What Integrates with Puppet Enterprise?
Find out what Puppet Enterprise integrations exist in 2025. Learn what software and services currently integrate with Puppet Enterprise, and sort them by reviews, cost, features, and more. Below is a list of products that Puppet Enterprise currently integrates with:
-
1
Dqlite
Canonical
Dqlite is a high-speed, embedded SQL database that offers persistent storage and utilizes Raft consensus, making it an ideal choice for resilient IoT and Edge devices. Known as "distributed SQLite," Dqlite expands SQLite's capabilities across multiple machines, ensuring automatic failover and high availability to maintain application uptime. It employs C-Raft, an optimized implementation of Raft in C, which provides exceptional performance in transactional consensus and fault tolerance while maintaining SQLite’s renowned efficiency and compact size. C-Raft is specifically designed to reduce transaction latency, enabling faster operations. Both C-Raft and Dqlite are implemented in C, ensuring they are portable across various platforms. Released under the LGPLv3 license with a static linking exception, it guarantees broad compatibility. The system features a standard CLI pattern for initializing databases and managing the joining or leaving of voting members. It also incorporates minimal, configurable delays for failover alongside automatic leader election processes. Additionally, Dqlite supports a disk-backed database option with in-memory capabilities and adheres to SQLite's transaction protocols. The blend of these features makes Dqlite a powerful solution for modern data storage needs. -
2
Multipass
Canonical
With just one command, you can swiftly create an Ubuntu virtual machine using Multipass, which is capable of launching and managing VMs while configuring them with cloud-init, akin to public cloud environments. This tool allows you to experiment with cloud launches right on your local machine at no cost, and in just five minutes, you'll realize how effortlessly a lightweight cloud setup can be achieved. To get started, you can launch several LTS instances, check their status, execute commands, apply cloud-init configurations, and remove older instances as needed. For those looking to master the Linux command line, the "Ubuntu Server CLI cheat sheet" serves as a quick reference for skills ranging from basic file management to advanced deployments like Kubernetes and OpenStack. Multipass also features a command line interface that simplifies the launching, management, and interaction with Linux instances. You'll find that downloading a fresh image is incredibly fast, enabling you to have a fully operational VM in mere minutes. Furthermore, you can create Ubuntu instances and initialize them with cloud-init metadata, similar to setups on AWS, Azure, Google, IBM, and Oracle clouds, allowing you to effectively simulate a cloud deployment directly on your workstation. This capability makes it easier than ever to experiment and learn about cloud computing without the need for extensive resources. -
3
MicroStack
Canonical
Quickly set up and operate OpenStack on a Linux machine with ease. Designed with developers in mind, it’s perfect for use in edge computing, IoT applications, and various appliances. MicroStack provides a complete OpenStack experience packaged neatly into a single snap. This multi-node OpenStack deployment allows you to run it directly from your workstation. While its primary audience is developers, it remains an excellent choice for edge environments, IoT setups, and appliances. Just download MicroStack from the Snap Store and start your OpenStack environment in no time. Within minutes, you can have a fully functional OpenStack system at your fingertips. It runs securely on your laptop, utilizing advanced isolation techniques for safety. This implementation features pure upstream OpenStack components, including Keystone, Nova, Neutron, Glance, and Cinder. All the exciting features you’d like to explore in a compact, standard OpenStack setup are readily available. You can easily integrate MicroStack into your CI/CD workflows, allowing you to focus on your tasks without unnecessary complications. Keep in mind that MicroStack requires a minimum of 8 GB of RAM along with a multi-core processor to function smoothly. Enjoy the seamless experience of working with a robust OpenStack environment. -
4
Mir Display Server
Canonical
If you're seeking to implement an information kiosk, a digital signage display, an entertainment system for vehicles, or a home automation interface, Mir on Ubuntu provides the quickest route to deployment. Serving as a system-level component, Mir facilitates the creation of innovative user experiences and is compatible with a variety of Linux-based devices, from traditional desktops to IoT and embedded systems. It effectively replaces the X window server system, which has been widely utilized across Linux desktop environments. This transition allows manufacturers and desktop users to benefit from a powerful, efficient, flexible, and secure graphical environment. For over 30 years, the X windowing system has been the backbone of graphical user interfaces on Linux, successfully catering to both system-level and application-level needs. Nevertheless, modern users demand a more cohesive, integrated, and secure experience, which the X system struggles to provide. Consequently, Mir stands out as a contemporary alternative, designed to meet those evolving expectations and enhance the overall user experience. -
