Integrating provisioning infrastructure services
Configure DNS, DHCP, and TFTP integration
Abstract
Providing feedback on Red Hat documentation
We appreciate your feedback on our documentation. Let us know how we can improve it.
Use the Create Issue form in Red Hat Jira to provide your feedback. The Jira issue is created in the Red Hat Satellite Jira project, where you can track its progress.
Prerequisites
- Ensure you have registered a Red Hat account.
Procedure
- Click the following link: Create Issue. If Jira displays a login error, log in and proceed after you are redirected to the form.
- Complete the Summary and Description fields. In the Description field, include the documentation URL, chapter or section number, and a detailed description of the issue. Do not modify any other fields in the form.
- Click Create.
Chapter 1. Configuring DNS integration
You can integrate DNS with Satellite to automate the creation and management of DNS records when provisioning, modifying, and decommissioning hosts. This helps to ensure a consistent and error-free network configuration.
1.1. DNS service providers
Capsule supports the following DNS providers that you can use to integrate Satellite with your existing DNS infrastructure or deploy a new one:
dns_nsupdate
Dynamic DNS updates on an RFC 2136-compatible DNS server by using the
nsupdate
utility. See:dns_nsupdate_gss
-
Dynamic DNS updates on an RFC 2136-compatible DNS server by using the
nsupdate
utility with Generic Security Service algorithm for Transaction Signature (GSS-TSIG) authentication. See Section 1.6, “Integrating Identity Management DNS with GSS-TSIG authentication”. dns_infoblox
- Dynamic DNS updates on an Infoblox DNS server. See Section 1.7, “Integrating Infoblox DNS”.
1.2. Enabling the installer-managed DNS service
If you do not have a DNS server available in your network, you can use the installer-managed DNS service. This feature enables you to provide a DNS service with low maintenance overhead.
Procedure
Configure Satellite or Capsule as DNS server:
satellite-installer \ --foreman-proxy-dns true \ --foreman-proxy-dns-provider nsupdate \ --foreman-proxy-dns-managed true \ --reset-foreman-proxy-dns-server
# satellite-installer \ --foreman-proxy-dns true \ --foreman-proxy-dns-provider nsupdate \ --foreman-proxy-dns-managed true \ --reset-foreman-proxy-dns-server
Copy to Clipboard Copied! - For each affected Capsule, update the configuration of that Capsule in the Satellite web UI. For more information, see Section 1.8, “Associating the DNS service with a domain and subnet”.
1.3. Integrating a local self-managed DNS service
The installer exposes a limited feature set for the Satellite installer-managed DNS service. For example, you can configure only a single forward DNS zone. As an alternative, you can first use the installer-managed DNS and later convert it to a self-managed DNS server to bypass the limitations.
Prerequisites
- You installed and configured a DNS service on the Satellite Server or Capsule Server host.
- The DNS service supports RFC 2136-compatible updates
Procedure
Set the local, self-managed DNS service on your Satellite Server or Capsule Server:
satellite-installer \ --foreman-proxy-dns true \ --foreman-proxy-dns-provider nsupdate \ --foreman-proxy-dns-managed false \ --foreman-proxy-dns-server "127.0.0.1"
# satellite-installer \ --foreman-proxy-dns true \ --foreman-proxy-dns-provider nsupdate \ --foreman-proxy-dns-managed false \ --foreman-proxy-dns-server "127.0.0.1"
Copy to Clipboard Copied! - For each affected Capsule, update the configuration of that Capsule in the Satellite web UI. For more information, see Section 1.8, “Associating the DNS service with a domain and subnet”.
1.4. Integrating a generic RFC 2136-compatible remote DNS server
If you have a DNS service in your network and it supports RFC 2136-compatible dynamic updates, you can integrate this service into your Satellite Server. The integration enables you to continue using your existing DNS server, and Satellite manages DNS records for hosts during their life cycle.
With this type of integration, Satellite uses a transaction signature (TSIG) key to authenticate to the DNS server and the nsupdate
utility to manage DNS records.
Prerequisites
- The remote DNS service is configured and can be queried.
- The remote DNS service supports RFC 2136-compatible dynamic updates
-
The Remote Name Daemon Control (RNDC) key file to connect to the remote DNS server is placed in
/etc/foreman-proxy/rndc.key
on your Satellite Server or Capsule Server.
Procedure
Update the permissions on
/etc/foreman-proxy/rndc.key
to enable members of theforeman-proxy
group to read this file:chown -v root:foreman-proxy /etc/foreman-proxy/rndc.key chmod -v 640 /etc/foreman-proxy/rndc.key
# chown -v root:foreman-proxy /etc/foreman-proxy/rndc.key # chmod -v 640 /etc/foreman-proxy/rndc.key
Copy to Clipboard Copied! Restore the SELinux context on
/etc/foreman-proxy/rndc.key
:restorecon -v /etc/foreman-proxy/rndc.key
# restorecon -v /etc/foreman-proxy/rndc.key
Copy to Clipboard Copied! Optional: Verify if you can use the key file to manually manage DNS entries:
Create a test DNS entry. For example, host
test.example.com
with anA
record of192.168.25.20
on the DNS server at192.168.25.1
.echo -e "server 192.168.25.1\n \ update add test.example.com 3600 IN A 192.168.25.20\n \ send\n" | nsupdate -k /etc/foreman-proxy/rndc.key
# echo -e "server 192.168.25.1\n \ update add test.example.com 3600 IN A 192.168.25.20\n \ send\n" | nsupdate -k /etc/foreman-proxy/rndc.key
Copy to Clipboard Copied! Verify that you can query the new DNS entry:
host test.example.com 192.168.25.1
# host test.example.com 192.168.25.1
Copy to Clipboard Copied! Example output:
Using domain server: Name: 192.168.25.1 Address: 192.168.25.1#53 Aliases: test.example.com has address 192.168.25.20
Using domain server: Name: 192.168.25.1 Address: 192.168.25.1#53 Aliases: test.example.com has address 192.168.25.20
Copy to Clipboard Copied! If resolved successfully, remove the test DNS entry:
echo -e "server 192.168.25.1\n \ update delete test.example.com 3600 IN A 192.168.25.20\n \ send\n" | nsupdate -k /etc/foreman-proxy/rndc.key
# echo -e "server 192.168.25.1\n \ update delete test.example.com 3600 IN A 192.168.25.20\n \ send\n" | nsupdate -k /etc/foreman-proxy/rndc.key
Copy to Clipboard Copied! Confirm that the DNS entry was removed:
host test.example.com 192.168.25.1
# host test.example.com 192.168.25.1
Copy to Clipboard Copied! If the command returns
Host test.example.com not found: 3(NXDOMAIN)
, the record was successfully deleted.
