Page 3
All other trademarks referenced herein are the property of their respective owners. The GPG fingerprint of the security@redhat.com key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E...
Introduction to the Guide ..................xiii 1. More to Come ....................xiii 1.1. Send in Your Feedback ..............xiv 1. Red Hat Network Overview ..................1 1. Update ......................2 2. Management ....................3 3. Provisioning ....................4 4. Monitoring ..................... 4 5.
Page 6
Red Hat Network Satellite 4. Registering a System Profile ................52 4.1. Hardware System Profile ..............53 4.2. Software System Profile ..............54 5. Finishing Registration ..................56 6. Entitling Your System ..................58 7. Text Mode RHN Registration Client ..............59 6. Red Hat Network Website ..................61 1.
Page 9
1. Red Hat Network Actions Control .............207 1.1. General command line options ............207 2. Red Hat Network Configuration Client ............208 2.1. Listing Config Files ................208 2.2. Getting a Config File .................209 2.3. Viewing Config Channels ..............209 2.4. Differentiating between Config Files ..........210 2.5.
The Red Hat Network Reference Guide is constantly expanding as new Red Hat Network features and service plans are launched. HTML and PDF versions of this and other manuals are available within the Help section of the RHN website and at http://www.redhat.com/docs/. Note...
1.1. Send in Your Feedback If you would like to make suggestions about the Red Hat Network Reference Guide, please submit a report in Bugzilla (http://bugzilla.redhat.com/bugzilla/) against the component Documentation_Reference_Guide (Product: Red Hat Network Satellite, Version: 510). http://www.redhat.com/docs/...
Chapter 1. Red Hat Network Overview Have you ever read about a new version of a software package and wanted to install it but could not find it? Have you ever tried to find an RPM through an Internet search engine or an RPM repository and been linked to an unknown site? Have you ever tried to find an RPM but instead found only source files that you had to compile yourself?
The RHN Update service is ideal for a user with one Red Hat Enterprise Linux system or a small number of Red Hat Enterprise Linux systems. Updated Subscription to Update can be purchased at https://www.redhat.com/apps/commerce/rhn/. With each Update subscription, you receive the following services: •...
To create an account that can be used to entitle systems to RHN Management, go to https://rhn.redhat.com/ and click on the Create Login link under the Sign In fields. On the Create a Red Hat Login page, click Create a new Business Login. After creating a business account, you may add users within your organization to it.
Chapter 1. Red Hat Network Overview 3. Provisioning As the highest management service level, RHN Provisioning encompasses all of the features offered in the RHN Update and Management subscription levels. It is designed to allow you to deploy and manage your network of Red Hat Enterprise Linux systems, users, and system groups.
Errata Notifications and Scheduled Package • Probes — Dozens of probes can be run against each system. These range from simple ping checks to custom remote programs designed to return valuable data. • Notification — Alerts can be sent to email and pager addresses with contact methods identified by you when a probe changes state.
Chapter 1. Red Hat Network Overview Red Hat Network incorporates the following security measures: 1. Your System Profile, available at http://rhn.redhat.com, is accessible only with an RHN-verified username and password. 2. A Digital Certificate is written to the client system after registration and is used to authenticate the system during each transaction between the client and Red Hat Network.
Page 21
Installations If the Red Hat Network Registration Client is installed, it will return something similar to: rhn_register-2.9.3-1 The version number might differ slightly. If you do not have the Red Hat Network Registration Client installed, the command will return: package rhn_register is not installed Perform this check for every package in Table 1.1, “Red Hat Network Packages”...
Chapter 2. Red Hat Update Agent The Red Hat Update Agent is your connection to Red Hat Network. It enables you to register your systems, create System Profiles, and alter the settings by which your organization and RHN interact. Once registered, your systems can use the Red Hat Update Agent to retrieve the latest software packages from Red Hat.
Page 24
Chapter 2. Red Hat Update Agent • At a shell prompt (for example, an xterm or gnome-terminal), type the command up2date For Red Hat Enterprise Linux 2.1: • On the GNOME desktop, go to the Main Menu Button (on the Panel) => Programs => System =>...
Page 25
Starting the Red Hat Update Agent The first time you run the Red Hat Update Agent, two dialog boxes appear that you will not see in subsequent startups: Configure Proxy Server and Install GPG Key. As shown in Figure 2.1, “Configure Proxy Server”, the first dialog box to appear prompts you for HTTP Proxy Server information.
Chapter 2. Red Hat Update Agent Figure 2.2, “Install GPG Key”. This key is used to verify the packages you download for security purposes. Click Yes to install the key, and you will not see this message again. Figure 2.2. Install GPG Key 2.
2.1. Registering a User Account Before you create a System Profile, you must create a user account. Red Hat recommends that you do so through the website at https://rhn.redhat.com/newlogin/, but you may also do so via Red Hat Update Agent (...
Page 28
Chapter 2. Red Hat Update Agent Users that have registered at least one system with Red Hat Network can add new machines to the same account. To do so, run the Red Hat Update Agent on the new machine and enter the existing Red Hat username and password at this screen.
Page 29
Activate • Must be at least four characters long • Cannot contain any tabs • Cannot contain any line feeds Passwords are case-sensitive for obvious reasons. Note You must choose a unique username. If you enter one already in use, you will see an error message.
Chapter 2. Red Hat Update Agent 2.2. Activate The Activation screen allows you to select various details of your registration. If you have a subscription number, enter it in the appropriate field. If not, select the Use one of my existing, active subscriptions radio button.
Channels Figure 2.6. Activate Figure 2.7, “Sending System Profile to Red Hat Network” shows the progress bar displayed as the System Profile is sent. Figure 2.7. Sending System Profile to Red Hat Network 2.3. Channels...
Page 32
Chapter 2. Red Hat Update Agent Red Hat Update Agent next displays all package channels to which you have access. The channels you select from this screen must match the base operating system of the system you are registering. if any child channels are available, such as the RHEL AS (v.4 for x86) Extras channel in the figure, you may select them as well.
Packages Flagged to be Skipped Figure 2.9. Fetching package list Note If the version of on your system is older than the one in your selected up2date channel, the Red Hat Update Agent asks whether you would like to update it. If you agree, the only package that will be updated is the package.
Chapter 2. Red Hat Update Agent Figure 2.10. Packages Flagged to be Skipped 2.5. Available Package Updates The Red Hat Update Agent next displays all available updates except those you chose to skip in the previous screen. Select those you wish to download and click Forward to continue.To view the complete Errata Advisory text for an update, highlight the relevant package and click the View Advisory button.
Page 35
Available Package Updates Figure 2.11. Available Package Updates...
Chapter 2. Red Hat Update Agent Figure 2.12. Example Errata Advisory 2.6. Retrieving Packages The Red Hat Update Agent tests the packages you selected to be certain that the requirements of each RPM are met. If any additional packages are required, Red Hat Update Agent displays an error message.
Installing Packages Figure 2.13. Retrieving Packages 2.7. Installing Packages The packages must be installed after downloading them via the Red Hat Update Agent. If you chose not to install the packages via the Red Hat Update Agent, skip to Section 3.2, “Manual Package Installation”...
Page 38
Chapter 2. Red Hat Update Agent Figure 2.14. Installing Packages When the Red Hat Update Agent has finished downloading the desired packages (and installing them if you chose the install option), it displays the screen in Figure 2.15, “All Finished”. Click Finish to exit the Red Hat Update Agent.
Command Line Version Figure 2.15. All Finished 3. Command Line Version If you are not running X, you can still run the Red Hat Update Agent from a virtual console or remote terminal. If you are running X but want to use the command line version, you can force it not to display the graphical interface with the following command: up2date --nox The command line version of the Red Hat Update Agent allows you to perform advanced...
Page 40
Chapter 2. Red Hat Update Agent The command line version of the Red Hat Update Agent accepts the following arguments: Option Description Briefly describe the available options. --usage List the available options and exit. --help Force to install this architecture of the --arch=architecture up2date package.
Page 41
Command Line Version Option Description Do not download packages at all. This is useful in --nodownload testing. Do not use GPG to check package signatures. This --nosig option temporarily overrides the saved configuration option. Do not download source packages (SRPMs). --nosrc Do not attempt to run in X.
Chapter 2. Red Hat Update Agent Option Description Show additional output while updating. --verbose Show version information. --version up2date Show the packages that resolve the comma-separated --whatprovides=dependencies list of dependencies. Table 2.2. Update Agent Command Line Arguments Note options can be used to solve the --solvedeps --whatprovides dependencies for an RPM regardless even if your system does not currently...
Manual Package Installation /usr/bin/gpg --import /usr/share/rhn/RPM-GPG-KEY To download the Red Hat GPG key first, you may obtain it from https://www.redhat.com/security/team/key.html . Here's an example: Type bits/keyID Date User ID pub 1024D/650D5882 2001-11-21 Red Hat, Inc. (Security Response Team) sub 2048g/7EAB9AFD 2001-11-21 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.2.1 (GNU/Linux)
Chapter 2. Red Hat Update Agent finish installing, you can delete them if you wish. You do not need them anymore. After installing the packages, you must update your System Profile so that you are not prompted to download them again. Refer to Section 3.3, “Synchronizing Your System Profile”...
Page 45
Using the Red Hat Update Agent 4.1.1. General Settings The General tab allows you to enable an HTTP Proxy Server. If your network connection requires you to use an HTTP Proxy Server to make HTTP connections, select the Enable HTTP Proxy option and type your proxy server in the text field with the format http://HOST:PORT.
Page 46
Chapter 2. Red Hat Update Agent Warning You must use Red Hat Update Agent Version 2.5.4 or higher to upgrade your kernel automatically. Red Hat Update Agent will install the updated kernel and configure LILO or GRUB to boot the new kernel the next time the system is rebooted.
Page 47
Configuration Tool not want them updated or reverted to the default Red Hat Enterprise Linux packages. • Retrieve source RPM along with binary package — download both the source ) and the binary ( ) files *.src.rpm *.[architecture].rpm The following installation options are configurable (see Figure 2.17, “Retrieval/Installation Settings”): •...
