<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: puppet</title>
    <description>The latest articles on DEV Community by puppet (@puppet).</description>
    <link>https://dev.to/puppet</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2526%2Feb944fe4-e889-4760-9c3a-ea74c1c6557b.jpg</url>
      <title>DEV Community: puppet</title>
      <link>https://dev.to/puppet</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/puppet"/>
    <language>en</language>
    <item>
      <title>Handling Dirty Frag and Copy Fail with Puppet</title>
      <dc:creator>Tony Green</dc:creator>
      <pubDate>Wed, 13 May 2026 21:00:55 +0000</pubDate>
      <link>https://dev.to/puppet/handling-dirty-frag-and-copy-fail-with-puppet-6ff</link>
      <guid>https://dev.to/puppet/handling-dirty-frag-and-copy-fail-with-puppet-6ff</guid>
      <description>&lt;h2&gt;
  
  
  Do you know which of your Linux servers are vulnerable right now?
&lt;/h2&gt;

&lt;p&gt;Two critical Linux kernel vulnerabilities are being actively exploited. Dirty Frag targets the IP fragment reassembly modules that almost every Linux server has loaded by default. Copy Fail targets the AF_ALG cryptographic subsystem's AEAD interface. Both can allow an attacker to gain escalated local privileges, and both have interim mitigations you can deploy right now, before the kernel patches land.&lt;/p&gt;

&lt;p&gt;The first question every team needs to answer is not "how do we fix it?" but "how many of our systems are actually exposed?" Not tomorrow, after someone runs a scanner. Not next week, when the security team finishes their audit. Right now.&lt;/p&gt;

&lt;p&gt;If you are running Puppet, the answer is already within reach. You just need a fact.&lt;/p&gt;

&lt;h3&gt;
  
  
  Add these to your Puppetfile. That is it.
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight ruby"&gt;&lt;code&gt;&lt;span class="n"&gt;mod&lt;/span&gt; &lt;span class="s1"&gt;'albatrossflavour-dirty_frag'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'1.0.1'&lt;/span&gt;
&lt;span class="n"&gt;mod&lt;/span&gt; &lt;span class="s1"&gt;'albatrossflavour-copy_fail'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'1.0.0'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Each of these open-source modules, that I have published to the Forge, ship a custom structured fact that reports vulnerability exposure on every node. No class to include. No Hiera changes. No manifest edits. Next Puppet run, the data is there.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/albatrossflavour/dirty_frag" rel="noopener noreferrer"&gt;dirty_frag&lt;/a&gt; reports exposure to Dirty Frag (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-43284" rel="noopener noreferrer"&gt;CVE-2026-43284&lt;/a&gt; and &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-43500" rel="noopener noreferrer"&gt;CVE-2026-43500&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/albatrossflavour/copy_fail" rel="noopener noreferrer"&gt;copy_fail&lt;/a&gt; reports exposure to Copy Fail (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31431" rel="noopener noreferrer"&gt;CVE-2026-31431&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  See where you stand
&lt;/h3&gt;

&lt;p&gt;Once deployed, every node reports its exposure state as structured data. Here is what the output looks like.&lt;/p&gt;

&lt;h4&gt;
  
  
  dirty_frag
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"esp4"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"loaded"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"blocked"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"available"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"esp6"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"loaded"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"blocked"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"available"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"rxrpc"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"loaded"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"blocked"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"available"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"vulnerable"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"reboot_required"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  copy_fail
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"algif_aead"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"type"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"builtin"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"loaded"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"active"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"blocked"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"available"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"initcall_blacklisted"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"vulnerable"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"mitigated"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"reboot_required"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Both facts surface the same two summary keys that give you the answers you actually care about. &lt;code&gt;vulnerable&lt;/code&gt; is &lt;code&gt;true&lt;/code&gt; if the exploitable module is active. &lt;code&gt;reboot_required&lt;/code&gt; is &lt;code&gt;true&lt;/code&gt; if you have applied the mitigation but the module is still sitting in kernel memory.&lt;/p&gt;

&lt;p&gt;That &lt;code&gt;reboot_required&lt;/code&gt; flag is the one that catches people. You apply the mitigation, see the block in place, and assume you are safe. But the module is still loaded and exploitable until the machine restarts. The facts make this gap visible.&lt;/p&gt;

&lt;h3&gt;
  
  
  Query your entire fleet in one line
&lt;/h3&gt;

&lt;p&gt;The facts land in PuppetDB like any other structured fact. No extra tooling, no scheduled scans, no agents phoning home to a separate platform. It is just data, maintained automatically every Puppet run.&lt;/p&gt;

&lt;p&gt;Show me every node vulnerable to Dirty Frag:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;puppet query &lt;span class="s1"&gt;'facts[certname, value] { name = "dirty_frag" and value.vulnerable = true }'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Show me every node vulnerable to Copy Fail:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;puppet query &lt;span class="s1"&gt;'facts[certname, value] { name = "copy_fail" and value.vulnerable = true }'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Show me nodes where the Dirty Frag block is applied but a reboot is still needed:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;puppet query &lt;span class="s1"&gt;'facts[certname, value] { name = "dirty_frag" and value.reboot_required = true }'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Show me nodes where &lt;code&gt;algif_aead&lt;/code&gt; is built into the kernel (the harder mitigation path):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;puppet query &lt;span class="s1"&gt;'facts[certname, value] { name = "copy_fail" and value.algif_aead.type = "builtin" }'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This is the bit that makes Puppet's model shine. You are not running a point-in-time scan. The data updates every run, automatically. As nodes get patched, rebooted, or have blocks applied, the numbers go down on their own. You can watch your exposure shrink in real time without maintaining anything.&lt;/p&gt;

&lt;h2&gt;
  
  
  What makes a system vulnerable?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Dirty Frag
&lt;/h3&gt;

&lt;p&gt;The Dirty Frag vulnerability sits in three Linux kernel modules used for IP fragment reassembly: &lt;code&gt;esp4&lt;/code&gt;, &lt;code&gt;esp6&lt;/code&gt;, and &lt;code&gt;rxrpc&lt;/code&gt;. If any of those modules is loaded, the system is exposed. The two CVEs chain together to allow privilege escalation and remote code execution through these modules.&lt;/p&gt;

&lt;p&gt;These modules are almost universally loaded on production Linux servers. If you are running iptables, firewalld, Docker, Kubernetes, or any network policy enforcement, odds are at least &lt;code&gt;esp4&lt;/code&gt; is there. This one affects nearly everything.&lt;/p&gt;

&lt;h3&gt;
  
  
  Copy Fail
&lt;/h3&gt;

&lt;p&gt;The vulnerability is a use-after-free in the AF_ALG subsystem's AEAD interface (&lt;code&gt;algif_aead&lt;/code&gt;). An unprivileged user can trigger it by opening an AF_ALG socket and exercising the AEAD code path in a specific way.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;algif_aead&lt;/code&gt; is present on most stock kernels but rarely used for legitimate work. The main consumers are some VPN implementations that offload crypto to the kernel, &lt;code&gt;kcapi-tools&lt;/code&gt;, and certain FIPS-certified configurations. On systems where the module is loadable, an attacker can force-load it themselves just by opening the socket. On systems where it is built-in, it may already be active regardless of use.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why module presence, not kernel version?
&lt;/h3&gt;

&lt;p&gt;The real fix for both vulnerabilities is a kernel patch, but every distribution ships their own patched versions on their own schedules with their own version numbers. Tracking "which kernel version is safe" across Red Hat, Ubuntu, SUSE, Amazon Linux, and the rest is a moving target that goes stale the day you publish it. Module presence is the reliable signal: if the vulnerable module is active, you are exposed, regardless of kernel version.&lt;/p&gt;

&lt;p&gt;This is also what the vendor advisories recommend. Red Hat's &lt;a href="https://access.redhat.com/security/vulnerabilities/RHSB-2026-003" rel="noopener noreferrer"&gt;RHSB-2026-003&lt;/a&gt; and the equivalent Ubuntu and SUSE bulletins all point to the same interim mitigation: prevent the modules from loading using &lt;code&gt;install /bin/false&lt;/code&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  When you want Puppet to enforce the block
&lt;/h2&gt;

&lt;p&gt;The facts give you visibility. If you also want Puppet to actively prevent the modules from loading, include the classes.&lt;/p&gt;

&lt;h3&gt;
  
  
  Dirty Frag
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight puppet"&gt;&lt;code&gt;&lt;span class="k"&gt;class&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="s1"&gt;'dirty_frag'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
  &lt;span class="py"&gt;mitigate_esp4&lt;/span&gt;  &lt;span class="p"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="py"&gt;mitigate_esp6&lt;/span&gt;  &lt;span class="p"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="py"&gt;mitigate_rxrpc&lt;/span&gt; &lt;span class="p"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Copy Fail
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight puppet"&gt;&lt;code&gt;&lt;span class="k"&gt;class&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="s1"&gt;'copy_fail'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
  &lt;span class="py"&gt;mitigate_algif_aead&lt;/span&gt; &lt;span class="p"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Both classes write &lt;code&gt;install &amp;lt;module&amp;gt; /bin/false&lt;/code&gt; directives to modprobe.d configuration files. From that point on, any attempt to load those modules (whether by autoloading, a dependency chain, or an explicit &lt;code&gt;modprobe&lt;/code&gt;) will run &lt;code&gt;/bin/false&lt;/code&gt; instead of loading the actual module code. The module simply cannot get into the kernel.&lt;/p&gt;

&lt;p&gt;This is worth understanding because it is stronger than the kernel's &lt;code&gt;blacklist&lt;/code&gt; directive. A &lt;code&gt;blacklist&lt;/code&gt; entry only prevents autoloading, it does not stop explicit &lt;code&gt;modprobe&lt;/code&gt; calls. &lt;code&gt;install /bin/false&lt;/code&gt; intercepts the load at every entry point.&lt;/p&gt;

&lt;p&gt;If the module was already loaded before the block was applied, it stays in memory until the next reboot. The &lt;code&gt;reboot_required&lt;/code&gt; flag in both facts makes this gap visible.&lt;/p&gt;

&lt;p&gt;This is declarative and safe. Puppet manages the config file, ensures the desired state on every run, and the classes are entirely opt-in. If your patching process handles the fix, or you are rolling out kernel updates, you might not need them at all. The facts alone give you the visibility to track progress.&lt;/p&gt;

&lt;p&gt;Both modules ship with Hiera data defaults, so if you prefer to drive parameters through your hierarchy, see each module's README for examples.&lt;/p&gt;

&lt;h2&gt;
  
  
  The built-in module problem (Copy Fail only)
&lt;/h2&gt;

&lt;p&gt;There is a wrinkle with Copy Fail that Dirty Frag does not have. On most stock distribution kernels, &lt;code&gt;algif_aead&lt;/code&gt; is compiled directly into the kernel image as a built-in module. It is not a loadable &lt;code&gt;.ko&lt;/code&gt; file, so modprobe.d has no effect on it.&lt;/p&gt;

