Deploy SUSE Manager 5.0.1 Proxy as a Virtual Machine
- 1. Available Images
- 2. Virtual Machine Manager (virt-manager) Settings
- 3. Hardware Requirements for the Proxy
- 4. Initial KVM Setup
- 5. Register SL Micro and SUSE Manager 5.0.1
- 6. Create an Activation Key for the Proxy
- 7. Bootstrap the Proxy Host
- 8. Generate the Proxy Configuration
- 9. Configure Custom Persistent Storage
- 10. Transfer the Proxy Configuration
- 11. Start the SUSE Manager 5.0.1 Proxy
This chapter provides the Virtual Machine settings for deployment of SUSE Manager 5.0.1 as an image. KVM will be combined with Virtual Machine Manager (virt-manager) as a sandbox for this installation.
The preferred method for deploying SUSE Manager 5.0.1 Proxy is to use one of the following available images. All tools are included in these images greatly simplifying deployment. |
1. Available Images
Images for SUSE Manager 5.0.1 are available at SUSE Manager 5.0.1 VM images.
Architecture | Image Format |
---|---|
aarch64 |
qcow2, vmdk |
x86_64 |
qcow2, vmdk, raw, Self Installer |
For more information on preparing raw images see: For additional information on the self install images see: |
2. Virtual Machine Manager (virt-manager) Settings
Enter the following settings when creating a new virtual machine using virt-manager.
This table specifies the minimum requirements. These are suitable for a quick test installation, such as a server with one client. If you want to use a production environment, review the requirements listed in Hardware Requirements. |
3. Hardware Requirements for the Proxy
This table shows the hardware requirements for deploying SUSE Manager Proxy.
KVM Settings | |
---|---|
Installation Method |
Import Existing Disk Image |
OS: |
Linux |
Version: |
SUSE Manager-Proxy.x86_64-5.0.0-Build16.12.qcow2 |
Memory: |
2 GB |
CPU’s: |
2 |
Storage Format: |
.qcow2 40 GB (Default) Root Partition |
Name: |
test-setup |
Network |
Bridge br0 |
|
4. Initial KVM Setup
-
Create a new virtual machine using the downloaded Minimal KVM image and select
Import existing disk image
. -
Configure RAM and number of CPUs (at least 16 GB RAM and 4 CPUs).
-
Name your KVM machine and select the
Customize configuration before install
check box. -
Click Begin Installation to boot from the image.
-
At the JeOS Firstboot screen select start to continue.
-
Select keyboard layout.
-
Accept the license agreement.
-
Select your time zone.
-
Enter a password for root.
-
Once installation completes login as root.
-
Proceed to the next section.
5. Register SL Micro and SUSE Manager 5.0.1
-
Boot the virtual machine.
-
Log in as
root
. -
Register SL Micro with SCC.
transactional-update register -r <REGCODE> -e <your_email>
-
Reboot.
-
Register SUSE Manager 5.0.1 with SUSE Customer Center.
transactional-update register -p SUSE-Manager-Proxy/5.0/x86_64 -r <REGCODE>
-
Reboot.
-
Update the system:
transactional-update
-
If updates were applied reboot.
6. Create an Activation Key for the Proxy
On the SUSE Manager server, create an activation key for the Proxy.
-
Navigate to
, and click Create key. -
Create an activation key for the proxy host with SL Micro 5.5 as the parent channel. This key should include all recommended channels and the Proxy as an extension child channel.
-
Proceed to boostrapping the proxy host as a minion.
7. Bootstrap the Proxy Host
-
Select
. -
Fill in the fields for your proxy host.
-
Select the Activation key created in the previous step from the dropdown.
-
Click Bootstrap.
-
Wait for the Bootstrap process to complete successfully. Check the Salt menu and confirm the Salt key is listed and accepted.
-
Reboot the proxy host.
-
Select the host from the System list and trigger a second reboot after all events are finished to conclude the onboarding.
-
Select the host from the Systems list and apply all patches to update it.
-
Reboot the proxy host.
8. Generate the Proxy Configuration
The configuration archive of the SUSE Manager Proxy is generated by the SUSE Manager Server. Each additional Proxy requires its own configuration archive.
2 GB represents the default proxy squid cache size. This will need to be adjusted for your environment. |
For Podman deployment, the container host for the SUSE Manager Proxy must be registered as a client to the SUSE Manager Server prior to generating this proxy configuration. |
If a proxy FQDN is used to generate a proxy container configuration that is not a registered client (as in the Kubernetes use case), a new system entry will appear in system list.
This new entry will be shown under previously entered Proxy FQDN value and will be of Foreign
system type.
