
1891
1910
|
.
|
1892
1911
|
.IP "" 0
|
1893
1912
|
.
|
@@ -1895,7 +1914,7 @@ You can adjust the backend using the storeconfigs_backend setting\.
|
|
1895
1914
|
Configure the backend terminus used for StoreConfigs\. By default, this uses the PuppetDB store, which must be installed and configured before turning on StoreConfigs\.
|
1896
1915
|
.
|
1897
1916
|
.IP "\(bu" 4
|
1898
|
-
\fIDefault\fR:
|
1917
|
+
\fIDefault\fR: \fBpuppetdb\fR
|
1899
1918
|
.
|
1900
1919
|
.IP "" 0
|
1901
1920
|
.
|
@@ -1920,7 +1939,7 @@ The strictness level is for both language semantics and runtime evaluation valid
|
|
1920
1939
|
No new validations will be added to a micro (x\.y\.z) release, but may be added in minor releases (x\.y\.0)\. In major releases it expected that most (if not all) strictness validation become standard behavior\.
|
1921
1940
|
.
|
1922
1941
|
.IP "\(bu" 4
|
1923
|
-
\fIDefault\fR:
|
1942
|
+
\fIDefault\fR: \fBwarning\fR
|
1924
1943
|
.
|
1925
1944
|
.IP "" 0
|
1926
1945
|
.
|
@@ -1928,7 +1947,7 @@ No new validations will be added to a micro (x\.y\.z) release, but may be added
|
|
1928
1947
|
Whether the agent specified environment should be considered authoritative, causing the run to fail if the retrieved catalog does not match it\.
|
1929
1948
|
.
|
1930
1949
|
.IP "\(bu" 4
|
1931
|
-
\fIDefault\fR:
|
1950
|
+
\fIDefault\fR: \fBfalse\fR
|
1932
1951
|
.
|
1933
1952
|
.IP "" 0
|
1934
1953
|
.
|
@@ -1939,7 +1958,7 @@ Whether to only search for the complete hostname as it is in the certificate whe
|
|
1939
1958
|
This setting is deprecated and will be removed in a future release\.
|
1940
1959
|
.
|
1941
1960
|
.IP "\(bu" 4
|
1942
|
-
\fIDefault\fR:
|
1961
|
+
\fIDefault\fR: \fBtrue\fR
|
1943
1962
|
.
|
1944
1963
|
.IP "" 0
|
1945
1964
|
.
|
@@ -1947,7 +1966,7 @@ This setting is deprecated and will be removed in a future release\.
|
|
1947
1966
|
Causes an evaluation error when referencing unknown variables\. (This does not affect referencing variables that are explicitly set to undef)\.
|
1948
1967
|
.
|
1949
1968
|
.IP "\(bu" 4
|
1950
|
-
\fIDefault\fR:
|
1969
|
+
\fIDefault\fR: \fBfalse\fR
|
1951
1970
|
.
|
1952
1971
|
.IP "" 0
|
1953
1972
|
.
|
@@ -1955,7 +1974,7 @@ Causes an evaluation error when referencing unknown variables\. (This does not a
|
|
1955
1974
|
Whether to print a transaction summary\.
|
1956
1975
|
.
|
1957
1976
|
.IP "\(bu" 4
|
1958
|
-
\fIDefault\fR:
|
1977
|
+
\fIDefault\fR: \fBfalse\fR
|
1959
1978
|
.
|
1960
1979
|
.IP "" 0
|
1961
1980
|
.
|
@@ -1963,7 +1982,7 @@ Whether to print a transaction summary\.
|
|
1963
1982
|
Checksum types supported by this agent for use in file resources of a static catalog\. Values must be comma\-separated\. Valid types are md5, md5lite, sha256, sha256lite, sha384, sha512, sha224, sha1, sha1lite, mtime, ctime\. Default is md5, sha256, sha384, sha512, sha224\.
|
1964
1983
|
.
|
1965
1984
|
.IP "\(bu" 4
|
1966
|
-
\fIDefault\fR: ["md5", "sha256", "sha384", "sha512", "sha224"]
|
1985
|
+
\fIDefault\fR: \fB["md5", "sha256", "sha384", "sha512", "sha224"]\fR
|
1967
1986
|
.
|
1968
1987
|
.IP "" 0
|
1969
1988
|
.
|
@@ -1971,7 +1990,7 @@ Checksum types supported by this agent for use in file resources of a static cat
|
|
1971
1990
|
What syslog facility to use when logging to syslog\. Syslog has a fixed list of valid facilities, and you must choose one of those; you cannot just make one up\.
|
1972
1991
|
.
|
1973
1992
|
.IP "\(bu" 4
|
1974
|
-
\fIDefault\fR:
|
1993
|
+
\fIDefault\fR: \fBdaemon\fR
|
1975
1994
|
.
|
1976
1995
|
.IP "" 0
|
1977
1996
|
.
