<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: puppet</title>
    <description>The latest articles tagged 'puppet' on DEV Community.</description>
    <link>https://dev.to/t/puppet</link>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/tag/puppet"/>
    <language>en</language>
    <item>
      <title>Handling Dirty Frag and Copy Fail with Puppet</title>
      <dc:creator>Tony Green</dc:creator>
      <pubDate>Wed, 13 May 2026 21:00:55 +0000</pubDate>
      <link>https://dev.to/puppet/handling-dirty-frag-and-copy-fail-with-puppet-6ff</link>
      <guid>https://dev.to/puppet/handling-dirty-frag-and-copy-fail-with-puppet-6ff</guid>
      <description>&lt;h2&gt;
  
  
  Do you know which of your Linux servers are vulnerable right now?
&lt;/h2&gt;

&lt;p&gt;Two critical Linux kernel vulnerabilities are being actively exploited. Dirty Frag targets the IP fragment reassembly modules that almost every Linux server has loaded by default. Copy Fail targets the AF_ALG cryptographic subsystem's AEAD interface. Both can allow an attacker to gain escalated local privileges, and both have interim mitigations you can deploy right now, before the kernel patches land.&lt;/p&gt;

&lt;p&gt;The first question every team needs to answer is not "how do we fix it?" but "how many of our systems are actually exposed?" Not tomorrow, after someone runs a scanner. Not next week, when the security team finishes their audit. Right now.&lt;/p&gt;

&lt;p&gt;If you are running Puppet, the answer is already within reach. You just need a fact.&lt;/p&gt;

&lt;h3&gt;
  
  
  Add these to your Puppetfile. That is it.
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight ruby"&gt;&lt;code&gt;&lt;span class="n"&gt;mod&lt;/span&gt; &lt;span class="s1"&gt;'albatrossflavour-dirty_frag'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'1.0.1'&lt;/span&gt;
&lt;span class="n"&gt;mod&lt;/span&gt; &lt;span class="s1"&gt;'albatrossflavour-copy_fail'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'1.0.0'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Each of these open-source modules, that I have published to the Forge, ship a custom structured fact that reports vulnerability exposure on every node. No class to include. No Hiera changes. No manifest edits. Next Puppet run, the data is there.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/albatrossflavour/dirty_frag" rel="noopener noreferrer"&gt;dirty_frag&lt;/a&gt; reports exposure to Dirty Frag (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-43284" rel="noopener noreferrer"&gt;CVE-2026-43284&lt;/a&gt; and &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-43500" rel="noopener noreferrer"&gt;CVE-2026-43500&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/albatrossflavour/copy_fail" rel="noopener noreferrer"&gt;copy_fail&lt;/a&gt; reports exposure to Copy Fail (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31431" rel="noopener noreferrer"&gt;CVE-2026-31431&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  See where you stand
&lt;/h3&gt;

&lt;p&gt;Once deployed, every node reports its exposure state as structured data. Here is what the output looks like.&lt;/p&gt;

&lt;h4&gt;
  
  
  dirty_frag
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"esp4"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"loaded"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"blocked"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"available"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"esp6"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"loaded"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"blocked"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"available"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"rxrpc"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"loaded"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"blocked"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"available"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"vulnerable"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"reboot_required"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  copy_fail
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"algif_aead"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"type"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"builtin"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"loaded"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"active"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"blocked"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"available"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"initcall_blacklisted"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"vulnerable"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"mitigated"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"reboot_required"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Both facts surface the same two summary keys that give you the answers you actually care about. &lt;code&gt;vulnerable&lt;/code&gt; is &lt;code&gt;true&lt;/code&gt; if the exploitable module is active. &lt;code&gt;reboot_required&lt;/code&gt; is &lt;code&gt;true&lt;/code&gt; if you have applied the mitigation but the module is still sitting in kernel memory.&lt;/p&gt;

&lt;p&gt;That &lt;code&gt;reboot_required&lt;/code&gt; flag is the one that catches people. You apply the mitigation, see the block in place, and assume you are safe. But the module is still loaded and exploitable until the machine restarts. The facts make this gap visible.&lt;/p&gt;

&lt;h3&gt;
  
  
  Query your entire fleet in one line
&lt;/h3&gt;

&lt;p&gt;The facts land in PuppetDB like any other structured fact. No extra tooling, no scheduled scans, no agents phoning home to a separate platform. It is just data, maintained automatically every Puppet run.&lt;/p&gt;

&lt;p&gt;Show me every node vulnerable to Dirty Frag:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;puppet query &lt;span class="s1"&gt;'facts[certname, value] { name = "dirty_frag" and value.vulnerable = true }'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Show me every node vulnerable to Copy Fail:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;puppet query &lt;span class="s1"&gt;'facts[certname, value] { name = "copy_fail" and value.vulnerable = true }'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Show me nodes where the Dirty Frag block is applied but a reboot is still needed:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;puppet query &lt;span class="s1"&gt;'facts[certname, value] { name = "dirty_frag" and value.reboot_required = true }'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Show me nodes where &lt;code&gt;algif_aead&lt;/code&gt; is built into the kernel (the harder mitigation path):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;puppet query &lt;span class="s1"&gt;'facts[certname, value] { name = "copy_fail" and value.algif_aead.type = "builtin" }'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This is the bit that makes Puppet's model shine. You are not running a point-in-time scan. The data updates every run, automatically. As nodes get patched, rebooted, or have blocks applied, the numbers go down on their own. You can watch your exposure shrink in real time without maintaining anything.&lt;/p&gt;

&lt;h2&gt;
  
  
  What makes a system vulnerable?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Dirty Frag
&lt;/h3&gt;

&lt;p&gt;The Dirty Frag vulnerability sits in three Linux kernel modules used for IP fragment reassembly: &lt;code&gt;esp4&lt;/code&gt;, &lt;code&gt;esp6&lt;/code&gt;, and &lt;code&gt;rxrpc&lt;/code&gt;. If any of those modules is loaded, the system is exposed. The two CVEs chain together to allow privilege escalation and remote code execution through these modules.&lt;/p&gt;

&lt;p&gt;These modules are almost universally loaded on production Linux servers. If you are running iptables, firewalld, Docker, Kubernetes, or any network policy enforcement, odds are at least &lt;code&gt;esp4&lt;/code&gt; is there. This one affects nearly everything.&lt;/p&gt;

&lt;h3&gt;
  
  
  Copy Fail
&lt;/h3&gt;

&lt;p&gt;The vulnerability is a use-after-free in the AF_ALG subsystem's AEAD interface (&lt;code&gt;algif_aead&lt;/code&gt;). An unprivileged user can trigger it by opening an AF_ALG socket and exercising the AEAD code path in a specific way.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;algif_aead&lt;/code&gt; is present on most stock kernels but rarely used for legitimate work. The main consumers are some VPN implementations that offload crypto to the kernel, &lt;code&gt;kcapi-tools&lt;/code&gt;, and certain FIPS-certified configurations. On systems where the module is loadable, an attacker can force-load it themselves just by opening the socket. On systems where it is built-in, it may already be active regardless of use.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why module presence, not kernel version?
&lt;/h3&gt;

&lt;p&gt;The real fix for both vulnerabilities is a kernel patch, but every distribution ships their own patched versions on their own schedules with their own version numbers. Tracking "which kernel version is safe" across Red Hat, Ubuntu, SUSE, Amazon Linux, and the rest is a moving target that goes stale the day you publish it. Module presence is the reliable signal: if the vulnerable module is active, you are exposed, regardless of kernel version.&lt;/p&gt;

&lt;p&gt;This is also what the vendor advisories recommend. Red Hat's &lt;a href="https://access.redhat.com/security/vulnerabilities/RHSB-2026-003" rel="noopener noreferrer"&gt;RHSB-2026-003&lt;/a&gt; and the equivalent Ubuntu and SUSE bulletins all point to the same interim mitigation: prevent the modules from loading using &lt;code&gt;install /bin/false&lt;/code&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  When you want Puppet to enforce the block
&lt;/h2&gt;

&lt;p&gt;The facts give you visibility. If you also want Puppet to actively prevent the modules from loading, include the classes.&lt;/p&gt;

&lt;h3&gt;
  
  
  Dirty Frag
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight puppet"&gt;&lt;code&gt;&lt;span class="k"&gt;class&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="s1"&gt;'dirty_frag'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
  &lt;span class="py"&gt;mitigate_esp4&lt;/span&gt;  &lt;span class="p"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="py"&gt;mitigate_esp6&lt;/span&gt;  &lt;span class="p"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="py"&gt;mitigate_rxrpc&lt;/span&gt; &lt;span class="p"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Copy Fail
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight puppet"&gt;&lt;code&gt;&lt;span class="k"&gt;class&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="s1"&gt;'copy_fail'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
  &lt;span class="py"&gt;mitigate_algif_aead&lt;/span&gt; &lt;span class="p"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Both classes write &lt;code&gt;install &amp;lt;module&amp;gt; /bin/false&lt;/code&gt; directives to modprobe.d configuration files. From that point on, any attempt to load those modules (whether by autoloading, a dependency chain, or an explicit &lt;code&gt;modprobe&lt;/code&gt;) will run &lt;code&gt;/bin/false&lt;/code&gt; instead of loading the actual module code. The module simply cannot get into the kernel.&lt;/p&gt;

&lt;p&gt;This is worth understanding because it is stronger than the kernel's &lt;code&gt;blacklist&lt;/code&gt; directive. A &lt;code&gt;blacklist&lt;/code&gt; entry only prevents autoloading, it does not stop explicit &lt;code&gt;modprobe&lt;/code&gt; calls. &lt;code&gt;install /bin/false&lt;/code&gt; intercepts the load at every entry point.&lt;/p&gt;

&lt;p&gt;If the module was already loaded before the block was applied, it stays in memory until the next reboot. The &lt;code&gt;reboot_required&lt;/code&gt; flag in both facts makes this gap visible.&lt;/p&gt;

&lt;p&gt;This is declarative and safe. Puppet manages the config file, ensures the desired state on every run, and the classes are entirely opt-in. If your patching process handles the fix, or you are rolling out kernel updates, you might not need them at all. The facts alone give you the visibility to track progress.&lt;/p&gt;

&lt;p&gt;Both modules ship with Hiera data defaults, so if you prefer to drive parameters through your hierarchy, see each module's README for examples.&lt;/p&gt;

&lt;h2&gt;
  
  
  The built-in module problem (Copy Fail only)
&lt;/h2&gt;

&lt;p&gt;There is a wrinkle with Copy Fail that Dirty Frag does not have. On most stock distribution kernels, &lt;code&gt;algif_aead&lt;/code&gt; is compiled directly into the kernel image as a built-in module. It is not a loadable &lt;code&gt;.ko&lt;/code&gt; file, so modprobe.d has no effect on it.&lt;/p&gt;

&lt;p&gt;For built-in modules, the mitigation is &lt;code&gt;initcall_blacklist=algif_aead_init&lt;/code&gt; on the kernel command line (via GRUB configuration). This prevents the module's init function from running on boot. It requires a reboot to take effect.&lt;/p&gt;

&lt;p&gt;The copy_fail module does not automate GRUB changes. Getting boot configuration wrong can render a system unbootable. You can manage GRUB with Puppet (using &lt;code&gt;file_line&lt;/code&gt; or &lt;code&gt;augeas&lt;/code&gt;), but that is out of scope for this module. The fact will report &lt;code&gt;initcall_blacklisted: true&lt;/code&gt; once the parameter is in place, and &lt;code&gt;reboot_required: true&lt;/code&gt; until the reboot completes.&lt;/p&gt;

&lt;p&gt;The &lt;code&gt;type&lt;/code&gt; field in the fact output tells you which mitigation path applies to each node:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;builtin&lt;/code&gt;&lt;/strong&gt;: needs &lt;code&gt;initcall_blacklist&lt;/code&gt;, modprobe.d has no effect&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;loadable&lt;/code&gt;&lt;/strong&gt;: the class and modprobe.d approach works&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;absent&lt;/code&gt;&lt;/strong&gt;: not vulnerable, nothing to do&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Force-unload a module right now (with care)
&lt;/h2&gt;

&lt;p&gt;Sometimes you cannot wait for a reboot. Both modules ship a Bolt task that removes the module from the running kernel immediately:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;bolt task run dirty_frag::unload &lt;span class="nv"&gt;module&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;esp4 &lt;span class="nt"&gt;--targets&lt;/span&gt; servers
bolt task run copy_fail::unload &lt;span class="nv"&gt;module&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;algif_aead &lt;span class="nt"&gt;--targets&lt;/span&gt; servers
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;A word of caution. Unloading a kernel module is not the same as flipping a config switch. If the module is actively in use (for example, &lt;code&gt;esp4&lt;/code&gt; underpins IPsec tunnels, &lt;code&gt;esp6&lt;/code&gt; handles IPv6 ESP, and &lt;code&gt;rxrpc&lt;/code&gt; is used by AFS), pulling it out from under a running service can drop connections, crash VPN tunnels, or cause dependent subsystems to fail. This is exactly why the Puppet classes do not do it automatically. The classes apply the block and wait for a reboot. The Bolt tasks give you the lever to pull when you have decided the tradeoff is worth it.&lt;/p&gt;

