Suse Manager Install
Suse Manager Install
Suse Manager Install
Troubleshooting Guide
SUSE Manager 2.1
Installation & Troubleshooting Guide
SUSE Manager 2.1
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution-Share
Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licens-
es/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide
the URL for the original version.
Red Hat, as a licensor of these documents, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-
SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are
trademarks of Red Hat, Inc., registered in the United States and other countries. Linux® is the registered trademark of
Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other coun-
tries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
All other trademarks are the property of their respective owners.
For Novell trademarks, see the Novell Trademark and Service Mark list http://www.novell.com/company/legal/trade-
marks/tmlist.html . Linux* is a registered trademark of Linus Torvalds. All other third party trademarks are the prop-
erty of their respective owners. A trademark symbol (®, ™ etc.) denotes a Novell trademark; an asterisk (*) denotes
a third party trademark.
All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee
complete accuracy. Neither Novell, Inc., SUSE LINUX Products GmbH, the authors, nor the translators shall be held
liable for possible errors or the consequences thereof.
Contents
1 Conceptual Overview 1
1.1 Main Components 1
1.4 Benefits 3
2 Example Topologies 5
2.1 Single SUSE Manager Topology 5
3 Requirements 8
3.1 System Requirements 8
Server Requirements 8 • Supported Client Systems 9
3.4 Prerequisites 17
4 Installation 19
4.1 Summary of Steps 19
4.2 Installation 20
4.3 Setup 24
6.3 Synchronizing 73
7 Troubleshooting 83
7.1 Installation and Configuration 83
Installation and Basic Setup 83 • Basic Configuration 84 • Mail and Notifi-
cation Issues 84
1 Available Documentation
The following manuals are available on this product:
HTML versions of the product manuals can be found in the installed system under /usr/share/
doc/manual . Find the latest documentation updates at http://www.novell.com/documentation
where you can download PDF or HTML versions of the manuals for your product.
2 Feedback
Several feedback channels are available:
User Comments
We want to hear your comments about and suggestions for this manual and the other
documentation included with this product. Use the User Comments feature at the bottom of
each page in the online documentation or go to http://www.suse.com/doc/feedback.html
and enter your comments there.
Mail
For feedback on the documentation of this product, you can also send a mail to doc-
[email protected] . Make sure to include the document title, the product version and the
publication date of the documentation. To report errors or suggest enhancements, provide
a concise description of the problem and refer to the respective section number and page
(or URL).
Alt , Alt – F1 : a key to press or a key combination; keys are displayed with uppercase
letters as on a keyboard.
amd64, em64t This paragraph is only relevant for the specified architectures. The arrows
mark the beginning and the end of the text block.
SUSE Manager provides a solution to organizations requiring absolute control over and privacy
of the maintenance and package deployment of their servers. It allows customers the greatest
flexibility and power in keeping servers secure and updated.
Database
SUSE Manager can be used in conjunction with a stand-alone database (for example, the
organizations' existing database) or with an embedded database. The embedded database
comes bundled with SUSE Manager and is installed on the same machine as the SUSE
Manager server.
Some differences exist when using SUSE Manager with an external database as opposed
to the embedded database. These affect mainly hardware requirements, but also some in-
stallation steps, maintenance or troubleshooting activities. Differing instructions are either
marked with embedded database or stand-alone database throughout this guide.
SUSE Manager
Core business logic and entry point for the update tool running on client systems. The
SUSE Manager server also includes an Apache HTTP Server that serves XML-RPC requests.
RPM Repository
Repository for default packages (and custom RPM packages identified by the organization).
Management Tools
The following tools are available:
For an explanation of key terms in the SUSE Manager context, refer to the .
1.4 Benefits
Advantages of using SUSE Manager include:
Scalability — a single system administrator can set up and maintain hundreds or thou-
sands of SUSE Linux Enterprise or Red Hat Enterprise Linux client systems more easily,
accurately, and quickly than they could maintain a single system without SUSE Manager.
Security — all communication between registered systems and SUSE Manager takes place
over secure Internet connections.
Control — clients' system profiles are stored on the local SUSE Manager server.
Access control — system administrators can be restricted to access only those systems
within their maintenance responsibilities.
Efficiency and bandwidth — packages are delivered significantly faster over a local area
network. The bandwidth used for transactions between the clients and the SUSE Manager
server is controlled by the organization on the local area network.
Overview about patches — easily view patch alerts for all your client systems through
one Web site.
Customized updates — custom channels allow fine-grained control of the delivery of cus-
tom software packages. SUSE Manager allows you to create a truly automated delivery
system for custom packages as well as any SUSE Linux Enterprise or Red Hat Enterprise
Linux packages required by client systems.
Scheduled actions — use the SUSE Manager Web interface to schedule actions, including
patch updates, package installations, and software profile updates.
Standard protocols — used to maintain security and increase capability. For example, XML-
RPC enables SUSE Manager to do much more than merely download files.
Simplification — maintaining SUSE Linux Enterprise and Red Hat Enterprise Linux systems
becomes a simple, automated process.
In the following, find a simple setup example and two examples demonstrating how to effectively
balance loads for larger environments.
It is possible to synchronize content between SUSE Manager instances using the mgr-exporter
and mgr-nnc-sync -m commands. This feature is discussed in detail in Section 6.1, “Exporting
with mgr-exporter”.
7 SUSE Manager with SUSE Manager Proxies—Vertically Tiered SUSE Manager 2.1
3 Requirements
For requirements and prerequisites to be met before installation, refer to Section 3.1, “System
Requirements” and Section 3.4, “Prerequisites”. If you want to use SUSE Manager with an external
database, refer to Section 3.2, “External Database Requirements”.
Hardware Required/Recommended
Note
We strongly recommend to use disk space monitoring probes to avoid file system and
database corruption due to a lack of disk space. Set a lower threshold than you would
use for a regular system so as to notify the admin in advance of upcoming low disk space
conditions. For more information on monitoring see Book “User Guide” 11 “Monitoring —
[Mon]” and Book “Reference Guide” .
SUSE Linux Enterprise 10 SP3 and SP4 x86, x86_64, Itanium, IBM POWER, IBM Sys-
tem z
SUSE Linux Enterprise 11 SP1, SP2, and SP3 x86, x86_64, Itanium, IBM POWER, IBM Sys-
tem z
Also, the charset must be set to UTF-8. The following example script switches the character set
and executes the ALTER statements:
The precise access levels required by the Oracle user ( susemanager ) are as follows:
ALTER SESSION
CONNECT
CREATE CLUSTER
CREATE INDEXTYPE
CREATE SEQUENCE
CREATE SYNONYM
CREATE TABLE
CREATE VIEW
CREATE OPERATOR
CREATE PROCEDURE
CREATE TRIGGER
CREATE TYPE
CREATE SESSION
EXECUTE ON DBMS_LOB
RESOURCE
UNLIMITED TABLESPACE
Listener Port,
Username,
Two additional suggested recommendations for the user's default tablespace include:
The disk layout on the database machine is independent of SUSE Manager and entirely up to
the customer.
Full Access:
Client systems need full network access to the SUSE Manager's services and ports.
Firewall Rules:
Protect your SUSE Manager with a firewall against the Internet by blocking all unnecessary
and unused ports.
443 Outbound SUSE Manager uses this port to reach Novell Cus-
tomer Center (unless running in a disconnected
mode with SMT—as described in Section 4.4, “Setup
Without Internet Connection”).
For reference, here are also listings of ports to open on the client systems and the SUSE
Manager Proxy server.
80 and 443 Outbound To reach the SUSE Manager server or SUSE Manag-
er Proxy server.
4545 Inbound For connections from the server or proxy server for
monitoring.
5222 Outbound For push actions with the server or proxy server.
subscriptions for the products on the client systems you want to register with SUSE
Manager,
subscriptions to client entitlements for the client system you want to register with
SUSE Manager.
Supported Browsers
SUSE Manager supports the latest versions of IE, Firefox, Chrome and the version of Firefox
shipped with our latest SUSE Linux Enterprise version. Other browsers may work, but are
not tested and supported.
Virtual Environments
For running SUSE Manager server in virtual environments, use the following settings for
the virtual machine (VM):
Bridged network
The following virtual environments are supported:
KVM
VMware
Hyper-V
For running SUSE Manager in KVM, VMware, or Hyper-V, use the SUSE Manager ISO
image.
The entire SUSE Manager solution should be protected by a firewall if the SUSE Manager
server accesses or is accessed via the Internet. An Internet connection is not required for
SUSE Manager servers running in completely disconnected environments. Instead they can
use channel content downloaded to Subscription Management Tool (SMT) for synchroniz-
ing SUSE Manager with Novell channels. For more information, see Section 4.4, “Setup With-
out Internet Connection”.
No system components should be directly publicly available. No users other than the sys-
tem administrators should have command line access to these machines.
If SUSE Manager serves monitoring-entitled systems and you want to acknowledge incom-
ing alert notifications via email, you must have installed and configured a mail transfer
agent such as postfix to properly handle email. This can be done with YaST.
3.4 Prerequisites
For the basic SUSE Manager setup, you need to have your mirror credentials from the NCC at
hand. To look up your credentials and the email address with which you are registered in NCC,
proceed as follows.
3. Select Software Mirror Credentials. A Web page opens showing your credentials (username
and password).
5. Select your user name, then View Profile and memorize the email address with which you
are registered.
4.2 Installation
The following procedure describes the installation on a physical machine. Make sure the ma-
chine you intend to use fulfills the “Server Requirements”. If you want to install the appliance in
a virtual machine, additionally check the settings listed in Virtual Environments.
1. Boot your future SUSE Manager server from the installation medium. Select Install/Restore
SUSE Manager.
2. If your machine contains more than one hard disk, you are asked which one to use for
the installation of SUSE Manager. Navigate with the arrow keys, and use the space key to
mark the desired hard disk. You are asked if you want to continue and you are warned
that the installation will destroy all data on the disk.
3. To proceed, answer with Yes. The deployment process takes over. This step may take some
time as large amounts of data need to be unpacked and verified. After the verification,
YaST firstboot is started.
