Deploying Red Hat Insights on existing RHEL systems managed by Red Hat Update Infrastructure
Chapter 1. Red Hat Insights deployment on cloud marketplace RHEL managed by RHUI
This Red Hat Insights deployment guide is for users who wish to deploy Red Hat Insights on an existing, cloud marketplace-purchased Red Hat Enterprise Linux (RHEL) system managed by Red Hat Update Infrastructure (RHUI).
1.1. Red Hat Insights deployment overview
To start using Red Hat Insights, you must perform the following actions on each system:
Install the client.Note
Red Hat Enterprise Linux 8 (RHEL8) ships with Red Hat Insights preinstalled, so the insights-client installation procedure is not required on RHEL8 systems. All RHEL systems, no matter which version, must be registered with the Red Hat Insights service.
- Configure the client to use basic authentication.
- Register the system.
1.2. Installing the client package
The insights-client installation procedure is not required on Red Hat Enterprise Linux 8 (RHEL8) systems.
Install the client package on each system.
Enter the following command to install the current version of the insights-client package:
[root@server ~]# yum install insights-client
1.3. Configuring basic authentication for Red Hat Insights
1.3.1. Basic authentication overview
Red Hat Insights can use two types of authentication to validate system access to the Insights services. The default authentication method is through certificates. Certificates are generated when you register a system with Red Hat Subscription Manager (RHSM) or when your system is managed by Red Hat Satellite system management.
An alternative authentication method is through SSO credentials. A valid Red Hat SSO credential is created when you have a valid Red Hat Customer Portal user name. In order to use SSO credentials with Red Hat Insights, you must configure your system to use basic authentication.
220.127.116.11. Configuration requirements for basic authentication
When you configure your system to use single sign-on (SSO) credentials for basic authentication instead of the default certificate-based authentication for Red Hat Insights, you provide Red Hat SSO credentials. SSO credentials are a valid Red Hat Customer Portal user name and password.
To configure basic authentication, a plain-text username and password is stored in the configuration file. As a best practice, create a Red Hat Customer Portal account with SSO credentials that are used only for Red Hat Insights basic authentication. This action avoids exposing the SSO credentials of individual users.
1.3.2. Configuring basic authentication
Red Hat Insights insights-client configuration is managed in
/etc/insights-client/insights-client.conf. This file provides a configuration template for setting up basic authentication. The default configuration for certificate-based authentication is as follows:
auto_config=TRUE authmethod=BASIC username=<your customer portal username> password=<your customer portal password>
- You have a Red Hat SSO username and SSO password that can be stored in clear text.
You have read/write permissions in the directory
insights-clientpackage is installed on your system.
Use a text editor to open the file
<your customer portal username>with a Red Hat SSO username.
<your customer portal password>with a Red Hat SSO password.
- Save the configuration and exit the editor.
Register register the system.
# insights-client --register
1.4. Registering the system to Red Hat Insights
Register the system to communicate with the Red Hat Insights service and to view results displayed in the Red Hat Insights console.
Enter the following command to register the system.
[root@server ~]# insights-client --register
Chapter 2. Viewing your results
System and infrastructure results can be viewed in the https://cloud.redhat.com/insights/overview console.
The Overview provides a view of current risks to your infrastructure. From this starting point, you can investigate how a specific rule is affecting your systems, or take a system-based approach and see all the rules that pose risk to a selected system.
Select Rule hits by severity to view rules by the Total Risk they pose to your infrastructure.
- Select Rule hits by category to see the type of risk they pose to your infrastructure.
- Search for a specific rule by name, or scroll through the list of rules to see high-level information about risk, systems exposed, and availability of Ansible Playbook to automate the remediation.
- Click on a rule to see a description of the rule, learn more from relevant knowledgebase articles, and view a list of systems at risk.
- Click on a system to see specific information about detected issues and steps to resolve the issue.