&lt;p&gt;Each task validates the module name, checks it is actually loaded, and gives you structured output. If the module is in use by another kernel subsystem and cannot be unloaded, the task will tell you, and you are back to "apply the block and schedule a reboot".&lt;/p&gt;

&lt;p&gt;Test on non-production nodes first. Know what the module is doing on that system before you yank it. If in doubt, the block-and-reboot path is always the safer option.&lt;/p&gt;

&lt;p&gt;The unload task only works for loadable modules. Built-in modules cannot be unloaded.&lt;/p&gt;

&lt;h2&gt;
  
  
  The workflow
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Add the modules to your Puppetfile.&lt;/strong&gt; Deploy. Done. Every node now reports its exposure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Query PuppetDB&lt;/strong&gt; to see where you stand. One-liner, fleet-wide answer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Decide on mitigation.&lt;/strong&gt; Apply the classes via Hiera for persistent blocking.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Use Tasks&lt;/strong&gt; to immediately unload modules on critical systems that cannot wait.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Watch the numbers drop.&lt;/strong&gt; The facts update every run. No manual tracking, no spreadsheets, no scheduled scans.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The whole approach is declarative. You tell Puppet what state you want, and it converges towards it. The facts keep reporting reality. The gap between the two is your exposure, and it is always visible.&lt;/p&gt;

&lt;h2&gt;
  
  
  Get started
&lt;/h2&gt;

&lt;p&gt;Both of these open source modules are available on GitHub:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/albatrossflavour/dirty_frag" rel="noopener noreferrer"&gt;albatrossflavour/dirty_frag&lt;/a&gt; (Puppet 7/8, no dependencies)&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/albatrossflavour/copy_fail" rel="noopener noreferrer"&gt;albatrossflavour/copy_fail&lt;/a&gt; (Puppet 7/8, no dependencies)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Both modules have been built for RedHat, CentOS, Ubuntu, Debian, Amazon Linux, and SLES.&lt;/p&gt;

</description>
      <category>puppet</category>
      <category>vulnerabilities</category>
      <category>automation</category>
      <category>devops</category>
    </item>
    <item>
      <title>Puppetlabs Modules Roundup – April 2026</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Thu, 07 May 2026 16:31:43 +0000</pubDate>
      <link>https://dev.to/puppet/puppetlabs-modules-roundup-april-2026-358</link>
      <guid>https://dev.to/puppet/puppetlabs-modules-roundup-april-2026-358</guid>
      <description>&lt;p&gt;In April 2026, the Puppetlabs module lineup saw 8 Puppetlabs module releases, with the most notable updates collected here for a quick review.&lt;/p&gt;

&lt;p&gt;The overall pattern in these releases was event forwarding enhancements and security and compliance platform updates, which makes this month’s roundup a useful quick scan for teams planning upgrades or routine maintenance.&lt;/p&gt;

&lt;h2&gt;
  
  
  Highlighted Updates
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Event Forwarding Enhancements
&lt;/h3&gt;

&lt;p&gt;Coordinated updates to Splunk HEC and PE Event Forwarding modules add support for orchestrator_plan event type, improving visibility into Puppet orchestrator activities with enhanced filtering and integration capabilities.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Affected modules: splunk_hec, pe_event_forwarding.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Security and Compliance Platform Updates
&lt;/h3&gt;

&lt;p&gt;Comply and Comply Admin modules received coordinated releases, advancing the Security Compliance Management platform capabilities.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Affected modules: comply, complyadm.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What Updates Happened to Puppetlabs Modules in April 2026?
&lt;/h2&gt;

&lt;p&gt;The following is an alphabetical listing of modules which received updates in April 2026. If a module had multiple versions released, the updates are collected together, numbered with the "latest" version available.&lt;/p&gt;




&lt;h3&gt;
  
  
  cd4peadm 5.15.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-28 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/cd4peadm" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;A few highlights from this release:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added a Hiera configuration option, external_webhook_url, that allows you to set the webhook URL that Continuous Delivery sends to your VCS provider. This is useful if you are using a proxy between your VCS and CD.&lt;/li&gt;
&lt;li&gt;Added an idle timeout to the CD console that logs users out after 30 minutes. Configure this using the Hiera option, web_session_idle_timeout_mins.&lt;/li&gt;
&lt;li&gt;Added CSRF protection to the DeleteUserAccount and SetSuperUser endpoints by restricting them to POST requests and validating CSRF tokens issued at login and expired on logout.&lt;/li&gt;
&lt;li&gt;20 CVEs addressed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check the official &lt;a href="https://help.puppet.com/cdpe/current/Content/UserGuide/CDPE/ReleaseNotes/cd_release_notes.htm#Version5150" rel="noopener noreferrer"&gt;release notes for cd4peadm 5.15.0&lt;/a&gt; for the full details.&lt;/p&gt;




&lt;h3&gt;
  
  
  comply 3.7.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-28 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/comply" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;A few highlights from this release:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fixed a stale image which resulted in checksum and benchmark issues upon install.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVE-2026-33815, CVE-2026-33816.&lt;/strong&gt; Updated gorm.io to v5.9.2 to address these vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check the official &lt;a href="https://help.puppet.com/scm/current/Content/UserGuide/SCM/Release_notes/release_notes.htm#SecurityComplianceManagement371" rel="noopener noreferrer"&gt;release notes for comply 3.7.1&lt;/a&gt; for the full details.&lt;/p&gt;




&lt;h3&gt;
  
  
  complyadm 3.7.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-28 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/complyadm" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;A few highlights from this release:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fixed a stale image which resulted in checksum and benchmark issues upon install.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVE-2026-33815, CVE-2026-33816.&lt;/strong&gt; Updated gorm.io to v5.9.2 to address these vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check the official &lt;a href="https://help.puppet.com/scm/current/Content/UserGuide/SCM/Release_notes/release_notes.htm#SecurityComplianceManagement371" rel="noopener noreferrer"&gt;release notes for complyadm 3.7.1&lt;/a&gt; for the full details.&lt;/p&gt;




&lt;h3&gt;
  
  
  lvm 4.0.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-30 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/lvm" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release addresses two bug fixes. A race condition where &lt;code&gt;lvcreate&lt;/code&gt; returns before udev finishes processing device-add events could cause a subsequent &lt;code&gt;filesystem&lt;/code&gt; resource targeting the same logical volume to fail with "device or resource busy" — the fix calls &lt;code&gt;udevadm settle&lt;/code&gt; after a successful &lt;code&gt;lvcreate&lt;/code&gt;. The release also corrects an AIX-specific issue where boolean filesystem parameters such as &lt;code&gt;isnapshot&lt;/code&gt; were passed to &lt;code&gt;crfs&lt;/code&gt; as &lt;code&gt;true&lt;/code&gt;/&lt;code&gt;false&lt;/code&gt; instead of the required &lt;code&gt;yes&lt;/code&gt;/&lt;code&gt;no&lt;/code&gt;, causing the command to reject them outright.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;(MODULES-11756) Wait for udev to settle after lvcreate &lt;a href="https://github.com/puppetlabs/puppetlabs-lvm/pull/380" rel="noopener noreferrer"&gt;#380&lt;/a&gt; (&lt;a href="https://github.com/imaqsood" rel="noopener noreferrer"&gt;imaqsood&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;(MODULES-11788) Pass converted boolean parameter &lt;a href="https://github.com/puppetlabs/puppetlabs-lvm/pull/379" rel="noopener noreferrer"&gt;#379&lt;/a&gt; (&lt;a href="https://github.com/joshcooper" rel="noopener noreferrer"&gt;joshcooper&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  pe_event_forwarding 2.3.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-09 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/pe_event_forwarding" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release adds orchestrator plan-job collection controls and fixes duplicate forwarding behavior in job collection.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added plan job data collection from the &lt;code&gt;orchestrator/v1/plan_jobs&lt;/code&gt; API, with progress tracked in a dedicated &lt;code&gt;pe_event_forwarding_plan_index.yaml&lt;/code&gt; state file.&lt;/li&gt;
&lt;li&gt;Added the &lt;code&gt;pe_event_forwarding::skip_plans&lt;/code&gt; parameter to disable plan job collection when needed.&lt;/li&gt;
&lt;li&gt;Fixed &lt;code&gt;get_jobs&lt;/code&gt; behavior where the first page could return more records than newly available jobs, which could cause duplicate forwarded data.&lt;/li&gt;
&lt;li&gt;Source attribution: &lt;a href="https://github.com/puppetlabs/puppetlabs-pe_event_forwarding/pull/137" rel="noopener noreferrer"&gt;(PIE-1683) Add support for collecting plan data #137&lt;/a&gt; (&lt;a href="https://github.com/coreymbe" rel="noopener noreferrer"&gt;coreymbe&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  peadm 3.37.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-01 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/peadm" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release is a small change to add support for Puppet Enterprise 2025.10.0.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;(PE-43654) Add support for PE 2025.10.0 &lt;a href="https://github.com/puppetlabs/puppetlabs-peadm/pull/661" rel="noopener noreferrer"&gt;#661&lt;/a&gt; (&lt;a href="https://github.com/davidmalloncares" rel="noopener noreferrer"&gt;davidmalloncares&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  sce_linux 2.6.1
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-06 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/sce_linux" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;A few highlights from this release:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Error message:&lt;/strong&gt; comparison of NilClass with  failed. Some users saw this error message and experienced catalog compilation failures when attempting to manage mounted file system options with SCE for Linux. The issue was caused by /etc/fstab files that did not have at least one comment line or blank line. The internal parser was updated to avoid the issue and help prevent compilation errors.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;sce_mount_info fact does not resolve to a value.&lt;/strong&gt; This issue is related to the Linux findmnt command, which is used to list all mounted file systems. The command, which supports different options depending on operating system, was failing on specific systems, resulting in a failure of the sce_mount_info fact. Now, if the findmnt command fails, warnings will be logged, and the /etc/fstab file will be parsed directly for mount information.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Error messages related to rsyslog.&lt;/strong&gt; Because the version of the rsyslog logging service used on Red Hat Enterprise Linux (RHEL) 9 differs from earlier versions, users of RHEL 9 sometimes see error messages like this: imjournal: open() failed for path: '/var/lib/rsyslog/imjournal.state.tmp': Operation not permitted These messages indicate a failure to load the rsyslog imjournal module. To accommodate the changes in rsyslog and avoid this error, the module loading syntax was updated in SCE for Linux.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check the official &lt;a href="https://help.puppet.com/sce/current/linux/scel_relnotes_261.htm" rel="noopener noreferrer"&gt;release notes for sce_linux 2.6.1&lt;/a&gt; for the full details.&lt;/p&gt;




&lt;h3&gt;
  
  
  splunk_hec 2.2.0
&lt;/h3&gt;

&lt;p&gt;📅 Latest release: 2026-04-09 (🌐 &lt;a href="https://forge.puppet.com/modules/puppetlabs/splunk_hec" rel="noopener noreferrer"&gt;View on the Forge&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This release focuses on support for the &lt;code&gt;orchestrator_plan&lt;/code&gt; event type from the &lt;strong&gt;puppetlabs-pe_event_forwarding&lt;/strong&gt; module while also addressing &lt;code&gt;orchestrator_plan&lt;/code&gt; to index mappings in util_splunk_hec template.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added support for the &lt;code&gt;orchestrator_plan&lt;/code&gt; event type from the &lt;strong&gt;puppetlabs-pe_event_forwarding&lt;/strong&gt; module.&lt;/li&gt;
&lt;li&gt;Added &lt;code&gt;orchestrator_plan&lt;/code&gt; to index mappings in util_splunk_hec template.&lt;/li&gt;
&lt;li&gt;New PE Event Forwarding filter &lt;code&gt;orchestrator_plan_data_filter&lt;/code&gt; to allow filtering orchestrator plan event payloads.&lt;/li&gt;
&lt;li&gt;Module dependency updated to ensure &lt;code&gt;pe_event_forwarding&lt;/code&gt; v2.3.0+ is installed.&lt;/li&gt;
&lt;li&gt;Removed support for Debian platform and EOL operating system versions.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Until Next Time!
&lt;/h2&gt;

&lt;p&gt;That’s the full pass through the 8 Puppetlabs module releases from April 2026. The Forge links above are the quickest path to the underlying release details.&lt;/p&gt;

&lt;p&gt;If there is a part of the Puppetlabs ecosystem that would benefit from more context in future roundups, that feedback is worth sending along.&lt;/p&gt;

&lt;p&gt;Catch you in the next roundup for May 2026.&lt;/p&gt;

</description>
      <category>puppet</category>
    </item>
    <item>
      <title>Why GRC Should Matter to Every Developer, Not Just Compliance Teams</title>
      <dc:creator>neviarrawlinson</dc:creator>
      <pubDate>Wed, 06 May 2026 13:53:13 +0000</pubDate>
      <link>https://dev.to/neviarrawl_44fe25f50/why-grc-should-matter-to-every-developer-not-just-compliance-teams-24am</link>
      <guid>https://dev.to/neviarrawl_44fe25f50/why-grc-should-matter-to-every-developer-not-just-compliance-teams-24am</guid>
      <description>&lt;h2&gt;
  