5. In the next screen, read the licenses and agree to them. Proceed with Next. The installation
routine checks some basic system requirements and depending on the results, lets you
decide whether to proceed with the installation or cancel.
6. In the next screen, set the root password for your SUSE Manager server and confirm it.
7. In the next screen, configure the network settings. Note the network requirements listed in
Section 3.3, “Additional Requirements”. Either choose to Use Following Configuration or Change
the network setup according to your wishes.
8. In the next screen, configure the Clock and Time Zone to use for your SUSE Manager server.
Proceed with Next.
9. In the next screen, configure the NTP settings according to your wishes. For more infor-
mation about the options, refer to Help. Note the NTP requirements listed in Section 3.3,
“Additional Requirements”. Proceed with Next.
10. In the next screen, your are asked to register and activate your product at NCC. During
registration, the respective online update repositories are automatically configured.
If you decide to Configure Later, you can call the respective YaST module on the SUSE
Manager server with the yast inst_suse_register command any time.
If you need to check the registration status of your SUSE Manager, use the isRegistered
command on the server. If the system is registered, more detailed information is available
in the /var/lib/suseRegister/registration-status.xml file.
To register directly:
b. Confirm that you want to continue. A text-based browser (w3m) appears. Use the
→| key or the arrow keys to navigate among individual elements. To enter data
into an input field, activate text input mode by pressing the Enter key once, then
enter the value and press Enter again to confirm.
c. After all values are entered according to your wishes, Submit your input and press
Shift – Q to close the text-based browser.
11. On the Installation Completed screen, select Finish to close YaST firstboot. The boot process
continues.
4.3 Setup
In the previous step you ran YaST firstboot and updated SUSE Manager server. Now use a setup
script to configure the basic data for setup and the database connection on several consecutive
screens. You run this via YaST. Enter a value in each input field, otherwise the setup may fail.
In the setup screens, you will also be prompted for two passwords.
Spaces
Exclamation marks ( ! )
Dollar symbols ( $ )
1. Log in to the machine as root with the password you set during the installation in Step 6.
FIGURE 4.4: SETUP—TYPE
4. In the next setup screen, enter an email address for the SUSE Manager administrator. It
is used for notifications by SUSE Manager and is associated with the SSL certificate to
be created in the next step. In the same dialogue, decide whether SUSE Manager should
advertise its services via SLP under the name susemanager . Clients can then find the
closest SUSE Manager server to connect to. Proceed with Next.
5. In the next setup screen, enter the details needed for the creation of an SSL certificate. The
certificate is used for a number of purposes like connections to a proxy, HTTPS protocol
in browsers, and more.
a. Enter the name of your organization, the organization unit, and the city, state and
country that your SUSE Manager server is located in. The Organization name defines
the name of the default administrative organization that is automatically created
during setup.
b. Set an SSL (Secure Sockets Layer) password and repeat it in the next field.
6. In the next setup screen, set the details for the setup of the server and the database:
a. Decide whether to use the embedded (local) or a remote database for SUSE Manager.
If you select Local Database, YaST automatically sets the Port and Protocol.
To use an existing, remote database instead, select Remote Database and enter the
following details for the connection to the database: the database system (SID) used
to identify a particular database instance, the FQDN of the remote database, the
external Port to use (usually 1521 ), and the Protocol to use (usually TCP ).
b. If you use the embedded database, set a user name and a password for the SUSE
Manager database user (that is used to connect to the database).
For a remote database, enter a user name that already exists in the database config-
uration, and enter the correct password for this user. Otherwise the connection to
the database will fail.
7. The last setup screen asks for your SUSE Customer Center (SCC) credentials. Select Con-
nect to SCC and enter your SCC Organization Credentials Username and SCC Organization
Credentials Password.
8. Proceed with Next and confirm with Yes to start the setup.
9. Click Next and read the instructions about the next steps. Close YaST by pressing Finish.
Then refresh SUSE Manager channels to reflect the new entitlements with the mgr-sync re-
fresh command.
nslookup scc.suse.com
1. Install SMT in the external network with SUSE Customer Center (SCC) or Novell Customer
Center (NCC) connection. For details about installing SMT, see http://www.suse.com/doc-
umentation/smt11/ .
4. Mount a removable storage medium such as an external hard disk or USB flash drive.
1. Mount the storage medium on your SUSE Manager server (e.g., at /media/disk ).
server.susemanager.fromdir = /media/disk
This setting is optional if you are still using NCC with mgr-ncc-sync , while it is manda-
tory for SCC using mgr-sync .
3. Restart Tomcat:
rctomcat6 restart
With mgr-ncc-sync using NCC specify --from-dir parameter to point the sync to the
mounted disk, if not set in rhn.conf :
1. On the SUSE Manager server, unmount the storage medium to carry it to your SMT.
server.susemanager.forward_registration = 0
Without this setting, the log file will be populated with many error messages.
1. Start a Web browser. Enter the URL of your SUSE Manager server, using the Fully Quali-
fied Domain name as in the following example: susemanager.example.com . The SUSE
Manager Web interface appears. On first login, you are prompted to create the SUSE Man-
ager administrator account.
2. Enter the data for the administrator account and click Create Login.
3. On the Overview tab, a message notifies you to finalize your basic system configuration. In
the message, there's a link to the Setup Wizard, where you can add and manage products
without having to pick individual channels. For more information on the setup wizard,
see Book “User Guide” 12 “Admin”12.1 “Admin > Setup Wizard”.
During installation, a first synchronization between Novell Customer Center and SUSE Manager
is automatically done by mgr-ncc-sync . At this point, it only downloads the subscriptions to
the products you have registered for. When you first log in to the SUSE Manager Web interface,
there's a link to the Setup Wizard, where you can add and manage products without having to
pick individual channels. For more information on the setup wizard, see Book “User Guide” 12
“Admin”12.1 “Admin > Setup Wizard”.
To manually import and synchronize specific channel data after installation, perform to the
following procedure:
2. Execute mgr-ncc-sync -l to view all channels that you are allowed to synchronize with
SUSE Manager. The output lists both parent and child channels. The following notation
is used to mark each channel:
3. Select the channels you want to import. You can only import child channels if their re-
spective parent channel is already imported.
4. For each channel that you want to import, run mgr-ncc-sync with the -c option and
add the respective channel label. For example:
mgr-ncc-sync -c suse_sles_11.i586-base
The respective channel data is imported into the SUSE Manager database and a full syn-
chronization is triggered for that channel.
Any channel that has been imported is also displayed in the SUSE Manager Web interface. To see
a list of all channels, go to the Channels tab and select SUSE Channels from the left navigation bar.
For setting up automatic channel synchronization, see Section 8.10, “Automating Synchronization”.
Activation keys define entitlements and which channels and groups the client system is
allowed to subscribe to. This information is passed on to all systems registered with a key.
Each activation key is bound to the organization for which it has been created.
3. Click the Create New Key link at the upper right corner.
5. If you want the key to be generated automatically, leave the Key input field empty. If you
want to use a certain string for the key, define the desired string in the Key input field.
6. To restrict the number of client systems that can be registered with the activation key, set
a Usage Limit by entering a maximum number of systems.
For unlimited use, leave this field empty.
7. With Base Channels, set the primary channel for the key. This can be either the SUSE
Manager Default channel or a custom base channel.
Choosing SUSE Manager Default allows client systems to register with the default SUSE-
provided channel that corresponds to their installed version of SUSE Linux Enterprise.
8. Activate the Add-On Entitlements that you want to give to the client systems that are reg-
istered with that key.
9. If all newly registered client systems of your organization should inherit the properties of
this key, activate the Universal Default check box. Only one universal default activation
key can be defined per organization.
10. Generate the key by clicking Create Activation Key. The prefix of the activation key indi-
cates which organization (by ID number) owns the activation.
Several options in the bootstrap script can be set via the SUSE Manager Web interface,
for example, if remote command execution or remote configuration of clients should be
allowed.
1. On the SUSE Manager Web interface, switch to the Admin tab and select SUSE Manager
Configuration Bootstrap Script.
2. Check the options listed on the page and activate or deactivate them according to your
needs.
2. From the list of activation keys, click the one you want to modify.
3. Click the Packages subtab, enter rhncfg-actions into the input field and
click Update Key.
The required package for remote command execution and configuration will auto-
matically be installed on all client systems registered with the respective activation
key.
3. Click the Update button. The necessary bootstrap script is generated and stored on the
server's file system in the /srv/www/htdocs/pub/bootstrap directory. It is also avail-
able from https://susemanager.example.com/pub/bootstrap/ .
4. Proceed with the following procedure,Procedure 4.10, “Editing the Bootstrap Script and Regis-
tering Clients”.
Adjust the generated bootstrap script according to your needs. The minimal requirement
is to include the activation key. We strongly recommend to also include one or more
GPG keys (for example, your organization key, and package signing keys). Then execute
the resulting script on each client machine that you want to register with SUSE Manager
(either centrally, from the SUSE Manager server, or decentralized, on each client.)
cd /srv/www/htdocs/pub/bootstrap
cp bootstrap.sh bootstrap-edited.sh
a. Search for the ACTIVATION_KEYS entry and enter the activation key from Proce-
dure 4.8, “Creating Activation Keys”. Make sure to also include the organization prefix
in the key, for example:
ACTIVATION_KEYS=1-fef154ddcf0d515fc
b. Search for the ORG_GPG_KEY entry and enter one or more filenames, separated by
commas. The GPG key is located under the /srv/www/htdocs/pub/ directory and
must be entered without any path name, for example:
ORG_GPG_KEY=foo-12345678.key,bar-87654321.key
If you do not need or have a GPG key, search for the variable USING_GPG and set
it to 0 .
d. To enable the script for execution, remove the exit 1 entry from the message block.
The last lines of the message block should now read:
5. Use one of the following possibilities to execute the edited script on all client machines
that you want to register with SUSE Manager:
Log in as root on the SUSE Manager server and execute the following commands:
cd /srv/www/htdocs/pub/bootstrap/
cat bootstrap-edited.sh | ssh root@client_hostname /bin/bash
Log in to each client and execute the following command (all on one line):
The clients are registered with the SUSE Manager server as specified in the bootstrap
script. The SUSE Manager Web interface shows the registered client systems on the Systems
tab.
