Public Cloud Requirements
This section provides the requirements for installing SUSE Manager on public cloud infrastructure. We have tested these instructions on Amazon EC2, Google Compute Engine, and Microsoft Azure, but they should work on other providers as well, with some variation.
Before you begin, here are some considerations:
The SUSE Manager setup procedure performs a forward-confirmed reverse DNS lookup. This must succeed in order for the setup procedure to complete and for SUSE Manager to operate as expected. It is important to perform hostname and IP configuration before you set up SUSE Manager.
SUSE Manager Server and Proxy instances need to run in a network configuration that provides you control over DNS entries, but cannot be accessed from the internet at large.
Within this network configuration DNS resolution must be provided:
hostname -fmust return the fully qualified domain name (FQDN).
DNS resolution is also important for connecting clients.
DNS is dependent on the cloud framework you choose. Refer to the cloud provider documentation for detailed instructions.
We recommend that you locate software repositories, the server database, and the proxy squid cache on an external virtual disk. This prevents data loss if the instance is unexpectedly terminated. This section includes instructions for setting up an external virtual disk.
If you are attempting to bootstrap traditional clients, check that you can resolve the host name of the server while you are logged in to the client.
You might need to add the FQDN of the server to
When you use SUSE Manager on a public cloud, you must use a restricted network. We recommend using a VPC private subnet with an appropriate firewall setting. Only machines in your specified IP ranges must be able to access the instance.
When you run SUSE Manager on public clouds, you must apply security measures to limit access to the instance. A world-accessible SUSE Manager instance violates the terms of the SUSE Manager EULA, and is not supported by SUSE.
To access the SUSE Manager Web UI, allow HTTPS when configuring the network access controls. This allows you to access the SUSE Manager Web UI.
In EC2 and Azure, create a new security group, and add inbound and outbound rules for HTTPS.
In GCE, check the
Allow HTTPS traffic box under the
We recommend that the repositories and the database for SUSE Manager are stored on separate storage devices to the root volume. This will help to avoid data loss. Do not use logical volume management (LVM) for public cloud installations.
You must set up the storage devices before you run the YaST SUSE Manager setup procedure.
The size of the disk for repositories storage is dependent on the number of distributions and channels you intend to manage with SUSE Manager. When you attach the virtual disks, they will appear in your instance as Unix device nodes. The names of the device nodes will vary depending on your provider, and the instance type selected.
Ensure the root volume of the SUSE Manager Server is 100 GB or larger. Add an additional storage disk of 500 GB or more, and choose SSD storage if you can. The cloud images for SUSE Manager Server use a script to assign this separate volume when your instance is launched.
When you launch your instance, you can log in to the SUSE Manager Server and use this command to find all available storage devices:
hwinfo --disk | grep -E "Device File:"
If you are not sure which device to choose, use the
lsblk command to see the name and size of each device.
Choose the name that matches with the size of the virtual disk you are looking for.
You can set up the external disk with the
This creates an XFS partition mounted at
/manager_storage and uses it as the location for the database and repositories:
For more information about setting up storage volumes and partitions, including recommended minimum sizes, see installation:hardware-requirements.adoc.