|
@@ -1982,7 +2001,7 @@ Tags to use to find resources\. If this is set, then only resources tagged with
|
|
1982
2001
|
Turns on experimental support for tasks and plans in the puppet language\. This is for internal API use only\. Do not change this setting\.
|
1983
2002
|
.
|
1984
2003
|
.IP "\(bu" 4
|
1985
|
-
\fIDefault\fR:
|
2004
|
+
\fIDefault\fR: \fBfalse\fR
|
1986
2005
|
.
|
1987
2006
|
.IP "" 0
|
1988
2007
|
.
|
@@ -1990,7 +2009,7 @@ Turns on experimental support for tasks and plans in the puppet language\. This
|
|
1990
2009
|
Whether to print stack traces on some errors\. Will print internal Ruby stack trace interleaved with Puppet function frames\.
|
1991
2010
|
.
|
1992
2011
|
.IP "\(bu" 4
|
1993
|
-
\fIDefault\fR:
|
2012
|
+
\fIDefault\fR: \fBfalse\fR
|
1994
2013
|
.
|
1995
2014
|
.IP "" 0
|
1996
2015
|
.
|
@@ -1998,7 +2017,7 @@ Whether to print stack traces on some errors\. Will print internal Ruby stack tr
|
|
1998
2017
|
Transactional storage file for persisting data between transactions for the purposes of infering information (such as corrective_change) on new data received\.
|
1999
2018
|
.
|
2000
2019
|
.IP "\(bu" 4
|
2001
|
-
\fIDefault\fR: $statedir/transactionstore\.yaml
|
2020
|
+
\fIDefault\fR: \fB$statedir/transactionstore\.yaml\fR
|
2002
2021
|
.
|
2003
2022
|
.IP "" 0
|
2004
2023
|
.
|
@@ -2019,15 +2038,16 @@ For unknown or invalid nodes, exit with a non\-zero exit code\.
|
|
2019
2038
|
.P
|
2020
2039
|
If the setting points to an executable command, then the external trusted facts will be stored in the \'external\' key of the trusted facts hash\. Otherwise for each executable file in the directory, the external trusted facts will be stored in the \fB<basename>\fR key of the \fBtrusted[\'external\']\fR hash\. For example, if the files foo\.rb and bar\.sh are in the directory, then \fBtrusted[\'external\']\fR will be the hash \fB{ \'foo\' => <foo\.rb output>, \'bar\' => <bar\.sh output> }\fR\.
|
2021
2040
|
.
|
2022
|
-
.
|
2023
|
-
\fIDefault\fR:
|
2024
|
-
|
2041
|
+
.IP "\(bu" 4
|
2042
|
+
\fIDefault\fR: ``
|
2043
|
+
.
|
2044
|
+
.IP "" 0
|
2025
2045
|
.
|
2026
2046
|
.SS "trusted_oid_mapping_file"
|
2027
2047
|
File that provides mapping between custom SSL oids and user\-friendly names
|
2028
2048
|
.
|
2029
2049
|
.IP "\(bu" 4
|
2030
|
-
\fIDefault\fR: $confdir/custom_trusted_oid_mapping\.yaml
|
2050
|
+
\fIDefault\fR: \fB$confdir/custom_trusted_oid_mapping\.yaml\fR
|
2031
2051
|
.
|
2032
2052
|
.IP "" 0
|
2033
2053
|
.
|
@@ -2035,7 +2055,7 @@ File that provides mapping between custom SSL oids and user\-friendly names
|
|
2035
2055
|
Whether to only use the cached catalog rather than compiling a new catalog on every run\. Puppet can be run with this enabled by default and then selectively disabled when a recompile is desired\. Because a Puppet agent using cached catalogs does not contact the master for a new catalog, it also does not upload facts at the beginning of the Puppet run\.
|
2036
2056
|
.
|
2037
2057
|
.IP "\(bu" 4
|
2038
|
-
\fIDefault\fR:
|
2058
|
+
\fIDefault\fR: \fBfalse\fR
|
2039
2059
|
.
|
2040
2060
|
.IP "" 0
|
2041
2061
|
.
|
@@ -2043,7 +2063,7 @@ Whether to only use the cached catalog rather than compiling a new catalog on ev
|
|
2043
2063
|
Whether the server will search for SRV records in DNS for the current domain\.
|
2044
2064
|
.
|
2045
2065
|
.IP "\(bu" 4
|
2046
|
-
\fIDefault\fR:
|
2066
|
+
\fIDefault\fR: \fBfalse\fR
|
2047
2067
|
.
|
2048
2068
|
.IP "" 0
|
2049
2069
|
.
|
@@ -2051,7 +2071,7 @@ Whether the server will search for SRV records in DNS for the current domain\.
|
|
2051
2071
|
Whether to use the cached configuration when the remote configuration will not compile\. This option is useful for testing new configurations, where you want to fix the broken configuration rather than reverting to a known\-good one\.
|
2052
2072
|
.
|
2053
2073
|
.IP "\(bu" 4
|
2054
|
-
\fIDefault\fR:
|
2074
|
+
\fIDefault\fR: \fBtrue\fR
|
2055
2075
|
.