System Entitlements
Various categories of system entitlements are available: management, provisioning, moni-
toring, and virtualization entitlements. Having management entitlements is a base require-
ment for an organization to function in SUSE Manager.
Only organization administrators or SUSE Manager administrators can create and edit
user accounts.
1. Log in to the SUSE Manager Web interface as administrator. The top level row of the Web
interface shows the organization you are currently logged in to.
2. Switch to the Users tab and click the create new user link at the upper right corner.
3. Enter the Desired Login and the Desired Password for the new user and confirm the pass-
word. Both login and password must consist of at least 5 characters.
4. Enter the first and last name and the email address of the new user and click Create Login.
The Web interface switches to the User List, showing either Active, Deactivated, or All users.
With the creation of a new user account, the user can log in to the SUSE Manager Web interface,
but he does not have any administrative permissions yet. Administrative permissions are granted
via roles. Each user can have multiple roles. To assign roles to a user and to set other permissions
and options proceed as described in Procedure 4.12, “Editing User Accounts”:
3. From the left navigation bar, select if you want to see Active, Deactivated, or All users.
4. From the list of users, click the user entry you want to modify. The Web interface shows
the User Details for the selected entry. Apart from the user's name and password, the Details
subtab also lets you assign roles to the user.
5. Select the roles that you want to assign to the user. For detailed information about the
roles, refer to Book “User Guide” 10 “Users — [Mgmt]”10.1.1.1 “User List > Active > User
Details > Details — [Mgmt]”. If you activate the Organization Administrator check box, the
user will automatically inherit the roles listed below. To assign or remove individual roles,
activate or deactivate the respective check boxes.
7. To set or modify the user's permissions for system groups, systems or channels that exist
within the current organization, switch to the respective subtabs and follow the instruc-
tions on the Web interface.
8. To modify preferences, addresses or notification methods for the currently selected user,
switch to the respective subtabs and confirm your changes.
As SUSE Manager administrator, you can assign the permission to become SUSE Manager
administrator to other users.
2. For an overview of all users that exist within SUSE Manager (across all organizations),
switch to the Admin tab and select Users from the left navigation bar.
3. To assign or remove the SUSE Manager administrator role, activate or deactivate the
SUSE Manager Administrator check box for the respective user.
For more details about user management, refer to Book “User Guide” 10 “Users — [Mgmt]”.
/usr/lib/susemanager/bin/migration.sh -h
4. In the next screen, enter the Hostname of the Satellite Server, its Domain Name, the Satellite
Database Username, the Satellite Database Password, and the Satellite Database SID.
5. In the next screen, enter the IP Address of the SUSE Manager Server, the Database Admin-
istrator Password (belonging to the database's root ), and the email address of the SUSE
Manager administrator.
6. The next screen asks for details about the database to be migrated.
a. If you want to migrate data from an embedded database, select Local Database. YaST
automatically sets the Port and Protocol.
To migrate data from an existing remote database instead, select Remote Database
and enter the following details for the connection to the database: the database
system (SID) used to identify a particular database instance, the FQDN of the remote
database, the external Port to use (usually 1521 ), and the Protocol to use (usually
TCP ).
b. Enter or set the name and password of the SUSE Manager database user (that is used
to connect to the local or remote database).
7. The next screen asks for your organization credentials from the SCC. Enter your SCC
Organization Credentials Username and the SCC Organization Credentials Password).
8. Click Next to close YaST and to write the collected information to a file that will be parsed
by the migration.sh script during the next steps.
9. Using the -r option, first copy the RPM packages and configuration files from the Satellite
server:
/usr/lib/susemanager/bin/migration.sh -r
10. Before you start the final migration process, make sure that nothing is changed on your
Satellite server from this point on. Log in to your Satellite server and shut down the Web
interface:
11. On the SUSE Manager server, start the final migration process:
/usr/lib/susemanager/bin/migration.sh -m
It synchronizes any remaining changes (that may have occurred during the first run with
the -r option) and migrates the database.
12. After the process has been finished successfully, shut down the Satellite server.
13. In the DNS server, change the name of the Satellite server to the SUSE Manager server's IP
address, so that the new SUSE Manager server gets the hostname of the former Satellite
server.
From now on, use your SUSE Manager as a replacement for your Satellite server. Since the
hostname is the same, all certificates will still work. Any registered clients are automatically
directed to the SUSE Manager server.
5.1 Introduction
This best practice guide is intended for z/VM administrators responsible for operating the IBM
System z Mainframe. The goal of this guide is to lead an z/VM administrator trained on normal
System z operating protocols through the installation of SUSE Manager 2.1 onto an existing
mainframe system. The intent of this article is not to cover the variety of hardware configuration
profiles available on System z but instead to provide a foundational overview of the procedure
and requirements necessary for a successful SUSE Manager server deployment.
5GB Memory (3GB RAM + 2GB VDISK swap) for a small number of clients. For a larger
production system the ratio of physical memory to vdisk will need to be re-evaluated based on
the number of clients being supported.
MEDIA REQUIREMENTS
A copy of the SLES 12 Installation media will be required for additional tools during the
installation procedure. SLE-12-Server-DVD-s390x-GM-DVD1.iso (https://download.suse.com/
Download?buildid=727vh-9Go98~)
HOSTIP 192.168.0.10
NETMASK 255.255.255.0
nameserver 192.168.0.1
GATEWAY 192.168.0.254
Guest z/VM Network Information. The guest z/VM should be provided with a static IP address
and hostname as these cannot be easily changed after initial setup. The hostname should contain
less than 8 characters. For example: SUMA21
FTP Server Accessible from Guest. An ftp server must be reachable from the z/VM guest.
This must contain the SUSE Manager installation media and a directory containing the
contents of the SUSE Linux Enterprise 12 installation image. The extracted SLES12 direc-
tory is necessary for additional tools and will not be installed. For more information on
loop mounting See also: https://www.suse.com/documentation/sled-12/book_sle_deployment/da-
ta/sec_deployment_remoteinst_instserver.html#sec_deployment_remoteinst_iso
ftp://example.com/SUSE_Manager-2.1.iso
parmfile for Network Configuration. A parmfile is required during the initial installa-
tion of SUSE Manager for network configuration. See also: (The parmfile-Automating the
System Configuration) https://www.suse.com/documentation/sles-12/book_sle_deployment/da-
ta/sec_appdendix_parm.html
Pre-Installation Storage Requirements. There are several storage devices that must be config-
ured and added before installation of SUSE Manager. You are required to calculate sufficient
disk storage for SUSE Manager before running yast2 susemanager_setup . The following infor-
mation will help fulfill these requirements.
A 512-byte block EDEV emulated DASD device with at least 10GB of allocated space for
SUSE Manager system files.
/var/lib/pgSQL
/var/spacewalk
5. On the ftp server change to the extracted SLES 12 installation media directory and execute
the following commands:
==> bin
==> quit
==> SLES12
==> 1
Start Installation
==> 1
2. You will now configure your network. Select 1 as the network protocol.
==> 1
e. Select automatic network configuration via DHCP only if your environment supports
it.
3. Next input your ftp information. Enter your ftp server address.
192.168.178.30
a. Enter the directory which contains the SLES12 installation disk contents.
/SLE-12-Server-GM/s390x/DVD1
b. Select user and password requirements, (yes or no) for your FTP server.
c. Select proxy information (yes or no). The installation system will load.
4. Select SSH as the desired display type. This will allow you to login via SSH.
==> 3
The following procedure prepares the EDEV device for dumping the SUSE Manager image
to and sets it as the default boot disk. Log into your SUSE Linux Enterprise System z guest
as root and issue the following commands.
3. Use the lsdasd command to list devices available on your system and their assigned id's:
4. Continue by writing the SUSE Manager image to the EDEV disk device:
6. After the image has finished dumping to your EDEV disk, you must execute the following
command. This command takes the device offline and sets it as the default boot disk.
8. Create the SUMA21 PARM-S11 A file and add the required kernel parameters for
your setup. See also https://www.suse.com/documentation/sles-12/book_sle_deployment/
data/sec_appdendix_parm.html
HOSTIP=10.161.155.98
NETMASK=255.255.240.0
nameserver=10.160.2.88
GATEWAY=10.161.159.254
InstNetDev=osa Layer2=1
OSAInterface=qdio OSAMedium=eth portno=0 portname=whatever
ReadChannel=0.0.0800 WriteChannel=0.0.0801 DataChannel=0.0.0802
Hostname=s390vsl098.suse.de
10. Log into the SUSE Manager server guest via SSH as root. The default password is linux .
11. YaST firstboot will auto start. Accept the license agreement and Follow the steps to com-
plete YaST firstboot procedures
12. After firstboot procedures have completed continue by updating SUSE Manager using
online update and reboot the system.
After rebooting you will need to setup the additional storage required for /var/spacewalk and /
var/lib/pgSQL and swap space using the yast partitioner tool. This step is required before run-
ning yast2 susemanager_setup
After having configured the storage requirements, executed a yast update and completed a sys-
tem reboot, run SUSE Manager setup to finalize the SUSE Manager installation on your System
z mainframe:
https://www.suse.com/documentation/suse_manager/book_susemanager_install/
data/sec_manager_inst_setup.html
After installing SUSE Manager, you must provide it with the packages and channels to be served
to client systems. This chapter explains how to import that data and keep it up to date.
Two tool chains come installed as part of the spacewalk-backend-tools package: mgr-ex-
porter for exporting and mgr-inter-sync for synchronization, as well as mgr-ncc-sync .
Channel Families
Architectures
Channel metadata
Blacklists
RPMs
RPM metadata
Patches
Kickstarts
Support Information
SUSE Subscriptions
There must be sufficient disk space in the directory specified with the --dir option. This
directory will contain the exported contents.
When finished, the export directory may be moved to another SUSE Manager or a storage so-
lution using rsync or scp -r .
The mgr-exporter tool offers several command line options. To use them, insert the option
and appropriate value after the mgr-exporter command.
mgr-exporter OPTIONS:
-d DIRECTORY , --dir=DIRECTORY
Place the exported information into this directory.
