Unwanted error message when running puppet agent on Solaris - puppet
When I run the puppet agent to fetch catalogue from the puppet master its giving below error message though the puppet agent is executed properly.
Error: Could not set 'file' on ensure: user 20170818-18082-9pyaem doesn't exist
Error: Could not set 'file' on ensure: user 20170818-18082-9pyaem doesn't exist
Wrapped exception:
user 20170818-18082-9pyaem doesn't exist
Error: /File[/var/lib/puppet/lib/facter/~]/ensure: change from absent to file failed: Could not set 'file' on ensure: user 20170818-18082-9pyaem doesn't exist
Whenever I run puppet agent the value "20170818-18082-9pyaem" in the above is output is keep changing and not sure from where this is coming. Below are the files available in the folder /var/lib/puppet/lib/facter/.
root#test-server:~# ls -l /var/lib/puppet/lib/facter/
-rw-r--r-- 1 root root 390 Jul 25 00:35 apt_package_updates.rb
-rw-r--r-- 1 root root 295 Jul 25 00:35 apt_security_updates.rb
-rw-r--r-- 1 root root 286 Jul 25 00:35 apt_updates.rb
-rw-r--r-- 1 root root 212 Jul 25 00:36 concat_basedir.rb
-rw-r--r-- 1 root root 4637 Jul 25 00:35 facter_dot_d.rb
-rw-r--r-- 1 root root 218 Jul 25 06:39 gemhome.rb
-rw-r--r-- 1 root root 139 Jul 25 00:35 httpd_running.rb
-rw-r--r-- 1 root root 236 Jul 25 00:35 ip6tables_version.rb
-rw-r--r-- 1 root root 444 Jul 25 00:35 iptables_persistent_version.rb
-rw-r--r-- 1 root root 234 Jul 25 00:36 iptables_version.rb
-rw-r--r-- 1 root root 427 Jul 25 06:39 lib_process_running.rb
-rw-r--r-- 1 root root 1172 Jul 25 00:35 pe_version.rb
-rw-r--r-- 1 root root 937 Jul 25 00:35 puppet_vardir.rb
drwxr-xr-x 2 root root 3 Jul 25 00:35 util
root#test-server:~#
Can anybody provide some suggestion to fix or identify from where this error is coming.
Update 1:
Debug output,
Debug: Failed to load library 'selinux' for feature 'selinux'
Debug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:path=>"/etc/puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Failed to load library 'shadow' for feature 'libshadow'
Debug: Failed to load library 'ldap' for feature 'ldap'
Debug: Puppet::Type::User::ProviderLdap: feature ldap is missing
Debug: Puppet::Type::User::ProviderUseradd: file chage does not exist
Debug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/uuidgen does not exist
Debug: Puppet::Type::User::ProviderPw: file pw does not exist
Debug: /User[puppet]: Provider user_role_add does not support features libuser; not managing attribute forcelocal
Debug: Puppet::Type::Group::ProviderPw: file pw does not exist
Debug: Failed to load library 'ldap' for feature 'ldap'
Debug: Puppet::Type::Group::ProviderLdap: feature ldap is missing
Debug: Puppet::Type::Group::ProviderDirectoryservice: file /usr/bin/dscl does not exist
Debug: /Group[puppet]: Provider groupadd does not support features libuser; not managing attribute forcelocal
Debug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:path=>"/var/lib/puppet", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:path=>"/var/log/puppet", :mode=>"750", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:path=>"/var/lib/puppet/state", :mode=>"1755", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:path=>"/var/run/puppet", :mode=>"755", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:path=>"/var/lib/puppet/lib", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:path=>"/var/lib/puppet/ssl/certs", :mode=>"755", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:path=>"/var/lib/puppet/ssl", :mode=>"771", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:path=>"/var/lib/puppet/ssl/public_keys", :mode=>"755", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:path=>"/var/lib/puppet/ssl/certificate_requests", :mode=>"755", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:path=>"/var/lib/puppet/ssl/private_keys", :mode=>"750", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:path=>"/var/lib/puppet/ssl/private", :mode=>"750", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/test.server.com.pem]{:path=>"/var/lib/puppet/ssl/certs/test.server.com.pem", :mode=>"644", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/test.server.com.pem]{:path=>"/var/lib/puppet/ssl/private_keys/test.server.com.pem", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/test.server.com.pem]{:path=>"/var/lib/puppet/ssl/public_keys/test.server.com.pem", :mode=>"644", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:path=>"/var/lib/puppet/ssl/certs/ca.pem", :mode=>"644", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:path=>"/var/lib/puppet/ssl/crl.pem", :mode=>"644", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:path=>"/var/lib/puppet/state/state.yaml", :mode=>"660", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:path=>"/var/lib/puppet/client_yaml", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:path=>"/var/lib/puppet/client_data", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'classfile': 'File[/var/lib/puppet/classes.txt]{:path=>"/var/lib/puppet/classes.txt", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'resourcefile': 'File[/var/lib/puppet/state/resources.txt]{:path=>"/var/lib/puppet/state/resources.txt", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:path=>"/var/lib/puppet/clientbucket", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:path=>"/var/lib/puppet/state/last_run_summary.yaml", :mode=>"644", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:path=>"/var/lib/puppet/state/last_run_report.yaml", :mode=>"640", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:path=>"/var/lib/puppet/state/graphs", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'pluginfactdest': 'File[/var/lib/puppet/facts.d]{:path=>"/var/lib/puppet/facts.d", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certs/test.server.com.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/ssl/private_keys/test.server.com.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys]
Debug: /File[/var/lib/puppet/ssl/public_keys/test.server.com.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys]
Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/state/state.yaml]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/client_yaml]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/client_data]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/classes.txt]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/state/resources.txt]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/clientbucket]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/state/last_run_summary.yaml]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/state/last_run_report.yaml]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/state/graphs]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/facts.d]: Autorequiring File[/var/lib/puppet]
