Version information
This version is compatible with:
- Puppet Enterprise 2023.8.x, 2023.7.x, 2023.6.x, 2023.5.x, 2023.4.x, 2023.3.x, 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x
- Puppet >= 7.0.0 < 9.0.0
- , , , , , , , ,
Start using this module
Add this module to your Puppetfile:
mod 'puppetlabs-influxdb', '2.4.0'
Learn more about managing modules with a PuppetfileDocumentation
influxdb
Table of Contents
Description
This module provides type and provider implementations to manage the resources of an InfluxDB 2.x instance. Because the InfluxDB 2.0 api provides an interface to these resources, the module is able to manage an InfluxDB server running either on the local machine or remotely.
Setup
What influxdb affects
The primary things this module provides are:
- Installation of InfluxDB repositories and packages
- Initial setup of the InfluxDB application
- Configuration and management of InfluxDB resources such as organizations, buckets, etc
The first two items are provided by the influxdb
class and are restricted to an InfluxDB instance running on the local machine.
InfluxDB resources are managed by the various types and providers. Because we need to be able to enumerate and query resources on either a local or remote machine, the resources accept these parameters with the following defaults:
- host - fqdn
- port - 8086
- token_file - ~/.influxdb_token
- use_ssl - true
- token (optional)
Specifying a token
in Sensitive[String]
format is optional, but recommended. See Beginning with Influxdb for more info.
Note that you are not able to use multiple combinations of these options in a given catalog. Each provider class will set these values when first instantiated and will use the first value that it finds. Therefore, it is best to use resource defaults for these parameters in your manifest, e.g.
class my_profile::my_class(
Sensitive[String] $my_token,
) {
Influxdb_bucket {
token => $my_token,
}
}
See Usage for more information about these use cases.
Beginning with InfluxDB
The easiest way to get started using this module is by including the influxdb
class to install and perform initial setup of the application.
include influxdb
Doing so will:
- Install the
influxdb2
package from either a repository or archive source. - Configure and start the
influxdb
service - Perform initial setup of the InfluxDB application, consisting of
- An initial organization and bucket
- An administrative token saved to
~/.influxdb_token
by default
The type and provider code is able to use the token saved in this file, provided it is present on the node applying the catalog. However, it is recommended to specify the token via the influxdb::token
parameter after initial setup.
Usage
Installation
As detailed in Beginning with Influxdb, the influxdb
class manages installation and initial setup of InfluxDB. The following aspects are managed by default:
- InfluxDB repository
- SSL
- Initial setup, including the initial organization and bucket resources
- Token with permissions to read and write Telegrafs and buckets within the initial organization
Note that the admin user and password can be set prior to initial setup, but cannot be managed afterwards. These must be changed manually using the influx
cli.
For example, to use a different initial organization and bucket, set the parameters in hiera:
influxdb::initial_org: 'my_org'
influxdb::initial_bucket: 'my_bucket'
Or use a class-like declaration
class { 'influxdb':
initial_org => 'my_org',
initial_bucket => 'my_bucket',
}
Resource management
For managing InfluxDB resources, this module provides several types and providers that use the InfluxDB 2.0 api. As mentioned in What influxdb affects, the resources accept parameters to determine how to connect to the host which must be unique per resource type. For example, to create an organization and bucket and specify a token and non-standard port:
class my_profile::my_class(
Sensitive[String] $token,
) {
influxdb_org { 'my_org':
ensure => present,
token => $token,
port => 1234,
}
influxdb_bucket { 'my_bucket':
ensure => present,
org => 'my_org',
labels => ['my_label1', 'my_label2'],
token => $token,
port => 1234,
}
}
Resource defaults are also a good option:
Influxdb_org {
token => $token,
port => 1234,
}
Influxdb_bucket {
token => $token,
port => 1234,
}
Note that the influxdb_bucket
will produce a warning for each specified label that does not currently exist.
If InfluxDB is running locally and there is an admin token saved at ~/.influxdb_token
, it will be used in API calls if the token
parameter is unset. However, it is recommended to set the token in hiera as an eyaml-encrypted string. For example:
influxdb::token: '<eyaml_string>'
lookup_options:
influxdb::token:
convert_to: "Sensitive"
For more complex resource management, here is an example of:
- Looking up a list of buckets
- Creating a hash with
ensure => present
for each bucket - Creating the bucket resources with a default org of
myorg
and retention policy of 30 days.