Configure Satellite Server or Capsule Server to use the DNS server:
satellite-installer \ --foreman-proxy-dns true \ --foreman-proxy-dns-provider nsupdate \ --foreman-proxy-dns-managed false \ --foreman-proxy-dns-server "dns_server_ip_address" \ --foreman-proxy-keyfile /etc/foreman-proxy/rndc.key
# satellite-installer \ --foreman-proxy-dns true \ --foreman-proxy-dns-provider nsupdate \ --foreman-proxy-dns-managed false \ --foreman-proxy-dns-server "dns_server_ip_address" \ --foreman-proxy-keyfile /etc/foreman-proxy/rndc.key
Copy to Clipboard Copied! - For the affected Capsule, update the configuration of that Capsule in the Satellite web UI. For more information, see Section 1.8, “Associating the DNS service with a domain and subnet”.
1.5. Integrating Identity Management DNS with TSIG authentication
If you use Identity Management to centrally manage hosts in your domain, you can integrate the Identity Management DNS service into Satellite Server. The integration enables you to continue using your existing Identity Management DNS service, and Satellite manages DNS records for hosts during their life cycle.
If Satellite Server or Capsule Server is not a member of a Identity Management domain, use a transaction signature (TSIG) key to authenticate to the DNS server. This method provides a lower security and an increased key management effort compared to dynamic updates with generic security service transaction signature (GSS-TSIG) authentication. For more information, see Section 1.6, “Integrating Identity Management DNS with GSS-TSIG authentication”.
Prerequisites
- The Identity Management server is deployed and functional.
- The firewall on the Identity Management server allows access to the required ports. See Port requirements for Identity Management in the Red Hat Enterprise Linux 9 Installing Identity Management guide.
-
You have
root
access on the Identity Management server.
Procedure
Perform the following steps on the Identity Management Server:
Insert the following settings at the top of the
/etc/named.conf
file:include "/etc/rndc.key"; controls { inet Identity Management_server_ip_address port 953 allow { Satellite_ip_address; } keys { "rndc-key"; }; };
include "/etc/rndc.key"; controls { inet Identity Management_server_ip_address port 953 allow { Satellite_ip_address; } keys { "rndc-key"; }; };
Copy to Clipboard Copied! Reload the
named
service:systemctl reload named
# systemctl reload named
Copy to Clipboard Copied!
In the Identity Management web UI:
- Navigate to Network Services > DNS > DNS Zones
- Click the name of the zone.
- Open the Settings tab.
Enter in the BIND update policy field:
grant "rndc-key" zonesub ANY;
grant "rndc-key" zonesub ANY;
Copy to Clipboard Copied! - Set Dynamic update to True.
- Click Update to save the changes.
- Configure dynamic DNS updates in Satellite Server or Capsule Server. For more information, see Section 1.4, “Integrating a generic RFC 2136-compatible remote DNS server”.
1.6. Integrating Identity Management DNS with GSS-TSIG authentication
If you use Identity Management to centrally manage hosts in your domain, you can integrate the Identity Management DNS service into Satellite Server. The integration enables you to continue using your existing Identity Management DNS service, and Satellite manages DNS records for hosts during their life cycle.
If Satellite Server or Capsule Server is a member of a Identity Management domain, use generic security service transaction signature (GSS-TSIG) authentication. This method provides an increased security and a low key management effort compared to TSIG authentication.
1.6.1. Configuring Identity Management to use with Satellite Server
Before you can integrate an existing Identity Management DNS server, you must prepare the Identity Management environment. The preparation work enables Satellite Server to use generic security service transaction signature (GSS-TSIG) authentication to update DNS entries.
Prerequisites
- The Identity Management domain is deployed and functional.
- Identity Management is configured with its integrated DNS service.
- The firewall on the Identity Management servers allow access to the required ports. For more information, see Port requirements for IdM in Red Hat Enterprise Linux 9 Installing Identity Management.
Procedure
On a host that is a member of the Identity Management domain, obtain a Kerberos ticket for the
admin
user:kinit admin
# kinit admin
Copy to Clipboard Copied! Create a new Kerberos principal Satellite Server to be used for authentication on the Identity Management server:
ipa service-add capsule/satellite.example.com
# ipa service-add capsule/satellite.example.com
Copy to Clipboard Copied! Optional: Add a forward DNS zone:
ipa dnszone-add example.com
# ipa dnszone-add example.com
Copy to Clipboard Copied! Display the BIND update policy of the forward zone:
ipa dnszone-show example.com --all | \ grep "BIND update policy"
# ipa dnszone-show example.com --all | \ grep "BIND update policy"
Copy to Clipboard Copied! Example output:
BIND update policy: grant EXAMPLE.COM krb5-self * A; grant EXAMPLE.COM krb5-self * AAAA; grant EXAMPLE.COM krb5-self * SSHFP;
BIND update policy: grant EXAMPLE.COM krb5-self * A; grant EXAMPLE.COM krb5-self * AAAA; grant EXAMPLE.COM krb5-self * SSHFP;
Copy to Clipboard Copied! Note the value of the setting.
Update the forward zone settings:
ipa dnszone-mod example.com \ --dynamic-update=TRUE \ --allow-sync-ptr=TRUE \ --update-policy="<existing_policy> grant smartproxy\047foreman.example.com@EXAMPLE.COM wildcard * ANY;"
# ipa dnszone-mod example.com \ --dynamic-update=TRUE \ --allow-sync-ptr=TRUE \ --update-policy="<existing_policy> grant smartproxy\047foreman.example.com@EXAMPLE.COM wildcard * ANY;"
Copy to Clipboard Copied! This command modifies the zone settings as follows:
- Dynamic zone updates are enabled.
- Identity Management updates the corresponding PTR record in the reverse DNS zone if an A or AAAA record is updated in the forward zone.
- The Kerberos principal created in an earlier step is authorized to modify any type of any data record. Note that you must append this setting to the existing value.