|
2056
2076
|
.IP "" 0
|
2057
2077
|
.
|
@@ -2059,7 +2079,7 @@ Whether to use the cached configuration when the remote configuration will not c
|
|
2059
2079
|
The user Puppet Server will run as\. Used to ensure the agent side processes (agent, apply, etc) create files and directories readable by Puppet Server when necessary\.
|
2060
2080
|
.
|
2061
2081
|
.IP "\(bu" 4
|
2062
|
-
\fIDefault\fR:
|
2082
|
+
\fIDefault\fR: \fBpuppet\fR
|
2063
2083
|
.
|
2064
2084
|
.IP "" 0
|
2065
2085
|
.
|
@@ -2067,7 +2087,7 @@ The user Puppet Server will run as\. Used to ensure the agent side processes (ag
|
|
2067
2087
|
Where Puppet stores dynamic and growing data\. The default for this setting is calculated specially, like \fBconfdir\fR_\.
|
2068
2088
|
.
|
2069
2089
|
.IP "\(bu" 4
|
2070
|
-
\fIDefault\fR:
|
2090
|
+
\fIDefault\fR: \fBUnix/Linux: /opt/puppetlabs/puppet/cache \-\- Windows: C:\eProgramData\ePuppetLabs\epuppet\ecache \-\- Non\-root user: ~/\.puppetlabs/opt/puppet/cache\fR
|
2071
2091
|
.
|
2072
2092
|
.IP "" 0
|
2073
2093
|
.
|
@@ -2075,7 +2095,7 @@ Where Puppet stores dynamic and growing data\. The default for this setting is c
|
|
2075
2095
|
The directory containing \fBvendored\fR modules\. These modules will be used by \fIall\fR environments like those in the \fBbasemodulepath\fR\. The only difference is that modules in the \fBbasemodulepath\fR are pluginsynced, while vendored modules are not
|
2076
2096
|
.
|
2077
2097
|
.IP "\(bu" 4
|
2078
|
-
\fIDefault\fR: /opt/puppetlabs/puppet/vendor_modules
|
2098
|
+
\fIDefault\fR: \fB/opt/puppetlabs/puppet/vendor_modules\fR
|
2079
2099
|
.
|
2080
2100
|
.IP "" 0
|
2081
2101
|
.
|
@@ -2083,7 +2103,7 @@ The directory containing \fBvendored\fR modules\. These modules will be used by
|
|
2083
2103
|
Whether or not to look for versioned environment directories, symlinked from \fB$environmentpath/<environment>\fR\. This is an experimental feature and should be used with caution\.
|
2084
2104
|
.
|
2085
2105
|
.IP "\(bu" 4
|
2086
|
-
\fIDefault\fR:
|
2106
|
+
\fIDefault\fR: \fBfalse\fR
|
2087
2107
|
.
|
2088
2108
|
.IP "" 0
|
2089
2109
|
.
|
@@ -2097,7 +2117,7 @@ When starting for the first time, puppet agent will submit a certificate signing
|
|
2097
2117
|
Puppet agent cannot apply configurations until its approved certificate is available\. Since the certificate may or may not be available immediately, puppet agent will repeatedly try to fetch it at this interval\. You can turn off waiting for certificates by specifying a time of 0, or a maximum amount of time to wait in the \fBmaxwaitforcert\fR setting, in which case puppet agent will exit if it cannot get a cert\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
2098
2118
|
.
|
2099
2119
|
.IP "\(bu" 4
|
2100
|
-
\fIDefault\fR:
|
2120
|
+
\fIDefault\fR: \fB2m\fR
|
2101
2121
|
.
|
2102
2122
|
.IP "" 0
|
2103
2123
|
.
|
@@ -2108,7 +2128,7 @@ How frequently puppet agent should try running when there is an already ongoing
|
|
2108
2128
|
This argument is by default disabled (value set to 0)\. In this case puppet agent will immediately exit if it cannot run at that moment\. When a value other than 0 is set, this can also be used in combination with the \fBmaxwaitforlock\fR argument\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
2109
2129
|
.
|
2110
2130
|
.IP "\(bu" 4
|
2111
|
-
\fIDefault\fR:
|
2131
|
+
\fIDefault\fR: \fB0\fR
|
2112
2132
|
.
|
2113
2133
|
.IP "" 0
|
2114
2134
|
.
|
@@ -2116,7 +2136,7 @@ This argument is by default disabled (value set to 0)\. In this case puppet agen
|
|
2116
2136
|
The directory in which YAML data is stored, usually in a subdirectory\.
|
2117
2137
|
.
|
2118
2138
|
.IP "\(bu" 4
|
2119
|
-
\fIDefault\fR: $vardir/yaml
|
2139
|
+
\fIDefault\fR: \fB$vardir/yaml\fR
|
2120
2140
|
.
|
2121
2141
|
.IP "" 0
|
2122
2142
|
|