Puppet

Portland, OR, USA
2005
  |  By Stephen K. Potter
Every operating system has its quirks, and Linux security is no different. Whether you’re on Team Penguin or running mostly Windows boxes (or a bit of both), you’ll need to take different steps to manage security on different OSes. Like any OS, Linux security comes with its own peculiarities, pitfalls, and best practices.
  |  By Robin Tatam
It's expensive when you don't comply with the General Data Protection Regulation (GDPR) controls — take for example the €310 million fine (equivalent to $335 million dollars) that LinkedIn received from the GDPR. In this case, they shared users’ personal data for targeted advertising and behavioural analyses, without asking for user consent. Can you afford €310 million? It might be time to automate GDPR controls for 24/7 compliance.
  |  By Tzvika Shahaf
In early 2025, Puppet will begin to ship any new binaries and packages developed by our team to a private, hardened, and controlled location. Our intention with this change is not to limit community access to Puppet source code, but to address the growing risk of vulnerabilities across all software applications today while continuing to provide the security, support, and stability our customers deserve.
  |  By Margaret Lee
Developer self-service can sound like a dream: A platform that developers can use to freely develop — unburdened by sprawling IT, tools they shouldn’t need to know how to use, and tickets that take forever to complete. But in DevOps, self-service is becoming a differentiator for organizations with growth goals, widening skill gaps, a need for visibility, or just an appetite for better DevOps efficiency.
  |  By Robin Tatam
A lot has changed for the National Institute of Standards and Technology NIST Framework since 2013, when former President Barack Obama signed Executive Order 13636 that directed the Executive Branch to: Since the creation of the NIST framework, we’ve seen an evolution in sophisticated cyberattacks on the rise with new challenges like AI.
  |  By Saurabh Karwa
In software development, even common IT operations tasks require specialized skills. Collaboration between specialized teams is the driving force of DevOps, more than any tooling or workflow. But self-service automation becomes valuable when common, routine tasks and processes start to restrict developers and burden operations teams.
  |  By Robin Tatam
The compliance landscape for organisations in the European Union (EU) is heating up again — this time with the second landmark Network and Information Security (NIS2) Directive, set to take effect on 17 October 2024. But what does NIS2 compliance entail? What's the difference between the original NIS1 vs. NIS2? Who needs to comply with NIS2, and what are the penalties for not complying with the new directive?
  |  By Robin Tatam
You probably used multi-factor authentication (MFA) to access the device you’re using right now. Maybe your phone scanned your face or fingerprint to unlock. Maybe you got a text with a verification code while logging into your work browser profile. Configuring MFA is a go-to measure for system hardening, but MFA enforcement can get unruly, especially at the scale required by enterprise IT.
  |  By Robin Tatam
Zero Trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of Zero Trust adoption + share how automation can help you achieve compliance.
  |  By Robin Tatam
Modernizing your IT infrastructure for FedRAMP certification is a complex journey — legacy systems, tight budgets, and the looming shadow of compliance can feel overwhelming. It doesn’t have to be that way: we're here to simplify the process and help you navigate the mandatory steps toward certification.
  |  By Puppet
From the largest physics laboratory in the world to a telescope network scattered across the planet to a design firm building roads and parks around the globe to an air navigation service provider that guides 1.2 million flights each year, 40,000 companies rely on Puppet to automate their infrastructure – with security and compliance baked right in. Puppet’s IT automation suite incorporates security, compliance, and innovation from day one to power Day 2 operations (and beyond), so your teams can spend less time managing IT infrastructure and more time changing the world.
  |  By Puppet
With Puppet, the power of IT automation empowers you. Learn more at puppet.com. Too many companies use patchwork solutions for configuration management and IT automation, leading to unmanageable complexity and huge security risks. IT operators are on-call day and night to address security breaches, and toil for weeks manually provisioning servers. But no one would expect you to wash 10,000 dishes by hand – so why are IT operators expected to configure 10,000 servers manually?
  |  By Puppet
Need to send some files to Puppet Support? Use our internally hosted file transfer solution. Read the article for more information.
  |  By Puppet
Puppet Support Explain how to change the version of a Forge module deployed in your Puppet Enterprise Environment Please note it is not considered best practice to declare `:latest` rather than a specific version tag in your PuppetFile as this could lead to untested module combinations being deployed to your environment. Commands Used: puppet-code deploy production --wait -l debug puppet module list --environment=production
  |  By Puppet
Occasionally in Puppet Enterprise, you may need to change the port PuppetDB consumes, for instance, if another service requires port 8081. While we in Puppet Support recommend that you change the port for the other service. If you can’t do that, Follow this Video and the attached Knowledge base article for a guide on changing the port.
  |  By Puppet
Welcome to Puppet Comply! Achieving and maintaining a compliant state doesn't have to be a headache. With Puppet Comply, you can easily find & fix compliance issues and achieve continuous compliance at scale.
  |  By Puppet
An overview of the concept of metrics in Puppet Supporting links
  |  By Puppet
Instruction on Collecting and Displaying Puppet Metrics, from Support Engineer Adrian Parreiras Horta
  |  By Puppet
How to Interpret Puppet Metrics, With Support Engineer Adrian Parreiras Horta
  |  By Puppet
Puppet Enterprise users can deliver infrastructure faster with Continuous Delivery for Puppet Enterprise. Watch this demo to learn how to automate testing and delivery of Puppet code from the commit all the way through deploying code into production.
  |  By Puppet
As organizations move along their digital transformation journey, they will encounter technical challenges and pitfalls along the way. While the destination offers many benefits, getting there can be hard. It takes experience and knowledge, along with technical expertise, to navigate this path to a more agile, flexible organization. Learn how to get there in this white paper.
  |  By Puppet
A primary goal of most DevOps initiatives is to increase the speed and agility of software development and delivery. Unfortunately, this objective often seems to be at odds with good security practices, reducing the window of time for security assessment and introducing new attack vectors. But DevOps and security don't have to be mutually exclusive. In fact, the principles that drive good outcomes for software development can also lead to more secure infrastructure. Read the ebook for guidance on designing a DevOps workflow that incorporates - and enhances - security.
  |  By Puppet
If you're managing an IT team, you may be turning to DevOps as the path to faster delivery of software. DevOps can help your team become more efficient - and your organization more competitive - but you'll need to be able to communicate to your team why things are changing and how their usual working practices are likely to alter. In this guide we tease out the whys and hows of DevOps as you work with your team and the approaches that make a DevOps initiative successful.
  |  By Puppet
Speeding remediation reduces the cost of compliance and vulnerability of the IT estate. When looking for issues that slow remediation, notice the hand off from security to IT. Download this free resource to learn how the interaction between IT and Security can be improved to speed compliance.
  |  By Puppet
With the proliferation of high-profile hacks, data breaches and ransomware, it's easy to feel insecure about your organization's security these days. But not all security issues have to do with purposeful hacks and attacks. For many IT teams, the challenge is maintaining strict rules and regulatory requirements for everything from credit card data to health information privacy. Failing to maintain compliance can put your organization at risk of everything from lost business to substantial fines - or worse.
  |  By Puppet
With the right foundation and optimizations, your teams can successfully adopt continuous delivery practices - and deliver software faster, with fewer bugs and lower risk. If you're getting started with continuous delivery or evolving your approach, there are a few strategic considerations that can keep you on the right path.
  |  By Puppet
In this paper, we talk about four common challenges to today's software delivery automation and discuss how you can overcome those challenges. Continuous delivery (CD) enables organizations to deliver quality software in record time, helping businesses meet rapidly growing and changing demands. As CD practices and tools have matured, more organizations and teams are beginning - or are well down the path of - their own journeys, using automation to speed up software delivery.
  |  By Puppet
Are you looking to migrate from your on-premises data center to AWS - or to accelerate the process? Or would you like a simple and reliable way to manage your infrastructure and applications across all your environments? Puppet can help.