&lt;p&gt;For built-in modules, the mitigation is &lt;code&gt;initcall_blacklist=algif_aead_init&lt;/code&gt; on the kernel command line (via GRUB configuration). This prevents the module's init function from running on boot. It requires a reboot to take effect.&lt;/p&gt;

&lt;p&gt;The copy_fail module does not automate GRUB changes. Getting boot configuration wrong can render a system unbootable. You can manage GRUB with Puppet (using &lt;code&gt;file_line&lt;/code&gt; or &lt;code&gt;augeas&lt;/code&gt;), but that is out of scope for this module. The fact will report &lt;code&gt;initcall_blacklisted: true&lt;/code&gt; once the parameter is in place, and &lt;code&gt;reboot_required: true&lt;/code&gt; until the reboot completes.&lt;/p&gt;

&lt;p&gt;The &lt;code&gt;type&lt;/code&gt; field in the fact output tells you which mitigation path applies to each node:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;builtin&lt;/code&gt;&lt;/strong&gt;: needs &lt;code&gt;initcall_blacklist&lt;/code&gt;, modprobe.d has no effect&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;loadable&lt;/code&gt;&lt;/strong&gt;: the class and modprobe.d approach works&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;absent&lt;/code&gt;&lt;/strong&gt;: not vulnerable, nothing to do&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Force-unload a module right now (with care)
&lt;/h2&gt;

&lt;p&gt;Sometimes you cannot wait for a reboot. Both modules ship a Bolt task that removes the module from the running kernel immediately:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;bolt task run dirty_frag::unload &lt;span class="nv"&gt;module&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;esp4 &lt;span class="nt"&gt;--targets&lt;/span&gt; servers
bolt task run copy_fail::unload &lt;span class="nv"&gt;module&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;algif_aead &lt;span class="nt"&gt;--targets&lt;/span&gt; servers
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;A word of caution. Unloading a kernel module is not the same as flipping a config switch. If the module is actively in use (for example, &lt;code&gt;esp4&lt;/code&gt; underpins IPsec tunnels, &lt;code&gt;esp6&lt;/code&gt; handles IPv6 ESP, and &lt;code&gt;rxrpc&lt;/code&gt; is used by AFS), pulling it out from under a running service can drop connections, crash VPN tunnels, or cause dependent subsystems to fail. This is exactly why the Puppet classes do not do it automatically. The classes apply the block and wait for a reboot. The Bolt tasks give you the lever to pull when you have decided the tradeoff is worth it.&lt;/p&gt;

&lt;p&gt;Each task validates the module name, checks it is actually loaded, and gives you structured output. If the module is in use by another kernel subsystem and cannot be unloaded, the task will tell you, and you are back to "apply the block and schedule a reboot".&lt;/p&gt;

&lt;p&gt;Test on non-production nodes first. Know what the module is doing on that system before you yank it. If in doubt, the block-and-reboot path is always the safer option.&lt;/p&gt;

&lt;p&gt;The unload task only works for loadable modules. Built-in modules cannot be unloaded.&lt;/p&gt;

&lt;h2&gt;
  
  
  The workflow
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Add the modules to your Puppetfile.&lt;/strong&gt; Deploy. Done. Every node now reports its exposure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Query PuppetDB&lt;/strong&gt; to see where you stand. One-liner, fleet-wide answer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Decide on mitigation.&lt;/strong&gt; Apply the classes via Hiera for persistent blocking.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Use Tasks&lt;/strong&gt; to immediately unload modules on critical systems that cannot wait.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Watch the numbers drop.&lt;/strong&gt; The facts update every run. No manual tracking, no spreadsheets, no scheduled scans.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The whole approach is declarative. You tell Puppet what state you want, and it converges towards it. The facts keep reporting reality. The gap between the two is your exposure, and it is always visible.&lt;/p&gt;

&lt;h2&gt;
  
  
  Get started
&lt;/h2&gt;

&lt;p&gt;Both of these open source modules are available on GitHub:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/albatrossflavour/dirty_frag" rel="noopener noreferrer"&gt;albatrossflavour/dirty_frag&lt;/a&gt; (Puppet 7/8, no dependencies)&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/albatrossflavour/copy_fail" rel="noopener noreferrer"&gt;albatrossflavour/copy_fail&lt;/a&gt; (Puppet 7/8, no dependencies)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Both modules have been built for RedHat, CentOS, Ubuntu, Debian, Amazon Linux, and SLES.&lt;/p&gt;

</description>
      <category>puppet</category>
      <category>vulnerabilities</category>
      <category>automation</category>
      <category>devops</category>
    </item>
    <item>
      <title>Puppetlabs Modules Roundup – April 2026</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Thu, 07 May 2026 16:31:43 +0000</pubDate>
      <link>https://dev.to/puppet/puppetlabs-modules-roundup-april-2026-358</link>
      <guid>https://dev.to/puppet/puppetlabs-modules-roundup-april-2026-358</guid>
      <description>&lt;p&gt;In April 2026, the Puppetlabs module lineup saw 8 Puppetlabs module releases, with the most notable updates collected here for a quick review.&lt;/p&gt;

&lt;p&gt;The overall pattern in these releases was event forwarding enhancements and security and compliance platform updates, which makes this month’s roundup a useful quick scan for teams planning upgrades or routine maintenance.&lt;/p&gt;

&lt;h2&gt;
  
  
  Highlighted Updates
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Event Forwarding Enhancements
&lt;/h3&gt;

&lt;p&gt;Coordinated updates to Splunk HEC and PE Event Forwarding modules add support for orchestrator_plan event type, improving visibility into Puppet orchestrator activities with enhanced filtering and integration capabilities.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Affected modules: splunk_hec, pe_event_forwarding.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Security and Compliance Platform Updates
&lt;/h3&gt;

&lt;p&gt;Comply and Comply Admin modules received coordinated releases, advancing the Security Compliance Management platform capabilities.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Affected modules: comply, complyadm.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What Updates Happened to Puppetlabs Modules in April 2026?
&lt;/h2&gt;

&lt;p&gt;The following is an alphabetical listing of modules which received updates in April 2026. If a module had multiple versions released, the updates are collected together, numbered with the "latest" version available.&lt;/p&gt;




&lt;h3&gt;
  
  
  cd4peadm 5.15.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-28 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/cd4peadm" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;A few highlights from this release:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added a Hiera configuration option, external_webhook_url, that allows you to set the webhook URL that Continuous Delivery sends to your VCS provider. This is useful if you are using a proxy between your VCS and CD.&lt;/li&gt;
&lt;li&gt;Added an idle timeout to the CD console that logs users out after 30 minutes. Configure this using the Hiera option, web_session_idle_timeout_mins.&lt;/li&gt;
&lt;li&gt;Added CSRF protection to the DeleteUserAccount and SetSuperUser endpoints by restricting them to POST requests and validating CSRF tokens issued at login and expired on logout.&lt;/li&gt;
&lt;li&gt;20 CVEs addressed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check the official &lt;a href="https://help.puppet.com/cdpe/current/Content/UserGuide/CDPE/ReleaseNotes/cd_release_notes.htm#Version5150" rel="noopener noreferrer"&gt;release notes for cd4peadm 5.15.0&lt;/a&gt; for the full details.&lt;/p&gt;




&lt;h3&gt;
  
  
  comply 3.7.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-28 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/comply" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;A few highlights from this release:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fixed a stale image which resulted in checksum and benchmark issues upon install.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVE-2026-33815, CVE-2026-33816.&lt;/strong&gt; Updated gorm.io to v5.9.2 to address these vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check the official &lt;a href="https://help.puppet.com/scm/current/Content/UserGuide/SCM/Release_notes/release_notes.htm#SecurityComplianceManagement371" rel="noopener noreferrer"&gt;release notes for comply 3.7.1&lt;/a&gt; for the full details.&lt;/p&gt;




&lt;h3&gt;
  
  
  complyadm 3.7.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-28 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/complyadm" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;A few highlights from this release:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fixed a stale image which resulted in checksum and benchmark issues upon install.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVE-2026-33815, CVE-2026-33816.&lt;/strong&gt; Updated gorm.io to v5.9.2 to address these vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check the official &lt;a href="https://help.puppet.com/scm/current/Content/UserGuide/SCM/Release_notes/release_notes.htm#SecurityComplianceManagement371" rel="noopener noreferrer"&gt;release notes for complyadm 3.7.1&lt;/a&gt; for the full details.&lt;/p&gt;




&lt;h3&gt;
  
  
  lvm 4.0.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-30 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/lvm" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release addresses two bug fixes. A race condition where &lt;code&gt;lvcreate&lt;/code&gt; returns before udev finishes processing device-add events could cause a subsequent &lt;code&gt;filesystem&lt;/code&gt; resource targeting the same logical volume to fail with "device or resource busy" — the fix calls &lt;code&gt;udevadm settle&lt;/code&gt; after a successful &lt;code&gt;lvcreate&lt;/code&gt;. The release also corrects an AIX-specific issue where boolean filesystem parameters such as &lt;code&gt;isnapshot&lt;/code&gt; were passed to &lt;code&gt;crfs&lt;/code&gt; as &lt;code&gt;true&lt;/code&gt;/&lt;code&gt;false&lt;/code&gt; instead of the required &lt;code&gt;yes&lt;/code&gt;/&lt;code&gt;no&lt;/code&gt;, causing the command to reject them outright.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;(MODULES-11756) Wait for udev to settle after lvcreate &lt;a href="https://github.com/puppetlabs/puppetlabs-lvm/pull/380" rel="noopener noreferrer"&gt;#380&lt;/a&gt; (&lt;a href="https://github.com/imaqsood" rel="noopener noreferrer"&gt;imaqsood&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;(MODULES-11788) Pass converted boolean parameter &lt;a href="https://github.com/puppetlabs/puppetlabs-lvm/pull/379" rel="noopener noreferrer"&gt;#379&lt;/a&gt; (&lt;a href="https://github.com/joshcooper" rel="noopener noreferrer"&gt;joshcooper&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  pe_event_forwarding 2.3.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-09 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/pe_event_forwarding" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release adds orchestrator plan-job collection controls and fixes duplicate forwarding behavior in job collection.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added plan job data collection from the &lt;code&gt;orchestrator/v1/plan_jobs&lt;/code&gt; API, with progress tracked in a dedicated &lt;code&gt;pe_event_forwarding_plan_index.yaml&lt;/code&gt; state file.&lt;/li&gt;
&lt;li&gt;Added the &lt;code&gt;pe_event_forwarding::skip_plans&lt;/code&gt; parameter to disable plan job collection when needed.&lt;/li&gt;
&lt;li&gt;Fixed &lt;code&gt;get_jobs&lt;/code&gt; behavior where the first page could return more records than newly available jobs, which could cause duplicate forwarded data.&lt;/li&gt;
&lt;li&gt;Source attribution: &lt;a href="https://github.com/puppetlabs/puppetlabs-pe_event_forwarding/pull/137" rel="noopener noreferrer"&gt;(PIE-1683) Add support for collecting plan data #137&lt;/a&gt; (&lt;a href="https://github.com/coreymbe" rel="noopener noreferrer"&gt;coreymbe&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  peadm 3.37.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-01 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/peadm" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release is a small change to add support for Puppet Enterprise 2025.10.0.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;(PE-43654) Add support for PE 2025.10.0 &lt;a href="https://github.com/puppetlabs/puppetlabs-peadm/pull/661" rel="noopener noreferrer"&gt;#661&lt;/a&gt; (&lt;a href="https://github.com/davidmalloncares" rel="noopener noreferrer"&gt;davidmalloncares&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  sce_linux 2.6.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-06 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/sce_linux" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;A few highlights from this release:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Error message:&lt;/strong&gt; comparison of NilClass with  failed. Some users saw this error message and experienced catalog compilation failures when attempting to manage mounted file system options with SCE for Linux. The issue was caused by /etc/fstab files that did not have at least one comment line or blank line. The internal parser was updated to avoid the issue and help prevent compilation errors.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;sce_mount_info fact does not resolve to a value.&lt;/strong&gt; This issue is related to the Linux findmnt command, which is used to list all mounted file systems. The command, which supports different options depending on operating system, was failing on specific systems, resulting in a failure of the sce_mount_info fact. Now, if the findmnt command fails, warnings will be logged, and the /etc/fstab file will be parsed directly for mount information.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Error messages related to rsyslog.&lt;/strong&gt; Because the version of the rsyslog logging service used on Red Hat Enterprise Linux (RHEL) 9 differs from earlier versions, users of RHEL 9 sometimes see error messages like this: imjournal: open() failed for path: '/var/lib/rsyslog/imjournal.state.tmp': Operation not permitted These messages indicate a failure to load the rsyslog imjournal module. To accommodate the changes in rsyslog and avoid this error, the module loading syntax was updated in SCE for Linux.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check the official &lt;a href="https://help.puppet.com/sce/current/linux/scel_relnotes_261.htm" rel="noopener noreferrer"&gt;release notes for sce_linux 2.6.1&lt;/a&gt; for the full details.&lt;/p&gt;