Registering with Activation Keys /etc/sysconfig/rhn/systemid 16. enableProxyAuth No 17. retrieveSource No 18. versionOverride 19. headerFetchCount 10 20. networkRetries 5 21. enableProxy No 22. proxyPassword 23. noSSLServerURL http://xmlrpc.rhn.redhat.com/XMLRPC 24. keepAfterInstall No 25. proxyUser 26. removeSkipList ['kernel*'] 27. useGPG Yes 28. gpgKeyRing /etc/sysconfig/rhn/up2date-keyring.gpg 29.
Page 50
Chapter 2. Red Hat Update Agent to be registered: rhnreg_ks --activationkey=7202f3b7d218cf59b764f9f6e9fa281b The precise value of the activation key varies. Systems running Red Hat Enterprise Linux 2.1 substitute the option for the --serialnumber option: --activationkey rhnreg_ks --serialnumber=7202f3b7d218cf59b764f9f6e9fa281b In addition, Provisioning-entitled systems may use multiple activation keys at once, either at the command line or within kickstart profiles.
Registering a System to an Organization • A key may specify either zero or one base channel. If specified, it must be a custom base channel. If not, the base channel corresponding to the system's Red Hat distribution is chosen. For instance, you may not subscribe a Red Hat Enterprise Linux 2.1 system to the Red Hat Enterprise Linux 3 channel.
Chapter 3. Red Hat Network Daemon The Red Hat Network Daemon ( ) periodically connects to Red Hat Network to check for rhnsd updates and notifications. The daemon, which runs in the background, is typically started from the initialization scripts in /etc/init.d/rhnsd /etc/rc.d/init.d/rhnsd To check for updates,...
Page 54
Chapter 3. Red Hat Network Daemon following command from a shell prompt: telnet xmlrpc.rhn.redhat.com 443 • the Red Hat Network Daemon is activated and running. You may ensure this by running the following commands: chkconfig --level 345 rhnsd on service rhnsd start If these are correct and your systems still indicate they are not checking in, please contact our technical support team.
Chapter 4. Red Hat Network Alert Notification Tool The Red Hat Network Alert Notification Tool is a notifier that appears on the panel and alerts users when software package updates are available for their systems. The list of updates is retrieved from the RHN Servers.
Page 56
Chapter 4. Red Hat Network Alert Notification Tool Figure 4.2. HTTP Proxy Configuration If your network connection requires you to use an HTTP Proxy Server to make HTTP connections, on the Proxy Configuration screen, type your proxy server in the text field with the format HOST:PORT.
Notification Icons Or, for SSL: server_url=https://YourRHN_Satellite.com/APPLET You can also configure the Red Hat Network Alert Notification Tool to ignore specific packages. To select these packages, click on the applet and select the Ignored Packages tab. 2. Notification Icons The applet displays a different icon, depending on the status of the updates. Table 4.1, “Red Hat Network Alert Notification Tool Icons”...
Chapter 4. Red Hat Network Alert Notification Tool 3. Viewing Updates Clicking on the Red Hat Network Alert Notification Tool displays a list of available updates. To alter your list of excluded packages, click the Ignored Packages tab and make your modifications.
Chapter 5. Red Hat Network Registration Client Before you begin using Red Hat Network, you must create a username, password, and System Profile. The Red Hat Network Registration Client walks you through this process. Warning Only systems running Red Hat Enterprise Linux 2.1 need to use the Red Hat Network Registration Client before starting the Red Hat Update Agent.
Page 60
2. oemInfoFile /etc/sysconfig/rhn/oeminfo 3. enableProxy No 4. networkSetup Yes 5. httpProxy 6. proxyUser 7. serverURL https://xmlrpc.rhn.redhat.com/XMLRPC 8. proxyPassword 9. debug No Enter number of item to edit <return to exit, q to quit without saving>: Enter the number of the item to modify and enter a new value for the option. When finished changing your configuration, press Enter to save your changes and exit.
Starting the Red Hat Network Registration The most common options configured are to enable a proxy enableProxy httpProxy server. To enable a proxy server, change the value for and the value of enableProxy to the name of the proxy server and port number in the format HOST:PORT. For httpProxy example, to use the proxy server squid.mysite.org on port 3128, you would change the value to squid.mysite.org:3128...
Page 62
System Profile. You will no longer be able to use your previous System Profile — be sure this is what you want to do before you choose Yes. If you overwrite an existing system registration, you can delete the unused profile via the website at https://rhn.redhat.com. Figure 5.3. Warning: This System Already Registered...
Page 63
Client The opening screen for the Red Hat Network Registration Client provides a brief overview of the services available and the steps required to register (see Figure 5.4, “Welcome Screen”). Click Next to continue with the registration process. If you click Cancel, the registration process ends and no information is sent.
Chapter 5. Red Hat Network Registration Client Figure 5.5. Red Hat Privacy Statement 3. Registering a User Account Before you can create a System Profile, you must create a user account. The only required information in this section is a unique username, password, and a valid email address. In the screen shown in Figure 5.7, “Create a Unique Username and Password”, you must...
Page 65
Registering a User Account Figure 5.6. Error: Username Already Exists Note If you are already a member of redhat.com, you can use the same user name and password. However, you must continue with the registration process to create your System Profile.
Chapter 5. Red Hat Network Registration Client machine is added to your existing account, and you can log into Red Hat Network with your username and password to view all your systems simultaneously. Figure 5.7. Create a Unique Username and Password Most users can leave the Org Info section blank.
Hardware System Profile 4.1. Hardware System Profile After creating a username and password for your Red Hat Network account, the Red Hat Network Registration Client probes your system for the following information: • Red Hat Enterprise Linux version • Hostname •...
Chapter 5. Red Hat Network Registration Client Figure 5.8. System Profile - Hardware 4.2. Software System Profile The software System Profile consists of a list of RPM packages for which you wish to receive notifications. The Red Hat Network Registration Client displays a list of all RPM packages listed in the RPM database on your system and then allows you to customize the list by deselecting packages.
Page 69
Software System Profile Figure 5.9. Registration Wizard Once the RPM package list is built, the list is displayed as shown in Figure 5.10, “RPM Package Information”. Deselecting Include RPM Packages installed on this system in my System Profile omits this information from your System Profile. Figure 5.10.
Chapter 5. Red Hat Network Registration Client Choose which packages to exclude, if any, from the System Profile, and click Next to continue with the registration process. Figure 5.11. Choose which RPM Packages to Exclude from System Profile 5. Finishing Registration As seen in Figure 5.12, “Finished Collecting Information for System Profile”, the last step of...
Page 71
Finishing Registration Figure 5.12. Finished Collecting Information for System Profile Figure 5.13, “Send System Profile to Red Hat Network” shows the progress bar displayed while your profile is sent. This process may take some time depending on your connection speed. Figure 5.13.
In other words, you must subscribe it to a service level offering. To entitle a system, go to http://rhn.redhat.com and log in using the same username and password you just used in the Red Hat Network Registration Client. Click Systems on the top navigation bar and then Systems Entitlements in the left navigation bar.
Text Mode RHN Registration Client change entitlements to any available level at any time. Note Removing a required entitlement (such as Provisioning) will not cancel a previously scheduled action (such as a kickstart). As you change the selected entitlements for your systems, the number of available entitlements is updated at the bottom of the screen.
Page 74
Chapter 5. Red Hat Network Registration Client Figure 5.15. Text Mode Welcome Screen...
Chapter 6. Red Hat Network Website You can use the Red Hat Network website to manage multiple Red Hat Enterprise Linux systems simultaneously, including viewing Errata Alerts, applying Errata Updates, and installing packages. This chapter seeks to identify all of categories, pages, and tabs within the website and explain how to use them.
Chapter 6. Red Hat Network Website 1.1. Entitlement Views Keep in mind, since this guide covers all entitlement levels, some tabs, pages, and even whole categories described here may not be visible to you. For this reason, icons are used here to identify which functions are available to each entitlement level.
Page 77
Categories and Pages • Subscription Management — Manage base and add-on system entitlements, such as Management, Provisioning, and Virtualization. • Systems — Manage all of your systems (including virtual guest systems) here. • Overview — — View a summary of your systems or system groups showing how many Errata Alerts each system has and which systems are entitled.
Page 78
Chapter 6. Red Hat Network Website • Channels — View and manage the available RHN channels and the files they contain. • Software Channels — View a list of all software channels and those applicable to your systems. • Package Search — Search packages using all or some portion of the package name, description, or summary, with support for limiting searches to supported platforms.
Errata Alert Icons • Satellite Tools (visible only to Satellite administrators) — List, create, and manage one or more Satellite organizations, from which the Satellite administrator can assign channel entitlements, create and assign administrators for each organization, and other tasks. •...
2. Logging into the RHN Website Use a web browser to navigate to http://rhn.redhat.com. RHN displays the login page shown below unless one of two things is true: •...
Page 81
Logging into the RHN Website Figure 6.4. RHN Website If you have not registered a system yet or do not have a redhat.com account, create a new account by following the Learn More link, then selecting Create Login on the resulting page.
Chapter 6. Red Hat Network Website Note You must accept both the Site Terms and the T7 agreement in order to use RHN. Once you have accepted the agreements and pressed the Continue button, RHN displays the Your RHN page. 3.
Page 83
Your RHN Figure 6.5. Your Red Hat Network This page is broken into functional areas, with the most critical areas displayed first. Users can control which of the following areas are displayed by making selections on the Your RHN # Your Preferences page.
Remember, if you change your Red Hat Network password (the one used to log into RHN and redhat.com), you will not see your new one as you type it for security reasons. Also for security, your password is represented by 12 asterisks no matter how many characters it actually contains.
Your Preferences modified, make the changes, and click Update. 3.1.2. Change Email The email address listed in the Your Account page is the address to which Red Hat Network sends email notifications if you select to receive Errata Alerts or daily summaries for your systems on the Your Preferences page.
Chapter 6. Red Hat Network Website Start Page. Check the box to the left of the information area you would like to include. After making changes to any of these options, click the Save Preferences button in the bottom right-hand corner. 3.3.
Page 87
Subscription Management not belong to virtualization-free, such as a Directory Server or RHN Satellite channel, consumes an additional channel entitlement. • Virtualization Platform — also applies to virtual host systems. Host systems to which this entitlement apply may register an unlimited number of virtual guests without invalidating your Service Level Agreement.
