Spacewalk 2.4 For Oracle® Linux Installation Guide
Spacewalk 2.4 For Oracle® Linux Installation Guide
Spacewalk 2.4 For Oracle® Linux Installation Guide
E71077-02
January 2017
Oracle Legal Notices
Copyright 2017, Oracle and/or its affiliates. All rights reserved.
This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected
by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce,
translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse
engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them
to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then
the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware,
and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition
Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs,
including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license
terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for
use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware
in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its
safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous
applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are
trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or
registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products, and services from third parties.
Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content,
products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not
be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set
forth in an applicable agreement between you and Oracle.
Documentation Accessibility
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at
http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.
Oracle customers that have purchased support have access to electronic support through My Oracle Support. For information, visit
http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
This document describes how to install Spacewalk 2.4 servers and proxies.
iii
iv
Preface
The Spacewalk 2.4 for Oracle Linux Installation Guide describes how to install Spacewalk 2.4 servers and
proxies or Oracle Linux 6 or Oracle Linux 7 systems.
Audience
This document is written for system administrators who want to use Spacewalk to manage Oracle Linux
systems. It is assumed that readers have a general understanding of the Linux operating system.
Conventions
The following text conventions are used in this document:
Convention Meaning
boldface Boldface type indicates graphical user interface elements associated with an
action, or terms defined in text or the glossary.
italic Italic type indicates book titles, emphasis, or placeholder variables for which
you supply particular values.
monospace Monospace type indicates commands within a paragraph, URLs, code in
examples, text that appears on the screen, or text that you enter.
v
vi
Chapter 1 Installing and Upgrading Spacewalk Servers
This chapter describes how to install or upgrade a Spacewalk server.
Note
Do not register a Spacewalk server or client with ULN. You can register a
Spacewalk server as a client of itself to receive updates.
You should install Oracle Linux 6 or Oracle Linux 7 using the Minimal or Basic Server software set. If you
select additional package groups during installation, remove the jta package before installing Spacewalk,
as this package causes Spacewalk services to fail to start.
Install Spacewalk using only the packages provided by Oracle from the Oracle Linux Yum Server at http://
yum.oracle.com.
No third-party package repositories are required to install Spacewalk on Oracle Linux 6 or Oracle Linux 7.
All the required packages are available in the Spacewalk repositories on the Oracle Linux Yum Server.
To preserve errata mapping, by default Spacewalk maintains all available versions of all available
packages in each software channel that you configure. As a result, the storage requirements for a
Spacewalk server can be significant, depending on the number of major versions and architectures that
you chose to support. Typically, the Oracle Linux binary repositories require approximately 60 GB for each
combination of Oracle Linux release and architecture. An extra 40 GB is required for source packages and
80 GB for Ksplice updates for each combination of Oracle Linux release and architecture.
Note
With Spacewalk 2.4, you can reduce the storage requirements considerably by
specifying the --latest option to the spacewalk-repo-sync command, which
causes the server to synchronize only the latest packages that are available at the
time of synchronization. It does not remove older packages from the channel. If the
synchronization interval is large, you might miss a particular version of a package.
This can have implications for errata handling, where errata are associated
with specific package versions. If errata consistency is important to you, Oracle
recommends that you do not use --latest. However, using --latest with a
Ksplice channel is an exception because its packages are always cumulative.
Caution
Packages are never removed from Oracle Linux repositories, so the space required
for each repository only ever increases. You should actively monitor the available
disk space on the Spacewalk server.
1
Database Requirements
A Spacewalk server stores the packages that it hosts under the /var/satellite/redhat directory
hierarchy. You should plan how best to configure the /var file system before you install Spacewalk.
For example, if you set up /var as an ext4 file system on an LVM logical volume, you can expand the
storage when required.
Oracle Database
PostgreSQL
Oracle supports only Oracle Database for use with Spacewalk and provides a restricted-use license
for the use of Oracle Database 12c Enterprise Edition for Oracle Linux support customers. For more
information, see Restricted Use Licenses Associated with Oracle Linux Support in the Oracle Linux
Licensing Information User Manual for Release 6.
Oracle Database XE and PostgreSQL are not supported and their use is not described further in this
document.
Oracle does not provide any tools for migrating from an unsupported database. For information on
setting up a PostgreSQL database for use with Spacewalk, see https://fedorahosted.org/spacewalk/wiki/
PostgreSQLServerSetup.
You can download the software from Oracle Technology Network (OTN) at http://www.oracle.com/
technetwork/database/enterprise-edition/downloads/index.html.
To obtain the correct Oracle Database 11gR2 release, you must download the software from My Oracle
Support (MOS) at https://support.oracle.com.
The database must use the AL32UTF8 character set that supports Unicode.
Note
You can select the AL32UTF8 character set if you select Advanced install in the
Installation GUI but not if you select Typical install.
The database must have a Spacewalk user. For example, you could create a user named spacewalk
for Oracle Database 11gR2 or c##spacewalk for Oracle Database 12c.
2
Networking Requirements
If several Spacewalk servers will share the same database server, you must create a separate
Spacewalk user for each server. For example, if you intend to set up two Spacewalk servers that share
the same database, you could create users named spacewalk and spacewalk2 for Oracle Database
11gR2 or c##spacewalk and c##spacewalk2 for Oracle Database 12c.
The Spacewalk user must have the CONNECT and RESOURCE roles.
The Spacewalk user must have the ALTER SESSION, CREATE SYNONYM, CREATE TABLE, CREATE
TRIGGER, CREATE VIEW and UNLIMITED TABLESPACE system privileges.
Connected to:
Oracle Database 12c Enterprise Edition Release 12.1.0.2.0 - 64bit Production
With the Partitioning, OLAP, Advanced Analytics and Real Application Testing options
SQL>
Replace sw_user and sw_passwd with the Spacewalk user name and password.
Repeat these steps for each Spacewalk user that you need to set up.