&lt;h3&gt;
  
  
  splunk_hec 2.2.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-09 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/splunk_hec" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release focuses on support for the &lt;code&gt;orchestrator_plan&lt;/code&gt; event type from the &lt;strong&gt;puppetlabs-pe_event_forwarding&lt;/strong&gt; module while also addressing &lt;code&gt;orchestrator_plan&lt;/code&gt; to index mappings in util_splunk_hec template.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added support for the &lt;code&gt;orchestrator_plan&lt;/code&gt; event type from the &lt;strong&gt;puppetlabs-pe_event_forwarding&lt;/strong&gt; module.&lt;/li&gt;
&lt;li&gt;Added &lt;code&gt;orchestrator_plan&lt;/code&gt; to index mappings in util_splunk_hec template.&lt;/li&gt;
&lt;li&gt;New PE Event Forwarding filter &lt;code&gt;orchestrator_plan_data_filter&lt;/code&gt; to allow filtering orchestrator plan event payloads.&lt;/li&gt;
&lt;li&gt;Module dependency updated to ensure &lt;code&gt;pe_event_forwarding&lt;/code&gt; v2.3.0+ is installed.&lt;/li&gt;
&lt;li&gt;Removed support for Debian platform and EOL operating system versions.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Until Next Time!
&lt;/h2&gt;

&lt;p&gt;That’s the full pass through the 8 Puppetlabs module releases from April 2026. The Forge links above are the quickest path to the underlying release details.&lt;/p&gt;

&lt;p&gt;If there is a part of the Puppetlabs ecosystem that would benefit from more context in future roundups, that feedback is worth sending along.&lt;/p&gt;

&lt;p&gt;Catch you in the next roundup for May 2026.&lt;/p&gt;

</description>
      <category>puppet</category>
    </item>
    <item>
      <title>Puppet Continuous Delivery 5.15.0 is now available</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Wed, 29 Apr 2026 16:20:25 +0000</pubDate>
      <link>https://dev.to/puppet/puppet-continuous-delivery-5150-is-now-available-5990</link>
      <guid>https://dev.to/puppet/puppet-continuous-delivery-5150-is-now-available-5990</guid>
      <description>&lt;p&gt;Puppet Continuous Delivery (CD) &lt;strong&gt;version 5.15.0&lt;/strong&gt; is now available, with updates focused on stability, security, and day‑to‑day usability for teams running Puppet automation pipelines at scale.&lt;/p&gt;

&lt;p&gt;If you’re already on CD 5.x, this is a straightforward upgrade that continues the work of refining the platform while keeping it aligned with current Puppet Enterprise releases and supported tooling.&lt;/p&gt;

&lt;p&gt;The detailed release notes are linked below, but here’s a quick breakdown of what this release delivers and why you may want to upgrade.&lt;/p&gt;

&lt;h2&gt;
  
  
  What’s included in CD 5.15.0
&lt;/h2&gt;

&lt;p&gt;CD 5.15.0 delivers targeted updates across webhook configuration, Pipelines as Code, Impact Analysis, VCS integrations, and platform security. The changes below focus on specific features and integrations rather than broad platform behavior.&lt;/p&gt;

&lt;h3&gt;
  
  
  Webhooks, sessions, and configuration
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Added a new Hiera configuration option, &lt;code&gt;external_webhook_url&lt;/code&gt;, which allows you to explicitly set the webhook URL that Continuous Delivery sends to your VCS provider. This is intended for deployments where CD is running behind a proxy.&lt;/li&gt;
&lt;li&gt;Added an idle session timeout to the CD console. Users are logged out after 30 minutes of inactivity by default, configurable using the &lt;code&gt;web_session_idle_timeout_mins&lt;/code&gt; Hiera option.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Pipelines as Code and Impact Analysis
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Added the &lt;code&gt;skip_empty_catalogs&lt;/code&gt; parameter to the Impact Analysis settings in the Pipelines as Code schema. When enabled, nodes with no catalog resources in PuppetDB are excluded from Impact Analysis results.&lt;/li&gt;
&lt;li&gt;Fixed an issue where the browser would stop polling for Impact Analysis results when an IA run finished or when navigating away from the IA details view.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  VCS integrations (Azure DevOps and GitLab)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Updated the &lt;strong&gt;Pipeline Summary&lt;/strong&gt; view so the &lt;code&gt;by&lt;/code&gt; field now displays the initiating user’s &lt;strong&gt;display name&lt;/strong&gt; for Azure DevOps pipelines, instead of the user ID.&lt;/li&gt;
&lt;li&gt;Changed how Continuous Delivery sends commit status updates to &lt;strong&gt;GitLab&lt;/strong&gt;. When native GitLab pipelines are present, all CD commit status updates are now attached to the same branch pipeline, avoiding fragmented status reporting.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Data visibility and usability fixes
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Fixed an issue where &lt;code&gt;package_updates&lt;/code&gt; for &lt;code&gt;pe_patch&lt;/code&gt; data did not appear in the fact picker. The query service was updated so this data now displays correctly.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Security and authorization hardening
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Added CSRF protection to the &lt;code&gt;DeleteUserAccount&lt;/code&gt; and &lt;code&gt;SetSuperUser&lt;/code&gt; endpoints by restricting them to POST requests and validating CSRF tokens issued at login and expired on logout.&lt;/li&gt;
&lt;li&gt;Fixed an issue where any authenticated user could enumerate user accounts and email addresses. Access to the &lt;code&gt;GET /v1/users&lt;/code&gt; endpoint is now properly restricted to root and superusers.&lt;/li&gt;
&lt;li&gt;Fixed an authorization bypass on the GraphQL &lt;code&gt;/query&lt;/code&gt; endpoint where permission checks could be skipped when using workspace variables or omitting the &lt;code&gt;id&lt;/code&gt; field. Authorization is now enforced consistently.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Platform and runtime updates
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Added &lt;strong&gt;Amazon Linux 2023&lt;/strong&gt; as a supported platform for Docker‑based installs.&lt;/li&gt;
&lt;li&gt;Updated the Postgres base image to &lt;code&gt;postgres:17-trixie&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Security dependency updates
&lt;/h3&gt;

&lt;p&gt;This release includes dependency updates to address reported vulnerabilities, including updates to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;lodash&lt;/li&gt;
&lt;li&gt;diffjs&lt;/li&gt;
&lt;li&gt;plexus-utils&lt;/li&gt;
&lt;li&gt;glibc&lt;/li&gt;
&lt;li&gt;undici&lt;/li&gt;
&lt;li&gt;jackson&lt;/li&gt;
&lt;li&gt;Jetty (updated to version 12)&lt;/li&gt;
&lt;li&gt;golang.org/x/crypto&lt;/li&gt;
&lt;li&gt;quartz&lt;/li&gt;
&lt;li&gt;logrus&lt;/li&gt;
&lt;li&gt;log4j2&lt;/li&gt;
&lt;li&gt;bouncy-castle&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Refer to &lt;a href="https://help.puppet.com/cdpe/current/Content/UserGuide/CDPE/ReleaseNotes/cd_release_notes.htm#Version5150" rel="noopener noreferrer"&gt;the release notes&lt;/a&gt; for the full list of CVEs addressed in this release.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why this release matters
&lt;/h2&gt;

&lt;p&gt;For most users, CD sits in the middle of multiple systems: source control, CI tooling, Puppet Enterprise, and infrastructure targets. Small issues can quickly turn into pipeline friction.&lt;/p&gt;

&lt;p&gt;CD 5.15.0 continues the effort to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reduce pipeline noise caused by edge‑case failures&lt;/li&gt;
&lt;li&gt;Improve the quality of feedback when something goes wrong&lt;/li&gt;
&lt;li&gt;Keep security posture current without forcing disruptive changes&lt;/li&gt;
&lt;li&gt;Make upgrades between minor versions low‑risk&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re standardizing on CD 5.x, staying current helps ensure you’re getting fixes before they turn into operational problems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Installation and upgrade notes
&lt;/h2&gt;

&lt;p&gt;If you’re new to Puppet Continuous Delivery, start with the official install documentation:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/cdpe/current/Content/UserGuide/CDPE/Installation/install_set_up.htm" rel="noopener noreferrer"&gt;Puppet CD installation docs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re already running CD 5.x, upgrading to 5.15.0 should follow the standard upgrade path described in the documentation:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/cdpe/current/Content/UserGuide/CDPE/Upgrade/upgrading.htm" rel="noopener noreferrer"&gt;Puppet CD upgrade docs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As always, review the release notes before upgrading, especially if you rely on specific integrations or custom pipeline behavior.&lt;/p&gt;

&lt;h2&gt;
  
  
  Read the full details
&lt;/h2&gt;

