Visit Our UNIX and Linux User Community

Update puppet class from Client

Thread Tools Search this Thread
Operating Systems Linux Red Hat Update puppet class from Client
# 1  
Old 10-26-2016
Update puppet class from Client

Hi all,

This is more a satellite 6 question

Is it possible to add / assign a puppet client to a class on the master from the client ? This is for automation and I can't get it to work.

On an existing client used as a web server I found the following content in
cat /var/lib/puppet/state/resources.txt


cat /var/lib/puppet/classes.txt


If I add the same content on the client I'd like to be in the same class and rerun
puppet agent -t

these files are getting overwritten and no httpd rpm will get installed.

Is there a sollution to this or is it even possible with hammer from the client site ?

I already logged a support call with redhat but didn't get an answer yet ?????

Thanks for any help

Previous Thread | Next Thread
Test Your Knowledge in Computers #201
Difficulty: Easy
Perl is implemented as a core interpreter, written in C, together with a large collection of modules, written in Perl and C.
True or False?

2 More Discussions You Might Find Interesting

1. Programming

C++ : Base class member function not accessible from derived class

Hello All, I am a learner in C++. I was testing my inheritance knowledge with following piece of code. #include <iostream> using namespace std; class base { public : void display() { cout << "In base display()" << endl; } void display(int k) {... (2 Replies)
Discussion started by: anand.shah
2 Replies

2. UNIX for Advanced & Expert Users

Get pointer for existing device class (struct class) in Linux kernel module

Hi all! I am trying to register a device in an existing device class, but I am having trouble getting the pointer to an existing class. I can create a class in a module, get the pointer to it and then use it to register the device with: *cl = class_create(THIS_MODULE, className);... (0 Replies)
Discussion started by:
0 Replies
PUPPET-CERT(8)							   Puppet manual						    PUPPET-CERT(8)

puppet-cert - Manage certificates and requests SYNOPSIS
Standalone certificate authority. Capable of generating certificates, but mostly used for signing certificate requests from puppet clients. USAGE
puppet cert action [-h|--help] [-V|--version] [-d|--debug] [-v|--verbose] [--digest digest] [host] DESCRIPTION
Because the puppet master service defaults to not signing client certificate requests, this script is available for signing outstanding requests. It can be used to list outstanding requests and then either sign them individually or sign all of them. ACTIONS
Every action except 'list' and 'generate' requires a hostname to act on, unless the '--all' option is set. clean Revoke a host's certificate (if applicable) and remove all files related to that host from puppet cert's storage. This is useful when rebuilding hosts, since new certificate signing requests will only be honored if puppet cert does not have a copy of a signed certificate for that host. If '--all' is specified then all host certificates, both signed and unsigned, will be removed. fingerprint Print the DIGEST (defaults to md5) fingerprint of a host's certificate. generate Generate a certificate for a named client. A certificate/keypair will be generated for each client named on the command line. list List outstanding certificate requests. If '--all' is specified, signed certificates are also listed, prefixed by '+', and revoked or invalid certificates are prefixed by '-' (the verification outcome is printed in parenthesis). print Print the full-text version of a host's certificate. revoke Revoke the certificate of a client. The certificate can be specified either by its serial number (given as a decimal number or a hexadecimal number prefixed by '0x') or by its hostname. The certificate is revoked by adding it to the Certificate Revocation List given by the 'cacrl' configuration option. Note that the puppet master needs to be restarted after revoking certificates. sign Sign an outstanding certificate request. verify Verify the named certificate against the local CA certificate. OPTIONS
Note that any configuration parameter that's valid in the configuration file is also a valid long argument. For example, 'ssldir' is a valid configuration parameter, so you can specify '--ssldir directory' as an argument. See the configuration file documentation at for the full list of acceptable parameters. A commented list of all configuration options can also be generated by running puppet cert with '--genconfig'. --all Operate on all items. Currently only makes sense with the 'sign', 'clean', 'list', and 'fingerprint' actions. --digest Set the digest for fingerprinting (defaults to md5). Valid values depends on your openssl and openssl ruby extension version, but should contain at least md5, sha1, md2, sha256. --debug Enable full debugging. --help Print this help message --verbose Enable verbosity. --version Print the puppet version number and exit. EXAMPLE
$ puppet cert list $ puppet cert sign AUTHOR
Copyright (c) 2011 Puppet Labs, LLC Licensed under the Apache 2.0 License Puppet Labs, LLC June 2012 PUPPET-CERT(8)

Featured Tech Videos