Verify that the host name returned by the hostname command and the value of HOSTNAME defined in /
etc/sysconfig/network are identical and that this host name is consistent with the FQDN defined for
the system in DNS for both forward and reverse lookups, for example:
# hostname
swksvr.mydom.com
# grep HOSTNAME /etc/sysconfig/network
HOSTNAME=swksvr.mydom.com
# host swksvr.mydom.com
swksvr.mydom.com has address 192.168.1.3
# host 192.168.1.3
3.1.168.192.in-addr.arpa domain name pointer swksvr.mydom.com.
Edit /etc/hosts and configure the actual IP address for the FQDN and host name and not the loopback
address (127.0.0.1), for example:
3
Installing a Spacewalk Server
The following table shows the network ports that a Spacewalk server uses, depending on its configuration.
If the Spacewalk server needs to connect though a web proxy, you can configure the web proxy in either of
the following ways:
Edit /etc/rhn/rhn.conf and enter the web proxy configuration settings for the
server.satellite.http_proxy, server.satellite.http_proxy_username, and
server.satellite.http_proxy_password parameters, for example:
server.satellite.http_proxy = webproxy.mydom.com:80
server.satellite.http_proxy_username = another
server.satellite.http_proxy_password = clydenw
1. Select the Admin tab, then Spacewalk Configuration, and then General.
2. Enter the web proxy configuration settings in the fields HTTP proxy, HTTP proxy username, HTTP
proxy password, and Confirm HTTP proxy password, and then click Update.
Configure the Spacewalk server, proxies, and clients to use network time synchronization mechanism
such as the Network Time Protocol (NTP) or Precision Time Protocol (PTP). Spacewalk requires that the
system time on these systems are as consistent to within 120 seconds in order to establish an SSL-based
connection. For example, if the system times (corrected for time zone difference) of the server and a client
differ by more than 120 seconds, authentication of the osad service on a client by the jabberd service on
the server fails.
For more information, see Network Time Configuration in the Oracle Linux 6 Administrator's Guide or see
Network Time Configuration in the Oracle Linux 7 Administrator's Guide.
4
Installing a Spacewalk Server
Note
Do not download the packages for release 12.1 or later. These releases are
not supported.
Note
The Spacewalk server configuration fails if the Instant Client is missing. Oracle
recommends that you install the latest 11gR2 release of the Instant Client.
2. Ensure that the jta package is not installed and prevent it from being installed when you install
Spacewalk.
To prevent the jta package from being installed, either disable the Oracle Linux 6 or Oracle Linux
7 Add-ons channels ([ol6_addons] or [ol7_addons]), or add the jta package to the exclude
directive in the yum configuration file /etc/yum.conf, for example:
exclude=jta*
5
Installing a Spacewalk Server
4. Enable access to the repositories that contain the Spacewalk Server 2.4 and dependent packages on
the Oracle Linux Yum Server at http://yum.oracle.com.
a. Download the latest the Oracle Linux Yum Server repository configuration file (http://
yum.oracle.com/public-yum-ol6.repo to the yum repositories directory (by default /etc/
yum.repos.d).
a. Download the latest the Oracle Linux Yum Server repository configuration file http://
yum.oracle.com/public-yum-ol7.repo to the yum repositories directory (by default /etc/
yum.repos.d).
Alternatively, you can create a yum repository configuration file, for example /etc/yum.repos.d/
spacewalk24.repo, with content similar to the following examples.
[ol6_spacewalk24_server]
name=Spacewalk Server 2.4 for Oracle Linux 6 ($basearch)
baseurl=http://yum.oracle.com/repo/OracleLinux/OL6/spacewalk24/server/$basearch/
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-oracle
gpgcheck=1
enabled=1
[ol7_optional_latest]
name=Oracle Linux 7 Optional Latest ($basearch)
baseurl=http://public-yum.oracle.com/repo/OracleLinux/OL7/optional/latest/$basearch/
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-oracle
gpgcheck=1
enabled=1
[ol7_spacewalk24_server]
name=Spacewalk Server 2.4 for Oracle Linux 7 ($basearch)
baseurl=http://yum.oracle.com/repo/OracleLinux/OL7/spacewalk24/server/$basearch/
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-oracle
gpgcheck=1
enabled=1
5. Install the Spacewalk server packages that are configured to use Oracle Database:
Optionally, you can also install the spacewalk-utils and spacecmd packages if you want to use
commands such as spacecmd, spacewalk-common-channels, spacewalk-hostname-rename,
or spacewalk-sync-setup.
6
Installing a Spacewalk Server
spacecmd allows you to administer Spacewalk from the command line. You can manage activation
keys, configuration channels, Kickstarts, software channels, systems, and users.
spacewalk-hostname-rename allows you to regenerate the SSL certificate if you change the
system's host name.
You can safely ignore any SELinux restorecon messages that are displayed when the packages are
installed.
Alternatively, you can install the additional packages at a later time if you register the Spacewalk server
as a client of itself and subscribe it to the appropriate Spacewalk Server 2.4 channel.
Note
The value that you specify for Organization Unit must be the FQDN of the server
in DNS, which must be the same as the system's host name.
sw_user and sw_passwd are the Spacewalk user name and password that
you configured for Oracle Database.
The value expected for the database service name (SID) is the global database
name and not the value of ORACLE_SID.
7
Installing a Spacewalk Server
* Enabling Monitoring.
* Configuring apache SSL virtual host.
Should setup configure apache's default ssl server for you
(saves original ssl.conf) [Y]? y
** /etc/httpd/conf.d/ssl.conf has been backed up to ssl.conf-swsave
* Configuring jabberd.
* Creating SSL certificates.
CA certificate password? cert_passwd
Re-enter CA certificate password? cert_passwd
Organization? Oracle Demo
Organization Unit [swksvr.mydom.com]? swksvr.mydom.com
Email Address [[email protected]]? [email protected]
City? Redwood Shores
State? CA
Country code (Examples: "US", "JP", "IN", or type "?" to see a list)? US
** SSL: Generating CA certificate.
** SSL: Deploying CA certificate.
** SSL: Generating server certificate.
** SSL: Storing SSL certificates.
* Deploying configuration files.
* Update configuration in database.
* Setting up Cobbler..