&lt;p&gt;For the complete list of fixes, security updates, and known issues, check the official release notes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/cdpe/current/Content/UserGuide/CDPE/ReleaseNotes/cd_release_notes.htm#Version5150" rel="noopener noreferrer"&gt;Continuous Delivery 5.15.0 release notes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you have feedback or run into issues after upgrading, the Puppet community channels are always a good place to share what you’re seeing.&lt;/p&gt;




&lt;p&gt;Happy automating!&lt;/p&gt;

</description>
      <category>puppet</category>
      <category>cicd</category>
    </item>
    <item>
      <title>Security Compliance Management 3.7.0 Is Now Available</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Wed, 15 Apr 2026 14:56:44 +0000</pubDate>
      <link>https://dev.to/puppet/security-compliance-management-370-is-now-available-1i47</link>
      <guid>https://dev.to/puppet/security-compliance-management-370-is-now-available-1i47</guid>
      <description>&lt;p&gt;Security Compliance Management (SCM) 3.7.0 helps teams assess systems against recognized security benchmarks. This release supports evolving baselines and improves audit readiness, operational reliability, and overall governance by giving administrators tighter control over platform performance, user access, and API security within the Puppet Enterprise platform.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's new in this release
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Expanded benchmark coverage for evolving environments
&lt;/h3&gt;

&lt;p&gt;SCM 3.7.0 updates CIS-CAT Pro Assessor benchmark coverage to support newer operating systems and standards. This helps ensure compliance reporting remains current as teams adopt new platforms.&lt;/p&gt;

&lt;p&gt;Highlights include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;New CIS benchmarks for numerous Linux distributions and macOS.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;An updated benchmark for Microsoft Windows 11 Enterprise.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More predictable performance during compliance scans
&lt;/h3&gt;

&lt;p&gt;Administrators can now control JVM memory allocation for the CIS Assessor, allowing performance tuning based on environment size and available resources. This results in more reliable scans and fewer disruptions during compliance assessments.&lt;/p&gt;

&lt;h3&gt;
  
  
  Greater control over user access and session behavior
&lt;/h3&gt;

&lt;p&gt;New centralized session management options allow administrators to better align SCM authentication behavior with corporate security and identity policies. The outcome is reduced risk from long-lived sessions and improved governance.&lt;/p&gt;

&lt;h3&gt;
  
  
  Improved API governance and security posture
&lt;/h3&gt;

&lt;p&gt;Additional GraphQL controls help limit exposure and enforce request limits in regulated or security-sensitive environments. The smaller API attack surface provides stronger API governance.&lt;/p&gt;

&lt;h3&gt;
  
  
  Security fixes and dependency updates
&lt;/h3&gt;

&lt;p&gt;This release addresses multiple known vulnerabilities across core dependencies, helping reduce inherited risk and support ongoing vulnerability management.&lt;/p&gt;

&lt;p&gt;For a complete list of addressed CVEs and detailed configuration guidance, see the release notes.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Upgrade to SCM 3.7.0
&lt;/h2&gt;

&lt;p&gt;Organizations should consider upgrading to SCM 3.7.0 to reduce compliance gaps, stabilize large-scale assessments, and strengthen security controls as environments grow more complex.&lt;/p&gt;

&lt;p&gt;With this release, teams can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Maintain audit readiness as new operating systems and benchmarks are adopted.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Improve scan reliability and performance in large-scale environments managed through Puppet Enterprise.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Centralize and standardize user session and API behavior across the platform.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Reduce exposure to known vulnerabilities through updated dependencies and security fixes.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Next Steps
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Review the &lt;a href="https://help.puppet.com/scm/current/Content/UserGuide/SCM/Release_notes/release_notes.htm#SecurityComplianceManagement370" rel="noopener noreferrer"&gt;release notes&lt;/a&gt; for technical details and configuration information.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Upgrade to SCM 3.7.0 to take advantage of expanded coverage and new governance controls.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>puppet</category>
      <category>security</category>
    </item>
    <item>
      <title>Generate a Puppet Module Using GitHub Copilot and VS Code</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Mon, 13 Apr 2026 13:23:29 +0000</pubDate>
      <link>https://dev.to/puppet/generate-a-puppet-module-using-github-copilot-and-vs-code-50mm</link>
      <guid>https://dev.to/puppet/generate-a-puppet-module-using-github-copilot-and-vs-code-50mm</guid>
      <description>&lt;p&gt;This tutorial shows how to use GitHub Copilot with the Puppet Model Context Protocol (MCP) server to generate, validate, and refine a Puppet module—even if you’re new to Puppet development. &lt;/p&gt;

&lt;h3&gt;
  
  
  What You’ll Learn 
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;  How to configure GitHub Copilot with the Puppet MCP server &lt;/li&gt;
&lt;li&gt;  How AI agents can use the Puppet Development Kit (PDK) to generate Puppet modules &lt;/li&gt;
&lt;li&gt;  How AI agents can use the PDK to validate and iterate on generated Puppet code&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Challenge: Overcoming the Puppet Module Learning Curve 
&lt;/h2&gt;

&lt;p&gt;When you start automating infrastructure with Puppet, you might face an initial learning curve. You will begin to learn Puppet syntax, best practices around module structure and Puppet Domain-Specific Language (DSL), and even what tools are available to you.  &lt;/p&gt;

&lt;p&gt;To help DevOps practitioners get started, Puppet first released an MCP server to &lt;a href="https://help.puppet.com/pe/current/topics/infra-assistant-code-assist.htm" rel="noopener noreferrer"&gt;accelerate development&lt;/a&gt; when using the new Puppet EdgeOps module for &lt;a href="https://www.puppet.com/blog/puppet-edge-code-assist" rel="noopener noreferrer"&gt;working with network devices&lt;/a&gt;. Starting with Puppet Enterprise Advanced 2025.7, tools are available to provide even more guidance and information for working with agents on Puppet code in control repos, tasks, and modules. Traditional module development demanded deep domain expertise that teams often lack, but using modern AI-assisted development flows can help you bridge the knowledge gap. &lt;/p&gt;

&lt;p&gt;Puppet's MCP server can be used with your favorite Integrated Development Environment (IDE) and code assist agent so that you can describe your requirements in natural language and work with your agent to get validated Puppet code and architecture. This tutorial demonstrates the use of Visual Studio (VS) Code and GitHub Copilot to generate a Puppet module with minimal Puppet expertise, helping you get started faster!  &lt;/p&gt;

&lt;p&gt;⚠️ &lt;strong&gt;Important:&lt;/strong&gt; AI tools make mistakes, just like people. For this reason, your process should always involve review and testing as part of the end-to-end process. Use these tools to augment yourself and the team, but make those tools earn your trust. &lt;/p&gt;

&lt;p&gt;Time to get started!&lt;/p&gt;

&lt;h2&gt;
  
  
  Tech Stack Overview: VS Code, GitHub Copilot, and Puppet MCP 
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.puppet.com/sites/default/files/inline-images/1.png" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdz63dnnmh3aa53llhhw7.png" alt="Flow chart depicting VS Code, GitHub, and MCP Server" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For this tutorial, the Puppet development workflow will combine three key technologies: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;a href="https://code.visualstudio.com/download" rel="noopener noreferrer"&gt;&lt;strong&gt;Visual Studio Code&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; Serves as the IDE where all coding (and code generation) happens.  &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://code.visualstudio.com/docs/copilot/overview" rel="noopener noreferrer"&gt;&lt;strong&gt;GitHub Copilot&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; Acts as the AI coding assistant that provides intelligent code suggestions and executes autonomous tasks.  &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/infra-assistant-code-assist.htm" rel="noopener noreferrer"&gt;&lt;strong&gt;Puppet MCP server&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; Exposes Puppet-specific intelligence through MCP, enabling GitHub Copilot to better generate Puppet solutions.  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The MCP server provides &lt;a href="https://help.puppet.com/pe/current/topics/available-mcp-tools-for-code-assist.htm" rel="noopener noreferrer"&gt;several tools&lt;/a&gt; to provide Puppet language guides, information about Puppet environment entities, Puppet documentation, and networking info. This integration eliminates context switching between documentation, terminal windows, and code editors and provides the information required by AI agents to support smooth transitions from one step to the next.  &lt;/p&gt;

&lt;p&gt;Authentication to the Puppet MCP server happens via Puppet Enterprise (PE) API keys with &lt;a href="https://help.puppet.com/pe/current/topics/adding-an-mcp-server.htm" rel="noopener noreferrer"&gt;secure token storage in VS Code&lt;/a&gt;. The MCP architecture follows a client-server model where VS Code instantiates client connections to the Puppet MCP server running in your Puppet Enterprise environment.&lt;/p&gt;

&lt;h2&gt;
  
  
  Prerequisites and Required Software Installation 
&lt;/h2&gt;

&lt;p&gt;This brief tutorial is based on the assumption that you have met several prerequisites. Plan time to go through this checklist before starting: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  Obtain your authentication credentials to download Perforce Puppet applications. The credentials are either your Forge API key or your &lt;a href="https://help.puppet.com/pe/current/topics/verify_installed_licenses_and_active_nodes.htm?Highlight=%22license%20id%22" rel="noopener noreferrer"&gt;Puppet Enterprise license ID&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/installing.htm" rel="noopener noreferrer"&gt;Install Puppet Enterprise Advanced 2025.7+&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/enabling-the-infra-assistant.htm" rel="noopener noreferrer"&gt;Enable the Infra Assistant feature on your PE server&lt;/a&gt;. You do not have to configure the Infra Assistant OpenAI settings, but the Infra Assistant must be turned on in order for the MCP server to accept requests from your agent. &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/rbac-token-auth-generate-token-console.htm" rel="noopener noreferrer"&gt;Generate a valid Puppet Enterprise API key&lt;/a&gt; from the console for a user with the &lt;code&gt;infrastructure_assistant:use&lt;/code&gt; permission. (The API key is sometimes called a token.)&lt;/li&gt;
&lt;li&gt;  Install &lt;a href="https://code.visualstudio.com/download" rel="noopener noreferrer"&gt;Visual Studio Code&lt;/a&gt; on your development machine and complete configuration tasks: &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://code.visualstudio.com/docs/copilot/overview#_getting-started" rel="noopener noreferrer"&gt;Configure the GitHub Copilot extension&lt;/a&gt; in Visual Studio Code. &lt;/li&gt;
&lt;li&gt;  Configure GitHub Copilot to &lt;a href="https://code.visualstudio.com/docs/copilot/customization/mcp-servers" rel="noopener noreferrer"&gt;use MCP servers in VS Code&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;  Ensure that your developer machine has network access to the PE console host. &lt;/li&gt;
&lt;li&gt;  Verify that your developer machine &lt;a href="https://portal.perforce.com/s/article/8078496522135?utm_medium=social&amp;amp;utm_source=youtube&amp;amp;utm_campaign=2025-puppet-forge&amp;amp;utm_content=puppet-forge" rel="noopener noreferrer"&gt;trusts the PE console CA certificate&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Tutorial Walkthrough: From Empty Repository to Generated Module 
&lt;/h2&gt;