  
  Why GRC Should Matter to Every Developer, Not Just Compliance Teams
&lt;/h2&gt;

&lt;p&gt;When most people hear "GRC" — &lt;a href="https://www.scrut.io/post/how-governance-aces-compliance-and-risk-management-in-the-grc-program" rel="noopener noreferrer"&gt;governance, risk management, and compliance&lt;/a&gt; — they think of legal teams, auditors, or cybersecurity experts. Rarely do they think of developers.&lt;/p&gt;

&lt;p&gt;But the truth is, GRC affects everyone who builds, ships, and maintains technology.&lt;/p&gt;

&lt;p&gt;Whether you realize it or not, the choices you make in your code, architecture, or workflows impact your organization's ability to stay secure, compliant, and trusted.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is GRC Anyway?
&lt;/h2&gt;

&lt;p&gt;GRC stands for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Governance:&lt;/strong&gt; Making sure decisions align with company goals and policies.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk Management:&lt;/strong&gt; Identifying and reducing potential threats to systems, data, and users.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Compliance:&lt;/strong&gt; Following the laws, regulations, and industry standards that apply to your work.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;At its core, GRC is about &lt;strong&gt;protecting the business and its customers while enabling growth.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;And guess who sits at the heart of building that growth? Developers and tech teams.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Developers Should Care
&lt;/h2&gt;

&lt;p&gt;Here’s why GRC should be part of every developer’s mindset:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Security starts in the code:&lt;/strong&gt; Secure coding practices directly affect risk management.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Documentation matters:&lt;/strong&gt; Process documentation makes audits and compliance checks smoother — and helps your team scale faster.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tech debt can become risk debt:&lt;/strong&gt; Skipping best practices today can create serious governance and compliance issues tomorrow.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Customers expect trust:&lt;/strong&gt; Data breaches and compliance failures destroy trust. Good GRC practices protect it.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How Developers Can Contribute to GRC
&lt;/h2&gt;

&lt;p&gt;You don't need to become a compliance officer overnight.&lt;/p&gt;

&lt;p&gt;Simple steps make a big difference:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Follow secure coding guidelines (like OWASP Top 10).&lt;/li&gt;
&lt;li&gt;Document your APIs, services, and system behaviors clearly.&lt;/li&gt;
&lt;li&gt;Keep dependencies up-to-date and monitor for vulnerabilities.&lt;/li&gt;
&lt;li&gt;Understand the compliance requirements that apply to your industry (HIPAA, GDPR, SOC 2, etc.).&lt;/li&gt;
&lt;li&gt;Speak up if you see a potential risk or issue — risk management is everyone's job.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;GRC is not just a checkbox for the legal team.&lt;/p&gt;

&lt;p&gt;It’s a shared responsibility — and one that smart developers embrace.&lt;/p&gt;

&lt;p&gt;When you understand governance, risk, and compliance, you become a more valuable teammate, a better builder, and a stronger protector of your organization’s future.&lt;/p&gt;

&lt;p&gt;Tech doesn’t exist in a vacuum. Neither does trust.&lt;/p&gt;

&lt;p&gt;Let’s build better, safer, more resilient systems — together.&lt;/p&gt;

</description>
      <category>grc</category>
      <category>infosec</category>
      <category>security</category>
      <category>puppet</category>
    </item>
    <item>
      <title>Puppet for System Administrators: A Comprehensive Guide</title>
      <dc:creator>Pranay Trivedi</dc:creator>
      <pubDate>Sat, 02 May 2026 06:30:14 +0000</pubDate>
      <link>https://dev.to/koenig_solutions/puppet-for-system-administrators-a-comprehensive-guide-58f2</link>
      <guid>https://dev.to/koenig_solutions/puppet-for-system-administrators-a-comprehensive-guide-58f2</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;In the ever-evolving world of IT, effective configuration management is vital for maintaining system integrity and optimizing workflow. &lt;strong&gt;Puppet&lt;/strong&gt; stands as a powerful automation tool designed specifically for system administrators. It empowers them to manage infrastructure as code, ensuring consistency, reliability, and reduced manual effort.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Puppet?
&lt;/h2&gt;

&lt;p&gt;Puppet is an open-source software configuration management tool that allows you to define the state of your infrastructure. It enables automation of system administration tasks across a network of devices. Here are key features of Puppet:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Declarative Language:&lt;/strong&gt; Puppet uses a simple, declarative language to define system states.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Resource Abstraction:&lt;/strong&gt; You can manage multiple resources like files, packages, and services without worrying about underlying system specifics.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Idempotency:&lt;/strong&gt; Puppet ensures that no matter how many times you apply a configuration, the final state remains unchanged.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Why Use Puppet?
&lt;/h2&gt;

&lt;p&gt;For system administrators, Puppet offers several compelling benefits:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Efficiency:&lt;/strong&gt; Automate repetitive tasks to save time.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Consistency:&lt;/strong&gt; Ensure uniform configurations across different systems.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scalability:&lt;/strong&gt; Easily manage large numbers of servers across diverse environments.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version Control:&lt;/strong&gt; Puppet allows tracking of changes, akin to software development, facilitating better rollback capabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Getting Started with Puppet
&lt;/h2&gt;

&lt;p&gt;Before diving deeper into Puppet's capabilities, here are some &lt;strong&gt;practical tips&lt;/strong&gt; for getting started:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Install Puppet:&lt;/strong&gt; Start by installing Puppet on your primary server, known as the Puppet Master. Nodes that will be managed can connect to this Master.

&lt;ul&gt;
&lt;li&gt;Use package managers like APT or YUM for Linux distributions.&lt;/li&gt;
&lt;li&gt;For Windows, enable using the MSI installer.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Create a Manifest:&lt;/strong&gt; A manifest is a file where you define the resources. Begin with a simple one:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;file { '/tmp/example.txt':&lt;br&gt;
     ensure =&amp;gt; present,&lt;br&gt;
     content =&amp;gt; 'Hello, Puppet!',&lt;br&gt;
   }&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Test Your Configuration:&lt;/strong&gt; Use the agent on the client machines to test your Manifest to ensure it works as expected.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Utilize the Puppet Forge:&lt;/strong&gt; Access a repository of reusable modules and codes that can help you implement solutions faster.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Puppet Architecture
&lt;/h2&gt;

&lt;p&gt;Understanding Puppet’s architecture is crucial for effective management:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Puppet Master:&lt;/strong&gt; The central server that compiles configurations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Puppet Agent:&lt;/strong&gt; The client installed on nodes that communicates with the Puppet Master to fetch configurations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Catalog:&lt;/strong&gt; A document containing the desired state of a node, compiled by the Puppet Master.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Resource Types:&lt;/strong&gt; Define various system elements such as packages, services, or files.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Essential Puppet Commands
&lt;/h2&gt;

&lt;p&gt;Here are several commands every System Administrator should know:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;puppet agent -t&lt;/code&gt;:&lt;/strong&gt; To test the agent and apply configurations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;puppet status&lt;/code&gt;:&lt;/strong&gt; To check the current status of agents.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;puppet resource&lt;/code&gt;:&lt;/strong&gt; To query the current state of a resource.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Advanced Puppet Features
&lt;/h2&gt;

&lt;p&gt;Once you grasp the basics, consider exploring advanced features to enhance your Puppet skills:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Hiera Configuration:&lt;/strong&gt; Use Hiera for data separation and to manage environment-specific variables effectively.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Puppet Modules:&lt;/strong&gt; Organize shared code in modules to make your manifests cleaner and reusable.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Environment Management:&lt;/strong&gt; Separate code into different environments to safely test changes before applying them in production.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Continuous Learning: Puppet Certifications
&lt;/h2&gt;

&lt;p&gt;To deepen your Puppet knowledge, consider investing in training or certification. Platforms such as &lt;a href="https://www.koenig-solutions.com/puppet-certification-training?utm_source=devto&amp;amp;utm_medium=backlink&amp;amp;utm_campaign=web20-publisher" rel="noopener noreferrer"&gt;Puppet for System Administrators&lt;/a&gt; provide structured learning paths and official recognition of your skills. This can enhance your career prospects and solidify your expertise.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Puppet is an invaluable tool for system administrators looking to streamline their workflows and improve system management. By harnessing Puppet’s capabilities, you can automate tasks, enforce configurations, and ultimately provide a more reliable IT service. Start small, practice regularly, and continuously seek to learn more as technology evolves.&lt;/p&gt;

</description>
      <category>puppet</category>
      <category>systemadministration</category>
      <category>configurationmanagement</category>
    </item>
    <item>
      <title>Puppet Continuous Delivery 5.15.0 is now available</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Wed, 29 Apr 2026 16:20:25 +0000</pubDate>
      <link>https://dev.to/puppet/puppet-continuous-delivery-5150-is-now-available-5990</link>
      <guid>https://dev.to/puppet/puppet-continuous-delivery-5150-is-now-available-5990</guid>
      <description>&lt;p&gt;Puppet Continuous Delivery (CD) &lt;strong&gt;version 5.15.0&lt;/strong&gt; is now available, with updates focused on stability, security, and day‑to‑day usability for teams running Puppet automation pipelines at scale.&lt;/p&gt;

&lt;p&gt;If you’re already on CD 5.x, this is a straightforward upgrade that continues the work of refining the platform while keeping it aligned with current Puppet Enterprise releases and supported tooling.&lt;/p&gt;

&lt;p&gt;The detailed release notes are linked below, but here’s a quick breakdown of what this release delivers and why you may want to upgrade.&lt;/p&gt;

&lt;h2&gt;
  
  
  What’s included in CD 5.15.0
&lt;/h2&gt;

&lt;p&gt;CD 5.15.0 delivers targeted updates across webhook configuration, Pipelines as Code, Impact Analysis, VCS integrations, and platform security. The changes below focus on specific features and integrations rather than broad platform behavior.&lt;/p&gt;

&lt;h3&gt;
  
  
  Webhooks, sessions, and configuration
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Added a new Hiera configuration option, &lt;code&gt;external_webhook_url&lt;/code&gt;, which allows you to explicitly set the webhook URL that Continuous Delivery sends to your VCS provider. This is intended for deployments where CD is running behind a proxy.&lt;/li&gt;
&lt;li&gt;Added an idle session timeout to the CD console. Users are logged out after 30 minutes of inactivity by default, configurable using the &lt;code&gt;web_session_idle_timeout_mins&lt;/code&gt; Hiera option.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Pipelines as Code and Impact Analysis
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Added the &lt;code&gt;skip_empty_catalogs&lt;/code&gt; parameter to the Impact Analysis settings in the Pipelines as Code schema. When enabled, nodes with no catalog resources in PuppetDB are excluded from Impact Analysis results.&lt;/li&gt;
&lt;li&gt;Fixed an issue where the browser would stop polling for Impact Analysis results when an IA run finished or when navigating away from the IA details view.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  VCS integrations (Azure DevOps and GitLab)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Updated the &lt;strong&gt;Pipeline Summary&lt;/strong&gt; view so the &lt;code&gt;by&lt;/code&gt; field now displays the initiating user’s &lt;strong&gt;display name&lt;/strong&gt; for Azure DevOps pipelines, instead of the user ID.&lt;/li&gt;
&lt;li&gt;Changed how Continuous Delivery sends commit status updates to &lt;strong&gt;GitLab&lt;/strong&gt;. When native GitLab pipelines are present, all CD commit status updates are now attached to the same branch pipeline, avoiding fragmented status reporting.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Data visibility and usability fixes
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Fixed an issue where &lt;code&gt;package_updates&lt;/code&gt; for &lt;code&gt;pe_patch&lt;/code&gt; data did not appear in the fact picker. The query service was updated so this data now displays correctly.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Security and authorization hardening
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Added CSRF protection to the &lt;code&gt;DeleteUserAccount&lt;/code&gt; and &lt;code&gt;SetSuperUser&lt;/code&gt; endpoints by restricting them to POST requests and validating CSRF tokens issued at login and expired on logout.&lt;/li&gt;
&lt;li&gt;Fixed an issue where any authenticated user could enumerate user accounts and email addresses. Access to the &lt;code&gt;GET /v1/users&lt;/code&gt; endpoint is now properly restricted to root and superusers.&lt;/li&gt;
&lt;li&gt;Fixed an authorization bypass on the GraphQL &lt;code&gt;/query&lt;/code&gt; endpoint where permission checks could be skipped when using workspace variables or omitting the &lt;code&gt;id&lt;/code&gt; field. Authorization is now enforced consistently.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Platform and runtime updates
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Added &lt;strong&gt;Amazon Linux 2023&lt;/strong&gt; as a supported platform for Docker‑based installs.&lt;/li&gt;
&lt;li&gt;Updated the Postgres base image to &lt;code&gt;postgres:17-trixie&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Security dependency updates
&lt;/h3&gt;