Cobbler requires tftp and xinetd services be turned on for PXE provisioning functionality.
Enable these services [Y]? y
* Restarting services.
Installation complete.
Visit https://swksvr.mydom.com to create the Spacewalk administrator account.
# /usr/sbin/spacewalk-service status
router (pid 5097) is running...
sm (pid 5105) is running...
c2s (pid 5113) is running...
s2s (pid 5121) is running...
tomcat6 (pid 5193) is running... [ OK ]
httpd (pid 5303) is running...
osa-dispatcher (pid 5331) is running...
rhn-search is running (5353).
cobblerd (pid 5392) is running...
RHN Taskomatic is running (5419).
The process IDs on your system are likely to be different from those shown in this example.
8. Point a browser at the Spacewalk server URL mentioned in the output and create the Spacewalk
administrator account.
9. If you want to use third-party CA-signed SSL certificate instead of the self-signed SSL certificate, follow
the procedure given in Chapter 3, Replacing SSL Certificates on Spacewalk Servers or Spacewalk
Proxies.
Note
8
Upgrading a Spacewalk Server
Replace the self-signed SSL certificate before registering any clients. Otherwise,
you must log on separately to each existing client and configure it to use a new
SSL certificate. You cannot do this from the Spacewalk server.
Register the Spacewalk server as a client of itself after you have set up the
software channels. Include the Spacewalk Server 2.4 channel in the list of
software channels to which the server is subscribed.
/etc/jabberd
/etc/rhn
/etc/sysconfig/rhn
For example, you could use the tar command to create a backup:
For more information on how to use the Recovery Manager (RMAN) to create a backup, see:
3. Disable access to the Spacewalk Server 2.0 or 2.2 packages and enable access to the Spacewalk
Server 2.4 packages.
a. Create a Spacewalk Server 2.4 channel as a child of the Oracle Linux 6 base channel.
b. Create a Spacewalk Server 2.4 repository that accesses the Spacewalk Server 2.4 channel
on the Oracle Linux Yum Server (http://yum.oracle.com/repo/OracleLinux/OL6/
spacewalk24/server/x86_64/), using the same GPG settings as for Oracle Linux 6.
c. Associate the Spacewalk Server 2.4 repository with the Spacewalk Server 2.4 channel and
synchronize the repository's packages from the Oracle Linux Yum Server.
d. Change the channel subscription of the Spacewalk server in Spacewalk from the Spacewalk
Server 2.0or 2.2 channel to the Spacewalk Server 2.4 channel.
If the Spacewalk server is configured to obtain Spacewalk Server 2.0 or 2.2 packages from the
Oracle Linux Yum Server:
a. Disable the Spacewalk Server 2.0 or 2.2 repository in the Oracle Linux Yum Server repository
configuration file, or delete your Spacewalk Server 2.0 or 2.2 .repo file.
9
Upgrading a Spacewalk Server
b. Download the latest the Oracle Linux Yum Server repository configuration file (http://
yum.oracle.com/yum-ol6.repo) to the yum repositories directory (by default /etc/yum.repos.d)
and enable the ol6_spacewalk24_server repository in that file.
You can safely ignore any SELinux restorecon messages that are displayed when the packages are
installed.
5. Install the rpmconf package and use the rpmconf command to copy any customizations you want to
preserve to the upgraded configuration files.
# yum install rpmconf
# rpmconf -a
a. On the Oracle Database server, log in as a database administrator (typically, SYSDBA) and verify
that the database is running.
$ sqlplus / as SYSDBA
Connected to:
Oracle Database 12c Enterprise Edition Release 12.1.0.2.0 - 64bit Production
With the Partitioning, OLAP, Advanced Analytics and Real Application Testing options
SQL>
10
Troubleshooting Spacewalk Server Problems
b. If you are upgrading a Spacewalk 2.0 server, grant the additional system privileges CREATE TABLE
and CREATE TRIGGER to the Spacewalk database user.
SQL> grant create table, create trigger to sw_user;
c. On the Spacewalk server, enter the following command to upgrade the database schema.
# /usr/bin/spacewalk-schema-upgrade
The output of the spacewalk-schema-upgrade command confirms whether or not the schema
upgrade was successful. In the event of a failure:
Fix the cause of the problem, for example by extending the tablespaces if there is insufficient
space.
If you previously customized the Spacewalk installation, for example in the file /etc/rhn/rhn.conf,
restore the customizations from your backup.
For information about other issues and workarounds, see the Spacewalk 2.4 for Oracle Linux Release
Notes.
Use the /usr/sbin/spacewalk-service status command to verify which Spacewalk services are
not running correctly. If a service does not start correctly, this is usually due to incorrect configuration
information being entered during installation.
11
Managing Spacewalk Logging
For more information, see the Oracle Linux 6 Administrator's Guide or Oracle Linux 7 Administrator's
Guide.
This error usually indicates that the system's host name does not match its FQDN in DNS or that you
specified an incorrect FQDN as the name of the Organization Unit when you installed Spacewalk.
To regenerate the SSL certificate, you can use the spacewalk-hostname-rename command, which is
available in the spacewalk-utils package.
Note
12
osa-dispatcher Reports an Invalid Password
Run spacewalk-hostname-rename, specifying the IP address and FQDN of the server as arguments to
the command, for example:
# /usr/sbin/spacewalk-hostname-rename IP_address --ssl-orgunit=FQDN
After regenerating the SSL certificate, stop the jabberd and osa-dispatcher services, clear the
jabberd database, and restart the jabberd and osa-dispatcher services.
On every client registered to the server, verify that the value of serverURL in /etc/sysconfig/rhn/
up2date is configured with the correct server host name or IP value, for example:
serverURL=https://swksvr.mydom.com/XMLRPC
This error can happen if the jabberd database contains invalid entries.
To clear the error, stop the jabberd and osa-dispatcher services, clear the jabberd database, and
restart the jabberd and osa-dispatcher services.
13
Tomcat Does Not Start
Note
Oracle recommends that you clear the jabberd database at regular intervals to
avoid problems with OSA.