Chapter 6. Red Hat Network Website manner. The first table on this page displays any Virtualization-entitled hosts that have more guest systems than are allowed in the Red Hat Network service level agreement. If you would like to upgrade these systems to any available Virtualization Platform entitlements, click the profile name of that system.
Page 89
Systems The Systems page displays a list of all of your registered systems. The Systems list contains several columns of information for each system: • Select — Update or unentitled systems cannot be selected. To select systems, mark the appropriate checkboxes. Selected systems are added to the System Set Manager. After adding systems to the System Set Manager, you can use it to perform actions on them simultaneously.
Page 90
Chapter 6. Red Hat Network Website Important If the RHN website identifies package updates for the system, yet the Red Hat Update Agent responds with "Your system is fully updated" when run, a conflict likely exists in the system's package profile or in the configuration file.
Page 91
Systems This column indicates whether a guest is running, paused, or stopped. Base Channel This column indicates the base channel to which the guest is currently subscribed. Only those guests that are registered with RHN are displayed in blue text. Clicking on the hostname of such a guest system displays that system's System Details page.
Page 92
Chapter 6. Red Hat Network Website • The system is not on the network. • Some other barrier exists between the system and the RHN Servers. 4.2.7. Recently Registered The Recently Registered page displays any new systems that have been registered in a given period of time.
Page 93
Systems • Events The following sections discuss these tabs and their sub-tabs in detail. 4.2.9.1. System Details # Details This page is not accessible from any of the standard navigation bars. However, clicking on the name of a system anywhere in the web interface brings you to this page. The default tab displayed on this page is the Details # Overview subtab.
Page 94
Chapter 6. Red Hat Network Website The IP address of the client. Kernel The kernel that is installed and operating on the client system. Registered The date and time at which the system registered with RHN and created this profile. Checked In The date and time at which the system last checked in with RHN.
Page 95
Systems the system via the web interface. If you wish to restrict access to the system, associate that system with a System Group and assign it a System Group Administrator. Refer to Section 4.3, “System Groups — ” for more information about System Groups.
Page 96
Chapter 6. Red Hat Network Website Profile Name This editable name for the system profile is set to the system's hostname by default. It serves to distinguish this system profile from others. Entitlement The base entitlement currently applied to this system. Notifications Indicates the the notification options for this system.
Page 97
Systems you must choose to receive email notification sin the Your Preferences page of the Your RHN category. Auto-errata update If this box is checked, available errata are automatically applied to the system when it checks in. This action takes place without user intervention. Customers should note that Red Hat does not recommend the use of the auto-update feature for production systems because conflicts between packages and environments can cause system failures.
Page 98
Chapter 6. Red Hat Network Website allow remote commands: touch /etc/sysconfig/rhn/allowed-actions/script/run Once the setup is complete, refresh the page in order to view the text fields for remote commands. You may then identify a specific user, group, and timeout period, as well as the script itself on this page.
Page 99
Systems This subtab, available for systems with a Provisioning entitlement, provides completely customizable information about the system. Unlike Notes, Custom Info is structured, formalized, and can be searched upon. Before you can provide custom information about a system, you must first have Custom Information Keys. This is done via the Custom System Info page, available from the left navigation bar.
Page 100
Chapter 6. Red Hat Network Website — When selecting packages to install, upgrade, or remove, Provisioning customers have the option of running a remote command automatically before or after the package installation. Refer to Section 4.2.9.1.3, “System Details # Details # Remote Command — ”...
Page 101
Systems the Create System Profile button, enter any additional information you desire, and click the Create Profile button. These profiles are kept within the Stored Profiles page linked from the left navigation bar. — Once package profiles have been compared, Provisioning customers have the ability to synchronize the packages of the selected system with the package manifest of the compared profile.
Page 102
Chapter 6. Red Hat Network Website useful to a system at any given time. Remember, only the latest version can be deployed. 4.2.9.3.1. System Details # Configuration # Overview This subtab provides access to the configuration statistics of your system and to the most common tasks used to manage configuration files.
Page 103
Systems 4.2.9.3.3. System Details # Configuration # Compare Files This subtab compares a configuration file as stored on the Satellite with the file as it exists on the client. (It does not, for example, compare versions of the same file stored in different channels.) Select the files to be diffed, click the Compare Files button, select a time to perform the diff, and click the Schedule Compare button to confirm.
Page 104
Chapter 6. Red Hat Network Website This tab and its subtabs allow you to schedule and monitor kickstarts and to return your system to a previous state. Kickstart is a Red Hat utility that allows you to automate the reinstallation of a system.
Page 105
Systems • channel subscriptions • installed packages • configuration channel subscriptions • configuration files • snapshot tags When satisfied with the reversion, return to the Rollback subtab and click the Rollback to Snapshot button. To see the list again, click Return to snapshot list. 4.2.9.4.3.
Page 106
Chapter 6. Red Hat Network Website If a guest system has not registered to the Satellite, this information appears as plain text in the table. If you have System Group Administrator responsibilities assigned for your guest systems, it is possible that a user could see the message You do not have permission to access this system within the table.
System Groups — Refer to Section 4.3.3, “System Group Details — ” for more information. 4.2.9.5.3.2. System Details # Groups # Join — Lists groups that the system may be subscribed to. Only System Group Administrators and Satellite Administrators can add the system to groups. Non-admins see a Review this system's group membership page.
Page 108
Chapter 6. Red Hat Network Website System Groups list. Only System Group Administrators and Satellite Administrators may perform the following additional tasks: 1. Create system groups. (Refer to Section 4.3.1, “Creating Groups”.) 2. Add systems to system groups. (Refer to Section 4.3.2, “Adding and Removing Systems in Groups”.) 3.
Page 109
System Groups — • Systems — Total number of systems contained by the group. Clicking on the number takes you to the Systems tab of the System Group Details page for the group. Refer to Section 4.3.3, “System Group Details — ”...
Chapter 6. Red Hat Network Website done through the System Set Manager or System Details pages. Refer to Section 4.4, “System Set Manager — ” Section 4.2.9, “System Details”, respectively. 4.3.3.3. System Group Details # Target Systems — Target Systems — Lists all systems in your organization. This tab enables you to add systems to the specified system group.
Page 111
System Set Manager — • Kickstart several Provisioning-entitled systems at once • Set the subscription and rank of configuration channels for Provisioning-entitled systems • Tag the most recent snapshots of your selected Provisioning-entitled systems • Revert Provisioning-entitled systems to previous snapshots •...
Page 112
Chapter 6. Red Hat Network Website Refer to Section 4.2.9.1.3, “System Details # Details # Remote Command — ” for more information. 4.4.4.1. System Set Manager # Packages # Upgrade — A list of all the packages installed on the selected systems that might be upgraded. Systems must be subscribed to a channel providing the package for the system to be able to upgrade the package.
Page 113
System Set Manager — 4.4.8. System Set Manager # Groups — Tools to create groups and manage group membership. These functions are limited to Satellite Administrators and System Group Administrators. To add a new group, click create new group on the top-right corner. In the resulting page, type its name and description in the identified fields and click the Create Group button.
Page 114
Chapter 6. Red Hat Network Website Use this subtab to validate configuration files on the selected systems against copies in your central repository on RHN. The table lists the configuration files associated with any of the selected systems. Clicking its system count displays the systems already subscribed to the file. To compare the configuration files deployed on the systems with those in RHN, select the checkbox for each file to be validated.
Page 115
System Set Manager — also schedule the action by clicking the Schedule package installs for no sooner than radio button and using the drop-down menus to configure date and time, then clicking Enable RHN Configuration Management. 4.4.11. System Set Manager # Provisioning — Options for provisioning systems through the following subtabs: 4.4.11.1.
Page 116
Chapter 6. Red Hat Network Website 4.4.12.1. System Set Manager # Misc # System Profile Updates — Click Update Hardware Profile followed by the Confirm Refresh button to schedule a hardware profile update. Clicking Update Package Profile,followed by the Confirm Refresh button schedules a package profile update.
Advanced Search — • Receive Notifications of Updates/Errata — This setting keeps you abreast of all advisories pertaining to your systems. Any time an update is produced and released for a system under your supervision, a notification is sent via email. •...
Page 118
Chapter 6. Red Hat Network Website System Details page are not part of this list because they are not reusable across systems. 4.6.1. Managing Activation Keys To generate an activation key: 1. Select Systems => Activation Keys from the top and left navigation bars. 2.
Page 119
Activation Keys — Figure 6.6. Activation Keys After creating the unique key, it appears in the list of activation keys along with the number of times it has been used. Note that only Activation Key Administrators can see this list. At this point, you may associate child channels and groups with the key so that systems registered with it automatically subscribe to them.
Chapter 6. Red Hat Network Website To disable system activations with a key, unselect the corresponding checkbox under the Enabled column in the key list. The key can be re-enabled by selecting the checkbox. After making these changes, click the Update Keys button on the bottom right-hand corner of the page.
Kickstart — 4.8. Custom System Info — RHN Provisioning customers may include completely customizable information about their systems. Unlike notes, the information here is more formal and may be searched upon. For instance, you may decide to identify an asset tag for each system. To do this, you must create key within the Custom System Info page.
Page 122
Chapter 6. Red Hat Network Website Figure 6.7. Kickstart Overview This overview page displays the status of kickstart on your client systems: the types and number of profiles you have created and the progress of systems that are scheduled to be kickstarted.
Page 123
Kickstart — The Red Hat Enterprise Linux System Administration Guide contains an in-depth discussion of kickstart and is available here: http://www.redhat.com/docs/manuals/enterprise/. 4.9.1.1. Kickstart Explained When a machine is to receive a network-based kickstart, the following events must occur in this order: 1.
Page 124
Chapter 6. Red Hat Network Website Although Red Hat Network has taken great pains to ease the provisioning of systems, some preparation is still required for your infrastructure to handle kickstarts. For instance, before creating kickstart profiles, you may consider: •...
Page 125
Kickstart — label. Note that you cannot move between versions (2.1 to 3) or between updates (U1 to U2). Next, you may customize further for your needs, such as by adding multiple isolinux.cfg kickstart options, different boot messages, shorter timeout periods, etc. Next, create the ISO as described in the Making an Installation Boot CD-ROM section of the Red Hat Enterprise Linux 3 Installation Guide.