5
MicroK8s
Canonical
MicroK8s offers a lightweight, low-ops Kubernetes solution tailored for developers working with cloud environments, clusters, workstations, Edge, and IoT devices. It intelligently selects the optimal nodes for the Kubernetes datastore and seamlessly promotes another node if a database node goes offline, ensuring no administrative intervention is required for robust edge deployments. With its compact design and user-friendly defaults, MicroK8s is designed to operate effectively right out of the box, making installation, upgrades, and security management straightforward and efficient. Ideal for micro clouds and edge computing, it provides full enterprise support without a subscription, with the option of 24/7 assistance and a decade of security maintenance. Whether deployed under cell towers, on race cars, in satellites, or within everyday appliances, MicroK8s guarantees the complete Kubernetes experience across IoT and micro clouds. Its fully containerized deployment ensures reliable operations, complemented by compressed over-the-air updates. MicroK8s automatically applies security updates by default, though users can choose to defer them if desired, and upgrading to the latest version of Kubernetes is just a single command away, making the process incredibly simple and hassle-free. This combination of ease of use and robust functionality positions MicroK8s as an invaluable tool for modern developers. -
6
Userify
Userify
Efficiently manage SSH keys for your team across various cloud environments and continents utilizing tools like Ansible, Chef, Puppet, Salt, CloudFormation, Terraform, or tailor-made scripts. Userify seamlessly operates across multiple clouds that are geographically dispersed and high-latency networks. It offers enhanced security measures with Curve 25519 encryption and bcrypt hashing, ensuring compliance with PCI-DSS and HIPAA standards. Additionally, it holds AICPA SOC-2 Type 1 certification and is trusted by over 3,500 organizations worldwide. Userify's passwordless SSH key logins provide both heightened security and ease of use. Uniquely, it is the only key management solution designed to function effectively over the open Internet. When it comes to de-provisioning administrators who depart from your organization, Userify simplifies the process to just one click. Furthermore, it assists in achieving PCI-DSS Requirement 8 compliance, effectively safeguarding PII and permanently eliminating the use of ec2-user. Lastly, Userify also supports compliance with HIPAA Security Rule, ensuring protection for critical healthcare systems and PHI by restricting internal access and authority. -
7
Cmd
Cmd
Introducing a robust yet nimble security solution that delivers comprehensive visibility, proactive management, and effective threat detection and response tailored for your Linux systems, whether in the cloud or a data center. Your cloud environment is a complex multi-user setting, and safeguarding it with security measures designed for endpoints is inadequate. Move beyond basic logging and analytic tools that lack essential context and operational workflows needed for genuine infrastructure protection. Cmd’s detection and response platform is specifically designed to meet the demands of modern, agile security teams. Monitor system activities in real-time or explore historical data using advanced filters and alerts. Utilize our eBPF sensors, contextual data architecture, and user-friendly workflows to gain clarity on user interactions, active processes, and access to critical resources, all without needing advanced Linux knowledge. Establish protective measures and controls surrounding sensitive actions to enhance traditional access management practices while ensuring security is part of your infrastructure's fabric. This approach not only strengthens your defenses but also empowers your team to respond swiftly to potential threats. -
8
Pica8 PICOS
Pica8
The unique PICOS open NOS, equipped with closely integrated control planes, provides network operators with precise and non-intrusive oversight of their enterprise applications, allowing for extensive and adaptable traffic analysis and real-time attack prevention. For achieving zero-trust networking and establishing software-defined perimeters, PICOS stands out as the optimal solution. Our premier open network operating system is compatible with open switches ranging from 1G to 100G interfaces, sourced from a diverse selection of Tier 1 manufacturers. This comprehensive licensing package delivers unparalleled support for enterprise functionalities available in the market. It incorporates the Debian Linux distribution, featuring an unchanged kernel to enhance DevOps programmability to its fullest extent. Furthermore, the Enterprise Edition is enhanced by AmpCon, an automation framework based on Ansible, which integrates Zero-Touch Provisioning (ZTP) with the Open Network Install Environment (ONIE), streamlining the deployment and management of open network switches throughout the enterprise. With such advanced capabilities, organizations can ensure their networks are not only efficient but also secure against evolving threats. -
9
Kovair DevOps
Kovair Software