Optional: Add a reverse DNS zone:
ipa dnszone-add 0.168.192.in-addr.arpa
# ipa dnszone-add 0.168.192.in-addr.arpa
Copy to Clipboard Copied! Display the BIND update policy of the reverse zone:
ipa dnszone-show 0.168.192.in-addr.arpa --all | \ grep "BIND update policy"
# ipa dnszone-show 0.168.192.in-addr.arpa --all | \ grep "BIND update policy"
Copy to Clipboard Copied! Example output:
BIND update policy: grant EXAMPLE.COM krb5-subdomain 0.168.192.in-addr.arpa. PTR;
BIND update policy: grant EXAMPLE.COM krb5-subdomain 0.168.192.in-addr.arpa. PTR;
Copy to Clipboard Copied! Note the value of the setting.
Update the reverse zone settings:
ipa dnszone-mod 0.168.192.in-addr.arpa \ --dynamic-update=TRUE \ --update-policy="<existing_policy> grant smartproxy\047foreman.example.com@EXAMPLE.COM wildcard * ANY;"
# ipa dnszone-mod 0.168.192.in-addr.arpa \ --dynamic-update=TRUE \ --update-policy="<existing_policy> grant smartproxy\047foreman.example.com@EXAMPLE.COM wildcard * ANY;"
Copy to Clipboard Copied! Note that you must append the update policy to the existing value.
1.6.2. Configuring Capsules for use with Identity Management
After you have prepared the Identity Management DNS server as described in Section 1.6.1, “Configuring Identity Management to use with Satellite Server”, integrate the DNS server into your Satellite Server or Capsule Server.
Prerequisites
- You set the DNS search domain of the host to the Identity Management DNS domain.
-
You know the Kerberos principal the host should use to authenticate to the Identity Management DNS server, for example,
capsule/satellite.example.com
.
Procedure
If your Satellite Server or Capsule Server is not yet a member of the Identity Management domain:
Install the
ipa-client
package:satellite-maintain packages install ipa-client
# satellite-maintain packages install ipa-client
Copy to Clipboard Copied! Install the Identity Management client:
ipa-client-install
# ipa-client-install
Copy to Clipboard Copied! Follow the on-screen prompts.
Obtain a Kerberos ticket for the
admin
user:kinit admin
# kinit admin
Copy to Clipboard Copied! Remove the
/etc/foreman-proxy/dns.keytab
file:rm --force /etc/foreman-proxy/dns.keytab
# rm --force /etc/foreman-proxy/dns.keytab
Copy to Clipboard Copied! Obtain a Kerberos keytab file for your Capsule and store it in the
/etc/foreman-proxy/dns.keytab
file:ipa-getkeytab -p capsule/satellite.example.com@EXAMPLE.COM \ -k /etc/foreman-proxy/dns.keytab
# ipa-getkeytab -p capsule/satellite.example.com@EXAMPLE.COM \ -k /etc/foreman-proxy/dns.keytab
Copy to Clipboard Copied! ImportantWhen adding a keytab to a standby system with the same host name as the original system in service, pass the
-r
option to theipa-getkeytab
command to prevent generating new credentials and rendering the credentials on the original system invalid.Set the owner and group of
/etc/foreman-proxy/dns.keytab
toforeman-proxy
:chown foreman-proxy:foreman-proxy /etc/foreman-proxy/dns.keytab
# chown foreman-proxy:foreman-proxy /etc/foreman-proxy/dns.keytab
Copy to Clipboard Copied! Verify that the
/etc/foreman-proxy/dns.keytab
file is valid:Use the file to obtain a Kerberos ticket:
kinit -kt /etc/foreman-proxy/dns.keytab \ capsule/satellite.example.com@EXAMPLE.COM
# kinit -kt /etc/foreman-proxy/dns.keytab \ capsule/satellite.example.com@EXAMPLE.COM
Copy to Clipboard Copied! Display the Kerberos ticket:
klist
# klist
Copy to Clipboard Copied! Example output:
Ticket cache: KCM:0:50473 Default principal: smartproxy/satellite.example.com@EXAMPLE.COM Valid starting Expires Service principal 05/20/2025 12:12:35 05/21/2025 11:54:31 krbtgt/EXAMPLE.COM@EXAMPLE.COM
Ticket cache: KCM:0:50473 Default principal: smartproxy/satellite.example.com@EXAMPLE.COM Valid starting Expires Service principal 05/20/2025 12:12:35 05/21/2025 11:54:31 krbtgt/EXAMPLE.COM@EXAMPLE.COM
Copy to Clipboard Copied!
Configure Satellite Server or Capsule Server to connect to the Identity Management DNS service:
satellite-installer \ --foreman-proxy-dns true \ --foreman-proxy-dns-provider nsupdate_gss \ --foreman-proxy-dns-managed false \ --foreman-proxy-dns-server "idm-server.example.com" \ --foreman-proxy-dns-tsig-keytab /etc/foreman-proxy/dns.keytab \ --foreman-proxy-dns-tsig-principal "capsule/satellite.example.com@EXAMPLE.COM"
# satellite-installer \ --foreman-proxy-dns true \ --foreman-proxy-dns-provider nsupdate_gss \ --foreman-proxy-dns-managed false \ --foreman-proxy-dns-server "idm-server.example.com" \ --foreman-proxy-dns-tsig-keytab /etc/foreman-proxy/dns.keytab \ --foreman-proxy-dns-tsig-principal "capsule/satellite.example.com@EXAMPLE.COM"
Copy to Clipboard Copied! - For each affected Capsule, update the configuration of that Capsule in the Satellite web UI. For more information, see Section 1.8, “Associating the DNS service with a domain and subnet”.
1.7. Integrating Infoblox DNS
If you have an Infoblox appliance in your network, you can integrate this service into Satellite Server and Capsule Server by using the Infoblox Web API (WAPI) The integration enables you to continue using your existing DNS server, and Satellite manages DNS records for hosts during their life cycle.
Limitations
- You can manage DNS entries only in a single view, and you cannot edit the view after you create it.
- Satellite Server uses the standard HTTPS web API to communicate with Infoblox. By default, it communicates only with a single node. If you require high availability, configure this feature in Infoblox.
- You cannot integrate the Satellite IP address management (IPAM) feature into Infoblox.