Debug: Finishing transaction 11123916
Debug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:path=>"/etc/puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:path=>"/var/lib/puppet", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:path=>"/var/log/puppet", :mode=>"750", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:path=>"/var/lib/puppet/state", :mode=>"1755", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:path=>"/var/run/puppet", :mode=>"755", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:path=>"/var/lib/puppet/lib", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:path=>"/var/lib/puppet/ssl/certs", :mode=>"755", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:path=>"/var/lib/puppet/ssl", :mode=>"771", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:path=>"/var/lib/puppet/ssl/public_keys", :mode=>"755", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:path=>"/var/lib/puppet/ssl/certificate_requests", :mode=>"755", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:path=>"/var/lib/puppet/ssl/private_keys", :mode=>"750", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:path=>"/var/lib/puppet/ssl/private", :mode=>"750", :owner=>"root", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/test.server.com.pem]{:path=>"/var/lib/puppet/ssl/certs/test.server.com.pem", :mode=>"644", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/test.server.com.pem]{:path=>"/var/lib/puppet/ssl/private_keys/test.server.com.pem", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/test.server.com.pem]{:path=>"/var/lib/puppet/ssl/public_keys/test.server.com.pem", :mode=>"644", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:path=>"/var/lib/puppet/ssl/certs/ca.pem", :mode=>"644", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:path=>"/var/lib/puppet/ssl/crl.pem", :mode=>"644", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'pluginfactdest': 'File[/var/lib/puppet/facts.d]{:path=>"/var/lib/puppet/facts.d", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certs/test.server.com.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/ssl/private_keys/test.server.com.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys]
Debug: /File[/var/lib/puppet/ssl/public_keys/test.server.com.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys]
Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/facts.d]: Autorequiring File[/var/lib/puppet]
Debug: Finishing transaction 12444336
Debug: Using cached certificate for ca
Debug: Using cached certificate for test.server.com
Debug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:path=>"/var/lib/puppet/state/state.yaml", :mode=>"660", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:path=>"/var/lib/puppet/client_yaml", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:path=>"/var/lib/puppet/client_data", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'classfile': 'File[/var/lib/puppet/classes.txt]{:path=>"/var/lib/puppet/classes.txt", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'resourcefile': 'File[/var/lib/puppet/state/resources.txt]{:path=>"/var/lib/puppet/state/resources.txt", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:path=>"/var/lib/puppet/clientbucket", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:path=>"/var/lib/puppet/state/last_run_summary.yaml", :mode=>"644", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:path=>"/var/lib/puppet/state/last_run_report.yaml", :mode=>"640", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:path=>"/var/lib/puppet/state/graphs", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Finishing transaction 12947400
Debug: Loaded state in 0.01 seconds
Debug: Failed to load library 'msgpack' for feature 'msgpack'
Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing
Debug: node supports formats: pson b64_zlib_yaml yaml raw
Debug: Using cached certificate for ca
Debug: Using cached certificate for test.server.com
Debug: Using cached certificate_revocation_list for ca
Info: Retrieving pluginfacts
Debug: Failed to load library 'msgpack' for feature 'msgpack'
Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing
Debug: file_metadata supports formats: pson b64_zlib_yaml yaml raw
Debug: Finishing transaction 14046708
Info: Retrieving plugin
Debug: Failed to load library 'msgpack' for feature 'msgpack'
Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing
Debug: file_metadata supports formats: pson b64_zlib_yaml yaml raw
Error: Could not set 'file' on ensure: user 20170818-22623-1gm6w6c doesn't exist
Error: Could not set 'file' on ensure: user 20170818-22623-1gm6w6c doesn't exist
Wrapped exception:
user 20170818-22623-1gm6w6c doesn't exist
Error: /File[/var/lib/puppet/lib/facter/~]/ensure: change from absent to file failed: Could not set 'file' on ensure: user 20170818-22623-1gm6w6c doesn't exist
Debug: Finishing transaction 1564008
Info: Loading facts in /var/lib/puppet/lib/facter/iptables_persistent_version.rb
Info: Loading facts in /var/lib/puppet/lib/facter/ip6tables_version.rb
Info: Loading facts in /var/lib/puppet/lib/facter/puppet_vardir.rb
Info: Loading facts in /var/lib/puppet/lib/facter/gemhome.rb
Info: Loading facts in /var/lib/puppet/lib/facter/iptables_version.rb
Info: Loading facts in /var/lib/puppet/lib/facter/httpd_running.rb
Info: Loading facts in /var/lib/puppet/lib/facter/facter_dot_d.rb
Info: Loading facts in /var/lib/puppet/lib/facter/apt_updates.rb
Info: Loading facts in /var/lib/puppet/lib/facter/lib_process_running.rb
Info: Loading facts in /var/lib/puppet/lib/facter/apt_package_updates.rb
Info: Loading facts in /var/lib/puppet/lib/facter/pe_version.rb
Info: Loading facts in /var/lib/puppet/lib/facter/apt_security_updates.rb
Info: Loading facts in /var/lib/puppet/lib/facter/concat_basedir.rb
Info: Loading facts in /var/lib/puppet/lib/facter/root_home.rb
Debug: Failed to load library 'msgpack' for feature 'msgpack'
Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing
Debug: catalog supports formats: pson b64_zlib_yaml yaml dot raw
Info: Caching catalog for test.server.com
It says below user doesnt exist .
