Legacy SUSE Multi-Linux Manager Server Migration to Container
To migrate a legacy SUSE Multi-Linux Manager Server to a container, a new machine is required.
In the context of this migration, the legacy SUSE Multi-Linux Manager Server (RPM installation) is sometimes also called old server.
2. GPG 密钥
-
自信任 GPG 密钥不会被迁移。
-
仅在 RPM 数据库中可信的 GPG 密钥不会迁移。因此,使用
spacewalk-repo-sync
同步通道可能会失败。 -
The administrator must migrate these keys manually from the legacy SUSE Multi-Linux Manager installation to the container host after the actual server migration.
Procedure: Manual Migration of the GPG Keys to New Server-
Copy the keys from the legacy Uyuni server to the container host of the new server.
-
稍后,使用命令
mgradm gpg add <PATH_TO_KEY_FILE>
将每个密钥添加到迁移的服务器。
-
2.1. Initial Preparation on the Legacy Server
The migration can take a very long time depending on the amount of data that needs to be replicated. To reduce downtime it is possible to run the migration multiple times in a process of initial replication, re-replication, or final replication and switch over while all the services on the legacy server can stay up and running. Only during the final migration the processes on the legacy server need to be stopped. For all non-final replications add the parameter mgradm migrate podman <oldserver.fqdn> --prepare |
-
停止 SUSE Multi-Linux Manager 服务:
spacewalk-service stop
-
停止 PostgreSQL 服务:
systemctl stop postgresql
2.2. SSH 连接准备
-
Ensure that for
root
an SSH key exists on the new 5.1 server. If a key does not exist, create it with the command:ssh-keygen -t rsa
-
The SSH configuration and agent should be ready on the new server host for a connection to the legacy server that does not prompt for a password.
eval $(ssh-agent); ssh-add
To establish a connection without prompting for a password, the migration script relies on an SSH agent running on the new server. If the agent is not active yet, initiate it by running
eval $(ssh-agent)
. Then add the SSH key to the running agent withssh-add
followed by the path to the private key. You will be prompted to enter the password for the private key during this process. -
Copy the public SSH key to the legacy SUSE Multi-Linux Manager Server (
<oldserver.fqdn>
) withssh-copy-id
. Replace<oldserver.fqdn>
with the FQDN of the legacy server:ssh-copy-id <oldserver.fqdn>
The SSH key will be copied into the legacy server’s
~/.ssh/authorized_keys
file. For more information, see thessh-copy-id
manpage. -
Establish an SSH connection from the new server to the legacy SUSE Multi-Linux Manager Server to check that no password is needed. Also there must not by any problem with the host fingerprint. In case of trouble, remove old fingerprints from the
~/.ssh/known_hosts
file. Then try again. The fingerprint will be stored in the local~/.ssh/known_hosts
file.
2.3. 执行迁移
When planning your migration from a legacy SUSE Multi-Linux Manager to a containerized SUSE Multi-Linux Manager, ensure that your target instance meets or exceeds the specifications of the legacy setup. This includes, but is not limited to, memory (RAM), CPU Cores, Storage, and Network Bandwidth.
-
此步骤是可选的。如果您的基础架构需要自定义的永久性存储,请使用
mgr-storage-server
工具。-
有关详细信息,请参见
mgr-storage-server --help
。此工具可以简化容器存储和数据库卷的创建。 -
如下所示使用命令:
mgr-storage-server <storage-disk-device> [<database-disk-device>]
例如:
mgr-storage-server /dev/nvme1n1 /dev/nvme2n1
此命令将在
/var/lib/containers/storage/volumes
中创建永久性存储卷。有关详细信息,请参见 Persistent Container Volumes。
-
-
Execute the following command to install a new SUSE Multi-Linux Manager server. Replace
<oldserver.fqdn>
with the FQDN of the legacy server:mgradm migrate podman <oldserver.fqdn>
-
迁移可信 SSL CA 证书。
2.3.1. 证书的迁移
Trusted SSL CA certificates that were installed as part of an RPM and stored on a legacy SUSE Multi-Linux Manager in the /usr/share/pki/trust/anchors/
directory will not be migrated. Because SUSE does not install RPM packages in the container, the administrator must migrate these certificate files manually from the legacy installation after migration:
-
Copy the file from the legacy server to the new server. 例如,复制为
/local/ca.file
。 -
Copy the file into the container with the command:
mgrctl cp /local/ca.file server:/etc/pki/trust/anchors/
After successfully running the To redirect them to the new 5.1 server, it is required to rename the new server at the infrastructure level (DHCP and DNS) to use the same FQDN and IP address as legacy server. |
3. Kubernetes Preparations
Before executing the migration with mgradm migrate
command, it is essential to predefine Persistent Volumes, especially considering that the migration job initiates the container from scratch.
For more information, see the installation section on preparing these volumes in Persistent Container Volumes.
4. 迁移
Execute the following command to install a new SUSE Multi-Linux Manager server, replacing <oldserver.fqdn> with the appropriate FQDN of the legacy server:
mgradm migrate podman <oldserver.fqdn>
或
mgradm migrate kubernetes <oldserver.fqdn>
After successfully running the |