&lt;p&gt;These steps walk through how you can take a completely empty repository to a validated Puppet module by using an AI-assisted flow in Visual Studio with a code assistant. Remember to meet the previously listed prerequisites! The following steps use GitHub Copilot, but if you happen to use a different stack (like Claude Code or Cursor), the process is mostly the same.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tip:&lt;/strong&gt; In this tutorial, “agent chat” refers to the GitHub Copilot Agent chat window in Visual Studio Code. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Using your favorite source control tool, create a blank repository to begin working. &lt;/li&gt;
&lt;li&gt; Clone the repository and open it in Visual Studio Code. &lt;/li&gt;
&lt;li&gt; To support the use of Puppet tools, install GitHub Copilot instructions in your solution. Sample instructions are &lt;a href="https://github.com/jst-cyr/puppet-copilot-instructions-example" rel="noopener noreferrer"&gt;available on GitHub&lt;/a&gt;. 
&lt;strong&gt;Tip:&lt;/strong&gt; Some models cannot easily find instructions in subfolders and  search only in the root directory. Some models look only for the &lt;code&gt;copilot-instructions.md&lt;/code&gt; file. The example provides a &lt;code&gt;README.md&lt;/code&gt; and a &lt;code&gt;copilot-instructions.md&lt;/code&gt; file that help lead the model toward the custom Puppet instructions file.  &lt;/li&gt;
&lt;li&gt; &lt;a href="https://help.puppet.com/pe/current/topics/adding-an-mcp-server.htm" rel="noopener noreferrer"&gt;Add the Puppet MCP server&lt;/a&gt; to your &lt;code&gt;mcp.json&lt;/code&gt; file. &lt;/li&gt;
&lt;li&gt; Start the Puppet MCP server, either by clicking &lt;strong&gt;Start&lt;/strong&gt; in your &lt;code&gt;mcp.json&lt;/code&gt; file or through the &lt;strong&gt;MCP Servers – Installed&lt;/strong&gt; list in the &lt;strong&gt;Extensions&lt;/strong&gt; view. &lt;/li&gt;
&lt;li&gt; Open an agent chat window for GitHub Copilot. &lt;/li&gt;
&lt;li&gt; Run a prompt to generate a new module. For example: “I want to create a new Puppet module to automate the provisioning of new AWS VMs. Please follow best practices for Puppet module creation.” &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Note that this is a simple prompt example. To follow context engineering best practices, you would provide much more detail to get your desired output. For tutorial purposes, the prompt is intentionally lightweight. By using a simple prompt, you can recognize the extra context and benefits provided by Puppet tools to accelerate your progress.&lt;/p&gt;

&lt;p&gt;  &lt;iframe src="https://www.youtube.com/embed/F25NUANJT04"&gt;
  &lt;/iframe&gt;
&lt;/p&gt;

&lt;h2&gt;
  
  
  Installing Puppet Development Kit (PDK) 
&lt;/h2&gt;

&lt;p&gt;At this point, your agent should be running and attempting to solve the problem. The agent will quickly detect the need for  additional information from the &lt;strong&gt;Puppet MCP server.&lt;/strong&gt; In addition, the agent will determine that the &lt;strong&gt;Puppet Development Kit (PDK)&lt;/strong&gt; must be used to create modules. In my model testing, the GitHub Copilot agent undertook the following tasks, which required minimal input from the user: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Processed the provided Puppet instructions and determined that the Puppet MCP server should be connected to retrieve guidelines. &lt;/li&gt;
&lt;li&gt; Attempted to connect to the Puppet MCP server for the &lt;code&gt;get_puppet_guide&lt;/code&gt; tool and augmented the context with information from the Puppet MCP server. &lt;/li&gt;
&lt;li&gt; Recognized that the PDK is required and attempted to check whether PDK was installed (by running &lt;code&gt;pdk --version&lt;/code&gt;). &lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If PDK was not detected, attempted to fetch the PDK installation instructions. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tip:&lt;/strong&gt; The agent may use different URLs to search for the PDK installation instructions. Eventually, the agent will find the correct installation instructions for the operating system. &lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;After the agent discovered the installation instructions, the agent determined that authentication credentials are required to download the software. At this point, the user would be prompted for Forge credentials or Puppet Enterprise credentials. At the prompt, you will specify the type of credentials. For example: “Here is my license ID: abcdefghizjklmnopzrstuvwxyz1”. This sample prompt informs the agent to use a Puppet Enterprise license ID, instead of a Forge API key, as the authentication method. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Submit the prompt and the agent will begin to download and install the PDK. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The agent typically installs the PDK as part of its setup routine. In practice, the agent might run incorrect commands or fail to use elevated privileges on the first attempt. When that happens, allow the agent to iterate until the installation succeeds. &lt;/p&gt;

&lt;p&gt;💡 &lt;strong&gt;Tip:&lt;/strong&gt; This is a huge boost for new users because the agent can search for instructions and quickly iterate through installation failures, while you focus on reviewing the results. &lt;/p&gt;

&lt;p&gt;After the agent successfully completes the PDK download and installation on your behalf, the agent continues with module generation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Generating the Module 
&lt;/h2&gt;

&lt;p&gt;With the PDK installed, it’s time to create the first steps of a module that will accomplish your goals. Only minimal context is provided in the tutorial example for provisioning new AWS VMs. The models will attempt to create the functionality you require based on their training data, the context from the Puppet MCP server, and the context you provide. The better your prompting, the more accurate the output will be. For this tutorial, however, assume that you are not trying to generate the module in one step and will follow up with further prompting to refine the module. During this tutorial step, the agent will generate the basics of the module. &lt;/p&gt;

&lt;p&gt;At this stage, GitHub Copilot typically performs the following actions without requiring additional prompts: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; After completing installation, validates the installation by running &lt;code&gt;pdk --version&lt;/code&gt;. &lt;/li&gt;
&lt;li&gt; If successful, creates a module with a PDK command like &lt;code&gt;pdk new module aws_provisioning --skip-interview&lt;/code&gt;. &lt;/li&gt;
&lt;li&gt; After the PDK module creation logic completes processing, creates profile classes for AWS VM provisioning. This command might be &lt;code&gt;pdk new class aws_provisioning&lt;/code&gt; or similar. &lt;/li&gt;
&lt;li&gt; Creates additional supporting classes. In my testing, the agent ran these additional commands: 

&lt;ol&gt;
&lt;li&gt; &lt;code&gt;pdk new class aws_provisioning::config&lt;/code&gt; &lt;/li&gt;
&lt;li&gt; &lt;code&gt;pdk new class aws_provisioning::instance&lt;/code&gt; &lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;li&gt; After the basic structure of the classes is in place, begins implementing Puppet code for the classes. The actions resemble typical code generation steps, creating and editing a variety of files and patching them with new implementation logic. &lt;/li&gt;

&lt;li&gt; When the initial code generation is completed on top of the PDK skeleton implementations, updates documentation such as the &lt;code&gt;metadata.json&lt;/code&gt; file and the README file to match the needs of the generated code. &lt;/li&gt;

&lt;/ol&gt;

&lt;p&gt;When documentation updates are completed, a typical agent might stop without validating further. However, by setting the context for the agent with knowledge of PDK and its capabilities as well as the best practices from the Puppet MCP server, the agent knows that validation of modules is an important next step.&lt;/p&gt;

&lt;h2&gt;
  
  
  Validating the Module 
&lt;/h2&gt;

&lt;p&gt;PDK supports validation of a module to ensure that it meets specific standards. Even with the best practices and instructions that were provided to the agent, along with its training, agents can make mistakes. With validation, you can catch some of these mistakes up front. Augmenting with tools is a key strategy for agentic workflows. Using the agent as an automation process to leverage the tools you have is a great way to take advantage of more deterministic capabilities along with the non-deterministic nature of the agentic automation. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; For validation, the agent should attempt to use the PDK: &lt;code&gt;pdk validate&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt; PDK should find issues, even if they are only indentation issues in YAML files. The agent should then attempt to correct the issues with code assist using the output of the PDK validation. &lt;/li&gt;
&lt;li&gt; When the patch edits are complete, the agent should run PDK validation again (&lt;code&gt;pdk validate&lt;/code&gt;).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If more issues are found, the agent should circle back and try to resolve them, looping until no more issues are found, but typically the first run of validation should find all issues. &lt;/p&gt;

&lt;p&gt;You can now continue your own testing and building out the module with a solid base that follows Puppet best practices! This workflow compresses the traditional learning curve and gets you to the interesting bits of your development much faster.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Benefits of Agent-Assisted Module Creation 
&lt;/h2&gt;

&lt;p&gt;This AI-assisted approach offers several key advantages over manual development: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  Agent-led requirements detection and installation help you get started so that your system achieves a correct state. &lt;/li&gt;
&lt;li&gt;  Autonomous error detection and correction reduce debugging time significantly. &lt;/li&gt;
&lt;li&gt;  The agent's ability to reference the Puppet MCP server and official Puppet documentation helps to ensure that generated code follows best practices and coding standards.  &lt;/li&gt;
&lt;li&gt;  Integration with PDK tooling provides deterministic automation and continuous quality checks throughout the development process.  &lt;/li&gt;
&lt;li&gt;  Structured instruction files create a consistent and repeatable development experience across different projects and team members. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By building your AI-assisted flow on top of solid DevOps tools and practices, you’ll be equipped to avoid the typical challenges faced by generic coding models. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;“DevOps is not dying. It is becoming the economic and operational foundation for AI at scale.&lt;/strong&gt;&lt;/em&gt; &lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;The data shows the same pattern across every domain: AI succeeds when delivery systems are standardized, centralized, automated, and measurable. Where those foundations are weak, AI magnifies existing gaps in coordination, governance, auditability, cost, and outcomes.”&lt;/strong&gt;&lt;/em&gt; &lt;br&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;-&lt;/strong&gt;&lt;/em&gt; &lt;a href="https://www.perforce.com/resources/state-of-devops/conclusion?utm_medium=social&amp;amp;utm_source=youtube&amp;amp;utm_campaign=2025-puppet-forge&amp;amp;utm_content=puppet-forge" rel="noopener noreferrer"&gt;&lt;em&gt;&lt;strong&gt;State of DevOps Report 2026&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Challenges and Solutions in AI-Assisted Puppet Development 
&lt;/h2&gt;