8.1. Generate the Proxy Configuration with Web UI
-
In the Web UI, navigate to
and fill the required data: -
In the
Proxy FQDN
field type fully qualified domain name for the proxy. -
In the
Parent FQDN
field type fully qualified domain name for the SUSE Manager Server or another SUSE Manager Proxy. -
In the
Proxy SSH port
field type SSH port on which SSH service is listening on SUSE Manager Proxy. Recommended is to keep default 8022. -
In the
Max Squid cache size [MB]
field type maximal allowed size for Squid cache. Recommended is to use at most 60% of available storage for the containers.2 GB represents the default proxy squid cache size. This will need to be adjusted for your environment.
-
In the
SSL certificate
selection list choose if new server certificate should be generated for SUSE Manager Proxy or an existing one should be used. You can consider generated certificates as SUSE Manager builtin (self signed) certificates.Depending on the choice then provide either path to signing CA certificate to generate a new certificate or path to an existing certificate and its key to be used as proxy certificate.
The CA certificates generated by the server are stored in the
/var/lib/containers/storage/volumes/root/_data/ssl-build
directory.For more information about existing or custom certificates and the concept of corporate and intermediate certificates, see Import SSL Certificates.
-
Click Generate to register a new proxy FQDN in the SUSE Manager Server and generate a configuration archive (
config.tar.gz
) containing details for the container host. -
After a few moments you are presented with file to download. Save this file locally.
8.2. Generate the Proxy Configuration with spacecmd and Self-Signed Certificate
You can generate a Proxy configuration using spacecmd.
-
SSH into your container host.
-
Execute the following command replacing the Server and Proxy FQDN:
mgrctl exec -ti 'spacecmd proxy_container_config_generate_cert -- dev-pxy.example.com dev-srv.example.com 2048 email@example.com -o /tmp/config.tar.gz'
-
Copy the generated configuration from the server container:
mgrctl cp server:/tmp/config.tar.gz .
8.3. Generate the Proxy Configuration with spacecmd and Custom Certificate
You can generate a Proxy configuration using spacecmd for a custom certificates rather than the default self-signed certificates.
-
SSH into your Server container host.
-
Execute the following command replacing the Server and Proxy FQDN:
for f in ca.crt proxy.crt proxy.key; do mgrctl cp $f server:/tmp/$f done mgrctl exec -ti 'spacecmd proxy_container_config -- -p 8022 pxy.example.com srv.example.com 2048 email@example.com /tmp/ca.crt /tmp/proxy.crt /tmp/proxy.key -o /tmp/config.tar.gz'
-
Copy the generated configuration from the server container:
mgrctl cp server:/tmp/config.tar.gz .
9. Configure Custom Persistent Storage
This step is optional.
However, if custom persistent storage is required for your infrastructure, use the mgr-storage-proxy
tool.
-
For more information, see
mgr-storage-proxy --help
. This tool simplifies creating the container storage and Squid cache volumes.Use the command in the following manner:
mgr-storage-proxy <storage-disk-device>
For example:
mgr-storage-proxy /dev/nvme1n1 /dev/nvme2n1
This command will create the persistent storage volumes at
/var/lib/containers/storage/volumes
.For more information, see List of persistent storage volumes.
10. Transfer the Proxy Configuration
The Web UI generates a configuration archive. This archive needs to be made available on the proxy container host.
-
Copy the files from the Server container to the Server host OS:
mgrctl cp server:/root/config.tar.gz .
-
Next copy the files from the Server host OS to the Proxy host:
scp config.tar.gz <proxy-FQDN>:/root
-
Install the Proxy with:
mgrpxy install podman config.tar.gz
11. Start the SUSE Manager 5.0.1 Proxy
Container can now be started with the mgrpxy
command:
-
Start the Proxy by calling:
mgrpxy start
-
Check container status by calling:
mgrpxy status
Five SUSE Manager Proxy containers should be present:
-
proxy-salt-broker
-
proxy-httpd
-
proxy-tftpd
-
proxy-squid
-
proxy-ssh
-
And should be part of the proxy-pod
container pod.
11.1. Using a Custom Container Image for a Service
By default, the SUSE Manager Proxy suite is set to use the same image version and registry path for each of its services.
However, it is possible to override the default values for a specific service using the install parameters ending with -tag
and -image
.
For example, use it like this:
mgrpxy install podman --httpd-tag 0.1.0 --httpd-image registry.opensuse.org/uyuni/proxy-httpd /path/to/config.tar.gz
It adjusts the configuration file for the httpd service, where registry.opensuse.org/uyuni/proxy-httpds
is the image to use and 0.1.0
is the version tag, before restarting it.
To reset the values to defaults, run the install command again without those parameters:
mgrpxy install podman /path/to/config.tar.gz
This command first resets the configuration of all services to the global defaults and then reloads it.