Utilize Kovair's VSMP DevOps solution, which features CI/CD capabilities, to effectively deploy applications across any platform and scale. In the current software landscape, the speed of delivery is reaching unprecedented levels, intensifying competition. IT teams within organizations face ongoing pressures from both market demands and internal business needs. This situation has amplified the necessity for adopting Continuous Delivery (CD) and DevOps methodologies. To meet these challenges, organizations must implement strategies that enable quicker and more reliable delivery while enhancing scalability and productivity through the automation of their release processes. Achieving complete visibility at every stage of the release cycle is essential for fostering collaboration, and organizations should aim to establish an end-to-end Continuous Delivery process that eliminates silos by integrating their existing tools. Ultimately, embracing these practices will empower teams to respond swiftly to changing requirements and ensure successful deployments. -
10
Ozone
Ozone
Ozone platform allows enterprises to quickly and securely ship modern applications. Ozone eliminates the need to manage too many DevOps tools, making it easy to deploy applications on Kubernetes. Integrate all your existing DevOps tools to automate your application delivery process. Automated pipeline workflows make deployments faster and allow for on-demand infrastructure management. Enforce compliance policies and governance for app deployments at scale to prevent business losses. One pane of glass, where engineering, DevOps, and security teams can collaborate on app releases in realtime. -
11
HostAccess
Perforce
HostAccess is a PC terminal emulator software. It provides a range of terminal emulator tools for Microsoft Windows users. This allows secure access on various platforms such as Linux, Unix and IBM. HostAccess' main purpose is to connect to PICK (multivalue), such as UniVerse and UniData, D3, ONware etc., and to use your own package of programs written using PICK Basic. These programs offer APIs for data exchange as well as extensive GUI capabilities. Quickly create reports and integrate data with Windows applications. Connect to multiple systems in one environment. HostAccess provides all the essential terminal emulator software features you require in one page. So, whether you're looking for asynchronous/synchronous connections, server-based administration, concurrent users, or multiple session access, HostAccess is an ideal solution for you. -
12
Buffer Editor
Buffer Editor
$9.99 one-time paymentBuffer Editor is an innovative code and text editing tool designed for seamless software development, code viewing, or note-taking while on the move. Countless programmers rely on Buffer Editor for its swift, robust, and sophisticated coding capabilities on mobile platforms. It allows users to preview a variety of file types compatible with iOS, such as images, PDFs, videos, and documents. You can effortlessly toggle between your currently open files and even open several terminals in separate tabs. Additionally, you can preview content both on localhost and your own server, enhancing your workflow and productivity. With its user-friendly interface and extensive features, Buffer Editor truly stands out in the realm of mobile coding applications. -
13
Kovair QuickSync
Kovair Software
Kovair QuickSync serves as a comprehensive and budget-friendly data migration solution suitable for enterprises across various industries. This desktop application, which operates on Windows, is straightforward to install and user-friendly. Its requirement for minimal infrastructural support enhances its cost-effectiveness and operational efficiency within the sector. Beyond enabling data migration from a single source to a single target, it also supports the transfer of data from one source to multiple destinations. The intuitive interface makes it highly adaptable and appealing to users. Additionally, it features an integrated disaster recovery system and the ability to perform re-migrations, guaranteeing a complete data transfer with zero loss. The solution also supports migration based on templates, allowing configurations from one project to be easily repurposed for future projects. Furthermore, it offers real-time monitoring of migration progress, ensuring users receive up-to-date information on the status and health of the migration process. This combination of features not only boosts efficiency but also instills confidence in the data migration process. -
14
Bionic
Bionic
Bionic adopts an agentless strategy to gather all your application artifacts, offering a level of application insight that surpasses what your CSPM tool can deliver. It consistently monitors and compiles a comprehensive inventory of your applications, services, message brokers, and databases. By integrating seamlessly into CI/CD pipelines, Bionic identifies significant risks within the application layer and code, enabling teams to assess security posture during production. Additionally, Bionic conducts thorough code analysis, checking for critical CVEs while delivering profound insights into the potential impact of attack surfaces. The platform prioritizes code vulnerabilities with consideration to the overall architecture of your applications. Furthermore, you can establish tailored policies to rank architectural risks according to your organization's specific security requirements, ensuring that security measures align with business needs and regulatory standards. This comprehensive approach empowers teams to proactively address vulnerabilities and enhance the overall security framework of their applications. -