Prerequisites
-
You have an Infoblox account with the roles
DHCP Admin
andDNS Admin
. - The Infoblox roles have permissions or belong to an admin group that permits the accounts to perform tasks through the Infoblox API.
Procedure
Download the certificate from the Infoblox server, and store it in the
/etc/pki/ca-trust/source/anchors/infoblox.crt
file:openssl s_client -showcerts -connect infoblox.example.com:443 </dev/null | \ openssl x509 -text >/etc/pki/ca-trust/source/anchors/infoblox.crt
# openssl s_client -showcerts -connect infoblox.example.com:443 </dev/null | \ openssl x509 -text >/etc/pki/ca-trust/source/anchors/infoblox.crt
Copy to Clipboard Copied! The hostname must match the one for the Infoblox application in the X.509 certificate.
Add the Infoblox certificate to the system truststore:
update-ca-trust extract
# update-ca-trust extract
Copy to Clipboard Copied! Test the CA certificate by using it in a query to the Infoblox API:
curl -u admin:password https://infoblox.example.com/wapi/v2.0/network
# curl -u admin:password https://infoblox.example.com/wapi/v2.0/network
Copy to Clipboard Copied! Example of a positive response:
[ { "_ref": "network/ZG5zLm5ldHdvcmskMTkyLjE2OC4yMDIuMC8yNC8w:infoblox.example.com/24/default", "network": "192.168.202.0/24", "network_view": "default" } ]
[ { "_ref": "network/ZG5zLm5ldHdvcmskMTkyLjE2OC4yMDIuMC8yNC8w:infoblox.example.com/24/default", "network": "192.168.202.0/24", "network_view": "default" } ]
Copy to Clipboard Copied! Configure Satellite Server or Capsule Server to connect to the Infoblox DNS service:
satellite-installer \ --foreman-proxy-dns true \ --foreman-proxy-dns-provider infoblox \ --enable-foreman-proxy-plugin-dns-infoblox \ --foreman-proxy-plugin-dns-infoblox-dns-server infoblox.example.com \ --foreman-proxy-plugin-dns-infoblox-username admin \ --foreman-proxy-plugin-dns-infoblox-password password \ --foreman-proxy-plugin-dns-infoblox-dns-view view_name
# satellite-installer \ --foreman-proxy-dns true \ --foreman-proxy-dns-provider infoblox \ --enable-foreman-proxy-plugin-dns-infoblox \ --foreman-proxy-plugin-dns-infoblox-dns-server infoblox.example.com \ --foreman-proxy-plugin-dns-infoblox-username admin \ --foreman-proxy-plugin-dns-infoblox-password password \ --foreman-proxy-plugin-dns-infoblox-dns-view view_name
Copy to Clipboard Copied! Omit the
--foreman-proxy-plugin-dns-infoblox-dns-view
option if you use thedefault
view in Infoblox DNS.- For each affected Capsule, update the configuration of that Capsule in the Satellite web UI. For more information, see Section 1.8, “Associating the DNS service with a domain and subnet”.
1.8. Associating the DNS service with a domain and subnet
After you configured or changed the DNS provider, you must update the configuration of each affected Capsule in the Satellite web UI.
Prerequisites
- You configured a DNS provider.
Procedure
Configure the domain:
- In the Satellite web UI, navigate to Infrastructure > Domains.
- Select the domain name.
- On the Domain tab, ensure DNS Capsule is set to the Capsule where the subnet is connected.
Configure the subnet:
- Navigate to Infrastructure > Subnets.
- Select the subnet name.
- On the Domains tab, select the domains that are valid on the subnet.
- In the Capsules tab, ensure Reverse DNS Capsule is set to the Capsule where the subnet is connected.
- Click Submit.
1.9. Disabling DNS for integration
If you want to manually manage a DNS service and not integrate it into Satellite Server, you must prevent Satellite from maintaining this service on the operating system and disable orchestration to avoid errors.
Disabling DNS in Satellite does not remove the related backend service on the operating system.
Procedure
- In the Satellite web UI, navigate to Infrastructure > Subnets.
For each subnet that is associated with the DNS Capsule:
- Select the subnet.
- On the Capsules tab, clear the Reverse DNS Capsule field.
- Click Submit.
- Navigate to Infrastructure > Domains.
For each domain that is associated with the DNS Capsule:
- Select the domain.
- Clear the DNS Capsule field.
- Click Submit.
On Satellite Server, enter:
satellite-installer --foreman-proxy-dns false
# satellite-installer --foreman-proxy-dns false
Copy to Clipboard Copied! NoteSatellite does not perform orchestration when a Capsule is not set for a given subnet and domain. When you disable Capsule associations, orchestration commands for existing hosts can fail if the expected records and configuration files are not present.
Chapter 2. Configuring DHCP integration
You can integrate DHCP with Satellite to automatically manage IP leases and boot configurations on a DHCP server during the provisioning of hosts. This helps to simplify the automated provisioning of hosts.
2.1. DHCP service providers
Capsule supports the following DHCP providers that you can use to integrate Satellite with your existing DHCP infrastructure or deploy a new one:
dhcp_isc
- Managing IP leases on an ISC DHCP server by using the Object Management Application Programming Interface (OMAPI). See Section 2.2, “Enabling the installer-managed DHCP service”.
dhcp_remote_isc
- Managing IP leases on a remote ISC dhcpd server by using OMAPI. This provider requires that you share the leases over the network, for example, with NFS. See Section 2.3, “Integrating a remote ISC DHCP server”.
dhcp_infoblox
- Managing IP leases on an Infoblox DHCP server. See Section 2.4, “Integrating Infoblox DHCP”.
2.2. Enabling the installer-managed DHCP service
If you do not have a DHCP server available in your network, you can use the installer-managed DHCP service. This feature enables you to provide a DHCP service with low maintenance overhead.
Prerequisites
You know the following network information:
- The range of IP addresses the DHCP should manage
- The IP address of the default gateway in the subnet
- The IP addresses of the name servers for the subnet
Procedure
Configure Satellite Server or Capsule Server as DHCP server:
satellite-installer \ --foreman-proxy-dhcp true \ --foreman-proxy-dhcp-provider isc \ --foreman-proxy-dhcp-managed true \ --foreman-proxy-dhcp-range "192.0.2.100 192.0.2.150" \ --foreman-proxy-dhcp-gateway 192.0.2.1 \ --foreman-proxy-dhcp-nameservers 192.0.2.2,192.0.2.3
# satellite-installer \ --foreman-proxy-dhcp true \ --foreman-proxy-dhcp-provider isc \ --foreman-proxy-dhcp-managed true \ --foreman-proxy-dhcp-range "192.0.2.100 192.0.2.150" \ --foreman-proxy-dhcp-gateway 192.0.2.1 \ --foreman-proxy-dhcp-nameservers 192.0.2.2,192.0.2.3
Copy to Clipboard Copied! - For each affected Capsule, update the configuration of that Capsule in the Satellite web UI. See Section 2.5, “Associating the DHCP service with a subnet”.
Optional: Secure the
dhcpd
API on the Capsule by using an Object Management Application Programming Interface (OMAPI) key:Install the required package:
satellite-maintain packages install bind-utils
# satellite-maintain packages install bind-utils
Copy to Clipboard Copied! Generate an OMAPI key:
tsig-keygen -a hmac-md5 omapi_key
# tsig-keygen -a hmac-md5 omapi_key key "omapi_key" { algorithm hmac-md5; secret "hJBge7QC5AaUkRVsZmFUlg=="; };
Copy to Clipboard Copied!
Add the
dhcpd
API key to the Capsule configuration:satellite-installer \ --foreman-proxy-dhcp-key-name "omapi_key" \ --foreman-proxy-dhcp-key-secret "key_secret"
# satellite-installer \ --foreman-proxy-dhcp-key-name "omapi_key" \ --foreman-proxy-dhcp-key-secret "key_secret"
Copy to Clipboard Copied!
2.3. Integrating a remote ISC DHCP server
If you have an ISC DHCP server in your network, but not on the same host as your Satellite Server, you can integrate this service into your Satellite Server. The integration enables you to continue using your existing DHCP server, and Satellite manages IP leases and boot configurations on the DHCP server during the provisioning of hosts.
With this type of integration, Satellite uses an Object Management Application Programming Interface (OMAPI) key to update leases and the Network File System (NFS) protocol to access the ISC DHCP server’s configuration files and lease database.
2.3.1. Enabling OMAPI authentication in ISC DHCP
The integration of an existing remote ISC DHCP service requires that you enable the Object Management Application Programming Interface (OMAPI) in the DHCP service. Satellite uses OMAPI to remotely manage DHCP server objects.
Prerequisites
- The ISC DHCP service is deployed and functional.
- The firewall on the DHCP server allows access to the DHCP service (port 67/UDP).
Procedure
Create a security token:
tsig-keygen -a hmac-md5 omapi_key
# tsig-keygen -a hmac-md5 omapi_key
Copy to Clipboard Copied! Note that Satellite supports only the
hmac-md5
algorithm for OMAPI authentication.Example output:
key "omapi_key" { algorithm hmac-md5; secret "4z1jwYO0RGUTJbWDepFBdg=="; };
key "omapi_key" { algorithm hmac-md5; secret "4z1jwYO0RGUTJbWDepFBdg=="; };
Copy to Clipboard Copied! Edit the
/etc/dhcp/dhcpd.conf
file, and append the following settings:key omapi_key { algorithm hmac-md5; secret "key_secret"; }; omapi-port 7911; omapi-key omapi_key;
key omapi_key { algorithm hmac-md5; secret "key_secret"; }; omapi-port 7911; omapi-key omapi_key;
Copy to Clipboard Copied! The settings specified in the example include the following:
key omapi_key
-
Defines the key, its algorithm and encrypted password. Use the output of the
tsig-keygen
command for this directive. omapi-port 7911;
- Enables the OMAPI protocol in ISC DHCP and defines the port of the protocol.
omapi-key omapi_key
-
Defines the name of the key the OMAPI interface uses. The name must match the one you specified in the
tsig-keygen
command.
Restart the
dhcpd
service:systemctl restart dhcpd
# systemctl restart dhcpd
Copy to Clipboard Copied! Open the OMAPI port in the
firewalld
service:firewall-cmd --add-port=7911/tcp
# firewall-cmd --add-port=7911/tcp
Copy to Clipboard Copied! Make the changes persistent:
firewall-cmd --runtime-to-permanent
# firewall-cmd --runtime-to-permanent
Copy to Clipboard Copied!
2.3.2. Sharing the DHCP configuration files and lease database over NFS
The integration of an existing remote ISC DHCP service requires that you share the configuration file and lease database of the service over network. For example, you can use the NFS service. Satellite then uses NFS to access configuration settings, such as subnet definitions. Read access to the lease database ensures efficient access to all lease information, which is not available over the ISC DHCP Object Management Application Programming Interface (OMAPI).
Prerequisites
- The ISC DHCP service is deployed and functional.
Procedure
On Satellite Server, determine both the UID and the primary GID of the
foreman-proxy
user:id -u foreman-proxy id -g foreman-proxy
# id -u foreman-proxy # id -g foreman-proxy
Copy to Clipboard Copied! You require these IDs in the next steps.
On the DHCP server, share the configuration of the DHCP service and lease database over NFS:
Create the
foreman-proxy
group with the same group ID as on the Satellite Server:groupadd -g My_User_ID foreman-proxy
# groupadd -g My_User_ID foreman-proxy
Copy to Clipboard Copied! Create the
foreman-proxy
user with the same user ID and primary group ID as on the Satellite Server:useradd -u My_User_ID -g My_Group_ID -s /sbin/nologin foreman-proxy
# useradd -u My_User_ID -g My_Group_ID -s /sbin/nologin foreman-proxy
Copy to Clipboard Copied! Ensure that members of the
foreman-proxy
group can access the configuration file of the DHCP service:chgrp -R foreman-proxy /etc/dhcp/ chmod g+rx /etc/dhcp/ chmod g+r /etc/dhcp/dhcpd.conf
# chgrp -R foreman-proxy /etc/dhcp/ # chmod g+rx /etc/dhcp/ # chmod g+r /etc/dhcp/dhcpd.conf
Copy to Clipboard Copied! Install the
nfs-server
package:dnf install nfs-utils
# dnf install nfs-utils
Copy to Clipboard Copied! Edit the
/etc/exports
file, and append share entries for the/etc/dhcp/
and/var/lib/dhcpd/
directories:/etc/dhcp satellite.example.com(ro) /var/lib/dhcpd satellite.example.com(ro)
/etc/dhcp satellite.example.com(ro) /var/lib/dhcpd satellite.example.com(ro)
Copy to Clipboard Copied! Share the directories in read-only mode and only with the Satellite Server or Capsule Server.
