{"id":341,"date":"2016-04-13T21:18:14","date_gmt":"2016-04-13T21:18:14","guid":{"rendered":"https:\/\/www.securekloud.com\/blog\/?p=341"},"modified":"2025-07-28T07:31:04","modified_gmt":"2025-07-28T07:31:04","slug":"puppet-an-introduction","status":"publish","type":"post","link":"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/","title":{"rendered":"Puppet \u2013 An Introduction"},"content":{"rendered":"<p>Most common issue while building and maintaining large infrastructure has always been wastage of time. Amount of redundant work performed by each member within team is significant. The idea of automatically configuring and deploying infrastructures has evolved out of a wider need to address this particular problem.<\/p>\n<p>Puppet and Chef are few among the many configuration management&nbsp;packages&nbsp;available. They offer a framework for describing your application\/server configuration in a text-based format. Instead of manually installing IIS on each of your web servers, you can instead write a configuration file which says \u201call web servers must have IIS installed\u201d.<\/p>\n<p><strong>What Is Puppet ?<\/strong><br \/>\nPuppet is Ruby -based configuration management software, and it can run in either client-server or stand-alone mode. It&nbsp;can be used to manage configuration on UNIX (including OS X), Linux, and Microsoft Windows platforms. It is designed to interact with your hosts in continuous fashion,Unlike other provisioning tools that build your hosts and leave them on their own.<\/p>\n<p>You define a \u201cDesired State\u201d for every node (agents) on puppet master. If agent node&nbsp;doesn\u2019t&nbsp;resemble desired&nbsp;state, in puppet terms \u201cdrift\u201d has&nbsp;occurred.&nbsp;Actual decision on how your machine is suppose to look is done by the master, whereas agents only provides data about itself and then responsible for actually applying those decisions. By&nbsp;default each agent will contact master every 30 min, which can be customized. The way this entire process work can be summed with this workflow.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-342 size-full\" src=\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/puppet-process-Data-flow.png\" alt=\"\" width=\"550\" height=\"416\" srcset=\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/puppet-process-Data-flow.png 550w, https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/puppet-process-Data-flow-300x227.png 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/p>\n<ol>\n<li>Each nodes sends its current information (current state) in the form of facts.<\/li>\n<li>Puppet master will use these facts and compile a catalog about desired state of that agent, and send it back to agent.<\/li>\n<li>Agent will enforce the configuration as specified in catalog, and send the report back to master to indicate the&nbsp;success\/failure.<\/li>\n<li>Puppet Master will generate the detailed report which can be feed to any third party tool for monitoring.<\/li>\n<\/ol>\n<p>Credits -Uthkarsh pandey<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most common issue while building and maintaining large infrastructure has always been wastage of time. Amount of redundant work performed by each member within team is significant. The idea of automatically configuring and deploying infrastructures has evolved out of a wider need to address this particular problem. Puppet and Chef are few among the many [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":343,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[327],"tags":[],"class_list":["post-341","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-architecture"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Puppet \u2013 An Introduction | SecureKloud<\/title>\n<meta name=\"description\" content=\"Get an introduction to Puppet, a powerful configuration management tool that automates infrastructure provisioning and ensures consistency at scale.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Puppet \u2013 An Introduction | SecureKloud\" \/>\n<meta property=\"og:description\" content=\"Get an introduction to Puppet, a powerful configuration management tool that automates infrastructure provisioning and ensures consistency at scale.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/\" \/>\n<meta property=\"og:site_name\" content=\"SecureKloud\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-13T21:18:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-28T07:31:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/puppet-an-introduction_v1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Uthkarsh Pandey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Uthkarsh Pandey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/\"},\"author\":{\"name\":\"Uthkarsh Pandey\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/adbd2e496b9f1f3b6f44a5c02d244e49\"},\"headline\":\"Puppet \u2013 An Introduction\",\"datePublished\":\"2016-04-13T21:18:14+00:00\",\"dateModified\":\"2025-07-28T07:31:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/\"},\"wordCount\":333,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\"},\"articleSection\":[\"Cloud Architecture\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/\",\"name\":\"Puppet \u2013 An Introduction | SecureKloud\",\"isPartOf\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#website\"},\"datePublished\":\"2016-04-13T21:18:14+00:00\",\"dateModified\":\"2025-07-28T07:31:04+00:00\",\"description\":\"Get an introduction to Puppet, a powerful configuration management tool that automates infrastructure provisioning and ensures consistency at scale.