14
Chapter 2 Installing and Upgrading Spacewalk Proxies
A Spacewalk proxy acts as an intermediary between Spacewalk clients and a Spacewalk server. The main
purposes of a Spacewalk proxy are to mitigate the loading on the Spacewalk server and to reduce the
download times for Spacewalk clients.
Note
Do not register a Spacewalk proxy with ULN. You can register a Spacewalk proxy
as a client of itself or of a Spacewalk server to receive updates.
You can install Oracle Linux 6 or Oracle Linux 7 using the Minimal or Basic Server software set. If you
select additional package groups during installation, remove the jta package before installing Spacewalk,
as this package causes Spacewalk services to fail to start.
Install Spacewalk using only the packages provided by Oracle from the Oracle Linux Yum Server at http://
yum.oracle.com.
No third-party package repositories are required to install Spacewalk on Oracle Linux 6 or Oracle Linux 7 .
All the required packages are available in the Spacewalk repository on the Oracle Linux Yum Server.
Typically, the proxy cache requires 10 GB of storage for each combination of Oracle Linux release and
architecture.
By default, a Spacewalk proxy caches packages under the /var/spool/squid directory hierarchy and is
limited to using up to 60% of the free space in the file system that contains this directory hierarchy.
Verify that the host name returned by the hostname command and the value of HOSTNAME defined in /
etc/sysconfig/network are identical and that this host name is consistent with the FQDN defined for
the system in DNS for both forward and reverse lookups, for example:
# hostname
swkproxy.us.mydom.com
# grep HOSTNAME /etc/sysconfig/network
HOSTNAME=swkproxy.us.mydom.com
# host swkproxy.us.mydom.com
swkproxy.us.mydom.com has address 10.0.0.24
15
Installing a Spacewalk Proxy
# host 10.0.0.24
24.0.0.10.in-addr.arpa domain name pointer swkproxy.us.mydom.com.
Edit /etc/hosts and configure the actual IP address for the FQDN and host name and not the loopback
address (127.0.0.1), for example:
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
10.0.0.24 swkproxy.us.mydom.com swkproxy
The following table shows the network ports that a Spacewalk proxy uses, depending on its configuration.
If the Spacewalk proxy needs to connect though a web proxy, you can configure the web proxy during
installation.
Configure the Spacewalk server, proxies, and clients to use network time synchronization mechanism such
as the Network Time Protocol (NTP) or Precision Time Protocol (PTP). Spacewalk requires that the system
time on these systems are consistent to within 120 seconds in order to establish an SSL-based connection.
The following procedure assumes that you are installing and configuring a
Spacewalk proxy on an Oracle Linux 7 Update 1 or later system or an Oracle Linux
6 Update 7 or later system. You do not need to install the Spacewalk client software
before registering a Spacewalk proxy system with the Spacewalk server.
1. Ensure that the jta package is not installed and prevent it from being installed when you install
Spacewalk.
To prevent the jta package from being installed, either disable the Oracle Linux 6 or Oracle Linux
7 Add-ons channel ([ol6_addons] or [ol7_addons]), or add the jta package to the exclude
directive in the yum configuration file /etc/yum.conf, for example:
16
Installing a Spacewalk Proxy
exclude=jta*
3. Register the system as a client of the Spacewalk server for which it will act as a Spacewalk proxy:
Note
Before you can register a server, you must have already created a client
activation key. If enabled, a universal default key can be used. However, using a
specific activation key is better.
The following steps use SSL to encrypt all communication between the client
and the Spacewalk server (the recommended configuration).
Alternatively, you can use wget from the command line, for example:
# wget -q -O /usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT \
http://swksvr_FQDN/pub/RHN-ORG-TRUSTED-SSL-CERT
b. Register the system with Spacewalk using the rhnreg_ks command, using the --sslCACert
option to specify the path of the CA certificate.
# rhnreg_ks --sslCACert=/usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT \
--serverUrl=https://swksvr_FQDN/XMLRPC --activationkey=activation_key
Specify the Spacewalk server or proxy by its fully qualified domain name.
c. Verify that the settings in the /etc/sysconfig/rhn/up2date file that are used to access the
Spacewalk server are correct:
i. Verify that serverURL is set to the Spacewalk server's URL, for example https://
swksvr.mydom.com/XMLRPC:
17
Installing a Spacewalk Proxy
serverURL=https://swksvr.mydom.com/XMLRPC
ii. Verify that sslCACert is set to the correct CA certificate file, for example /usr/share/rhn/
RHN-ORG-TRUSTED-SSL-CERT:
Note
If the settings are not correct, you probably made a mistake when you used
rhnreg_ks to register the system. Run the rhnreg_ks command again,
checking that you correctly specify the path of the CA certificate and the
Spacewalk server's URL, and specifying the --force option to override the
previous settings.
4. If not already present on the Spacewalk server, create software channels for Spacewalk 2.4 Client
and Spacewalk Server 2.4, subscribe the Spacewalk proxy system to these channels and enable
Provisioning entitlements for the Spacewalk proxy:
a. Create a Spacewalk Client 2.4 channel as a child of either the Oracle Linux 6 or Oracle Linux 7
base channel as appropriate to the installed version of Oracle Linux.
b. Create a Spacewalk Client 2.4 repository that accesses the appropriate Spacewalk Client 2.4
channel on the Oracle Linux Yum Server (http://yum.oracle.com/repo/OracleLinux/
OL6/spacewalk24/client/x86_64/ or http://yum.oracle.com/repo/OracleLinux/
OL7/spacewalk24/client/x86_64/), using the same GPG settings as for Oracle Linux 6 or
Oracle Linux 7.
c. Associate the Spacewalk Client 2.4 repository with the Spacewalk Client 2.4 channel and
synchronize the repository's packages from the Oracle Linux Yum Server.
d. Create a Spacewalk Server 2.4 channel as a child of either the Oracle Linux 6 or Oracle Linux 7
base channel as appropriate to the installed version of Oracle Linux.
e. Create a Spacewalk Server 2.4 repository that accesses the appropriate Spacewalk Server 2.4
channel on the Oracle Linux Yum Server (http://yum.oracle.com/repo/OracleLinux/
OL6/spacewalk24/server/x86_64/ or http://yum.oracle.com/repo/OracleLinux/
OL7/spacewalk24/server/x86_64/), using the same GPG settings as for Oracle Linux 6 or
Oracle Linux 7.
f. Associate the Spacewalk Server 2.4 repository with the Spacewalk Server 2.4 channel and
synchronize the repository's packages from the Oracle Linux Yum Server.
g. Change the channel subscription of the Spacewalk server in Spacewalk from the Spacewalk Server
2.0 or 2.2 channel to the Spacewalk Server 2.4 channel.
h. Subscribe the Spacewalk proxy to the Spacewalk Client 2.4 and Spacewalk Server 2.4 channels.