Page 126
Chapter 6. Red Hat Network Website Figure 6.8. Kickstart Profiles This page lists all profiles for your organization, whether those profiles are active, and the boot image to which that profile points. You can either create a new kickstart profile by clicking the create new kickstart profile link in the upper right or edit existing profiles by clicking in the name of the profile.
Page 127
Kickstart — Security Guide, available at http://www.redhat.com/docs/manuals/enterprise/. The final stage of the wizard presents the Kickstart Details # Details tab. On this tab and the other sub-tabs, nearly every option for the new kickstart profile can be customized. The following sections describe the options available on each sub-tab.
Page 128
Chapter 6. Red Hat Network Website 4.9.3.3. Kickstart Details # Advanced Options — From this page, you can toggle several installation options on and off by checking and unchecking the boxes to the left of the option. For most installations, the default options are correct.
Page 129
Kickstart — partition swap --size=2000 partition pv.01 --size=1000 --grow volgroup myvg pv.01 logvol / --vgname=myvg --name=rootvol --size=1000 --grow 4.9.3.8. System Details # File Preservation — If you have previously created a file preservation list, you may include that list as part of the kickstart.
Page 130
RedHat/base/ kickstart tree. Satellite customers will most likely locate this file here: /var/www/satellite/rhn/kickstart/<kickstart label>/RedHat/base/comps.xml 4.9.3.12. Software # Package Profiles — If you have previously created a Package Profile from one of your registered systems, you can use that profile as a template for the files to be installed on a kickstarted system. Refer to Section 4.2.9.2.2, “System Details # Software # Packages”...
Page 131
Kickstart — 4. Indicate whether this script is to be executed in the %pre or %post section of the kickstart process 5. Indicate whether this script is to run outside of the chroot environment. Refer to the Post-installation Script section of the Red Hat Enterprise LinuxSystem Admin Guide for further explanation of the option nochroot...
Page 132
Chapter 6. Red Hat Network Website then make the profile association in the GPG and SSL keys subtab of the Kickstart Details page. To develop a new key/certificate, click the create new stored key/cert link in the upper-right corner of the page. Enter a description, select the type, upload the file, and click the Update Key button.
Errata menus, such as Red Hat Enterprise Linux AS (v.4 for x86) Red Hat Enterprise , respectively. When finished, click the Create button. Linux 4 4.9.7. Kickstart # File Preservation — Collects lists of files to be protected and re-deployed on systems during kickstart. For instance, if you have many custom configuration files located on a system to be kickstarted, enter them here as a list and associate that list with the kickstart profile to be used.
(for Security Updates), and subject of the erratum, as well as the number of affected systems. In addition to the pages described within this chapter, you may view Errata by product line from the following location: https://rhn.redhat.com/errata. 5.1. Relevant Errata As shown in Figure 6.15, “Errata...
All Errata Figure 6.15. Errata List Clicking on the Advisory takes you to the Details tab of the Errata Details page. Clicking on the number of associated systems takes you to the Affected Systems tab of the Errata Details page. Refer to Section 5.2.2, “Errata Details”...
Page 136
Chapter 6. Red Hat Network Website and left navigation bars. Click on the name of an entitled system, and click the Errata tab of the resulting System Details page. When the Relevant Errata list appears, click Select All then the Apply Errata button on the bottom right-hand corner of the page.
Below Fixes, the specific Bugzilla entries resolved by this erratum are listed. Clicking on any summary text opens that Bugzilla entry at http://bugzilla.redhat.com. Note that you must have a Bugzilla account to view the entry. Security updates list the specific vulnerability as tracked by http://cve.mitre.org. This information is listed below the CVEs label.
Chapter 6. Red Hat Network Website • Erratum Advisory — The way Red Hat Security Response Team codifies Advisories, such RHBA-2007:0530 Searches can be by done year (such as 2007), by type of Advisory (RHBA for Bug fixes, RHEA for Enhancements, and RHSA for Security advisories), or full Advisory name, such as the example above.
Page 139
Software Channels and customize their package updates for their particular version, rather than upgrade their systems to a new update version that installs new software, hardware drivers, and features on production systems. For example, administrators can standardize their desktop systems to Red Hat Enterprise Linux 5.1 for x86, while managing servers on Red Hat Enterprise Linux 4.5 for AMD64 and EM64T.
Page 140
Chapter 6. Red Hat Network Website Figure 6.16. Relevant Channels 6.1.4. Retired Channels The Retired Channels page displays channels available to your organization that have reached their end-of-life dates. These channels do not receive updates. 6.1.5. All Channels The All Channels page can be retrieved by clicking All below Software Channels in the left navigation bar.
Page 141
Software Channels first tab displayed when you click on a channel. It displays essential information about the channel, such as summary, description, and architecture. —In addition, a Globally Subscribable checkbox can be seen by Satellite Administrators and Channel Administrators. This signifies the default behavior of every channel allowing any user to subscribe systems to it.
Chapter 6. Red Hat Network Website . The filter is case-insensitive. links 6.1.6.4. Software Channel Details # Subscribed Systems List of entitled systems subscribed to the channel. The list displays system names, base channels, and their levels of entitlement. Clicking on a system name takes you to its System Details page.
Manage Software Channels The Package Search page allows you to search through packages using various criteria: • Free Form — a general keyword search for users that are unsure of the details of particular package and its contents. • Name Only — Targeted search for users that need to find a specific packages and do not want to sift through more generalized search results.
Page 144
Chapter 6. Red Hat Network Website This screen lists the selections you made during the channel creation process. This page includes the Globally Subscribable checkbox that permits all users to subscribe to the channel. 6.3.1.2. Manage Software Channels # Channel Details # Managers This subtab allows you to select which users may alter or delete this channel.
Configuration This tab allows you to manage custom software packages owned by your organization. You may view a list of all custom software or view only those packages in a selected custom channel. To select the channel whose custom packages you wish to view, select the channel from the drop-down menu and click the View button.
Chapter 6. Red Hat Network Website Configuration Summary This panel provides quick reference information about your configuration files. Clicking on any of the blue text to the right displays an appropriate list of either relevant systems, channel details, or configuration files. Configuration Actions This panel offers direct access to the most common configuration management tasks.
Page 147
Configuration Channels Enter a description for the channel. You must enter a description, though there is no character restriction. This field can contain any brief information that allows you to distinguish this channel from others. Press the Create Config Channel button to create the new channel. The following page is a subset of the Channel Details page, and has three sub-tabs: Overview, Add Files, and Systems.
Chapter 6. Red Hat Network Website Note A sandbox icon indicates that the listed file is currently located in a local sandbox channel. Files in a system's sandbox channel are considered experimental and could be unstable. Use caution when selecting them for a central configuration channel.
Locally-Managed Files Note By default, the maximum file size for confiugration files is 128KB. If you need to change that value, find or create the following line in the /etc/rhn/rhn.conf file: web.maximum_config_file_size=128 Change the value from 128 to whatever limit you want in bytes. 7.4.1.
Page 150
Chapter 6. Red Hat Network Website In traditional file management, you would be required to upload and distribute each file separately, even if the distinction is nominal and the number of variations is in the hundreds or thousands. RHN addresses this by allowing the inclusion of macros, or variables, within the configuration files it manages for Provisioning-entitled systems.
Systems deployed version resembles the following: hostname=test.example.domain.com ip_address=177.18.54.7 To capture custom system information, insert the key label into the custom information macro (rhn.system.custom_info). For instance, if you developed a key labeled "asset" you can add it to the custom information macro in a configuration file to have the value substituted on any system containing it.
Chapter 6. Red Hat Network Website Details # Configuration # List/Unsubscribe from Channels page. This allows you to unsubscribe from any channels you wish. 7.6.2. Target Systems This page displays the systems that are either not prepared for configuration file deployment or have not yet been subscribed to a configuration channel.
Failed Actions 8.1. Pending Actions As shown in Figure 6.18, “Schedule - Pending Actions”, the Pending Actions page is shown by default when you click Schedule in the top navigation bar. It displays actions that have not started or are in progress. Figure 6.18.
Page 154
Chapter 6. Red Hat Network Website In each page, each row in the list represents a single scheduled event or action that might affect multiple systems and involve various packages. The list contains several columns of information: • Select — Use the checkboxes in this column to select actions. After selecting actions, you can either add them to your selection list or move them to the Archived Actions list.
Users — 8.5.1.4. Action Details # Failed Systems List of systems on which the action has been attempted and failed. The actions can be rescheduled here. Clicking a system name takes you to its System Details page. Refer to Section 4.2.9, “System Details” for more information.
Page 156
Chapter 6. Red Hat Network Website • Roles — List of the user's privileges, such as Organization Administrator, Channel Administrator and normal user. Users can have multiple roles. • Last Sign In — Shows when the user last logged into RHN. Figure 6.19.
Page 157
User List # Active — Satellite Administrators may not be deactivated until that role is removed from their account. Actions scheduled by a user prior to their deactivation remain in the action queue. For added flexibility, deactivated users may be reactivated by Satellite Administrators. User deletion from the web interface is available exclusively to RHN Satellite Server customers.
Page 158
Chapter 6. Red Hat Network Website with varying degrees of responsibility and access. This list describes the permissions of each and the differences between them: • User — Also known as a System Group User, this is the standard role associated with any newly created user.
Page 159
User List # Active — 9.1.1.2. User List # Active # User Details # System Groups — This tab displays a list of system groups that the user may administer. Satellite Administrators may use the check boxes to set this user's access permissions to each system group. Check or uncheck the box to the left of the system group and click the Update Permissions button to save the changes.
Chapter 6. Red Hat Network Website Administrators and Channel Administrators can subscribe to or manage any channel. 9.1.1.5. User List # Active # User Details # Preferences — This page allows you to configure whether the user receives email notifications, the number of entries displayed per list page, and the timezone of the user.
User List # All — This page lists all users who have been deactivated. To reactivate any of the users listed here, click the check box to the left of their name and click the Reactivate button followed by the Confirm button.
Page 162
Chapter 6. Red Hat Network Website • — Pending - The probe has been scheduled but has not yet run or is unable to run. • — OK - The probe is running successfully. The Probe Status page contains tabs for each of the possible states, as well as one that lists all probes.
Notification — The probes whose data have not been received by RHN. This state is expected for a probe that has just been scheduled but has not yet run. If all probes go into a pending state, your monitoring infrastructure may be failing. 10.1.5.
