Using Subscription Asset Manager
Deploying and managing local subscription services
Edition 1.3
Abstract
Preface
Chapter 1. Introduction to On-Premise Subscription Management
1.1. Defining Subscription Asset Manager
- Allocate subscriptions as a subscription service
- Work as a real-time proxy for Red Hat's content delivery network

Figure 1.1. Hosted Content Delivery and On-Premise Subscription Services
- Red Hat Subscription Manager client tools to manage local systems
- Customer Portal Subscription Management to manage systems globally through the Customer Portal
- Subscription Asset Manager to manage systems locally
1.2. Workflows and Use Cases
1.2.1. Direct Subscription Assignments
1.2.1.1. The Environment: Small Businesses to Large Enterprises for Locally-Defined Structure
- Enact security rules that require on-premise services rather than hosted services.
- Better manage virtual environments, particularly in private clouds or data centers, which require system to be created and removed on the fly.
- Define different content repositories for different types of systems, such as different sources for development and production systems.
1.2.1.2. Workflow

Figure 1.2. Subscription Asset Manager Setup
- If necessary, create an entry in the Red Hat inventory for the organization (Section 4.2.1, “Creating a New Organization”). Every organization in Subscription Asset Manager must have a corresponding subscription service entry in the Red Hat inventory.
- Assign a bloc of subscriptions to the organization (Section 4.4.2.1, “Attaching Subscriptions to Organizations”). This bloc of subscriptions is the manifest of subscriptions for that Subscription Asset Manager organization.
- Export the manifest (Section 4.4.2.2, “Downloading the Manifest”).
- Import the manifest into Subscription Asset Manager (Section 4.4.2.3, “Uploading a Subscription Manifest”).
- Configure the Red Hat Subscription Manager client on the local system to use the Subscription Asset Manager subscription service and, optionally, the Subscription Asset Manager content proxy (Section 5.2, “Registering a System”).

Figure 1.3. Registering with Subscription Asset Manager
- Register the system (Section 5.2, “Registering a System”).Using the
subscription-managerCLI command, use theregistercommand with the username and password for the Customer Portal Subscription Management account holder and the hostname of the Subscription Asset Manager server.For the Red Hat Subscription Manager UI, autoattaching subscriptions is performed by default. Check the option to attach subscriptions later. - Select and attach the subscriptions, using the Subscription Asset Manager UI (Section 5.6.1, “Attaching Subscriptions to a System”).
1.2.1.3. Details and Options
- Enable autoattaching for the system and, optionally, set a service level preference (Section 5.7, “Configuring Autoattach Preferences for a System”).
1.2.2. Activation Keys
1.2.2.1. The Environment: Preconfigured Systems
- Administrators have control over which subscriptions are installed to a system without having to create and configure every system first.
- Because activation keys are created within Subscription Asset Manager and do not rely on system settings or architecture, the target system does not have to exist yet.
- Users can register their system in a single step and automatically have all the proper subscriptions attached, without having to select and attach subscriptions manually and potentially miss a subscription.
1.2.2.2. Workflow

Figure 1.4. Setting up SAM
- If necessary, create an entry in the Red Hat inventory for the organization (Section 4.2.1, “Creating a New Organization”). Every organization in Subscription Asset Manager must have a corresponding subscription service entry in the Red Hat inventory.
- Assign a bloc of subscriptions to the organization (Section 4.4.2.1, “Attaching Subscriptions to Organizations”).This bloc of subscriptions is the manifest of subscriptions for that Subscription Asset Manager organization.
- Export the manifest (Section 4.4.2.2, “Downloading the Manifest”).
- Import the manifest into Subscription Asset Manager (Section 4.4.2.3, “Uploading a Subscription Manifest”).
- Configure the Red Hat Subscription Manager client on the local system to use the Subscription Asset Manager subscription service and, optionally, the Subscription Asset Manager content proxy (Section 5.2, “Registering a System”).This can be done at any point before the system is registered, so it can even be performed after the activation key is created.

Figure 1.5. Registering with Activation Keys
- Create the activation key (Section 6.2, “Creating an Activation Key”). This is a container entry that subscriptions can be attached to.
- Attach subscriptions to the key (Section 6.3, “Attaching and Updating Subscriptions for an Activation Key”).
- Register the local system using the activation key (Section 6.5, “Registering a System Using an Activation Key”).This is basically an autoattach operation, only instead of using the Red Hat Subscription Manager evaluation to select best-matched subscriptions, it attaches the pre-configured subscriptions associated with the key.
1.2.2.3. Details and Options
- Enable autoattaching for the system and, optionally, set a service level preference (Section 5.7, “Configuring Autoattach Preferences for a System”).
Chapter 2. Installing Subscription Asset Manager
2.1. Prerequisites
- Red Hat Enterprise Linux 6.6 or higher Server, 64-bit.
- The
rhel-6-server-sam-rpmsrepository must be enabled, and therhel-server-rhscl-6-eus-rpmsrepository must be disabled. - OpenJDK 1.6.
- A minimum of 1.5GB RAM.
- A minimum of 1GB of memory must be swap-enabled.
- The Subscription Asset Manager hostname must be fully resolvable in DNS. Both servers and any client systems must be able to resolve the Subscription Asset Manager hostname for authentication operations and other management tasks.
- Ports 443 and 8088 for HTTPS (secure HTTP) must be open.
- For enhanced reporting. An additional 4 GB disk space.
2.2. Basic Installation and Setup for Subscription Asset Manager
yum, or through an ISO image. The installation paths differ slightly, depending on the network and infrastructure.
2.2.1. Installing Using yum
- Register the host system. Use the
--auto-attachoption to attach the required subscriptions for the operating system immediately.[root@server ~]# subscription-manager register --auto-attach Username: jsmith@example.com Password:
- Wait several minutes for the updated content repositories to be added to the system configuration.
- Enable the
rhel-6-server-sam-rpmsrepository.If the Enhanced Updates (EUS) repository is enabled, then disable it, either as part of theyumconfiguration (as in this example) or when runningyumto install packages. There are conflicts in the Ruby packages between the EUS repository and the Subscription Asset Manager repository.[root@server ~]# subscription-manager repos --enable rhel-6-server-sam-rpms --disable rhel-server-rhscl-6-eus-rpms Loaded plugins: product-id, refresh-packagekit ========================= repo: rhel-6-server-sam-rpms ========================= [rhel-6-server-sam-rpms] bandwidth = 0 base_persistdir = /var/lib/yum/repos/x86_64/6Server baseurl = https://cdn.redhat.com/content/dist/rhel/server/6/6Server/x86_64/subscription-asset-manager/1/os cache = 0 cachedir = /var/cache/yum/x86_64/6Server/rhel-6-server-sam-rpms cost = 1000 enabled = 1 enablegroups = True exclude = failovermethod = priority ...
- Install the
katello-headpin-allpackage usingyum install:[root@server ~]# yum install -y katello-headpin-all
- After installing the packages, run the Subscription Asset Manager configuration script,
katello-configure.The required parameters for the basic installation are the deployment type, which issam, and an administrator password.While not required, it is useful to specify an initial organization name for your deployment. If this is not set, then the first organization has a default name of ACME_Corporation.This sets up the Subscription Asset Manager instance with the default user and database settings.[root@server ~]# katello-configure --deployment=sam --org=Example_Org --user-pass=admin Starting Katello configuration The top-level log file is [/var/log/katello/katello-configure-20130904-210539/main.log]
2.2.1.1. Configuring Red Hat SAM Manually with an HTTP Proxy
katello-installer --katello-proxy-url=http://myproxy.example.com --katello-proxy-port=8080 --katello-proxy-username=proxy_username --katello-proxy-password=proxy_password
--katello-proxy-url:URL of the HTTP proxy server--katello-proxy-port:Port the HTTP proxy server is listening on--katello-proxy-username:(Optional) HTTP proxy username for authentication. If your HTTP proxy server does not require a username, you do not have to specify the username.--katello-proxy-password:(Optional) HTTP proxy password for authentication. If your HTTP proxy server does not require a password, you do not have to specify the password.
Procedure 2.1. Configuring SAM to Allow Red Hat Subscription Manager Access to the CDN
- On the network gateway and the HTTP Proxy, open the following hostnames, ports and protocols:
Table 2.1. Required Hostnames, Ports and Protocols
Hostname Port Protocol subscription.rhn.redhat.com 443 https cdn.redhat.com 443 https *.akamaiedge.net 443 https - In the Satellite Server, complete the following details in the file:
/etc/rhsm/rhsm.conf:# an http proxy server to use (enter server FQDN) proxy_hostname = http_proxy.example.com # port for http proxy server proxy_port = 3128 # user name for authenticating to an http proxy, if needed proxy_user = # password for basic http proxy auth, if needed proxy_password =
2.2.2. Installing Through an ISO Image
# rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
- Download the ISO image from the Red Hat SAM repository in the Red Hat Customer Portal.
- As the root user, mount the ISO image to a directory:
#
mkdir/media/iso #mount-o loop [iso_filename] /media/iso - Change directory to
/media/iso. - Run the installer script in the mounted directory:
# ./install_packages
SAM is now installed on your host system.
2.3. Installing and Configuring Enhanced Reporting
- The
crondservice must be running. - An additional 4 GB of disk space must be available for the reporting database journal.
- Additional packages
- splice
- ruby193-rubygem-splice_reports
- spacewalk-splice-tool
Important
- Register the host system. Use the
--auto-attachoption to attach the required subscriptions for the operating system immediately.[root@server ~]# subscription-manager register --auto-attach Username: jsmith@example.com Password:
- Wait several minutes for the updated content repositories to be added to the system configuration.
- Enable the
rhel-6-server-sam-rpmsrepository.If the Enhanced Updates (EUS) repository is enabled, then disable it, either as part of theyumconfiguration (as in this example) or when runningyumto install packages. There are conflicts in the Ruby packages between the EUS repository and the Subscription Asset Manager repository.[root@server ~]# subscription-manager repos --enable rhel-6-server-sam-rpms --disable rhel-server-rhscl-6-eus-rpms Loaded plugins: product-id, refresh-packagekit ========================= repo: rhel-6-server-sam-rpms ========================= [rhel-6-server-sam-rpms] bandwidth = 0 base_persistdir = /var/lib/yum/repos/x86_64/6Server baseurl = https://cdn.redhat.com/content/dist/rhel/server/6/6Server/x86_64/subscription-asset-manager/1/os cache = 0 cachedir = /var/cache/yum/x86_64/6Server/rhel-6-server-sam-rpms cost = 1000 enabled = 1 enablegroups = True exclude = failovermethod = priority ...
- Install Subscription Asset Manager and reporting packages:
[root@server ~]# yum install -y katello-headpin-all splice ruby193-rubygem-splice_reports spacewalk-splice-tool
- After installing the packages, run the Subscription Asset Manager configuration script,
katello-configure.The required parameters for the basic installation are the deployment type, which issam, and an administrator password.While not required, it is useful to specify an initial organization name for your deployment. If this is not set, then the first organization has a default name of ACME_Corporation.This sets up the Subscription Asset Manager instance with the default user and database settings.[root@server ~]# katello-configure --deployment=sam --org=Example_Org --user-pass=admin Starting Katello configuration The top-level log file is [/var/log/katello/katello-configure-20130904-210539/main.log]

