Register Clients with the Web UI
Bootstrapping clients with the Web UI is using Salt SSH to execute the bootstrap process on the client. Salt SSH uses the Salt Bundle and its included Python interpreter. Therefore, no other Python interpreter needs to be installed on the client.
As Salt Bundle is shipped with the bootstrap repository, the repository must be created before starting the bootstrap process for the client. A shell script detects the operating system on the client and deploys the Salt Bundle from the appropriate bootstrap repository, using the same logic as the bootstrap script. For more information, see Prepare to Create a Bootstrap Repository. |
Do not register the SUSE Manager Server to itself. The SUSE Manager Server must be managed individually or by using another separate SUSE Manager Server. For more information about using multiple servers, see Multiple Servers with Hub to Manage Large Scale Deployments. |
-
In the SUSE Manager Web UI, navigate to
. -
In the
Host
field, type the fully qualified domain name (FQDN) of the client to be bootstrapped. -
In the
SSH Port
field, type the SSH port number to use to connect and bootstrap the client. By default, the SSH port is22
. -
In the
User
field, type the username to log in to the client. By default, the username isroot
. -
To bootstrap the client with SSH, in the
Authentication
field, checkSSH Private Key
, and upload the SSH private key to use to log in to the client. If your SSH private key requires a passphrase, type it into theSSH Private Key Passphrase
field, or leave it blank for no passphrase. -
To bootstrap the client with a password, in the
Authentication
field, checkPassword
, and type the password to log in to the client. -
In the
Activation Key
field, select the activation key that is associated with the software channel you want to use to bootstrap the client. For more information, see Activation Keys. -
OPTIONAL: In the
Proxy
field, select the proxy to register the client to. -
By default, the
Disable SSH Strict Key Host Checking
checkbox is selected. This allows the bootstrap process to automatically accept SSH host keys without requiring you to manually authenticate. -
OPTIONAL: Check the
Manage System Completely via SSH
checkbox. If you check this option, the client is configured to use SSH for its connection to the server, and no other connection method is configured. -
Click Bootstrap to begin registration.
When the bootstrap process has completed, your client is listed at
.
SSH private keys are stored only for the duration of the bootstrapping process. They are deleted from the SUSE Manager Server as soon as bootstrapping is complete. |
When new packages or updates are installed on the client using SUSE Manager, any end user license agreements (EULAs) are automatically accepted. To review a package EULA, open the package details page in the Web UI. |
1. Handling of Locally Assigned Repositories
Having repositories assigned directly to clients not served by SUSE Manager is not a common use case. It can cause trouble. Therfore bootstrapping via Salt disables all local repositories at the beginning of the bootstrap process.
Later, during every use of the channel state, for example when executing a Highstate or a package installation, all locally assigned repositories are disabled again.
All software packages which are used on the clients should come from channels served by SUSE Manager.
For more information about creating a custom channel, see Custom Channels
at Custom Channels.