-cCHANNEL_LABEL , --channel=CHANNEL_LABEL
Process data for this specific channel (specified by label) only. NOTE: the channel's label
is not the same as the channel's name.
--list-channels
List all available channels and exit.
--list-steps
List all of the steps that mgr-exporter takes while exporting data. These can be used as
values for --step .
-p --print-configuration
Print the configuration and exit.
--print-report
Print a report to the terminal when the export is complete.
--no-packages
Do not export RPM metadata.
--no-errata
Do not process patch (errata) information.
--no-kickstarts
Do not process kickstart data (provisioning only).
--debug-level=LEVEL_NUMBER
Override the amount of messaging sent to log files and generated on the screen set in /
etc/rhn/rhn.conf , 0 - 6 ( 2 is default).
--start-date=START_DATE
The start date limit that the last modified dates are compared against. Must be in the
format YYYYMMDDHH24MISS (for example, 20071225123000 ).
--end-date=END_DATE
The end date limit that the last modified dates are compared against. Must be typed in the
format YYYYMMDDHH24MISS (for example, 20071231235900 ).
--make-isos=ISOS
Create a channel dump ISO directory called ISOS (for example, --make-isos=cd or
dvd ).
--email
Email a report of what was exported and what errors may have occurred.
--traceback-mail=EMAIL
Alternative email address for --email .
--db=DB
Include alternate database connect string: username/password@SID .
--hard-links
Export the RPM and kickstart files with hard links to the original files.
You can deselect some contents, such as RPMs, errata, or Kickstarts, which you do not want to
export, by using the --no-* command line options. The default is to export everything.
When exporting a base channel, you must also export the client tools channel associated
with that base channel. This is because the tools channels contain the tools that install packages
for autoinstalling a machine through SUSE Manager. For instance, if you export sles11-sp1-
pool-x86_64 you must also export the sles11-sp1-suse-manager-tools-x86_64 channel in order to
autoinstall machines to SUSE Linux Enterprise Server 11 SP1 x86_64.
6.2.1 mgr-inter-sync
The mgr-inter-sync tool enables a SUSE Manager server to update its database metadata and
RPM packages from a SUSE Manager master server.
The SUSE Manager synchronization tool mgr-inter-sync can be used in a closed environment,
such as the one created with a disconnected install, or it may obtain data directly from another
SUSE Manager. Closed environment imports can get their data from the XML data generated
by mgr-exporter .
67 Importing with SUSE Manager Synchronization Tool mgr-inter-sync SUSE Manager 2.1
mgr-inter-sync works incrementally, or in steps. To obtain patch (errata) information, it first
requires information about the packages contained. For the packages to be updated, the tool
first identifies the associated channels. For this reason, the SUSE Manager synchronization tool
performs the following actions in order:
4. packages — Import/synchronize full package data for those RPMs retrieved successfully.
Users can perform each of these steps individually for testing purposes with the effect of forcing
the tool to stop when a step completes. All preceding steps, however, will execute. For example,
calling the rpms step automatically ensures the channels and channel-families steps exe-
cute first. To initiate an individual step, use the --step option:
mgr-inter-sync --step=rpms
In addition to --step , the SUSE Manager synchronization tool offers many other command line
options. To use them, insert the option and the appropriate value after the mgr-inter-sync
command when launching import or synchronization.
-h , --help
Display the list of options and exit.
-d= , --db=DB
Include alternate database connect string: username/password@SID .
-m= , --mount-point=MOUNT_POINT
Import or synchronization from local media mounted to the SUSE Manager. Use in closed
environments (such as those created during disconnected installs).
--list-channels
List all available channels and exit.
-p , --print-configuration
Print the current configuration and exit.
--no-ssl
Not Advisable - Turn off SSL.
--orgid=ORGID
Organization to which the sync imports data (default: the admin account).
--step=STEP
Perform the synchronization process only to the step specified. Typically used in testing.
By default, all steps are executed.
--no-rpms
Do not retrieve actual RPMs.
--no-packages
Do not process full package data.
--no-errata
Do not process patch (errata) information.
--no-kickstarts
Do not process Kickstart data (provisioning only).
--force-all-errata
Forcibly process all patch metadata without performing a diff.
--force-all-packages
Forcibly process all package metadata without performing a diff.
--debug-level=LEVEL_NUMBER
Override the amount of messaging sent to log files and generated on the screen set in /
etc/rhn/rhn.conf , 0 - 6 ( 2 is default).
--email
Email a report of what was imported/synchronized to the designated recipient of traceback
email.
-s= , --server=SERVER
Include the hostname of an alternative server to connect to for synchronization.
--http-proxy=HTTP_PROXY
Add an alternative HTTP proxy server in the form hostname:port .
--http-proxy-username=PROXY_USERNAME
Include the username for the alternative HTTP proxy server.
--http-proxy-password=PROXY_PASSWORD
Include the password for the alternative HTTP proxy server.
--ca-cert=CA_CERT
Use an alternative SSL CA certificate by including the full path and filename.
--systemid=SYSTEM_ID
For debugging only - Include path to alternative digital system ID.
--batch-size=BATCH_SIZE
For debugging only - Set maximum batch size in percent for XML/database-import process-
ing.
The SUSE Manager exporter ( mgr-exporter ) data or access to the master SUSE Manager
must be available.
To import data previously exported using SUSE Manager exporter, you must first copy
that data onto the local system. The following steps prepare the import as described in
Section 6.2.3, “Running the Import”.
mkdir /var/sw-import/
3. Make the export data available on the local machine in the directory created in the pre-
vious step. This can be done by copying the data directly or by mounting the data from
another machine using NFS. The following is an example scp command copying the data
into the new directory:
Now that the data is available, you can proceed to performing the import.
The following process assumes the user has copied all data to /var/sw-import .
The first step in importing channels into the database is listing the channels available for import.
This is accomplished with the command:
The next step is to initiate the import of a specific channel. Do this using a channel label pre-
sented in the previous list. The command will look like:
Note
Importing package data can take up to two hours per channel. You can begin register-
ing systems to channels as soon as they appear in the SUSE Manager Web interface. No
packages are necessary for registration, although updates cannot be retrieved from SUSE
Manager until the channel is completely populated.
1. Populating the tables describing common features for channels (channel families). This
can also be accomplished individually by passing the --step=channel-families option
to mgr-inter-sync .
2. Creating a particular channel in the database and importing the metadata describing the
channel. Individually, use the --step=channels option.
3. Moving the RPM packages from the temporary repository into their final location. Indi-
vidually, use the --step=rpms option.
4. Parsing the header metadata for each package in the channel, uploading the package data,
and associating it with the channel. Individually, use the --step=packages option.
5. Identifying patches (errata) associated with the packages and including them in the repos-
itory. Individually, use the --step=errata option.
After running the preceding sample command, the population of the channel should be com-
plete. All of the packages should have been moved out of the repository; this can be verified
with the following command sequence:
cd /var/sw-import/
ls -alR | grep rpm
If all RPMs have been installed and moved to their permanent locations, then this count will be
zero, and the administrator may safely remove the temporary repository (in this case, /var/
sw-import/ ).
1. Connects over SSL to the SUSE Manager master, authenticates itself as a SUSE Manager,
and triggers an export of the channel data.
2. Examines the export and identifies differences between the SUSE Manager data set and the
exported SUSE data set. For a particular channel, the following information is analyzed:
Channel metadata
Note
All analysis is performed on the SUSE Manager slave; the master delivers only an
export of its channel information and remains ignorant of any details regarding the
SUSE Manager slave.
3. After the analysis of the export data, any differences are imported into the SUSE Manager
database. Note that importing new packages may take variable lengths of time. For a large
update, an import can take several hours.
Note
Master and slave are legacy terms that carry connotations that are not enforced by the
ISS protocol. Keep their restricted meanings, as described above, in mind while reading
this section.
With SUSE Manager 2.1, ISS allows the slave SUSE Manager to duplicate the organizational trust
hierarchy and the custom channel permissions from the settings configured on the master. This
is accomplished by exporting information about specific organizations from the master SUSE
Manager to the receiving slave server. The administrator on the slave can then choose to map the
master organizations to specific slave organizations. Future synchronization operations use this
information to assign custom channel ownership to the slave organization, which is mapped to a
specific master organization. It can also map the trust relationships between the exposed master
organization to matching slave organizations, creating the equivalent relationships on the slave.
Note
An inter-server sync between a SUSE Manager 1.7 server as master and a SUSE Manager
2.1 server as client will succeed but generate an error email to the admin. The error email
is harmless and can be deleted.
Allow Slave to Sync? - Choosing this field will allow the slave SUSE Manager to access this
master SUSE Manager. Otherwise, contact with this slave will be denied.
Sync all orgs to Slave? - Checking this field will synchronize all organizations to the slave
SUSE Manager.
Click Create. Optionally, click on any local organization to be exported to the slave SUSE Man-
ager then click Allow Orgs.
Note
In SUSE Manager 1.7 the master server used the iss_slaves parameter in the /etc/
rhn/rhn.conf file to identify which slaves were allowed to contact the master. SUSE
Manager 2.1 uses the information in the Master Setup page to determine this information.
To enable the inter-server synchronization (ISS) feature, edit the /etc/rhn/rhn.conf file and
set: disable_iss=0 . Save the file and restart the httpd service with service httpd restart .
Slave servers are the machines that will receive content synchronized from the master server.
To securely transfer content to the slave servers, the ORG-SSL certificate from the master server
is needed. The certificate can be downloaded over HTTP from the /pub/ directory of any SUSE
Manager. The file is called RHN-ORG-TRUSTED-SSL-CERT , but can be renamed and placed
anywhere in the local file system of the slave, such as the /usr/share/rhn/ directory.
Log in to the slave SUSE Manager as administrator and click on Admin ISS Configuration Slave
Setup. In the top right-hand corner, click Add New Master and fill in the following information:
Default Master?
Filename of this Master's CA Certificate: use the full path to the CA Certificate.
mgr-inter-sync -c YOUR-CHANNEL
mgr-inter-sync -c YOUR-CHANNEL
The spacewalk-util package needs to be installed on the system that will issue the
spacewalk-sync-setup command.