Figure 2.1. The Reports Menu Item
2.4. Additional Examples of the Configuration Script
katello-configure script. This creates the associated subscription service databases, a default administrative user, and default server settings. Any of these deployment settings can be altered by invoking the appropriate arguments in the configuration script.
/usr/share/katello/install/default-answer-file. All of the attributes in the file can be passed when the katello-configure script to allow more relevant values to be set.
Note
katello-configure help output and man page.
Example 2.1. Setting the Org and Deployment Type
sam option should ever be used, but this option must be explicitly stated (otherwise, it is set to katello).
[root@server ~]# katello-configure --deployment=sam --user-pass=admin
ACME_Corporation; using the --org option overwrites the default to something more relevant.
[root@server ~]# katello-configure --deployment=samm --user-pass=admin --org=QA_Lab_West_DatacenterExample 2.2. Creating an Admin User
admin and the password admin.
--user-name and --user-pass options. (There is one other configuration option for the admin user, to set that user's email address.)
[root@server ~]# katello-configure --deployment=sam --user-name=samadmin --user-pass=secret --user-email=admin@example.comExample 2.3. Setting up LDAP Authentication
katello.yml) and the other file sets the connection information for the LDAP directory (ldap_fluff.yml).
[root@server ~]# katello-configure --deployment=sam --user-pass=admin --auth-method=ldap --ldap-roles=true --ldap-server=ldap.example.com --ldap-port=389 --ldap-server-type=":posix" --ldap-encryption=start_tls --ldap-users-basednou=People,dc=example,dc=com --ldap-groups-basedn="ou=Groups,dc=example,dc=com" --ldap-anon-queries=trueExample 2.4. Using an Answer File
/usr/share/katello/install/default-answer-file. This can be copied to create your specific answer file.
# Path of the answer file. answer-file = # Katello administrative user (default: admin) user-name = samadmin # Katello user's password (default: admin) user-pass = admin # Katello user's email (default: root@localhost) user-email = admin@example.com # Katello initial Organization (default: ACME_Corporation) org-name = Example_Org .... # Deployment type (one of "katello", "headpin", "cfse", "sam") deployment = sam ....
katello-configure command, using the --answer-file argument. For example, if the file is sam-config-file in the /tmp directory:
[root@server ~]# katello-configure --answer-file=/tmp/sam-config-file
--deployment option is needed because it was set to sam in the answer file.
2.5. Subscription Asset Manager Installation Logs
/var/log/katello/var/log/thumbslug/var/log/candlepin/var/log/tomcat6
2.6. Upgrading Subscription Asset Manager
- Back up the Subscription Asset Manager instance before beginning the upgrade procedure. Backing up a Subscription Asset Manager instance is covered in Section 9.1, “Backing up Subscription Asset Manager”.
- Stop all Subscription Asset Manager services:
[root@server]# katello-service stop
If thekatello-servicecommand is not available, then stop the associated services manually:[root@server]# service katello stop [root@server]# service katello-jobs stop [root@server]# service httpd stop [root@server]# service tomcat6 stop [root@server]# service elasticsearch stop
Important
Do not turn off thepostgresqlservice. - Flush the indexes.
- Start the Elasticsearch service:
# service elasticsearch start
- Flush the indexes:
# curl localhost:9200/_flush
- Stop the Elasticsearch service:
# service elasticsearch stop
- Upgrade the Subscription Asset Manager packages with
yum:[root@server]# yum upgrade
yumavoids overwriting the current Subscription Asset Manager configuration by creating a set of.rpmnewand.rpmsavefiles. Check these files against the existing configuration for any new changes.For a list of configuration files, run the following command:[root@server]# rpm -ql katello-configure | grep erb | grep etc | sed 's/.*etc/\/etc/' | sed 's/\.erb//'
For a list of.rpmnewfiles, run the following command:[root@server]# find /etc -name *rpmnew
- Upgrade Subscription Asset Manager using the upgrade script.
[root@server]# katello-upgrade
The upgrade script prompts for confirmation for each part of the upgrade process. For example:1/1: Update Candlepin (0003_update_candlepin.sh) Updates Candlepin database schema to the latest version Do you want to proceed? (y/n): y Update Candlepin OK.
- Run
katello-configureto correct any configuration files and analyze log output for errors.[root@server]# katello-configure
Note
In some cases, the configuration process is not finished after runningkatello-configureonce. You will need to runkatello-configureagain to finish the configuration process. You can safely runkatello-configureas many times as required to finish the configuration process, but twice is usually sufficient. - Start the Subscription Asset Manager server:
[root@server]# katello-service start
- Test the Subscription Asset Manager server:
[root@server]# katello-service status [root@server]# katello -u admin -p admin password ping
- Update the port settings on every Subscription Asset Manager agent system.The QPIDD port changed from 5674 to 5671 after Subscription Asset Manager 1.1. All systems connecting to Subscription Asset Manager using katello-agent must be updated to use port 5671.
- Upgrade your system to the latest version of katello-agent and goferd.
- Open the Katello plug-in configuration file:
[root@server]# vim /etc/gofer/plugins/katelloplugin.conf
- Edit the
urlline to change port number.url=ssl://$(host):
5671 - Restart the katello-agent and goferd services.
- Open port 5671 on your Subscription Asset Manager firewall. For example, add the following rule to iptables:
-A INPUT -p tcp -m state --state NEW -m tcp --dport 5671 -j ACCEPT
2.7. Logging into the Subscription Asset Manager Web UI
2.7.1. Supported Browsers
- Firefox 21 and 22
- Internet Explorer 9
2.7.2. The Web UI URL
/sam directory, https://hostname/sam. For example:
https://server.example.com/sam
2.7.3. The Default User
admin and the password admin.
Chapter 3. Managing Users and Access Controls
3.1. About Users, Roles, and Access Controls
- The organization or organizations to which is applies
- Users which belong to the role
- The permissions which those users have within the organization

Figure 3.1. Users, Organizations, and Permissions in a Role
Table 3.1. Subscription Asset Manager Components and Allowed Permissions
| Component | Possible Permissions |
|---|---|
| Organization: Organization Entries |
|
| Organization: Distributor Entries |
|
| Organization: System Entries |
|
| Activation Keys |
|
| System Groups |
|
| Providers |
|
3.2. Managing User Accounts
3.2.1. Adding Users
- Hover over the menu, and click the item.

- Click the link in the left column of the Users page.
- Enter the information for the new user, including a username and password.

- Select a default organization. This is the organization which automatically comes up when the user logs into the Subscription Asset Manager UI. If no default is set, then the default in the Subscription Asset Manager configuration is used.
- Click the button.
3.2.2. Changing a Password
- Hover over the menu, and click the item.

Note
To change your own personal password, click the username displayed in the admin menu. - Select the user from the list in the column on the left of the Users page.
- Enter the new password in the Change Password: field, and then re-enter it to confirm it.
- Click the button.
3.3. Creating a Role
- Hover over the menu, and click the item.

- Click the link in the left column of the Roles page.
- Enter the name of the role and, optionally, a description.

- Click the button.
3.4. Setting up Access Controls
- Hover over the menu, and click the item.

- Click the name of the role.
- Set up the permissions for the role.The Permissions area defines two things: the organizations which are associated with the role and the permissions granted for those organizations.
- Click .

- Select the organization.A single role can be associated with multiple organization, but the permissions are set on each organization individually. So, configure all the permissions for one organization and then select another and configure all of the permissions for that.

- At the bottom of the window, click the Add Permission item.

- Select the component (organization, activation key, provider, or group) for which to add the permission.
- Click .
- When the target is selected, then there is a selection box which lists the available permissions for that target. The available permissions are outlined in Table 3.1, “Subscription Asset Manager Components and Allowed Permissions”.

- Click .
- Enter a name and, optionally, a description for the permission.
- Click the .
- Click the name of the role at the top of the role edit window.

- Next, add at least one administrator user for the role. Even if LDAP authentication (Section 3.5, “Managing Users with LDAP Authentication”) is used for other users in the role, at least one administrator from within Subscription Asset Manager is required.
- Click the item.

- All of the users in Subscription Asset Manager are listed. Click the Add nad Remove labels by the usernames to manage membership in the role.

3.5. Managing Users with LDAP Authentication
3.5.1. Supported LDAP Service Types
- Red Hat Directory Server (as a POSIX directory)
- OpenLDAP (as a POSIX directory)
- Red Hat Identity Management
- Microsoft Active Directory
3.5.2. Using LDAP Authentication
3.5.2.1. About LDAP Users in Subscription Asset Manager

Figure 3.2. User Authentication with LDAP
- Only Subscription Asset Manager database authentication or LDAP authentication can be used, not both.
- All users must already exist in the LDAP directory for them to be able to access Subscription Asset Manager. Subscription Asset Manager pulls information from LDAP. It cannot create an LDAP user.If no corresponding LDAP user account exists, then attempting to log into Subscription Asset Manager fails with this error:
User must exist in ldap before defining here
- A corresponding Subscription Asset Manager user account is created whenever an LDAP user first authenticates to Subscription Asset Manager.
3.5.2.2. Enabling LDAP Authentication
- The
katello.ymlconfiguration file is what flags Subscription Asset Manager to use LDAP authentication (warden:) and to use LDAP for roles (ldap_roles:). - Subscription Asset Manager uses the Ruby LDAP Fluff module for authentication details. The information on the LDAP server, such as its type, hostname and port, and user base distringuished name (DN), are defined in the the
ldap_fluff.ymlfile.
katello_configure command.
- Create a new Subscription Asset Manager administrative user that has the same username as an administrative user in the LDAP directory. Creating users is covered in Section 3.2.1, “Adding Users”.
Warning
Once LDAP authentication is enabled, no existing Subscription Asset Manager users can log into the Subscription Asset Manager instance. If no LDAP user is seeded into the Subscription Asset Manager instance, than you could be locked out of the server once LDAP authentication is enabled. - Add the admin user to a global administrator role.
- Set the Subscription Asset Manager instance to use LDAP authentication instead of its local database.
[root@server ~]#katello-configure --auth-method=ldap
- Set the LDAP connection information.The required settings are slightly different, depending on what type of LDAP directory is used.There are some settings that are required by all directory types:
--ldap-server-typeto identify the backend LDAP directory--ldap-serverfor the hostname or IP address of the LDAP server--ldap-portfor the standard LDAP port--ldap-users-basednfor the DN (or directory location) of the users subtree--ldap-groups-basednfor the DN (or directory location) of the groups subtree
Then each directory has addition configuration requirements.For POSIX directories--ldap-encryption, which must be set toStart_tls--ldap-anon-queriesset totrueto allow anonymous searches
For example:[root@server ~]#katello-configure --ldap-server-type=":posix" --ldap-server=rhds.example.com --ldap-port=389 --ldap-users-basedn=ou=people,dc=example,dc=com --ldap-groups-basedn=ou=groups,dc=example,dc=com --ldap-encryption=start_tls --ldap-anon-queries=true
For Active Directory directories--ldap-ad-domainto pass the Active Directory domain name--ldap-anon-queriesset tofalseto prevent anonymous searches--ldap-service-user, which sets an identity to use for directory queries--ldap-service-pass, which gives the password for the service user
For example:[root@server ~]#katello-configure --ldap-server-type=":active_directory" --ldap-server=ads.example.com --ldap-port=389 --ldap-users-basedn=cn=Users,dc=win-ads,dc=example,dc=com --ldap-groups-basedn=cn=Domain Admins,cn=Users,dc=win-ads,dc=example,dc=com --ldap-anon-queries=false --ldap-service-user=Administrator --ldap-service-pass=secret --ldap-ad-domain=ads.example.com
For Red Hat Identity Management directories--ldap-anon-queriesset tofalseto prevent anonymous searches--ldap-service-user, which sets an identity to use for directory queries--ldap-service-pass, which gives the password for the service user
For example:[root@server ~]#katello-configure --ldap-server-type=":free_ipa" --ldap-server=ipa.example.com --ldap-port=389 --ldap-users-basedn=dc=example,dc=com --ldap-groups-basedn=cn=groups,cn=accounts,dc=example,dc=com --ldap-anon-queries=false --ldap-service-user=admin --ldap-service-pass=secret
- Restart Subscription Asset Manager:
[root@server ~]# katello-service restart
3.5.3. Using LDAP Group and Role Mappings
3.5.3.1. About LDAP Groups and Subscription Asset Manager Roles
3.5.3.2. Enabling LDAP Group-Role Mapping
- Set the
ldap-rolesconfiguration setting toTRUE:[root@server ~]# katello-configure --ldap-roles=true
- Restart the
katelloservice to load the new configuration.[root@server ~]# service katello restart
- Add the LDAP group to the desired Subscription Asset Manager roles.
- Hover over the menu, and click the item.

- Click the name of the role to edit in the list in the left column of the Roles page.
- Click the option for the role.

- Click , and select as many LDAP groups as required for this role.
Chapter 4. Setting up Organizations and Distributors
4.1. About the Structure of Organizations and Distributors

Figure 4.1. Hosted Content Delivery and On-Premise Subscription Service
Important

Figure 4.2. A Hierarchy with Distributors
4.2. Managing Organizations
4.2.1. Creating a New Organization
- Create the organization in Subscription Asset Manager.
- Hover over the menu, and click the item.

- In the left column, click the link.
- Fill in the name of the new organization, and optionally, a description. A label (internal identifier) is automatically created based on the name, but this can be edited.

- Click the button.
- Register the organization in the Customer Portal Subscription Management. There is a direct relationship between the organization in Subscription Asset Manager and the organization in the Red Hat account configuration.
- Log into the Customer Portal.
- Open the Subscriptions tab, hover over the Subscription Management item, and select the Subscription Management Applications item.

- In the Subscription Asset Manager Organizations tab, click the Register a Subscription Asset Manager Organization link.

- Fill in the required information for the new organization:
- The name for the organization
- The type of the organization; the options are supplied based on the available subscirpionts for the account
- The version of the Subscription Asset Manager instance; the options are based on the available subscriptions for the account

Note
This name should correspond to the organization name set in Subscription Asset Manager. - Click the Register button.
- In the Customer Portal, attach subscriptions to the organization, and download and import the manifest in the Subscription Asset Manager organization entry, as described in Section 4.4.2, “Managing Manifests for Organizations”.
4.2.2. Removing an Organization

Figure 4.3. Removing an Organization
4.2.3. Setting the Default Organization

Figure 4.4. Setting a Default Organization
4.2.4. Setting Autoattach Preferences
Note
- Standard
- None
- Premium
- Self-Support

Figure 4.5. Setting Autoattach Preferences
4.3. Managing Distributors (TECH PREVIEW)
- Create the distributor entry in the Subscription Asset Manager organization.
- Hover over the menu, and click the item.

- In the left column, click the link.
- Fill in the name of the new distributor.

- Click the button.
- Set up the other Subscription Asset Manager instance and organization.
- In the original Subscription Asset Manager instance, attach subscriptions to the organization, and download and import the manifest in the other Subscription Asset Manager organization, as described in Section 4.4.3, “Managing Manifests for Distributors (TECH PREVIEW)”.
4.4. Importing and Maintaining Manifests
4.4.1. About Manifests
Important
manifest.zip
|
|- consumer_export.zip
|
|- export/
|
|- consumer_types/
|
|- entitlements/
|
|- entitlement_certificates/
|
|- products/
|
|- rules/
|
|- consumer.json
|
|- meta.jsonThese JSON files contain a little information about the application organization entry (the UUID) and the manifest itself (version and creation date).
consumer_types/ contains a list of JSON files, one for each supported application type. The JSON files indicate which type the subscriptions are attached to. For example, for Subscription Asset Manager, the sam.json has a manifest value of true.
{"id":"5","label":"sam","manifest":true}
entitlements/ contains a JSON file for each subscription attached to the application organization. Each filed is named UUID.json.
...
{"id":"8a878dcd3520d43501353f6f98f911e9","productName":"Red Hat Enterprise Linux Server","productId":"69","updated":"2012-02-02T18:59:32.000+0000","created":"2012-02-02T18:59:32.000+0000"}],"endDate":"2012-10-13T03:59:59.000+0000","quantity":50,"productName":"Red Hat Enterprise Linux Server, Premium (4 sockets) (Up to 4 guests)","contractNumber":"2625891","accountNumber":"1506376","productId":"RH0153936","subscriptionId":"2267347","consumed":31,"exported":30,"sourceEntitlement":null,"activeSubscription":true,"restrictedToUsername":null,"productAttributes":[{"productId":"RH0153936","name":"support_type","value":"L1-L3","id":"8a878dcd3520d43501353f6f98f811de","updated":"2012-02-02T18:59:32.000+0000","created":"2012-02-02T18:59:32.000+0000"}
...
entitlement_certificates/ contain PEM files with the base 64-encoded blob of the entitlement certificate for each subscription.
products/ contains JSON file for every product included with the subscriptions. This contains detailed information about supported versions and content sets, dependencies, repositories, and other product-specific (but not necessarily subscription-specific) information.
...
{"name":"Red Hat Enterprise Linux Server","id":"69","attributes":[{"name":"type","value":"SVC"},{"name":"arch","value":"i386,ia64,x86_64"},{"name":"name","value":"Red Hat Enterprise Linux Server"}],"multiplier":1,"href":"/products/69","productContent":[{"content":{"name":"Red Hat Enterprise Linux 5 Server Beta (Source ISOs)","id":"861","type":"file","vendor":"Red Hat","modifiedProductIds":[],"contentUrl":"/content/beta/rhel/server/5/$releasever/$basearch/source/iso","label":"rhel-5-server-beta-source-isos","gpgUrl":"http://","metadataExpire":86400,"requiredTags":"rhel-5-server"},"enabled":false}
...
rules/ contains a single JavaScript file which sets the functions that the application uses to interact with the backend Red Hat subscription management service.
4.4.2. Managing Manifests for Organizations
4.4.2.1. Attaching Subscriptions to Organizations
- Log into the Customer Portal.
- Open the Subscriptions tab, and select the Overview item under the Subscription Management menu area.
- In the Usage area on the right, click the Subscription Management link.

- In the Subscription Management Applications column, click the organization type.
- Click the organization name in the application inventory.

- Open the tab.

- Click the link to open the subscription selection window.
- Select the checkboxes by the subscriptions to attach and set the total quantity for the application organization in the Quantity column.
The list of available subscriptions provides three important pieces of information:- The contract number for the purchase of the subscription, which is important for record keeping and tracking.
- The quantity still available for that subscription. Subscriptions are purchased in quantities; this number tells how many are still left of the total quantity purchased.
- The start and end dates of the subscription. This keeps you from attaching a subscription that may only be valid a few days before it expires or which are not yet active.There should probably be a mix of subscriptions, with different end dates, attached to the organization to make it easier to renew subscriptions without having to update the manifest.
Note
The quantity defaults to be the total number of subscriptions available for that contract. Be aware of how many subscriptions are being attached to a single application organization so that the subscriptions can be attached appropriately among other units and subscription management applications. - Click the button in the lower left corner.
4.4.2.2. Downloading the Manifest
manifest.zip archive to the local filesystem, so it can then be uploaded to Subscription Asset Manager or Satellite 6.

Figure 4.6. Downloading the Application Organization Manifest
4.4.2.3. Uploading a Subscription Manifest
- Open the Subscription Asset Manager UI, and log in as an administrator for the organization associated with the manifest.
- If necessary, expand the organizations menu in the upper left corner, and select the appropriate organization.
- Hover over the Subscriptions tab, and click the Red Hat Subscriptions item.

- Click the link.
If a manifest has been loaded previously for the organization, then some details for the existing manifest are filled in the details page. - Click the Browse button and navigate to the downloaded manifest file.
- Click the Upload button.
4.4.2.4. Refreshing Manifests for Organizations
Important
- Update the manifest in the Customer Portal.
- Log into the Customer Portal.
- Open the Subscriptions tab, hover over the Subscription Management item, and select the Subscription Management Applications itemi.
- All registered applications are listed. Search for the specific application organization or switch to the product-specific tab, and search for the system there.