user 20170818-18082-9pyaem
Can you please check whether you are creating file and setting ownership to some user .?
If yes , you need to create that user and then set the ownership
I have fixed this issue. Found that under lib folder on one of the puppet module there is a folder ~ created which I deleted it. Thanks!
Related
Issue in booting Xen DomU Linux
I am trying to run Mainline linux kernel v5.4.0-rc3 as DomU. My setup details below. Target hw: Pine64+ Architecture: aarch64 (arm64) Xen version: 4.6.5 Dom0: Mainline linux Kernel v5.4.0-rc3 DomU config file: kernel = "path to kernel image" memory = "128" name = "domU" vcpus = 1 disk = [ 'phy:/dev/loop0,xvda,w' ] extra = "earlyprintk=xenboot console=hvc0 root=/dev/xvda debug rw init=/bin/sh" I loaded the DomU as below. ubuntu#LXC_NAME:~/workspace/domu$ sudo losetup /dev/loop0 rootfs.ext4 ubuntu#LXC_NAME:~/workspace/domu$ sudo xl -vvv create -d domu.config But DomU boot failed with following message. libxl: debug: libxl_device.c:337:libxl__device_disk_set_backend: Disk vdev=xvda spec.backend=phy libxl: debug: libxl_event.c:639:libxl__ev_xswatch_register: watch w=0x238e0bd0 wpath=/local/domain/0/backend/vbd/1/51712/state token=3/0: register slotnum=3 libxl: debug: libxl_create.c:1586:do_domain_create: ao 0x238de720: inprogress: poller=0x238de7b0, flags=i libxl: debug: libxl_event.c:576:watchfd_callback: watch w=0x238e0bd0 wpath=/local/domain/0/backend/vbd/1/51712/state token=3/0: event epath=/local/domain/0/backend/vbd/1/51712/state libxl: debug: libxl_event.c:884:devstate_callback: backend /local/domain/0/backend/vbd/1/51712/state wanted state 2 still waiting state 1 libxl: debug: libxl_event.c:576:watchfd_callback: watch w=0x238e0bd0 wpath=/local/domain/0/backend/vbd/1/51712/state token=3/0: event epath=/local/domain/0/backend/vbd/1/51712/state libxl: debug: libxl_event.c:880:devstate_callback: backend /local/domain/0/backend/vbd/1/51712/state wanted state 2 ok libxl: debug: libxl_event.c:677:libxl__ev_xswatch_deregister: watch w=0x238e0bd0 wpath=/local/domain/0/backend/vbd/1/51712/state token=3/0: deregister slotnum=3 libxl: debug: libxl_device.c:991:device_backend_callback: calling device_backend_cleanup libxl: debug: libxl_event.c:691:libxl__ev_xswatch_deregister: watch w=0x238e0bd0: deregister unregistered libxl: error: libxl.c:1991:libxl__get_domid: failed to get own domid (domid) libxl: error: libxl_device.c:1041:device_hotplug: Failed to get domid libxl: debug: libxl_event.c:691:libxl__ev_xswatch_deregister: watch w=0x238e0cd0: deregister unregistered libxl: error: libxl_create.c:1176:domcreate_launch_dm: unable to add disk devices libxl: error: libxl.c:1991:libxl__get_domid: failed to get own domid (domid) libxl: error: libxl_device.c:849:libxl__initiate_device_remove: unable to get my domid libxl: debug: libxl_event.c:691:libxl__ev_xswatch_deregister: watch w=0x238d9210: deregister unregistered libxl: error: libxl.c:1991:libxl__get_domid: failed to get own domid (domid) libxl: error: libxl.c:1684:devices_destroy_cb: libxl__devices_destroy failed for 1 libxl: debug: libxl.c:1738:devices_destroy_cb: forked pid 679 for destroy of domain 1 libxl: debug: libxl_event.c:1874:libxl__ao_complete: ao 0x238de720: complete, rc=-3 libxl: debug: libxl_event.c:1843:libxl__ao__destroy: ao 0x238de720: destroy libxl: debug: libxl.c:1477:libxl_domain_destroy: ao 0x238d8a90: create: how=(nil) callback=(nil) poller=0x238de7b0 libxl: error: libxl.c:1610:libxl__destroy_domid: non-existant domain 1 libxl: error: libxl.c:1568:domain_destroy_callback: unable to destroy guest with domid 1 libxl: error: libxl.c:1495:domain_destroy_cb: destruction of domain 1 failed libxl: debug: libxl_event.c:1874:libxl__ao_complete: ao 0x238d8a90: complete, rc=-21 libxl: debug: libxl.c:1486:libxl_domain_destroy: ao 0x238d8a90: inprogress: poller=0x238de7b0, flags=ic libxl: debug: libxl_event.c:1843:libxl__ao__destroy: ao 0x238d8a90: destroy xc: debug: hypercall buffer: total allocations:97 total releases:97 xc: debug: hypercall buffer: current allocations:0 maximum allocations:3 xc: debug: hypercall buffer: cache current size:3 xc: debug: hypercall buffer: cache hits:87 misses:3 toobig:7 DomU Complete boot log xl list confirms that domU is not created. ubuntu#LXC_NAME:~/workspace/domu$ sudo xl list Name ID Mem VCPUs State Time(s) (null) 0 256 2 r----- 9.8 I am finding difficult to understand the root cause of this issue. Could anyone throw light on what went wrong? Xen boot log