Page 164
Chapter 6. Red Hat Network Website 10.2.1.1. Notification # Notification Filters # Active Filters This is the default screen for the Notification Filters tab. It lists all active filters available for your organization. Click the name of the filter to edit the properties of the filter. To create a notification filter, click the create new notification filter link in the upper right of the screen.
Probe Suites 13. R ecurring Frequency: How often the filter activates. Notification filters cannot be deleted. However, a filter may be canceled by setting the end date to some time in the past. (Note that the end date must be equal to or later than the start date, or the change fails.) Another method is to select a set of filters from the Active page and click the Expire Notification Filters button in the lower right.
Page 166
Chapter 6. Red Hat Network Website 5. The next page displays a list of all systems with Monitoring entitlements. Check the box to the left of the system(s) to which you wish to apply the Probe Suite, select the monitoring scout you wish to use, and click the Add systems to probe suite button to complete the creation of the Probe Suite.
Scout Config Push — This action deletes all of the Probe Suites' probes from the system as well as all of the historical Time Series and Event Log data. This action is irreversible. To remove a system from the Probe Suite and delete all associated probes from the system: 1.
Chapter 6. Red Hat Network Website click Update Config. 11. Satellite Tools This page allows RHN Satellite Server customers to manage the basic configuration of the Satellite, including creating and managing the Organizations feature of RHN Satellite Server. Only the Satellite Administrator can access the Satellite Tools page. 11.1.
Page 169
Satellite Tools # Organizations 11.1.1. Create New Organization Administrators can create a new organization within a Satellite and assign entitlements, groups, systems, and users to the group so that organizations can perform administrative tasks within their own network without possibly affecting the entire Satellite. Figure 6.21.
Page 170
Chapter 6. Red Hat Network Website d. Enter the First Name and Last Name of the organization administrator. 3. Click the Create Organization button to complete the process. Once the new organization is created, the Organizations page will display with the new organization listed.
Page 171
Satellite Tools # Organizations 11.1.2.2. Satellite Tools # Organizations # Details # Subscriptions The Subscriptions tab has two subtabs for managing the software channel and system entitlements for the organization. 11.1.2.2.1. Satellite Tools # Organizations # Details # Subscriptions # System Entitlements The System Entitlements subtab enables administrators to set the number of allocations to an organization per system entitlement.
Chapter 6. Red Hat Network Website Satellite, throughout all organizations, as well their usage. Click on a Entitlement Name for a more detailed view. The Details subtab for the software channel entitlement contains information about the software channel access granted when subscribed to the entitlement. The Organizations subtab allows Satellite administrators to adjust the number of software channels available to each organization.
Page 173
Satellite Tools # Satellite Configuration The Satellite Configuration # General Configuration page allows you to alter the most basic Satellite settings, such as the admin email address and whether Monitoring is enabled. 11.2.2. Satellite Tools # Satellite Configuration # Monitoring The RHN Satellite Configuration # Monitoring page allows you to configure the monitoring aspects of this Satellite.
Chapter 6. Red Hat Network Website minutes for the restart to finish. 12. Help The Help pages provide access to the full suite of documentation and support available to RHN users. Click Help in the Your RHN category to see a list of options available to you. 12.1.
Channel Management Guide 12.8. Client Configuration Guide Documentation for setting up clients to connect to an RHN Proxy or Satellite server. 12.9. Channel Management Guide Documentation for the creation and maintenance of custom channels using RHN. 12.10. API Documentation for using the Red Hat Network Application Programming Interface (API) for creating tools and programs to automate common tasks via Red Hat Network.
Chapter 7. Monitoring The Red Hat Network Monitoring entitlement allows you to perform a whole host of actions designed to keep your systems running properly and efficiently. With it, you can keep close watch on system resources, network services, databases, and both standard and custom applications.
Chapter 7. Monitoring To get the most out of your Monitoring entitlement, Red Hat suggests installing the Red Hat Network Monitoring Daemon on your client systems. Based upon OpenSSH, enables the rhnmd RHN Satellite Server to communicate securely with the client system to access internal processes and retrieve probe status.
Installing the Red Hat Network Monitoring • General::Remote Program • General::Remote Program with Data Note that all probes in the Linux group have this requirement. 2.2. Installing the Red Hat Network Monitoring Daemon Install the Red Hat Network Monitoring Daemon to prepare systems for monitoring with the probes identified in Section 2.1, “Probes requiring the daemon”.
Chapter 7. Monitoring rpm -qi openssh-server 2. Identify the user to be associated with the daemon. This can be any user available on the system, as long as the required SSH key can be put in the user's ~/.ssh/authorized_keys file. 3.
Daemon Note If valid entries already exist in , add the daemon key to the file authorized_keys rather than replacing the existing key. To do so, save the copied text to in the same directory and then run the following command: id_dsa.pub .ssh/ cat ~/.ssh/id_dsa.pub >>...
These notifications come in the form of brief text messages sent to either email or pager addresses. Here is an example of an email notification: Subject: CRITICAL: [hostname]: Satellite: Users at 1 From: "Monitoring Satellite Notification" (rogerthat01@redhat.com) Date: Mon, 6 Dec 2004 13:42:28 -0800 To: user@organization.com This is RHN Monitoring Satellite notification 01dc8hqw.
Redirecting Notifications As you can see, the longer email notifications contain virtually everything you would need to know about the associated probe. In addition to the probe command, run time, system monitored, and state, the message contains the Send ID, which is a unique character string representing the precise message and probe.
Chapter 7. Monitoring Note You can halt or redirect almost all probe notifications by replying to a notification emails with a variation of the command . However, you ack suspend host cannot halt Satellite probe notifications by responding to a probe with or other redirect responses.
Probes 6. You may now return to the Monitoring # Notifications page and delete the notification method. 5. Probes Now that the Red Hat Network Monitoring Daemon has been installed and notification methods have been created, you may begin installing probes on your Monitoring-entitled systems. If a system is entitled to Monitoring, a Probes tab appears within its System Details page.
Chapter 7. Monitoring 8. Use the remaining fields to establish the probe's alert thresholds, if applicable. These CRITICAL and WARNING values determine at what point the probe has changed state. Refer to Section 5.2, “Establishing Thresholds” for best practices regarding these thresholds. 9.
The output will rhn-catalog nocpulse resemble: 2 ServiceProbe on example1.redhat.com (199.168.36.245): test 2 3 ServiceProbe on example2.redhat.com (199.168.36.173): rhel2.1 test 4 ServiceProbe on example3.redhat.com (199.168.36.174): SSH 5 ServiceProbe on example4.redhat.com (199.168.36.175): HTTP The probe ID is the first number, while the probe name (as entered in the RHN website) is the final entry on the line.
Chapter 7. Monitoring Now that you have the ID, you use it with to examine the probe's output. Refer to rhn-runprobe Section 6.2, “Viewing the output of ” for instructions. rhn-runprobe 6.2. Viewing the output of rhn-runprobe Now that you have obtained the probe ID with , use it in conjunction with rhn-catalog to examine the complete output of the probe.
Chapter 8. Virtualization In order to manage and provision your client systems, you must first synchronize content from RHN's central servers to your Satellite. RHN recommends that you sync at least the following channels: • Red Hat Network Tools for RHEL Server (v. 5 for 32-bit x86) — rhn-tools-rhel-i386-server-5 •...
Chapter 8. Virtualization run the 32-bit version of Red Hat Enterprise Linux. c. In the Kickstartable Tree field, select where $ARCH is the ks-rhel-$ARCH-server-5 architecture of your host system. d. Please select Para-Virtualized Host for the Virtualization Type field. e. Finally, click the Next button in the lower right of the screen to continue on to the next step.
Page 191
Kickstart Your Host System below, and follow the instructions for the scenario that applies best to you: 1.2.1. Your Host System Has Red Hat Enterprise Linux 4 or Earlier Installed In this case, register your host system to your Satellite and schedule the kickstart process via the Satellite's web interface.
Page 192
Chapter 8. Virtualization registered. If this is the case, open the kickstart profile by navigating to Systems # Kickstart # Profiles within the Satellite web interface, and clicking on the label for the host system's kickstart profile. Click on the Kickstart Detail # Operating System tab, and select items under the Base Channel and Available Trees selections that match the architecture of your host system.
Page 193
It is possible to use a flash-memory USB key to boot your system in order to kickstart it. Refer to the Red Hat Enterprise Linux System Administration Guide (available at http://www.redhat.com/docs/manuals/enterprise/) for tips on how to do this. Note that your host system's hardware must support boot via these devices.
Page 194
Chapter 8. Virtualization system for your virtual guest and registered it to you Satellite. 1.2.3. Your Host System Has Red Hat Enterprise Linux 5 Installed You should register your host system to your Satellite and check to see if the required packages are installed on the system.
Setting Up Your Virtual Systems You will then need to edit the configuration file to boot the new xen kernel /etc/grub.conf by default. To do this, select the lines in that pertain to the xen kernel from the grub.conf beginning of the line to the end of the line, copy the lines, delete them, and title...
Page 196
Chapter 8. Virtualization Kickstart Actions widget in the upper right corner. 3. The next page displayed is Step 1 of the kickstart profile creation process: a. Enter a label for the profile that will allow you to distinguish it from the other profiles. A good choice would be guest-system.
Provision Your Guest Systems system you are provisioning, and click Next to finish creation of the profile. 6. This completes kickstart profile creation. After completing Step 3 you should be taken to the profile details. You may browse through the various tabs of the profile and modify the settings as you see fit, but this is not necessary as the default settings should work well for the majority of cases.
Chapter 8. Virtualization You may receive the following message from the page Kickstart Status during the guest's kickstart: The install process on the guest system has not communicated to RHN in the past n minutes. This may be due to a hung install process, or it may just be due to a slow install because of hardware constraints.
Installing Software Via the Satellite Web 3.2. Gaining Console Access Via the Host 1. First you will need to connect to the host system and determine the ID number of the guest you would like to work with. Connect to the host system via and run the following command: xm list...
Chapter 8. Virtualization To force the install to take place immediately, you may run the command on the rhn_check guest system. 3.4. Installing Software Via Yum From the Virtual System Your virtual system registered to your Satellite as part of the guest provisioning process, so you may simply use the command to install and update software.