&lt;p&gt;You might encounter a few common challenges when using AI agents for Puppet module generation: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; According to a &lt;a href="https://vercel.com/blog/agents-md-outperforms-skills-in-our-agent-evals" rel="noopener noreferrer"&gt;recent evaluation by Vercel&lt;/a&gt;, coding agents &lt;strong&gt;ignore available skills in 56% of cases,&lt;/strong&gt; choosing not to invoke skills even when relevant documentation exists. The solution involves using instruction files that force context loading rather than relying on agent decisions. In the evaluation, Vercel found that directly embedding a compressed 8 KB docs index into an &lt;code&gt;AGENTS.md&lt;/code&gt; file helped coding agents achieve 100% pass rates compared to 79% with skills combined with explicit instructions. In my own tests with GitHub Copilot, references from the README.md file to other instruction files helped the agent, with less sophisticated models, to find the correct instructions and load them.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Agents sometimes refuse to use PDK or read proper installation instructions&lt;/strong&gt;, requiring iterative prompt refinement. The solution involves adding explicit installation commands, troubleshooting steps, and URL references to your &lt;code&gt;copilot-instructions.md&lt;/code&gt; file. Ensure that you follow &lt;a href="https://vercel.com/blog/agents-md-outperforms-skills-in-our-agent-evals" rel="noopener noreferrer"&gt;best practices for instructions files to keep them lean&lt;/a&gt;. Getting GitHub Copilot to consistently read instruction files requires understanding that passive context (always-loaded files) outperforms active retrieval (on-demand skills). Instruction files should be concise (fewer than 1,000 lines), structured with headings and bullet points, and use imperative rules rather than long paragraphs.  &lt;/li&gt;
&lt;li&gt; &lt;strong&gt;AI agents can get stuck in validation and fixing loops.&lt;/strong&gt; For linting and validation errors that agents struggle to fix, adding error-specific guidance to instruction files helps GitHub Copilot learn from mistakes. The goal is to eliminate decision points by providing persistent context rather than making agents decide when to look up information.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Table 1: Common challenges in AI-assisted Puppet module development and recommended solutions 
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Challenge &lt;/th&gt;
&lt;th&gt;Impact &lt;/th&gt;
&lt;th&gt;Solution &lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Agents ignore MCP tools (56% of cases) &lt;/td&gt;
&lt;td&gt;Skills documentation not invoked when needed &lt;/td&gt;
&lt;td&gt;Use .github/copilot-instructions.md for passive context loading (achieves 100% pass rate versus 79% with on-demand skills). &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;PDK installation issues &lt;/td&gt;
&lt;td&gt;Agents fail to use PDK or read installation instructions &lt;/td&gt;
&lt;td&gt;Add explicit installation commands and troubleshooting steps to copilot-instructions.md. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Inconsistent reading of instruction files &lt;/td&gt;
&lt;td&gt;Agent decisions create unpredictable behavior &lt;/td&gt;
&lt;td&gt;Provide persistent context (always-loaded files) rather than relying on agent retrieval decisions. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Incorrect Puppet code or missing namespaces or invalid spacing &lt;/td&gt;
&lt;td&gt;Generated configurations fail validation &lt;/td&gt;
&lt;td&gt;Include specific vendor configuration examples in instruction files and use PDK validation for testing modules. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Validation errors agents can't fix &lt;/td&gt;
&lt;td&gt;Repeated mistakes across generations &lt;/td&gt;
&lt;td&gt;Document error-specific guidance in instruction files so agents learn from past failures. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File structure guidelines &lt;/td&gt;
&lt;td&gt;Keep instruction files concise (fewer than 1,000 lines) with clear structure &lt;/td&gt;
&lt;td&gt;Use headings, bullet points, and imperative rules instead of long paragraphs.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Should You Use Agent Skills or Instructions? 
&lt;/h2&gt;

&lt;p&gt;Vercel's research on AI agent instruction approaches provides compelling evidence to show why instruction files are essential for effective AI-assisted development. Their evaluation tested Next.js 16 API generation using four configurations:  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; No documentation: 53% pass rate &lt;/li&gt;
&lt;li&gt; Skills with default behavior: 53% pass rate, same as no documentation &lt;/li&gt;
&lt;li&gt; Skills with explicit trigger instructions: 79% pass rate &lt;/li&gt;
&lt;li&gt; A compressed 8 KB docs index in AGENTS.md: 100% pass rate &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The static markdown file outperformed sophisticated retrieval systems because the file eliminated decision points where agents must choose whether to invoke tools. In 56% of eval cases, skills were never invoked despite being available, producing no improvement over the baseline. &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;a href="https://www.puppet.com/sites/default/files/inline-images/2_0.png" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa7z7h9xf8dwzhnxwauiq.png" alt="AI Agent Performance: Instruction Approach comparison" width="800" height="450"&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Although these findings were focused on web development frameworks like Next.js, similar issues occur with agents across language frameworks and IDEs. For Puppet development, my testing found that combining instructions, PDK tooling, and the Puppet MCP server gave agents the best chance to have the correct context information.  &lt;/p&gt;

&lt;p&gt;AI-assisted development is still evolving but is expected to become an important part of many DevOps team processes. The Model Context Protocol is establishing itself as an enterprise-wide standard enabling vendor interoperability, with companies like Figma, Notion, Linear, Atlassian, and MongoDB building MCP servers that work seamlessly together. &lt;/p&gt;

&lt;p&gt;For infrastructure-as-code specifically, the shift toward “vibe coding” is opening up the opportunity for developers to express intentions in natural language rather than memorizing command-line syntax or the specifics of the Puppet Desired State Language (DSL).  Given a solid base of DevOps tools across the lifecycle, from development to testing to operations, coding assistants are well positioned to take advantage of these tools, thus unlocking opportunities for more practitioners to achieve greater efficiency across the entire workflow.&lt;/p&gt;

&lt;h2&gt;
  
  
  References 
&lt;/h2&gt;

&lt;p&gt;Check out the following sources, some of which were referenced in the document, and some of which provide a deeper dive if this topic is of interest to you! &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;a href="https://github.com/jst-cyr/puppet-copilot-instructions-example" rel="noopener noreferrer"&gt;Sample instructions for GitHub Copilot and Puppet MCP server&lt;/a&gt; (github.com/jst-cyr) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/installing.htm" rel="noopener noreferrer"&gt;Installing Puppet Enterprise (PE)&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/infra-assistant-code-assist.htm" rel="noopener noreferrer"&gt;Infra Assistant: code assist&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/enabling-the-infra-assistant.htm" rel="noopener noreferrer"&gt;Infra Assistant: Enable the Infra Assistant&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/available-mcp-tools-for-code-assist.htm" rel="noopener noreferrer"&gt;Infra Assistant - code assist: Available MCP tools&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/configuring-your-client-to-use-the-mcp-server.htm" rel="noopener noreferrer"&gt;Infra Assistant - code assist: Configuring your client to use the MCP server&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/adding-an-mcp-server.htm" rel="noopener noreferrer"&gt;Infra Assistant - code assist: Add the Puppet MCP server&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/rbac-token-auth-generate-token-console.htm" rel="noopener noreferrer"&gt;SAML authentication: Generate a token in the console&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/verify_installed_licenses_and_active_nodes.htm" rel="noopener noreferrer"&gt;View your license details | Puppet Enterprise&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://portal.perforce.com/s/article/8078496522135?utm_medium=social&amp;amp;utm_source=youtube&amp;amp;utm_campaign=2025-puppet-forge&amp;amp;utm_content=puppet-forge" rel="noopener noreferrer"&gt;Get the Puppet CA certificate chain in Puppet Enterprise&lt;/a&gt; (portal.perforce.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://www.puppet.com/blog/puppet-edge-code-assist" rel="noopener noreferrer"&gt;Build Tasks for Network Devices Faster with Code Assistance and Puppet Edge&lt;/a&gt; (puppet.com)  &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://www.perforce.com/resources/state-of-devops?utm_medium=social&amp;amp;utm_source=youtube&amp;amp;utm_campaign=2025-puppet-forge&amp;amp;utm_content=puppet-forge" rel="noopener noreferrer"&gt;The State of DevOps Report 2026&lt;/a&gt; (perforce.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://vercel.com/blog/agents-md-outperforms-skills-in-our-agent-evals" rel="noopener noreferrer"&gt;AGENTS.md outperforms skills in our agent evals&lt;/a&gt; (vercel.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://code.visualstudio.com/docs/copilot/customization/mcp-servers" rel="noopener noreferrer"&gt;GitHub Copilot: Use MCP servers in VS Code&lt;/a&gt; (code.visualstudio.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://code.visualstudio.com/docs/copilot/overview" rel="noopener noreferrer"&gt;GitHub Copilot in VS Code&lt;/a&gt; (code.visualstudio.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.github.com/en/copilot/tutorials/use-custom-instructions" rel="noopener noreferrer"&gt;Using custom instructions to unlock the power of Copilot code review&lt;/a&gt; (docs.github.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://dev.to/razvan_dim/bridging-the-gap-a-deep-dive-into-the-model-context-protocol-mcp-4e0p"&gt;Bridging the Gap: A Deep Dive into the Model Context Protocol (MCP)&lt;/a&gt; (dev.to)&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>puppet</category>
      <category>githubcopilot</category>
      <category>vscode</category>
      <category>aiops</category>
    </item>
    <item>
      <title>Puppet Core 8.18.0 is out: macOS 15 support and key security updates</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Thu, 09 Apr 2026 12:06:38 +0000</pubDate>
      <link>https://dev.to/puppet/puppet-core-8180-is-out-macos-15-support-and-key-security-updates-2ng8</link>
      <guid>https://dev.to/puppet/puppet-core-8180-is-out-macos-15-support-and-key-security-updates-2ng8</guid>
      <description>&lt;p&gt;You can now download Puppet Core &lt;strong&gt;8.18.0&lt;/strong&gt;! This update adds support for macOS 15 and includes several important security updates to help keep your infrastructure protected.&lt;/p&gt;

&lt;p&gt;As always, Puppet Core releases focus on stability, platform support, and staying ahead of reported vulnerabilities.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://help.puppet.com/core/current/Content/PuppetCore/PuppetReleaseNotes/release_notes_puppet_x-8-18-0.htm" rel="noopener noreferrer"&gt;Official Puppet Core 8.18 release notes&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  What’s new in Puppet Core 8.18.0
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Support for macOS 15&lt;/strong&gt;: Puppet Core now supports macOS 15 on both x86_64 and ARM architectures. This enables continued management of macOS systems using the same automation controls and policies you already rely on.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Security focused dependency updates
&lt;/h2&gt;

&lt;p&gt;Security remains a top priority in every Puppet Core release. This release includes updates to several bundled components to address recently disclosed security vulnerabilities. By delivering these updates as part of hardened Puppet Core builds, you reduce dependency risk without tracking, validating, or rebuilding components independently. &lt;/p&gt;

&lt;h3&gt;
  
  
  🔐 libxml2 updated
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;libxml2&lt;/strong&gt; has been updated to &lt;strong&gt;version 2.15.2&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Addresses the following CVEs:

&lt;ul&gt;
&lt;li&gt;CVE-2026-0989&lt;/li&gt;
&lt;li&gt;CVE-2026-0990&lt;/li&gt;
&lt;li&gt;CVE-2026-0992&lt;/li&gt;
&lt;li&gt;CVE-2026-1757&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔐 zlib gem updated
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;zlib gem&lt;/strong&gt; updated to &lt;strong&gt;version 3.0.1&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Addresses:

&lt;ul&gt;
&lt;li&gt;CVE-2026-27820&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔐 curl updated
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;curl&lt;/strong&gt; updated to &lt;strong&gt;version 8.19.0&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Addresses:

&lt;ul&gt;
&lt;li&gt;CVE-2026-1965&lt;/li&gt;
&lt;li&gt;CVE-2026-3783&lt;/li&gt;
&lt;li&gt;CVE-2026-3784&lt;/li&gt;
&lt;li&gt;CVE-2026-3805&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;If you rely on Puppet Core in security‑sensitive or regulated environments, this release is strongly recommended.&lt;/p&gt;




&lt;h2&gt;
  
  
  Getting Puppet Core 8.18.0
&lt;/h2&gt;

&lt;p&gt;You can upgrade to Puppet Core 8.18.0 using your existing Puppet Core repositories and standard upgrade workflows. Upgrading to Puppet Core 8.18.0 helps you take advantage of the latest platform support, reduce exposure to dependency related security risk, and rely on vendor-tested packages instead of managing updates yourself.&lt;/p&gt;

&lt;p&gt;As always:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Test upgrades in a staging environment first&lt;/li&gt;
&lt;li&gt;Review the full release notes for platform‑specific details&lt;/li&gt;
&lt;li&gt;Roll out broadly once validated&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;📄 &lt;strong&gt;Puppet Core Installation Docs:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/core/current/Content/PuppetCore/install_puppet.htm" rel="noopener noreferrer"&gt;Installing Puppet Core&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/core/current/Content/PuppetCore/upgrade.htm" rel="noopener noreferrer"&gt;Upgrading Puppet Core&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Let us know how it goes
&lt;/h2&gt;

&lt;p&gt;If you’re upgrading to 8.18.0, running Puppet Core on macOS 15, or have feedback on this release, let us know in the comments. Your input helps shape future updates.&lt;/p&gt;

&lt;p&gt;Happy puppeting!&lt;/p&gt;

</description>
      <category>puppet</category>
      <category>devops</category>
      <category>security</category>
      <category>automation</category>
    </item>
    <item>
      <title>Puppetlabs Modules Roundup – March 2026</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Mon, 06 Apr 2026 14:24:03 +0000</pubDate>
      <link>https://dev.to/puppet/puppetlabs-modules-roundup-march-2026-3bde</link>
      <guid>https://dev.to/puppet/puppetlabs-modules-roundup-march-2026-3bde</guid>
      <description>&lt;p&gt;March 2026 brought 4 Puppetlabs module releases in the Puppetlabs Forge catalog. Read along to see what changed this month!&lt;/p&gt;

&lt;p&gt;Across the month, the clearest themes were compatibility updates across Puppet Enterprise (PE), supported platforms, and operational hardening and troubleshooting improvements.&lt;/p&gt;

&lt;h2&gt;
  
  
  Highlighted Updates
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Compatibility updates across PE and supported platforms
&lt;/h3&gt;

&lt;p&gt;March releases leaned toward version-alignment work, with updates for newer Puppet Enterprise releases, Ubuntu 24.04 benchmark coverage, and dependency ranges that allow newer supporting modules.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added support for PE 2023.8.9 and 2025.9.0.&lt;/li&gt;
&lt;li&gt;Added CIS Benchmark support for Ubuntu 24.04 Server Levels 1 and 2.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Operational hardening and troubleshooting improvements
&lt;/h3&gt;

&lt;p&gt;Several releases focused on making "Day Two" operations safer and easier to debug through better validation, more useful logging, and targeted runtime fixes.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added installer untar checks and deduplicated hosts in the legacy compiler group.&lt;/li&gt;
&lt;li&gt;Moved most SCE-specific logging into the Puppet agent run log for easier debugging.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What Updates Happened to Puppetlabs Modules in March 2026?
&lt;/h2&gt;

&lt;p&gt;The following is an alphabetical listing of modules which received updates in March 2026. If a module had multiple versions released, the updates are collected together, numbered with the "latest" version available.&lt;/p&gt;




&lt;h3&gt;
  
  
  cd4pe 3.4.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-03-04 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/cd4pe" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release focuses on updated puppetlabs-docker and puppetlabs-hocon dependencies to allow usage of newer versions while also addressing updated module with PDK 3.6.1.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Updated puppetlabs-docker and puppetlabs-hocon dependencies to allow usage of newer versions&lt;/li&gt;
&lt;li&gt;Updated module with PDK 3.6.1&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  peadm 3.36.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-03-25 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/peadm" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release focuses on adding support for PE 2023.8.9 and 2025.9.0 while also addressing deduplicate hosts in legacy compiler group.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Adding support for PE 2023.8.9 and 2025.9.0 &lt;a href="https://github.com/puppetlabs/puppetlabs-peadm/pull/657" rel="noopener noreferrer"&gt;#657&lt;/a&gt; (&lt;a href="https://github.com/Jade2153" rel="noopener noreferrer"&gt;Jade2153&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;(PE-43572) deduplicate hosts in legacy compiler group &lt;a href="https://github.com/puppetlabs/puppetlabs-peadm/pull/658" rel="noopener noreferrer"&gt;#658&lt;/a&gt; (&lt;a href="https://github.com/davidmalloncares" rel="noopener noreferrer"&gt;davidmalloncares&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;(PE-42686) Add checks to installer untar command &lt;a href="https://github.com/puppetlabs/puppetlabs-peadm/pull/654" rel="noopener noreferrer"&gt;#654&lt;/a&gt; (&lt;a href="https://github.com/davidmalloncares" rel="noopener noreferrer"&gt;davidmalloncares&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  sce_linux 2.6.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-03-17 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/sce_linux" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release focuses on support for Ubuntu 24.04. You can use Security Compliance Enforcement (SCE) to enforce the Center for Internet Security (CIS) Benchmark for Ubuntu Linux 24.04, v1.0.0, Server Levels 1 and 2 while also addressing support for Puppet module dependencies.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check the official &lt;a href="https://help.puppet.com/sce/current/linux/scel_relnotes_260.htm" rel="noopener noreferrer"&gt;release notes for sce_linux 2.6.0&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  sqlserver 5.1.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-03-04 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/sqlserver" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Small change this month to ensure permission the variable is set.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;(MODULES-11613) Set permission variable in permission sql EPP &lt;a href="https://github.com/puppetlabs/puppetlabs-sqlserver/pull/500" rel="noopener noreferrer"&gt;#500&lt;/a&gt; (&lt;a href="https://github.com/shubhamshinde360" rel="noopener noreferrer"&gt;shubhamshinde360&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Until Next Time!
&lt;/h2&gt;

&lt;p&gt;That wraps up the March 2026 roundup. If any of the modules overlap with your environment, the linked Forge pages and release notes are worth a closer look.&lt;/p&gt;

&lt;p&gt;Feedback on the series is always useful, especially if there are module families or release-note patterns that deserve more attention in future editions.&lt;/p&gt;

&lt;p&gt;More updates coming next month when the April 2026 releases land.&lt;/p&gt;

</description>
      <category>puppet</category>
    </item>
    <item>
      <title>Puppet Enterprise 2025.10 Resolves Malformed Task and Plan Metadata Failures</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Tue, 31 Mar 2026 18:28:46 +0000</pubDate>
      <link>https://dev.to/puppet/puppet-enterprise-202510-resolves-malformed-task-and-plan-metadata-failures-gp4</link>
      <guid>https://dev.to/puppet/puppet-enterprise-202510-resolves-malformed-task-and-plan-metadata-failures-gp4</guid>
      <description>&lt;p&gt;We’ve released a patch in &lt;strong&gt;Puppet Enterprise 2025.10&lt;/strong&gt; to resolve an issue affecting task and plan metadata handling.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prior to PE 2025.9:&lt;/strong&gt; Malformed task or plan metadata was logged in the &lt;code&gt;bolt-server&lt;/code&gt; log, and the affected task or plan was ignored. Other tasks and plans continued to work as expected.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In PE 2025.9:&lt;/strong&gt; Malformed metadata caused the task and plan listing to fail to load entirely and prevented affected tasks or plans from running. Errors were written to the &lt;code&gt;bolt-server&lt;/code&gt; log.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;With PE 2025.10:&lt;/strong&gt; Task and plans retain the improvements from 2025.9 but will now also load correctly even when malformed metadata is present.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;More:&lt;/strong&gt; 👉  &lt;a href="https://help.puppet.com/pe/current/topics/release-notes-pe-x-10.htm" rel="noopener noreferrer"&gt;Official 2025.10 Release Notes&lt;/a&gt;&lt;/p&gt;

</description>
      <category>puppet</category>
    </item>
    <item>
      <title>Puppet Enterprise 2025.9 and 2023.8.9 are available!</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Wed, 25 Mar 2026 13:24:08 +0000</pubDate>
      <link>https://dev.to/puppet/puppet-enterprise-20259-and-202389-are-available-1kma</link>
      <guid>https://dev.to/puppet/puppet-enterprise-20259-and-202389-are-available-1kma</guid>
      <description>&lt;p&gt;Puppet Enterprise 2025.9 and 2023.8.9 are now available, delivering improved operational visibility, expanded agent platform support, and important security fixes for both the latest and 2023.8 LTS streams.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's new in PE 2025.9?
&lt;/h2&gt;

&lt;p&gt;In Puppet Enterprise 2025.9, this release improves day-to-day operations with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Real-time visibility into Advanced Patching runs directly in the PE console&lt;/li&gt;
&lt;li&gt;Clearer error and warning messages when patch group creation fails, plus retry support from the console or API&lt;/li&gt;
&lt;li&gt;The ability to edit workflows and stop running workflows from the PE console or via API&lt;/li&gt;
&lt;li&gt;Agent support for Debian 13 on amd64 and aarch64&lt;/li&gt;
&lt;li&gt;Multiple CVEs addressed, along with fixes to Advanced Patching behavior and Infra Assistant reliability&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What's new in PE 2025.8.9?
&lt;/h2&gt;

&lt;p&gt;Puppet Enterprise 2023.8.9 adds:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Agent support for Debian 13 on amd64 and aarch64&lt;/li&gt;
&lt;li&gt;Multiple security fixes for customers on the 2023.8 LTS stream&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Release notes
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/pe/current/topics/release-notes-pe-x-9.htm" rel="noopener noreferrer"&gt;2025.9 Release notes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/pe/2023.8/topics/release-notes-pe-x-y-9.htm" rel="noopener noreferrer"&gt;2023.8.9 Release notes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  🔔Lifecycle Reminder
&lt;/h2&gt;

&lt;p&gt;Starting with Puppet Enterprise 2026.0 (expected August 2026), Puppet Enterprise will move from the STS/LTS model to a Latest / Latest-1 support lifecycle.&lt;/p&gt;

&lt;p&gt;Read more: &lt;a href="https://www.puppet.com/products/puppet-enterprise/support-lifecycle" rel="noopener noreferrer"&gt;https://www.puppet.com/products/puppet-enterprise/support-lifecycle&lt;/a&gt;&lt;/p&gt;

