Created
May 28, 2014 19:17
-
-
Save chrislovecnm/639c593554f5235ec249 to your computer and use it in GitHub Desktop.
puppetdb test
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
curl 'http://puppetmaster:8080/v3/resources/Notify/foobar' | |
[] | |
cat test.pp | |
@@notify { "foobar": } | |
puppet apply test.pp --debug | tee /tmp/puppet.out | |
^[[0;36mDebug: Configuring PuppetDB terminuses with config file /etc/puppet/puppetdb.conf^[[0m | |
^[[0;36mDebug: Failed to load library 'selinux' for feature 'selinux'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:path=>"/etc/puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Failed to load library 'ldap' for feature 'ldap'^[[0m | |
^[[0;36mDebug: Puppet::Type::User::ProviderLdap: feature ldap is missing^[[0m | |
^[[0;36mDebug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/dsimport does not exist^[[0m | |
^[[0;36mDebug: Puppet::Type::User::ProviderUser_role_add: file roleadd does not exist^[[0m | |
^[[0;36mDebug: Puppet::Type::User::ProviderPw: file pw does not exist^[[0m | |
^[[0;36mDebug: /User[puppet]: Provider useradd does not support features libuser; not managing attribute forcelocal^[[0m | |
^[[0;36mDebug: Failed to load library 'ldap' for feature 'ldap'^[[0m | |
^[[0;36mDebug: Puppet::Type::Group::ProviderLdap: feature ldap is missing^[[0m | |
^[[0;36mDebug: Puppet::Type::Group::ProviderDirectoryservice: file /usr/bin/dscl does not exist^[[0m | |
^[[0;36mDebug: Puppet::Type::Group::ProviderPw: file pw does not exist^[[0m | |
^[[0;36mDebug: /Group[puppet]: Provider groupadd does not support features libuser; not managing attribute forcelocal^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:path=>"/var/lib/puppet", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:path=>"/var/log/puppet", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:path=>"/var/lib/puppet/state", :mode=>"1755", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:path=>"/var/run/puppet", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:path=>"/var/lib/puppet/lib", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Configuring PuppetDB terminuses with config file /etc/puppet/puppetdb.conf^[[0m | |
^[[0;36mDebug: Failed to load library 'selinux' for feature 'selinux'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:path=>"/etc/puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Failed to load library 'ldap' for feature 'ldap'^[[0m | |
^[[0;36mDebug: Puppet::Type::User::ProviderLdap: feature ldap is missing^[[0m | |
^[[0;36mDebug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/dsimport does not exist^[[0m | |
^[[0;36mDebug: Puppet::Type::User::ProviderUser_role_add: file roleadd does not exist^[[0m | |
^[[0;36mDebug: Puppet::Type::User::ProviderPw: file pw does not exist^[[0m | |
^[[0;36mDebug: /User[puppet]: Provider useradd does not support features libuser; not managing attribute forcelocal^[[0m | |
^[[0;36mDebug: Failed to load library 'ldap' for feature 'ldap'^[[0m | |
^[[0;36mDebug: Puppet::Type::Group::ProviderLdap: feature ldap is missing^[[0m | |
^[[0;36mDebug: Puppet::Type::Group::ProviderDirectoryservice: file /usr/bin/dscl does not exist^[[0m | |
^[[0;36mDebug: Puppet::Type::Group::ProviderPw: file pw does not exist^[[0m | |
^[[0;36mDebug: /Group[puppet]: Provider groupadd does not support features libuser; not managing attribute forcelocal^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:path=>"/var/lib/puppet", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:path=>"/var/log/puppet", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:path=>"/var/lib/puppet/state", :mode=>"1755", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:path=>"/var/run/puppet", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:path=>"/var/lib/puppet/lib", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:path=>"/var/lib/puppet/ssl/certs", :owner=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:path=>"/var/lib/puppet/ssl", :mode=>"771", :owner=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:path=>"/var/lib/puppet/ssl/public_keys", :owner=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:path=>"/var/lib/puppet/ssl/certificate_requests", :owner=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:path=>"/var/lib/puppet/ssl/private_keys", :mode=>"750", :owner=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:path=>"/var/lib/puppet/ssl/private", :mode=>"750", :owner=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/puppetmaster.pem]{:path=>"/var/lib/puppet/ssl/certs/puppetmaster.pem", :mode=>"644", :owner=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup= | |
^[[0;36mDebug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/puppetmaster.pem]{:path=>"/var/lib/puppet/ssl/private_keys/puppetmaster.pem", :mode=>"600", :owner=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=> | |
^[[0;36mDebug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/puppetmaster.pem]{:path=>"/var/lib/puppet/ssl/public_keys/puppetmaster.pem", :mode=>"644", :owner=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:fo | |
^[[0;36mDebug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:path=>"/var/lib/puppet/ssl/certs/ca.pem", :mode=>"644", :owner=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:path=>"/var/lib/puppet/ssl/crl.pem", :mode=>"644", :owner=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'pluginfactdest': 'File[/var/lib/puppet/facts.d]{:path=>"/var/lib/puppet/facts.d", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl/certs/puppetmaster.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl/private_keys/puppetmaster.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl/public_keys/puppetmaster.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl]^[[0m | |
^[[0;36mDebug: /File[/var/lib/puppet/facts.d]: Autorequiring File[/var/lib/puppet]^[[0m | |
^[[0;36mDebug: Finishing transaction 28542900^[[0m | |
^[[0;36mDebug: Using cached facts for puppetmaster^[[0m | |
^[[mNotice: Compiled catalog for puppetmaster in environment production in 0.02 seconds^[[0m | |
^[[0;32mInfo: Caching catalog for puppetmaster^[[0m | |
^[[0;32mInfo: 'replace catalog' command for puppetmaster submitted to PuppetDB with UUID 03592b2b-32c8-49c7-8510-131901931110^[[0m | |
^[[0;36mDebug: Creating default schedules^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:path=>"/var/lib/puppet/state/state.yaml", :mode=>"660", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
^[[0;36mDebug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:path=>"/var/lib/puppet/client_yaml", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'^[[0m | |
curl 'http://puppetmaster:8080/v3/resources/Notify/foobar' | |
[ { | |
"certname" : "puppetmaster", | |
"resource" : "2a763fb32da0a9aafcc6c643c64ac68d73f0242e", | |
"title" : "foobar", | |
"parameters" : { }, | |
"type" : "Notify", | |
"exported" : true, | |
"line" : 1, | |
"file" : "/root/test.pp", | |
"tags" : [ "notify", "foobar", "class" ] | |
} ] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment