• Subscription-manager for the former Red Hat Network User: Part 12 - Subscription Reporting Tools

    Overview One of the big changes with Satellite 6 and also Red Hat Subscription Management (RHSM) is that the tools now maintain an accurate inventory of what systems are consuming which subscription. This document will illustrate how to use hammer and other tools to extract subscription consumption information from Satellite. This information is useful for audit/reporting and other usages. Prerequisites It is important that you have read (or understand) the concepts as presented in: The Hammer...
    Posted 2017-02-21T14:29:47+00:00 - 0
  • Is Your Bond Strong?

    Most critical physical systems use multiple network interfaces bonded together to provide redundancy and, depending on the workload, to provide greater network throughput. Bonding can be configured in either manner depending on the mode specified in the bonding configuration file. It is quite common to misconfigure bonding. It is case sensitive so something might be capitalized that shouldn’t be. You might have misunderstood the documentation and configured an incorrect or suboptimal bonding...
    Posted 2017-02-13T15:12:49+00:00 - 0
  • Questions and Answers from the January 2017 Satellite Ask-Me-Anything session

    Satellite 6 Ask Me Anything FAQ As promised, listed below are the responses to the questions we received in our Jan 2017 Satellite Ask Me Anything session. We are running another Ask Me Anything on 14 Feb, so feel free to join us again. SUBSCRIPTIONS Question: On the subscription comments... you have to give it a subscription id with hammer. I have a bunch of VMs that came in with the wrong license that should be under the datacenter model. The only way I've found to fix this through the UI...
    Posted 2017-02-09T22:49:02+00:00 - 0
  • Do you know where that open source came from?

    Last year, while speaking at RSA, a reporter asked me about container provenance. This wasn’t the easiest question to answer because there is a lot of nuance around containers and what’s inside them. In response, I asked him if he would eat a sandwich he found on the ground. The look of disgust I got was priceless, but it opened up a great conversation. Think about it this way: If there was a ham sandwich on the ground that looked mostly OK, would you eat it? You can clearly see it’s a ham...
    Posted 2017-02-08T14:30:00+00:00 - 0
  • Satellite 6.2.7 is released

    Satellite 6.2.7 has been released today. There is one erratum for the server [1] and one for the hosts[2]. The install ISOs will be updated later this week. Customers who have already upgraded to 6.2 should follow the instructions in the errata. Customers who are on 6.1.x should follow the upgrade instructions at [3]. Customers who have received hotfixes should verify the list below to ensure their hotfix is contained in the release before upgrading. Please reach out to the Satellite team in...
    Posted 2017-01-26T13:40:20+00:00 - 4
  • Introducing Topics, Redesigned Actions & Additional Features

    You may have noticed that the interface for Red Hat Insights underwent some changes recently. Our developers have been hard at work to provide a richer, more streamlined experience based on your feedback and recently released some new features. Here is a detailed list of recent Insights UI improvements. Introducing Topics - Topics are a new way to present groups of actionable intelligence providing Insights with additional categories such as SAP, Oracle, kdump and networking. Redesigned...
    Posted 2017-01-24T16:21:13+00:00 - 0
  • Subscription-manager for the former Red Hat Network User: Part 11 - Identity Certificates

    Overview Alternate title: Better living, via X.509, part two Identity certificates are an important component of the subscription-manager toolkit. Understanding their usage makes working with subscription-manager significantly easier. Prerequisites It is important that you have read (or understand) the concepts as presented in: Subscription-manager for the former Red Hat Network User: Part 8 - Product Certificates What is an Identity Certificate & why are they important? Identity...
    Posted 2017-01-20T13:24:03+00:00 - 0
  • Subscription-manager for the former Red Hat Network User: Part 10 - Instance Based Subscriptions

    Overview Instance Based Subscriptions are a type of subscription that allows the end user flexible deployment options. This article describes their usage with the subscription tooling. Prerequisites It is important that you have read (or understand) the concepts as presented in: Subscription-manager for the former Red Hat Network User: Part 2 - Subscription-manager learns grep What is an Instance Based Subscription? To provide a more flexible and intuitive way of managing your Red Hat...
    Posted 2017-01-20T09:33:49+00:00 - 0
  • Subscription-manager for the former Red Hat Network User: Part 9 - A Case Study with activation keys.

    Overview Activation keys are one of the more important features in the workflow of provisioning and registering hosts. They setup many of the things needed to properly build a host. Prerequisites It is important that you have read (or understand) the concepts as presented in: Subscription-manager for the former Red Hat Network User: Part 3 - Understanding virt-who Subscription-manager for the former Red Hat Network User: Part 4 - Understanding Subscription Manifests Subscription-manager for...
    Posted 2017-01-17T14:01:18+00:00 - 1
  • Upgrade Advisory for Satellite 5.6 customers running Satellites hosted on Red Hat Enterprise Linux version 5.

    Overview Upgrade Advisory for Satellite 5.6 customers running Satellites hosted on Red Hat Enterprise Linux version 5. Affected customers Satellite 5.6 customers whose Satellite server whose underlying operating system is Red Hat Enterprise Linux 5 Unaffected customers Satellite 5.7 customers. Satellite 5.6 customers whose Satellite server whose underlying operating system is Red Hat Enterprise Linux 6 Details As per the Red Hat Enterprise Linux Lifecycle, Red Hat Enterprise Linux 5 will be...
    Posted 2017-01-16T18:05:11+00:00 - 1
  • Debugging a kernel in QEMU/libvirt

    A kernel bug announced on oss-security list claims to create a situation in which memory corruption can panic the system, by causing an integer used in determining the size of TCP send and receive buffers to be a negative value. Red Hat engineering sometimes backports security fixes and features from the current kernel, diverging the Red Hat Enterprise Linux kernel from upstream and causing some security issues to no longer apply. This blog post shows how to use live kernel debugging to...
    Posted 2017-01-11T14:30:00+00:00 - 0
  • Put Your SAP Applications on a Firm Foundation

    Red Hat Insights is all about making sure your systems are running as smoothly as possible. Not just for Red Hat applications, but also for your other enterprise apps. We’ve begun developing rules tailored to large enterprise applications that could use the fine tuning expertise that Red Hat provides. We’ve nailed down the optimal settings required by SAP apps, and now Insights can let you know if those are in place on your systems. We’ve introduced SAP related rules for alerting you to system...
    Posted 2017-01-06T13:54:30+00:00 - 2
  • A separate lifecycle for Puppet modules in Satellite 6

    Since it's initial release in September of 2014, Satellite 6 has offered a complete systems management solution that includes Puppet for configuration management. The built-in Puppet master on the Satellite can service hundreds of clients. When scaling out is required, adding additional capsules allows you to easily bring up the number of clients your Satellite infrastructure can service. Content Views As part of its content management functionality, Satellite offers a built-in mechanism to...
    Posted 2017-01-05T23:11:12+00:00 - 2
  • Deprecation of Insecure Algorithms and Protocols in RHEL 6.9

    Cryptographic protocols and algorithms have a limited lifetime—much like everything else in technology. Algorithms that provide cryptographic hashes and encryption as well as cryptographic protocols have a lifetime after which they are considered either too risky to use or plain insecure. In this post, we will describe the changes planned for the 6.9 release of Red Hat Enterprise Linux 6, which is already on Production Phase 2. Balancing Legacy Use Cases and Modern Threats For the RHEL...
    Posted 2017-01-03T14:30:00+00:00 - 0
  • Pythonic code review

    Most of us programmers go through technical interviews every once in a while. At other times, many of us sit on the opposite side of the table running these interviews. Stakes are high, emotions run strong, intellectual pressure builds up. I have found that an unfortunate code review may turn into something similar to a harsh job interview. While it is theoretically in the best interest of the whole team to end up with high quality code, variations in individual's technical background, cultural...
    Posted 2016-12-14T14:30:00+00:00 - 0
  • Satellite 6.2.5 is released

    Satellite 6.2.5 has been released today. 6.2.5 introduces many performance and stability improvements. There are two errata, one for the server [1] and one for the clients [2]. The install ISOs will be updated later this week. Customers who have already upgraded to 6.2 should follow the instructions in the errata. Customers who are on 6.1.x should follow the upgrade instructions at [3]. Customers who have received hotfixes should verify the list below to ensure their hotfix is contained in the...
    Posted 2016-12-12T20:57:13+00:00 - 1
  • Migrating from Satellite 5 to 6

    Overview Red Hat’s Systems Engineering group recently tackled the task of migrating their lab infrastructure from Satellite 5.6 to Satellite 6.2.4. The Satellite 5.6 server managed several hundred physical and virtual machines. The migration consisted of moving over DNS, DHCP, TFTP, PXE, custom provisioning scripts, and content. For those unfamiliar with Satellite 6 and it’s capabilities, please refer to: https://access.redhat.com/products/red-hat-satellite Let’s take a look at how we...
    Posted 2016-12-09T18:39:36+00:00 - 2
  • A leap second is coming