15
Anitian FedRAMP Comprehensive
Anitian
Anitian offers a comprehensive FedRAMP solution that integrates top-tier web security technologies with compliant frameworks and expert guidance to assist SaaS providers in effectively navigating, accelerating, and automating their FedRAMP initiatives. With Anitian’s established expertise, you can confidently move through each stage of the FedRAMP journey. Achieve FedRAMP authorization in significantly less time and at a fraction of the cost by leveraging Anitian’s innovative blend of automation alongside personal support. Their pre-configured security stack and automation tools significantly reduce the typically labor-intensive and intricate tasks associated with obtaining FedRAMP authorization. Additionally, you can count on Anitian’s compliance team to ensure that both your internal teams and external partners are continuously informed about project updates, necessary actions, and crucial dependencies in the timeline. This level of support empowers organizations to stay aligned with compliance requirements while also streamlining their operational processes. -
16
BeyondTrust Cloud Privilege Broker
BeyondTrust
The Cloud Privilege Broker equips your team with essential resources to oversee and visualize user entitlements throughout a multi-cloud infrastructure. It features a centralized, cloud-agnostic dashboard that presents crucial metrics for easy access. This solution ensures continuous identification of users, roles, policies, and endpoints across all compatible cloud platforms. With its single interface, it offers detailed policy suggestions for IaaS and PaaS options, enhancing management efficiency. BeyondTrust's Cloud Privilege Broker (CPB) serves as a comprehensive tool for managing entitlements and permissions, allowing customers to mitigate cloud access risks in both hybrid and multi-cloud settings all from a unified platform. Each cloud service provider offers its own access management solutions, but these tools are limited to their respective environments and do not extend to others. Consequently, teams often find themselves switching between different consoles, struggling to handle permissions for various cloud providers, each with its unique policy application methods. This fragmented approach can lead to inefficiencies and increased risk, highlighting the need for a consolidated management solution. -
17
RunCode
RunCode
$20/month/ user RunCode offers online workspaces that allow you to work in a web browser on code projects. These workspaces offer a complete development environment that includes a code editor, a terminal and access to a variety of tools and libraries. These workspaces are easy to use and can be set up on your own computer. -
18
HPE OneView
Hewlett Packard Enterprise
HPE OneView is a comprehensive IT infrastructure management solution that streamlines IT operations through automation, simplifying the management of computing, storage, and networking lifecycles. By transitioning to a software-defined infrastructure, organizations can leverage automation to enhance their modern data centers, transforming servers, storage, and networking for optimal efficiency. This platform employs a software-defined methodology to oversee IT infrastructure, featuring efficient workflow automation, a user-friendly dashboard, and a robust ecosystem of partners. The intelligence embedded in the software supports automated provisioning with consistent templates, ensuring high reliability and control, which subsequently reduces operating costs. With HPE OneView, users can effortlessly provision and manage physical infrastructure through software-defined templates and APIs, facilitating the automation of configuration and lifecycle operations. By adopting IT infrastructure automation, businesses can not only streamline their operations but also significantly boost employee productivity in the process. Ultimately, HPE OneView empowers organizations to achieve greater agility and responsiveness in their IT environments. -
19
OES boasts high availability and scalability, making it suitable for managing growing deployment workloads, while also being adaptable enough to work seamlessly with various SDLC tool chains. It provides a user-friendly interface for defining custom stages that allow for simultaneous deployments across multiple targets, significantly reducing time spent on deployment. Actions such as rolling back, moving forward, or halting all parallel deployments can be performed effortlessly with just a click. Additionally, the platform enables automation of repetitive tasks within the SDLC process by allowing the creation of numerous child pipelines that can be triggered from a parent pipeline. With its modular design and API-based architecture, OES functions effectively as a central Continuous Delivery (CD) tool for numerous enterprises. This flexibility allows developers on different teams to easily connect external services with Spinnaker for streamlined deployment orchestration, enhancing overall productivity and collaboration. As a result, OES stands out as a powerful solution for optimizing deployment processes across various environments.