- Click the organization name in the application inventory.
- Open the tab.
- Delete any previous subscriptions which need to be updated. Select the checkbox by the subscription, and click the Remove Selected button.A subscription quantity attached to a subscription management application organization cannot be changed directly. If additional numbers need to be added or removed from an attached subscription, delete the original assignment and then attach the subscription with the new quantity.For example, if your subscription bloc has a quantity of 30 and it should increase to 35, you can delete the old bloc and add a new one with a quantity of 35; that leaves you with one subscription and a quantity of 35. Alternatively, you can simply add a new bloc with a quantity of 5; that results in two separate subscription entries, one with a quantity of 30 and one with a quantity of 5.
- Add any new subscriptions.
- Open the Subscription Asset Manager UI and log in as the organization administrator.
- If necessary, switch to the appropriate organization.
- Hover over the Subscriptions tab, and click the Red Hat Subscriptions item.

- In the manifest's Import area, click the button.
The updated manifest is pulled directly from the Customer Portal.
Note
4.4.2.5. Viewing the Manifest Import History
- Open the Subscription Asset Manager UI and log in as the organization administrator.
- If necessary, switch to the appropriate organization.
- Hover over the Subscriptions tab, and click the Import History item.

- Every import operation is listed in the history.

4.4.3. Managing Manifests for Distributors (TECH PREVIEW)
Important
- Open the Subscription Asset Manager UI and log in as the organization administrator.
- If necessary, switch to the appropriate parent organization.
- Hover over the Subscriptions tab, and click the Subscription Manager Applications item.

- Select the distributor from the list in the left column.
- In the distributor's Subscriptions tab, select the subscriptions to add in the Available Subscriptions area.
Be sure to set the appropriate quantity of subscriptions for each product selected. The quantity is the total number of subscriptions of that type available to the child organization. - Scroll down, and click the at the bottom of the window.Attaching subscriptions automatically updates the child organization's manifest.
- At the top of the Subscriptions tab for the distributor, click the button to export the manifest.

- Open the web UI for the child Subscription Asset Manager organization.
- Upload the manifest to the child organization, as decribed in Section 4.4.2.3, “Uploading a Subscription Manifest”.
Chapter 5. Managing Systems and Subscriptions
5.1. About Subscriptions on Systems
- By manually adding and removing subscriptions
- By autoattaching subscriptions based on the installed products and system characteristics
- By registering the system with activation keys to pre-attach subscriptions
5.1.1. About Relationships Between Subscriptions and Systems
5.1.1.1. Interactions with Subscriptions, Products, and Systems
- Associate a single quantity of a product with a single system (which is the most common relationship).
- Restrict one product so that it cannot be installed on the same system as a specific, different product.
- Keep a system on a consistent service level. Each subscription includes a definition for what service level (e.g., standard or premium) the product has. Subscription clients first try to assign subscriptions of the same service level (and this can be enforced) so that the system has consistent support levels.
- Allow virtual guests to inherit some subscriptions from their host.
- Allow some hosts to have unlimited guests for a data center deployment.
- Allow a single “subscription” to be broken across multiple systems. This works in something like Red Hat Cloud Infrastructure, where a single purchase actually covers four products — Red Hat Enterprise Linux, Red Hat OpenStack, Red Hat Virtualization, and Satellite 6 — and those products each have their own subscription which can be used on different systems to create the stack.
- Stack or combine subscriptions of the same type to cover a system.
5.1.1.2. Counting Subscriptions
- Multiple products with a single subscription (Red Hat Cloud Infrastructure)
- Inheritable subscriptions
- Data center subscriptions, which allow unlimited virtual guests (and only the host requires a specific subscription)
5.2. Registering a System
- Install the configuration RPM to configure Red Hat Subscription Manager to point to the Subscription Asset Manager instance. For example:
[root@server ~]# rpm -ivh http://sam.example.com/pub/candlepin-cert-consumer-latest.noarch.rpm
- Register the system using the
subscription-managercommand. The organization name is required; if the username or password are not passed with the command, then the command prompts for them. Using--auto-attachto apply subscriptions automatically is not required, but it simplifies setting up the new system.[root@server ~]# subscription-manager register --username=jsmith --password=secret --org="IT Dept" --auto-attach
This command must be run as root.
5.3. Using System Groups
- Hover over the Systems tab, and select the System Groups option.
- In the left column of the groups page, click the + New System Group link.
- Enter the name for the group and, optionally, a description and system limit. The system limit sets a limit on how many systems can belong to the group; the default is for the group membership to be unlimited.

- Click the button.
- Clicking the save button opens the Systems tab for the new group. Search for the systems to add; using a wild card (an asterisk, *) lists all systems.Select the systems to add from the drop-down list, and click the button.

5.4. Viewing Subscriptions for the Organization
- Open the Subscription Asset Manager UI and log in as the organization administrator.
- If necessary, switch to the appropriate organization.
- Hover over the Subscriptions tab, and click the Red Hat Subscriptions item.

- Click the name of the subscription in the left column to view its details.The details page includes its support level, account number, and system attributes used for the products.
The Products tab lists every product included in the subscription; expanding the product displays information about its repository location.
5.5. Viewing Installed Products for a System
- Hover over the Systems tab in the top menu and select the All item.
- Select the name of the system from the column on the left.
- Open the Content tab.
- Every product currently installed on the system is listed, with the subscription status for each displayed.

5.6. Manually Managing Subscriptions
5.6.1. Attaching Subscriptions to a System
Note
subscription-manager refresh command from the command line interface.
- Hover over the Systems tab in the top menu and select the All item.
- Select the name of the system from the column on the left.
- Open the Subscriptions tab.
- In the Available Subscriptions list, select the checkboxes by the names of the subscriptions to attach to the system.

- Click the button.
5.6.2. Removing Subscriptions
- Hover over the Systems tab in the top menu and select the All item.
- Select the name of the system from the column on the left.
- Open the Subscriptions tab.
- In the System Current Subscriptions list, select the checkbox by the name of the subscription to remove.

- Click the button.
5.7. Configuring Autoattach Preferences for a System
Note
- Hover over the Systems tab in the top menu and select the All item.
- Select the name of the system from the column on the left.
- Open the Subscriptions tab.
- Click the edit icon in the top box to change the autoattach settings.

- Select the appropriate autoattach setting.The options in the list depend on the available support levels in the subscriptions for the organization. From a high level, the options are:
- Enable autoattach and use a specific system-level preference for the support level.
- Enable autoattach and use the default support level preference for the organization.
- Disable autoattach and set the support level preference to either a system-level setting or the organizational default. (In either case, the preference is not used since autoattach is disabled.)
- Click the button.
5.8. Running Autoattach Operations Manually
5.8.1. Running Autoattach on All Systems
- Hover over the Systems tab in the top menu and select the All item.
- In the main page for systems, click the button.

5.8.2. Running Autoattach on a Single System
- Hover over the Systems tab in the top menu and select the All item.
- In the search box on the left of the systems column, search for the specific system.
- Click the name of the system in the column on the left.
- Click the Subscriptions tab for the system.
- In the upper right of the subscriptions area, click the button.

Chapter 6. Using Activation Keys
6.1. About Activation Keys
- Attaching predefined subscriptions
- Assigning the system to identified system groups
Note
6.2. Creating an Activation Key
- Log into the Subscription Asset Manager UI.
- Hover over the Subscriptions item in the top menu, and click the Activation Keys item.

- Click the button in the upper left column.
- Enter the string for the key in the Name field. This is the string that will be used by clients to redeem the subscriptions at registration.
Optionally, enter a description for the key. - Click the button.
6.3. Attaching and Updating Subscriptions for an Activation Key
- Log into the Subscription Asset Manager UI.
- Hover over the Subscriptions item in the top menu, and click the Activation Keys item.

- Select the activation key from the column on the left.
- Click the tab. A list of available subscriptions is displayed. If more than one subscription is available for the same product, then the product is listed and must be expanded (by clicking the arrow by its name) to select which specific subscription to use.

- Select the checkbox by the subscriptions to add to the key.
- Click the butto.
6.4. Assigning System Groups to a Key
- Log into the Subscription Asset Manager UI.
- Hover over the Subscriptions item in the top menu, and click the Activation Keys item.

- Select the activation key from the column on the left.
- Click the tab.
- Click the Select options dropdown menu to expose the list of available system groups, and select the checkboxes by the system groups to include with the key.

- Click the button.
6.5. Registering a System Using an Activation Key
6.5.1. Using Activation Keys from the GUI
- Install the configuration RPM to configure Red Hat Subscription Manager to point to the Subscription Asset Manager instance. For example:
[root@server ~]# rpm -ivh http://sam.example.com/pub/candlepin-cert-consumer-latest.noarch.rpm
- Launch Subscription Manager with the
--registeroption to open the registration screens immediately.[root@server ~]# subscription-manager-gui --register
- Check the I will use an Activation Key checkbox and click the button.

- Enter the name of the organization to which the system will belong, the activation key value (an alphanumeric string), and the system name to use for the entry in Subscription Asset Manager.

- Click the button.
6.5.2. Using Activation Keys from the Command Line
- Install the configuration RPM to configure Red Hat Subscription Manager to point to the Subscription Asset Manager instance. For example:
[root@server ~]# rpm -ivh http://sam.example.com/pub/candlepin-cert-consumer-latest.noarch.rpm
- Then, run the
registercommand with the--activationkeyparameter to attach the configured subscriptions.[root@server ~]# subscription-manager register --username=jsmith --password=secret --org="IT Dept" --activationkey=abcd1234
If there are multiple organizations — or even if there is only a single organization but it is possible for there to be multiple ones — it is still necessary to specify the organization for the system. That information is not defined in the activation key.
Chapter 7. Managing Virtual Hosts and Guests
7.1. Supported Hypervisors
virt-who process can detect and associate guests on several different types of hypervisors:
- Red Hat Enterprise Virtualization (KVM)
- Xen
- HyperV
- VMware ESX
7.2. About Host/Guest Associations
virt-who process on the hypervisor.
- The appropriate virtual detection process must be run periodically to detect new guest instances.
- The hypervisor and the guest systems must be registered to the same Subscription Asset Manager instance.
- The hypervisor must have a subscription attached to it that includes virtual subscriptions or inheritable subscriptions.
7.3. Setting up a RHEV (KVM) or Xen Hypervisor
- Configure the Subscription Manager application to use the Subscription Asset Manager service and CA certificate.
[root@rhel-server ~]# rpm -ivh http://sam.example.com/pub/candlepin-cert-consumer-latest.noarch.rpm
- Then register the system as a hypervisor and attach any required subscriptions.
[root@rhel-server ~]# subscription-manager register
--type=hypervisor--username=admin --password=secret --org=1234 --auto-attachThe organization ID should be available in the Subscription Asset Manager UI or in the Portal entry for the organization. If another system is already registered to that organization, then the ID is available using thesubscription-manager orgscommand. - Install the
virt-whopackages on the hypervisor.[root@server ~]# yum install virt-who
- Open the
virt-whoconfiguration file (/etc/sysconfig/virt-who) and set it to use thelibvirtdservice with the hypervisor.VIRTWHO_LIBVIRT=1
- Start the
virt-whoservice.[root@server ~]# service virt-who start
- Configure every host in the RHEV/Xen environment.
- Create and register virtual machines as normal.
7.4. Setting up a VMware Hypervisor
Note
virt-who packages that create the host/guest mapping are available for Red Hat Enterprise Linux. In a VMware environment, there must be a Red Hat Enterprise Linux system available to run the virt-who process which connects to the VMware hypervisor.
- Configure the Subscription Manager application on the virtual system to use the Subscription Asset Manager service and CA certificate.
[root@rhel-server ~]# rpm -ivh http://sam.example.com/pub/candlepin-cert-consumer-latest.noarch.rpm
- Then register the Red Hat Enterprise Linux system (which communicates with the VMware server) as a hypervisor.
[root@rhel-server ~]# subscription-manager register
--type=hypervisor--username=admin --password=secret --org=1234-56789 --auto-attachThe organization ID should be available in the Subscription Asset Manager UI or in the Portal entry for the organization. If another system is already registered to that organization, then the ID is available using thesubscription-manager orgscommand.By default, the hypervisor name is esx hypervisor UUID. This name can be changed in the Subscription Asset Manager UI by editing the system entry. - Install the
virt-whopackages.[root@server ~]# yum install virt-who
- Open the
virt-whoconfiguration file (/etc/sysconfig/virt-who) and set it to use the Subscription Asset Manager instance and the appropriate vCenter server.- Set that the VMware server will interact with a Subscription Asset Manager instance.
VIRTWHO_BACKGROUND=1 VIRTWHO_SAM=1
- Enable ESX mode, and set the environment to
Library:VIRTWHO_ESX=1 VIRTWHO_ESX_ENV=Library
- Specify the owner of the subscriptions. This must be the ID or name of an organization that is created within the Subscription Asset Manager instance. For example:
VIRTWHO_ESX_OWNER=6340056
The organization ID should be available in the Subscription Asset Manager UI or in the Portal entry for the organization. If another system is already registered to that organization, then the ID is available using thesubscription-manager orgscommand. - Set the hostname or IP address of the vCenter server:
VIRTWHO_ESX_SERVER=vcenter.example.com
- Specify the username and password to use when connecting to the vCenter server:
VIRTWHO_ESX_USERNAME=admin VIRTWHO_ESX_PASSWORD=secret
- Save the changes to the configuration file.
- Start the
virt-whoservice; this begins gathering all of the host/guest data.[root@rhel-server ~]# service virt-who start
The data are added to the/var/lib/virt-who/hypervisor-systemid-UUIDfile. - Use
chkconfigto configure thevirt-whoservice so that it starts automatically when the system starts.[root@rhel-server ~]# chkconfig virt-who on
7.5. Registering Guest Instances
Note
virt-who process must be running on the virtual host or on a hypervisor in the environment (for VMware) to ensure that virt-who process maps the guest to a physical host, so the system is properly registered as a virtual system. Otherwise, the virtual instance will be treated as a physical instance.
- Configure the Subscription Manager application on the virtual system to use the Subscription Asset Manager service and CA certificate.
[root@virt-server ~]# rpm -ivh http://sam.example.com/pub/candlepin-cert-consumer-latest.noarch.rpm
- Then register the system to the same organization as its host.
[root@virt-server ~]# subscription-manager register --username=admin --password=secret --org=12345-67-8901 --auto-attach
The organization ID should be available in the Subscription Asset Manager UI or in the Portal entry for the organization. If another system is already registered to that organization, then the ID is available using thesubscription-manager orgscommand.
7.6. Creating a Data Center
virt-who process to create the host/guest mapping.
- Set up the host or hypervisor, as described in Section 7.3, “Setting up a RHEV (KVM) or Xen Hypervisor” or Section 7.4, “Setting up a VMware Hypervisor”.
- Attach the data center subsription to the hypervisor entry. The name of the subscription is Red Hat Enterprise Linux for Virtual Datacenters ... System:Physical.
- Register all guests for that host/hypervisor, as described in Section 7.4, “Setting up a VMware Hypervisor”.
Note
7.7. Removing and Restoring Host and Guest Accounts
7.7.1. Removing a Guest Entry
[root@virt-guest ~]# subscription-manager unregister
virt-who cannot tell whether the service is deleted or paused. In that case, the system must be removed manually from Subscription Asset Manager.
- Log into the Subscription Asset Manager UI.
- Hover over the Systems item in the top menu, and click the All item.

- Click the name of the system in the column on the left.
- At the top of the system's details page, click the Remove System link.
7.7.2. Removing a Hypervisor Entry
- Unregister the hypervisor.
[root@rhel-server ~]# subscription-manager unregister
- For VMware, delete the UUID file,
/var/lib/virt-who/hypervisor-systemid-UUID, to remove the host/guest mapping records.
7.7.3. Reregistering a Hypervisor
[root@sam-server ~]# headpin -u admin -p admin system remove_deletion --uuid=<system uuid>
[root@rhel-server ~]# subscription-manager register --username admin-example --password secret --org=12345678-90 --consumerid=7d133d55-876f-4f47-83eb-0ee931cb0a97
subscription-manager orgs command.
Chapter 8. Viewing System-Level Subscription Information
8.1. Viewing the High-Level Information in the Dashboard

Figure 8.1. The Subscription Asset Manager Dashboard
- Current subscriptions mean that a system has a subscription for every install product, in the appropriate quantity.
- Invalid subscriptions mean that a system has installed products but at least one of those products has no corresponding subscription for it.
- Insufficient subscriptions is a slightly more complex state. It means that at least one installed product has some subscriptions for it, but not enough. Each subscription states some attribute that applies to it. For example, an operating system subscription may specify a certain number of cores or a certain amount of RAM. If a system has four cores and the subscription specifies that it covers two sockets, then the system requires two subscriptions. If only one subscription is attached, then the system is in an insufficient state.
8.2. Viewing Server Notifications

Figure 8.2. Notifications in the Dashboard

Figure 8.3. Changing the Number of Notifications Displayed

Figure 8.4. Notification Link in the Admin Menu

Figure 8.5. List of Notifications
8.3. Viewing System Administrative Notifications

Figure 8.6. Event History in the Menu

Figure 8.7. List of Notifications
8.4. Checking Individual System Status
- Hover over the Systems tab in the top menu and select the All item.
- In the search box on the left of the systems column, search for the specific system.
- Click the name of the system in the column on the left.
Figure 8.8. Status Icon in the System List
- The Details tab shows the status and (if current) the expiration date for the subscriptions.

Figure 8.9. Status Details
- The Subscriptions tab also shows the status and the expiration date (if subscriptions are current). Additionally, the Subscriptions tab has a list of available and attached subscriptions, so that the subscriptions for the system can be reassigned as necessary.

Figure 8.10. Status and Subscription Lists
8.5. Remediating Problem Subscription Status
8.6. Creating Subscription Asset Manager Usage Reports
8.6.1. Prerequisites
- All of the prerequisites in Section 2.1, “Prerequisites”.
- The
crondservice must be running. - An additional 4 GB of disk space must be available for the reporting database journal.
- Additional packages for the reporting server
- splice
- ruby193-rubygem-splice_reports
- spacewalk-splice-tool
8.6.2. Setting up Reporting After Installation
yum:
[root@server ~]# yum install splice ruby193-rubygem-splice_reports spacewalk-splice-tool

Figure 8.11. The Reports Menu Item
8.6.3. Creating Report Filters
- The organizations to check for the report
- The subscription statuses to include
- The date range to check; this looks for systems which had the status within the given range, which may not necessarily be the current status for the system
Note
- All systems that have changed to invalid or insufficient (status) in the past 24 hours.
- All systems that will have invalid or insufficient subscriptions (meaning, the existing subscriptions will expire) within the next three months.
- Click the Reports item in the administration menu.

- In the left column, click the New Filter link.
- Fill in the required information for the report, including the organizations, statuses, date range, and active states.