Organizations with custom permissions must exist on the master SUSE Manager.
disable_iss=0
Default Master?
Filename of this Master's CA Certificate: use the full path to the CA Certificate.
spacewalk-sync-setup --ms=[Master_FQDN] \
--ml=[Master_Sat_Admin_login] \
Where:
--ss=SLAVE, --slave-server=SLAVE is the FQDN of the slave SUSE Manager to connect to,
--ct, --create-templates is the option that creates both a master and a slave setup file for
the master/slave pair,
--apply tells SUSE Manager to make the changes specified by the setup files to the specified
SUSE Manager instances.
Note
For more setup options, run spacewalk-sync-setup--help .
mgr-inter-sync -c channel-name
If the source content belongs to a base organization, it will default to this base organization
even if a destination organization is specified. This ensures that specified content is always
in that privileged base organization.
If an organization is specified at the command line, content will be imported from that
organization.
The following are three example scenarios where organizational IDs (orgid) are used to syn-
chronize between SUSE Managers:
3. Import content from SUSE Manager Hosted (assuming the system is registered and acti-
vated). If the source organization is not specified, the base channel is chosen):
In this example, the stage SUSE Manager is used to prepare the content and perform quality
assurance (QA) to make sure that packages are fit for production use. After content is approved
to go to production, the production SUSE Manager server can synchronize the content from the
stage SUSE Manager.
FIGURE 6.2: MASTER SERVER AND SLAVE PEERS THAT INCLUDE THEIR OWN CUSTOM CONTENT
FIGURE 6.3: SUSE MANAGER SLAVES ARE MAINTAINED EXACTLY AS THE SUSE MANAGER MASTER
In this example, the SUSE Manager master (e.g., a software or hardware vendor) provides data
to its customer. These changes are regularly synchronized to the SUSE Manager slaves.
If this command returns no output, your processor either does not support hardware vir-
tualization, or this feature has been disabled in the BIOS. Enable virtualization support in
the BIOS and try again. If in doubt, consult your mainboard manual.
If the output contains a svm string, your machine uses the AMD V extensions, if the output
contains a vmx string, the Intel VT extensions are used.
traceback_mail
Defines the mail address of the system administrator of the SUSE Manager appliance. This
mail address will only be used for error/warning/info messages from spacewalk services
(java process, taskomatic tasks, etc.).
web.default_mail_from
This is the mail address used by SUSE Manager to send notification mails about error mes-
sages and daily status reports. You can set this address that is valid for your organization.
df -h
In addition to log files, you can obtain valuable information by retrieving the status of your
SUSE Manager and its various components. This can be done with the command:
/usr/sbin/spacewalk-service status
Furthermore, you can obtain the status of components such as the Apache Web server and the
Task Engine individually. For example, to view the status of the Apache Web server, run the
command:
rcapache2 status
If the Apache Web server is not running, entries in your /etc/hosts file may be incorrect. For
more information, see Section 7.11, “Host Not Found/Could Not Determine FQDN”.
To obtain the status of the Task Engine, run the command:
rctaskomatic status
If a SUSE Manager's embedded database is in use, run one of the following commands to obtain
its status:
Or:
rhn-schema-version
rhn-charsets
If importing or synchronizing a channel fails and you cannot recover it in any other way, run
this command to delete the cache:
rm -rf temporary-directory
Note that Section 6.2.2, “Preparing for Import” suggested that this temporary directory be /var/
sw-import/ .
rcjabberd stop
cd /var/lib/jabberd
rm -f db*
rcjabberd start
osa-dispatcher.notify_threshold = 80
to allow 80 clients in parallel to execute rhn_check . Note, clients doing "SSH PUSH" do not
count. This is configured separately with the taskomatic.ssh_push_workers parameter.
Note
To use spacewalk-report , you must have the spacewalk-reports package installed.
spacewalk-report allows administrators to organize and display reports about content, sys-
tems, and user resources across SUSE Manager. Using spacewalk-report , you can receive re-
ports on:
Entitlements: lists all organizations on SUSE Manager, sorted by system or channel enti-
tlements.
Patches: lists all the patches relevant to the registered systems and sorts patches by sever-
ity, as well as the systems that apply to a particular patch.
Users: lists all the users registered to SUSE Manager and any systems associated with a
particular user.
spacewalk-report allows administrators to organize and display reports about content, sys-
tems, and user resources across SUSE Manager. To get the report in CSV format, run the follow-
ing at the command line of your SUSE Manager server.
TABLE 7.1: spacewalk-report REPORTS
For more information about an individual report, run spacewalk-report with the option --
info or --list-fields-info and the report name. The description and list of possible fields
in the report will be shown.
For further information, the spacewalk-report(8) man page as well as the --help parameter
of the spacewalk-report program can be used to get additional information about the program
invocations and their options.
Whenever downloading a CSV file from anywhere within SUSE Manager, the configured sepa-
rator character will be used as the delimiter.
TABLE 7.2: LOG FILES
zypper /var/log/zypper.log
The only allowed wildcard is a single * character, which matches all hosts, and thus effectively
disables the proxy.
In /var/log/tomcat6/catalina.out :
or
wget http://updates.suse.com
--2015-04-28 11:12:23-- http://updates.suse.com/
Resolving xxxxxxxxxxxxxx... yyy.yyy.yyy.yyy
Connecting to XXXXXXXXXXXXXX|yyy.yyy.yyy.yyy|:8080... connected.
Proxy request sent, awaiting response... 301 Moved Permanently
Location: https://updates.suse.com// [following]
--2015-04-28 11:12:23-- https://updates.suse.com//
Connecting to XXXXXXXXXXXXXX|yyy.yyy.yyy.yyy|:8080... connected.
ERROR: cannot verify updates.suse.com's certificate, issued by `/C=XX/
O=XXXXXX/CN=XXXXXXXXXXXXXXX':
Unable to locally verify the issuer's authority.
To connect to updates.suse.com insecurely, use `--no-check-certificate'.
93 Using a Proxy with Certificates to Access the Internet SUSE Manager 2.1
Unable to establish SSL connection.
cp /tmp/filename_of_root_CA.cer /etc/ssl/certs/filename_of_root_CA.pem
cp /tmp/filename_of_intermediate_CA.cer /etc/ssl/
certs/filename_of_intermediate_CA.pem
c_rehash /etc/ssl/certs
spacewalk-service restart
mgr-sync refresh
wget http://updates.suse.com
It works correctly, if the wget call will cause a 404 http error.
94 Using a Proxy with Certificates to Access the Internet SUSE Manager 2.1
7.10 Discovering Hosts and Subnets in the Net-
work
The SUSE Manager Network Scanner is a tool for scanning the network and finding hosts and
subnets in it. It consists of the SUSE Manager Network Discovery daemon and its client. By
default, the daemon runs on the network port 5000.
1. On the SUSE Manager server install the SUSE Manager Network Discovery daemon and
its client with the following commands as root :
2. For configuring the network device on which the daemon is listening, see the sm-
netscan.conf manpage. Additionally you can change other defaults according to your
needs.
Background information: The Network Scanner does not need the SNMP protocol or any
other special hints about the network that you want to scan. However, it must be allowed
to send ICMP packets to ping its targets. Thus it can work on any network layout without
a specific configuration or assumptions that some credentials need to be sent somewhere
in order to get the needed starting info.
7.10.2 Usage
The Network Scanner consists of two pars: the daemon that discovers the network and the client
that returns the already captured data.
To start the daemon:
rcsm-network-discovery start
To view the scanned network, use the SUSE Manager Network Discovery client sm-netscan
that comes with the --help option to display an online help.
sm-netscan --subnets
sm-netscan --hosts=SUBNET_IP
To retrieve the data in XML, pass the format parameter to the client tool.
For more details, see the sm-netscan manpage and the online documentation at http://
wiki.novell.com/index.php/SM_NetworkScanner .
1. To resolve this problem, check the /etc/hosts file. It looks like this:
2. In a text editor, remove the offending machine information so that the line in /etc/hosts
looks like this:
3. Save the file and try to run the client applications or the Apache Web server again. If they
still fail, explicitly identify SUSE Manager server's IP address in the file, such as:
4. Replace the value 192.0.2.34 with the actual IP address of the SUSE Manager server.
Keep in mind, if the IP address is specified here, the file will need to be updated in case
the machine receives a new address.
Server — /etc/rhn/rhn.conf :
server.timeout = number
proxy.timeout = number
This is the maximum time in seconds that a transfer operation is allowed to take. This
is useful for preventing batch jobs from hanging for hours due to slow networks or links
going down. If limiting operations to less than a few minutes, you risk aborting perfectly
normal operations.
timeout = number
Check the SUSE Manager server certificate dates and times with the following command:
By default, the server certificate has a one-year life while client certificates are valid for 10
years. If the certificates are incorrect, you can either wait for the valid start time, or create new
certificates, with an accurate time setting.
Do the following to troubleshoot general connection errors:
Attempt to connect to SUSE Manager's database in the command line using the correct
connection string as found in /etc/rhn/rhn.conf :
Ensure SUSE Manager is using Network Time Protocol (NTP) and is set to the appropriate
time zone. This also applies to all client systems and the separate database machine in
SUSE Manager (if used with a stand-alone database).
rhn-org-httpd-ssl-key-pair-MACHINE_NAME-VER-REL.noarch.rpm
Verify the client systems are configured to use the appropriate certificate.
If also using one or more SUSE Manager Proxy Servers, ensure each Proxy's SSL certificates
are prepared correctly. The Proxy should have both its own server SSL key-pair and CA
SSL public (client) certificate installed, since it serves in both capacities. Refer to Book
“Client Configuration Guide” 3 “SSL Infrastructure” for specific instructions.
Make sure client systems are not using firewalls of their own, blocking required ports.
spacewalk-debug
satpasswd admin
Your product key, starting with regcode- . In the case of SUSE Manager, it is reg-
code-sms .
suse_register -n \
-L register.log \
-a email=YOUR_EMAIL \
-a regcode-sms=REG_KEY
The -n option ( --no-optional ) collects so called “optional data” which can be necessary for
your registration. However, this depends on your contract.