Page 201
Interface 4. Finally, you must delete the RHN configuration files from the host system. To locate the RHN configuration file for guest1, run the following command: grep guest1 /etc/sysconfig/rhn/virt/*.xml Then delete the file indicated. For example: rm /etc/sysconfig/rhn/virt/14e5cfbf72342515236ad74b260c2f6b.xml 5. You have successfully deleted a guest system from your host system and from Satellite.
Chapter 9. UNIX Support Guide 1. Introduction This chapter documents the installation procedure for, and identifies differences in, Red Hat Network functionality when used to manage UNIX-based client systems. RHN offers UNIX support to help customers migrate from UNIX to Linux. Because of the limited scope of this task, the features offered for UNIX client management are not as comprehensive as those available for managing Red Hat Enterprise Linux systems.
Chapter 9. UNIX Support Guide • The Red Hat Network Configuration Client ( ), which executes all rhncfg-client configuration actions scheduled from the Satellite • The Red Hat Network Configuration Manager ( ), which allows command rhncfg-manager line administration of RHN configuration channels •...
Satellite Server Preparation/Configuration exception of configuration file management • All Errata-related options, since the concept of Errata Updates is not understood in UNIX • Source files for packages In addition, answer files are not yet supported. Support for such files is planned for a future release.
Page 206
Chapter 9. UNIX Support Guide Figure 9.1. Enabling UNIX Support During Satellite Installation 2. After the Satellite has been installed: Enable UNIX support by configuring the Satellite after it has been installed. To do so, select Satellite Tools in the top menubar, then select Satellite Configuration in the left navigation bar.
Client System Preparation upper right of the resulting screen. Provide a name and label for your new channel, and select either Sparc Solaris or i386 Solaris as the architecture, depending on the architecture of your client. 3. Client System Preparation Before your UNIX-based client systems benefit from Red Hat Network, they must be prepared for connection: 1.
Page 208
Chapter 9. UNIX Support Guide • libgcc • openssl • zlib utility is provided by the SUNWgzip package and may be downloaded from gzip http://www.sunfreeware.com. On recent versions of Solaris, the necessary libraries are provided by the following natively installed packages: •...
Page 209
Download and Install Additional Packages add their location to the library search path. To do so, first check the current library search path": # crle -c /var/ld/ld.config Make a note of the current Default Library Path. Next, modify the path to also include the components shown below.
Page 210
3.1.5. Include RHN Packages in the PATH In order to make the RHN packages available at each login, you may wish to add them to your PATH. To do so, add these commands to your login script: # PATH=$PATH:/opt/redhat/rhn/solaris/bin # PATH=$PATH:/opt/redhat/rhn/solaris/usr/bin # PATH=$PATH:/opt/redhat/rhn/solaris/usr/sbin # export PATH To enable access to the RHN client command man pages, add them to your MANPATH.
# export MANPATH Alternatively, you can also access the man pages from the command line, with the following command: # man -M /opt/redhat/rhn/solaris/man <man page> Finally, add the Red Hat Libraries to your PATH as you did with libgcc openssl zlib crle -c /var/ld/ld.config -l <current library...
Update Agent, which provides registration and update functionality. Follow these steps on each client system: 1. As root, change to the RHN configuration directory for the system. For Solaris, the full path is /opt/redhat/rhn/solaris/etc/sysconfig/rhn/ 2. Open the configuration file in a text editor.
Obtaining Updates This section describes the RHN registration process for UNIX systems. You must use the command to accomplish this; the use of activation keys for registering your systems rhnreg_ks is optional. These keys allow you to predetermine settings within RHN, such as base channels and system groups, and to apply those automatically to systems during their registration.
Page 214
Chapter 9. UNIX Support Guide software channels designed to serve UNIX variants can be constructed almost exactly as the custom channels described in the RHN Channel Management Guide. The most significant difference is the architecture. When creating a UNIX software channel, ensure you select the base channel architecture appropriate for the systems to be served.
Page 215
Obtaining Updates # solaris2mpm RHATrpush-3.1.5-21.pkg RHATrpush-3.1.5-23.pkg Opening archive, this may take a while Writing out RHATrpush-3.1.5-21.sparc-solaris.mpm Opening archive, this may take a while Writing out RHATrpush-3.1.5-23.sparc-solaris.mpm Because no other directory was specified, the resulting .mpm files are written to the /tmp/ directory.
Page 216
It can be started from the rhnsd command line in this way: rhnsd --foreground --interval=240 The default location for rhnsd /opt/redhat/rhn/solaris/usr/sbin/rhnsd Below are the available options for on Solaris: rhnsd Option Description...
Page 217
Obtaining Updates Option Description Give this help list -h, --help Give this help list -u, --usage Print program version -V, --version Table 9.2. Options rhnsd 4.2.3. Updating From the Command Line Like the website, command line use of the Red Hat Update Agent is affected by the limitations of UNIX package management.
, and both must be located in the /etc/sysconfig/rhn/allowed-actions/ directory specific to your UNIX variant. For instance, in Solaris, issue this command to create the directory: mkdir -p /opt/redhat/rhn/solaris/etc/sysconfig/rhn/allowed-actions/script To create the requisite file in Solaris, issue this command: touch /opt/redhat/rhn/solaris/etc/sysconfig/rhn/allowed-actions/script/run 5.2. Issuing Commands You may schedule a remote command in a variety of ways: on an individual system, on multiple systems at once, and to accompany a package action.
Page 219
Issuing Commands identify a specific user, group, and timeout period, as well as the script itself. Select a date and time to begin attempting the command, and click the Schedule Remote Command link. Similarly, you may issue a remote command on multiple systems at once through the System Set Manager.
Appendix A. Command Line Config Management Tools In addition to the options provided in the RHN website, Red Hat Network offers two command line tools for managing a system's configuration files: the Red Hat Network Configuration Client and the Red Hat Network Configuration Manager. There is a complementary Red Hat Network Actions Control tool that is used to enable and disable configuration management on client systems.
Appendix A. Command Line Config Management Tools Option Description --enable-all Allow rhncfg-client to do everything. --enable-run Enable script.run --disable-deploy Disable deployment. --disable-diff Disable diff --disable-upload Disable upload --disable-mtime-upload Disable mtime upload --disable-all Disable all options --disable-run Disable script.run --report Report whether the modes are enabled or disabled -f, --force Force the operation without asking first -h, --help...
Getting a Config File rhncfg-manager list config-channel-14 and observe the following output: Files in config channel 'config-channel-14' /etc/example-config.txt /etc/rhn/rhn.conf You may then wonder where the second version of went. The rank /etc/example-config.txt of the file in was higher than that of the same /etc/example-config.txt config-channel-17 file in...
Appendix A. Command Line Config Management Tools Option Description --topdir=TOPDIR Make all file operations relative to this string. -h, --help Show help message and exit Table A.2. options rhncfg-client get 2.4. Differentiating between Config Files To view the differences between the config files deployed on the system and those stored by RHN, issue the command: rhncfg-client diff The output resembles the following:...
Red Hat Network Configuration Manager Option Description -v, --verbose Increase the amount of output detail. Displays differences in the mode, owner, and group permissions for the specified config file. -h, --help Show help message and exit Table A.3. options rhncfg-client verify 3.
Appendix A. Command Line Config Management Tools You can see such a list of options for the add mode at Table A.4, “ rhncfg-manager add options”. 3.1. Creating a Config Channel To create a config channel for your organization, issue the command: rhncfg-manager create-channel channel-label If prompted for your RHN username and password, provide them.
Differentiating between Latest Config Files Option Description --delim-end=DELIM_END End delimiter for variable interpolation -h, --help show help message and exit Table A.4. options rhncfg-manager add Note By default, the maximum file size for confiugration files is 128KB. If you need to change that value, find or create the following line in the /etc/rhn/rhn.conf file:...
Appendix A. Command Line Config Management Tools Table A.5. options rhncfg-manager diff 3.4. Differentiating between Various Versions To compare different versions of a file across channels and revisions, use the flag to indicate which revision of the file should be compared and the flag to identify the two channels to be checked.
Getting the Contents of a File Copying /tmp/dest_path/example-config.txt -> \ blah2/tmp/dest_path/example-config.txt The following table lists the options available for rhncfg-manager download-channel Option Description -tTOPDIR, --topdir=TOPDIR Directory all the file paths are relative to. This option must be set. -h, --help Show help message and exit Table A.7.
Appendix A. Command Line Config Management Tools 3.8. Listing All Config Channels To list all of your organization's configuration channels, issue the command: rhncfg-manager list-channels The output resembles the following: Available config channels: example-channel example-channel2 example-channel3 config-channel-14 config-channel-17 Note that this does not list channels.
Determining the Number of File Revisions Removing config channel example-channel Config channel example-channel removed 3.11. Determining the Number of File Revisions To find out how many revisions (revisions go from 1 to N where N is an integer greater than 0) of a file/path are in a channel, issue the following command: rhncfg-manager revisions channel-label /tmp/dest_path/example-config.txt The output resembles the following:...
Appendix A. Command Line Config Management Tools 3.13. Uploading Multiple Files at Once To upload multiple files to a config channel from local disk at once, issue the command: rhncfg-manager upload-channel --topdir=topdirchannel-label The output resembles the following: Using config channel example-channel4 Uploading /tmp/ola_world.txt from blah4/tmp/ola_world.txt The following table lists the options available for rhncfg-manager upload-channel...
RHN website, then clicking API in the left navigation bar. Or you may go directly to: https://rhn.redhat.com/rpc/api/. Use this URL for your XMLRPC server and your browser. The RHN API is based upon XML-RPC, which allows distinct pieces of software on disparate systems to make remote procedure calls using XML over HTTP.
Appendix B. RHN API Access the end of the URL. It follows the "=" symbol, as part of a string that resembles the following: "details.pxt?cid=54". 5. Getting the sgid System groups also have their own IDs. This value, the , is a required parameter for the sgid method, for instance.
Page 235
Sample API Script #!/usr/bin/perl -w use strict; use Frontier::Client; use Data::Dumper; ############################################################################ # This is a sample script for use of the experimental RHN Management APIs. # # The API is currently available using XMLRPC only, which is described in # depth at: # http://www.xmlrpc.com/ # We use the Frontier modules, available from:...