Hiera data:
profile::buckets:
- 'bucket1'
- 'bucket2'
- 'bucket3'
Puppet code:
class my_profile::my_class {
$buckets = lookup('profile::buckets')
$bucket_hash = $buckets.reduce({}) |$memo, $bucket| {
$tmp = $memo.merge({"$bucket" => { "ensure" => present } })
$tmp
}
create_resources(
influxdb_bucket,
$bucket_hash,
{
'org' => 'myorg',
retention_rules => [{
'type' => 'expire',
'everySeconds' => 2592000,
'shardGroupDurationSeconds' => 604800,
}]
}
)
SSL
Defaults
The InfluxDB application and Puppet resources can be configured to use SSL. The use_ssl parameter of the main class and all resources defaults to true
, meaning SSL will be used in all communications. If you wish to disable it, setting influxdb::use_ssl
to false
will do so for the application. Passing use_ssl
to resources will cause them to query the application without using SSL.
The certificates used in SSL communication default to those issued by the Puppet CA. The application will use the ssl certificate and private key used by the Puppet agent on the local machine running InfluxDB. Applications that query InfluxDB, such as Telegraf and the resources in this module, need to provide a CA certificate issued by the same CA to be trusted. See the puppet_operational_dashboards module for an example.
Configuration
If you wish to manage the certificate files yourself, you can set manage_ssl. SSL will still be enabled and used by the resources, but the module will not manage the contents of the certificate files.
If you need to use certificates issued by a CA other than the Puppet CA, you can do so by using the ssl_trust_store option of the Puppet agent. First, set the use_system_store parameter to true
in the main class and all resources of this module.
Next, save your CA bundle to disk on the node managing your InfluxDB server. Set the ssl_trust_store
option in its puppet.conf
to contain the path to this file. This will cause all of the api calls made by this module to include your CA bundle.
Limitations
This module is incompatible with InfluxDB 1.x. Migrating data from 1.x to 2.x must be done manually. For more information see here.
Supporting Content
Articles
The Support Knowledge base is a searchable repository for technical information and how-to guides for all Puppet products.
This Module has the following specific Article(s) available:
- Manage the installation and configuration of metrics dashboards using the puppetlabs-puppet_operational_dashboards module for Puppet Enterprise
- Monitor the performance of your PuppetDB
- High swap usage on your primary server or replica in Puppet Enterprise
Videos
The Support Video Playlist is a resource of content generated by the support team
This Module has the following specific video content available:
Reference
Table of Contents
Classes
influxdb
: Installs, configures, and performs initial setup of InfluxDB 2.xinfluxdb::profile::toml
: Installs the toml-rb gem inside Puppet server and agent
Resource types
influxdb_auth
: Manages authentication tokens in InfluxDBinfluxdb_bucket
: Manages InfluxDB bucketsinfluxdb_dbrp
: Manages dbrps, or database and retention policy mappings. These provide backwards compatibilty for 1.x queries. Note that these are automatically created by the influxdb_bucket resource, so it isn't necessary to use this resource unless you need to customize them.influxdb_label
: Manages labels in InfluxDBinfluxdb_org
: Manages organizations in InfluxDBinfluxdb_setup
: Manages initial setup of InfluxDB. It is recommended to use the influxdb::install class instead of this resource directly.influxdb_user
: Manages users in InfluxDB. Note that currently, passwords can only be set upon creating the user and must be updated manually using the cli. A user must be added to an organization to be able to log in.
Functions
Classes
influxdb
Installs, configures, and performs initial setup of InfluxDB 2.x
Examples
Basic usage
include influxdb
class { 'influxdb':
initial_org => 'my_org',
initial_bucket => 'my_bucket',
}
Parameters
The following parameters are available in the influxdb
class:
manage_repo
manage_setup
repo_name
version
archive_source
use_ssl
manage_ssl
use_system_store
ssl_cert_file
ssl_key_file
ssl_ca_file
host
port
initial_org
initial_bucket
admin_user
admin_pass
token_file
repo_gpg_key_id
repo_url
repo_gpg_key_url
manage_repo
Data type: Boolean
Whether to manage a repository to provide InfluxDB packages.
Default value: false
manage_setup
Data type: Boolean
Whether to perform initial setup of InfluxDB. This will create an initial organization, bucket, and admin token.
