Puppet

Portland, OR, USA
2005
  |  By David Sandilands
Platform engineering metrics and/or platform engineering KPIs (Key Performance Indicators) can help us measure the success of this evolving approach and its impact on DevOps. According to our 2024 State of DevOps Report: The Evolution of Platform Engineering — 43% of organizations report that they have had a platform team from 3-5 years already. With this maturity, it’s important to measure what’s working and what isn’t working using the same indicators of success across the board.
  |  By Robin Tatam
SOC 2 compliance requirements (Service Organization Controls Type 2) ensure that customer data stays private and secure — essential for any business that stores or processes sensitive data. In this blog, we’ll explore the specifics of SOC 2 compliance, and provide a solution to help you automate and enforce SOC 2 compliance going forward.
  |  By Robin Tatam
Your cloud platform probably came with tools to secure and manage the resources you create. We call those cloud-native security tools because they’re proprietary to the vendor you’re using them on. Third-party alternatives, on the other hand, are usually created to be compatible with several cloud provider platforms at once.
  |  By Puppet
Security and compliance are important in any organization. And most organizations use open source software (OSS) somewhere in their application stack. Open source compliance keeps OSS technologies secure by making sure they’re used in a way that aligns with security best practices, internal policies, and regulatory expectations.
  |  By David Sandilands
What does the platform engineering roadmap look like as we head into its continued maturity? We recently conducted a survey to better understand the role and state of platform engineering — emphasizing those organizations who are using this tactic to greater success. Using this data, we will peek into the future and see where platform engineering is headed next.
  |  By Robin Tatam
CMMC 2.0 requirements are here — and The Cybersecurity Maturity Model Certification (CMMC) is mandatory for organizations involved in the Defense Industrial Base (DIB). Established by the Department of Defense, this framework outlines strict cybersecurity standards, aiming to safeguard Controlled Unclassified Information (CUI) throughout for contractors and subcontractors of the Department.
  |  By Mindy Moreland
Role-based access control (RBAC) is a way to secure IT systems and networks by limiting access to roles that can be assigned to individuals and groups of users. It makes sense for just about any IT team. After all, not everyone needs access to everything in a system, right? Different roles have different responsibilities, and those responsibilities require access to different things. RBAC makes sure that only the users who need access to certain services and resources have it.
  |  By Robin Tatam
Configuration management tools can help you track and manage changes to systems within your infrastructure, making sure that your software and hardware runs reliably and smoothly.
  |  By Perforce
Security and compliance policy management tops the list of gaps for organizations.
  |  By Stephen K. Potter
Why make a migration from Ansible to Puppet — or in some cases, start with Puppet over Ansible right out of the gate? In this blog, we’ll explore some common reasons that organizations say they chose Puppet over Ansible, citing specific use case examples around the functionality of each platform.
  |  By Puppet
From the largest physics laboratory in the world to a telescope network scattered across the planet to a design firm building roads and parks around the globe to an air navigation service provider that guides 1.2 million flights each year, 40,000 companies rely on Puppet to automate their infrastructure – with security and compliance baked right in. Puppet’s IT automation suite incorporates security, compliance, and innovation from day one to power Day 2 operations (and beyond), so your teams can spend less time managing IT infrastructure and more time changing the world.
  |  By Puppet
With Puppet, the power of IT automation empowers you. Learn more at puppet.com. Too many companies use patchwork solutions for configuration management and IT automation, leading to unmanageable complexity and huge security risks. IT operators are on-call day and night to address security breaches, and toil for weeks manually provisioning servers. But no one would expect you to wash 10,000 dishes by hand – so why are IT operators expected to configure 10,000 servers manually?
  |  By Puppet
Need to send some files to Puppet Support? Use our internally hosted file transfer solution. Read the article for more information.
  |  By Puppet
Puppet Support Explain how to change the version of a Forge module deployed in your Puppet Enterprise Environment Please note it is not considered best practice to declare `:latest` rather than a specific version tag in your PuppetFile as this could lead to untested module combinations being deployed to your environment. Commands Used: puppet-code deploy production --wait -l debug puppet module list --environment=production
  |  By Puppet
Occasionally in Puppet Enterprise, you may need to change the port PuppetDB consumes, for instance, if another service requires port 8081. While we in Puppet Support recommend that you change the port for the other service. If you can’t do that, Follow this Video and the attached Knowledge base article for a guide on changing the port.
  |  By Puppet
Welcome to Puppet Comply! Achieving and maintaining a compliant state doesn't have to be a headache. With Puppet Comply, you can easily find & fix compliance issues and achieve continuous compliance at scale.
  |  By Puppet
An overview of the concept of metrics in Puppet Supporting links
  |  By Puppet
Instruction on Collecting and Displaying Puppet Metrics, from Support Engineer Adrian Parreiras Horta
  |  By Puppet
How to Interpret Puppet Metrics, With Support Engineer Adrian Parreiras Horta
  |  By Puppet
Puppet Enterprise users can deliver infrastructure faster with Continuous Delivery for Puppet Enterprise. Watch this demo to learn how to automate testing and delivery of Puppet code from the commit all the way through deploying code into production.
  |  By Puppet
As organizations move along their digital transformation journey, they will encounter technical challenges and pitfalls along the way. While the destination offers many benefits, getting there can be hard. It takes experience and knowledge, along with technical expertise, to navigate this path to a more agile, flexible organization. Learn how to get there in this white paper.
  |  By Puppet
A primary goal of most DevOps initiatives is to increase the speed and agility of software development and delivery. Unfortunately, this objective often seems to be at odds with good security practices, reducing the window of time for security assessment and introducing new attack vectors. But DevOps and security don't have to be mutually exclusive. In fact, the principles that drive good outcomes for software development can also lead to more secure infrastructure. Read the ebook for guidance on designing a DevOps workflow that incorporates - and enhances - security.
  |  By Puppet
If you're managing an IT team, you may be turning to DevOps as the path to faster delivery of software. DevOps can help your team become more efficient - and your organization more competitive - but you'll need to be able to communicate to your team why things are changing and how their usual working practices are likely to alter. In this guide we tease out the whys and hows of DevOps as you work with your team and the approaches that make a DevOps initiative successful.
  |  By Puppet
Speeding remediation reduces the cost of compliance and vulnerability of the IT estate. When looking for issues that slow remediation, notice the hand off from security to IT. Download this free resource to learn how the interaction between IT and Security can be improved to speed compliance.
  |  By Puppet
With the proliferation of high-profile hacks, data breaches and ransomware, it's easy to feel insecure about your organization's security these days. But not all security issues have to do with purposeful hacks and attacks. For many IT teams, the challenge is maintaining strict rules and regulatory requirements for everything from credit card data to health information privacy. Failing to maintain compliance can put your organization at risk of everything from lost business to substantial fines - or worse.
  |  By Puppet
With the right foundation and optimizations, your teams can successfully adopt continuous delivery practices - and deliver software faster, with fewer bugs and lower risk. If you're getting started with continuous delivery or evolving your approach, there are a few strategic considerations that can keep you on the right path.
  |  By Puppet
In this paper, we talk about four common challenges to today's software delivery automation and discuss how you can overcome those challenges. Continuous delivery (CD) enables organizations to deliver quality software in record time, helping businesses meet rapidly growing and changing demands. As CD practices and tools have matured, more organizations and teams are beginning - or are well down the path of - their own journeys, using automation to speed up software delivery.
  |  By Puppet
Are you looking to migrate from your on-premises data center to AWS - or to accelerate the process? Or would you like a simple and reliable way to manage your infrastructure and applications across all your environments? Puppet can help.