- Click the button.
Note
8.6.4. Running Reports
- Click the Reports item in the administration menu.
- In the left column, click the name of the report filter to run.
- Scroll to the bottom of the report page, and click the button.
Alternatively, the report results can be exported to a CSV file instead of being rendered in the Subscription Asset Manager UI. To export the data, click the button.The data are exported to a CSV file and, optionally, a JSON file which contains the system details. These files are contained in a ZIP archive namedreport-YEAR-MONTH-DAY-TIMESTAMPZ.zip.Note
Selecting the Encrypt export checkbox means that the exported CSV and JSON files are encrypted and can only be accessed by a private key used by Red Hat support.
8.6.5. Subscription Asset Manager Reports Results and Data

Figure 8.12. Report Results

Figure 8.13. Report Results: System Details
_id, record, CHECK-IN TIME, STATUS, DB ID, SATELLITE SERVER, HOSTNAME, ORGANIZATION, LIFECYCLE STATE,
{"ident"=>"072c8bdd-ca00-43d4-a000-0887c75b90c8"}, 522e0970af5d242094000002, 2013-09-09T14:23:27Z, "Current", "072c8bdd-ca00-43d4-a000-0887c75b90c8", "sam-server.example.com", "server.example.com", "ACME_Corporation", "Active",[{"_id":{"$oid":"522e0970af5d242094000002"},"_types":["MarketingProductUsage"],"instance_identifier":"072c8bdd-ca00-43d4-a000-0887c75b90c8","updated":"2013-09-09T17:46:24Z","splice_server":"sam13-dlackey-demo","name":"server.example.com","facts":{"memory_dot_memtotal":"3780964", ...8.6.6. Enhanced Reporting Logs
By default, enhanced reporting takes up to 200 MB of additional log space on a system. Logs grow at roughly 750 KB per system per month.
/etc/splice/logging/basic.cfg.
All of the errors, messages, and operations for the sync tool are recorded in a specific tool log at /var/log/splice/spacewalk_splice_tool.log
8.7. Using Subscription Asset Manager to Generate Satellite Usage Reports
spacewalk-reports) to export information on the system inventory, organizations and associated subscritions, errata, and users. Subscription Asset Manager provides enhanced reporting for Satellite 5.6 through the spacewalk-splice-tool reports. The spacewalk-splice-tool utility draws on the same Satellite 5.6 data, but parses and presents it in an updated, more detailed way.
8.7.1. About Satellite Consolidated Reports
8.7.1.1. The Advantages of Enhanced Reporting
- Determining actual subscription usage based on system attributes, host/guest relationships, and installed products.
- Tracking historical subcription usage based on subscription statuses at different points in time.
Important
8.7.1.2. Differences in Subscription Statuses from Satellite
8.7.1.3. Syncing Data from Satellite 5.6 to Subscription Asset Manager
- System information (called system facts in Subscription Asset Manager) including the hostname, socket count, any host/guest relationships, and other relevant attributes
- Satellite organizations and associated subscriptions
- User information, including roles and administrator accounts such as Satellite Administrator and Organization Administrator
- Satellite cloned channels and their associated, originating channel.
spacewalk-reports report, using the spacewalk-splice-checkin process. The information then is sent to the Subscription Asset Manager server. This synchronization step is run every four hours, by default.

Figure 8.14. Satellite 5.6 to Subscription Asset Manager Sync

Figure 8.15. Subscription Asset Manager to Reporting Server Sync
8.7.1.4. Users in Satellite 5.6 and Subscription Asset Manager
Note
8.7.2. Prerequisites
- A dedicated Subscription Asset Manager instance specifically for Satellite reporting.
Warning
A Subscription Asset Manager instance used for enhanced reporting can only be used as a reporting server for Satellite. It cannot be used as a regular Subscription Asset Manager instance to manage systems or data could be lost. - All of the prerequisites in Section 2.1, “Prerequisites”.
- The
crondservice must be running. - An additional 4 GB of disk space must be available for the reporting database journal.
- Additional packages for the reporting server
- splice
- ruby193-rubygem-splice_reports
- spacewalk-splice-tool
8.7.3. Configuring Reporting
- Install Subscription Asset Manager as described in Section 2.2, “Basic Installation and Setup for Subscription Asset Manager”, using the additional packages covered in Section 2.3, “Installing and Configuring Enhanced Reporting”.
- Register the host system. Use the
--autoattachoption to attach the required subscriptions for the operating system immediately.[root@server ~]# subscription-manager register --autoattach Username: jsmith@example.com Password:
- Wait several minutes for the updated content repositories to be added to the system configuration.
- Enable the
[rhel-6-server-sam-rpms]repository.[root@server ~]# yum-config-manager --enable rhel-6-server-sam-rpms Loaded plugins: product-id, refresh-packagekit ========================= repo: rhel-6-server-sam-rpms ========================= [rhel-6-server-sam-rpms] bandwidth = 0 base_persistdir = /var/lib/yum/repos/x86_64/6Server baseurl = https://cdn.redhat.com/content/dist/rhel/server/6/6Server/x86_64/subscription-asset-manager/1/os cache = 0 cachedir = /var/cache/yum/x86_64/6Server/rhel-6-server-sam-rpms cost = 1000 enabled = 1 enablegroups = True exclude = failovermethod = priority ...
- Install the
katello-headpin-allpackage usingyum install:[root@server ~]# yum install -y katello-headpin-all splice ruby193-rubygem-splice_reports spacewalk-splice-tool
This can also be done when installing from an ISO image (Section 2.2.2, “Installing Through an ISO Image”) by using the--enhanced_reportingoption.[root@server cdrom]# ./install_packages --enhanced_reporting
- The reporting database is a MongoDB database. Set up the Mongo service on the system to start automatically, and then start the service.
[root@sam-server ~]# chkconfig mongod on [root@sam-server ~]# service mongod start
- Run the configuration script to set up the Subscription Asset Manager server, the default admin user, and the initial organization.
[root@server ~]# katello-configure --deployment=sam --org=Example_Org --user-name=samadmin --user-pass=secret
The Subscription Asset Manager admin user is not the same as the Satellite 5.6 admin user. - Still on the Subscription Asset Manager machine, create an SSH key to use to authenticate to the Satellite 5.6 machine.
[root@sam-server ~]# su - splice -s /bin/sh -c 'ssh-keygen -t rsa -f /var/lib/splice/id_rsa-sat -N ""' Generating public/private rsa key pair. Your identification has been saved in /var/lib/splice/id_rsa-sat. Your public key has been saved in /var/lib/splice/id_rsa-sat.pub. The key fingerprint is: 78:fa:c9:68:71:a2:a7:c1:ec:35:e3:43:ce:27:b7:d8 splice@dhcp129-162.rdu.redhat.com The key's randomart image is: +--[ RSA 1024]----+ | | | | | | | . | | . S | | o +o. | | +==+ | | ..+BOo. | | o++=E. | +-----------------+
- Switch to the Satellite 5.6 machine.
- Create a new user which can run the required Satellite reports to sent to the Subscription Asset Manager server.
[root@sat-server ~]# useradd swreport
- Add the key file that was created on the Subscription Asset Manager machine to the
authorized_keysfile for theswreportuser on the Satellite 5.6 machine. Include thecommand=option to restrict theswreportuser to only running Satellite reports on the system.[root@sat-server ~]# vim /home/swreport/.ssh/authorized_keys command="/usr/bin/spacewalk-report $SSH_ORIGINAL_COMMAND" \ ssh-rsa key_hash swreport@sat-server
Thecommanddirective should be all on one line in the keys file. - Set the proper permissions on the
.sshdirectory and theauthorized_keysfile:[root@sat-server ~]# chown -R swreport:swreport /home/swreport/.ssh [root@sat-server ~]# chmod 700 /home/swreport/.ssh [root@sat-server ~]# chmod 600 /home/swreport/.ssh/authorized_keys
- Add the
swreportsuser to theapachesystem group so that it can connect to the database.[root@sat-server ~]# gpasswd -a swreport apache
- Switch back to the Subscription Asset Manager machine.
- Switch to the reporting service user (
splice), and test that the user can SSH into the Satellite machine using theswreportkey.[root@sam-server ~]# su - splice -s /bin/bash [splice@sam-server ~]$ ssh -i /var/lib/splice/id_rsa-sat swreport@sat-server.example.com splice-export
Accept the key fingerprint if prompted. - Edit the reporting configuration to recognize the Satellite 5.6 server.
[root@sam-server ~]# vim /etc/splice/checkin.conf [spacewalk] host=sat-server.example.com ssh_key_path=/var/lib/splice/id_rsa-sat login=swreport
- Edit the reporting configuration to use the Subscription Asset Manager administrator password that was set during the Subscription Asset Manager setup.
admin-pass=secret
- On the Subscription Asset Manager server, run the sync utility to populate the Subscription Asset Manager database with the Satellite 5.6 data.
[root@sam-server ~]# su - splice -s /bin/bash [splice@sam-server ~]$ spacewalk-splice-checkin
Note
This can a long time to run on the initial sync operation.To improve the tool performance, set the number of threads for thespacewalk-splice-toolprocess to use. This should be one thread for every two cores on a low-utilization system or one thread for every three cores on a high-utilization system.For example:[root@sam-server]# /etc/splice/checkin.conf num-threads=3
- Get the Satellite 5.6 manifest from the Customer Portal.
- Log into the Customer Portal.
- Expand the Subscriptions tab, and select the Subscription Management > Subscription Management Applications item.

- Open the Satellite tab.
- If the Portal entry does not already exist, create the Satellite 5.6 entry and attach the required subscriptions.
- In the Satellite tab, click the Register a Satellite link.

- Fill in the required information for the Satellite 5.6 instance:
- The name for the Satellite server entry.
- The version of the Satellite instance; this should be 5.6.

- Click the Register button.
- In the Satellite 5.6 server's Subscriptions tab, select the subscriptions to add in the Available Subscriptions area.
Be sure to set the appropriate quantity of subscriptions for each product selected. The quantity is the total number of subscriptions of that type available to the child organization. - Scroll down, and click the at the bottom of the window.Attaching subscriptions automatically updates the child organization's manifest.
- In the Satellite 5.6 server's entry page, click the button, and save the archive file.

- Log into the Subscription Asset Manager UI (
https://sam-hostname/sam) as a Satellite administrator, and switch to the appropriate Satellite 5.6 organization. - Open the Subscriptions > Subscriptions tab, and click the Import Manifest link.

- In the middle of the import tab, click browse to navigate to the saved manifest file.
- Click the button.
8.7.4. Running Reports and Getting Results
- The organizations to check for the report
- The subscription statuses to include
- The date range to check; this looks for systems which had the status within the given range, which may not necessarily be the current status for the system
Note
8.7.4.1. Creating Report Filters
- Click the Reports item in the administration menu.

- In the left column, click the New Filter link.
- Fill in the required information for the report, including the organizations, statuses, date range, and active states.