The -L option tells suse_register to write a log message to register.log . You need this
if you have to provide detailed information about the registration process to our support.
Find other options and their explanations with --help .
The numbers appended to the mirrcred_ keys must be numbered consecutively. If you
skip one number, mgr-ncc-sync will stop looking for more credentials.
mgr-ncc-sync --refresh
Now, if you type mgr-ncc-sync -l , you will see a channel listing with the combination of
all mirror credentials.
If you have configured client registration forwarding, all clients are registered against the com-
pany identified by mirrcred_user .
When running spacecmd non-interactively, take care to escape arguments passed to the
spacecmd functions. This involves inserting -- before the function name to prevent the argu-
ments to the function to be treated as global arguments to spacecmd . Also escape any quotes
that are passed to the function so that the shell does not interpret them.
Example:
SUSE Manager provides a unique environment not available to any other Novell Customer Cen-
ter customers. In return, SUSE Manager also requires maintenance. This chapter discusses the
procedures that should be followed to carry out administrative functions outside of standard
use and to apply patches to SUSE Manager.
/usr/sbin/spacewalk-service start
/usr/sbin/spacewalk-service stop
/usr/sbin/spacewalk-service restart
/usr/sbin/spacewalk-service reload
/usr/sbin/spacewalk-service enable
/usr/sbin/spacewalk-service disable
/usr/sbin/spacewalk-service status
Use spacewalk-service to shut down and bring up the entire SUSE Manager and retrieve
status messages from all of its services at once.
In case you need to do a database schema upgrade, do the following:
2. Run spacewalk-schema-upgrade .
For SUSE Manager systems connected to the Internet, the best method for applying these patch-
es is using zypper or YaST Online Update. Proper registration at Novell Customer Center is
mandatory for the system to receive updates. For details, refer to Section 4.2, “Installation”. SUSE
Manager systems not connected to the Internet (disconnected setup) will receive updates from
an internal update server instead.
As soon as SUSE Manager is up and running and the database is configured, updating
the server requires more than executing zypper patch (or running YaST Online Update
alternatively).
The steps below describe the generic procedure, but depending on the patch, specific
instructions may apply.
spacewalk-service stop
3. Apply the patch using either zypper patch or YaST Online Update. For more information
about zypper or YaST Online Update, refer to Book “Reference Guide” 2 “Package Update
Tools (SLE and RHEL)”2.1 “Updating Packages on SLE”.
4. If the patch includes an update of the database schema, proceed as follows (otherwise
skip the substeps below):
/etc/init.d/postgresql start
spacewalk-schema-upgrade
spacewalk-service start
# mgr-create-bootstrap-repo
SLE-11-SP1-x86_64
SLE-11-SP2-x86_64
SLE-11-SP3-x86_64
Enter product label: SLE-11-SP3-x86_64
copy 'spacewalk-client-tools-1.7.14.18-0.5.2.noarch'
copy 'zypper-1.6.308-0.9.16.x86_64'
copy 'libzypp-9.37.1-0.7.1.x86_64'
copy 'satsolver-tools-0.17.7-0.6.2.1.x86_64'
copy 'zypp-plugin-python-0.3-2.5.38.x86_64'
copy 'zypp-plugin-spacewalk-0.9.5-0.5.5.x86_64'
copy 'spacewalk-check-1.7.14.18-0.5.2.noarch'
copy 'spacewalk-client-setup-1.7.14.18-0.5.2.noarch'
copy 'newt-0.52.10-1.35.113.x86_64'
copy 'libnewt0_52-0.52.10-1.35.113.x86_64'
copy 'python-newt-0.52.10-1.35.113.x86_64'
copy 'python-dmidecode-3.10.11-0.10.1.x86_64'
copy 'python-ethtool-0.7-0.15.15.1.x86_64'
copy 'python-openssl-0.7.0-1.17.2.x86_64'
copy 'rhnlib-2.5.51.5-0.5.1.x86_64'
copy 'spacewalksd-4.9.15.3-0.5.3.x86_64'
copy 'suseRegisterInfo-1.7.4-0.5.1.x86_64'
copy 'libcurl4-7.19.7-1.28.1.x86_64'
Repeat the command for SLE-11-SP1-x86_64 and SLE-11-SP2-x86_64 if necessary. Now you have
the latest package versions for your bootstrap repositories. For bootstrapping SUSE Linux En-
terprise Server_11_SP_1 clients, you need to create a compatibility symlink:
cd /srv/www/htdocs/pub/repositories
ln -s sle/11/1/bootstrap susemanager-client-setup
/rhnsat/ — embedded database only (never to be backed up while the database is run-
ning)
/etc/sysconfig/rhn/
/etc/rhn/
/etc/sudoers
/srv/www/htdocs/pub/
/root/.gnupg/
/root/ssl-build/
/etc/dhcp.conf
/tftpboot/
/var/lib/cobbler/
/var/lib/rhn/kickstarts/
/srv/www/cobbler
/var/lib/nocpulse/
SUSE recommends to back up the entire /var/spacewalk/ tree. In case of failure, this will
save lengthy download time. Since /var/spacewalk/ (specifically /var/spacewalk/pack-
ages/NULL/ ) is primarily a duplicate of the package repository, it can be regenerated with mgr-
ncc-sync . In the case of disconnected SUSE Managers, /var/spacewalk/ must be backed up.
Backing up only these files and directories requires reinstalling the SUSE Manager RPMs and
re-registering SUSE Manager (see Section 4.2, “Installation”). In addition, packages need to be
resynchronized using the mgr-ncc-sync tool. Finally, you have to reinstall the /root/ssl-
build/rhn-org-httpd-ssl-key-pair-MACHINE_NAME-VER-REL.noarch.rpm .
Another method is to back up all the files and directories mentioned above but reinstall the
SUSE Manager without re-registering it. During the installation, cancel or skip the registration
and SSL certificate generation sections.
The most comprehensive method is to back up the entire machine. This saves time in down-
loading and reinstalling but requires additional disk space and backup time.
rcrhn-search cleanindex
PREFIX-PATCHID-VERSIONPATCH-CHANNELARCH
PATCHID-VERSIONPATCH
After the migration has been successfully performed, the patches are listed twice after the first
channel synchronization. The old names are still preserved and the new patch names are added.
If you wish, the old names can be deleted (see below).
To migrate the old names to the new names, use the mgr-clean-old-patchnames command. It
requires either a specific channel (using the -c option) or apply the conversation to all channels
(using the -a option). However, the -a option removes all patches from cloned channels.
If a patch is not referenced from a channel, it will be deleted. In case you have a patch which is
deleted from a specific channel, the patch will be preserved if it is also used in another channel.
For example, to execute the conversation process only for a SLES11 SP1 channel on a 64 bit
architecture, use the following command:
mgr-clean-old-patchnames -c sles11-sp1-pool-x86_64
110 Migrating Patches from Old to New Naming SUSE Manager 2.1
8.6 Configuring SUSE Manager's Database (smd-
ba)
SUSE Manager provides the smdba command for managing the installed database. It is the
successor of db-control , which is not supported anymore.
The smdba command works on local databases only, not remote. This utility allows you to
do several administrative tasks like backing up and restoring the database, everything from
creating, verifying, and restoring backups to obtain the database status and restart the database
if necessary. The smdba command supports PostgreSQL 9.1 and Oracle 10g or 11g databases
with different feature sets.
With this settings admin will be allowed to access the target database account ( oracle
or postgres ).
For configuring sudo and its security implications, see the sudo and sudoers manpages
and the extensive comments in the /etc/sudoers configuration file.
spacewalk-service restart
smdba db-status
Checking database core... online
smdba db-stop
Stopping the SUSE Manager database...
Stopping listener: done
Stopping core: done
smdba db-status
Checking database core... offline
smdba db-start
Starting listener: done
Starting core... done
Oracle
The smdba command can be used to create a “hot backup”, which is a backup that is
performed without shutting down the database.
PostgreSQL
The smdba command performs a continuous archiving backup.
1. For Oracle, there is no need to specify the space where to store the backups. By default,
backups will be stored at /opt/apps/oracle/flash_recovery_area/uppercase SID/ .
smdba backup-hot
Backing up the database: finished
Data files archived:
/opt/apps/oracle/oradata/susemanager/system01.dbf
/opt/apps/oracle/oradata/susemanager/sysaux01.dbf
/opt/apps/oracle/oradata/susemanager/data_01.dbf
/opt/apps/oracle/oradata/susemanager/undotbs01.dbf
/opt/apps/oracle/oradata/susemanager/users01.dbf
Archive logs:
/opt/apps/oracle/oradata/susemanager/archive1_32_784110049.dbf
...
After the command returns without any errors, it contains some files in the
flash_recovery_area directory.
smdba backup-list
Getting available backups: finished
Backups available:
Name: /opt/apps/oracle/flash_recovery_area/SUSEMANAGER/backupset/2013_06_14/
o1_mf_nnndf_TAG20130614T040008_8vny9932_.bkp
Files:
Type: Full Date: 14-JUN-13 File:
/opt/apps/oracle/oradata/susemanager/system01.dbf
Type: Full Date: 14-JUN-13 File:
/opt/apps/oracle/oradata/susemanager/sysaux01.dbf
Type: Full Date: 14-JUN-13 File:
/opt/apps/oracle/oradata/susemanager/undotbs01.dbf
Type: Full Date: 14-JUN-13 File:
/opt/apps/oracle/oradata/susemanager/users01.dbf
Type: Full Date: 14-JUN-13 File:
/opt/apps/oracle/oradata/susemanager/data_01.dbf
1. Allocate permanent space on your remote storage, which you use for general backups
(NAS, iSCSI target, etc.). For example:
/mnt/backup/
2. Create a directory with the correct permissions in your target directory, e.g., with using
sudo :
Alternatively, as root :
Or:
mkdir /mnt/backup/database
chown postgres:postgres /mnt/backup/database
This command performs a restart of the PostgreSQL database. If you want to renew the
basic backup, use the same command.
If the command exits without any errors, find the backup files in your /mnt/back-
up/database directory.
smbda db-start
In this case it will select the most recent backup and purge the rest. Every time you create a
new backup, it also purges the previous backups.
