7.5. Optional Configuration Options
7.5.1. Configuring Red Hat Satellite Capsule Server with a Custom Server Certificate
capsule-certs-generate is first run or any time afterward. If capsule-certs-generate has not been run before, see Procedure 7.2, “To Set a Custom Server Certificate When Running capsule-certs-generate for the First Time:”, otherwise see Procedure 7.3, “To Set a Custom Server Certificate After Running capsule-certs-generate:”.
Important
katello-installer parameter --certs-server-ca-cert. It is important to concatenate the certificates in the right order so that the trust chain can be validated.
# cat1st_ca.cert2nd_ca.cert3th_ca.cert>/root/sat_cert/ca.bundle# katello-installer --certs-server-ca-cert/root/sat_cert/ca.bundle--certs-update-server-ca
Important
Prerequisites
- Certificate file for the Capsule Server.
- Capsule certificates generate parameter
--server-cert. In this example,capsule.crt. - Certificate signing request file for the Capsule Server.
- Capsule certificates generate parameter
--server-cert-req. In this example,capsule.crt.req. - Capsule Server's private key used to sign the certificate.
- Capsule certificates generate parameter
--server-key. In this example,capsule.key. - CA certificate.
- Capsule certificates generate parameter
--server-ca-cert. In this example, examplecacert.crt.
Other capsule-certs-generate Parameters
- The parameter
--certs-tarspecifies the name of the archive file to be output by thecapsule-certs-generate. - The parameter
--capsule-fqdnis the Satellite Capsule Server's fully qualified domain name.
Procedure 7.2. To Set a Custom Server Certificate When Running capsule-certs-generate for the First Time:
Note
/root/sat_cert. Using an absolute path in the root users' directory provides a fixed location that is available to all users who log in to the server with root permissions. Before running this command, ensure the directory already exists.
- Run the following command on the Red Hat Satellite Server to create the certificates archive:
# capsule-certs-generate \ --capsule-fqdn "capsule.example.com" \ --certs-tar /root/sat_cert/capsule.example.com-certs.tar \ --server-cert /root/sat_cert/capsule.crt \ --server-cert-req /root/sat_cert/capsule.crt.req \ --server-key /root/sat_cert/capsule.key \ --server-ca-cert /root/sat_cert/cacert.crt
Where:--capsule-fqdnis the Satellite Capsule Server's fully qualified domain name. Mandatory.--certs-taris the name of the tar file to be generated that contains the certificate to be used by the Satellite Capsule installer.--server-certis the path to your certificate, signed by your certificate authority (or self-signed).--server-cert-reqis the path to your certificate signing request file that was used to create the certificate.--server-keyis the private key used to sign the certificate.--server-ca-certis the path to the CA certificate on this system.
- Copy the generated archive file,
capsule.example.com-certs.tar, from the Satellite Server to the Satellite Capsule Server. - On the Satellite Capsule Server:
- Run the following commands to register your Satellite Capsule Server to the Satellite Server:
# rpm -Uvh http://satellite.example.redhat.com/pub/katello-ca-consumer-latest.noarch.rpm # subscription-manager register --org "ACME_Corporation" --env [environment]/[content_view_name]
Note
The Satellite Capsule Server must be assigned to an organization, because it requires an environment to synchronize content from the Satellite Server. Only organizations have environments.Assigning a location is optional, but recommended, to indicate proximity to the hosts that the Satellite Capsule Server is managing. - Depending on the desired Satellite Capsule Server type, choose one of the following options:
Satellite Capsule Server with content functionality
Run the following command on the Satellite Capsule Server to enable the custom certificate. The significant parameter is--pulp="true", which indicates that content functionality is to be enabled.# capsule-installer --pulp="true" \ --qpid-router="true" \ --puppet="true" \ --puppetca="true" \ --reverse-proxy="true" \ --certs-tar "~/capsule.example.com-certs.tar"
Satellite Capsule Server without content functionality
Run the following command on the Satellite Capsule Server to enable the custom certificate. The significant parameter is--pulp="false", which indicates that content functionality is not to be enabled.# capsule-installer --pulp="false" \ --qpid-router="false" \ --puppet="true" \ --puppetca="true" \ --reverse-proxy="true" \ --certs-tar "~/capsule.example.com-certs.tar"