</description>
      <category>puppet</category>
    </item>
    <item>
      <title>Ubuntu 24.04 support comes to Puppet SCE for Linux</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Wed, 18 Mar 2026 17:52:28 +0000</pubDate>
      <link>https://dev.to/puppet/ubuntu-2404-support-comes-to-puppet-sce-for-linux-3omb</link>
      <guid>https://dev.to/puppet/ubuntu-2404-support-comes-to-puppet-sce-for-linux-3omb</guid>
      <description>&lt;p&gt;The latest 2.6.0 version of &lt;strong&gt;Puppet Security Compliance Enforcement (SCE) for Linux&lt;/strong&gt; is now available. This release adds support for Ubuntu 24.04 LTS and includes a few operational improvements aimed at making SCE easier to run and troubleshoot in day‑to‑day Puppet environments.&lt;/p&gt;

&lt;p&gt;Below is a quick overview of what’s new.&lt;/p&gt;




&lt;h2&gt;
  
  
  Ubuntu 24.04 LTS support
&lt;/h2&gt;

&lt;p&gt;One of the main additions in this release is support for &lt;strong&gt;Ubuntu 24.04 LTS&lt;/strong&gt;. SCE for Linux now allows you to enforce the &lt;strong&gt;CIS benchmarks v1.0.0&lt;/strong&gt; on Ubuntu 24.04 systems. Both Level 1 and Level 2 CIS profiles are supported.&lt;/p&gt;




&lt;h2&gt;
  
  
  Operational improvements
&lt;/h2&gt;

&lt;p&gt;This release also includes some changes intended to improve visibility and troubleshooting.&lt;/p&gt;

&lt;h3&gt;
  
  
  Logging changes
&lt;/h3&gt;

&lt;p&gt;Most SCE logs are now written to the &lt;strong&gt;Puppet agent run log&lt;/strong&gt;. This means you can get more insight into SCE behavior by running the Puppet agent in debug mode, rather than checking separate log locations.&lt;/p&gt;

&lt;h3&gt;
  
  
  Updated mount information fact
&lt;/h3&gt;

&lt;p&gt;The custom fact &lt;strong&gt;&lt;code&gt;sce_mount_info&lt;/code&gt;&lt;/strong&gt; has been updated to report information about &lt;strong&gt;all mounted file systems&lt;/strong&gt;, providing a more complete view of the system during enforcement.&lt;/p&gt;

&lt;h3&gt;
  
  
  Updated Puppet module dependencies
&lt;/h3&gt;

&lt;p&gt;SCE for Linux now supports the latest versions of &lt;code&gt;puppet/systemd&lt;/code&gt;, &lt;code&gt;puppet/logrotate&lt;/code&gt;, and &lt;code&gt;puppetlabs/augeas_core&lt;/code&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Resolved issues
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Puppet runs no longer fail on systems where the &lt;strong&gt;&lt;code&gt;rsyslog&lt;/code&gt;&lt;/strong&gt; package is not installed. This helps avoid unnecessary failures on minimal or customized Linux images.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Unnecessary &lt;code&gt;PAM_POSITION_ALIASES&lt;/code&gt; warning messages related to the &lt;code&gt;augeasproviders_pam&lt;/code&gt; module should no longer display.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  More details
&lt;/h2&gt;

&lt;p&gt;For the full list of changes and additional details, see the official release notes:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://help.puppet.com/sce/current/linux/scel_relnotes_260.htm" rel="noopener noreferrer"&gt;https://help.puppet.com/sce/current/linux/scel_relnotes_260.htm&lt;/a&gt;&lt;/p&gt;

</description>
      <category>puppet</category>
      <category>security</category>
    </item>
    <item>
      <title>Puppet Agent OS Support EOL: 90 Day Notice</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Fri, 13 Mar 2026 13:13:55 +0000</pubDate>
      <link>https://dev.to/puppet/puppet-agent-os-support-eol-90-day-notice-4k9c</link>
      <guid>https://dev.to/puppet/puppet-agent-os-support-eol-90-day-notice-4k9c</guid>
      <description>&lt;p&gt;ℹ️ &lt;strong&gt;NOTE:&lt;/strong&gt; &lt;em&gt;This notice was &lt;a href="https://groups.google.com/g/puppet-announce/c/7awnfHR0ZEg" rel="noopener noreferrer"&gt;originally posted by the Product Team&lt;/a&gt; on 2026-03-12&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This is a 90-day notice that Puppet Agent support for the following operating system platforms is reaching End of Life (EOL). Support for these platforms will be discontinued in upcoming Puppet releases:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon Linux 2&lt;/li&gt;
&lt;li&gt;Debian 10&lt;/li&gt;
&lt;li&gt;Fedora 40&lt;/li&gt;
&lt;li&gt;Red Hat Enterprise Linux 7&lt;/li&gt;
&lt;li&gt;Ubuntu 18.04&lt;/li&gt;
&lt;li&gt;Ubuntu 20.04&lt;/li&gt;
&lt;li&gt;Windows 10&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After this period, these platforms will no longer receive updates or be included in future puppet-agent releases.&lt;/p&gt;

&lt;p&gt;If you have any questions or concerns regarding this change, please don’t hesitate to reach out.&lt;/p&gt;

</description>
      <category>puppet</category>
    </item>
    <item>
      <title>Puppetlabs Modules Roundup – February 2026</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Thu, 05 Mar 2026 16:51:13 +0000</pubDate>
      <link>https://dev.to/puppet/puppetlabs-modules-roundup-february-2026-2p98</link>
      <guid>https://dev.to/puppet/puppetlabs-modules-roundup-february-2026-2p98</guid>
      <description>&lt;p&gt;Welcome back to the Puppetlabs Modules Roundup! This series is all about keeping you in the loop on what’s new and updated in the Perforce Puppet &lt;code&gt;puppetlabs&lt;/code&gt; modules on the Forge. This month we look back at the latest updates from February 2026.&lt;/p&gt;

&lt;p&gt;If you want a quick look at the latest developments across the Puppet module ecosystem, this is the place to catch up!&lt;/p&gt;

&lt;h2&gt;
  
  
  Highlighted Updates
&lt;/h2&gt;

&lt;h3&gt;
  
  
  SQL Server 2025 and DSC Reporting Fixes
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The latest sqlserver module release now supports SQL Server 2025&lt;/li&gt;
&lt;li&gt;The latest sce_windows module corrects DSC reporting issues.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Continued Deprecation of Puppet 7 in New Releases
&lt;/h3&gt;

&lt;p&gt;A few more modules received updates to have better alignment with Puppet Core and have stopped supporting Puppet 7 in the new releases, in line with changes to other modules from previous months.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Docker&lt;/li&gt;
&lt;li&gt;firewall&lt;/li&gt;
&lt;li&gt;inifile&lt;/li&gt;
&lt;li&gt;sqlserver&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What Updates Happened to Puppetlabs Modules in February 2026?
&lt;/h2&gt;

&lt;p&gt;The following is an alphabetical listing of modules which received updates in February 2026. If a module had multiple versions released the updates are collected together, numbered with the "latest" version available.  &lt;/p&gt;




&lt;h3&gt;
  
  
  docker 10.4.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-02-10 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/docker" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Several updates to support Puppet Core better and updates for APT keyrings:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Now uses puppetlabs-apt for modern APT keyrings on Debian family (by &lt;a href="https://github.com/kenyon" rel="noopener noreferrer"&gt;kenyon&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;APT keyring used to manage GPG key (by &lt;a href="https://github.com/techsk8" rel="noopener noreferrer"&gt;techsk8&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Dependency on &lt;code&gt;cgroupfs-mount&lt;/code&gt; for Debian Trixie has been removed (by &lt;a href="https://github.com/zen-fu" rel="noopener noreferrer"&gt;zen-fu&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Services with restart &lt;code&gt;no&lt;/code&gt; are now ignored in the &lt;code&gt;exists?&lt;/code&gt; method&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Puppet 7 support removed&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Target ruby version updated to 3.1 (2.7 removed)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Changes to better support PDK latest releases&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;CI tests now run against Ubuntu 24.04 (replacing Ubuntu 20.04)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  firewall 8.3.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-02-09 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/firewall" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Several updates to support Puppet Core better and updates for SUSE IPv6:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;IPv6 rule saving command added for SUSE in utility&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Puppet 7 support removed&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Target ruby version updated to 3.1 (2.7 removed)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Changes to better support PDK latest releases&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;CI tests now run against Debian 12 instead of Debian 10 for primary testing&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  influxdb 3.0.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-02-05 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/influxdb" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Small release here to provide an updated GPG key.&lt;/p&gt;




&lt;h3&gt;
  
  
  inifile 6.3.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-02-17 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/inifile" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Several updates to support Puppet Core better and updates for handling empty sections:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Removing the last setting of a section will no longer remove the “empty” section (by &lt;a href="https://github.com/smortex" rel="noopener noreferrer"&gt;smortex&lt;/a&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Puppet 7 support removed&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Target ruby version updated to 3.1 (2.7 removed)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Changes to better support PDK latest releases&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  puppet_agent 4.27.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-02-24 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/puppet_agent/readme" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Debian 13 (Trixie) acceptance tests added for ARM and x86_64&lt;/p&gt;




&lt;h3&gt;
  
  
  pwshlib 2.0.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-02-24 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/pwshlib/readme" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release fixes per-property change event reporting in PE when using DSC resources with custom_insync.&lt;/p&gt;




&lt;h3&gt;
  
  
  sce_windows 2.2.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-02-24 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/sce_windows/readme" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;SCE for Windows now supports the latest versions of the puppetlabs‑pwshlib dependency, including a fix for DSC reporting issues. In addition, resource names are updated to correctly reference SCE instead of the legacy CEM name.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check the official &lt;a href="https://help.puppet.com/sce/current/windows/scew_relnotes_v221.htm" rel="noopener noreferrer"&gt;release notes for Security Compliance Enforcement 2.2.1&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  sqlserver 5.1.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-02-26 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/sqlserver/readme" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Support was added for SQL Server 2025 along with changes to better support Puppet Core.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Support added for SQL Server 2025&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Several changes to match with requirements for Puppet Core&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Puppet 7 support removed&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Target ruby version updated to 3.1 (2.6 removed)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Changes to better support PDK latest releases&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Until Next Time!
&lt;/h2&gt;

&lt;p&gt;That’s a wrap for this roundup! If you want to dive deeper into any of these modules, check out the module documentation &lt;a href="https://forge.puppet.com" rel="noopener noreferrer"&gt;on the Forge&lt;/a&gt; or explore the individual module repos on GitHub for more details.&lt;/p&gt;

&lt;p&gt;Got feedback or ideas for future updates? We’d love to hear from you! Add a comment here or join the conversation in the &lt;a href="https://slack.puppet.com/" rel="noopener noreferrer"&gt;Perforce Community Slack&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Catch you at the next roundup!&lt;/p&gt;

</description>
      <category>puppet</category>
    </item>
  </channel>
</rss>