While loading the drive on creation and while accessing the instance are same ? , if so can you attach another disk to the domain and try accessing the same domain. For example to attach it to the Domain Using the below : xm block-attach Domain-0 file:/home/xen/vmdisk0 xvda w and then modify the same in the config file and then run: disk=['file:/home/xen/vmdisk0,xvda,w'] There are some additional parameters than can be mentioned in the file "builder" (domain build function), device_model and if you are using the physical disk drive you should mention /dev/sdb If you are using a physical image to load as mentioned above you have to use something like this : disk = [ 'file:/home/XEN_MI.img,hda,w']
nslcd authentication is failing with error "lookup failed: No results returned" for ldap users
I am using nslcd service to authenticate ldap user during SSH login and it is failing with below error nslcd: [16231b] uid=omc,ou=people,ou=accounts,dc=netact,dc=net: lookup failed: No results returned Below is the nslcd debug logs during ldap user login, nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_initialize(ldap://10.91.149.148/) nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_set_rebind_proc() nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3) nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_set_option(LDAP_OPT_DEREF,0) nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_set_option(LDAP_OPT_TIMELIMIT,0) nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_set_option(LDAP_OPT_TIMEOUT,0) nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,0) nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON) nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON) nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_simple_bind_s("uid=nea7yxpm,ou=people,ou=accounts,dc=netact,dc=net","***") (uri="ldap://10.91.149.148/") nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_result(): uid=omc,ou=people,ou=accounts,dc=netact,dc=net nslcd: [b127f8] <passwd="omc"> DEBUG: ldap_result(): end of results (1 total) nslcd: [16231b] DEBUG: connection from pid=7465 uid=0 gid=0 nslcd: DEBUG: accept() failed (ignored): Resource temporarily unavailable nslcd: DEBUG: accept() failed (ignored): Resource temporarily unavailable nslcd: DEBUG: accept() failed (ignored): Resource temporarily unavailable nslcd: DEBUG: accept() failed (ignored): Resource temporarily unavailable nslcd: [16231b] <authc="omc"> DEBUG: nslcd_pam_authc("omc","sshd","***") nslcd: [16231b] <authc="omc"> DEBUG: myldap_search(base="ou=people,ou=accounts,dc=netact,dc=net", filter="(&(objectClass=posixAccount)(uid=omc))") nslcd: [16231b] <authc="omc"> DEBUG: ldap_result(): uid=omc,ou=people,ou=accounts,dc=netact,dc=net nslcd: [16231b] <authc="omc"> DEBUG: myldap_search(base="uid=omc,ou=people,ou=accounts,dc=netact,dc=net", filter="(objectClass=*)") nslcd: [16231b] <authc="omc"> DEBUG: ldap_initialize(ldap://10.91.149.148/) nslcd: [16231b] <authc="omc"> DEBUG: ldap_set_rebind_proc() nslcd: [16231b] <authc="omc"> DEBUG: ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3) nslcd: [16231b] <authc="omc"> DEBUG: ldap_set_option(LDAP_OPT_DEREF,0) nslcd: [16231b] <authc="omc"> DEBUG: ldap_set_option(LDAP_OPT_TIMELIMIT,0) nslcd: [16231b] <authc="omc"> DEBUG: ldap_set_option(LDAP_OPT_TIMEOUT,0) nslcd: [16231b] <authc="omc"> DEBUG: ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,0) nslcd: [16231b] <authc="omc"> DEBUG: ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON) nslcd: [16231b] <authc="omc"> DEBUG: ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON) nslcd: [16231b] <authc="omc"> DEBUG: ldap_simple_bind_s("uid=omc,ou=people,ou=accounts,dc=netact,dc=net","***") (uri="ldap://10.91.149.148/") nslcd: [16231b] <authc="omc"> DEBUG: ldap_result(): end of results (0 total) nslcd: [16231b] <authc="omc"> uid=omc,ou=people,ou=accounts,dc=netact,dc=net: lookup failed: No results returned nslcd: [16231b] <authc="omc"> DEBUG: ldap_unbind() Below is the nslcd.conf: root#NthlrAtca07> cat /etc/nslcd.conf binddn uid=nea7yxpm,ou=people,ou=accounts,dc=netact,dc=net bindpw l0T%OSUe_7m_1~F tls_reqcert allow uri ldap://10.91.149.148/ base ou=people,ou=accounts,dc=netact,dc=net tls_cacertdir /etc/openldap/cacerts map passwd loginShell "/usr/bin/bash" map passwd homeDirectory "/home/$uid" Below is nsswitch.conf: root#NthlrAtca07> cat /etc/nsswitch.conf # # /etc/nsswitch.conf # # An example Name Service Switch config file. This file should be # sorted with the most-used services at the