Install *nix agents
Sections
You can install agents on *nix nodes with the install script, from the Puppet Enterprise (PE) console, with PE package management, your own package management, with or without internet access, and more.
We recommend you Install agents with the install script or Install agents from the console whenever possible, and we've described other cases here for your reference. For non-root agents, refer to Install non-root *nix agents.
- AIX
- Solaris 11
Install *nix agents with PE package management
Puppet Enterprise (PE) provides its own package management to help you install agents on *nix and macOS nodes. You can use this process with or without internet access.
If you're installing an agent with a different OS than your primary server, you must
declare the corresponding pe_repo
class on the primary server, such
as pe_repo::platform::el_8_x86_64
. You can declare these classes in
the console at .
/opt/puppetlabs/server/data/staging/pe_repo-puppet-agent-<AGENT_VERSION>
Copied!
For
example, the directory for agent version 8.11.0
is:/opt/puppetlabs/server/data/staging/pe_repo-puppet-agent-8.11.0/
Copied!
Authentication credentials
Because Puppet Enterprise agent packages are stored in a private repository, you must authenticate to access and download the packages.
license-id
as your username and
use your PE License ID as the password. You can find your PE License ID in your PE
license file or in the PE console by selecting License from the
navigation bar. Authentication procedures
You can use either of the following procedures to authenticate:
- Create and configure a
.netrc
file - Export credentials to environment variables
Create and configure a .netrc file
A .netrc
file is a configuration file used by many
command-line tools and programs, including curl, FTP, and Git. The primary purpose of the
file is to store login credentials.
.netrc
file: - Create a file named
.netrc
by running the following commands:touch ~/.netrc chmod 600 ~/.netrc
Copied! -
Edit the file to add your credentials, where
license-id
is a string literal and <PE_License_ID> is your PE License ID:machine artifacts-puppetcore.puppet.com login license-id password <PE_License_ID>
Copied! - Run a command with the
--netrc
option so that the credentials stored in the.netrc
file are used for authentication, as shown in the following example:
curl --netrc 'https://artifacts-puppetcore.puppet.com/v1/download?version=8.11.0&type=perepo&os_name=el&os_version=9&os_arch=x86_64' -J -O
Copied!
Export credentials to environment variables
You can directly curl the endpoints with credentials by completing the following steps:
- Export the credentials, where
license-id
is a string literal and <PE_License_ID> is your PE License ID:export USERNAME=license-id export PASSWORD=<PE_License_ID>
Copied! - Call the credentials from the URL, as shown in the following example:
curl -u $USERNAME:$PASSWORD 'https://artifacts-puppetcore.puppet.com/v1/download?version=8.11.0&type=perepo&os_name=el&os_version=9&os_arch=x86_64' -J -O
Copied!
Request parameters
The following request parameters are accepted by the artifact download endpoint.
Name | Type | Default | Example | Description |
---|---|---|---|---|
version | String | None | 8.11.0 | The package version. |
os_name | String | None | amazon | The name of the operating system. For a list of valid names, see operating systems. |
os_version | String | None | 2023 | The operating system version. For a list of valid versions, see operating systems. |
os_arch | String | None | aarch64 | The operating system architecture. For a list of valid architectures, see operating systems. |
Operating system names, versions, and architectures
The following table lists currently valid values for the os_name
, os_version
, and os_arch
parameters.
Name | Full name | Version | Architecture |
---|---|---|---|
aix | AIX | 7.2 | architecture ppc |
amazon | Amazon Linux | 2, 2023, and so on | x86_64, aarch64 |
debian | Debian | 10, 11, and so on | amd64, arm64 |
el | Red Hat Enterprise Linux | 7, 8, and so on | x86_64, aarch64, ppc64le |
fedora | Fedora Linux | 40 and so on | x86_64 |
osx | macOS | 14 and so on | x86_64, arm64 |
redhatfips | Redhat (FIPS) | 7, 8, 9 | x86_64 |
sles | SUSE Linux Enterprise Server | 12, 15 | x86_64 |
solaris
|
Solaris | 11 | 11: x86_64, SPARC |
ubuntu | Ubuntu | 22.04 and so on | amd64, arm64 |
windows | Microsoft Windows | Ignored | x86, x64 |
windowsfips | Windows (FIPS) | Ignored | x64 |
Example
-
<username> is a string literal,
license-id
- <password> is the PE License ID
Content disposition
Content disposition is enabled for these packages and can be used while downloading
packages to store them with their default name. Use –J
–O
only with curl. For wget, use the following structure:
wget --content-disposition <URL>
Copied!
<PRIMARY_HOSTNAME>
portion of the installer script—as
provided in the following example—refers to the FQDN of the primary server. The FQDN
must be fully resolvable by the machine on which you're installing or upgrading the
agent.- SSH into the node where you want to install the agent and run the command
appropriate to your environment:Choose from:
-
curl:
uri='https://<PRIMARY_HOSTNAME>:8140/packages/current/install.bash' curl -k "$uri" | sudo bash
Copied!
-
wget:
wget -O - -q --no-check-certificate https://<PRIMARY_HOSTNAME>:8140/packages/current/install.bash | sudo bash
Copied!
-
Solaris
sudo export PATH=$PATH:/opt/sfw/bin wget -O - -q --no-check-certificate --secure-protocol=TLSv1 https://<PRIMARY_HOSTNAME>:8140/packages/current/install.bash | bash
Copied!
-
curl:
- Run
puppet agent -t
to add the node to the node inventory and generate the CSR. - Accept the CSR as explained in Managing certificate signing requests.
Install *nix agents with your own package management
You can use your own package management tools, instead of Puppet Enterprise (PE) package management, to install agents. You can use this method with or without internet access.
Download the appropriate agent tarball.
Install *nix agents using a manually-transferred certificate
If you can't, or don't, use -k
or --insecure
to trust the primary server during agent installation, you can
manually copy the primary server CA certificate to any *nix
machines you want to install agents on, and then run a variation of the agent install script
against that cert.
Install *nix agents from compilers using your own package management
If your infrastructure relies on compilers to install agents, you don’t have to copy the agent package to each compiler. Instead, you can use the console to specify a path to the agent package on your package management server.
Download the appropriate agent tarball.
- Add the agent package to your own package management and distribution system.
-
Set the
base_path
parameter of thepe_repo
class to point to your package management server.- In the console, click Node groups, and in the PE Infrastructure group, select the PE Master group.
-
On the Classes tab, find the
pe_repo
class, and set thebase_path
parameter to your package management server's FQDN. - Click Add parameter and commit changes.
- Follow the steps to Install *nix agents with your own package management.