&lt;p&gt;This release includes dependency updates to address reported vulnerabilities, including updates to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;lodash&lt;/li&gt;
&lt;li&gt;diffjs&lt;/li&gt;
&lt;li&gt;plexus-utils&lt;/li&gt;
&lt;li&gt;glibc&lt;/li&gt;
&lt;li&gt;undici&lt;/li&gt;
&lt;li&gt;jackson&lt;/li&gt;
&lt;li&gt;Jetty (updated to version 12)&lt;/li&gt;
&lt;li&gt;golang.org/x/crypto&lt;/li&gt;
&lt;li&gt;quartz&lt;/li&gt;
&lt;li&gt;logrus&lt;/li&gt;
&lt;li&gt;log4j2&lt;/li&gt;
&lt;li&gt;bouncy-castle&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Refer to &lt;a href="https://help.puppet.com/cdpe/current/Content/UserGuide/CDPE/ReleaseNotes/cd_release_notes.htm#Version5150" rel="noopener noreferrer"&gt;the release notes&lt;/a&gt; for the full list of CVEs addressed in this release.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why this release matters
&lt;/h2&gt;

&lt;p&gt;For most users, CD sits in the middle of multiple systems: source control, CI tooling, Puppet Enterprise, and infrastructure targets. Small issues can quickly turn into pipeline friction.&lt;/p&gt;

&lt;p&gt;CD 5.15.0 continues the effort to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reduce pipeline noise caused by edge‑case failures&lt;/li&gt;
&lt;li&gt;Improve the quality of feedback when something goes wrong&lt;/li&gt;
&lt;li&gt;Keep security posture current without forcing disruptive changes&lt;/li&gt;
&lt;li&gt;Make upgrades between minor versions low‑risk&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re standardizing on CD 5.x, staying current helps ensure you’re getting fixes before they turn into operational problems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Installation and upgrade notes
&lt;/h2&gt;

&lt;p&gt;If you’re new to Puppet Continuous Delivery, start with the official install documentation:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/cdpe/current/Content/UserGuide/CDPE/Installation/install_set_up.htm" rel="noopener noreferrer"&gt;Puppet CD installation docs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re already running CD 5.x, upgrading to 5.15.0 should follow the standard upgrade path described in the documentation:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/cdpe/current/Content/UserGuide/CDPE/Upgrade/upgrading.htm" rel="noopener noreferrer"&gt;Puppet CD upgrade docs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As always, review the release notes before upgrading, especially if you rely on specific integrations or custom pipeline behavior.&lt;/p&gt;

&lt;h2&gt;
  
  
  Read the full details
&lt;/h2&gt;

&lt;p&gt;For the complete list of fixes, security updates, and known issues, check the official release notes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/cdpe/current/Content/UserGuide/CDPE/ReleaseNotes/cd_release_notes.htm#Version5150" rel="noopener noreferrer"&gt;Continuous Delivery 5.15.0 release notes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you have feedback or run into issues after upgrading, the Puppet community channels are always a good place to share what you’re seeing.&lt;/p&gt;




&lt;p&gt;Happy automating!&lt;/p&gt;

</description>
      <category>puppet</category>
      <category>cicd</category>
    </item>
    <item>
      <title>ConfDroid Puppet Modules - java</title>
      <dc:creator>12ww1160</dc:creator>
      <pubDate>Sat, 18 Apr 2026 16:24:20 +0000</pubDate>
      <link>https://dev.to/12ww1160/confdroid-puppet-modules-java-5abd</link>
      <guid>https://dev.to/12ww1160/confdroid-puppet-modules-java-5abd</guid>
      <description>&lt;h2&gt;
  
  
  Introducing confdroid_java: A Lightweight Helper for Reliable Java Installations
&lt;/h2&gt;

&lt;p&gt;We’re continuing the ConfDroid Puppet modules series with a small but essential addition: &lt;strong&gt;confdroid_java&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;This module does exactly one thing—and does it well. It installs and configures a specified Java version so that other Puppet modules can simply rely on it being there. No more guessing, no more manual setup, and no more version conflicts when you spin up Java-based services.&lt;/p&gt;

&lt;p&gt;Think of it as the Java counterpart to our popular &lt;strong&gt;confdroid_php&lt;/strong&gt; module. Just as &lt;code&gt;confdroid_php&lt;/code&gt; prepares a clean PHP environment for applications like WordPress or Nagios, confdroid_java sets up the exact Java runtime that tools like &lt;code&gt;confdroid_jenkins&lt;/code&gt; (and any future Java-dependent modules) expect. It keeps everything consistent, reproducible, and ready for automation.&lt;/p&gt;

&lt;h2&gt;
  
  
  What confdroid_java actually does
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Installs the Java binaries you specify through parameters&lt;/li&gt;
&lt;li&gt;Places all necessary configuration files in the correct locations&lt;/li&gt;
&lt;li&gt;Automatically applies the right SELinux contexts (and gracefully ignores them on systems where SELinux is disabled)&lt;/li&gt;
&lt;li&gt;Stays deliberately lightweight—no unnecessary features, no external module dependencies&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is designed to be a silent foundation. You include it once, and every Java-needing module that follows can simply assume a working Java environment is already in place. Confdroid modules which rely on it like &lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_jenkins" rel="noopener noreferrer"&gt;confdroid_jenkins&lt;/a&gt; automatically add it, as long as it is in the Puppet catalogue.&lt;/p&gt;

&lt;h2&gt;
  
  
  Supported platforms
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Fully tested and validated on Rocky Linux 9&lt;/li&gt;
&lt;li&gt;Expected to work on all RHEL 9-based distributions&lt;/li&gt;
&lt;li&gt;Requires Puppet 8&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to use it
&lt;/h2&gt;

&lt;p&gt;The simplest way is just to include the class:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight puppet"&gt;&lt;code&gt;&lt;span class="k"&gt;node&lt;/span&gt; &lt;span class="s1"&gt;'example.example.net'&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="k"&gt;include&lt;/span&gt; &lt;span class="nc"&gt;confdroid_java&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Or, if you manage your nodes with Foreman, simply set the desired parameters (Java version, installation source, etc.) directly in the host or host-group configuration. No extra code required.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Important note: This module is meant for fresh systems. If Java has already been installed or configured manually on a server, applying confdroid_java could overwrite those changes. Always test in a lab environment first.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Where to get it
&lt;/h2&gt;

&lt;p&gt;The full module, complete documentation, and parameter reference are available right now in the &lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_java" rel="noopener noreferrer"&gt;Confdroid Forge:&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You’ll also find the generated documentation in the &lt;code&gt;doc/&lt;/code&gt; folder inside the repository.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why this module matters
&lt;/h2&gt;

&lt;p&gt;In larger Puppet environments, helper modules like confdroid_java (and its PHP sibling) are the glue that makes everything else click. They remove duplication, enforce consistency, and let the bigger application modules focus on what they do best—managing Jenkins, application servers, or any other Java workload—without reinventing the Java installation wheel every time.&lt;br&gt;
If you’re already running other ConfDroid modules on Rocky 9, adding confdroid_java is a quick win that will make your Java-based services even more reliable and easier to maintain.&lt;br&gt;
Happy automating!&lt;br&gt;
As always, feedback and pull requests are welcome in the repository.&lt;/p&gt;




&lt;p&gt;Did you find this post helpful?  You can support me.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.buymeacoffee.com/grizzly_coda" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2znn4km0i2jib7ru1sm9.png" alt="" width="170" height="37"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://hetzner.cloud/?ref=EY14C8Tema9j" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyab43i0ysz9uwuq267u0.png" alt="Hetzner Referral" width="400" height="37"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://confdroid.substack.com/subscribe?params=%5Bobject%20Object%5D" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9r49xyl05rwkjb52xbqg.png" alt="Substack" width="250" height="30"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://feedback.confdroid.com/" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy7d47hck6vziak35nfgf.png" alt="ConfDroid Feedback Portal" width="300" height="63"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Related posts
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-pilot/" rel="noopener noreferrer"&gt;Confdroid Puppet Modules - Pilot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-puppet/" rel="noopener noreferrer"&gt;Confdroid Puppet Modules - Puppet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-resources/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - confdroid_resources&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-postgresql/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Postgresql&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-gitea/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Gitea&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-apache/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Apache&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-nagios/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Nagios&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-nrpe/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - NRPE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-fail2ban/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Fail2ban&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-automatic/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Automatic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-selinux/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Selinux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-ssh/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - SSH&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>java</category>
      <category>puppet</category>
      <category>foreman</category>
    </item>
    <item>
      <title>ConfDroid Puppet Modules - SSH</title>
      <dc:creator>12ww1160</dc:creator>
      <pubDate>Sat, 18 Apr 2026 15:33:33 +0000</pubDate>
      <link>https://dev.to/12ww1160/confdroid-puppet-modules-ssh-1kke</link>
      <guid>https://dev.to/12ww1160/confdroid-puppet-modules-ssh-1kke</guid>
      <description>&lt;h2&gt;
  
  
  Introducing confdroid_ssh: Reliable and Hardened SSH Access for Your Rocky 9 Servers
&lt;/h2&gt;

&lt;p&gt;SSH is the primary way we access and manage Linux servers. When SSH stops working, everything else grinds to a halt — troubleshooting becomes painful, and automation pipelines can fail.&lt;/p&gt;

&lt;p&gt;To solve this, I created &lt;strong&gt;confdroid_ssh&lt;/strong&gt;, a new Puppet 8 module that ensures the SSH daemon (sshd) is always installed, properly configured, running, and reachable.&lt;/p&gt;

&lt;p&gt;The module provides a hardened, consistent SSH setup across your entire infrastructure while making it easy to apply custom security policies.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Module Matters
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Guarantees SSH access is always available.&lt;/li&gt;
&lt;li&gt;Applies secure defaults for ciphers, MAC algorithms, and other important settings&lt;/li&gt;
&lt;li&gt;Manages the main sshd_config safely through drop-in files in /etc/ssh/sshd_config.d/&lt;/li&gt;
&lt;li&gt;Handles SELinux contexts automatically (works great together with confdroid_selinux)&lt;/li&gt;
&lt;li&gt;Optionally manages firewall rules to keep the SSH port open&lt;/li&gt;
&lt;li&gt;Prevents configuration drift and manual overrides that often cause problems&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It fits perfectly into the Confdroid collection alongside &lt;code&gt;confdroid_selinux&lt;/code&gt; (for global SELinux enforcement) and &lt;code&gt;confdroid_fail2ban&lt;/code&gt; (for brute-force protection on SSH).&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Features
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Installs the SSH server packages and required binaries&lt;/li&gt;
&lt;li&gt;Manages the sshd service (ensures it is enabled and running)&lt;/li&gt;
&lt;li&gt;Supports custom configuration snippets via the confdroid_ssh::custom::custom_config define&lt;/li&gt;
&lt;li&gt;Automatically applies correct SELinux contexts&lt;/li&gt;
&lt;li&gt;Optionally opens the SSH port in the firewall (iptables/nftables)&lt;/li&gt;
&lt;li&gt;Designed for Rocky 9 (and other RHEL 9-based systems)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Example: Adding Custom Configuration
&lt;/h2&gt;

&lt;p&gt;You can easily add your own secure settings without touching the main config file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight puppet"&gt;&lt;code&gt;&lt;span class="n"&gt;confdroid_ssh::custom::custom_config&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="s1"&gt;'30-my-hardening'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
  &lt;span class="py"&gt;config_name&lt;/span&gt;    &lt;span class="p"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="s1"&gt;'30-my-hardening'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="py"&gt;config_content&lt;/span&gt; &lt;span class="p"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;
    &lt;span class="s1"&gt;'PasswordAuthentication no'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="s1"&gt;'PermitRootLogin no'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="s1"&gt;'MaxAuthTries 3'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="p"&gt;],&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This creates a cleanly managed file /etc/ssh/sshd_config.d/30-my-hardening.conf, overriding default settings from the main configuration file.&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Fits in the Confdroid Ecosystem
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;confdroid_ssh&lt;/code&gt; works hand-in-hand with the rest of the collection:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;confdroid_selinux&lt;/code&gt; ensures the global SELinux mode is set correctly&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;confdroid_fail2ban&lt;/code&gt; protects SSH against brute-force attacks
All other modules benefit from reliable SSH access for management and deployment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Important Notes
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;Warning: This module overwrites SSH configuration. Do not use it right on systems that have heavy manual SSH customizations. Always test first in a non-production environment, and move your manual configuration into the module via the provided define see example. It is likely best practice to use small snippets depending on various conditions &lt;strong&gt;only when&lt;/strong&gt; they apply. Not every Linux system follows the same pattern depending on the applications it hosts.&lt;br&gt;
The module follows the Confdroid “ENC-first” philosophy — configure everything comfortably through Foreman smart class parameters.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;You can find the full module, source code, parameter reference, and documentation &lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_ssh" rel="noopener noreferrer"&gt;here: https://sourcecode.confdroid.com/confdroid/confdroid_ssh&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;With &lt;code&gt;confdroid_ssh&lt;/code&gt;, you no longer have to worry about SSH breaking after updates or configuration changes. It provides a solid, hardened, and fully automated foundation for secure remote access across your Rocky 9 fleet.&lt;/p&gt;

