Registering Red Hat Enterprise Linux Clients with CDN
If you are running Red Hat Enterprise Linux clients directly, rather than using SUSE Linux Enterprise Server with Expanded Support, you need to use Red Hat sources to retrieve and update packages. This section contains information about using the Red Hat content delivery network (CDN) to register traditional and Salt clients running Red Hat Enterprise Linux operating systems.
Traditional clients are available on Red Hat Enterprise Linux 6 and 7 only. Red Hat Enterprise Linux 8 and Red Hat Enterprise Linux 9 clients are supported as Salt clients.
For information about using Red Hat update infrastructure (RHUI) instead, see Registering Red Hat Enterprise Linux Clients with RHUI.
|
Red Hat Enterprise Linux clients are based on Red Hat and are unrelated to SUSE Linux Enterprise Server with Expanded Support, RES, or SUSE Linux Enterprise Server. You are responsible for arranging access to Red Hat base media repositories and RHEL installation media, as well as connecting SUSE Manager Server to the Red Hat content delivery network. You must obtain support from Red Hat for all your RHEL systems. If you do not do this, you might be violating your terms with Red Hat. |
1. Import Entitlements and Certificates
Red Hat clients require a Red Hat certificate authority (CA) and entitlement certificate, and an entitlement key.
Entitlement certificates are embedded with expiration dates, which match the length of the support subscription. To avoid disruption, you need to repeat this process at the end of every support subscription period.
Red Hat supplies a subscription manager tool to manage subscription assignments. It runs locally to track installed products and subscriptions. Clients must be registered with the subscription manager to obtain certificates.
Red Hat clients use a URL to replicate repositories. The URL changes depending on where the Red Hat client is registered.
Red Hat clients can be registered in three different ways:
-
Red Hat content delivery network (CDN) at redhat.com
-
Red Hat Satellite Server
-
Red Hat update infrastructure (RHUI) in the cloud
This guide covers clients registered to Red Hat CDN. You must have at least one system registered to the CDN, with an authorized subscription for repository content.
For information about using Red Hat update infrastructure (RHUI) instead, see Registering Red Hat Enterprise Linux Clients with RHUI.
|
Satellite certificates for client systems require a Satellite server and subscription. Clients using Satellite certificates are not supported with SUSE Manager Server. |
|
Entitlement certificates are embedded with expiration dates, which match the length of the support subscription. To avoid disruption, you need to repeat this process at the end of every support subscription period. |
Red Hat supplies the subscription-manager tool to manage subscription assignments. It runs locally on the client system to track installed products and subscriptions. Register to redhat.com with subscription-manager, then follow this procedure to obtain certificates.
-
On the client system, at the command prompt, register with the subscription manager tool:
subscription-manager register
Enter your Red Hat Portal username and password when prompted.
-
Run command:
subscription-manager activate
-
Copy your entitlement certificate and key from the client system, to a location that the SUSE Manager Server can access:
cp /etc/pki/entitlement/ /<example>/entitlement/
Your entitlement certificate and key both have a file extension of
.pem. The key also haskeyin the filename. -
Copy the Red Hat CA Certificate file from the client system, to the same web location as the entitlement certificate and key:
cp /etc/rhsm/ca/redhat-uep.pem /<example>/entitlement
To manage repositories on your Red Hat client, you need to import the CA and entitlement certificates to the SUSE Manager Server. This requires that you perform the import procedure three times, to create three entries: one each for the entitlement certificate, the entitlement key, and the Red Hat certificate.
-
On the SUSE Manager Server Web UI, navigate to .
-
Click Create Stored Key/Cert and set these parameters for the entitlement certificate:
-
In the
Descriptionfield, typeEntitlement-Cert-date. -
In the
Typefield, selectSSL. -
In the
Select file to uploadfield, browse to the location where you saved the entitlement certificate, and select the.pemcertificate file.
-
-
Click Create Key.
-
Click Create Stored Key/Cert and set these parameters for the entitlement key:
-
In the
Descriptionfield, typeEntitlement-key-date. -
In the
Typefield, selectSSL. -
In the
Select file to uploadfield, browse to the location where you saved the entitlement key, and select the.pemkey file.
-
-
Click Create Key.
-
Click Create Stored Key/Cert and set these parameters for the Red Hat certificate:
-
In the
Descriptionfield, typeredhat-uep. -
In the
Typefield, selectSSL. -
In the
Select file to uploadfield, browse to the location where you saved the Red Hat certificate, and select the certificate file.
-
-
Click Create Key.
2. Add Software Channels
Before you register Red Hat clients to your SUSE Manager Server, you need to add the required software channels, and synchronize them.
|
In the following section, descriptions often default to the |
Your SUSE Manager subscription entitles you to the tools channels for SUSE Linux Enterprise Server with Expanded Support (also known as Red Hat Expanded Support or RES). You must use the client tools channel to create the bootstrap repository. This procedure applies to both Salt and traditional clients.