- Click the button.
8.7.4.2. Running Reports
- Click the Reports item in the administration menu.
- In the left column, click the name of the report filter to run.
- Scroll to the bottom of the report page, and click the button.
Alternatively, the report results can be exported to a CSV file. To export the data, click the button.The data are exported to a CSV file and, optionally, a JSON file which contains the system details. These files are contained in a ZIP archive namedreport-YEAR-MONTH-DAY-TIMESTAMPZ.zip.Note
Selecting the Encrypt export checkbox means that the exported CSV and JSON files are encrypted and can only be accessed by a private key used by Red Hat support.
8.7.4.3. Subscription Asset Manager Reports Results and Data

Figure 8.16. The Reports Results

Figure 8.17. The Reports Results: System Details
Note
_id, record, CHECK-IN TIME, STATUS, DB ID, SATELLITE SERVER, HOSTNAME, ORGANIZATION, LIFECYCLE STATE,
{"ident"=>"072c8bdd-ca00-43d4-a000-0887c75b90c8"}, 522e0970af5d242094000002, 2013-09-09T14:23:27Z, "Current", "072c8bdd-ca00-43d4-a000-0887c75b90c8", "sam-server.example.com", "server.example.com", "ACME_Corporation", "Active",[{"_id":{"$oid":"522e0970af5d242094000002"},"_types":["MarketingProductUsage"],"instance_identifier":"072c8bdd-ca00-43d4-a000-0887c75b90c8","updated":"2013-09-09T17:46:24Z","splice_server":"sam13-dlackey-demo","name":"server.example.com","facts":{"memory_dot_memtotal":"3780964", ...8.7.5. Troubleshooting Enhanced Reports
8.7.5.1. Enhanced Reporting Logs
By default, enhanced reporting takes up to 200 MB of additional log space on a system. Logs grow at roughly 750 KB per system per month.
/etc/splice/logging/basic.cfg.
All of the errors, messages, and operations for the sync tool are recorded in a specific tool log at /var/log/splice/spacewalk_splice_tool.log
8.7.5.2. Common Problems
- Q: Why are no systems displayed in the report?
- Q: Why are all systems marked as invalid?
- Q: I updated subscriptions for a system or my Satellite server in Subscription Asset Manager, but those changes are not being reflected in the report.
- Q: The link to the Satellite 5.6 UI in the report results is returning an HTTP 404 error.
- The information isn't being pulled from the Satellite server.
- The information is not being properly transmitted from Subscription Asset Manager into the reporting database.
- The information is not being properly stored in the database.
- The information stored in Subscription Asset Manager is outdated.
/var/log/splice/spacewalk_splice_tool.log.
[root@sam-server ~]# service mongod status [root@sam-server ~]# telnet localhost 27017
[root@sam-server ~]# mongo checkin_service --eval "printjson(db.marketing_product_usage.count())"
[root@sam-server ~]# /usr/bin/splice-debug
/tmp directory name splice-debug-YYYY-MM-DD-TIME. For example, /tmp/splice-debug-2013-06-14-T15-22-19.
[root@sam-server ~]# su - splice -s /bin/bash [splice@sam-server ~]$ spacewalk-splice-checkin
rhn-search process is running on the Satellite 5.6 machine.
8.7.5.3. Other Known Issues
If a Subscription Asset Manager instance used in enhanced reporting has non-Satellite organizations added to it, those organizations may be overwritten and removed in the Subscription Asset Manager database as part of the sync process.
Warning
Chapter 9. Managing Subscription Asset Manager Instances
9.1. Backing up Subscription Asset Manager
root.
- Create the desired backup directory. In this example,
umaskis set so that the directory is created with the proper permissions. Then, the directory is added to thepostgressystem group because Subscription Asset Manager uses a PostgreSQL database as its backend.[root@server]# umask 0017 [root@server]# mkdir /backup [root@server]# chgrp postgres /backup
- Open the backup directory.
[root@server]# cd /backup
- Use
tarorzipto create an archive of all of the Subscription Asset Manager configuration files. For example:[root@server]# tar --selinux -czvf config_files.tar.gz \ /etc/katello \ /etc/elasticsearch \ /etc/candlepin \ /etc/gofer \ /etc/grinder \ /etc/pki/katello \ /etc/pki/pulp \ /etc/qpidd.conf \ /etc/sysconfig/katello \ /etc/sysconfig/elasticsearch \ /root/ssl-build \ /var/www/html/pub/*
- Create a separate archive for the Elastic Search directory.
[root@server]# tar --selinux -czvf elastic_data.tar.gz /var/lib/elasticsearch
- Back up all of the PostgreSQL databases. The default database names are
katelloschemaandcandlepin.If the Subscription Asset Manager instance is not using the default names, then the custom values will be in thedb_nameparameters in thekatello-configure.conffile.[root@server]# grep db_name /etc/katello/katello-configure.conf
Run thepg_dumpcommand for each database to create a backup. This can take several minutes, depending on the sizes of the databases.[root@server]# su postgres -c "pg_dump -Fc katelloschema > /backup/katello.dump" [root@server]# su postgres -c "pg_dump -Fc candlepin > /backup/candlepin.dump"
Thepostgresservice must be running for thepg_dumpcommand to work. If the service is not running, then the databases can be backed up by zipping or tarring the PostgreSQL data directory. For example:[root@server]# tar --selinux -czvf pgsql_data.tar.gz /var/lib/pgsql/data/
Simply archiving the entire directory backs up all databases. Since all of the databases are shut down, the data directory should only be archived during a maintenance period.For more information about PostgreSQL backups, consult thepg_dumpman page or the PostgreSQL documentation. - After running
pg_dump, check that the appropriate.dumpfiles have been created in the specified backup directory. For example:# ls /backup candlepin.dump config_files.tar.gz elastic_data.tar.gz katello.dump
9.2. Restoring Subscription Asset Manager
Warning
Important
root.
- Create a configuration file with the same options as the original instance using the file from the configuration backup, then run the
katello-configurescript.[root@server ~]# katello-configure --answer-file=/etc/katello/katello-configure.conf
- Open the directory containing the backup files. For example:
[root@server ~]# cd backup/
- Check the database names. The default database names are
katelloschemaandcandlepin. If the Subscription Asset Manager instance is not using the default names, then the custom values will be in thedb_nameparameters in thekatello-configure.conffile.[root@server backup]# grep db_name /etc/katello/katello-configure.conf
- Stop all services prior to restoring the databases:
[root@server backup]# katello-service stop
- Restore the system files by extracting the archived files and directories. For example:
[root@server backup]# tar --selinux -xzvf config_files.tar.gz -C / [root@server backup]# tar --selinux -xzvf elastic_data.tar.gz -C /
- Drop the existing Subscription Asset Manager PostgreSQL databases if any exist:
[root@server backup]# service postgresql start [root@server backup]# su postgres -c "dropdb katelloschema" [root@server backup]# su postgres -c "dropdb candlepin"
If all the processes are not stopped first, then the database drop operation can return this error:database xxx is being accessed by other users
- As the
postgresuser, run thepg_restorecommand to restore the databases.[root@server backup]# su postgres -c "pg_restore -C -d postgres /backup/katello.dump" [root@server backup]# su postgres -c "pg_restore -C -d postgres /backup/candlepin.dump"
For more info about PostgreSQL restore operations, see thepg_dumpman page or the PostgreSQL documentation. - Restart all Subscription Asset Manager processes:
[root@server backup]# katello-service restart
- Verify that all services are responding properly by checking the
/var/log/katello/production.loglog file for errors and the/var/log/candlepin/audit.logfile for denials.Attempt to ping the Subscription Asset Manager instance:[root@server backup]# katello -u admin -p admin ping -------------------------------------------------------------------------------- Katello Status Status Service Result Duration Message -------------------------------------------------------------------------------- OK candlepin OK 74ms candlepin_auth OK 38ms elasticsearch OK 37ms katello_jobs OK 39ms
9.3. Regenerating and Replacing CA Certificates
- On the Subscription Asset Manager server, generate a new certificate RPM to install on the clients.This should all be on a single line; each argument is broken out to show the required options.
[root@sam-server ~]# /usr/share/katello/certs/gen-rpm.sh --name "candlepin-cert-consumer-$(hostname)" --version 1.4 --release 2 --packager None --vendor None --group 'Applications/System' --summary "Subscription-manager consumer certificate for Katello instance $(hostname)" --description 'Consumer certificate and post installation script that configures rhsm.' --requires subscription-manager --post /root/ssl-build/rhsm-katello-reconfigure /etc/rhsm/ca/candlepin-local.pem:644=/root/ssl-build/candlepin-cert.crt 2>>/var/log/katello/katello-configure/certificates.log && /sbin/restorecon ./*rpm
This script generates a new RPM containing the new Subscription Asset Manager certificate file and sets up the RPM to install that certificate and properly configuration the Red Hat Subscription Manager client on each system. The arguments for the bash script define the RPM settings:--name,--version, and--releaseset the name of the RPM, in the form name.version-release.rpm.--vendorand--packageare required for the RPM information, but the values do not matter.--groupspecifies the type of application or package which the RPM installs.--summaryand--descriptionjust set information about the RPM.--requiressets packages that must be available or installed before this RPM can be installed. Since this RPM configures the local Red Hat Subscription Manager client, thesubscription-managerpackage is required.--postruns a given command, script, or series of command once the RPM package is installed. In this case, it configures the local Red Hat Subscription Manager client to use the specified Subscription Asset Manager server as its subscription service and sets the required connection and certificate properties in the Red Hat Subscription Manager configuration file.
- Delete any existing certificate RPMs in the
/var/www/html/pubdirectory on the server machine. - Copy the newly-generated RPM to the
/var/www/html/pubdirectory so it can be downloaded via HTTP. - On each Subscription Asset Manager client system, download and install the new RPM. For example:
[root@server1 ~]# rpm -ivh http://SAM_server_hostname/pub/candlepin-cert-consumer-SAM_server_hostname.noarch.rpm
9.4. Setting up Subscription Asset Manager on a Multihomed System
- Configure a self-signed certificate authority (CA) to use to generate the server certificates.
Note
If a CA is already configured or a third-party CA is available to issue certificates, then this step can be skipped.- Create the appropriate directory and subdirectories in
/etc/pki. This example createsmyCA.This command is split onto multiple lines for clarity; this should be run on the same line.[root@server1 ~]# mkdir -m 0755 \ /etc/pki/myCA \ /etc/pki/myCA/private \ /etc/pki/myCA/certs \ /etc/pki/myCA/newcerts \ /etc/pki/myCA/crl - Copy the OpenSSL configuration file to the new PKI directory, and set the appropriate permissions.