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.securekloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Puppet \u2013 An Introduction\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#website\",\"url\":\"https:\/\/www.securekloud.com\/blog\/\",\"name\":\"SecureKloud\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.securekloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\",\"name\":\"SecureKloud\",\"url\":\"https:\/\/www.securekloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png\",\"contentUrl\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png\",\"width\":240,\"height\":48,\"caption\":\"SecureKloud\"},\"image\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/adbd2e496b9f1f3b6f44a5c02d244e49\",\"name\":\"Uthkarsh Pandey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/utkarsh-pandey-150x150.jpg\",\"contentUrl\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/utkarsh-pandey-150x150.jpg\",\"caption\":\"Uthkarsh Pandey\"},\"description\":\"A principal cloud consultant with over a decade of experience in the field. He has a deep understanding of cloud technologies and is passionate about helping businesses leverage the benefits of cloud computing.\",\"url\":\"https:\/\/www.securekloud.com\/blog\/author\/uthkarsh-pandey\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Puppet \u2013 An Introduction | SecureKloud","description":"Get an introduction to Puppet, a powerful configuration management tool that automates infrastructure provisioning and ensures consistency at scale.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/","og_locale":"en_US","og_type":"article","og_title":"Puppet \u2013 An Introduction | SecureKloud","og_description":"Get an introduction to Puppet, a powerful configuration management tool that automates infrastructure provisioning and ensures consistency at scale.","og_url":"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/","og_site_name":"SecureKloud","article_published_time":"2016-04-13T21:18:14+00:00","article_modified_time":"2025-07-28T07:31:04+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/puppet-an-introduction_v1.jpg","type":"image\/jpeg"}],"author":"Uthkarsh Pandey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Uthkarsh Pandey","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/#article","isPartOf":{"@id":"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/"},"author":{"name":"Uthkarsh Pandey","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/adbd2e496b9f1f3b6f44a5c02d244e49"},"headline":"Puppet \u2013 An Introduction","datePublished":"2016-04-13T21:18:14+00:00","dateModified":"2025-07-28T07:31:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/"},"wordCount":333,"commentCount":0,"publisher":{"@id":"https:\/\/www.securekloud.com\/blog\/#organization"},"articleSection":["Cloud Architecture"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/","url":"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/","name":"Puppet \u2013 An Introduction | SecureKloud","isPartOf":{"@id":"https:\/\/www.securekloud.com\/blog\/#website"},"datePublished":"2016-04-13T21:18:14+00:00","dateModified":"2025-07-28T07:31:04+00:00","description":"Get an introduction to Puppet, a powerful configuration management tool that automates infrastructure provisioning and ensures consistency at scale.","breadcrumb":{"@id":"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.securekloud.com\/blog\/puppet-an-introduction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.securekloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Puppet \u2013 An Introduction"}]},{"@type":"WebSite","@id":"https:\/\/www.securekloud.com\/blog\/#website","url":"https:\/\/www.securekloud.com\/blog\/","name":"SecureKloud","description":"","publisher":{"@id":"https:\/\/www.securekloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.securekloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.securekloud.com\/blog\/#organization","name":"SecureKloud","url":"https:\/\/www.securekloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png","contentUrl":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png","width":240,"height":48,"caption":"SecureKloud"},"image":{"@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/adbd2e496b9f1f3b6f44a5c02d244e49","name":"Uthkarsh Pandey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/utkarsh-pandey-150x150.jpg","contentUrl":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/utkarsh-pandey-150x150.jpg","caption":"Uthkarsh Pandey"},"description":"A principal cloud consultant with over a decade of experience in the field. He has a deep understanding of cloud technologies and is passionate about helping businesses leverage the benefits of cloud computing.","url":"https:\/\/www.securekloud.com\/blog\/author\/uthkarsh-pandey\/"}]}},"_links":{"self":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/comments?post=341"}],"version-history":[{"count":3,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/341\/revisions"}],"predecessor-version":[{"id":1030,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/341\/revisions\/1030"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/media\/343"}],"wp:attachment":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/media?parent=341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/categories?post=341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/tags?post=341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}