Page 236
Appendix B. RHN API Access my $systemid = @$systems[0]->{id}; # This next call returns a list of packages present on this system. # syntax of this call is described at: http://$HOST/rpc/api/system/list_packages/ # This will probably be a pretty long list. my $packages = $client->call('system.list_packages', $session, $systemid);...
Appendix C. Probes As described in Section 10, “Monitoring — ”, Monitoring-entitled systems can have probes applied to them that constantly confirm their health and full operability. This appendix lists the available probes broken down by command group, such as Apache. Many probes that monitor internal system aspects (such as the Linux::Disk Usage probe) rather than external aspects (such as the Network Services::SSH probe) require the installation of the Red Hat Network Monitoring Daemon (...
Appendix C. Probes The probes that have crossed their WARNING thresholds. Critical The probes that have crossed their CRITICAL thresholds or reached a critical status by some other means. (Some probes become critical when exceeding their timeout period.) While adding probes, select meaningful thresholds that, when crossed, notify you and your administrators of problems within your infrastructure.
Apache::Traffic directive in the file of the Web server must be set to ExtendedStatus httpd.conf this probe to function properly. Field Value Application Protocol* http Port* Pathname* /server-status UserAgent* NOCpulse-ApacheUptime/1.0 Username Password Timeout* Critical Maximum Megabytes Transferred Per Child Warning Maximum Megabytes Transferred Per Child Critical Maximum Megabytes Transferred Per Slot Warning Maximum Megabytes Transferred Per Slot...
Appendix C. Probes Field Value Password Timeout* Critical Maximum Current Requests (number) Warning Maximum Current Requests (number) Critical Maximum Request Rate (events per second) Warning Maximum Request Rate (events per second) Critical Maximum Traffic (kilobytes per second) Warning Maximum Traffic (kilobytes per second) Table C.2.
BEA WebLogic::Execute Queue must be used to differentiate between the Administration Server receiving SNMP queries and the Managed Server undergoing the specified probe. If the host to be probed is the Administration Server, then the BEA Domain Admin Server parameter can be left blank, and both the SNMP queries and the probe will be sent to it only.
Appendix C. Probes Field Value Critical Maximum Request Rate Warning Maximum Request Rate Table C.4. BEA WebLogic::Execute Queue settings 3.2. BEA WebLogic::Heap Free The BEA WebLogic::Heap Free probe collects the following metric: • Heap Free — The percentage of free heap space. This probe's transport protocol is User Datagram Protocol (UDP).
BEA WebLogic::Server State This probe's transport protocol is User Datagram Protocol (UDP). Field Value SNMP Community String* public SNMP Port* SNMP Version* BEA Domain Admin Server BEA Server Name* myserver JDBC Pool Name* MyJDBC Connection Pool Critical Maximum Connections Warning Maximum Connections Critical Maximum Connection Rate Warning Maximum Connection Rate Critical Maximum Waiters...
Appendix C. Probes • High Execution Time — The highest amount of time in milliseconds that the servlet takes to execute since the system was started. • Low Execution Time — The lowest amount of time in milliseconds that the servlet takes to execute since the system was started.
General::Remote Program with Data Requirements — The Red Hat Network Monitoring Daemon ( ) must be running on the rhnmd monitored system to execute this probe. Field Value Command* OK Exit Status* Warning Exit Status* Critical Exit Status* Timeout Table C.9. General::Remote Program settings 4.2.
Appendix C. Probes Field Value OK Exit Status* Warning Exit Status* Critical Exit Status* Timeout Table C.10. General::Remote Program with Data settings 4.3. General::SNMP Check The General::SNMP Check probe tests your SNMP server by specifying a single object identifier (OID) in dotted notation (such as ) and a threshold associated 1.3.6.1.2.1.1.1.0 with the return value.
General::UDP Check • Remote Service Latency — The time it takes in seconds for the TCP server to answer a connection request. The probe passes the string specified in the Send field upon making a connection. The probe anticipates a response from the system, which should include the substring specified in the Expect field.
Appendix C. Probes 4.6. General::Uptime (SNMP) The General::Uptime (SNMP) probe records the time since the device was last started. It uses the SNMP object identifier (OID) to obtain this value. The only error status it will return is UNKNOWN. Requirements — SNMP must be running on the monitored system and access to the OID must be enabled to perform this probe.
Linux::Disk IO Throughput Table C.15. Linux::CPU Usage settings 5.2. Linux::Disk IO Throughput The Linux::Disk IO Throughput probe monitors a given disk and collects the following metric: • Read Rate — The amount of data that is read in kilobytes per second. •...
Appendix C. Probes • Space Available — The amount of the file system in megabytes currently available. Requirements — The Red Hat Network Monitoring Daemon ( ) must be running on the rhnmd monitored system to execute this probe. Field Value File system* /dev/hda1...
Linux::Load The Linux::Interface Traffic probe measures the amount of traffic into and out of the specified interface (such as eth0) and collects the following metrics: • Input Rate — The traffic in bytes per second going into the specified interface. •...
Appendix C. Probes Field Value Critical CPU Load 15-minute average Warning CPU Load 15-minute average Table C.20. Linux::Load settings 5.7. Linux::Memory Usage The Linux::Memory Usage probe monitors the memory on a system and collects the following metric: • RAM Free — The amount of free random access memory (RAM) in megabytes on a system. You can also include the reclaimable memory in this metric by entering in the Include reclaimable memory field.
Linux::Process Count Total reintroduced into memory, resuming execution where it left off. Requirements — The Red Hat Network Monitoring Daemon ( ) must be running on the rhnmd monitored system to execute this probe. Field Value Timeout* Critical Maximum Blocked Processes Warning Maximum Blocked Processes Critical Maximum Defunct Processes Warning Maximum Defunct Processes...
Page 254
Appendix C. Probes metrics: • CPU Usage — The CPU usage rate for a given process in milliseconds per second. This metric reports the column of output, which is the cumulative CPU time used by the time process. This makes the metric independent of probe interval, allows sane thresholds to be set, and generates usable graphs (i.e.
Linux::Process Running Table C.24. Linux::Process Health settings 5.11. Linux::Process Running The Linux::Process Running probe verifies that the specified process is functioning properly. It counts either processes or process groups, depending on whether the Count process groups checkbox is selected. By default, the checkbox is selected, thereby indicating that the probe should count the number of process group leaders independent of the number of children.
Appendix C. Probes Field Value Timeout* Warning Minimum Swap Free Critical Minimum Swap Free Table C.26. Linux::Swap Usage settings 5.13. Linux::TCP Connections by State The Linux::TCP Connections by State probe identifies the total number of TCP connections, as well as the quantity of each in the following states: •...
Linux::Users Field Value Critical Maximum TIME_WAIT Connections Warning Maximum TIME_WAIT Connections Critical Maximum CLOSE_WAIT Connections Warning Maximum CLOSE_WAIT Connections Critical Maximum FIN_WAIT Connections Warning Maximum FIN_WAIT Connections Critical Maximum ESTABLISHED Connections Warning Maximum ESTABLISHED Connections Critical Maximum SYN_RCVD Connections Warning Maximum SYN_RCVD Connections Table C.27.
Appendix C. Probes Requirements — The Red Hat Network Monitoring Daemon ( ) must be running on the rhnmd monitored system to execute this probe. Field Value Timeout* Warning Minimum Virtual Memory Free Critical Minimum Virtual Memory Free Table C.29. Linux::Virtual Memory settings 6.
LogAgent::Log Size [^] match not in set '[^A-F]oo' + match one or more of preceding chars ? match zero or one of preceding chars | or, e.g. a|b () groups chars, e.g., (foo|bar) or (foo)+ Warning Do not include single quotation marks (') within the expression. Doing so causes to fail silently and the probe to time out.
Appendix C. Probes Requirements — The Red Hat Network Monitoring Daemon ( ) must be running on the rhnmd monitored system to execute this probe. For this probe to run, the user must be nocpulse granted read access to your log files. Field Value Log file*...
MySQL::Opened Tables Field Value Username* Password MySQL Port 3306 Database* mysql Timeout Table C.32. MySQL::Database Accessibility settings 7.2. MySQL::Opened Tables The MySQL::Opened Tables probe monitors the MySQL server and collects the following metric: • Opened Tables — The tables that have been opened since the server was started. Field Value Username...
Appendix C. Probes Field Value MySQL Port* 3306 Timeout Critical Maximum Open Objects Warning Maximum Open Objects Warning Minimum Open Objects Critical Minimum Open Objects Table C.34. MySQL::Open Tables settings 7.4. MySQL::Query Rate The MySQL::Query Rate probe monitors the MySQL server and collects the following metric: •...
Network Services Field Value Password MySQL Port* 3306 Timeout Critical Maximum Threads Running Warning Maximum Threads Running Warning Minimum Threads Running Critical Minimum Threads Running Table C.36. MySQL::Threads Running settings 8. Network Services The probes in this section monitor various services integral to a functioning network. When applying them, ensure that their timed thresholds do not exceed the amount of time allotted to the timeout period.
Appendix C. Probes The Network Services::FTP probe uses network sockets to test FTP port availability. It collects the following metric: • Remote Service Latency — The time it takes in seconds for the FTP server to answer a connection request. This probe supports authentication.
Network Services::Mail Transfer (SMTP) Field Value Warning Maximum Remote Service Latency Table C.39. Network Services::IMAP Mail settings 8.4. Network Services::Mail Transfer (SMTP) The Network Services::Mail Transfer (SMTP) probe determines if it can connect to the SMTP port on the system. Specifying an optional port number overrides the default port 25. It collects the following metric: •...
Appendix C. Probes Note that this probe conducts the from an RHN Server and not the monitored system. ping Populating the IP Address field does not test connectivity between the system and the specified IP address but between the RHN Server and the IP address. Therefore, entering the same IP address for Ping probes on different systems accomplishes precisely the same task.
Network Services::RPCService 8.7. Network Services::Remote Ping The Network Services::Remote Ping probe determines if the monitored system can ping specified IP address. It also monitors the packet loss and compares the round trip average against the Warning and Critical threshold levels. The required Packets to send value allows you to control how many ICMP ECHO packets are sent to the address.