Puppet is driving the movement to a world of unconstrained software change. Our revolutionary platform is the industry standard for automating the delivery and operation of the software that powers everything around us.

It isn’t humanly possible to keep up with the constant innovation and risks that new technology brings. Automation has become a requirement, and Puppet sets the standard for delivering and managing your IT estate predictably and at scale. Our solutions automate how you continuously deliver, make compliant, remediate, and manage your multi-cloud environment. So you can focus on more important things in your life.

Use Cases:

  • Continuous Delivery: Ship more, do more with the right continuous delivery workflows and tools to increase your development and operations teams’ agility. They lower time to value of your infrastructure and the software it runs.
  • Continuous Compliance: The alphabet soup of regulatory standards and security best practices you try to comply with — and the associated penalties for not doing so — are no joke. Auditors expect your teams to implement and abide by operational, security, and regulatory policies 24/7, and to prove it when they show up.
  • Incident Remediation: With the proliferation of high-profile hacks, data breaches, and ransomware, it’s easy to feel insecure about your organization’s security. You have to protect your company like never before — particularly as your infrastructure grows and diversifies, presenting a broader surface for attackers.
  • Configuration Management: Are you spending more time fighting fires than deploying new, innovative services and applications? You are not alone. Most IT teams say it takes weeks, even months, to deploy critical applications. There’s got to be a better way to manage infrastructure. With automation, you eliminate manual work, minimize risk of human error, and make it possible to deploy fast, safely and reliably.

Make infrastructure actionable, scalable and intelligent.