    The basic timekeeping standard for almost all of the world's local time zones is called Coordinated Universal Time (UTC). UTC is derived from International Atomic Time (TAI) and Universal Time (UT1), also known as mean solar time because it’s the time it takes for the Earth to rotate once on its axis. Because the rotation of the earth varies a bit over time and is slowly decreasing its mean rotation speed, a deviation occurs between UTC and UT1. When this deviation approached .9 seconds, a leap...
    Posted 2016-12-01T07:50:45+00:00 - 0
  • Evolution of the SSL and TLS protocols

    The Transport Layer Security (TLS) protocol is undoubtedly the most widely used protocol on the Internet today. If you have ever done an online banking transaction, visited a social networking website, or checked your email, you have most likely used TLS. Apart from wrapping the plain text HTTP protocol with cryptographic goodness, other lower level protocols like SMTP and FTP can also use TLS to ensure that all the data between client and server is inaccessible to attackers in between. This...
    Posted 2016-11-16T14:30:00+00:00 - 0
  • Subscription-manager for the former Red Hat Network User: Part 8 - Product Certificates

    Alternate title: Better living via X.509 part 1 Overview Product certificates are an important component of the subscription-manager toolkit. Understanding their usage makes working with subscription-manager significantly easier. What is a product certificate? Product certificates, which are x.509 certificates found in either the /etc/pki/product or /etc/pki/product-default directories are a means for the subscription tools to accurately track which Red Hat products are installed on a system....
    Posted 2016-11-15T12:49:46+00:00 - 0
  • Don’t panic! Don’t let your kernel do it either.

    A system crash can be one of the most frustrating issues that administrators can encounter in their day to day work. They often strike without warning, require hard reboots, and can kill a process uncleanly, leaving various locked files in place that an admin must go back and manually clean up. These kind of interruptions can take a few minutes to a few hours to overcome. That’s time you could be spending engineering new solutions that change the world, or at the very least, drinking some...
    Posted 2016-11-11T17:54:37+00:00 - 0
  • Satellite 6.2.4 is released

    Satellite 6.2.4 has been released today. 6.2.4 introduces many performance and stability improvements. There are two errata, one for the server [1] and one for the clients [2]. Customers who have already upgraded to 6.2 should follow the instructions in the errata. Customers who are on 6.1.x should follow the upgrade instructions at [3]. Previously released (which we did not post a blog post for) was Satellite 6.2.3, which included a number of fixes [4][[5], and a new feature: Lazy Sync Lazy...
    Posted 2016-11-10T12:51:24+00:00 - 3
  • Understanding and mitigating the Dirty Cow Vulnerability

    Rodrigo Freire & David Sirrine - Red Hat Technical Account Management Team Dirty Cow (CVE-2016-5195) is the latest branded vulnerability, with a name, a logo, and a website, to impact Red Hat Enterprise Linux. This flaw is a widespread vulnerability and spans Red Hat Enterprise Linux versions 5, 6, and 7. Technical details about the vulnerability and how to address it can be found at: Kernel Local Privilege Escalation "Dirty COW" - CVE-2016-5195. In order to be successful, an attacker must...
    Posted 2016-11-09T14:30:00+00:00 - 2
  • The only thing worse than a crash is not knowing why it happened. Insights can make sure kdump is there for you.

    Recovery is by far the most important first step to take after a system goes down. However, after your systems have recovered, you'll want to perform some level of root cause analysis in order to understand why the crash happened and how to prevent future similar events. This type of analysis is impossible to perform without access to pre-crash system information. Several weeks ago we published a blog entitled Disaster Recovery, which outlined how many systems would be unable to properly...
    Posted 2016-11-04T19:46:23+00:00 - 0
  • From There to Here (But Not Back Again)

    Red Hat Product Security recently celebrated our 15th anniversary this summer and while I cannot claim to have been with Red Hat for that long (although I’m coming up on 8 years myself), I’ve watched the changes from the “0day” of the Red Hat Security Response Team to today. In fact, our SRT was the basis for the security team that Mandrakesoft started back in the day. In 1999, I started working for Mandrakesoft, primarily as a packager/maintainer. The offer came, I suspect, because of the...
    Posted 2016-10-24T13:30:00+00:00 - 0

Pages