beginning. # # The entry '[NOTFOUND=return]' means that the search for an # entry should stop if the search in the previous entry turned # up nothing. Note that if the search failed due to some other reason # (like no NIS server responding) then the search continues with the # next entry. # # Valid entries include: # # nisplus Use NIS+ (NIS version 3) # nis Use NIS (NIS version 2), also called YP # dns Use DNS (Domain Name Service) # files Use the local files # db Use the local database (.db) files # compat Use NIS on compat mode # hesiod Use Hesiod for user lookups # [NOTFOUND=return] Stop searching if not found so far # # To use db, put the "db" in front of "files" for entries you want to be # looked up first in the databases # # Example: #passwd: db files nisplus nis #shadow: db files nisplus nis #group: db files nisplus nis passwd: files ldap shadow: files ldap group: files ldap #initgroups: files #hosts: db files nisplus nis dns hosts: files dns # Example - obey only what nisplus tells us... #services: nisplus [NOTFOUND=return] files #networks: nisplus [NOTFOUND=return] files #protocols: nisplus [NOTFOUND=return] files #rpc: nisplus [NOTFOUND=return] files #ethers: nisplus [NOTFOUND=return] files #netmasks: nisplus [NOTFOUND=return] files bootparams: nisplus [NOTFOUND=return] files ethers: files netmasks: files networks: files protocols: files rpc: files services: files netgroup: files ldap publickey: nisplus automount: files ldap aliases: files nisplus root#NthlrAtca07> Below is PAM policy: root#NthlrAtca07> cat /etc/pam.d/password-auth #%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authconfig is run. auth required pam_env.so auth sufficient pam_unix.so try_first_pass auth requisite pam_succeed_if.so uid >= 500 quiet_success auth sufficient pam_ldap.so use_first_pass auth required pam_deny.so account required pam_access.so account required pam_unix.so broken_shadow account sufficient pam_localuser.so account sufficient pam_succeed_if.so uid < 1000 quiet account [default=bad success=ok user_unknown=ignore] pam_ldap.so account required pam_permit.so password requisite pam_pwquality.so try_first_pass retry=3 authtok_type= difok=3 dcredit=-1 ocredit=-1 ucredit=0 lcredit=0 minlen=8 maxrepeat=1 maxsequence=4 reject_username password sufficient pam_unix.so md5 shadow try_first_pass use_authtok password sufficient pam_ldap.so use_authtok password required pam_deny.so session optional pam_keyinit.so revoke session required pam_limits.so -session optional pam_systemd.so session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid session required pam_unix.so session optional pam_ldap.so I see the setup is rightly configured, even then nslcd is failing to authenticate the ldap user. Could you please help here.
Thanks for all who gave a thought about this question. I found out the real issue: It was identified that login and group issue was due to ACI (Access Control List) implemented in LDAP servers. Also user "uid=nea7yxpm,ou=people,ou=accounts,dc=netact,dc=net" used in nslcd.conf was not having read access and hence during authentication the above ACI rules were preventing ldap user to access there own information hence authentication was failing. To resolve this, ACI rules were added to have read permission to the user and authentication was successful.
how to remove sails js default log messages
Please how to remove this default log messages that are displayed when "sails lift" that also written to my external log files : info: Starting app... debug: Deprecation warning: Support for `sails.config.sockets.onConnect` will be removed in an upcoming release. See the v0.11 migration guide for more informat ion and alternate options. info: info: .-..-. info: info: Sails <| .-..-. info: v0.12.4 |\ info: /|.\ info: / || \ info: ,' |' \ info: .-'.-==|/_--' info: `--'-------' info: __---___--___---___--___---___--___ info: ____---___--___---___--___---___--___-__ info: info: Server lifted in `E:\Orange\sailsJS_workspace\server` info: To see your app, visit http://localhost:1337 info: To shut down Sails, press <CTRL> + C at any time. debug: ------------------------------------------------------- debug: :: Wed Nov 02 2016 12:03:45 GMT+0200 (Egypt Standard Time) debug: Environment : development debug: Port : 1337 debug: -------------------------------------------------------
Just add: noShip: true To file: config/log.js For other default log messages play with "level", it's documented in comments at beginning of file.
Set level: to silent in the log.js Ex: module.exports.log = { custom: blahblahBlah, inspect: false level: 'info' };
Fedora24 - Puppet not applying config but returns without error
I'm new to Puppet. Just did a fresh install but not able to get config applied to agent from master. Installed master using "dnf -y install puppet-server.noarch" Installed agent using "dnf -y install puppet.noarch" puppet.conf from master cat /etc/puppet/puppet.conf [main] logdir=/var/log/puppet vardir=/var/lib/puppet ssldir=/var/lib/puppet/ssl rundir=/var/run/puppet factpath = /var/lib/puppet/facts.d:/var/lib/puppet/lib/facter:/var/lib/puppet/facts certname = master.puppettest.com server = master.puppettest.com [master] dns_alt_names = master,master.puppettest.com puppet.conf from agent cat /etc/puppet/puppet.conf [main] logdir=/var/log/puppet vardir=/var/lib/puppet ssldir=/var/lib/puppet/ssl rundir=/var/run/puppet factpath = /var/lib/puppet/facts.d:/var/lib/puppet/lib/facter:/var/lib/puppet/facts [agent] server = master.puppettest.com Debug output from agent puppet agent -t -d Debug: Applying settings catalog for sections main, agent, ssl Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:path=>"/etc/puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/dsimport does not exist Debug: Failed to load library 'ldap' for feature 'ldap' Debug: Puppet::Type::User::ProviderLdap: feature ldap is missing Debug: Puppet::Type::User::ProviderPw: file pw does not exist Debug: Puppet::Type::User::ProviderUser_role_add: file roleadd does not exist Debug: Puppet::Type::Group::ProviderDirectoryservice: file /usr/bin/dscl does not exist Debug: Failed to load library 'ldap' for feature 'ldap' Debug: Puppet::Type::Group::ProviderLdap: feature ldap is missing Debug: Puppet::Type::Group::ProviderPw: file pw does not exist Debug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:path=>"/var/lib/puppet", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:path=>"/var/log/puppet", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:path=>"/var/lib/puppet/state", :mode=>"1755", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:path=>"/var/run/puppet", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:path=>"/var/lib/puppet/lib", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'preview_outputdir': 'File[/var/lib/puppet/preview]{:path=>"/var/lib/puppet/preview", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:path=>"/var/lib/puppet/ssl/certs", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:path=>"/var/lib/puppet/ssl", :mode=>"771", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:path=>"/var/lib/puppet/ssl/public_keys", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:path=>"/var/lib/puppet/ssl/certificate_requests", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:path=>"/var/lib/puppet/ssl/private_keys", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:path=>"/var/lib/puppet/ssl/private", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/agent.puppettest.com.pem]{:path=>"/var/lib/puppet/ssl/certs/agent.puppettest.com.pem", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/agent.puppettest.com.pem]{:path=>"/var/lib/puppet/ssl/private_keys/agent.puppettest.com.pem", :mode=>"640", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/agent.puppettest.com.pem]{:path=>"/var/lib/puppet/ssl/public_keys/agent.puppettest.com.pem", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:path=>"/var/lib/puppet/ssl/certs/ca.pem", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:path=>"/var/lib/puppet/ssl/crl.pem", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:path=>"/var/lib/puppet/state/state.yaml", :mode=>"660", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:path=>"/var/lib/puppet/client_yaml", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:path=>"/var/lib/puppet/client_data", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'classfile': 'File[/var/lib/puppet/state/classes.txt]{:path=>"/var/lib/puppet/state/classes.txt", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'resourcefile': 'File[/var/lib/puppet/state/resources.txt]{:path=>"/var/lib/puppet/state/resources.txt", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:path=>"/var/lib/puppet/clientbucket", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:path=>"/var/lib/puppet/state/last_run_summary.yaml", :mode=>"644", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:path=>"/var/lib/puppet/state/last_run_report.yaml", :mode=>"640", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:path=>"/var/lib/puppet/state/graphs", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: Using settings: adding file resource 'pluginfactdest': 'File[/var/lib/puppet/facts.d]{:path=>"/var/lib/puppet/facts.d", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}' Debug: /File[/var/lib/puppet/state]: Adding autorequire relationship with File[/var/lib/puppet] Debug: /File[/var/lib/puppet/lib]: Adding autorequire relationship with File[/var/lib/puppet] Debug: /File[/var/lib/puppet/preview]: Adding autorequire relationship with File[/var/lib/puppet] Debug: /File[/var/lib/puppet/ssl/certs]: Adding autorequire relationship with File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl]: Adding autorequire relationship with File[/var/lib/puppet] Debug: /File[/var/lib/puppet/ssl/public_keys]: Adding autorequire relationship with File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Adding autorequire relationship with File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/private_keys]: Adding autorequire relationship with File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/private]: Adding autorequire relationship with File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/certs/agent.puppettest.com.pem]: Adding autorequire relationship with File[/var/lib/puppet/ssl/certs] Debug: /File[/var/lib/puppet/ssl/private_keys/agent.puppettest.com.pem]: Adding autorequire relationship with File[/var/lib/puppet/ssl/private_keys] Debug: /File[/var/lib/puppet/ssl/public_keys/agent.puppettest.com.pem]: Adding autorequire relationship with File[/var/lib/puppet/ssl/public_keys] Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Adding autorequire relationship with File[/var/lib/puppet/ssl/certs] Debug: /File[/var/lib/puppet/ssl/crl.pem]: Adding autorequire relationship with File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/state/state.yaml]: Adding autorequire relationship with File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/client_yaml]: Adding autorequire relationship with File[/var/lib/puppet] Debug: /File[/var/lib/puppet/client_data]: Adding autorequire relationship with File[/var/lib/puppet] Debug: /File[/var/lib/puppet/state/classes.txt]: Adding autorequire relationship with File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/state/resources.txt]: Adding autorequire relationship with File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/clientbucket]: Adding autorequire relationship with File[/var/lib/puppet] Debug: /File[/var/lib/puppet/state/last_run_summary.yaml]: Adding autorequire relationship with File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/state/last_run_report.yaml]: Adding autorequire relationship with File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/state/graphs]: Adding autorequire relationship with File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/facts.d]: Adding autorequire relationship with File[/var/lib/puppet] Debug: Finishing transaction 47333324902120 Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Runtime environment: puppet_version=4.2.1, ruby_version=2.3.1, run_mode=agent, default_encoding=UTF-8 Debug: Using cached certificate for ca Debug: Using cached certificate for agent.puppettest.com Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Loaded state in 0.01 seconds Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Failed to load library 'msgpack' for feature 'msgpack' Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing Debug: node supports formats: pson yaml binary Debug: Using cached certificate for ca Debug: Using cached certificate for agent.puppettest.com Debug: Creating new connection for https://master.puppettest.com:8140 Debug: Using cached certificate_revocation_list for ca Debug: Starting connection for https://master.puppettest.com:8140 Debug: Caching connection for https://master.puppettest.com:8140 Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Info: Retrieving pluginfacts Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Failed to load library 'msgpack' for feature 'msgpack' Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing Debug: file_metadata supports formats: pson yaml binary Debug: Using cached connection for https://master.puppettest.com:8140 Debug: Caching connection for https://master.puppettest.com:8140 Debug: Finishing transaction 47333324555320 Info: Retrieving plugin Debug: Failed to load library 'msgpack' for feature 'msgpack' Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing Debug: file_metadata supports formats: pson yaml binary Debug: Using cached connection for https://master.puppettest.com:8140 Debug: Caching connection for https://master.puppettest.com:8140 Debug: Finishing transaction 47333318004940 Debug: Evicting cache entry for environment 'production' Debug: Caching environment 'production' (ttl = 0 sec) Debug: Loading external facts from /var/lib/puppet/facts.d Info: Loading facts Debug: Facter: Found no suitable resolves of 1 for ec2_metadata Debug: Facter: value for ec2_metadata is still nil Debug: Facter: value for agent_specified_environment is still nil Debug: Facter: value for cfkey is still nil Debug: Facter: value for vlans is still nil Debug: Facter: Found no suitable resolves of 1 for xendomains Debug: Facter: value for xendomains is still nil Debug: Facter: Found no suitable resolves of 1 for ec2_metadata Debug: Facter: value for ec2_metadata is still nil Debug: Facter: Found no suitable resolves of 1 for ec2_userdata Debug: Facter: value for ec2_userdata is still nil Debug: Facter: value for zfs_version is still nil Debug: Facter: Found no suitable resolves of 1 for zonename Debug: Facter: value for zonename is still nil Debug: Facter: Found no suitable resolves of 1 for gce Debug: Facter: value for gce is still nil Debug: Facter: value for zpool_version is still nil Debug: Facter: value for ipaddress6_ens2 is still nil Debug: Facter: value for ipaddress6_lo is still nil Debug: Facter: value for macaddress_lo is still nil Debug: Facter: value for ipaddress6 is still nil Debug: Facter: Found no suitable resolves of 2 for iphostnumber Debug: Facter: value for iphostnumber is still nil Debug: Facter: Found no suitable resolves of 1 for lsbdistcodename Debug: Facter: value for lsbdistcodename is still nil Debug: Facter: Found no suitable resolves of 1 for lsbdistdescription Debug: Facter: value for lsbdistdescription is still nil Debug: Facter: Found no suitable resolves of 1 for lsbdistid Debug: Facter: value for lsbdistid is still nil Debug: Facter: Found no suitable resolves of 1 for lsbdistrelease Debug: Facter: value for lsbdistrelease is still nil Debug: Facter: value for is_rsc is still nil Debug: Facter: value for is_rsc is still nil Debug: Facter: Found no suitable resolves of 1 for rsc_region Debug: Facter: value for rsc_region is still nil Debug: Facter: value for is_rsc is still nil Debug: Facter: Found no suitable resolves of 1 for rsc_instance_id Debug: Facter: value for rsc_instance_id is still nil Debug: Facter: Found no suitable resolves of 1 for lsbmajdistrelease Debug: Facter: value for lsbmajdistrelease is still nil Debug: Facter: Found no suitable resolves of 1 for lsbminordistrelease Debug: Facter: value for lsbminordistrelease is still nil Debug: Facter: Found no suitable resolves of 1 for lsbrelease Debug: Facter: value for lsbrelease is still nil Debug: Facter: Found no suitable resolves of 2 for swapencrypted Debug: Facter: value for swapencrypted is still nil Debug: Facter: Found no suitable resolves of 1 for processor Debug: Facter: value for processor is still nil Debug: Facter: Found no suitable resolves of 1 for selinux_enforced Debug: Facter: value for selinux_enforced is still nil Debug: Facter: Found no suitable resolves of 1 for selinux_policyversion Debug: Facter: value for selinux_policyversion is still nil Debug: Facter: Found no suitable resolves of 1 for selinux_current_mode Debug: Facter: value for selinux_current_mode is still nil Debug: Facter: Found no suitable resolves of 1 for selinux_config_mode Debug: Facter: value for selinux_config_mode is still nil Debug: Facter: Found no suitable resolves of 1 for selinux_config_policy Debug: Facter: value for selinux_config_policy is still nil Debug: Facter: value for sshdsakey is still nil Debug: Facter: value for sshdsakey is still nil Debug: Facter: value for sshfp_dsa is still nil Debug: Facter: Found no suitable resolves of 1 for system32 Debug: Facter: value for system32 is still nil Debug: Failed to load library 'msgpack' for feature 'msgpack' Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing Debug: catalog supports formats: pson yaml dot binary Debug: Using cached connection for https://master.puppettest.com:8140 Debug: Caching connection for https://master.puppettest.com:8140 Info: Caching catalog for agent.puppettest.com Debug: Creating default schedules Debug: Loaded state in 0.00 seconds Info: Applying configuration version '1468533074' Debug: Finishing transaction 47333324429420 Debug: Storing state Debug: Stored state in 0.01 seconds Notice: Applied catalog in 0.04 seconds Debug: Using cached connection for https://master.puppettest.com:8140 Debug: Caching connection for https://master.puppettest.com:8140 Debug: Closing connection for https://master.puppettest.com:8140 Something is wrong loading facts I think. I see the folder facts.d is empty on both master and agent. Did I miss anything? [root#agent catalog]# ls /var/lib/puppet/facts.d/ [root#agent catalog]# Thank You in advance.
