PE release notes
Sections
These are the new features, enhancements, resolved issues, and deprecations in this version of PE.
PE 2021.1
Released May 2021
Enhancements
Customize value report estimates
You can now customize the low
, med
, and high
time-freed estimates
provided by the PE value report by specifying any of
the value_report_*
parameters in the PE Console
node group in the puppet_enterprise::profile::console
class.
Add a custom disclaimer banner to the console
You can optionally add a custom disclaimer banner to the console login page. To add a banner, see Create a custom login disclaimer.
Configure and view password complexity requirements in the console
There are configurable password complexity requirements that local users see when creating a new password. For example, "Usernames must be at least {0} characters long." To configure the password complexity options, see Password complexity parameters.
Re-download CRL on a regular interval
You can now configure the new parameter crl_refresh_interval
to
enable puppet agent to re-download its CRL on a regular interval. Use the console to
configure the interval in the PE Agent group, in the
puppet_enterprise::profile::agent
class, and enter a duration
(e.g. 60m) for Value.
Remove staging directory status for memory, disk usage, and timeout error improvements
The status output of the file sync storage service (specifically at the
debug
level), no longer reports the staging directory’s status.
This staging information removal reduces timeout errors in the logs, removes heavy
disk usage created by the endpoint, and preserves memory if there are many
long-running status checks in the Puppet Server.
Exclude events from usage endpoint response
In the /usage
endpoint, the new events
parameter allows you to specify whether to
include
or exclude
event activity information from the response. If set to
exclude
, the endpoint only returns information
about node counts.
Avoid spam during patching
The patching task and plan now log fact generation, rather than echoing Uploading facts. This change reduces spam from servers with a large amount of facts.
Parameter name updates
As part of the ongoing effort to remove harmful terminology, the parameter master_uris
was renamed primary_uris
.
Changes to defaults
- The environment timeout settings introduced in 2019.8.3 have been updated to
simplify defaults. When you enable Code Manager,
environment_timeout
is now set to 5m, clearing short-lived environments 5 minutes from when they were last used. Theenvironment_timeout_mode
parameter has been removed, and the timeout countdown on environments now always begins from their last use.
Platform support
This version adds support for these platforms.
- Fedora 32
Deprecations and removals
Configuration settings deprecated
The following configuration setting names are deprecated in favor of new terminology:
Previous setting names | New setting names |
---|---|
master-conf-dir |
server-conf-dir |
master-code-dir |
server-code-dir |
master-var-dir |
server-var-dir |
master-log-dir |
server-log-dir |
master-run-dir |
server-run-dir |
The previous setting names are available for backwards compatibly, but you must upgrade to the newer setting names at your earliest convenience.
Resolved issues
Upgrade failed with cryptic errors if agent_version
was configured for your infrastructure pe_repo
class
If you configured the agent_version
parameter for the
pe_repo
class that matches your infrastructure
nodes, upgrade could fail with a timeout error when the installer attempted to
download a non-default agent version. The installer now warns you to remove the
agent_version
parameter if applicable.
Upgrade with versioned deploys caused Puppet Server crash
If versioned_deploys
was enabled when upgrading to version 2019.8.6
or 2021.1, then the Puppet Server crashed.
Compiler upgrade failed with client certnames defined
Existing settings for client certnames could cause upgrade to fail on compilers, typically with the error Value does not match schema: {:client-certnames disallowed-key}.
Compiler upgrade failed with no-op configured
Upgrade failed on compilers running in no-op mode. Upgrade now proceeds on infrastructure nodes regardless of their no-op configuration.
Installing Windows agents with the .msi package
failed with a non-default INSTALLDIR
When installing Windows agents with the .msi package,
if you specified a non-default installation directory, agent files were nonetheless
installed at the default location, and the installation command failed when
attempting to locate files in the specified INSTALLDIR
.
Patching failed on Windows nodes with non-default agent location
On Windows nodes, if the Puppet agent was installed to a location other than the default C: drive, the patching task or plan failed with the error No such file or directory.
Patching failed on Windows nodes when run during a fact generation
The patching task and plan failed on Windows nodes if run during fact generation. Patching and fact generation processes, which share a lock file, now wait for each other to finish before proceeding.
File sync failed to copy symlinks if versioned deploys was enabled
If you enabled versioned deploys, then the file sync client failed to copy symlinks and incorrectly copied the symlinks' targets instead. This copy failure crashed the Puppet Server.
Backup failed with an error about the stockpile
directory
The puppet-backup create
command failed under certain
conditions with an error that the /opt/puppetlabs/server/data/puppetdb/stockpile
directory was
inaccessible. That directory is now excluded from backup.
Console reboot task failed
Rebooting a node using the reboot task in the console failed due to the removal of win32 gems in Puppet 7. The reboot module packaged with PE has been updated to version 4.0.2, which resolves this issue.
Removed Pantomime dependency in the orchestrator
The version of pantomime in the orchestrator had a third party vulnerability (tika-core). Because of the vulnerability, pantomime usage was removed from the orchestrator, but pantomime still existed in the orchestration-services build. The dependency has now been completely removed.
