Skip to content

Instantly share code, notes, and snippets.

Debug: Executing '/usr/bin/psql -d postgres -t -c SELECT COUNT(*) FROM (SELECT 1 WHERE has_database_privilege('puppetdb', 'puppetdb', 'CREATE')) count'
Debug: Exec[validate postgres connection for puppetdb.somecompany.local/puppetdb](provider=posix): Executing check '/bin/echo "SELECT 1" | /usr/bin/psql --tuples-only --quiet -h puppetdb.somecompany.local -U puppetdb -p 5432 --dbname puppetdb'
Debug: Executing '/bin/echo "SELECT 1" | /usr/bin/psql --tuples-only --quiet -h puppetdb.somecompany.local -U puppetdb -p 5432 --dbname puppetdb'
Debug: /Stage[main]/Puppetdb::Server::Validate_db/Postgresql::Validate_db_connection[validate puppetdb postgres connection]/Exec[validate postgres connection for puppetdb.somecompany.local/puppetdb]/unless: psql: could not connect to server: Connection refused
Debug: /Stage[main]/Puppetdb::Server::Validate_db/Postgresql::Validate_db_con
pipe {
type => "cdn-logs"
command => "zcat /home/cdn/logs/*.log.gz"
tags => ["cdn"]
}
input {
file {
type => "syslog"
path => ["/var/log/secure", "/var/log/messages"]
tags => ["syslog"]
}
pipe {
type => "edgecast-logs"
command => "zcat /home/edgecast/logs/*.log.gz"
# PuppetDB
node "puppetdb.somecompany.local" inherits default {
class { 'hosts': hostClass => 'somewhere' }
include '::ntp'
class { 'sudo': sudoUsers => [someuser] }
class { 'puppetdb::database::postgresql':
listen_addresses => 'localhost',
}
class { 'puppetdb::server':
database_host => 'localhost',
tcarr@slave04:~/transfer/redis-2.6.16$ fpm -s dir -t deb -n redis --config-files /etc/redis/redis.conf -v 2.6.16 ./src/redis-server=/usr/bin redis.conf=/etc/redis/redis.conf ./src/redis-cli=/usr/bin/redis-cli ./src/redis-benchmark=/usr/bin/redis-benchmark ./src/redis-sentinel=/usr/bin/redis-sentinel ./src/redis-check-aof=/usr/bin/redis-check-aof ./src/redis-check-dump=/usr/bin/redis-check-dump
/usr/lib/ruby/1.9.1/fileutils.rb:247:in `mkdir': File exists - /tmp/package-dir-staging20131114-10360-1oqbkys/usr/bin (Errno::EEXIST)
from /usr/lib/ruby/1.9.1/fileutils.rb:247:in `fu_mkdir'
from /usr/lib/ruby/1.9.1/fileutils.rb:221:in `block (2 levels) in mkdir_p'
from /usr/lib/ruby/1.9.1/fileutils.rb:219:in `reverse_each'
from /usr/lib/ruby/1.9.1/fileutils.rb:219:in `block in mkdir_p'
from /usr/lib/ruby/1.9.1/fileutils.rb:205:in `each'
from /usr/lib/ruby/1.9.1/fileutils.rb:205:in `mkdir_p'
from /var/lib/gems/1.9.1/gems/fpm-0.4.42/lib/fpm/package/dir.rb:132:in `cop
[root@puppet ~]# cat /etc/puppet/hiera.yaml
---
:backends:
- yaml
:yaml:
:datadir: /etc/puppet/hieradata/
:hierarchy:
- "nodes/%{::clientcert}"
- "%{::environment}/%{::clientcert}"
- common
Started GET "/users/sign_in" for 127.0.0.1 at 2013-11-21 11:51:26 -0600
Processing by Devise::SessionsController#new as HTML
Rendered devise/sessions/_new_ldap.html.haml (3.2ms)
Rendered devise/sessions/_new_base.html.haml (5.4ms)
Rendered devise/sessions/_oauth_providers.html.haml (2.0ms)
Rendered devise/sessions/new.html.haml within layouts/devise (22.2ms)
Rendered layouts/_head.html.haml (438.0ms)
Rendered layouts/_flash.html.haml (1.9ms)
Completed 200 OK in 636ms (Views: 569.8ms | ActiveRecord: 0.0ms)
# The location to use for storing cached Git repos
:cachedir: '/var/cache/r10k'
# A list of git repositories to create
:sources:
# This will clone the git repository and instantiate an environment per
# branch in /etc/puppet/environments
:puppet:
remote: 'git@repo.mycompany.local/operations/puppet.git'
basedir: '/etc/puppet/environments'
Error: Could not retrieve catalog from remote server: Error 400 on SERVER: Failed when searching for node puppet.mycompany.local: Operation not permitted - /var/lib/puppet/yaml/node/puppet.mycompany.local.yaml20131205-25260-cpzkyu-0
Warning: Not using cache on failed catalog
Error: Could not retrieve catalog; skipping run
# URL of your Foreman installation
$foreman_url='https://foreman.mycompany.local'
# if CA is specified, remote Foreman host will be verified
$foreman_ssl_ca = "/var/lib/puppet/ssl/ca/ca_crt.pem"
# ssl_cert and key are required if require_ssl_puppetmasters is enabled in Foreman
$foreman_ssl_cert = "/var/lib/puppet/ssl/certs/puppet.mycompany.local.pem"
$foreman_ssl_key = "/var/lib/puppet/ssl/private_keys/puppet.mycompany.local.pem"