Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Puppet on pfSense

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    12 Posts 7 Posters 9.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ? This user is from outside of this forum
      Guest
      last edited by

      @stephenw10:

      Looks like you've put some effort in here.  :)

      Steve

      Indeed, but it's unlikely to find its way into mainline pfSense.  I'm not in-favor of loading Ruby onto the platform.

      Post-2.2, we'll be working on a (likely REST) API, and that will be the vehicle for things like this.

      1 Reply Last reply Reply Quote 0
      • stephenw10S Offline
        stephenw10 Netgate Administrator
        last edited by

        I agree loading anything like that as part of the default distro would not be a good idea. Minimal attack surface etc.
        I don't see an issue with it being a package though with appropriate warnings. Perhaps another reason to split the package repo into 'supported' and 'community' or whatever you felt like naming them?

        Steve

        1 Reply Last reply Reply Quote 0
        • KOMK Offline
          KOM
          last edited by

          I wholeheartedly support the package repo being split into Supported and Here Be Dragyns

          1 Reply Last reply Reply Quote 0
          • F Offline
            fraenki
            last edited by

            @stephenw10:

            I agree loading anything like that as part of the default distro would not be a good idea. Minimal attack surface etc.
            I don't see an issue with it being a package though with appropriate warnings.

            Yes, it's not meant to be included in the default distro. Not everyone uses puppet. But it should be available as a package.

            @stephenw10:

            Perhaps another reason to split the package repo into 'supported' and 'community' or whatever you felt like naming them?

            I thought this repository https://github.com/pfsense/pfsense-packages actually is the community effort to bring additional (not fully supported) packages to pfSense. With 86 different contributors it just looks like a community effort. Is there a policy regarding contributions to the pfsense-packages repository?

            Well, I can't think of any reason not to add a puppet package to this repo. There's already a good number of pfsense-packages for specialized use cases. The puppet package is just one more.

            @gonzopancho:

            Post-2.2, we'll be working on a (likely REST) API, and that will be the vehicle for things like this.

            Good to hear a REST API is on it's way. The approach with puppet is completely different, though. I think it's good if one can choose the method that works best in their environment.

            FWIW, there's also a puppet agent for Juniper devices available:
            http://www.juniper.net/techpubs/en_US/release-independent/junos-puppet/information-products/pathway-pages/index.html

            Regards

            • Frank
            1 Reply Last reply Reply Quote 0
            • stephenw10S Offline
              stephenw10 Netgate Administrator
              last edited by

              @fraenki:

              I thought this repository https://github.com/pfsense/pfsense-packages actually is the community effort to bring additional (not fully supported) packages to pfSense. With 86 different contributors it just looks like a community effort. Is there a policy regarding contributions to the pfsense-packages repository?

              Currently there is just that one package repo for all packages and it's coded as the default for all pfSense users. Yes there are many user contributed and supported packages there but some are officially supported. The Squid 2/ Squidguard packages for example I believe are officially maintained and supported as are things like the Shellcmd and Patches packages.

              I have not seen any package guidelines. The packages system has developed from a few simple things into what there is today. It has been suggested that more than one repo be used and I'm all for that. Currently all packages appear to all users and that means that inevitably someone will start ticking boxes randomly and when everything breaks will complain loudly that everything should work perfectly because it's in the official package repo. This in turn means that the devs are understandably reluctant to add packages to that repo, especially if they have wide-ranging dependencies.
              Having seperate package repos with some sort of check box, 'include unofficial packages', would negate much of this problem. You could have a 'testing' repo for packages such as yours that could then be moved up to 'community' after sufficiently few boxes caught fire.  ;)

              Having a check box etc would require an update to the webgui code but you could do it right now by just setting up another repo and having anyone who wants to use it manually point their box at it.

              Steve

              1 Reply Last reply Reply Quote 0
              • F Offline
                fraenki
                last edited by

                Thanks for this clarification, Steve. Much appreciated.

                @stephenw10:

                Having a check box etc would require an update to the webgui code but you could do it right now by just setting up another repo and having anyone who wants to use it manually point their box at it.

                I've already setup an unofficial repo…
                https://cloud.moov.de/blog/2014/07/14/installing-puppet-on-pfsense-firewalls/
                …but such a repo does not look very secure or trustworthy. ;-) It's unlikely that any company is going to use this, neither my employee would. But obviously things like puppet aim at companies or at least larger environments.

                Regards

                • Frank
                1 Reply Last reply Reply Quote 0
                • T Offline
                  TommyTheKid
                  last edited by

                  Hi @fraenki,

                  Thank you for the effort on this. I have been looking for a way to integrate our pfSense firewalls with our puppet infrastructure for a while now. This will immediately help with quarterly password resets and patching/updates. I look forward to firewall/NAT providers among other things. I realize this is an old post, but I am hoping that the effort/movement is still alive.

                  Tommy

                  1 Reply Last reply Reply Quote 0
                  • ? This user is from outside of this forum
                    Guest
                    last edited by

                    https://blog.pfsense.org/?p=1588

                    1 Reply Last reply Reply Quote 0
                    • U Offline
                      uenal10
                      last edited by

                      @fraenki:

                      Hi,

                      this may be interesting for those of you managing a large number of pfSense firewalls. I've put together some stuff to manage pfSense with puppet:

                      1. Puppet package for pfSense
                      This is a native pfSense package providing the puppet agent and some GUI components. The merge request is still waiting for approval.
                      Merge Request: https://github.com/pfsense/pfsense-packages/pull/649
                      Installation guide: https://cloud.moov.de/blog/2014/07/14/installing-puppet-on-pfsense-firewalls/

                      2. pfSense providers for puppet: user/group management
                      A growing collection of puppet providers for pfSense. The initial version provides user/group management.
                      Repository: https://github.com/fraenki/puppet-pfsense
                      Forge: https://forge.puppetlabs.com/fraenki/pfsense
                      Usage: https://cloud.moov.de/blog/2014/07/14/pfsense-usergroup-management-with-puppet/

                      3. Puppet module: pfsense_rancid
                      One of the first two puppet modules for pfSense. Automatically prepares a pfSense appliance for RANCID backups.
                      Repository: https://github.com/fraenki/puppet-pfsense_rancid
                      Forge: https://forge.puppetlabs.com/fraenki/pfsense_rancid
                      Usage: https://cloud.moov.de/blog/2014/07/14/puppet-module-to-prepare-pfsense-for-rancid/

                      4. Puppet module: pfsense_autoupdate
                      The second puppet module for pfSense: A small hackish script to showcase fully unattended firmware upgrades on pfSense.
                      Repository: https://github.com/fraenki/puppet-pfsense_autoupdate
                      Forge: https://forge.puppetlabs.com/fraenki/pfsense_autoupdate
                      Usage: https://cloud.moov.de/blog/2014/07/14/automatically-update-pfsense-firewalls-with-puppet/

                      Feedback & contributions are very welcome!

                      Regards
                      Frank

                      The Hyperlink for the Package in the installation Guide for the Puppet Agent is Down. I need a Puppet Agent on my pfSense for my Project. Can anyone Upload a new Package?

                      1 Reply Last reply Reply Quote 0
                      • M Offline
                        MasterX-BKC- Banned
                        last edited by

                        @uenal10:

                        The Hyperlink for the Package in the installation Guide for the Puppet Agent is Down. I need a Puppet Agent on my pfSense for my Project. Can anyone Upload a new Package?

                        If your looking for remote monitoring and administration of pfsense, you might try this:
                        https://forum.pfsense.org/index.php?topic=120972.0

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.