Puppet showing cert in list, but cannot 'find' it
I am setting up Puppet on a few test servers: bruno is the puppet master and oppenheimer is the agent. When I start the server on bruno I get this output: bruno$ sudo puppet cert list "oppenheimer.home" (SHA256) D4:**:**:**:0B:2A bruno$ sudo puppet master --verbose --no-daemonize Notice: Starting Puppet master version 3.4.3 I then go to start the agent on oppenheimer: oppenheimer$ sudo puppet agent --test --server=bruno Exiting; no certificate found and waitforcert is disabled And when I look over at bruno again: Info: access[^/catalog/([^/]+)$]: allowing 'method' find Info: access[^/catalog/([^/]+)$]: allowing $1 access Info: access[^/node/([^/]+)$]: allowing 'method' find Info: access[^/node/([^/]+)$]: allowing $1 access Info: access[/certificate_revocation_list/ca]: allowing 'method' find Info: access[/certificate_revocation_list/ca]: allowing * access Info: access[^/report/([^/]+)$]: allowing 'method' save Info: access[^/report/([^/]+)$]: allowing $1 access Info: access[/file]: allowing * access Info: access[/certificate/ca]: adding authentication any Info: access[/certificate/ca]: allowing 'method' find Info: access[/certificate/ca]: allowing * access Info: access[/certificate/]: adding authentication any Info: access[/certificate/]: allowing 'method' find Info: access[/certificate/]: allowing * access Info: access[/certificate_request]: adding authentication any Info: access[/certificate_request]: allowing 'method' find Info: access[/certificate_request]: allowing 'method' save Info: access[/certificate_request]: allowing * access Info: access[/]: adding authentication any Info: Inserting default '/status' (auth true) ACL Info: Not Found: Could not find certificate oppenheimer.home Info: Not Found: Could not find certificate oppenheimer.home Info: Not Found: Could not find certificate oppenheimer.home Info: Not Found: Could not find certificate oppenheimer.home Info: Not Found: Could not find certificate oppenheimer.home Notice that the server bruno does show the agent oppenheimer's cert before I start the server. So why can it not find the cert? This is my config on the server: bruno$ cat /etc/hosts 127.0.0.1 localhost 127.0.1.1 bruno 10.0.0.7 bruno 10.0.0.10 oppenheimer bruno$ cat /etc/puppet/puppet.conf [main] logdir=/var/log/puppet vardir=/var/lib/puppet ssldir=/var/lib/puppet/ssl rundir=/var/run/puppet factpath=$vardir/lib/facter templatedir=$confdir/templates prerun_command=/etc/puppet/etckeeper-commit-pre postrun_command=/etc/puppet/etckeeper-commit-post certificate_revocation=false server=bruno [master] # These are needed when the puppetmaster is run by passenger # and can safely be removed if webrick is used. ssl_client_header = SSL_CLIENT_S_DN ssl_client_verify_header = SSL_CLIENT_VERIFY And here is the config on the agent: oppenheimer$ cat /etc/hosts 127.0.0.1 localhost 127.0.1.1 oppenheimer 10.0.0.7 bruno 10.0.0.10 oppenheimer oppenheimer$ cat /etc/puppet/puppet.conf [main] logdir=/var/log/puppet vardir=/var/lib/puppet ssldir=/var/lib/puppet/ssl rundir=/var/run/puppet factpath=$vardir/lib/facter templatedir=$confdir/templates prerun_command=/etc/puppet/etckeeper-commit-pre postrun_command=/etc/puppet/etckeeper-commit-post certificate_revocation=false server=bruno [master] # These are needed when the puppetmaster is run by passenger # and can safely be removed if webrick is used. ssl_client_header = SSL_CLIENT_S_DN ssl_client_verify_header = SSL_CLIENT_VERIFY [agent] server=bruno Both the machines are running Ubuntu Linux 14.04 with the latest updates.
You have to sign the certificate. If the certificate was signed already then it would not show up in the output of puppet cert list. # puppet cert sign oppenheimer.home Then puppet agent should run successfully. Hope this helps.