18
Installing a Spacewalk Proxy
# mkdir /root/ssl-build
8. Copy the Spacewalk server's CA key and public certificate files to /root/ssl-build. For example:
# scp 'root@spacewalk_server:/root/ssl-build/{RHN-ORG-PRIVATE-SSL-KEY,\
RHN-ORG-TRUSTED-SSL-CERT,rhn-ca-openssl.cnf}' /root/ssl-build
RHN-ORG-PRIVATE-SSL-KEY 100% 1751 1.7KB/s 00:00
RHN-ORG-TRUSTED-SSL-CERT 100% 5316 5.2KB/s 00:00
rhn-ca-openssl.cnf 100% 2186 2.1KB/s 00:00
# /usr/sbin/configure-proxy.sh
Using RHN parent (from /etc/sysconfig/rhn/up2date): swksvr.mydom.com
Using CA Chain (from /etc/sysconfig/rhn/up2date): /usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT
HTTP Proxy []: [Enter]
Proxy version to activate [2.4]: [Enter]
Traceback email []: [email protected]
Use SSL [Y/n]: Y
Regardless of whether you enabled SSL for the connection to the Spacewalk Parent
Server, you will be prompted to generate an SSL certificate.
This SSL certificate will allow client systems to connect to this Spacewalk Proxy
securely. Refer to the Spacewalk Proxy Installation Guide for more information.
Organization []: Oracle Demo
Organization Unit [swkproxy.us.mydom.com]: [Enter]
Common Name [swkproxy.us.mydom.com]: [Enter]
City []: Redwood Shores
State []: CA
Country code []: US
Email [[email protected]]: [Enter]
Cname aliases (separated by space) []: [Enter]
Spacewalk Proxy successfully activated.
Loaded plugins: rhnplugin
This system is receiving updates from RHN Classic or Red Hat Satellite.
Setting up Install Process
Resolving Dependencies
--> Running transaction check
---> Package spacewalk-proxy-management.noarch... will be installed
...
Transaction Summary
================================================================================
Install 42 Package(s)
19
Installing a Spacewalk Proxy
Password: swadmin_passwd
Using server name swksvr.mydom.com
Creating config channel rhn_proxy_config_1000010000
Config channel rhn_proxy_config_1000010000 created
Using server name swksvr.mydom.com
Pushing to channel rhn_proxy_config_1000010000:
Local file /etc/httpd/conf.d/ssl.conf -> remote file /etc/httpd/conf.d/ssl.conf
Local file /etc/rhn/rhn.conf -> remote file /etc/rhn/rhn.conf
Local file /etc/squid/squid.conf -> remote file /etc/squid/squid.conf
Local file /etc/httpd/conf.d/cobbler-proxy.conf -> remote file /etc/httpd/conf.d/cobbler-proxy.conf
Local file /etc/httpd/conf/httpd.conf -> remote file /etc/httpd/conf/httpd.conf
Local file /etc/jabberd/c2s.xml -> remote file /etc/jabberd/c2s.xml
Local file /etc/jabberd/sm.xml -> remote file /etc/jabberd/sm.xml
Enabling Spacewalk Proxy.
Shutting down rhn-proxy...
Terminating jabberd processes ...
Stopping s2s: [FAILED]
Stopping c2s: [FAILED]
Stopping sm: [FAILED]
Stopping router: [FAILED]
Stopping httpd: [FAILED]
Stopping squid: [FAILED]
Done.
Starting rhn-proxy...
init_cache_dir /var/spool/squid... Starting squid: . [ OK ]
Starting httpd: [ OK ]
Initializing jabberd processes ...
Starting router: [ OK ]
Starting sm: [ OK ]
Starting c2s: [ OK ]
Starting s2s: [ OK ]
Done.
There were some answers you had to enter manually.
Would you like to have written those into file
formatted as answers file? [Y/n]: Y
Writing proxy-answers.txt.NtM1Y
The Spacewalk user name and password (swadmin and swadmin_passwd) are the Spacewalk server
administrator's user name and password.
Note
The information that you enter is optionally recorded in a file named proxy-
answers.txt.UID, where UID is a unique identifier. You can use this file to
automate the configuration of a Spacewalk proxy, for example:
10. If you want to use third-party CA-signed SSL certificate instead of the self-signed SSL certificate, follow
the procedure given in Chapter 3, Replacing SSL Certificates on Spacewalk Servers or Spacewalk
Proxies.
Note
Oracle recommends that you replace the self-signed SSL certificate before
registering any clients. Otherwise, you must log on separately to each existing
client and configure it to use the new SSL certificate. You cannot do this from
the Spacewalk server.
11. To check that the Spacewalk proxy is running correctly, specify the URL of the proxy when registering a
Spacewalk client, for example:
rhnreg_ks --sslCACert=/usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT \
20
Upgrading a Spacewalk Proxy
--serverUrl=https://swkproxy_FQDN/XMLRPC --activationkey=activation_key
After registering the client, subscribe it to software channels on the server and verify that you can
update packages from the client.