Using an Oracle database, the archive log data will be removed as soon as you create a
database backup with smdba .
With PostgreSQL only a limited number of archive logs is kept. With the default configu-
ration, approx. 64 files with a size of 16 MiB are kept.
sles11-sp1-pool-x86_64
sles11-sp1-updates-x86_64
sles11-sp2-updates-x86_64
will produce on PostgreSQL ~1 GB and on oracle ~7 GB additional data. So it is important to
think about a backup strategy and create a backup in a regular way.
The archive logs are stored in:
/var/lib/pgsql/data/pg_xlog/ (PostgreSQL)
/opt/apps/oracle/oradata/sid/ (Oracle)
smdba space-overview
This command is available for both databases, Oracle and PostgreSQL. For a more detailed
report, use the space-tables subcommand. It lists the table and its size, for example:
smdba space-tables
Table | Size
-------------------------------+----------
PXTSESSIONS | 64.00K
QRTZ_BLOB_TRIGGERS | 64.00K
3. spacewalk-service stop : halts the spacewalk service while the database keeps running.
5. dump_schema : writes all schema data to the hard disk as plain text, which should take
a while.
6. switch_oracle2postgres : stops the Oracle database, removes it from the boot process
( insserv -r oracle ), then deletes all spacewalk Oracle packages and installs the nec-
essary PostgreSQL packages.
8. configure_suma : loads the database with the schema and rewrites the configuration files
for PostgreSQL.
9. import_schema : loads all data into the database, which will take a while.
118 Migrating Embedded Database from Oracle to PostgreSQL SUSE Manager 2.1
8.7 Cloning SUSE Manager with the Embedded
Database
You may limit outages caused by hardware or other failures by entirely cloning the SUSE Man-
ager server with its embedded database. The secondary server can take over if the primary one
fails. To clone the SUSE Manager server, perform these tasks:
1. Clone the SUSE Manager server at the operating system level (OS level) with your backup
tools (e.g., rsync ) to a separate machine. As needed, repeat this step daily.
2. Back up the primary SUSE Manager database daily using the commands described in Sec-
tion 8.6, “Configuring SUSE Manager's Database (smdba)”. If this is done, only changes made
the day of the failure will be lost.
3. Establish a mechanism to copy the backup to the secondary SUSE Manager and keep the
repositories synchronized using a file transfer program such as rsync . If you are using a
SAN, copying is not necessary.
4. Use the smdba backup-restore subcommand to import the database backup data.
5. If the primary SUSE Manager fails, change DNS to point to the new machine or configure
your load-balancer accordingly.
Warning
The database backup is valid only on an identical system clone, which can be restored
only from the backup as described above. The database backup will not work on a system
that you reinstalled from NCC!
119 Cloning SUSE Manager with the Embedded Database SUSE Manager 2.1
To establish this redundancy, first install the primary SUSE Manager server as usual, except
that the value specified in the Common Name field for the SSL certificate must represent your
high-availability configuration rather than the hostname of the individual server. Proceed with
the following steps:
1. Consult your database administrator on how to prepare the stand-alone database for
failover, using Oracle's recommendations for building a fault-tolerant database.
2. Install SUSE Manager with stand-alone database on a separate machine, skipping the data-
base configuration, database schema, SSL certificate, and bootstrap script generation steps.
Include the same Novell Customer Center account and database connection information
provided during the initial SUSE Manager installation and register the new SUSE Manager
server.
If your original SSL certificate does not take your high-availability solution into account,
create a new one with a more appropriate Common Name value now. In this case, also
generate a new bootstrap script that captures this new value.
3. After installation, copy the following files from the primary to the secondary SUSE Man-
ager:
/etc/rhn/rhn.conf
/etc/tnsnames.ora
4. Copy and install the server-side SSL certificate RPMs from the primary SUSE Manager
to the secondary. Refer to Book “Client Configuration Guide” 3 “SSL Infrastructure” in the
Client Configuration Guide for information on SSL infrastructure. Remember, the Common
Name value must represent the combined SUSE Manager solution, not a single machine's
hostname.
If you generated a new SSL certificate during the SUSE Manager installation that included
a new Common Name value, copy the SSL certificate RPMs from the secondary to the pri-
mary server and redistribute the client-side certificate. If you also created another boot-
strap script, you may use this to install the certificate on client systems.
5. If you did not create a new bootstrap script, copy the contents of /srv/www/htdocs/pub/
bootstrap/ from the primary server to the secondary. If you did generate a new one,
copy that directory's contents to the primary SUSE Manager.
6. Turn off the Task Engine on the secondary server with the following command:
Establishing Redundant SUSE Manager Servers with Stand-Alone Database SUSE Man-
120 ager 2.1
rctaskomatic stop
You may use custom scripting or other means to establish automatic start-up or failover
of the Task Engine on the secondary server. It will need to be started upon failover.
7. Share channel package data (by default located in /var/spacewalk ) between the SUSE
Manager servers via a networked storage device. This eliminates data replication and en-
sures a consistent store of data for each SUSE Manager.
8. Share cache data (by default located in /var/cache/rhn ) between the SUSE Manager
servers via a networked storage device. This eliminates data replication and ensures a
consistent store of cached data for each server.
9. Make the various SUSE Manager servers available on your network via Common Name
and a method suiting your infrastructure. Options include round-robin DNS, a network
load-balancer, and a reverse-proxy setup.
search.rpc_handlers
Semi-colon separated list of classes to act as handlers for XMLRPC calls.
(filename>index:com.redhat.satellite.search.rpc.handlers.IndexHandler,
db:com.redhat.satellite.search.rpc.handlers.DatabaseHandler,
admin:com.redhat.satellite.search.rpc.handlers.AdminHandler)
search.max_hits_returned
Maximum number of results returned for the query ( 500 ).
search.connection.driver_class
JDBC driver class to conduct database searches ( oracle.jdbc.driver.OracleDriver ).
search.score_threshold
Minimum score a result needs to be returned as query result ( .10 ).
search.system_score_threshold
Minimum score a system search result needs to be returned as a query result ( .01 ).
search.errata_score_threshold
Minimum score a patch search result needs to be returned as a query result ( .20 ).
search.errata.advisory_score_threshold
Minimum score a patch advisory result needs to be returned as a query result ( .30 ).
search.max_ngram
Maximum length of n-gram characters ( 5 ). Note that any change to this value requires
clean-index to be run, and doc-indexes need to be modified and rebuilt.
search.doc.limit_results
Type true to limit the number of results both on search.score_threshold and restrict max
hits to be below search.max_hits_returned; type false to return all documentation search
matches ( false ).
search.schedule.interval
Input the time in milliseconds to control the interval with which the SearchServer polls
the database for changes; the default is 5 minutes ( 300000 ).
search.log.explain.results
Used during development and debugging. If set to true, this will log additional information
showing what influences the score of each result ( false ).
crontab -e
This particular job will run randomly between 3:03 a.m. and 5:50 a.m. system time each night
and redirect stdout and stderr from cron to prevent duplicating the more readable message
from mgr-ncc-sync . Options other than --email can also be included. Once you exit the
editor, the modified crontab is installed immediately.
1. On a SUSE Linux Enterprise Server 11 SP3 system, a typical generic PAM service file could
look as follows (save it as /etc/pam.d/susemanager to make it work with the settings
below):
#%PAM-1.0
auth required pam_env.so
auth sufficient pam_krb5.so no_user_check
2. Make SUSE Manager use this service file ( /etc/pam.d/susemanager ) by adding the fol-
lowing line to /etc/rhn/rhn.conf :
pam_auth_service = susemanager
3. To enable a user to authenticate against PAM, on the SUSE Manager Web interface go
to the Create User page and select the checkbox labeled Pluggable Authentication Modules
(PAM) positioned below the password and password confirmation fields.
4. Then finally YaST can be used to configure PAM when packages such as yast2-ldap-
client and yast2-kerberos-client are installed; for detailed information on config-
uring PAM, see the SUSE Linux Enterprise Server Security Guide. This example is not lim-
ited to Kerberos; it is a generic example and uses the current server configuration. Note
that only network-based authentication services are supported.
OSA dispatcher is a service that periodically queries SUSE Manager server for commands to
execute on the client. If any actions exist, it sends a message via jabberd to the osad instances
running on the clients.
To use this feature, first configure your firewall rules to allow connections on the required ports
as described in Section 3.3, “Additional Requirements”.
Then install the osa-dispatcher package, which can be found in the SUSE Manager software
channel. Once installed, start the service as root using the command:
rcosa-dispatcher start
Finally, install the osad package on all client systems to receive pushed actions. The package
can be found in the Tools child channel.
Warning
Do not install the osad package on the SUSE Manager server. The osad client package
conflicts with the osa-dispatcher server package.
Once installed, start the service on the client systems as root using the command:
rcosad start
Like other services, rcosa-dispatcher and rcosad accept stop , restart , and status com-
mands as well.
This feature depends on the client systems recognizing the fully qualified domain name (FQDN)
of SUSE Manager. The client systems use this name and not the IP address of the server when
configuring the YaST Online Update.
Now when you schedule actions from SUSE Manager on any of the push-enabled systems, the
task will be carried out immediately rather than after a client checks in.
In case the clients should be contacted via their hostnames instead of their IP addresses, set
the following option:
ssh_push_use_hostname = true
taskomatic.ssh_push_workers = number
The new script provides the option to initialize and register a client to be managed via SSH push
with or without tunneling. This command expects a client's hostname (or IP address) as well as
the path to a valid bootstrap script in the server's file system as parameters for registration:
For registration of systems that should be managed via SSH push, an activation key can be
configured to enable this contact method. Go to Systems Activation Keys and click on a key or
create a new one. Select your preferred Push method from the dropdown menu and click on
Update Activation Key.
All systems registered with an activation key will be pre-configured to be contacted by the
server using the method specified in the key. Currently, the following server contact methods
are available:
For already registered clients it is still possible to change the contact method in the system
details Web interface: On the Systems page select the system, click Edit These Properties and set
the value in the Contact Method combobox, then click Update Properties.
Note that mgr-ssh-push-init will automatically generate the necessary SSH key pair if it does
not yet exist on the SUSE Manager server. The correct host keys of clients are being stored in
the known_hosts file.