Default value: true
repo_name
Data type: String
Name of the InfluxDB repository if using $manage_repo.
Default value: 'influxdb2'
version
Data type: String
Version of InfluxDB to install. Changing this is not recommended.
Default value: '2.6.1'
archive_source
Data type: Variant[String,Boolean[false]]
URL containing an InfluxDB archive if not installing from a repository or false to disable installing from source.
Default value: 'https://dl.influxdata.com/influxdb/releases/influxdb2-2.6.1-linux-amd64.tar.gz'
use_ssl
Data type: Boolean
Whether to use http or https connections.
Default value: true
manage_ssl
Data type: Boolean
Whether to manage the SSL bundle for https connections.
Default value: true
use_system_store
Data type: Boolean
Whether to use the system store for SSL connections.
Default value: false
ssl_cert_file
Data type: String
SSL certificate to be used by the influxdb service.
Default value: "/etc/puppetlabs/puppet/ssl/certs/${trusted['certname']}.pem"
ssl_key_file
Data type: String
Private key used in the CSR for the certificate specified by $ssl_cert_file.
Default value: "/etc/puppetlabs/puppet/ssl/private_keys/${trusted['certname']}.pem"
ssl_ca_file
Data type: String
CA certificate issued by the CA which signed the certificate specified by $ssl_cert_file.
Default value: '/etc/puppetlabs/puppet/ssl/certs/ca.pem'
host
Data type: Stdlib::Host
fqdn of the host running InfluxDB.
Default value: $facts['networking']['fqdn']
port
Data type: Stdlib::Port::Unprivileged
port of the InfluxDB service.
Default value: 8086
initial_org
Data type: String[1]
Name of the initial organization to use during initial setup.
Default value: 'puppetlabs'
initial_bucket
Data type: String[1]
Name of the initial bucket to use during initial setup.
Default value: 'puppet_data'
admin_user
Data type: String
Name of the administrative user to use during initial setup.
Default value: 'admin'
admin_pass
Data type: Sensitive[String[1]]
Password for the administrative user in Sensitive format used during initial setup.
Default value: Sensitive('puppetlabs')
token_file
Data type: String
File on disk containing an administrative token. This class will write the token generated as part of initial setup to this file. Note that functions or code run in Puppet server will not be able to use this file, so setting $token after setup is recommended.
Default value: $facts['identity']['user']
repo_gpg_key_id
Data type: String[1]
ID of the GPG signing key
Default value: '9D539D90D3328DC7D6C8D3B9D8FF8E1F7DF8B07E'
repo_url
Data type: Optional[String]
URL of the Package repository
Default value: undef
repo_gpg_key_url
Data type: Stdlib::HTTPSUrl
URL of the GPG signing key
Default value: 'https://repos.influxdata.com/influxdata-archive_compat.key'
influxdb::profile::toml
Installs the toml-rb gem inside Puppet server and agent
Examples
Basic usage
include influxdb::profile::toml
Parameters
The following parameters are available in the influxdb::profile::toml
class:
version
Data type: String
Version of the toml-rb gem to install
Default value: '2.1.1'
install_options_server
Data type: Array[String[1]]
Pass additional parameters to the puppetserver gem installation
Default value: []
install_options_agent
Data type: Array[String[1]]
Pass additional parameters to the puppetserver gem installation
Default value: []
Resource types
influxdb_auth
Manages authentication tokens in InfluxDB
Examples
influxdb_auth {"telegraf read token":
ensure => present,
org => 'my_org'
permissions => [
{
"action" => "read",
"resource" => {
"type" => "telegrafs"
}
},
],
}
Properties
The following properties are available in the influxdb_auth
type.
ensure
Data type: Enum[present, absent]
Whether the token should be present or absent on the target system.