Enable and start the NFS server service:
systemctl enable --now nfs-server
# systemctl enable --now nfs-server
Copy to Clipboard Copied! Open the NFSv4 port in the
firewalld
service:firewall-cmd --add-service=nfs
# firewall-cmd --add-service=nfs
Copy to Clipboard Copied! Make the changes persistent:
firewall-cmd --runtime-to-permanent
# firewall-cmd --runtime-to-permanent
Copy to Clipboard Copied!
Next steps
- By default, the NFS protocol is unencrypted. If you require an encrypted connection, configure NFS over TLS or Kerberos authentication after you completed this procedure. For more information, see Configuring an NFS server with TLS support and Setting up an NFS server with Kerberos in a Red Hat Enterprise Linux Identity Management domain in Red Hat Enterprise Linux 9 Configuring and using network file services.
2.3.3. Configuring Satellite Server or Capsule Server for use with ISC DHCP
After you have prepared the DHCP server, integrate the ISC DHCP server into your Satellite Server or Capsule Server.
Prerequisites
- You enabled Object Management Application Programming Interface (OMAPI) authentication in ISC DHCP. For more information, see Section 2.3.1, “Enabling OMAPI authentication in ISC DHCP”.
- You shared the DHCP configuration and lease database over NFS. For more information, see Section 2.3.2, “Sharing the DHCP configuration files and lease database over NFS”.
Procedure
Install the required package:
satellite-maintain packages install nfs-utils
# satellite-maintain packages install nfs-utils
Copy to Clipboard Copied! Create the directories into which you later mount the NFS shares:
mkdir -p \ /srv/nfs/etc/dhcp \ /srv/nfs/var/lib/dhcpd
# mkdir -p \ /srv/nfs/etc/dhcp \ /srv/nfs/var/lib/dhcpd
Copy to Clipboard Copied! Edit the
/etc/fstab
file, and add entries for the NFS shares to mount them automatically when the system boots:dhcp_server_fqdn:/etc/dhcp /srv/nfs/etc/dhcp nfs ro,auto,context="system_u:object_r:dhcp_etc_t:s0" 0 0 dhcp_server_fqdn:/var/lib/dhcpd /srv/nfs/var/lib/dhcpd nfs ro,auto,context="system_u:object_r:dhcpd_state_t:s0" 0 0
dhcp_server_fqdn:/etc/dhcp /srv/nfs/etc/dhcp nfs ro,auto,context="system_u:object_r:dhcp_etc_t:s0" 0 0 dhcp_server_fqdn:/var/lib/dhcpd /srv/nfs/var/lib/dhcpd nfs ro,auto,context="system_u:object_r:dhcpd_state_t:s0" 0 0
Copy to Clipboard Copied! Reload
systemd
so that this service uses the updated/etc/fstab
file:systemctl daemon-reload
# systemctl daemon-reload
Copy to Clipboard Copied! Mount the NFS shares:
mount /srv/nfs/etc/dhcp/ mount /srv/nfs/var/lib/dhcpd/
# mount /srv/nfs/etc/dhcp/ # mount /srv/nfs/var/lib/dhcpd/
Copy to Clipboard Copied! Verify that the
foreman-proxy
user can access the files on the NFS server. For example:Display the first 5 lines of the
/srv/nfs/etc/dhcp/dhcpd.conf
file:su - foreman-proxy -c 'head -5 /srv/nfs/etc/dhcp/dhcpd.conf'
$ su - foreman-proxy -c 'head -5 /srv/nfs/etc/dhcp/dhcpd.conf'
Copy to Clipboard Copied! Display the first 5 lines of the
/srv/nfs/var/lib/dhcpd/dhcpd.leases
file:su - foreman-proxy -c 'head -5 /srv/nfs/var/lib/dhcpd/dhcpd.leases'
$ su - foreman-proxy -c 'head -5 /srv/nfs/var/lib/dhcpd/dhcpd.leases'
Copy to Clipboard Copied!
Configure Satellite Server or Capsule Server to use the DHCP server:
satellite-installer \ --foreman-proxy-dhcp true \ --foreman-proxy-dhcp-provider remote_isc \ --enable-foreman-proxy-plugin-dhcp-remote-isc \ --foreman-proxy-dhcp-server dhcp_server_fqdn \ --foreman-proxy-plugin-dhcp-remote-isc-dhcp-config /srv/nfs/etc/dhcp/dhcpd.conf \ --foreman-proxy-plugin-dhcp-remote-isc-dhcp-leases /srv/nfs/var/lib/dhcpd/dhcpd.leases \ --foreman-proxy-plugin-dhcp-remote-isc-key-name omapi_key \ --foreman-proxy-plugin-dhcp-remote-isc-key-secret key_secret \ --foreman-proxy-plugin-dhcp-remote-isc-omapi-port 7911
# satellite-installer \ --foreman-proxy-dhcp true \ --foreman-proxy-dhcp-provider remote_isc \ --enable-foreman-proxy-plugin-dhcp-remote-isc \ --foreman-proxy-dhcp-server dhcp_server_fqdn \ --foreman-proxy-plugin-dhcp-remote-isc-dhcp-config /srv/nfs/etc/dhcp/dhcpd.conf \ --foreman-proxy-plugin-dhcp-remote-isc-dhcp-leases /srv/nfs/var/lib/dhcpd/dhcpd.leases \ --foreman-proxy-plugin-dhcp-remote-isc-key-name omapi_key \ --foreman-proxy-plugin-dhcp-remote-isc-key-secret key_secret \ --foreman-proxy-plugin-dhcp-remote-isc-omapi-port 7911
Copy to Clipboard Copied! - For each affected Capsule, update the configuration of that Capsule in the Satellite web UI. For more information, see Section 2.5, “Associating the DHCP service with a subnet”.