Injection attack vulnerability in csv exports
There was a vulnerability in the console where .csv
files could contain malicious user input when exported. The values =
, +
, -
, and @
are now
prohibited at the beginning of cells to prevent an injection attack.
License page in the console timed out
Some large queries run by the License page caused the page to have trouble loading and timeout.
PE 2021.0
Released February 2021
New features
SAML support
SAML 2.0 support allows you to securely authenticate users with single sign-on (SSO) and/or multi-factor authentication (MFA) through your SAML identity provider. To configure SAML in the console, see Connect a SAML identity provider to PE.
Enhancements
Generate, view, and revoke tokens in the console
In the console, on the My account page, in the Tokens tab, you can create and revoke tokens, or view a list of your currently active tokens. Administrators can view and revoke another user's tokens on the User details page.
Migrate CA files to the new default directory
/etc/puppetlabs/puppetserver/ca
from its previous location at /etc/puppetlabs/puppet/ssl/ca
. This change helps prevent
unintentionally deleting your CA files in the process of regenerating certificates. If
applicable, you're prompted with CLI instructions for migrating your CA directory after
upgrade.
/opt/puppetlabs/bin/puppet resource service pe-puppetserver ensure=stopped
/opt/puppetlabs/bin/puppetserver ca migrate
/opt/puppetlabs/bin/puppet resource service pe-puppetserver ensure=running
/opt/puppetlabs/bin/puppet agent -t
Copied!
Install the Puppet agent despite issues in other yum repositories
When installing the Puppet agent on a node, the installer's yum operations are now limited to the PE repository, allowing the agent to be installed successfully even if other yum repositories have issues.
Get better insight into replica sync status after upgrade
Improved error handling for replica upgrades now results in a warning instead of an error if re-syncing PuppetDB between the primary and replica nodes takes longer than 15 minutes.
Fix replica enablement issues
When provisioning and enabling a replica (puppet infra provision
replica --enable
), the command now times out if there are issues syncing PuppetDB, and provides instructions for fixing any issues
and separately provisioning the replica.
Patch nodes with built-in health checks
The new group_patching
plan patches nodes with pre- and
post-patching health checks. The plan verifies that Puppet is configured and running correctly on target nodes, patches the nodes, waits for any
reboots, and then runs Puppet on the nodes to verify that
they're still operational.
Run a command after patching nodes
A new parameter in the pe_patch
class, post_patching_scriptpath
enables you to run an executable
script or binary on a target node after patching is complete. Additionally, the pre_patching_command
parameter has been renamed pre_patching_scriptpath
to more clearly indicate that you
must provide the file path to a script, rather than an actual command.
Patch nodes despite certain read-only directory permissions
Patching files have moved to more established directories that are less likely to be
read-only: /opt/puppetlabs/pe_patch
for *nix, and C:\ProgramData\PuppetLabs\pe_patch
for Windows. Previously, patching files were located at /var/cache/pe_patch
and /usr/local/bin
for
*nix and C:\ProgramData\pe_patch
for Windows.
- Before upgrading, optionally back up existing patching log files, located on
patch-managed nodes at
/var/cache/pe_patch/run_history
orC:\ProgramData\pe_patch
. Existing log files are deleted when the patching directory is moved. - After upgrading, you must run Puppet on patch-managed nodes before running the patching task again, or the task fails.
Use Hiera lookups outside of apply blocks in plans
You look up static Hiera data in plans outside of apply
blocks by adding the plan_hierarchy
key to your Hiera
configuration.
See the duration of Puppet and plan runs
New duration
, created_timestamp
, and finished_timestamp
keys allow you to see the duration of Puppet and plan runs in the GET /jobs and GET /plan_jobs endpoints.
View the error location in plan error details
The puppet plan functions provide the file and line number where the error occurred in
the details
key of the error response.
Run plans on PuppetDB queries and node classifier group targets
The params
key in the POST /command/environment_plan_run endpoint allows you
to specify PuppetDB queries and node groups as targets
during a plan run.
Use masked inputs for sensitive parameters
The console now uses password inputs for sensitive parameter in tasks and plans to mitigate a potential "over the shoulder" attack vector.
Configure how many times the orchestrator allows status request timeouts
Configure the new allowed_pcp_status_requests
parameter
to define how many times an orchestrator job allows status requests to time out before
the job fails. The parameter defaults to "35"
timeouts.
You can use the console to configure it in the PE Orchestrator
group, in the puppet_enterprise::profile::orchestrator
class.
Accept and store arbitrary data related to a job
userdata
key allows you to supply arbitrary
key-value data to a task, plan, or Puppet run. The key
was added to the following endpoints:- POST /command/deploy
- POST /command/task
- POST /command/plan_run
- POST /command/environment_plan_run
- GET /jobs
- GET /jobs/:job-id
- GET /plan_jobs
- GET /plan_jobs:/job-id
Sort and reorder nodes in node lists
New optional parameters are available in the GET /jobs/:job-id/nodes endpoint that allow you to sort and reorder node names in the node list from a job.
Add custom parameters when installing agents in the console
In the console, on the Install agent on nodes, you can click
Advanced install and add custom parameters to the pe_boostrap
task during installation.