Note
When using the Push via SSH tunnel contact method, the client is configured to connect
to SUSE Manager via high port[1|2] . Tools like rhn_check and zypper will need an
active SSH session with the proper port forwarding options to access the SUSE Manager
API. To verify the Push via SSH tunnel connection manually, you can run the following
command on the SUSE Manager server:
gpg --gen-key
2. The command will prompt for key type. Choose option (2) DSA and ElGamal. This allows
you to create a digital signature and encrypt/decrypt with two types of technologies.
3. Choose the key size. The longer the key, the more resistant against attacks the messages
are. Creating a key of at least 2048 bits in size is recommended.
4. Next, specify how long the key needs to be valid. When choosing an expiration date,
remember that anyone using the public key must also be informed of the expiration and
supplied with a new public key. We recommended to not select an expiration date. If you
do not specify an expiration date, you are asked to confirm that the key should not expire.
Note
A good passphrase is essential for optimal security in GnuPG. Mix your passphrase
with uppercase and lowercase letters, use numbers or punctuation marks.
6. Once you enter and verify your passphrase, the keys are generated. A message will ask
you to move the mouse or otherwise interact with the system to generate random data
for the key. This part of the key generation process may take several minutes. When the
activity on the screen ceases, your new keys are placed in the directory .gnupg in root 's
home directory. This is the default location for keys generated by the root user.
To list the root keys, use the gpg --list-keys command.
7. To retrieve the public key, use the command gpg --list-keys command. The public key
is written to the file public_key.txt . This key must be deployed to all client systems that
receive custom packages from SUSE Manager. Techniques for deploying this key across
an organization are covered in Book “Client Configuration Guide” 4 “Importing Custom GPG
Keys”
%_signature gpg
%_gpg_path /etc/rpm/.gpg
%_gpg_name secret_key_uid
Replace secret_key_uid with exactly the output from the gpg --list-secret-keys | grep
uid command.
Note
RPMs can be signed during or after build. Determine if a package has already been signed
with the command: rpm --qip filename.rpm .
If the RPM is already signed, check whether the signature is correct. If the existing signature
is not correct, resign the package:
Check the value of the "Signature" tag to ensure that the RPM has been signed correctly:
the central configuration file to identify the server to receive the packages.
Package Description
Apart from the core package and optional plug-ins, you need to install at least one schema
validator. Schema validators are “sanitation filters” that reject inaccurate data from the client
components and assures that the logging events are described in a standardized format. For
SUSE Manager install the package auditlog-keeper-spacewalk-validator .
audit.enabled=1
spacewalk-service restart
After the command is successfully executed, Audit Log Keeper is correctly enabled and executed.
To also enable Audit Log Keeper on system startup, use the following command as user root :
chkconfig auditlog-keeper on
Apart from the above first steps, it is a good idea to change the default credentials. Proceed
as follows:
1. Log in as root . Stop the Audit Log Keeper and SUSE Manager server:
rcauditlog-keeper stop
spacewalk-service stop
rm /var/opt/auditlog-keeper/auditlog*
auditlog-keeper --configure
4. Start the Audit Log Keeper and SUSE Manager server again:
rcauditlog-keeper start
spacewalk-service start
Find further information about Audit Log Keeper plugins and how to configure at http://
wiki.novell.com/index.php/AuditLogKeeper . An FAQ can be found at http://wiki.novell.com/
index.php/AuditLogKeeperFAQ .
spacewalk-report --info
channel-packages: Packages in channels
channels: Channel report
entitlements: Entitlement and channel list and usage
errata-list: Errata out of compliance information - errata details
errata-list-all: List of all erratas
errata-systems: Errata out of compliance information - erratas for systems
inventory: Inventory report
users: Users in the system
users-systems: Systems administered by individual users
This gives you a list of all available report generators and their description. For example, to list
all the available channels, use this command:
spacewalk-report channels
channel_label,channel_name,number_of_packages
sles11-sp1-pool-i586,SLES11-SP1-Pool for i586,0
sles11-sp1-pool-x86_64,SLES11-SP1-Pool for x86_64,0
If you need to get a list of all users, pass the users option to the command:
spacewalk-report users
organization_id,organization,user_id,username,last_name,first_name,position,email,role,creation_ti
1,Penguin Inc.,1,admin,Penguin,Tux,,[email protected],Organization Administrator;SUSE
Manager Administrator,2012-03-19 15:59:40,2012-03-21 13:43:45,enabled
3. If Wagon finds that the requirements are not met (required maintenance updates are avail-
able but not yet installed), it will do an automatic self-update, which may require a reboot.
Follow the on-screen instructions.
4. Choose the update method in the following dialog. Select Customer Center to use the default
setup (recommended).
Click Custom URL to manually choose the software channels used for the online migration.
A list of channels will be displayed, providing the opportunity to manually enable, disable,
add, or delete channels. Add the SUSE Manager update source(s). This can either be the
SUSE Manager installation media or the SUSE-Manager-Server-2.1-Pool and SUSE-
Manager-Server-2.1-Updates channels. Click OK to return to the Update Method dialog.
If you want to review changes to the channel setup caused by the update process, select
Check Automatic Repository Changes.
Proceed with Next.
5. The system will be re-registered. During this process the Pool and Updates channels
will be added to the system. Confirm the addition of the channels.
6. If you have selected Check Automatic Repository Changes in the Update Method dialog, the
list of repositories will be displayed, providing the opportunity to manually enable, dis-
able, add, or delete channels. Proceed with OK when finished.
7. The Distribution Upgrade Settings screen opens and presents a summary of the update con-
figuration. The following sections are available:
Add-On Products
Do not select any add-on products during migration.
Update Options
Lists the actions that will be performed during the update. You can choose whether
to download all packages before installing them (default, recommended), or whether
to download and install packages one by one.
Packages
Statistical overview of the update.
Backup
Set backup options.
9. After the service pack migration has finished successfully, reboot the server. Then, to
complete the SUSE Manager server upgrade run:
/usr/lib/susemanager/bin/susemanager-upgrade.sh
10. Your system has been successfully updated to SUSE Manager 2.1.
1. Make sure your SUSE Manager and all the clients you want to migrate have installed
all available updates, including the SUSE Manager tools. This is absolutely necessary,
otherwise the migration will fail.
mgr-ncc-sync -l --all-childs
[P] sles11-sp1-pool-i586
[.] sle11-hae-sp1-pool-i586
[.] sle11-hae-sp1-updates-i586
[.] sle11-hae-sp2-pool-i586
[.] sle11-hae-sp2-updates-i586
[.] sle11-sdk-sp1-pool-i586
[.] sle11-sdk-sp1-updates-i586
[X] sle11-sdk-sp2-core-i586
[.] sle11-sdk-sp2-updates-i586
[.] sle11-smt-updates-i586
[.] sle11-sp1-debuginfo-pool-i586
[.] sle11-sp1-debuginfo-updates-i586
[.] sle11-webyast-sp1-pool-i586
[.] sle11-webyast-sp1-updates-i586
[.] sles11-extras-i586
[P] sles11-sp1-suse-manager-tools-i586
[P] sles11-sp1-updates-i586
[.] sles11-sp2-core-i586
mgr-ncc-sync -c sles11-sp2-core-i586
mgr-ncc-sync -c sles11-sp2-updates-i586
c. Check the status again with mgr-ncc-sync -l --all-childs . You should see a
P this time.
In your SUSE Manager Web interface, go to Channels All Channels and click Show
All Child Channels to see the parent/child relationship of your channels.
d. If you limit the usage, enter your value in the Usage text field.
c. Paste the XML content in the text area or select the file to upload. Click Create.
d. Add autoupgrade=1 in the Kernel parameters of the Details tab and click Update.
f. Enter in the text field registration_key= and the key name from Step 4.b.
After you have successfully finished the previous procedure, everything is prepared for an up-
grade. If you want to upgrade a system, do the following:
1. Go to Provisioning Autoinstallation Schedule, and choose the AutoYaST XML profile you
have uploaded in Step 5.
Next time the machine asks the SUSE Manager server for jobs, it will receive a reinstallation job
which fetches Kernel and initrd and writes a new /boot/grub/menu.lst (contains pointers to
the new Kernel and initrd).
When the machine boots, it will use the GRUB configuration and boots the new Kernel with its
initrd. No PXE boot is required for this process. A shutdown of the machine is initiated as well,
effectively 3 minutes after the job was fetched.
SUSE Manager
This guide gave you a short introduction to SUSE Manager. To discover more, refer to the
other manuals available for SUSE Manager. Find them at http://www.suse.com/documen-
tation/suse_manager . Alternatively, access them from the SUSE Manager Web interface
by selecting Help from the top navigation bar.
Novell Wiki
On the Novell Wiki you can read articles about this product and add tips and tricks yourself.
Find them at http://wiki.novell.com/index.php/SUSE_Manager .
KVM
For detailed information about KVM refer to the guide Virtualization with KVM, available
at http://www.suse.com/documentation/sles11 .
General
Update feedback section.
Section 4.3, “Setup”
Now use mgr-sync and SCC (https://bugzilla.suse.com/show_bug.cgi?id=907825 ).
A.8.1 Installation
Section 4.1, “Summary of Steps”
Add warning about SUSE Manager renaming.
A.8.2 Troubleshooting
Section 7.2, “General Problems”
Move this section to the beginning of the chapter.
A.8.3 Maintenance
Section 8.2, “Updating SUSE Manager”
Add PostgreSQL start command.
A.10.2 Installation
Chapter 4, Installation
Move listing of new features and changes to Book “Reference Guide” .
A.10.4 Troubleshooting
Section 7.4, “Gathering Information with spacewalk-report”
New section.
A.10.5 Maintenance
A.11.2 Troubleshooting
Section 7.17, “Multiple Mirror Credentials”
Clarify warning about removing channels.
A.12.1 Troubleshooting
Section 7.10, “Discovering Hosts and Subnets in the Network”
This section is new.
A.12.2 Maintenance
Section 8.6, “Configuring SUSE Manager's Database (smdba)”
Some minor improvements for clarity.