2.4. Integrating Infoblox DHCP
If you have an Infoblox appliance in your network, you can integrate this service into Satellite Server and Capsule Server by using the Infoblox Web API (WAPI). The integration enables you to continue using your existing DHCP server, and Satellite manages IP leases and boot configurations on the DHCP server during the provisioning of hosts.
Limitations
- You can manage DHCP entries only in a single network and view, and you cannot edit the view after you create it.
- Satellite Server uses the standard HTTPS web API to communicate with Infoblox. By default, it communicates only with a single node. If you require high availability, configure this feature in Infoblox.
Prerequisites
-
You have an Infoblox account with the roles
DHCP Admin
andDNS Admin
. - The Infoblox roles have permissions or belong to an admin group that permits the accounts to perform tasks through the Infoblox API.
Procedure
Download the certificate from the Infoblox server, and store it in the
/etc/pki/ca-trust/source/anchors/infoblox.crt
file:openssl s_client -showcerts -connect infoblox.example.com:443 </dev/null | \ openssl x509 -text >/etc/pki/ca-trust/source/anchors/infoblox.crt
# openssl s_client -showcerts -connect infoblox.example.com:443 </dev/null | \ openssl x509 -text >/etc/pki/ca-trust/source/anchors/infoblox.crt
Copy to Clipboard Copied! The hostname must match the one for the Infoblox application in the X.509 certificate.
Add the Infoblox certificate to the system truststore:
update-ca-trust extract
# update-ca-trust extract
Copy to Clipboard Copied! Test the CA certificate by using it in a query to the Infoblox API:
curl -u admin:password https://infoblox.example.com/wapi/v2.0/network
# curl -u admin:password https://infoblox.example.com/wapi/v2.0/network
Copy to Clipboard Copied! Example of a positive response:
[ { "_ref": "network/ZG5zLm5ldHdvcmskMTkyLjE2OC4yMDIuMC8yNC8w:infoblox.example.com/24/default", "network": "192.168.202.0/24", "network_view": "default" } ]
[ { "_ref": "network/ZG5zLm5ldHdvcmskMTkyLjE2OC4yMDIuMC8yNC8w:infoblox.example.com/24/default", "network": "192.168.202.0/24", "network_view": "default" } ]
Copy to Clipboard Copied! Configure Satellite Server or Capsule Server to connect to the Infoblox DHCP service:
satellite-installer \ --foreman-proxy-dhcp true \ --foreman-proxy-dhcp-provider infoblox \ --enable-foreman-proxy-plugin-dhcp-infoblox \ --foreman-proxy-dhcp-server infoblox.example.com \ --foreman-proxy-plugin-dhcp-infoblox-username admin \ --foreman-proxy-plugin-dhcp-infoblox-password password \ --foreman-proxy-plugin-dhcp-infoblox-record-type fixedaddress \ --foreman-proxy-plugin-dhcp-infoblox-dns-view default \ --foreman-proxy-plugin-dhcp-infoblox-network-view default
# satellite-installer \ --foreman-proxy-dhcp true \ --foreman-proxy-dhcp-provider infoblox \ --enable-foreman-proxy-plugin-dhcp-infoblox \ --foreman-proxy-dhcp-server infoblox.example.com \ --foreman-proxy-plugin-dhcp-infoblox-username admin \ --foreman-proxy-plugin-dhcp-infoblox-password password \ --foreman-proxy-plugin-dhcp-infoblox-record-type fixedaddress \ --foreman-proxy-plugin-dhcp-infoblox-dns-view default \ --foreman-proxy-plugin-dhcp-infoblox-network-view default
Copy to Clipboard Copied! NoteIf you want to use the DHCP and DNS Infoblox modules together, configure the DHCP Infoblox module with the
fixedaddress
record type only. Thehost
record type is not supported in this scenario because it causes conflicts and you cannot rename hosts in Satellite.- For each affected Capsule, update the configuration of that Capsule in the Satellite web UI. For more information, see Section 2.5, “Associating the DHCP service with a subnet”.
2.5. Associating the DHCP service with a subnet
After you configured or changed the DHCP provider, you must update the configuration of each affected Capsule in the Satellite web UI.
Procedure
- In the Satellite web UI, navigate to Infrastructure > Subnets.
- Select the subnet name.
- On the Subnet tab, set IPAM to DHCP.
- On the Capsule tab, set DHCP Proxy to your Capsule.
- Click Submit.
2.6. Disabling DHCP for integration
If you want to manually manage a DHCP service and not integrate it into Satellite Server, you must prevent Satellite from maintaining this service on the operating system and disable orchestration to avoid errors.
Disabling DHCP in Satellite does not remove the related backend service on the operating system.
Procedure
- In the Satellite web UI, navigate to Infrastructure > Subnets.
For each subnet that is associated with the DHCP Capsule:
- Select the subnet.
- On the Capsules tab, clear the DHCP Capsule field.
- Click Submit.
On Satellite Server and Capsule Server, enter:
satellite-installer --foreman-proxy-dhcp false
# satellite-installer --foreman-proxy-dhcp false
Copy to Clipboard Copied! NoteSatellite does not perform orchestration when a Capsule is not set for a given subnet. When you disable Capsule associations, orchestration commands for existing hosts can fail if the expected records and configuration files are not present.
2.7. Troubleshooting DHCP problems
Satellite can manage an ISC DHCP server on Satellite Server or Capsule Servers. Satellite can list, create, and delete DHCP reservations and leases. However, there are several problems that you might encounter on occasions.
Out of sync DHCP records
When an error occurs during DHCP orchestration, DHCP records in the Satellite database and the DHCP server might not match. To fix this, you must add missing DHCP records from the Satellite database to the DHCP server and then remove unwanted records from the DHCP server as per the following steps:
Procedure
To preview the DHCP records that are going to be added to the DHCP server, enter the following command:
foreman-rake orchestration:dhcp:add_missing subnet_name=NAME
# foreman-rake orchestration:dhcp:add_missing subnet_name=NAME
Copy to Clipboard Copied! If you are satisfied by the preview changes in the previous step, apply them by entering the above command with the
perform=1
argument:foreman-rake orchestration:dhcp:add_missing subnet_name=NAME perform=1
# foreman-rake orchestration:dhcp:add_missing subnet_name=NAME perform=1
Copy to Clipboard Copied! To keep DHCP records in Satellite and in the DHCP server synchronized, you can remove unwanted DHCP records from the DHCP server. Note that Satellite assumes that all managed DHCP servers do not contain third-party records, therefore, this step might delete those unexpected records. To preview what records are going to be removed from the DHCP server, enter the following command:
foreman-rake orchestration:dhcp:remove_offending subnet_name=NAME
# foreman-rake orchestration:dhcp:remove_offending subnet_name=NAME
Copy to Clipboard Copied! If you are satisfied by the preview changes in the previous step, apply them by entering the above command with the
perform=1
argument:foreman-rake orchestration:dhcp:remove_offending subnet_name=NAME perform=1
# foreman-rake orchestration:dhcp:remove_offending subnet_name=NAME perform=1
Copy to Clipboard Copied!