The products you need for this procedure are:
| OS Version | Product Name |
|---|---|
Red Hat 7 |
RHEL7 Base x86_64 |
Red Hat 8 |
RHEL or SLES ES or CentOS 8 Base |
Red Hat 9 |
RHEL and Liberty 9 Base |
-
In the SUSE Manager Web UI, navigate to .
-
Locate the appropriate products for your client operating system and architecture using the search bar, and check the appropriate product. This will automatically check all mandatory channels. Also all recommended channels are checked as long as the
include recommendedtoggle is turned on. Click the arrow to see the complete list of related products, and ensure that any extra products you require are checked. -
Click Add Products and wait until the products have finished synchronizing.
|
The AppStream repository provides modular packages. This results in the SUSE Manager Web UI showing incorrect package information. You cannot perform package operations such as installing or upgrading directly from modular repositories using the Web UI or API. Alternatively, you can use Salt states to manage modular packages on Salt clients, or use the |
3. Prepare Custom Repositories and Channels
To mirror the software from the Red Hat CDN, you need to create custom channels and repositories in SUSE Manager that are linked to the CDN by a URL. You must have entitlements to these products in your Red Hat Portal for this to work correctly. You can use the subscription manager tool to get the URLs of the repositories you want to mirror:
subscription-manager repos
You can use these repository URLs to create custom repositories. This allows you to mirror only the content you need to manage your clients.
|
You can only create custom versions of Red Hat repositories if you have the correct entitlements in your Red Hat Portal. |
The details you need for this procedure are:
| Option | Setting |
|---|---|
Repository URL |
The content URL provided by Red Hat CDN |
Has Signed Metadata? |
Uncheck all Red Hat Enterprise repositories |
SSL CA Certificate |
|
SSL Client Certificate |
|
SSL Client Key |
|
-
On the SUSE Manager Server Web UI, navigate to .
-
Click Create Repository and set the appropriate parameters for the repository.
-
Click Create Repository.
-
Repeat for all repositories you need to create.
The channels you need for this procedure are:
| OS Version | Base Product | Base Channel |
|---|---|---|
Red Hat 7 |
RHEL7 Base x86_64 |
rhel7-pool-x86_64 |
Red Hat 8 |
RHEL or SLES ES or CentOS 8 Base |
rhel8-pool-x86_64 |
Red Hat 9 |
RHEL and Liberty 9 Base |
el9-pool-x86_64 |
-
On the SUSE Manager Server Web UI, navigate to .
-
Click Create Channel and set the appropriate parameters for the channels.
-
In the
Parent Channelfield, select the appropriate base channel. -
Click Create Channel.
-
Repeat for all channels you need to create. There should be one custom channel for each custom repository.
You can check that you have created all the appropriate channels and repositories, by navigating to .
|
For Red Hat 9 and Red Hat 8 clients, add both the Base and AppStream channels. You require packages from both channels. If you do not add both channels, you cannot create the bootstrap repository, due to missing packages. |
If you are using modular channels, you must enable the Python 3.6 module stream on the client.
If you do not provide Python 3.6, the installation of the spacecmd package will fail.
When you have created all the channels, you can associate them with the repositories you created:
-
On the SUSE Manager Server Web UI, navigate to , and click the channel to associate.
-
Navigate to the
Repositoriestab, and check the repository to associate with this channel. -
Click Update Repositories to associate the channel and the repository.
-
Repeat for all channels and repositories you need to associate.
-
OPTIONAL: Navigate to the
Synctab to set a recurring schedule for synchronization of this repository. -
Click Sync Now to begin synchronization immediately.
4. Check Synchronization Status
-
In the SUSE Manager Web UI, navigate to and select the
Productstab. This dialog displays a completion bar for each product when they are being synchronized. -
Alternatively, you can navigate to , then click the channel associated to the repository. Navigate to the
Repositoriestab, then clickSyncand checkSync Status.
-
At the command prompt on the SUSE Manager Server, as root, use the
tailcommand to check the synchronization log file:tail -f /var/log/rhn/reposync/<channel-label>.log
-
Each child channel generates its own log during the synchronization progress. You need to check all the base and child channel log files to be sure that the synchronization is complete.
|
Red Hat Enterprise Linux channels can be very large. Synchronization can sometimes take several hours. |
-
On the SUSE Manager Server Web UI, navigate to .
-
Click Create State Channel.
-
In the
Namefield, typesubscription-manager: disable yum plugins. -
In the
Labelfield, typesubscription-manager-disable-yum-plugins. -
In the
Descriptionfield, typesubscription-manager: disable yum plugins. -
In the
SLS Contentsfield, leave it empty.
-
-
Click Create Config Channel
-
Click Create Configuration File
-
In the
Filename/Pathfield type/etc/yum/pluginconf.d/subscription-manager.conf. -
In the
File Contentsfield type:[main] enabled=0
-
-
Click Create Configuration File
-
Take note of the value of the field
Salt Filesystem Path`. -
Click on the name of the Configuration Channel.