Default value: present
force
Data type: Boolean
Recreate resource if immutable property changes
host
Data type: Optional[String]
The host running InfluxDB
name
Data type: String
Name of the token. Note that InfluxDB does not currently have a human readable identifer for token, so for convinience we use the description property as the namevar of this resource
org
Data type: String
The organization that owns the token
permissions
Data type: Array[Hash]
List of permissions granted by the token
port
Data type: Optional[Integer]
Port used by the InfluxDB service
Default value: 8086
status
Data type: Enum[active, inactive]
Status of the token
Default value: active
token
Data type: Optional[Sensitive[String]]
Administrative token used for authenticating API calls
token_file
Data type: Optional[String]
File on disk containing an administrative token
use_ssl
Data type: Boolean
Whether to enable SSL for the InfluxDB service
Default value: true
use_system_store
Data type: Boolean
Whether to use the system store for SSL connections
user
Data type: Optional[String]
User to scope authorization to
influxdb_bucket
Manages InfluxDB buckets
Examples
influxdb_bucket {'my_bucket':
ensure => present,
org => 'my_org',
labels => ['my_label1', 'my_label2'],
require => Influxdb_org['my_org'],
}
Properties
The following properties are available in the influxdb_bucket
type.
create_dbrp
Data type: Boolean
Whether to create a "database retention policy" mapping to allow for legacy access
Default value: true
ensure
Data type: Enum[present, absent]
Whether the bucket should be present or absent on the target system.
Default value: present
host
Data type: Optional[String]
The host running InfluxDB
labels
Data type: Optional[Array[String]]
Labels to apply to the bucket. For convenience, these will be created automatically without the need to create influxdb_label resources
members
Data type: Optional[Array[String]]
List of users to add as members of the bucket. For convenience, these will be created automatically without the need to create influxdb_user resources
name
Data type: String
Name of the bucket
org
Data type: String
Organization which the buckets belongs to
port
Data type: Optional[Integer]
Port used by the InfluxDB service
Default value: 8086
retention_rules
Data type: Array
Rules to determine retention of data inside the bucket
Default value: [{"type"=>"expire", "everySeconds"=>7776000, "shardGroupDurationSeconds"=>604800}]
token
Data type: Optional[Sensitive[String]]
Administrative token used for authenticating API calls
token_file
Data type: Optional[String]
File on disk containing an administrative token
use_ssl
Data type: Boolean
Whether to enable SSL for the InfluxDB service
Default value: true
use_system_store
Data type: Boolean
Whether to use the system store for SSL connections
influxdb_dbrp
This type provides the ability to manage InfluxDB dbrps
Examples
influxdb_dbrp {'my_bucket':
ensure => present,
org => 'my_org',
bucket => 'my_bucket',
rp => 'Forever',
}
Properties
The following properties are available in the influxdb_dbrp
type.
bucket
Data type: String
The bucket to map to the retention policy to
ensure
Data type: Enum[present, absent]
Whether the dbrp should be present or absent on the target system.
Default value: present
host
Data type: Optional[String]
The host running InfluxDB
is_default
Data type: Optional[Boolean]
Whether this should be the default policy
Default value: true
name
Data type: String
Name of the dbrp to manage in InfluxDB
org
Data type: String
Name of the organization that owns the mapping
port
Data type: Optional[Integer]
Port used by the InfluxDB service
Default value: 8086
rp
Data type: String
Name of the InfluxDB 1.x retention policy
token
Data type: Optional[Sensitive[String]]
Administrative token used for authenticating API calls
token_file
Data type: Optional[String]
File on disk containing an administrative token
use_ssl
Data type: Boolean
Whether to enable SSL for the InfluxDB service
Default value: true
use_system_store
Data type: Boolean
Whether to use the system store for SSL connections
influxdb_label
Manages labels in InfluxDB
Examples
influxdb_label {'puppetlabs/influxdb':
ensure => present,
org => 'puppetlabs',
}
Properties
The following properties are available in the influxdb_label
type.
ensure
Data type: Enum[present, absent]
Whether the label should be present or absent on the target system.
Default value: present
host
Data type: Optional[String]
The host running InfluxDB
name
Data type: String
Name of the label
org
Data type: String
Organization the label belongs to
port
Data type: Optional[Integer]
Port used by the InfluxDB service
Default value: 8086
properties
Data type: Optional[Hash]
Key/value pairs associated with the label
token
Data type: Optional[Sensitive[String]]
Administrative token used for authenticating API calls
token_file
Data type: Optional[String]
File on disk containing an administrative token
use_ssl
Data type: Boolean
Whether to enable SSL for the InfluxDB service
Default value: true
use_system_store
Data type: Boolean
Whether to use the system store for SSL connections
influxdb_org
Manages organizations in InfluxDB
Examples
influxdb_org {'puppetlabs':
ensure => present,
}
Properties
The following properties are available in the influxdb_org
type.
description
Data type: Optional[String]
Optional description for a given org
ensure
Data type: Enum[present, absent]
Whether the organization should be present or absent on the target system.