&lt;p&gt;Combined with &lt;code&gt;confdroid_selinux&lt;/code&gt; and &lt;code&gt;confdroid_fail2ban&lt;/code&gt;, it forms a strong security layer that keeps your servers accessible to you — but not to attackers.&lt;br&gt;
Have you ever lost SSH access due to a misconfiguration or update? How do you currently manage SSH hardening across your servers? Share your experiences or questions in the comments — I’d love to hear them!&lt;/p&gt;




&lt;p&gt;Did you find this post helpful?  You can support me.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.buymeacoffee.com/grizzly_coda" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2znn4km0i2jib7ru1sm9.png" alt="" width="170" height="37"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://hetzner.cloud/?ref=EY14C8Tema9j" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyab43i0ysz9uwuq267u0.png" alt="Hetzner Referral" width="400" height="37"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://confdroid.substack.com/subscribe?params=%5Bobject%20Object%5D" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9r49xyl05rwkjb52xbqg.png" alt="Substack" width="250" height="30"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://feedback.confdroid.com/" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy7d47hck6vziak35nfgf.png" alt="ConfDroid Feedback Portal" width="300" height="63"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Related posts
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-pilot/" rel="noopener noreferrer"&gt;Confdroid Puppet Modules - Pilot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-puppet/" rel="noopener noreferrer"&gt;Confdroid Puppet Modules - Puppet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-resources/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - confdroid_resources&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-postgresql/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Postgresql&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-gitea/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Gitea&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-apache/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Apache&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-nagios/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Nagios&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-nrpe/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - NRPE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-fail2ban/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Fail2ban&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-automatic/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Automatic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-selinux/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Selinux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-java/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - java&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>sshd</category>
      <category>access</category>
      <category>puppet</category>
      <category>foreman</category>
    </item>
    <item>
      <title>Security Compliance Management 3.7.0 Is Now Available</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Wed, 15 Apr 2026 14:56:44 +0000</pubDate>
      <link>https://dev.to/puppet/security-compliance-management-370-is-now-available-1i47</link>
      <guid>https://dev.to/puppet/security-compliance-management-370-is-now-available-1i47</guid>
      <description>&lt;p&gt;Security Compliance Management (SCM) 3.7.0 helps teams assess systems against recognized security benchmarks. This release supports evolving baselines and improves audit readiness, operational reliability, and overall governance by giving administrators tighter control over platform performance, user access, and API security within the Puppet Enterprise platform.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's new in this release
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Expanded benchmark coverage for evolving environments
&lt;/h3&gt;

&lt;p&gt;SCM 3.7.0 updates CIS-CAT Pro Assessor benchmark coverage to support newer operating systems and standards. This helps ensure compliance reporting remains current as teams adopt new platforms.&lt;/p&gt;

&lt;p&gt;Highlights include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;New CIS benchmarks for numerous Linux distributions and macOS.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;An updated benchmark for Microsoft Windows 11 Enterprise.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More predictable performance during compliance scans
&lt;/h3&gt;

&lt;p&gt;Administrators can now control JVM memory allocation for the CIS Assessor, allowing performance tuning based on environment size and available resources. This results in more reliable scans and fewer disruptions during compliance assessments.&lt;/p&gt;

&lt;h3&gt;
  
  
  Greater control over user access and session behavior
&lt;/h3&gt;

&lt;p&gt;New centralized session management options allow administrators to better align SCM authentication behavior with corporate security and identity policies. The outcome is reduced risk from long-lived sessions and improved governance.&lt;/p&gt;

&lt;h3&gt;
  
  
  Improved API governance and security posture
&lt;/h3&gt;

&lt;p&gt;Additional GraphQL controls help limit exposure and enforce request limits in regulated or security-sensitive environments. The smaller API attack surface provides stronger API governance.&lt;/p&gt;

&lt;h3&gt;
  
  
  Security fixes and dependency updates
&lt;/h3&gt;

&lt;p&gt;This release addresses multiple known vulnerabilities across core dependencies, helping reduce inherited risk and support ongoing vulnerability management.&lt;/p&gt;

&lt;p&gt;For a complete list of addressed CVEs and detailed configuration guidance, see the release notes.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Upgrade to SCM 3.7.0
&lt;/h2&gt;

&lt;p&gt;Organizations should consider upgrading to SCM 3.7.0 to reduce compliance gaps, stabilize large-scale assessments, and strengthen security controls as environments grow more complex.&lt;/p&gt;

&lt;p&gt;With this release, teams can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Maintain audit readiness as new operating systems and benchmarks are adopted.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Improve scan reliability and performance in large-scale environments managed through Puppet Enterprise.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Centralize and standardize user session and API behavior across the platform.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Reduce exposure to known vulnerabilities through updated dependencies and security fixes.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Next Steps
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Review the &lt;a href="https://help.puppet.com/scm/current/Content/UserGuide/SCM/Release_notes/release_notes.htm#SecurityComplianceManagement370" rel="noopener noreferrer"&gt;release notes&lt;/a&gt; for technical details and configuration information.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Upgrade to SCM 3.7.0 to take advantage of expanded coverage and new governance controls.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>puppet</category>
      <category>security</category>
    </item>
    <item>
      <title>Generate a Puppet Module Using GitHub Copilot and VS Code</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Mon, 13 Apr 2026 13:23:29 +0000</pubDate>
      <link>https://dev.to/puppet/generate-a-puppet-module-using-github-copilot-and-vs-code-50mm</link>
      <guid>https://dev.to/puppet/generate-a-puppet-module-using-github-copilot-and-vs-code-50mm</guid>
      <description>&lt;p&gt;This tutorial shows how to use GitHub Copilot with the Puppet Model Context Protocol (MCP) server to generate, validate, and refine a Puppet module—even if you’re new to Puppet development. &lt;/p&gt;

&lt;h3&gt;
  
  
  What You’ll Learn 
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;  How to configure GitHub Copilot with the Puppet MCP server &lt;/li&gt;
&lt;li&gt;  How AI agents can use the Puppet Development Kit (PDK) to generate Puppet modules &lt;/li&gt;
&lt;li&gt;  How AI agents can use the PDK to validate and iterate on generated Puppet code&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Challenge: Overcoming the Puppet Module Learning Curve 
&lt;/h2&gt;

&lt;p&gt;When you start automating infrastructure with Puppet, you might face an initial learning curve. You will begin to learn Puppet syntax, best practices around module structure and Puppet Domain-Specific Language (DSL), and even what tools are available to you.  &lt;/p&gt;

&lt;p&gt;To help DevOps practitioners get started, Puppet first released an MCP server to &lt;a href="https://help.puppet.com/pe/current/topics/infra-assistant-code-assist.htm" rel="noopener noreferrer"&gt;accelerate development&lt;/a&gt; when using the new Puppet EdgeOps module for &lt;a href="https://www.puppet.com/blog/puppet-edge-code-assist" rel="noopener noreferrer"&gt;working with network devices&lt;/a&gt;. Starting with Puppet Enterprise Advanced 2025.7, tools are available to provide even more guidance and information for working with agents on Puppet code in control repos, tasks, and modules. Traditional module development demanded deep domain expertise that teams often lack, but using modern AI-assisted development flows can help you bridge the knowledge gap. &lt;/p&gt;

&lt;p&gt;Puppet's MCP server can be used with your favorite Integrated Development Environment (IDE) and code assist agent so that you can describe your requirements in natural language and work with your agent to get validated Puppet code and architecture. This tutorial demonstrates the use of Visual Studio (VS) Code and GitHub Copilot to generate a Puppet module with minimal Puppet expertise, helping you get started faster!  &lt;/p&gt;

&lt;p&gt;⚠️ &lt;strong&gt;Important:&lt;/strong&gt; AI tools make mistakes, just like people. For this reason, your process should always involve review and testing as part of the end-to-end process. Use these tools to augment yourself and the team, but make those tools earn your trust. &lt;/p&gt;

&lt;p&gt;Time to get started!&lt;/p&gt;

&lt;h2&gt;
  
  
  Tech Stack Overview: VS Code, GitHub Copilot, and Puppet MCP 
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.puppet.com/sites/default/files/inline-images/1.png" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdz63dnnmh3aa53llhhw7.png" alt="Flow chart depicting VS Code, GitHub, and MCP Server" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For this tutorial, the Puppet development workflow will combine three key technologies: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;a href="https://code.visualstudio.com/download" rel="noopener noreferrer"&gt;&lt;strong&gt;Visual Studio Code&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; Serves as the IDE where all coding (and code generation) happens.  &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://code.visualstudio.com/docs/copilot/overview" rel="noopener noreferrer"&gt;&lt;strong&gt;GitHub Copilot&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; Acts as the AI coding assistant that provides intelligent code suggestions and executes autonomous tasks.  &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/infra-assistant-code-assist.htm" rel="noopener noreferrer"&gt;&lt;strong&gt;Puppet MCP server&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; Exposes Puppet-specific intelligence through MCP, enabling GitHub Copilot to better generate Puppet solutions.  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The MCP server provides &lt;a href="https://help.puppet.com/pe/current/topics/available-mcp-tools-for-code-assist.htm" rel="noopener noreferrer"&gt;several tools&lt;/a&gt; to provide Puppet language guides, information about Puppet environment entities, Puppet documentation, and networking info. This integration eliminates context switching between documentation, terminal windows, and code editors and provides the information required by AI agents to support smooth transitions from one step to the next.  &lt;/p&gt;

&lt;p&gt;Authentication to the Puppet MCP server happens via Puppet Enterprise (PE) API keys with &lt;a href="https://help.puppet.com/pe/current/topics/adding-an-mcp-server.htm" rel="noopener noreferrer"&gt;secure token storage in VS Code&lt;/a&gt;. The MCP architecture follows a client-server model where VS Code instantiates client connections to the Puppet MCP server running in your Puppet Enterprise environment.&lt;/p&gt;

&lt;h2&gt;
  
  
  Prerequisites and Required Software Installation 
&lt;/h2&gt;

&lt;p&gt;This brief tutorial is based on the assumption that you have met several prerequisites. Plan time to go through this checklist before starting: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  Obtain your authentication credentials to download Perforce Puppet applications. The credentials are either your Forge API key or your &lt;a href="https://help.puppet.com/pe/current/topics/verify_installed_licenses_and_active_nodes.htm?Highlight=%22license%20id%22" rel="noopener noreferrer"&gt;Puppet Enterprise license ID&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/installing.htm" rel="noopener noreferrer"&gt;Install Puppet Enterprise Advanced 2025.7+&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/enabling-the-infra-assistant.htm" rel="noopener noreferrer"&gt;Enable the Infra Assistant feature on your PE server&lt;/a&gt;. You do not have to configure the Infra Assistant OpenAI settings, but the Infra Assistant must be turned on in order for the MCP server to accept requests from your agent. &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/rbac-token-auth-generate-token-console.htm" rel="noopener noreferrer"&gt;Generate a valid Puppet Enterprise API key&lt;/a&gt; from the console for a user with the &lt;code&gt;infrastructure_assistant:use&lt;/code&gt; permission. (The API key is sometimes called a token.)&lt;/li&gt;
&lt;li&gt;  Install &lt;a href="https://code.visualstudio.com/download" rel="noopener noreferrer"&gt;Visual Studio Code&lt;/a&gt; on your development machine and complete configuration tasks: &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://code.visualstudio.com/docs/copilot/overview#_getting-started" rel="noopener noreferrer"&gt;Configure the GitHub Copilot extension&lt;/a&gt; in Visual Studio Code. &lt;/li&gt;
&lt;li&gt;  Configure GitHub Copilot to &lt;a href="https://code.visualstudio.com/docs/copilot/customization/mcp-servers" rel="noopener noreferrer"&gt;use MCP servers in VS Code&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;  Ensure that your developer machine has network access to the PE console host. &lt;/li&gt;
&lt;li&gt;  Verify that your developer machine &lt;a href="https://portal.perforce.com/s/article/8078496522135?utm_medium=social&amp;amp;utm_source=youtube&amp;amp;utm_campaign=2025-puppet-forge&amp;amp;utm_content=puppet-forge" rel="noopener noreferrer"&gt;trusts the PE console CA certificate&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Tutorial Walkthrough: From Empty Repository to Generated Module 
&lt;/h2&gt;