Appendix C. Probes the RPC network by declaring a program ID and a program name. NFS is an example of a service that works via the RPC mechanism. Client programs that wish to use the resources of RPC server programs do so by asking the machine on which the server program resides to provide access to RPC functions within the RPC program number or program name.
Network Services::SSH Field Value Username Password Timeout* HTTPS Port* Critical Maximum Remote Service Latency Warning Maximum Remote Service Latency Table C.45. Network Services::Secure Web Server (HTTPS) settings 8.10. Network Services::SSH The Network Services::SSH probe determines the availability of SSH on the specified port and collects the following metric: •...
Appendix C. Probes specified URL. If no URL is specified, the probe will fetch the root document. The probe looks for a HTTP/1. message from the system, unless you alter that value. Specifying another port number will override the default port of 80. Unlike most other probes, this probe will return a CRITICAL status if it cannot contact the system within the timeout period.
Oracle::Active Sessions representation, de-emphasizing anomalies that can occur at shorter time intervals. This applies to following probes: Buffer Cache, Data Dictionary Cache, Disk Sort Ratio, Library Cache, and Redo Log. For CRITICAL and WARNING thresholds based upon time to work as intended, their values cannot exceed the amount of time allotted to the timeout period.
Appendix C. Probes Field Value Oracle SID* Oracle Username* Oracle Password* Oracle Port* 1521 Timeout* Table C.49. Oracle::Availability settings 9.3. Oracle::Blocking Sessions The Oracle::Blocking Sessions probe monitors an Oracle instance and collects the following metric: • Blocking Sessions — The number of sessions preventing other sessions from committing changes to the Oracle database, as determined by the required Time Blocking value you provide.
Oracle::Client Connectivity • Consistent Gets — The number of accesses made to the block buffer to retrieve data in a consistent mode. • Physical Reads — The cumulative number of blocks read from disk. • Buffer Cache Hit Ratio — The rate at which the database goes to the buffer instead of the hard disk to retrieve data.
Appendix C. Probes Table C.52. Oracle::Client Connectivity settings 9.6. Oracle::Data Dictionary Cache The Oracle::Data Dictionary Cache probe computes the Data Dictionary Cache Hit Ratio so as to optimize the SHARED_POOL_SIZE in . It collects the following metrics: init.ora • Data Dictionary Hit Ratio — The ratio of cache hits to cache lookup attempts in the data dictionary cache.
Oracle::Idle Sessions Field Value Oracle Password* Oracle Port* 1521 Timeout* Critical Maximum Disk Sort Ratio Warning Maximum Disk Sort Ratio Table C.54. Oracle::Disk Sort Ratio settings 9.8. Oracle::Idle Sessions The Oracle::Idle Sessions probe monitors an Oracle instance and collects the following metric: •...
Appendix C. Probes Field Value Oracle SID* Oracle Username* Oracle Password* Oracle Port* 1521 Index Owner* Index Name* Timeout* Critical Maximum of Allocated Extents Warning Maximum of Allocated Extents Critical Maximum of Available Extents Warning Maximum of Available Extents Table C.56. Oracle::Index Extents settings 9.10.
Oracle::Redo Log 9.11. Oracle::Locks The Oracle::Locks probe monitors an Oracle database instance and collects the following metric: • Active Locks — The current number of active locks as determined by the value in the v$locks table. Database administrators should be aware of high numbers of locks present in a database instance.
Appendix C. Probes Field Value Oracle Password* Oracle Port* 1521 Timeout* Critical Maximum Redo Log Space Request Rate Warning Maximum Redo Log Space Request Rate Critical Maximum Redo Buffer Allocation Retry Rate Warning Maximum Redo Buffer Allocation Retry Rate Table C.59. Oracle::Redo Log settings 9.13.
Oracle::Tablespace Usage Field Value Table Name* Timeout* Critical Maximum Allocated Extents Warning Maximum Allocated Extents Critical Maximum Available Extents Warning Maximum Available Extents Table C.60. Oracle::Table Extents settings 9.14. Oracle::Tablespace Usage The Oracle::Tablespace Usage probe monitors an Oracle database instance and collects the following metric: •...
Appendix C. Probes The Oracle::TNS Ping probe determines if an Oracle listener is alive and collects the following metric: • Remote Service Latency — The time it takes in seconds for the Oracle server to answer a connection request. Field Value TNS Listener Port* 1521...
RHN Satellite Server::Execution Time Table C.63. RHN Satellite Server::Disk Space settings 10.2. RHN Satellite Server::Execution Time The RHN Satellite Server::Execution Time probe monitors the execution time for probes run from a Satellite and collects the following metric: • Probe Execution Time Average — The seconds required to fully execute a probe. Field Value Critical Maximum Probe Execution Time Average...
Appendix C. Probes second. When a Satellite is overloaded (because it has too many probes with respect to their average execution time), the number goes up. Field Value Critical Maximum Probe Latency Average Warning Maximum Probe Latency Average Table C.66. RHN Satellite Server::Latency settings 10.5.
RHN Satellite Server::Processes 10.7. RHN Satellite Server::Process Counts The RHN Satellite Server::Process Counts probe monitors the number of processes on a Satellite and collects the following metrics: • Blocked — The number of processes that have been switched to the waiting queue and waiting state.
Appendix C. Probes Field Value Critical Maximum Processes Warning Maximum Processes Table C.70. RHN Satellite Server::Processes settings 10.9. RHN Satellite Server::Process Health The RHN Satellite Server::Process Health probe monitors customer-specified processes and collects the following metrics: • CPU Usage — The CPU usage percent for a given process. •...
RHN Satellite Server::Process Running Field Value Critical Maximum Virtual Memory Used Warning Maximum Virtual Memory Used Table C.71. RHN Satellite Server::Process Health settings 10.10. RHN Satellite Server::Process Running The RHN Satellite Server::Process Running probe verifies that the specified process is running. Specify the process by its command name or process ID.
Page 286
Appendix C. Probes Field Value Warning Maximum Users Table C.74. RHN Satellite Server::Users settings...
Errata Alert that pertains to a bug fix. Bugzilla Bugzilla is an online application (http://www.redhat.com/bugzilla ) that allows users to communicate directly with the developers. From Bugzilla, users can submit bug reports and feature requests for Red Hat Enterprise Linux and related open source packages.
Page 288
Linux. The information includes the topics of the Errata, Bugzilla bug IDs, relevant releases/architectures, solutions including required RPMs, and MD5 checksums for verification. Errata are also available at http://www.redhat.com/errata/. Each RHN Errata Alert is based on the Red Hat Enterprise Linux Errata List.
Page 289
Red Hat Public File Server and on the Red Hat Network Server and an Errata is generated. Errata Alert RHN Errata Alert that updated packages based on Red Hat Errata are available for one or more systems within an organization. There are three types of Errata Alerts: Security Alerts, Bug Fix Alerts, and Enhancement Alerts.
Page 290
Glossary States include: OK, Warning, Critical, Pending, Unknown Probe Suite collection or group of RHN Monitoring Probes. Provisioning One of the RHN service level offerings. It has more features than the Management service level, including kickstarting, reconfiguring, tracking, and reverting systems. Registered System A system that is registered with Red Hat Network.
Page 291
Security Alert Errata Alert that pertains to system security. Sibling Siblings are virtual guests running on the same host. Virtual guests that run on separate hosts are not siblings. Service Level A Red Hat Network subscription service. Different service levels offer different features of RHN. There are three paid service levels currently available: RHN Update, RHN Management, and RHN Provisioning.
Page 292
Glossary systems. The virtual host may also be referred to as domain 0, or dom0. Yellowdog Updater Modified The Yellowdog Updater Modified is the Red Hat Network client (yum) application ( ) that allows users to retrieve and install new or updated packages for the client system on which the application is run.
child, 124 Index errata, 127 list of, 124 packages, 127 relevant, 125 retired, 126 account Channels and Packages deactivate, 71 Channel List, 124 action child channel, 124 completed systems, 140 client applications details, 140 obtaining, 6 failed systems, 141 redirecting, 197 in progress systems, 140 client systems activation key, 103...
Page 294
Index Errata, 119 Linux Advanced Search, 123 CPU Usage, 234 All Errata, 121 Disk IO Throughput, 235 apply applicable, 85 Disk Usage, 235 Relevant Errata, 120 Inodes, 236 Errata Alert Icons Interface Traffic, 236 explanation of, 65 Load, 237 Errata notifications Memory Usage, 238 automatic updates, 5 probes...
Page 295
Status, 147 Availability, 257 Unknown, 148 Blocking Sessions, 258 Warning, 148 Buffer Cache, 258 monitoring Client Connectivity, 259 list of probes, 223 Data Dictionary Cache, 260 MySQL, 167 Disk Sort Ratio, 260 Database Accessibility, 246 Idle Sessions, 261 Open Tables, 247 Index Extents, 261 Opened Tables, 247 Library Cache, 262...
Page 296
Index Linux Library Cache, 262 CPU Usage, 234 Locks, 263 Disk IO Throughput, 235 Redo Log, 263 Disk Usage, 235 Table Extents, 264 Inodes, 236 Tablespace Usage, 265 Interface Traffic, 236 TNS Ping, 265 Load, 237 RHN Satellite Server Memory Usage, 238 Disk Space, 266 Process Count Total, 239 Execution Time, 267...
Page 297
Red Hat Network packages with Red Hat Update Agent, 31 comparison, 7 Red Hat Network Registration Client (rhn)_register) initial description, 2 quality assurance Red Hat packages overview, 5 for UNIX, 193 Quick Search installing, 193 explanation of, 65 Red Hat Update Agent, 44 Command Line Arguments, 25 configuration, 30 reactivating...
Page 298
Index with a proxy server, 46 security with activation key, 103 overview, 5 remote commands service levels enabling, 204 Management, 3 issuing, 204 Monitoring, 4 RHN Satellite Server Provisioning, 4 Disk Space, 266 Update, 2 Execution Time, 267 Software Interface Traffic, 267 Channel List Latency, 267 Channel Details, 126...
Page 299
System Set Manager, 96 WebLogic systems Execute Queue, 227 deleting, 79 Heap Free, 228 entitling, 72 JDBC Connection Pool, 228 overview, 74 probes, 226 searching, 103 Server State, 229 viewing a list of, 74 Servlet, 229 viewing details for, 78 website, 61 Systems activation keys, 103...