Default value: present
host
Data type: Optional[String]
The host running InfluxDB
members
Data type: Optional[Array[String]]
A list of users to add as members of the organization
name
Data type: String
Name of the organization to manage in InfluxDB
port
Data type: Optional[Integer]
Port used by the InfluxDB service
Default value: 8086
token
Data type: Optional[Sensitive[String]]
Administrative token used for authenticating API calls
token_file
Data type: Optional[String]
File on disk containing an administrative token
use_ssl
Data type: Boolean
Whether to enable SSL for the InfluxDB service
Default value: true
use_system_store
Data type: Boolean
Whether to use the system store for SSL connections
influxdb_setup
Manages initial setup of InfluxDB. It is recommended to use the influxdb::install class instead of this resource directly.
Examples
influxdb_setup {'<influx_fqdn>':
ensure => 'present',
token_file => <path_to_token_file>,
bucket => 'my_bucket',
org => 'my_org',
username => 'admin',
password => 'admin',
}
Properties
The following properties are available in the influxdb_setup
type.
bucket
Data type: String
Name of the initial bucket to create
ensure
Data type: Enum[present, absent]
Whether initial setup has been performed. present/absent is determined by the response from the /setup api
Default value: present
host
Data type: Optional[String]
The host running InfluxDB
org
Data type: String
Name of the initial organization to create
password
Data type: Sensitive[String]
Initial admin user password
port
Data type: Optional[Integer]
Port used by the InfluxDB service
Default value: 8086
token
Data type: Optional[Sensitive[String]]
Administrative token used for authenticating API calls
token_file
Data type: Optional[String]
File on disk containing an administrative token
use_ssl
Data type: Boolean
Whether to enable SSL for the InfluxDB service
Default value: true
use_system_store
Data type: Boolean
Whether to use the system store for SSL connections
username
Data type: String
Name of the initial admin user
Parameters
The following parameters are available in the influxdb_setup
type.
name
namevar
Data type: String
The fqdn of the host running InfluxDB
influxdb_user
Manages users in InfluxDB. Note that currently, passwords can only be set upon creating the user and must be updated manually using the cli. A user must be added to an organization to be able to log in.
Examples
influxdb_user {'bob':
ensure => present,
password => Sensitive('thisisbobspassword'),
}
influxdb_org {'my_org':
ensure => present,
members => ['bob'],
}
Properties
The following properties are available in the influxdb_user
type.
ensure
Data type: Enum[present, absent]
Whether the user should be present or absent on the target system.
Default value: present
host
Data type: Optional[String]
The host running InfluxDB
name
Data type: String
Name of the user
password
Data type: Optional[Sensitive[String]]
User password
port
Data type: Optional[Integer]
Port used by the InfluxDB service
Default value: 8086
status
Data type: Enum[active, inactive]
Status of the user
Default value: active
token
Data type: Optional[Sensitive[String]]
Administrative token used for authenticating API calls
token_file
Data type: Optional[String]
File on disk containing an administrative token
use_ssl
Data type: Boolean
Whether to enable SSL for the InfluxDB service
Default value: true
use_system_store
Data type: Boolean
Whether to use the system store for SSL connections
Functions
influxdb::from_toml
Type: Ruby 4.x API
The influxdb::from_toml function.
influxdb::from_toml(String $file)
The influxdb::from_toml function.
Returns: Any
file
Data type: String
influxdb::hosts_with_pe_profile
Type: Puppet Language
The influxdb::hosts_with_pe_profile function.
influxdb::hosts_with_pe_profile(String $profile)
The influxdb::hosts_with_pe_profile function.
Returns: Array
profile
Data type: String
influxdb::retrieve_token
Type: Ruby 4.x API
The influxdb::retrieve_token function.
influxdb::retrieve_token(String $uri, String $token_name, String $admin_token_file, Optional[Boolean] $use_system_store)
The influxdb::retrieve_token function.
Returns: Any
uri
Data type: String
token_name
Data type: String
admin_token_file
Data type: String
use_system_store
Data type: Optional[Boolean]
influxdb::retrieve_token(String $uri, String $token_name, Sensitive $admin_token, Optional[Boolean] $use_system_store)
The influxdb::retrieve_token function.