&lt;p&gt;These steps walk through how you can take a completely empty repository to a validated Puppet module by using an AI-assisted flow in Visual Studio with a code assistant. Remember to meet the previously listed prerequisites! The following steps use GitHub Copilot, but if you happen to use a different stack (like Claude Code or Cursor), the process is mostly the same.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tip:&lt;/strong&gt; In this tutorial, “agent chat” refers to the GitHub Copilot Agent chat window in Visual Studio Code. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Using your favorite source control tool, create a blank repository to begin working. &lt;/li&gt;
&lt;li&gt; Clone the repository and open it in Visual Studio Code. &lt;/li&gt;
&lt;li&gt; To support the use of Puppet tools, install GitHub Copilot instructions in your solution. Sample instructions are &lt;a href="https://github.com/jst-cyr/puppet-copilot-instructions-example" rel="noopener noreferrer"&gt;available on GitHub&lt;/a&gt;. 
&lt;strong&gt;Tip:&lt;/strong&gt; Some models cannot easily find instructions in subfolders and  search only in the root directory. Some models look only for the &lt;code&gt;copilot-instructions.md&lt;/code&gt; file. The example provides a &lt;code&gt;README.md&lt;/code&gt; and a &lt;code&gt;copilot-instructions.md&lt;/code&gt; file that help lead the model toward the custom Puppet instructions file.  &lt;/li&gt;
&lt;li&gt; &lt;a href="https://help.puppet.com/pe/current/topics/adding-an-mcp-server.htm" rel="noopener noreferrer"&gt;Add the Puppet MCP server&lt;/a&gt; to your &lt;code&gt;mcp.json&lt;/code&gt; file. &lt;/li&gt;
&lt;li&gt; Start the Puppet MCP server, either by clicking &lt;strong&gt;Start&lt;/strong&gt; in your &lt;code&gt;mcp.json&lt;/code&gt; file or through the &lt;strong&gt;MCP Servers – Installed&lt;/strong&gt; list in the &lt;strong&gt;Extensions&lt;/strong&gt; view. &lt;/li&gt;
&lt;li&gt; Open an agent chat window for GitHub Copilot. &lt;/li&gt;
&lt;li&gt; Run a prompt to generate a new module. For example: “I want to create a new Puppet module to automate the provisioning of new AWS VMs. Please follow best practices for Puppet module creation.” &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Note that this is a simple prompt example. To follow context engineering best practices, you would provide much more detail to get your desired output. For tutorial purposes, the prompt is intentionally lightweight. By using a simple prompt, you can recognize the extra context and benefits provided by Puppet tools to accelerate your progress.&lt;/p&gt;

&lt;p&gt;  &lt;iframe src="https://www.youtube.com/embed/F25NUANJT04"&gt;
  &lt;/iframe&gt;
&lt;/p&gt;

&lt;h2&gt;
  
  
  Installing Puppet Development Kit (PDK) 
&lt;/h2&gt;

&lt;p&gt;At this point, your agent should be running and attempting to solve the problem. The agent will quickly detect the need for  additional information from the &lt;strong&gt;Puppet MCP server.&lt;/strong&gt; In addition, the agent will determine that the &lt;strong&gt;Puppet Development Kit (PDK)&lt;/strong&gt; must be used to create modules. In my model testing, the GitHub Copilot agent undertook the following tasks, which required minimal input from the user: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Processed the provided Puppet instructions and determined that the Puppet MCP server should be connected to retrieve guidelines. &lt;/li&gt;
&lt;li&gt; Attempted to connect to the Puppet MCP server for the &lt;code&gt;get_puppet_guide&lt;/code&gt; tool and augmented the context with information from the Puppet MCP server. &lt;/li&gt;
&lt;li&gt; Recognized that the PDK is required and attempted to check whether PDK was installed (by running &lt;code&gt;pdk --version&lt;/code&gt;). &lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If PDK was not detected, attempted to fetch the PDK installation instructions. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tip:&lt;/strong&gt; The agent may use different URLs to search for the PDK installation instructions. Eventually, the agent will find the correct installation instructions for the operating system. &lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;After the agent discovered the installation instructions, the agent determined that authentication credentials are required to download the software. At this point, the user would be prompted for Forge credentials or Puppet Enterprise credentials. At the prompt, you will specify the type of credentials. For example: “Here is my license ID: abcdefghizjklmnopzrstuvwxyz1”. This sample prompt informs the agent to use a Puppet Enterprise license ID, instead of a Forge API key, as the authentication method. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Submit the prompt and the agent will begin to download and install the PDK. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The agent typically installs the PDK as part of its setup routine. In practice, the agent might run incorrect commands or fail to use elevated privileges on the first attempt. When that happens, allow the agent to iterate until the installation succeeds. &lt;/p&gt;

&lt;p&gt;💡 &lt;strong&gt;Tip:&lt;/strong&gt; This is a huge boost for new users because the agent can search for instructions and quickly iterate through installation failures, while you focus on reviewing the results. &lt;/p&gt;

&lt;p&gt;After the agent successfully completes the PDK download and installation on your behalf, the agent continues with module generation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Generating the Module 
&lt;/h2&gt;

&lt;p&gt;With the PDK installed, it’s time to create the first steps of a module that will accomplish your goals. Only minimal context is provided in the tutorial example for provisioning new AWS VMs. The models will attempt to create the functionality you require based on their training data, the context from the Puppet MCP server, and the context you provide. The better your prompting, the more accurate the output will be. For this tutorial, however, assume that you are not trying to generate the module in one step and will follow up with further prompting to refine the module. During this tutorial step, the agent will generate the basics of the module. &lt;/p&gt;

&lt;p&gt;At this stage, GitHub Copilot typically performs the following actions without requiring additional prompts: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; After completing installation, validates the installation by running &lt;code&gt;pdk --version&lt;/code&gt;. &lt;/li&gt;
&lt;li&gt; If successful, creates a module with a PDK command like &lt;code&gt;pdk new module aws_provisioning --skip-interview&lt;/code&gt;. &lt;/li&gt;
&lt;li&gt; After the PDK module creation logic completes processing, creates profile classes for AWS VM provisioning. This command might be &lt;code&gt;pdk new class aws_provisioning&lt;/code&gt; or similar. &lt;/li&gt;
&lt;li&gt; Creates additional supporting classes. In my testing, the agent ran these additional commands: 

&lt;ol&gt;
&lt;li&gt; &lt;code&gt;pdk new class aws_provisioning::config&lt;/code&gt; &lt;/li&gt;
&lt;li&gt; &lt;code&gt;pdk new class aws_provisioning::instance&lt;/code&gt; &lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;li&gt; After the basic structure of the classes is in place, begins implementing Puppet code for the classes. The actions resemble typical code generation steps, creating and editing a variety of files and patching them with new implementation logic. &lt;/li&gt;

&lt;li&gt; When the initial code generation is completed on top of the PDK skeleton implementations, updates documentation such as the &lt;code&gt;metadata.json&lt;/code&gt; file and the README file to match the needs of the generated code. &lt;/li&gt;

&lt;/ol&gt;

&lt;p&gt;When documentation updates are completed, a typical agent might stop without validating further. However, by setting the context for the agent with knowledge of PDK and its capabilities as well as the best practices from the Puppet MCP server, the agent knows that validation of modules is an important next step.&lt;/p&gt;

&lt;h2&gt;
  
  
  Validating the Module 
&lt;/h2&gt;

&lt;p&gt;PDK supports validation of a module to ensure that it meets specific standards. Even with the best practices and instructions that were provided to the agent, along with its training, agents can make mistakes. With validation, you can catch some of these mistakes up front. Augmenting with tools is a key strategy for agentic workflows. Using the agent as an automation process to leverage the tools you have is a great way to take advantage of more deterministic capabilities along with the non-deterministic nature of the agentic automation. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; For validation, the agent should attempt to use the PDK: &lt;code&gt;pdk validate&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt; PDK should find issues, even if they are only indentation issues in YAML files. The agent should then attempt to correct the issues with code assist using the output of the PDK validation. &lt;/li&gt;
&lt;li&gt; When the patch edits are complete, the agent should run PDK validation again (&lt;code&gt;pdk validate&lt;/code&gt;).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If more issues are found, the agent should circle back and try to resolve them, looping until no more issues are found, but typically the first run of validation should find all issues. &lt;/p&gt;

&lt;p&gt;You can now continue your own testing and building out the module with a solid base that follows Puppet best practices! This workflow compresses the traditional learning curve and gets you to the interesting bits of your development much faster.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Benefits of Agent-Assisted Module Creation 
&lt;/h2&gt;

&lt;p&gt;This AI-assisted approach offers several key advantages over manual development: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  Agent-led requirements detection and installation help you get started so that your system achieves a correct state. &lt;/li&gt;
&lt;li&gt;  Autonomous error detection and correction reduce debugging time significantly. &lt;/li&gt;
&lt;li&gt;  The agent's ability to reference the Puppet MCP server and official Puppet documentation helps to ensure that generated code follows best practices and coding standards.  &lt;/li&gt;
&lt;li&gt;  Integration with PDK tooling provides deterministic automation and continuous quality checks throughout the development process.  &lt;/li&gt;
&lt;li&gt;  Structured instruction files create a consistent and repeatable development experience across different projects and team members. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By building your AI-assisted flow on top of solid DevOps tools and practices, you’ll be equipped to avoid the typical challenges faced by generic coding models. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;“DevOps is not dying. It is becoming the economic and operational foundation for AI at scale.&lt;/strong&gt;&lt;/em&gt; &lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;The data shows the same pattern across every domain: AI succeeds when delivery systems are standardized, centralized, automated, and measurable. Where those foundations are weak, AI magnifies existing gaps in coordination, governance, auditability, cost, and outcomes.”&lt;/strong&gt;&lt;/em&gt; &lt;br&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;-&lt;/strong&gt;&lt;/em&gt; &lt;a href="https://www.perforce.com/resources/state-of-devops/conclusion?utm_medium=social&amp;amp;utm_source=youtube&amp;amp;utm_campaign=2025-puppet-forge&amp;amp;utm_content=puppet-forge" rel="noopener noreferrer"&gt;&lt;em&gt;&lt;strong&gt;State of DevOps Report 2026&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Challenges and Solutions in AI-Assisted Puppet Development 
&lt;/h2&gt;

&lt;p&gt;You might encounter a few common challenges when using AI agents for Puppet module generation: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; According to a &lt;a href="https://vercel.com/blog/agents-md-outperforms-skills-in-our-agent-evals" rel="noopener noreferrer"&gt;recent evaluation by Vercel&lt;/a&gt;, coding agents &lt;strong&gt;ignore available skills in 56% of cases,&lt;/strong&gt; choosing not to invoke skills even when relevant documentation exists. The solution involves using instruction files that force context loading rather than relying on agent decisions. In the evaluation, Vercel found that directly embedding a compressed 8 KB docs index into an &lt;code&gt;AGENTS.md&lt;/code&gt; file helped coding agents achieve 100% pass rates compared to 79% with skills combined with explicit instructions. In my own tests with GitHub Copilot, references from the README.md file to other instruction files helped the agent, with less sophisticated models, to find the correct instructions and load them.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Agents sometimes refuse to use PDK or read proper installation instructions&lt;/strong&gt;, requiring iterative prompt refinement. The solution involves adding explicit installation commands, troubleshooting steps, and URL references to your &lt;code&gt;copilot-instructions.md&lt;/code&gt; file. Ensure that you follow &lt;a href="https://vercel.com/blog/agents-md-outperforms-skills-in-our-agent-evals" rel="noopener noreferrer"&gt;best practices for instructions files to keep them lean&lt;/a&gt;. Getting GitHub Copilot to consistently read instruction files requires understanding that passive context (always-loaded files) outperforms active retrieval (on-demand skills). Instruction files should be concise (fewer than 1,000 lines), structured with headings and bullet points, and use imperative rules rather than long paragraphs.  &lt;/li&gt;
&lt;li&gt; &lt;strong&gt;AI agents can get stuck in validation and fixing loops.&lt;/strong&gt; For linting and validation errors that agents struggle to fix, adding error-specific guidance to instruction files helps GitHub Copilot learn from mistakes. The goal is to eliminate decision points by providing persistent context rather than making agents decide when to look up information.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Table 1: Common challenges in AI-assisted Puppet module development and recommended solutions 
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Challenge &lt;/th&gt;
&lt;th&gt;Impact &lt;/th&gt;
&lt;th&gt;Solution &lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Agents ignore MCP tools (56% of cases) &lt;/td&gt;
&lt;td&gt;Skills documentation not invoked when needed &lt;/td&gt;
&lt;td&gt;Use .github/copilot-instructions.md for passive context loading (achieves 100% pass rate versus 79% with on-demand skills). &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;PDK installation issues &lt;/td&gt;
&lt;td&gt;Agents fail to use PDK or read installation instructions &lt;/td&gt;
&lt;td&gt;Add explicit installation commands and troubleshooting steps to copilot-instructions.md. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Inconsistent reading of instruction files &lt;/td&gt;
&lt;td&gt;Agent decisions create unpredictable behavior &lt;/td&gt;
&lt;td&gt;Provide persistent context (always-loaded files) rather than relying on agent retrieval decisions. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Incorrect Puppet code or missing namespaces or invalid spacing &lt;/td&gt;
&lt;td&gt;Generated configurations fail validation &lt;/td&gt;
&lt;td&gt;Include specific vendor configuration examples in instruction files and use PDK validation for testing modules. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Validation errors agents can't fix &lt;/td&gt;
&lt;td&gt;Repeated mistakes across generations &lt;/td&gt;
&lt;td&gt;Document error-specific guidance in instruction files so agents learn from past failures. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File structure guidelines &lt;/td&gt;
&lt;td&gt;Keep instruction files concise (fewer than 1,000 lines) with clear structure &lt;/td&gt;
&lt;td&gt;Use headings, bullet points, and imperative rules instead of long paragraphs.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Should You Use Agent Skills or Instructions? 
&lt;/h2&gt;

&lt;p&gt;Vercel's research on AI agent instruction approaches provides compelling evidence to show why instruction files are essential for effective AI-assisted development. Their evaluation tested Next.js 16 API generation using four configurations:  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; No documentation: 53% pass rate &lt;/li&gt;
&lt;li&gt; Skills with default behavior: 53% pass rate, same as no documentation &lt;/li&gt;
&lt;li&gt; Skills with explicit trigger instructions: 79% pass rate &lt;/li&gt;
&lt;li&gt; A compressed 8 KB docs index in AGENTS.md: 100% pass rate &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The static markdown file outperformed sophisticated retrieval systems because the file eliminated decision points where agents must choose whether to invoke tools. In 56% of eval cases, skills were never invoked despite being available, producing no improvement over the baseline. &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;a href="https://www.puppet.com/sites/default/files/inline-images/2_0.png" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa7z7h9xf8dwzhnxwauiq.png" alt="AI Agent Performance: Instruction Approach comparison" width="800" height="450"&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Although these findings were focused on web development frameworks like Next.js, similar issues occur with agents across language frameworks and IDEs. For Puppet development, my testing found that combining instructions, PDK tooling, and the Puppet MCP server gave agents the best chance to have the correct context information.  &lt;/p&gt;

&lt;p&gt;AI-assisted development is still evolving but is expected to become an important part of many DevOps team processes. The Model Context Protocol is establishing itself as an enterprise-wide standard enabling vendor interoperability, with companies like Figma, Notion, Linear, Atlassian, and MongoDB building MCP servers that work seamlessly together. &lt;/p&gt;

&lt;p&gt;For infrastructure-as-code specifically, the shift toward “vibe coding” is opening up the opportunity for developers to express intentions in natural language rather than memorizing command-line syntax or the specifics of the Puppet Desired State Language (DSL).  Given a solid base of DevOps tools across the lifecycle, from development to testing to operations, coding assistants are well positioned to take advantage of these tools, thus unlocking opportunities for more practitioners to achieve greater efficiency across the entire workflow.&lt;/p&gt;

&lt;h2&gt;
  
  
  References 
&lt;/h2&gt;

&lt;p&gt;Check out the following sources, some of which were referenced in the document, and some of which provide a deeper dive if this topic is of interest to you! &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;a href="https://github.com/jst-cyr/puppet-copilot-instructions-example" rel="noopener noreferrer"&gt;Sample instructions for GitHub Copilot and Puppet MCP server&lt;/a&gt; (github.com/jst-cyr) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/installing.htm" rel="noopener noreferrer"&gt;Installing Puppet Enterprise (PE)&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/infra-assistant-code-assist.htm" rel="noopener noreferrer"&gt;Infra Assistant: code assist&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/enabling-the-infra-assistant.htm" rel="noopener noreferrer"&gt;Infra Assistant: Enable the Infra Assistant&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/available-mcp-tools-for-code-assist.htm" rel="noopener noreferrer"&gt;Infra Assistant - code assist: Available MCP tools&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/configuring-your-client-to-use-the-mcp-server.htm" rel="noopener noreferrer"&gt;Infra Assistant - code assist: Configuring your client to use the MCP server&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/adding-an-mcp-server.htm" rel="noopener noreferrer"&gt;Infra Assistant - code assist: Add the Puppet MCP server&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/rbac-token-auth-generate-token-console.htm" rel="noopener noreferrer"&gt;SAML authentication: Generate a token in the console&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://help.puppet.com/pe/current/topics/verify_installed_licenses_and_active_nodes.htm" rel="noopener noreferrer"&gt;View your license details | Puppet Enterprise&lt;/a&gt; (help.puppet.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://portal.perforce.com/s/article/8078496522135?utm_medium=social&amp;amp;utm_source=youtube&amp;amp;utm_campaign=2025-puppet-forge&amp;amp;utm_content=puppet-forge" rel="noopener noreferrer"&gt;Get the Puppet CA certificate chain in Puppet Enterprise&lt;/a&gt; (portal.perforce.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://www.puppet.com/blog/puppet-edge-code-assist" rel="noopener noreferrer"&gt;Build Tasks for Network Devices Faster with Code Assistance and Puppet Edge&lt;/a&gt; (puppet.com)  &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://www.perforce.com/resources/state-of-devops?utm_medium=social&amp;amp;utm_source=youtube&amp;amp;utm_campaign=2025-puppet-forge&amp;amp;utm_content=puppet-forge" rel="noopener noreferrer"&gt;The State of DevOps Report 2026&lt;/a&gt; (perforce.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://vercel.com/blog/agents-md-outperforms-skills-in-our-agent-evals" rel="noopener noreferrer"&gt;AGENTS.md outperforms skills in our agent evals&lt;/a&gt; (vercel.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://code.visualstudio.com/docs/copilot/customization/mcp-servers" rel="noopener noreferrer"&gt;GitHub Copilot: Use MCP servers in VS Code&lt;/a&gt; (code.visualstudio.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://code.visualstudio.com/docs/copilot/overview" rel="noopener noreferrer"&gt;GitHub Copilot in VS Code&lt;/a&gt; (code.visualstudio.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.github.com/en/copilot/tutorials/use-custom-instructions" rel="noopener noreferrer"&gt;Using custom instructions to unlock the power of Copilot code review&lt;/a&gt; (docs.github.com) &lt;/li&gt;
&lt;li&gt;  &lt;a href="https://dev.to/razvan_dim/bridging-the-gap-a-deep-dive-into-the-model-context-protocol-mcp-4e0p"&gt;Bridging the Gap: A Deep Dive into the Model Context Protocol (MCP)&lt;/a&gt; (dev.to)&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>puppet</category>
      <category>githubcopilot</category>
      <category>vscode</category>
      <category>aiops</category>
    </item>
    <item>
      <title>Installing PDK on a Linux Workstation (Manual Edition)</title>
      <dc:creator>Matthew Stone</dc:creator>
      <pubDate>Sat, 11 Apr 2026 19:05:38 +0000</pubDate>
      <link>https://dev.to/souldo/installing-pdk-on-a-linux-workstation-manual-edition-7ao</link>
      <guid>https://dev.to/souldo/installing-pdk-on-a-linux-workstation-manual-edition-7ao</guid>
      <description>&lt;p&gt;Getting PDK installed and updated can be a bit...&lt;em&gt;weird&lt;/em&gt; these days, and after running into a few bumps I thought I'd share my compiled notes that streamlined a few different pages in the Puppet help documentation. Note: this is for manual setup. At some point I'll add the super fun Puppet version of this to make it simple and automated.&lt;/p&gt;

&lt;h2&gt;
  
  
  Prerequisites
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;One of the following: a Puppet Core license, a Puppet Enterprise License, a Puppet Core development license.&lt;/li&gt;
&lt;li&gt;a Linux workstation. In this example I'm working with Fedora 33.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Steps
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Gather Your Credentials
&lt;/h3&gt;

&lt;p&gt;First things first, let's get our credentials in order.&lt;/p&gt;

&lt;h4&gt;
  
  
  For Puppet Enterprise users:
&lt;/h4&gt;

&lt;p&gt;The username is &lt;strong&gt;license-id&lt;/strong&gt;. The password can be found via the PE console. Log into the console, click on &lt;strong&gt;License&lt;/strong&gt; in the left side menus and then click &lt;strong&gt;Copy license id&lt;/strong&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  For Puppet Core users:
&lt;/h4&gt;

&lt;p&gt;The username is &lt;strong&gt;forge-key&lt;/strong&gt;. The password can be found and/or created by logging into the Puppet Forge. Click on your account at the upper right corner and select &lt;strong&gt;View Profile&lt;/strong&gt;. On the left side, select &lt;strong&gt;API Keys&lt;/strong&gt;. Generate an API key and copy the key. That is your password. Make a note to save this for future use as once you leave that page you'll have to create a new one if you forget it.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Download and Setup the Repository File
&lt;/h3&gt;

&lt;p&gt;First, let's grab the repository. You can find the relevant RPM or DEB from either &lt;a href="//yum-puppetcore.puppet.com/public"&gt;yum-puppetcore.puppet.com/public&lt;/a&gt; or &lt;a href="//apt-puppetcore.puppet.com/public"&gt;apt-puppetcore.puppet.com/public&lt;/a&gt;. Once you've found the right one, let's download and install!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;wget https://yum-puppetcore.puppet.com/public/puppet8-release-el-9.noarch.rpm

&lt;span class="nb"&gt;sudo &lt;/span&gt;rpm &lt;span class="nt"&gt;-ivh&lt;/span&gt; puppet8-release-el-8-noarch.rpm
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Once you've done the above, you'll be able to edit the repo file at /etc/yum.repos.d/puppet8-release.repo. Let's take a look at the contents:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight ini"&gt;&lt;code&gt;&lt;span class="nn"&gt;[puppet8]&lt;/span&gt;
&lt;span class="py"&gt;name&lt;/span&gt;&lt;span class="p"&gt;=&lt;/span&gt;&lt;span class="s"&gt;Puppet 8 Repository el 8 - $basearch&lt;/span&gt;
&lt;span class="py"&gt;baseurl&lt;/span&gt;&lt;span class="p"&gt;=&lt;/span&gt;&lt;span class="s"&gt;https://yum-puppetcore.puppet.com/puppet8/el/8/$basearch&lt;/span&gt;
&lt;span class="py"&gt;gpgkey&lt;/span&gt;&lt;span class="p"&gt;=&lt;/span&gt;&lt;span class="s"&gt;file:///etc/pki/rpm-gpg/RPM-GPG-KEY-puppet8-release&lt;/span&gt;
&lt;span class="py"&gt;enabled&lt;/span&gt;&lt;span class="p"&gt;=&lt;/span&gt;&lt;span class="s"&gt;1&lt;/span&gt;
&lt;span class="py"&gt;gpgcheck&lt;/span&gt;&lt;span class="p"&gt;=&lt;/span&gt;&lt;span class="s"&gt;1&lt;/span&gt;

&lt;span class="c"&gt;## Add authentication here by uncommenting and filling in values
&lt;/span&gt;
&lt;span class="c"&gt;#username=&amp;lt;api_user&amp;gt;
#password=&amp;lt;api_key&amp;gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;It's pretty straightforward here. Remove the &lt;code&gt;#&lt;/code&gt; from username and password, then copy your username and password from above into the &lt;code&gt;&amp;lt;api_user&amp;gt;&lt;/code&gt; and &lt;code&gt;&amp;lt;api_key&amp;gt;&lt;/code&gt; spaces, respectively. Save and quit editing the file.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Update and Install
&lt;/h3&gt;

&lt;p&gt;At this point we have our repo file, we have our credentials configured and we just need to update the repos and install pdk. a simple &lt;code&gt;yum update&lt;/code&gt; followed by &lt;code&gt;yum install pdk&lt;/code&gt; should get us there.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight console"&gt;&lt;code&gt;&lt;span class="gp"&gt;root@choplifter:/home/matthew#&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;yum update
&lt;span class="go"&gt;Updating and loading repositories:
 Puppet 8 Repository el 8 - x86_64            100% |  14.2 KiB/s |  14.1 KiB |  00m01s
Repositories loaded.
Nothing to do.
&lt;/span&gt;&lt;span class="gp"&gt;root@choplifter:/home/matthew#&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;yum &lt;span class="nb"&gt;install &lt;/span&gt;pdk
&lt;span class="go"&gt;Updating and loading repositories:
Repositories loaded.
Package                   Arch     Version                    Repository          Size
Installing:
 pdk                      x86_64   3.6.1.1-1.el9              puppet8        223.8 MiB

Transaction Summary:
 Installing:         1 package

Total size of inbound packages is 57 MiB. Need to download 57 MiB.
After this operation, 224 MiB extra will be used (install 224 MiB, remove 0 B).
Is this ok [y/N]: Y
[1/1] pdk-0:3.6.1.1-1.el9.x86_64              100% |  15.8 MiB/s |  57.0 MiB |  00m04s
--------------------------------------------------------------------------------------
[1/1] Total                                   100% |  15.8 MiB/s |  57.0 MiB |  00m04s
Running transaction
Importing OpenPGP key 0x9E61EF26:
&lt;/span&gt;&lt;span class="gp"&gt; UserID     : "Puppet, Inc. Release Key (Puppet, Inc. Release Key) &amp;lt;release@puppet.com&amp;gt;&lt;/span&gt;&lt;span class="s2"&gt;"
&lt;/span&gt;&lt;span class="go"&gt; Fingerprint: D6811ED3ADEEB8441AF5AA8F4528B6CD9E61EF26
 From       : file:///etc/pki/rpm-gpg/RPM-GPG-KEY-puppet8-release
Is this ok [y/N]: Y
The key was successfully imported.
[1/3] Verify package files                    100% |   5.0   B/s |   1.0   B |  00m00s
[2/3] Prepare transaction                     100% |   3.0   B/s |   1.0   B |  00m00s
[3/3] Installing pdk-0:3.6.1.1-1.el9.x86_64   100% |  72.0 MiB/s | 228.5 MiB |  00m03s
Complete!

