Puppet Expands Partner Ecosystem
April 30, 2018

Puppet announced new additions to its partner ecosystem, including new collaborations and innovations with Barracuda, Cisco, Microsoft and Nutanix, to extend pervasive automation across on-premises and cloud environments.

“At Puppet, we strive to provide our customers with the technology breadth and depth they need to be successful on their journey to pervasive automation,” said Omri Gazitt, CPO, Puppet. “We are deeply committed to integrating with what our customers already have. The investments that we’re making in our partner ecosystem deliver on Puppet’s vision of empowering people to do more of what they love by helping them automate manual, error-prone processes across traditional infrastructure, cloud, containers, networking, and application development.”

New Azure and Windows automation innovations include:

- Auto-generated Azure ARM module. Puppet’s new auto-generated Azure ARM module helps customers adopt and manage new Azure resources and services as soon as they’re available. It can manage any resource and service supported by Azure Resource Manager today and as new resources are added, the module will automatically update to include them.

- DSC Lite module. Advanced users of Windows PowerShell Desired State Configuration (DSC) will have the ability to easily manage even more of their DSC resources, including class-based and custom DSC resources with Puppet’s new DSC Lite module. The DSC Lite module is a streamlined alternative to Puppet’s original DSC module for users that require additional flexibility.

- Windows Scheduled Tasks module. The new Scheduled Tasks module supports Microsoft's Task Scheduler 2.0 API, giving customers the ability to define more sophisticated triggers and scheduling options.

New Azure Accelerator Program: Puppet is working with Microsoft and Barracuda to create an accelerated migration program to help customers migrate their workloads to the cloud. The Azure Accelerator program offers a way to automate and manage mission-critical workloads while addressing the complexities of security, privacy and compliance concerns. Participating customers can get started at no cost with software from Puppet and Barracuda, and with no Microsoft Azure infrastructure charges during their migration.

Agentless management of Cisco devices: Puppet has had a longstanding collaborative relationship with Cisco to bring modern automation and DevOps practices to networking teams. Puppet and Cisco have worked closely to develop new solutions to help organizations automate even more of their Cisco networks.

- Cisco IOS XE Module Private Beta Release: Many customers use Puppet to manage configuration of enterprise networking devices to increase network agility. The private beta release of Puppet’s Cisco IOS XE module gives customers early access and input into the module’s functionality, including support for specific devices and resources. The Cisco IOS XE module currently enables agentless management of Cisco Catalyst (IOS XE) switches. Customers can use this to rapidly and securely configure their Catalyst switching Infrastructure and ensure configuration compliance, thereby reducing errors caused by manual management. Puppet Enterprise customers can request access to this private beta by emailing networkingbeta@puppet.com.

- Cisco ACI module: Cisco Application Infrastructure (ACI) is Cisco’s turnkey data center SDN solution. Cisco’s ACI module enables customers to manage Cisco Application Policy Infrastructure Controller (APIC) configurations with Puppet, enhancing customers’ ability to deploy and manage Cisco ACI. The module will be available on the Puppet Forge in May.

- Cisco Meraki module: The new Cisco Meraki module for Puppet lets you define Meraki organization administrators across all of your networks and across multiple organizations, a task that can be tedious for large IT organizations with complex permissions such as service providers or large IT organizations. Customers are demanding more power, and the module will eventually enable Puppet to manage switch port configurations and control firewall policies across every Meraki cloud-managed device. The module will be available this month and will be an ongoing open source project supported by Cisco’s fastest growing developer community. More details will be shared on the Meraki community.meraki.com and meraki.io.

"Many of our customers use Puppet today to manage the compute resources in their data center. Based on customer feedback, we built the Cisco ACI module in collaboration with Puppet,” said Mike Cohen, Sr. Director Product Management, Data Center Group, Cisco. “This module enables joint customers to consistently deploy and manage Cisco ACI fabric alongside the rest of their Puppet-managed infrastructure, giving them greater automation and visibility into their networks.”

Puppet partners with leading cloud, networking and security companies to make it easier for joint customers to scale automation across their organizations. Barracuda, Lenovo, Nutanix and Xmatters are now part of Puppet’s Technology Alliance Partner program. New modules from Barracuda and Nutanix make automation even more pervasive with additional support for networking, hybrid cloud management and app-level orchestration. Joint customers can rely on Puppet and our partner ecosystem to help scale their automation success more broadly across their estates.

The Latest

August 16, 2018

There once was a time in software development where developers could design, build and then think about their software's security. However in today's highly connected, API-driven application environment, this approach is simply too risky as it exposes the software to vulnerabilities ...

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

Share this