Procedure 7.3. To Set a Custom Server Certificate After Running capsule-certs-generate:
- Run the following command as the
rootuser on the Satellite Server to generate a new certificate based on your custom server certificate:Note
In this example the files are stored in the directory/root/sat_cert. Using an absolute path in therootusers' directory provides a fixed location that is available to all users who log in to the server withrootpermissions. Before running this command, ensure the directory already exists.# capsule-certs-generate \ --capsule-fqdn "capsule.example.com" \ --certs-tar /root/sat_cert/capsule-certs.tar \ --server-cert /root/sat_cert/capsule.crt \ --server-cert-req /root/sat_cert/capsule.crt.req \ --server-key /root/sat_cert/capsule.key \ --server-ca-cert /root/sat_cert/cacert.crt \ --certs-update-server
- Copy the generated archive file,
capsule.example.com-certs.tar, from the Satellite Server to the Satellite Capsule host system. - On the Satellite Capsule Server, re-run the
capsule-installercommand to refresh the certificates. Depending on the desired Satellite Capsule Server type, choose one of the following options:Satellite Capsule Server with content functionality
Run the following command on the Satellite Capsule Server to refresh the certificates. The significant parameter is--pulp="true", which indicates that content functionality is to be enabled.# capsule-installer --pulp="true" \ --qpid-router="true" \ --puppet="true" \ --puppetca="true" \ --reverse-proxy="true" \ --certs-tar "capsule.example.com-certs.tar"
Satellite Capsule Server without content functionality
Run the following command on the Satellite Capsule Server to refresh the certificates. The significant parameter is--pulp="false", which indicates that content functionality is not to be enabled.# capsule-installer --pulp="false" \ --qpid-router="false" \ --puppet="true" \ --puppetca="true" \ --reverse-proxy="true" \ --certs-tar "capsule.example.com-certs.tar"
7.5.2. Using Power Management Features on Managed Hosts
7.5.2.1. Installing a Capsule Server with BMC Options
Have a baseboard management controller (BMC) provider set up for your deployment of Capsule Server.
capsule-installer. You are required to choose either a Capsule Server with content functionality or one without. See Section 7.4.1, “Installing a Capsule Server” for more information.
--bmc "enabled"\ --bmc_default_provider "freeipmi"
- For Capsule Server Installations with content functionality:
# capsule-installer --pulp=true --foreman-oauth-key "xmmQCGYdkoCRcbviGfuPdX7ZiCsdExf"\ --foreman-oauth-secret "w5ZDpyPJ24eSBNo53AFybcnqoDYXgLUA"\ --pulp-oauth-secret "doajBEXqNcANy93ZbciFyysWaiwt6BWU"\ --certs-tar "~/capsule.example.com-certs.tar"\ --qpid-router=true\ --puppet=true\ --puppetca=true\ --reverse-proxy=true\ --bmc "enabled"\ --bmc_default_provider "freeipmi"
- For Capsule Server Installations without content functionality:
# capsule-installer --pulp=false --foreman-oauth-key "xmmQCGYdkoCRcbviGfuPdX7ZiCsdExf"\ --foreman-oauth-secret "w5ZDpyPJ24eSBNo53AFybcnqoDYXgLUA"\ --certs-tar "~/capsule.example.com-certs.tar"\ --qpid-router=false\ --puppet=true\ --puppetca=true\ --reverse-proxy=true
7.5.3. Provisioning Options for Capsule Server
# capsule-installer --help
# capsule-installer --tftp=true\ --foreman-oauth-key "xmmQCGYdkoCRcbviGfuPdX7ZiCsdExf"\ --foreman-oauth-secret "w5ZDpyPJ24eSBNo53AFybcnqoDYXgLUA"\ --certs-tar "~/capsule.example.com-certs.tar"\ --templates=true\ --dhcp=true\ --dhcp-gateway=192.168.122.1\ --dhcp-nameservers=192.168.122.1\ --dhcp-range="192.168.122.100 192.168.122.200"\ --dhcp-interface=eth0\ --dns=true\ --dns-forwarders=8.8.8.8\ --dns-interface=eth0\ --dns-zone=example.com
dns-interface argument is set with the correct network interface name for the DNS server to listen on. Also ensure that the dhcp-interface argument is set correctly with the interface name for the DHCP server. After configuration, create a subnet on the Satellite server under → for the Capsule which registers automatically.
Note
- 192.168.122.1 to 192.168.122.99 (reservation pool) are addresses reserved during bare-metal provisioning by Satellite.
- 192.168.122.100 to 192.168.122.200 (lease pool) are addresses reserved for dynamic clients in the subnet (discovered hosts and unmanaged hosts).

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.