&lt;/span&gt;&lt;span class="gp"&gt;root@choplifter:/home/matthew#&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;pdk &lt;span class="nt"&gt;--version&lt;/span&gt;
&lt;span class="go"&gt;3.6.1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That's all there is to it! As an added bonus, this is the same repo for Bolt and all the Puppet Core bits, so if you need the agent on your box it's as easy as another &lt;code&gt;yum install&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Or dnf. Whatever.&lt;/p&gt;

</description>
      <category>puppet</category>
      <category>pdk</category>
      <category>linux</category>
    </item>
    <item>
      <title>ConfDroid Puppet Modules - Selinux</title>
      <dc:creator>12ww1160</dc:creator>
      <pubDate>Sat, 11 Apr 2026 10:04:51 +0000</pubDate>
      <link>https://dev.to/12ww1160/confdroid-puppet-modules-selinux-4im3</link>
      <guid>https://dev.to/12ww1160/confdroid-puppet-modules-selinux-4im3</guid>
      <description>&lt;h2&gt;
  
  
  Introducing confdroid_selinux: Declarative SELinux Management for Your Rocky 9 Servers
&lt;/h2&gt;

&lt;p&gt;Security-Enhanced Linux (SELinux) is one of the most powerful built-in defenses on modern Linux systems. Unlike traditional permission-based security (user/group/other), SELinux adds &lt;strong&gt;mandatory access control (MAC)&lt;/strong&gt; at the kernel level. It labels every process, file, directory, and network port with a security context and enforces strict policies that say exactly what each subject is allowed to do with each object — no matter what the file permissions say.&lt;/p&gt;

&lt;p&gt;This means even if an attacker gains root or tricks a service into writing a malicious file, SELinux can still block the attack because the file simply doesn’t have the right context.&lt;br&gt;
Many enterprise Linux distributions enable SELinux &lt;strong&gt;by default&lt;/strong&gt; in enforcing mode on fresh installs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rocky Linux 9&lt;/li&gt;
&lt;li&gt;AlmaLinux 9&lt;/li&gt;
&lt;li&gt;Red Hat Enterprise Linux (RHEL) 9&lt;/li&gt;
&lt;li&gt;Fedora&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On these systems, SELinux is not an afterthought — it’s a core part of the security model.&lt;/p&gt;

&lt;h2&gt;
  
  
  How SELinux Stops Real-World Attacks
&lt;/h2&gt;

&lt;p&gt;Imagine an attacker sends a phishing email with a malicious script disguised as a legitimate configuration file. The user (or a compromised service) downloads and places the file in &lt;code&gt;/tmp&lt;/code&gt; or a web directory.&lt;/p&gt;

&lt;p&gt;Without SELinux:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If the file has execute permissions, the attacker might be able to run it.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With SELinux (enforcing mode):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The file gets created with the wrong security context (for example, &lt;code&gt;user_tmp_t&lt;/code&gt; instead of &lt;code&gt;httpd_exec_t&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;Even if the attacker somehow makes the file executable, SELinux denies execution or access because the policy doesn’t allow it.&lt;/li&gt;
&lt;li&gt;The attack is stopped cold, and an audit log entry is generated.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;SELinux turns potential disasters into harmless denied operations.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem with Manual SELinux Management
&lt;/h2&gt;

&lt;p&gt;While SELinux is powerful, managing it consistently across many servers is painful:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Forgetting to run &lt;code&gt;restorecon&lt;/code&gt; after placing files&lt;/li&gt;
&lt;li&gt;Accidentally setting the wrong mode (setenforce)&lt;/li&gt;
&lt;li&gt;Configuration drift between hosts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That’s exactly why I built &lt;strong&gt;confdroid_selinux&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  What confdroid_selinux Does
&lt;/h2&gt;

&lt;p&gt;This new Puppet 8 module (tested on Rocky 9) gives you full declarative control over SELinux:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Installs all required SELinux tools and binaries&lt;/li&gt;
&lt;li&gt;Manages the main configuration file &lt;code&gt;/etc/sysconfig/selinux&lt;/code&gt; with correct permissions and SELinux contexts&lt;/li&gt;
&lt;li&gt;Controls the global SELinux mode (enforcing or permissive) — the Puppet equivalent of setenforce&lt;/li&gt;
&lt;li&gt;Ensures every file and directory managed by other Confdroid modules receives the proper SELinux context&lt;/li&gt;
&lt;li&gt;Works cleanly on enforcing-mode systems&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All other Confdroid modules (see the &lt;a href="https://sourcecode.confdroid.com/confdroid/puppet_collection" rel="noopener noreferrer"&gt;full collection overview&lt;/a&gt;) already include proper SELinux context handling:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_apache" rel="noopener noreferrer"&gt;confdroid_apache&lt;/a&gt;,&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_gitea" rel="noopener noreferrer"&gt;confdroid_gitea&lt;/a&gt;,&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_php" rel="noopener noreferrer"&gt;confdroid_php&lt;/a&gt;,&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_php" rel="noopener noreferrer"&gt;confdroid_fail2ban&lt;/a&gt;,&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_automatic" rel="noopener noreferrer"&gt;confdroid_automatic&lt;/a&gt;,&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_nrpe" rel="noopener noreferrer"&gt;confdroid_nrpe&lt;/a&gt;,&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_nagios" rel="noopener noreferrer"&gt;confdroid_nagios&lt;/a&gt;,&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;and many more.&lt;/p&gt;

&lt;p&gt;They work even better when &lt;code&gt;**confdroid_selinux**&lt;/code&gt; is present, because the global policy and mode are managed in one place.&lt;/p&gt;

&lt;h2&gt;
  
  
  SELinux Management Flow with the Module
&lt;/h2&gt;

&lt;p&gt;Here’s how the module turns your Puppet run into reliable SELinux enforcement:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F20z827cy5qyeoyp8iecz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F20z827cy5qyeoyp8iecz.png" alt="Mermaid diagram" width="542" height="1166"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Easy Deployment
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Simple inclusion&lt;/strong&gt;:
in your site.pp or nodes.pp:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight puppet"&gt;&lt;code&gt;&lt;span class="k"&gt;include&lt;/span&gt; &lt;span class="nc"&gt;confdroid_selinux&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;with Foreman (recommended)&lt;/strong&gt;:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Add the &lt;code&gt;confdroid_selinux::params&lt;/code&gt; class to the host or host group and override parameters (mode, etc.) as smart class parameters.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Important notes:&lt;br&gt;
Test in a non-production environment first.&lt;br&gt;
If you are switching from disabled to enforcing mode, a reboot is required (the module does not reboot automatically to avoid surprises).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;You can find the full module, source code, and parameter reference here:&lt;br&gt;
&lt;a href="https://sourcecode.confdroid.com/confdroid/confdroid_selinux" rel="noopener noreferrer"&gt;→&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;SELinux is no longer optional on modern enterprise Linux. With &lt;code&gt;confdroid_selinux&lt;/code&gt;, you get consistent, version-controlled, and fully automated SELinux management that works hand-in-hand with the rest of the Confdroid collection.&lt;br&gt;
Your servers stay secure by default — even when things go wrong elsewhere.&lt;br&gt;
Have you been running SELinux in enforcing mode across your fleet, or are you still in permissive because of management headaches? Would you like to see more advanced features (custom Booleans, custom modules, etc.) in a future version? Let me know in the comments!&lt;/p&gt;




&lt;p&gt;Did you find this post helpful?  You can support me.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.buymeacoffee.com/grizzly_coda" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2znn4km0i2jib7ru1sm9.png" alt="" width="170" height="37"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://hetzner.cloud/?ref=EY14C8Tema9j" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyab43i0ysz9uwuq267u0.png" alt="Hetzner Referral" width="400" height="37"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://confdroid.substack.com/subscribe?params=%5Bobject%20Object%5D" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9r49xyl05rwkjb52xbqg.png" alt="Substack" width="250" height="30"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://feedback.confdroid.com/" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy7d47hck6vziak35nfgf.png" alt="ConfDroid Feedback Portal" width="300" height="63"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Related posts
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-pilot/" rel="noopener noreferrer"&gt;Confdroid Puppet Modules - Pilot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-puppet/" rel="noopener noreferrer"&gt;Confdroid Puppet Modules - Puppet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-resources/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - confdroid_resources&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-postgresql/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Postgresql&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-gitea/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Gitea&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-apache/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Apache&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-nagios/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Nagios&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-nrpe/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - NRPE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-fail2ban/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Fail2ban&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-automatic/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - Automatic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-ssh/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - SSH&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://confdroid.com/confdroid-puppet-module-java/" rel="noopener noreferrer"&gt;ConfDroid Puppet Modules - java&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>selinux</category>
      <category>security</category>
      <category>puppet</category>
      <category>foreman</category>
    </item>
    <item>
      <title>Puppet Core 8.18.0 is out: macOS 15 support and key security updates</title>
      <dc:creator>Jason St-Cyr</dc:creator>
      <pubDate>Thu, 09 Apr 2026 12:06:38 +0000</pubDate>
      <link>https://dev.to/puppet/puppet-core-8180-is-out-macos-15-support-and-key-security-updates-2ng8</link>
      <guid>https://dev.to/puppet/puppet-core-8180-is-out-macos-15-support-and-key-security-updates-2ng8</guid>
      <description>&lt;p&gt;You can now download Puppet Core &lt;strong&gt;8.18.0&lt;/strong&gt;! This update adds support for macOS 15 and includes several important security updates to help keep your infrastructure protected.&lt;/p&gt;

&lt;p&gt;As always, Puppet Core releases focus on stability, platform support, and staying ahead of reported vulnerabilities.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://help.puppet.com/core/current/Content/PuppetCore/PuppetReleaseNotes/release_notes_puppet_x-8-18-0.htm" rel="noopener noreferrer"&gt;Official Puppet Core 8.18 release notes&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  What’s new in Puppet Core 8.18.0
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Support for macOS 15&lt;/strong&gt;: Puppet Core now supports macOS 15 on both x86_64 and ARM architectures. This enables continued management of macOS systems using the same automation controls and policies you already rely on.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Security focused dependency updates
&lt;/h2&gt;

&lt;p&gt;Security remains a top priority in every Puppet Core release. This release includes updates to several bundled components to address recently disclosed security vulnerabilities. By delivering these updates as part of hardened Puppet Core builds, you reduce dependency risk without tracking, validating, or rebuilding components independently. &lt;/p&gt;

&lt;h3&gt;
  
  
  🔐 libxml2 updated
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;libxml2&lt;/strong&gt; has been updated to &lt;strong&gt;version 2.15.2&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Addresses the following CVEs:

&lt;ul&gt;
&lt;li&gt;CVE-2026-0989&lt;/li&gt;
&lt;li&gt;CVE-2026-0990&lt;/li&gt;
&lt;li&gt;CVE-2026-0992&lt;/li&gt;
&lt;li&gt;CVE-2026-1757&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔐 zlib gem updated
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;zlib gem&lt;/strong&gt; updated to &lt;strong&gt;version 3.0.1&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Addresses:

&lt;ul&gt;
&lt;li&gt;CVE-2026-27820&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔐 curl updated
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;curl&lt;/strong&gt; updated to &lt;strong&gt;version 8.19.0&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Addresses:

&lt;ul&gt;
&lt;li&gt;CVE-2026-1965&lt;/li&gt;
&lt;li&gt;CVE-2026-3783&lt;/li&gt;
&lt;li&gt;CVE-2026-3784&lt;/li&gt;
&lt;li&gt;CVE-2026-3805&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;If you rely on Puppet Core in security‑sensitive or regulated environments, this release is strongly recommended.&lt;/p&gt;




&lt;h2&gt;
  
  
  Getting Puppet Core 8.18.0
&lt;/h2&gt;

&lt;p&gt;You can upgrade to Puppet Core 8.18.0 using your existing Puppet Core repositories and standard upgrade workflows. Upgrading to Puppet Core 8.18.0 helps you take advantage of the latest platform support, reduce exposure to dependency related security risk, and rely on vendor-tested packages instead of managing updates yourself.&lt;/p&gt;

&lt;p&gt;As always:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Test upgrades in a staging environment first&lt;/li&gt;
&lt;li&gt;Review the full release notes for platform‑specific details&lt;/li&gt;
&lt;li&gt;Roll out broadly once validated&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;📄 &lt;strong&gt;Puppet Core Installation Docs:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/core/current/Content/PuppetCore/install_puppet.htm" rel="noopener noreferrer"&gt;Installing Puppet Core&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://help.puppet.com/core/current/Content/PuppetCore/upgrade.htm" rel="noopener noreferrer"&gt;Upgrading Puppet Core&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Let us know how it goes
&lt;/h2&gt;

&lt;p&gt;If you’re upgrading to 8.18.0, running Puppet Core on macOS 15, or have feedback on this release, let us know in the comments. Your input helps shape future updates.&lt;/p&gt;

&lt;p&gt;Happy puppeting!&lt;/p&gt;

</description>
      <category>puppet</category>
      <category>devops</category>
      <category>security</category>
      <category>automation</category>
    </item>
  </channel>
</rss>
