Hi Guys,
I have installed as per the instructions available here:
Precisely:
rpm -ivh https://yum.puppetlabs.com/puppetlabs-release-pc1-el-7.noarch.rpm
yum -y install epel-release
https://yum.theforeman.org/releases/1.12/el7/x86_64/foreman-release.rpm
yum -y install foreman-installer
foreman-installer
After installation, it gave me output as below:
[root@vagrant-puppet ~]# foreman-installer
/Stage[main]/Puppet::Server::Service/Service[puppetserver]: Failed to call
refresh: Systemd restart for puppetserver failed!
/Stage[main]/Puppet::Server::Service/Service[puppetserver]: Systemd restart
for puppetserver failed!
Installing Done
[100%]
[…]
Something went wrong! Check the log for ERROR-level output
-
Foreman is running at https://vagrant-puppet.netgear
Initial credentials are admin / JYfdXDWpktLbuAav
-
Foreman Proxy is running at https://vagrant-puppet.netgear:8443
-
Puppetmaster is running at port 8140
The full log is at /var/log/foreman-installer/foreman.log
I have increased the RAM of my VM after getting the above message:
[root@vagrant-puppet log]# rake --version
rake, version 0.9.6 HOSTNAME: vagrant-puppet OS: redhat RELEASE: CentOS
Linux release 7.1.1503 (Core) FOREMAN: 1.12.2 RUBY: ruby 2.0.0p598
(2014-11-13) [x86_64-linux] PUPPET: 4.6.2 DENIALS: 0
Now when I try to access the UI , I am not able to access it.
either via :
https://vagrant-puppet.netgear
https://vagrant-puppet.netgear:8443
I'm completely confused as to what should I do or what the problem that is
preventing me from accessing it.
This is the out from nmap command:
[vagrant@vagrant-puppet ~]$ nmap vagrant-puppet.netgear Starting Nmap 6.40
( http://nmap.org ) at 2016-09-09 08:14 BST Nmap scan report for
vagrant-puppet.netgear (192.168.1.16) Host is up (0.00039s latency). Not
shown: 996 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http
443/tcp open https 8443/tcp open https-alt Nmap done: 1 IP address (1 host
up) scanned in 0.05 seconds [vagrant@vagrant-puppet ~]$
Output from firewallcmd: [vagrant@vagrant-puppet ~]$ firewall-cmd
–list-all public (default, active) interfaces: enp0s3 enp0s8 sources:
services: dhcpv6-client ssh ports: masquerade: no forward-ports:
icmp-blocks: rich rules: [vagrant@vagrant-puppet ~]$ firewall-cmd
–query-port=22/tcp no [vagrant@vagrant-puppet ~]$ firewall-cmd
–query-port=23/tcp no [vagrant@vagrant-puppet ~]$ firewall-cmd
–query-port=80/tcp no [vagrant@vagrant-puppet ~]$ firewall-cmd
–query-port=443/tcp no [vagrant@vagrant-puppet ~]$ firewall-cmd
–query-port=8443/tcp no [vagrant@vagrant-puppet ~]$ Regards,
Jim