--To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/3b0f53bf-7d5d-4094-8a26-fe975a1e6f17%40googlegroups.com.
You received this message because you are subscribed to the Google Groups "Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to puppet-users...@googlegroups.com.
You received this message because you are subscribed to a topic in the Google Groups "Puppet Users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/puppet-users/0vhLrU0Rl_0/unsubscribe.
To unsubscribe from this group and all its topics, send an email to puppet-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/CAPGcbtCN5ovzMjx2ii0CVaFdzsr2_y%2BVD4JQ%3D3jPiMQF0pnH1Q%40mail.gmail.com.
The rationale expressed to me has to do with non-specific auditing/security requirements...My requirement is to research and contradict with prima face evidence or report and confirmor some mixture thereof, which is not the simplest of assignments.
If anyone at Puppet Labs and the community can think of a way to contradict the first paragraph, send it over.StuartP.S. Thanks for your input that puppet agent need not be a daemon and can be run with:puppet agent -t --noopI will put that in place tomorrow.
The rationale for the above methodology is: hosting firm doing database hosting in a (very)highly secured environment seeking to ensure extreme care of the "crown jewels."We realize it is not an exciting use case.
--
You received this message because you are subscribed to a topic in the Google Groups "Puppet Users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/puppet-users/0vhLrU0Rl_0/unsubscribe.
To unsubscribe from this group and all its topics, send an email to puppet-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/CAAJLFxWoQBGrc83%3Dd_jxDkhcTReenKSN_ovWg63gREQmiVaBew%40mail.gmail.com.