1. If not already present on the Spacewalk server, create software channels for Spacewalk 2.4 Client
and Spacewalk Server 2.4, subscribe the Spacewalk proxy system to these channels and enable
Provisioning entitlements for the Spacewalk proxy:
a. Create a Spacewalk Client 2.4 channel as a child of either the Oracle Linux 6 base channel.
b. Create a Spacewalk Client 2.4 repository that accesses the Spacewalk Client 2.4 channel
on the Oracle Linux Yum Server (http://yum.oracle.com/repo/OracleLinux/OL6/
spacewalk24/client/x86_64/), using the same GPG settings as for Oracle Linux 6.
c. Associate the Spacewalk Client 2.4 repository with the Spacewalk Client 2.4 channel and
synchronize the repository's packages from the Oracle Linux Yum Server.
d. Create a Spacewalk Server 2.4 channel as a child of the Oracle Linux 6 base channel.
e. Create a Spacewalk Server 2.4 repository that accesses the Spacewalk Server 2.4 channel
on the Oracle Linux Yum Server (http://yum.oracle.com/repo/OracleLinux/OL6/
spacewalk24/server/x86_64/), using the same GPG settings as for Oracle Linux 6.
f. Associate the Spacewalk Server 2.4 repository with the Spacewalk Server 2.4 channel and
synchronize the repository's packages from the Oracle Linux Yum Server.
g. Change the channel subscription of the Spacewalk server in Spacewalk from the Spacewalk Server
2.0 or 2.2 channel to the Spacewalk Server 2.4 channel.
h. Subscribe the Spacewalk proxy to the Spacewalk Client 2.4 and Spacewalk Server 2.4 channels
instead of the Spacewalk Server and Client 2.0 or 2.2 channels.
2. Back up the CA key, SSL certificate, and openSSL configuration file in /root/ssl-build.
For example, you could use the tar command to create a backup:
# cd /root/ssl-build
# tar -cvf /tmp/sslcerts.tar RHN-ORG-PRIVATE-SSL-KEY RHN-ORG-TRUSTED-SSL-CERT rhn-ca-openssl.cnf
4. Extract the CA key, SSL certificate, and openSSL configuration file from your backup file to /root/
ssl-build, for example:
# cd /root/ssl-build
# tar -xvf /tmp/sslcerts.tar
21
Troubleshooting Spacewalk Proxy Installation Problems
The following example uses the proxy-answers.txt.UID file saved from a previous installation to
perform the configuration:
# configure-proxy.sh --non-interactive --answer-file=proxy-answers.txt.NtM1Y
For information about other issues and workarounds, see the Spacewalk 2.4 for Oracle Linux 6 Release
Notes.
Use the rhn-proxy status command to find out which Spacewalk proxy services are not running
correctly. If a service does not start correctly, this is usually due to incorrect configuration information being
entered during installation.
Verify that the file /etc/sysconfig/rhn/systemid is owned by root:apache and that its mode is set
to 640.
22
Clearing the Proxy Cache
23
24
Chapter 3 Replacing SSL Certificates on Spacewalk Servers or
Spacewalk Proxies
When you install a Spacewalk server or Spacewalk proxy, you create a self-signed SSL certificate that you
can use with Spacewalk clients. This section describes how to replace self-signed certificates or expired
CA-signed certificates with certificates that have been signed by a Certificate Authority (CA).
You can use certificates for individual Spacewalk servers or Spacewalk proxies, or wildcard certificates for
all Spacewalk servers or Spacewalk proxies in the domains that the wildcard certificates cover.
2. Obtain a server certificate from a CA and install this certificate in the SSL build hierarchy on the system:
Note
After validating your request, the CA returns a signed server certificate file.
A PEM-format certificate file is a text file that contains a base64-encoded certificate section
between begin and end markers, for example:
-----BEGIN CERTIFICATE-----
MIIF7DCCBNSgAwIBAgIQbsx6pacDIAm4zrz06VLUkTANBgkqhkiG9w0BAQUFADCB
...
Rs/iGAZeqa6ogZpHFt4MKGwlJ7net4RYxh84HqTEy2Y=
-----END CERTIFICATE-----
A PEM-format certificate file usually has a file extension of .crt or .pem. However, binary DER-
format certificate files are also sometimes given a .crt extension.
A DER-format certificate file is a binary file that usually has a file extension of .cer or .der, but
can also have the extension .cert or .crt.
You can use the following command to test if a certificate file is in DER format:
d. If a certificate file is in DER format, convert the file to a PEM-format certificate file, for example:
25
# openssl x509 -inform der -in server.cer -out server.pem
e. If a PEM-format certificate file was not generated on a UNIX or Linux system, it might contain
^M carriage return characters. You can use either of the following commands to remove these
characters:
# cp server.pem /root/ssl-build/swksvr/server.crt
3. Add the CA public certificate to the /root/ssl-build directory as the file RHN-ORG-TRUSTED-SSL-
CERT, overwriting the original file:
If available, obtain the CA chain certificate from the CA that issued the server certificate. Copy this
certificate file to /root/ssl-build/RHN-ORG-TRUSTED-SSL-CERT, for example:
# cp ca_chain.pem /root/ssl-build/RHN-ORG-TRUSTED-SSL-CERT
If the CA chain certificate is not available from the issuing CA, create the CA chain certificate
yourself:
a. Obtain the root CA public certificate and the intermediate CA public certificates from the issuing
CA.
b. Concatenate the chain of CA public certificate files starting with the public certificate file of the CA
that issued your server certificate down to the public certificate file of the root CA to /root/ssl-
build/RHN-ORG-TRUSTED-SSL-CERT, for example:
In this example, intermediate_ca.pem is the public certificate file of the intermediate CA that
signed your server certificate, and root_ca.pem is the public certificate file of the root CA that
signed the intermediate certificate.
Note
If a root CA signed your server certificate directly (which is unlikely nowadays), only the public
certificate of the root CA is required. Copy the root CA public certificate file to /root/ssl-build/
RHN-ORG-TRUSTED-SSL-CERT, for example:
# cp root_ca.pem /root/ssl-build/RHN-ORG-TRUSTED-SSL-CERT
4. Use the following command to validate the server certificate against the CA public certificate:
26
If this command returns an error, verify that you have created RHN-ORG-TRUSTED-SSL-CERT
correctly and that the date and time configured on the server are correct.
5. Store the CA public certificate in the Spacewalk database so that it is available for use in provisioning
client systems.
# rhn-ssl-dbstore -v --ca-cert=/root/ssl-build/RHN-ORG-TRUSTED-SSL-CERT
Public CA SSL certificate: /root/ssl-build/RHN-ORG-TRUSTED-SSL-CERT
If the command returns an error, enter the command again, specifying a higher level of debugging such
as -vvv to gather more information about the problem.
...working...
The most current Spacewalk Proxy Server installation process against RHN hosted
requires the upload of an SSL tar archive that contains the CA SSL public
certificate and the web server's key set.
Generating the web server's SSL key set and CA SSL public certificate archive:
/root/ssl-build/swksvr/rhn-org-httpd-ssl-archive-swksvr-1.0-rev.tar
You can use rpm to list the files that the packages install.
# rpm -qlp /root/ssl-build/swksvr/rhn-org-httpd-ssl-key-pair-swksvr-1.0-rev.src.rpm
rhn-org-httpd-ssl-key-pair-swksvr-1.0.tar.gz
rhn-org-httpd-ssl-key-pair-swksvr.spec
# rpm -qlp /root/ssl-build/swksvr/rhn-org-httpd-ssl-key-pair-swksvr-1.0-rev.noarch.rpm
/etc/httpd/conf/ssl.crt/server.crt
/etc/httpd/conf/ssl.csr/server.csr
/etc/httpd/conf/ssl.key/server.key
/etc/pki/spacewalk/jabberd/server.pem
7. Generate the public CA certificate package and make both the package and the CA public certificate
file available to clients:
...working...
Generating CA public certificate RPM:
27
/root/ssl-build/rhn-org-trusted-ssl-cert-1.0-rev.src.rpm
/root/ssl-build/rhn-org-trusted-ssl-cert-1.0-rev.noarch.rpm
You can use rpm to list the files that the packages install.
b. If a Spacewalk server or Spacewalk proxy is also configured as a client, install the public CA
certificate noarch package on this system.
# cp /root/ssl-build/rhn-org-trusted-ssl-cert-1.0-rev.noarch.rpm /var/www/html/pub
# cp /root/ssl-build/RHN-ORG-TRUSTED-SSL-CERT /var/www/html/pub
Note
# sha1sum /root/ssl-build/RHN-ORG-TRUSTED-SSL-CERT \
/usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT \
/var/www/html/pub/RHN-ORG-TRUSTED-SSL-CERT
74380a372bfa55d8ab7579bf01502c874b8aae84
/root/ssl-build/RHN-ORG-TRUSTED-SSL-CERT
74380a372bfa55d8ab7579bf01502c874b8aae84
/usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT
74380a372bfa55d8ab7579bf01502c874b8aae84
/var/www/html/pub/RHN-ORG-TRUSTED-SSL-CERT
8. On a Spacewalk server, stop the Spacewalk services, clear the jabberd database, and restart
Spacewalk.
# /usr/sbin/spacewalk-service stop
# rm -Rf /var/lib/jabberd/db/*
# /usr/sbin/spacewalk-service start
28
# /usr/sbin/rhn-proxy restart
9. On the remaining Spacewalk clients, download and install the public CA certificate package, for
example:
# wget https://swksvr.mydom.com/pub/rhn-org-trusted-ssl-cert-1.0-rev.noarch.rpm
--2015-06-05 15:15:44-- https://swksvr.mydom.com/pub/rhn-org-trusted-ssl-cert-1.0-rev.noarch.rpm
Resolving swksvr.mydom.com... 192.168.1.3
Connecting to swksvr.mydom.com|192.168.1.3|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 4840 (4.7K) [application/x-rpm]
Saving to: rhn-org-trusted-ssl-cert-1.0-2.noarch.rpm
Note
29
30
Chapter 4 Configuring Inter-Server Synchronization
You can configure Inter-Server Synchronization (ISS) to synchronize channel content, channel
permissions, and organizational trust settings between Spacewalk servers. The configuration of local non-
content settings for users and organizations is not affected. One Spacewalk server acts as a master to
provide content to any number of slave Spacewalk servers. Typical use cases include:
The content on the slave servers is regularly synchronized with the master server to obtain the latest
maintenance releases.
Content is developed and tested on the master server before distribution to the slave servers.
Slave servers have local content that is additional to that synchronized from the master server.
You can configure master servers that are themselves slaves of a higher-level master Spacewalk server.
The usual ISS topology is a tree-like hierarchy, where there is one top-level master server and each slave
has only one master, rather than a directed graph, where there might be several top-level master servers
and each slave can have more than one master. If a slave has more than one master, you can designate
one to be the default master with which the slave synchronizes.
You can use the spacewalk-sync-setup command to set up the relationships between master
and slave Spacewalk servers or you can use the Spacewalk web interface to configure each server
independently.
1. To disable ISS support, edit /etc/rhn/rhn.conf and set the value of disable_iss to 1:
disable_iss=1
To enable ISS support, edit /etc/rhn/rhn.conf and set the value of disable_iss to 0:
disable_iss=0
31
Configuring a Master Spacewalk Server Using the Spacewalk Web Interface
master_swksvr_FQDN is the fully qualified domain name of the Spacewalk server that will act as the
master server. master_swadm and master_swadm_passwd are the Spacewalk administrator's user
name and password for that server.
slave_swksvr_FQDN is the fully qualified domain name of the Spacewalk server that will act as the slave
server. slave_swadm and slave_swadm_passwd are the Spacewalk administrator's user name and
password for that server.
The following example shows typical output from running this command:
You can now map local organizations on the slave server to organizations that the master server exports.
See Section 4.5, Mapping a Local Organization to an Exported Organization Using the Spacewalk Web
Interface.
1. Go to Admin, select ISS Configuration, and then select the Master Setup tab.
3. On the Edit Slave Details page, enter the fully qualified domain name of the slave server and select
or deselect the check boxes that configure slave and organization synchronization. For example,
you might want to allow the slave to synchronize from the master but not want to synchronize all
organizations to the slave.
4. Click Create.
The page refreshes to allow you to select which organizations can be exported. By default, no
organizations are selected.
5. Select the organizations that you want to allow to be exported to the slave and click Allow Orgs.
32
Configuring a Slave Spacewalk Server Using the Spacewalk Web Interface
Alternatively, you can use wget from the command line, for example:
# wget -q -O /usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT-MASTER \
http://master_swksvr_FQDN/pub/RHN-ORG-TRUSTED-SSL-CERT
2. In the Spacewalk web interface, go to Admin, select ISS Configuration and then select the Slave
Setup tab.
4. On the Details for new Master page, enter the fully qualified domain name of the master server and
the absolute path name of the master's CA certificate that you downloaded (RHN-ORG-TRUSTED-
SSL-CERT-MASTER), and select whether the master will be the default one with which the slave
synchronizes.
The page refreshes to display a Configure Master-to-Slave Org Mappings section that allows you to
configure local names for the organizations that the master exports. When you synchronize content,
access permissions that you have configured for channels on the master server propagate to the slave
server. You can choose which organizations (and thereby, any associated channel permissions) to map
to a slave server.
If necessary, create the local organizations that you want to map to the organizations that the master
server exports.
b. On the Create New Organization page, enter the details for the organization, including its name and
the login details of its administrator.
Note
You must create a new user to act as the organization's administrator. The
Spacewalk administrator cannot perform this role.
d. To return to the Configure Master-to-Slave Org Mappings section for the master server instance, go
to Admin, select ISS Configuration, select the Slave Setup tab, and click the name of the master
server instance.
6. In the Configure Master-to-Slave Org Mappings section, select the local organizations that map to the
organizations that the master server exports.
33
Mapping a Local Organization to an Exported Organization Using the Spacewalk Web Interface
For each exported organization in the Master Org Name column, use the pull-down list in the Matching
Local Org column to select the local organization that should map to the export organization. If you do
not want to import an organization, select NOT MAPPED.
7. Click Update.
1. To view that organizations that a master server exports, go to Admin, select ISS Configuration, select
the Slave Setup tab, and click the name of the master server instance.
2. Create the local organizations that you want to map to the organizations that the master server exports.
b. On the Create New Organization page, enter the details for the organization, including its name and
the login details of its administrator.
Note
You must create a new user to act as the organization's administrator. The
Spacewalk administrator cannot perform this role.
d. To return to the Configure Master-to-Slave Org Mappings section for the master server instance, go
to Admin, select ISS Configuration, select the Slave Setup tab, and click the name of the master
server instance.
3. In the Configure Master-to-Slave Org Mappings section, select the local organizations that map to the
organizations that the master server exports.
For each exported organization in the Master Org Name column, use the pull-down list in the Matching
Local Org column to select the local organization that should map to the export organization. If you do
not want to import the organization, select NOT MAPPED.
4. Click Update.
channel_label specifies the label of the software channel to synchronize from the master server.
The argument to the --orgid option specifies the ID of the organization on the slave into which the
channel is synchronized. If not specified, the Spacewalk Default Organization with ID 1 is assumed.
master_swksvr_FQDN is the fully qualified domain name of the master Spacewalk server. If not specified
and the slave server has more than one master, the default master server is assumed.
34
Synchronizing Software Channels on a Slave Server
The following example shows typical output from running this command to perform an initial
synchronization of a software channel on a slave server from the Spacewalk Default Organization on the
default master server:
# satellite-sync -c oraclelinux6-x86_64-patch
16:16:52 Spacewalk - live synchronization
16:16:52 url: https://swksvr.mydom.com
16:16:52 debug/output level: 1
16:16:52 db: c##spacewalk2/<password>@//odbsvr.mydom.com/orcl.mydom.com
16:16:52
16:16:52 Retrieving / parsing orgs data
16:16:52 orgs data complete
16:16:52
16:16:52 Retrieving / parsing channel-families data
16:16:52 channel-families data complete
16:16:52
16:16:52 Retrieving / parsing product names data
16:16:52 product names data complete
16:16:52
16:16:52 Retrieving / parsing arches data
16:16:53 arches data complete
16:16:53
16:16:53 Retrieving / parsing additional arches data
16:16:53 additional arches data complete
16:16:53
16:16:53 Retrieving / parsing channel data
16:16:54 p = previously imported/synced channel
16:16:54 . = channel not yet imported/synced
16:16:54 base-channels:
16:16:54 NONE RELEVANT
16:16:54 oraclelinux6-x86_64:
16:16:54 . oraclelinux6-x86_64-patch 1367 full import from Fri Jul 10 13:02:52 2015
16:16:54
16:16:54 Channel data complete
16:16:54
16:16:54 Retrieving short package metadata (used for indexing)
16:16:54 Retrieving / parsing short package metadata: oraclelinux6-x86_64-patch (1367)
16:17:01 Diffing package metadata (what's missing locally?): oraclelinux6-x86_64-patch
________________________________________
Diffing: ######################################## - complete
16:17:04
16:17:04 Downloading package metadata
16:17:04 Retrieving / parsing *relevant* package metadata: oraclelinux6-x86_64-patch (1357)
16:17:04 * WARNING: this may be a slow process.
________________________________________
Downloading:######################################## - complete
16:42:30
16:42:30 Downloading rpm packages
16:42:30 Fetching any missing RPMs: oraclelinux6-x86_64-patch (1357)
16:42:53 Total size: 5.31 GiB
16:47:53 Processing rpm packages complete
16:47:53
16:47:53 Importing package metadata
16:47:53 Importing *relevant* package metadata: oraclelinux6-x86_64-patch (1357)
________________________________________
Importing: ######################################## - complete
18:06:44
18:06:44 Linking packages to channels
18:07:02
18:07:02 Downloading errata data
18:07:02 Retrieving / parsing errata data: oraclelinux6-x86_64-patch (216)
________________________________________
Downloading:######################################## - complete
18:07:06 Downloading errata data complete
18:07:06
18:07:06 Downloading kickstartable trees metadata
35
Synchronizing Software Channels on a Slave Server
36