PXE loader option change
When the PXE loader option is changed for an existing host, this causes a DHCP conflict. The only workaround is to overwrite the DHCP entry.
Incorrect permissions on DHCP files
An operating system update can update the dhcpd
package. This causes the permissions of important directories and files to reset so that the DHCP Capsule cannot read the required information.
For more information, see DHCP error while provisioning host from Satellite server Error ERF12-6899 ProxyAPI::ProxyException: Unable to set DHCP entry RestClient::ResourceNotFound 404 Resource Not Found on Red Hat Knowledgebase.
Changing the DHCP Capsule entry
Satellite manages DHCP records only for hosts that are assigned to subnets with a DHCP Capsule set. If you create a host and then clear or change the DHCP Capsule, when you attempt to delete the host, the action fails.
If you create a host without setting the DHCP Capsule and then try to set the DHCP Capsule, this causes DHCP conflicts.
Deleted hosts entries in the dhcpd.leases file
Any changes to a DHCP lease are appended to the end of the dhcpd.leases
file. Because entries are appended to the file, it is possible that two or more entries of the same lease can exist in the dhcpd.leases
file at the same time. When there are two or more entries of the same lease, the last entry in the file takes precedence. Group, subgroup and host declarations in the lease file are processed in the same manner. If a lease is deleted, { deleted; }
is appended to the declaration.
Chapter 3. Configuring TFTP integration
You can integrate TFTP with Satellite to perform unattended installations by booting the operating system’s setup over the network.
3.1. Enabling the installer-managed TFTP service
If you do not have a TFTP server available in your network, you can use the installer-managed TFTP service to perform unattended installations. With the installer-managed TFTP service, you can run a TFTP server with a low maintenance effort because Satellite fully manages the TFTP service, including the files on that service.
Procedure
Configure your Satellite Server or Capsule Server as the TFTP server:
satellite-installer \ --foreman-proxy-tftp true \ --foreman-proxy-tftp-managed true
# satellite-installer \ --foreman-proxy-tftp true \ --foreman-proxy-tftp-managed true
Copy to Clipboard Copied!
3.2. Integrating a generic TFTP server
If you have a TFTP server in your network, you can integrate this service into your Satellite. The integration enables you to continue using your existing TFTP server. With this type of integration, Satellite uses the Network File System (NFS) protocol to access the root directory of the TFTP service.
If you prefer a low maintenance solution that also manages files on the TFTP server, use the installer-managed TFTP service.
3.2.1. Configuring Satellite Server for use with tftp
After you have prepared the TFTP server, integrate it into your Satellite Server or Capsule Server.
Prerequisites
-
You shared the
/exports/var/lib/tftpboot
on the TFTP server with NFS.
Procedure
Create the directory into which you later mount the NFS share:
mkdir -p /mnt/nfs/var/lib/tftpboot
# mkdir -p /mnt/nfs/var/lib/tftpboot
Copy to Clipboard Copied! Edit the
/etc/fstab
file, and add entry for the NFS share to mount them automatically when the system boots:tftp_server_fqdn:/exports/var/lib/tftpboot /mnt/nfs/var/lib/tftpboot nfs rw,vers=3,auto,nosharecache,context="system_u:object_r:tftpdir_rw_t:s0" 0 0
tftp_server_fqdn:/exports/var/lib/tftpboot /mnt/nfs/var/lib/tftpboot nfs rw,vers=3,auto,nosharecache,context="system_u:object_r:tftpdir_rw_t:s0" 0 0
Copy to Clipboard Copied! Mount the NFS share:
mount /mnt/nfs/var/lib/tftpboot/
# mount /mnt/nfs/var/lib/tftpboot/
Copy to Clipboard Copied! Configure Satellite Server or Capsule Server to use the TFTP server:
satellite-installer \ --foreman-proxy-tftp true \ --foreman-proxy-managed false \ --foreman-proxy-tftp-root /mnt/nfs/var/lib/tftpboot \ --foreman-proxy-tftp-servername tftp_server_fqdn
# satellite-installer \ --foreman-proxy-tftp true \ --foreman-proxy-managed false \ --foreman-proxy-tftp-root /mnt/nfs/var/lib/tftpboot \ --foreman-proxy-tftp-servername tftp_server_fqdn
Copy to Clipboard Copied! - For each affected Capsule, update the configuration of that Capsule in the Satellite web UI. For more information, see Section 3.3, “Associating the TFTP service with a subnet”.
3.3. Associating the TFTP service with a subnet
After you configured or changed the TFTP provider, you must update the configuration of each affected Capsule in the Satellite web UI.
Prerequisites
- You configured a TFTP server.
Procedure
- In the Satellite web UI, navigate to Infrastructure > Subnets.
- Select the subnet name.
- On the Capsules tab, select the Capsule for TFTP.
- Click Submit.
3.4. Disabling TFTP for integration
If you want to manually manage a TFTP service and not integrate it into Satellite, you must prevent Satellite from maintaining this service on the operating system and disable orchestration to avoid errors.
Disabling TFTP in Satellite does not remove the related backend service on the operating system.
Procedure
- In the Satellite web UI, navigate to Infrastructure > Subnets.
For each subnet that is associated with the TFTP Capsule:
- Select the subnet.
- On the Capsules tab, clear the TFTP Capsule field.
- Click Submit.
On Satellite Server, enter:
satellite-installer --foreman-proxy-tftp false
# satellite-installer --foreman-proxy-tftp false
Copy to Clipboard Copied! NoteSatellite does not perform orchestration when a Capsule is not set for a given subnet. When you disable Capsule associations, orchestration commands for existing hosts can fail if the expected records and configuration files are not present.