Returns: Any
uri
Data type: String
token_name
Data type: String
admin_token
Data type: Sensitive
use_system_store
Data type: Optional[Boolean]
influxdb::to_toml
Type: Ruby 4.x API
The influxdb::to_toml function.
influxdb::to_toml(Hash $hash)
The influxdb::to_toml function.
Returns: Any
hash
Data type: Hash
Change log
All notable changes to this project will be documented in this file. The format is based on Keep a Changelog and this project adheres to Semantic Versioning.
v2.4.0 (2023-09-25)
Added
- Move parameter defaults from hiera
common.yaml
toinit.pp
#104 (kenyon) - Add Debian 11 support #103 (kenyon)
v2.3.2 (2023-08-07)
Fixed
- (#98) Fix broken HTTP calls #99 (bastelfreak)
v2.3.1 (2023-08-03)
Fixed
v2.3.0 (2023-08-02)
Added
v2.2.0 (2023-07-25)
Added
- puppet/archive: Allow 7.x #91 (bastelfreak)
- Update Stdlib version to include 9 #90 (MartyEwings)
Fixed
- Update legacy fqdn fact #88 (elainemccloskey)
v2.1.0 (2023-05-26)
Added
Fixed
- (SUP-4274) Swapped legacy fact fqdn for networking.fqdn #84 (MartyEwings)
- Fix Errno::EACCES typo #82 (m0dular)
- (SUP-4215) Add creates param to archive resource #81 (m0dular)
v2.0.0 (2023-04-27)
Changed
- (SUP-3952) Remove Puppet 6 as a supported platform #78 (elainemccloskey)
Added
- (SUP-4195) Puppet 8 release prep #79 (MartyEwings)
- toml installation: Support
install_options
#77 (bastelfreak) - install toml-rb gem inside puppet agent #75 (vchepkov)
Fixed
v1.6.0 (2023-02-14)
Added
v1.5.1 (2023-02-09)
Fixed
v1.5.0 (2023-02-03)
Added
Fixed
v1.4.0 (2022-11-07)
Added
v1.3.1 (2022-10-10)
Fixed
v1.3.0 (2022-10-07)
Added
v1.2.1 (2022-09-29)
Fixed
v1.2.0 (2022-09-27)
Added
- Add support for installing from repository on Debian/Ubuntu #40 (m0dular)
- add debian repo support #37 (SimonHoenscheid)
- Add options to set custom influxdb repo. #36 (SimonHoenscheid)
v1.1.0 (2022-08-17)
Added
- (SUP-3557) Add spec tests for the main class #32 (m0dular)
- provide an option to disable installing from source #29 (vchepkov)
v1.0.0 (2022-05-02)
Changed
Fixed
v0.3.0 (2022-03-11)
Added
Fixed
- Check if token file exists on disk #18 (m0dular)
- add DSCR to influxdb2 repo #16 (MartyEwings)
v0.2.1 (2022-03-07)
Fixed
v0.2.0 (2022-03-01)
Added
- Use a mixin module instead of inheritance #7 (m0dular)
- Add puppet-strings documentation #1 (m0dular)
Fixed
v0.1.0 (2021-12-13)
v0.0.2 (2021-11-18)
v0.0.1 (2021-11-16)
* This Changelog was automatically generated by github_changelog_generator
Dependencies
- puppet/archive (>= 6.0.0 < 8.0.0)
- puppetlabs/apt (>= 8.0.0 <10.0.0)
- puppetlabs/stdlib (>= 4.13.0 < 10.0.0)
Quality checks
We run a couple of automated scans to help you assess a module’s quality. Each module is given a score based on how well the author has formatted their code and documentation and select modules are also checked for malware using VirusTotal.
Please note, the information below is for guidance only and neither of these methods should be considered an endorsement by Puppet.
Malware scan results
The malware detection service on Puppet Forge is an automated process that identifies known malware in module releases before they’re published. It is not intended to replace your own virus scanning solution.
Learn more about malware scans- Module name:
- puppetlabs-influxdb
- Module version:
- 2.4.0
- Scan initiated:
- September 25th 2023, 12:40:34
- Detections:
- 0 / 57
- Scan stats:
- 56 undetected
- 0 harmless
- 1 failures
- 0 timeouts
- 0 malicious
- 0 suspicious
- 16 unsupported
- Scan report:
- View the detailed scan report