Update facts cache terminus to use JSON or YAML
The facts cache terminus is now JSON by default. You can configure the
facts_chache_terminus
parameter to switch from JSON to YAML. Use the
console to configure the parameter in the PE Master group, in the
puppet_enterprise::profile::master::puppetdb
class, and enter
yaml
for Value.
Configure failed deployments to display r10k stacktrace in error output
Configure the new r10k_trace
parameter to include the
r10k stack trace in the error output of failed deployments. The parameter defaults to
false
. Use the console to configure the parameter in
the PE Master group, in the puppet_enterprise::master::code_manager
class, and enter true
for Value.
Reduce query time when querying nodes with a fact filter
When you run a query in the console that populates information on the
Status page to PuppetDB, the
query uses the optimize_drop_unused_joins feature in PuppetDB to increase performance when filtering on facts.
You can disable drop-joins by setting the environment variable PE_CONSOLE_DISABLE_DROP_JOINS=yes
in /etc/sysconfig/pe-console-services
and restarting the console
service.
Deprecations and removals
Platforms deprecated
Support for these agent platforms is deprecated in this release.
- Enterprise Linux 5
- Enterprise Linux 7 ppc64le
- SUSE Linux Enterprise Server 11
- SUSE Linux Enterprise Server 12 ppc64le
- Ubuntu 16.04 ppc64le
- Debian 8
- Solaris 10
- Microsoft Windows 7, 8.1
- Microsoft Windows Server 2008, 2008 R2
Platforms removed
Support for these agent platforms is removed in this release. Before upgrading to
this version, remove the pe_repo::platform
class for
these operating systems from the PE Master node group in the
console, and from your code and Hiera.
- AIX 6.1
- Enterprise Linux 4
- Enterprise Linux 6, 7 s390x
- Fedora 26, 27, 28, 29
- Mac OS X 10.9, 10.12, 10.13
- SUSE Linux Enterprise Server 11, 12 s390x
Resolved issues
PuppetDB restarted continually after upgrade with deprecated parameters
After upgrade, if the deprecated parameters facts_blacklist
or cert_whitelist_path
remained, PuppetDB restarted after each Puppet run.
Tasks failed when specifying both
as the input
method
In task metadata, using both
for the input method
caused the task run to fail.
Patch task misreported success when it timed out on Windows nodes
If the pe_patch::patch_server
task took longer than
the timeout setting to apply patches on a Windows
node, the debug output noted the timeout, but the task erroneously reported that it
completed successfully. Now, the task fails with an error noting that the task timed
out. Any updates in progress continue until they finish, but remaining patches
aren't installed.
Orchestrator created an extra JRuby pool
During startup, the orchestrator created two JRuby
pools - one for scheduled jobs and one for everything else. This is because the JRuby pool was not yet available in the configuration
passed to the post-migration-fa
function, which
created its own JRuby pool in response. These JRuby pools accumulated over time because the stop
function didn't know about them.
Console install script installed non-FIPS agents on FIPS Windows nodes
The command provided in the console to install Windows nodes installed a non-FIPS agent regardless of the node's FIPS status.
Unfinished sync reported as finished when clients shared the same identifier
Because the orchestrator and puppetserver file sync clients shared the same
identifier, Code Manager reported an unfinished sync as
"all-synced": true
. Whichever client finished polling first,
notified the storage service that the sync was complete, regardless of the other
client's sync status. This reported sync might have caused attempts to access tasks
and plans before the newly-deployed code was available.
Refused connection in orchestrator startup caused PuppetDB migration failure
A condition on startup failed to delete stale scheduled jobs and prevented the orchestrator service from starting.
Upgrade failed with Hiera data based on certificate extensions
If your Hiera hierarchy contained levels based off
certificate extensions, like {{trusted.extensions.pp_role}}
, upgrade could fail if that Hiera entry was vital to running services, such as
{{java_args}}
. The failure was due to the
puppet infrastructure recover_configuration
command, which runs during upgrade, failing to recognize the hierarchy level.
File sync issued an alert when a repository had no commits
When a repository had no commits, the file sync status recognized this repository’s state as invalid and issued an alert. A repository without any commits is still a valid state, and the service is fully functional even when there are no commits.
Upgrade failed with infrastructure nodes classified based on trusted facts
If your infrastructure nodes were classified into an environment based on a trusted fact, the recover configuration command used during upgrade could choose an incorrect environment when gathering data about infrastructure nodes, causing upgrade to fail.
Patch task failed on Windows nodes with old logs
When patching Windows nodes, if an existing patching log file was 30 or more days old, the task failed trying to both write to and clean up the log file.
Backups failed if a Puppet run was in progress
The puppet-backup
command failed if a Puppet run was in progress.
Default branch override did not deploy from the module's default branch
A default branch override did not deploy from the module’s default branch if the branch override specified by Impact Analysis did not exist.
Module-only environment updates did not deploy in Versioned Deploys
Module-only environment updates did not deploy if you tracked a module's branch and redeployed the same control repository SHA, which pulled in new versions of the modules.