Automate package delivery with Puppet and Cloudsmith
Puppet gives your teams declarative, code-driven control over infrastructure configuration. Pair it with Cloudsmith to serve private Debian and RPM packages directly to your Puppet-managed nodes, with secure authentication, GPG-signed repositories, and full audit trails baked in.
How we support Puppet
Why teams integrate Cloudsmith with Puppet
Frequently asked questions
Cloudsmith supports Debian (apt) and RedHat (yum/dnf) repositories natively, which are the most common formats used with Puppet. Both public and private repositories are supported, and Puppet's official apt and yum modules can configure them directly from your manifests.
Cloudsmith supports API keys and OIDC-based authentication. For automated Puppet agents and bots, create dedicated service accounts with scoped API keys so credentials are isolated and independently revocable. OIDC removes the need to store long-lived secrets entirely.
Cloudsmith generates a GPG signing key for each repository. In your Puppet manifest, use the apt::key resource with the 20-byte fingerprint and the key URL provided in the Cloudsmith repository settings. This ensures all packages installed on your nodes are cryptographically verified before installation.
Yes. Cloudsmith's cloud-native infrastructure is built to scale without you managing any underlying hardware. Its CDN-backed delivery with 600+ edge points of presence ensures consistent, low-latency downloads for Puppet agents regardless of where your nodes are geographically located.
Yes. Cloudsmith's client logs capture every package request, including the requesting node, timestamp, package version, and authentication method used. These logs are queryable and exportable, giving your team full traceability across your Puppet-managed infrastructure.