Puppet is driving the movement to a world of unconstrained software change. Our revolutionary platform is the industry standard for automating the delivery and operation of the software that powers everything around us.

It isn’t humanly possible to keep up with the constant innovation and risks that new technology brings. Automation has become a requirement, and Puppet sets the standard for delivering and managing your IT estate predictably and at scale. Our solutions automate how you continuously deliver, make compliant, remediate, and manage your multi-cloud environment. So you can focus on more important things in your life.

Use Cases:

  • Continuous Delivery: Ship more, do more with the right continuous delivery workflows and tools to increase your development and operations teams’ agility. They lower time to value of your infrastructure and the software it runs.
  • Continuous Compliance: The alphabet soup of regulatory standards and security best practices you try to comply with — and the associated penalties for not doing so — are no joke. Auditors expect your teams to implement and abide by operational, security, and regulatory policies 24/7, and to prove it when they show up.
  • Incident Remediation: With the proliferation of high-profile hacks, data breaches, and ransomware, it’s easy to feel insecure about your organization’s security. You have to protect your company like never before — particularly as your infrastructure grows and diversifies, presenting a broader surface for attackers.
  • Configuration Management: Are you spending more time fighting fires than deploying new, innovative services and applications? You are not alone. Most IT teams say it takes weeks, even months, to deploy critical applications. There’s got to be a better way to manage infrastructure. With automation, you eliminate manual work, minimize risk of human error, and make it possible to deploy fast, safely and reliably.

Make infrastructure actionable, scalable and intelligent.