[root@server1 ~]# cp /etc/pki/tls/openssl.cnf /etc/pki/myCA/openssl.my.cnf [root@server1 ~]# chmod 0600 /etc/pki/myCA/openssl.my.cnf
- Create an index file.
[root@server1 ~]# touch /etc/pki/myCA/index.txt
- Create a serial number file and seed it with the starting serial number.
[root@server1 ~]# echo '01' > /etc/pki/myCA/serial
- Open the CA directory.
[root@server1 ~]# cd /etc/pki/myCA/
- Generate the self-signed CA certificate. This prompts for information such as the location and company to use in the certificate's subject name.
[root@server1 myCA]# openssl req -config openssl.my.cnf -new -x509 -extensions v3_ca -keyout private/myca.key -out certs/myca.crt -days 1825 ----- Country Name (2 letter code) [XX]:US State or Province Name (full name) []:North Carolina Locality Name (eg, city) [Default City]:Raleigh Organization Name (eg, company) [Default Company Ltd]:Example Organizational Unit Name (eg, section) []:Engineering Common Name (eg, your name or your server's hostname) []:server1 Email Address []:admin@example.com -----
- Edit the OpenSSL configuration file to use the location of the new CA directory (
/etc/pki/myCA/.[root@server1 myCA]# sed -i "s/\/etc\/pki\/CA/\/etc\/pki\/myCA/" openssl.my.cnf
- Create a multi-homed CA configuration file.
[root@server1 myCA]# cp /etc/pki/tls/openssl.cnf /etc/pki/myCA/openssl.my_multihome.cnf
- Edit the multi-homed configuration file.
- Change the CA directory to
/etc/pki/myCA.dir = /etc/pki/myCA
- Uncomment the
copy_extensionsline and set the value tocopy.copy_extensions = copy
- Uncomment th required extensions line and enable version 3 extensions for requests.
req_extensions = v3_req
- Add the subjectAltNames extension, and add the list of other interfaces on the system.
subjectAltName = @alt_names [alt_names] DNS.1 = server2 DNS.2 = server3
- Create and sign the server certificate for Subscription Asset Manager.
- Create the certificate request for Subscription Asset Manager, using the multi-homed configuration file. As with creating the CA certificate, it prompts for information (such as locality and organizational units) to use to build the subject name of the certificate
[root@server1 myCA]# openssl req -config openssl.my_multihome.cnf -new -nodes -keyout private/server.key -out server.csr -days 365 ----- Country Name (2 letter code) [XX]:US State or Province Name (full name) []:North Carolina Locality Name (eg, city) [Default City]:Raleigh Organization Name (eg, company) [Default Company Ltd]:Example Organizational Unit Name (eg, section) []:Engineering Common Name (eg, your name or your server's hostname) []:server1 Email Address []:admin@example.com Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: An optional company name []: -----
- Set the owner and permissions for the generated keys.
[root@server1 myCA]# chown root.apache /etc/pki/myCA/private/server.key [root@server1 myCA]# chmod 0440 /etc/pki/myCA/private/server.key
- Sign the certificate, using the multi-homed configuration file.
[root@server1 myCA]# openssl ca -config openssl.my_multihome.cnf -keyfile ./private/myca.key -cert ./certs/myca.crt -policy policy_anything -out certs/server.crt -infiles server.csr
- Verify that the certificate is valid.
[root@server1 myCA]# openssl verify -purpose sslserver -CAfile /etc/pki/myCA/certs/myca.crt /etc/pki/myCA/certs/server.crt
- Set up the Subscription Asset Manager web server with the new certificates.
- Copy the certificates into the Subscription Asset Manager certificate directory.
[root@server1 myCA]# /etc/pki/myCA/certs/server.crt /etc/pki/katello/ [root@server1 myCA]# /etc/pki/myCA/certs/myca.crt /etc/pki/katello/ [root@server1 myCA]# /etc/pki/myCA/certs/server.key /etc/pki/katello/
- Edit web server configuration file to point to the new certificates.
[root@server1 myCA]# vim /etc/httpd/conf.d/katello.conf SSLCaCertificateFile /etc/candlepin/certs/candlepin-ca.crt SSLCertificateFile /etc/pki/katello/server.crt SSLCertificateKeyFile /etc/pki/katello/server.key - Restart the Subscription Asset Manager services to load the new certificate information.
[root@server1 myCA]# service tomcat6 restart && service pulp-server restart && service katello restart && service katello-jobs restart
- Copy the CA certificate into the
pub/directory for the web server so that clients can download it.[root@server1 myCA]# cp /etc/pki/myCA/certs/myca.crt /var/www/html/pub/
- Import the CA certificate into the browser used to access the SAM web UI.
- Set up new certificate RPMs to use to install the proper configuration and certificates on clients.
- Open the
pubdirectory.[root@server1 myCA]# cd /var/www/html/pub
- Edit the Red Hat Subscription Manager configuration files to use the newly-created CA.
[root@server1 pub]# sed 's/scandlepin-local/smyca/' ~/ssl-build/rhsm-katello-reconfigure > ~/ssl-build/rhsm-katello-reconfigure-myca
- Generate new client RPMs with the new certificate and the updated
rhsm.conffile.[root@server1 pub]# SERVER_NAMES="server1 server2 server3" [root@server1 pub]# for KATELLO_SERVER in $SERVER_NAMES; do sed "s/KATELLO_SERVER=.*/KATELLO_SERVER=${KATELLO_SERVER}/" ~/ssl-build/rhsm-katello-reconfigure-myca > ~/ssl-build/rhsm-katello-reconfigure-myca-${KATELLO_SERVER};/usr/share/katello/certs/gen-rpm.sh --name "candlepin-cert-consumer-${KATELLO_SERVER}" --version 1.0 --release 2 --packager None --vendor None --group 'Applications/System' --summary "Subscription-manager consumer certificate for Katello instance ${KATELLO_SERVER}" --description 'Consumer certificate and post installation script that configures rhsm.' --post /root/ssl-build/rhsm-katello-reconfigure-myca-${KATELLO_SERVER} /etc/rhsm/ca/candlepin-local.pem:666=/root/ssl-build/candlepin-cert.crt /etc/rhsm/ca/myca.pem:666=/etc/pki/myCA/certs/myca.crt && /sbin/restorecon ./*rpm; doneThis creates a new RPM for each interface in the multi-homed configuration.For example:./candlepin-cert-consumer-server1.noarch.rpm ./candlepin-cert-consumer-server1.src.rpm ./candlepin-cert-consumer-server2.noarch.rpm ./candlepin-cert-consumer-server2.src.rpm ./candlepin-cert-consumer-server3.noarch.rpm ./candlepin-cert-consumer-server3.src.rpm
- Install the updated RPMs, for each interface, on all of the Subscription Asset Manager clients.
[root@sam-client ~]# yum -y install http://server1/pub/candlepin-cert-consumer-server1.noarch.rpm [root@sam-client ~]# yum -y install http://server2/pub/candlepin-cert-consumer-server2.noarch.rpm [root@sam-client ~]# yum -y install http://server3/pub/candlepin-cert-consumer-server3.noarch.rpm
9.5. Subscription Asset Manager Log and File Locations
Table 9.1. Different Logs for Subscription Asset Manager
| Log Location | Description |
|---|---|
/var/log/katello/katello-configure/main.log | Installation logs. |
/var/log/tomcat6/catalina.out | Logs for the subscription services, which run as Tomcat applications. |
/var/log/katello/production.log | Logs for the Subscription Asset Manager UI and REST API. |
/var/log/katello/thin-log.port#.log | Output from the thin server, one per active port. |
/var/log/thumbslug/error.log | An errors log for the certificate proxy. |
Chapter 10. Red Hat Access Plug-in
10.1. Red Hat Access Plug-in
- Search solutions in the Customer Portal from within the Red Hat SAM interface.
- Access your open support cases, modify an open support case, and open a new support case from within the Red Hat SAM interface.
Note
10.1.1. Searching for Solutions in the Red Hat Access Plug-in
- In the top right, click → .
- To log into the Red Hat Customer Portal: In the main panel top right, click .
Note
To access Red Hat Customer Portal resources, you need to log in with your Red Hat Customer Portal user identification and password. - In the Red Hat Search: field, enter your search query. Search results display in the left-hand Recommendations list.
- In the Recommendations list, click a solution. The solution article displays in the main panel.
10.1.2. Viewing Existing Support Cases Using the Red Hat Access Plug-in
- In the top right, click → → .
- In the main panel top right, click to log into the Red Hat Customer Portal. If you are already logged in, skip this step.
Note
To access Red Hat Customer Portal resources, you must log in with your Red Hat Customer Portal user identification and password. - To search for a specific support case from existing cases, do any of the following:
- In the Search field, provide a key word or phrase.
- From the drop-down list, choose a specific Case Group. Your organization has defined Case Groups inside the Red Hat Customer Portal.
- Choose a Case Status.
- From the results, choose a specific support case and click the Case ID. The support case is ready to view.
10.1.3. Modifying Existing Support Cases Using the Red Hat Access Plug-in
Complete the instructions from the previous section.
- Attachments: - Attach a local file from the system. Add a filename to make it easier to identify.
Note
Filenames must have less than 80 characters. The maximum file size for web uploaded attachments is 250 MB. Use FTP for larger files. - Case Discussion: - Add any updated information about the case you wish to discuss with Global Support Services. After adding information, click .
10.1.4. Creating New Support Cases Using the Red Hat Access Plug-in
- In the top right, click → → .
- In the main panel top right, click to log into the Red Hat Customer Portal. If you are already logged in, skip this step.
Note
To access Red Hat Customer Portal resources, you must log in with your Red Hat Customer Portal user identification and password. - The Product and Product Version fields are automatically populated. Complete the other relevant fields, as follows:
- Summary: - Provide a brief summary of the issue.
- Description: - Write a detailed description of the issue.
Note
Based on the summary, recommendations for possible solutions display in the main panel.
- Click . A second screen displays.
- Choose the appropriate options, as follows:
- Severity: Select the ticket urgency as 4 (low), 3 (normal), 2 (high> or 1 (urgent).
- Case Group: Based on who needs to be notified, create case groups associated with the support case. Select Case Groups in Red Hat Satellite. Create Case Groups within the Customer Portal.
- Attach any required files. Add a file description and click .To ensure you provide relevant information, it is recommended that you attach the output of the following commands:
# sosreport # foreman-debug
Important
foreman-debugremoves all security information such as password, tokens and keys while collecting information. However, the tarball can still contain sensitive information about the Red Hat Satellite Server. It is recommended to send this information directly to the intended recipient and not publicly.Note
Filenames must have less than 80 characters. The maximum file size for web uploaded attachments is 250 MB. Use FTP for larger files. - Click . The system uploads the case to the Customer Portal, and provides a case number for your reference.
Appendix A. Revision History
| Revision History | |||
|---|---|---|---|
| Revision 1.3-20 | March 25, 2015 | ||
| |||
| Revision 1.3-19 | March 23, 2015 | ||
| |||
| Revision 1.3-18 | March 05, 2015 | ||
| |||
| Revision 1.3-17 | April 13, 2014 | ||
| |||
| Revision 1.3-14 | October 1, 2013 | ||
| |||