-
20
DROPS
DROPS
DROPS is a sophisticated release management solution crafted to enhance, secure, and consolidate the deployment of applications across diverse infrastructures, including data centers, hybrid setups, and multi-cloud environments. It accommodates a variety of platforms, integrates effortlessly with numerous CI/CD pipelines, and provides options for both agent-based and agentless functionalities. Featuring comprehensive release management, automated infrastructure setup, and round-the-clock availability, DROPS is designed to optimize deployment workflows while ensuring dependable and uniform delivery. This tool is versatile enough to handle both legacy systems and contemporary applications, meeting the varied requirements of enterprises. Users can choose between agent-based and agentless operations without the need for any agent installation or upkeep. DROPS is capable of adapting to your specific configuration, and if agents are necessary, they will be provisioned automatically. You can plan and manage your application deployment through a user-friendly web console without requiring any scripting skills, facilitating smooth collaboration among stakeholders and technical teams, thereby enhancing overall project efficiency. Thus, DROPS not only simplifies deployment but also fosters better communication and coordination throughout the development lifecycle. -
21
Defakto
Defakto
Defakto Security offers a robust platform that authenticates every automated interaction by providing temporary, verifiable identities to non-human entities like services, pipelines, AI agents, and machines, thereby removing the need for static credentials, API keys, and enduring privileges. Their comprehensive non-human identity and access management solution facilitates the identification of unmanaged identities across diverse environments such as cloud, on-premises, and hybrid settings, the issuance of dynamic identities in real time based on policy specifications, the enforcement of least-privilege access principles, and the generation of complete audit-ready logs. The solution comprises several modules: Ledger, which ensures ongoing discovery and governance of non-human identities; Mint, which automates the creation of purpose-specific, temporary identities; Ship, which enables secretless CI/CD workflows by eliminating hard-coded credentials; Trim, which optimizes access rights and eliminates excessive privileges for service accounts; and Mind, which safeguards AI agents and large language models using the same identity framework employed for workloads. Each module plays a critical role in enhancing security and streamlining identity management across various operational contexts. -
22
Cutover
Cutover
Cutover stands at the forefront of work orchestration and observability, uniquely offering complete visibility across the ever-changing workflows within an organization, thereby illuminating aspects previously hidden and allowing teams to act swiftly and with assurance. By moving away from outdated methods such as static spreadsheets and last-minute calls, Cutover empowers teams to execute tasks more efficiently and effectively, all while reducing unnecessary stress. The platform facilitates better planning, orchestration, and auditing of both human and automated processes that are crucial for significant activities like technology launches, resilience assessments, operational readiness, and major incident management. It introduces a new paradigm where human effort and machine automation work in perfect harmony. With its comprehensive platform for planning, orchestration, and real-time analysis, Cutover ensures that all stakeholders have access to the same up-to-date information. Ultimately, we advocate for a collaborative approach between people and technology, as this synergy is essential for driving innovation, achieving success, and fostering growth in today’s dynamic environment. This collaboration not only enhances productivity but also cultivates a culture of continuous improvement within organizations. -
23
Canonical Juju
Canonical
Enhanced operators for enterprise applications feature a comprehensive application graph and declarative integration that caters to both Kubernetes environments and legacy systems. Through Juju operator integration, we can simplify each operator, enabling their composition to form intricate application graph topologies that handle complex scenarios while providing a user-friendly experience with significantly reduced YAML requirements. The UNIX principle of ‘doing one thing well’ is equally applicable in the realm of large-scale operational code, yielding similar advantages in clarity and reusability. The charm of small-scale design is evident here: Juju empowers organizations to implement the operator pattern across their entire infrastructure, including older applications. Model-driven operations lead to substantial savings in maintenance and operational expenses for traditional workloads, all without necessitating a shift to Kubernetes. Once integrated with Juju, legacy applications also gain the ability to operate across multiple cloud environments. Furthermore, the Juju Operator Lifecycle Manager (OLM) uniquely accommodates both containerized and machine-based applications, ensuring smooth interoperability between the two. This innovative approach allows for a more cohesive and efficient management of diverse application ecosystems. -
24
GenRocket
GenRocket
Enterprise synthetic test data solutions. It is essential that test data accurately reflects the structure of your database or application. This means it must be easy for you to model and maintain each project. Respect the referential integrity of parent/child/sibling relations across data domains within an app database or across multiple databases used for multiple applications. Ensure consistency and integrity of synthetic attributes across applications, data sources, and targets. A customer name must match the same customer ID across multiple transactions simulated by real-time synthetic information generation. Customers need to quickly and accurately build their data model for a test project. GenRocket offers ten methods to set up your data model. XTS, DDL, Scratchpad, Presets, XSD, CSV, YAML, JSON, Spark Schema, Salesforce. -
25
CyberArk Conjur
CyberArk
An open-source interface that ensures secure authentication, management, and auditing of non-human access across various tools, applications, containers, and cloud environments is essential for robust secrets management. These secrets are vital for accessing applications, critical infrastructure, and other sensitive information. Conjur enhances this security by implementing precise Role-Based Access Control (RBAC) to manage secrets tightly. When an application seeks access to a resource, Conjur first authenticates the application, then conducts an authorization assessment based on the established security policy, and subsequently delivers the necessary secret securely. The framework of Conjur is built on the principle of security policy as code, where security directives are documented in .yml files, integrated into source control, and uploaded to the Conjur server. This approach treats security policy with the same importance as other source control elements, fostering increased transparency and collaboration regarding the organization's security standards. Additionally, the ability to version control security policies allows for easier updates and reviews, ultimately enhancing the security posture of the entire organization.