-
Click on
View/Edit 'init.sls' File-
In the
File Contentsfield, type:configure_subscription-manager-disable-yum-plugins: cmd.run: - name: subscription-manager config --rhsm.auto_enable_yum_plugins=0 - watch: - file: /etc/yum/pluginconf.d/subscription-manager.conf file.managed: - name: /etc/yum/pluginconf.d/subscription-manager.conf - source: salt:///etc/yum/pluginconf.d/subscription-manager.conf
-
-
Click Update Configuration File.
|
The |
-
On the SUSE Manager Server Web UI, navigate to .
-
Click Create Group.
-
In the
Namefield, typerhel-systems. -
In the
Descriptionfield, typeAll RHEL systems.
-
-
Click Create Group.
-
Click
Statestab. -
Click
Configuration Channelstab. -
Type
subscription-manager: disable yum pluginsat the search box. -
Click Search to see the state.
-
Click the checkbox for the state at the
Assigncolumn. -
Click Save changes.
-
Click Confirm.
If you already have RHEL systems added to SUSE Manager, assign them to the new system group, and then apply the highstate.
You need to modify the activation keys you used for RHEL systems to include the system group created above.
-
On the SUSE Manager Server Web UI, navigate to .
-
For each the Activation Keys you used for RHEL systems, click on it and:
-
Navigate to the
Groupstab, and theJoinsubtab. -
Check
Select rhel-systems. -
Click Join Selected Groups.
5. Trust GPG Keys on Clients
Operating systems either trust their own GPG keys directly or at least ship them installed with the minimal system. But third party packages signed by a different GPG key need manual handling. The clients can be successfully bootstrapped without the GPG key being trusted. However, you cannot install new client tool packages or update them until the keys are trusted.
Salt clients now use GPG key information entered for a software channel to manage the trusted keys. When a software channel with GPG key information is assigned to a client, the key is trusted as soon as the channel is refreshed or the first package gets installed from this channel.
The GPG key URL parameter in the software channel page can contain multiple key URLs separated by "whitespace". In case it is a file URL, the GPG key file must be deployed on the client before the software channel is used.
The GPG keys for the Client Tools Channels of Red Hat based clients are deployed on the client into /etc/pki/rpm-gpg/ and can be referenced with file URLs.
Same is the case with the GPG keys of Expanded Support clients.
Only in case a software channel is assigned to the client they will be imported and trusted by the system.
|
Because Debian based systems sign only metadata, there is no need to specify extra keys for single channels. If a user configures an own GPG key to sign the metadata as described in "Use Your Own GPG Key" in Signing Repository Metadata the deployment and trust of that key is executed automatically. |
5.1. User defined GPG keys
Users can define their own GPG keys to be deployed to the client.
By providing some pillar data and providing the GPG key files in the Salt filesystem, they are automatically deployed to the client.
These keys are deployed into /etc/pki/rpm-gpg/ on RPM based operating systems and to /usr/share/keyrings/ on Debian systems:
Define the pillar key [literalcustom_gpgkeys for the client you want to deploy the key to and list the names of the key file.
cat /srv/pillar/mypillar.sls custom_gpgkeys: - my_first_gpg.key - my_second_gpgkey.gpg
Additionally in the Salt filesystem create a directory named gpg and store there the GPG key files with the name specified in the custom_gpgkeys pillar data.
ls -la /srv/salt/gpg/ /srv/salt/gpg/my_first_gpg.key /srv/salt/gpg/my_second_gpgkey.gpg
The keys are now deployed to the client at /etc/pki/rpm-gpg/my_first_gpg.key and /etc/pki/rpm-gpg/my_second_gpgkey.gpg.
The last step is to add the URL to the GPG key URL field of the software channel.
Navigate to and select the channel you want to modify.
Add to GPG key URL the value file:///etc/pki/rpm-gpg/my_first_gpg.key.
5.2. GPG Keys in Bootstrap Scripts
-
On the SUSE Manager Server, at the command prompt, check the contents of the
/srv/www/htdocs/pub/directory. This directory contains all available public keys. Take a note of the key that applies to the channel assigned to the client you are registering. -
Open the relevant bootstrap script, locate the
ORG_GPG_KEY=parameter and add the required key. For example:uyuni-gpg-pubkey-0d20833e.key
You do not need to delete any previously stored keys.
|
Trusting a GPG key is important for security on clients. It is the task of the administrator to decide which keys are needed and can be trusted. A software channel cannot be assigned to a client when the GPG key is not trusted. |
6. Manage GPG Keys
Clients use GPG keys to check the authenticity of software packages before they are installed. Only trusted software can be installed on clients.
|
Trusting a GPG key is important for security on clients. It is the task of the administrator to decide which keys are needed and can be trusted. A software channel cannot be assigned to a client when the GPG key is not trusted. |
For more information about GPG keys, see GPG Keys.
|
For the Red Hat custom channels, if you want to check the For the complete list of the Red Hat product signing keys, see https://access.redhat.com/security/team/key. |
7. Register Clients
To register your clients, you need a bootstrap repository. By default, bootstrap repositories are automatically created, and regenerated daily for all synchronized products. You can manually create the bootstrap repository from the command prompt, using this command:
mgr-create-bootstrap-repo
For more information on registering your clients, see Client Registration.