Overview, concepts, and deployment considerations
Explore the Satellite architecture and plan Satellite deployment
Abstract
Providing feedback on Red Hat documentation Copy linkLink copied to clipboard!
We appreciate your feedback on our documentation. Let us know how we can improve it.
Use the Create Issue form in Red Hat Jira to provide your feedback. The Jira issue is created in the Red Hat Satellite Jira project, where you can track its progress.
Prerequisites
- Ensure you have registered a Red Hat account.
Procedure
- Click the following link: Create Issue. If Jira displays a login error, log in and proceed after you are redirected to the form.
- Complete the Summary and Description fields. In the Description field, include the documentation URL, chapter or section number, and a detailed description of the issue. Do not modify any other fields in the form.
- Click Create.
Chapter 1. Satellite overview and concepts Copy linkLink copied to clipboard!
Red Hat Satellite is a centralized tool for provisioning, remote management, and monitoring of multiple Red Hat Enterprise Linux deployments. With Satellite, you can deploy, configure, and maintain your systems across physical, virtual, and cloud environments.
1.1. Content and patch management with Red Hat Satellite Copy linkLink copied to clipboard!
With Red Hat Satellite, you can provide content and apply patches to hosts systematically in all lifecycle stages.
1.1.1. Content flow in Red Hat Satellite Copy linkLink copied to clipboard!
Content flow in Red Hat Satellite involves management and distribution of content from external sources to hosts.
Content in Satellite flows from external content sources to Satellite Server. Capsule Servers mirror the content from Satellite Server to hosts.
- External content sources
- You can configure many content sources with Satellite. The supported content sources include the Red Hat Customer Portal, custom Yum repositories, Git repositories, Ansible collections, Docker Hub, SCAP repositories, or internal data stores of your organization.
- Satellite Server
- On your Satellite Server, you plan and manage the content lifecycle.
- Capsule Servers
- By creating Capsule Servers, you can establish content sources in various locations based on your needs. For example, you can establish a content source for each geographical location or multiple content sources for a data center with separate networks.
- Hosts
- By assigning a host system to a Capsule Server or directly to your Satellite Server, you ensure the host receives the content they provide. Hosts can be physical or virtual.
Additional resources
- See Section 1.3, “Major Satellite components” for details.
- See Managing Red Hat subscriptions in Managing content for information about Content Delivery Network (CDN).
1.1.2. Content views in Red Hat Satellite Copy linkLink copied to clipboard!
A content view is a deliberately curated subset of content that your hosts can access. By creating a content view, you can define the software versions used by a particular environment or Capsule Server.
Each content view creates a set of repositories across each environment. Your Satellite Server stores and manages these repositories. For example, you can create content views in the following ways:
- A content view with older package versions for a production environment and another content view with newer package versions for a Development environment.
- A content view with a package repository required by an operating system and another content view with a package repository required by an application.
- A composite content view for a modular approach to managing content views. For example, you can use one content view for content for managing an operating system and another content view for content for managing an application. By creating a composite content view that combines both content views, you create a new repository that merges the repositories from each of the content views. However, the repositories for the content views still exist and you can keep managing them separately as well.
Default Organization View
A Default Organization View is an application-controlled content view for all content that is synchronized to Satellite. You can register a host to the Library environment on Satellite to consume the Default Organization View without configuring content views and lifecycle environments.
Promoting a content view across environments
When you promote a content view from one environment to the next environment in the application lifecycle, Satellite updates the repository and publishes the packages.
Example 1.1. Promoting a package from Development to Testing
The repositories for Testing and Production contain the my-software-1.0-0.noarch.rpm
package:
Development | Testing | Production | |
---|---|---|---|
Version of the content view | Version 2 | Version 1 | Version 1 |
Contents of the content view | my-software-1.1-0.noarch.rpm | my-software-1.0-0.noarch.rpm | my-software-1.0-0.noarch.rpm |
If you promote Version 2 of the content view from Development to Testing, the repository for Testing updates to contain the my-software-1.1-0.noarch.rpm
package:
Development | Testing | Production | |
---|---|---|---|
Version of the content view | Version 2 | Version 2 | Version 1 |
Contents of the content view | my-software-1.1-0.noarch.rpm | my-software-1.1-0.noarch.rpm | my-software-1.0-0.noarch.rpm |
This ensures hosts are designated to a specific environment but receive updates when that environment uses a new version of the content view.
1.1.3. Lifecycle environments and environment paths Copy linkLink copied to clipboard!
Application lifecycles are divided into lifecycle environments which represent each stage of the application lifecycle. By linking lifecycle environments, you create an environment path.
You can promote content along the environment path to the next lifecycle environment when required. When you promote a content view from one environment to the next environment in the application lifecycle, Satellite updates the repository and publishes the packages. For example, if development ends on a particular version of an application, you can promote this version to the testing environment and start development on the next version.
Figure 1.1. An environment path containing four environments
1.1.4. Content types in Red Hat Satellite Copy linkLink copied to clipboard!
With Red Hat Satellite, you can import and manage many content types. You can use Red Hat content as well as custom content and organize it into Satellite products.
For example, Satellite supports the following content types:
- RPM packages
- Import RPM packages from repositories related to your Red Hat subscriptions. Satellite Server downloads the RPM packages from the Red Hat Content Delivery Network and stores them locally. You can use these repositories and their RPM packages in content views.
- Kickstart trees
- Import the Kickstart trees to provision a host. New systems access these Kickstart trees over a network to use as base content for their installation. Red Hat Satellite contains predefined Kickstart templates. You can also create your own Kickstart templates.
- ISO and KVM images
- Download and manage media for installation and provisioning. For example, Satellite downloads, stores, and manages ISO images and guest images for specific Red Hat Enterprise Linux and non-Red Hat operating systems.
- Custom file type
- Manage custom content for any type of file you require, such as SSL certificates, ISO images, and OVAL files.
1.1.5. Additional resources Copy linkLink copied to clipboard!
- For information about how to manage content with Satellite, see Managing content.
1.2. Provisioning management with Red Hat Satellite Copy linkLink copied to clipboard!
With Red Hat Satellite, you can provision hosts on various compute resources with many provisioning methods from a unified interface.
1.2.1. Provisioning methods in Red Hat Satellite Copy linkLink copied to clipboard!
With Red Hat Satellite, you can provision hosts by using the following methods.
- Bare-metal hosts
Satellite provisions bare-metal hosts primarily by using PXE boot and MAC address identification. When provisioning bare-metal hosts with Satellite, you can do the following:
- Create host entries and specify the MAC address of the physical host to provision.
- Boot blank hosts to use the Satellite Discovery service, which creates a pool of hosts that are ready for provisioning.
- Provision hosts with UEFI Secure Boot.
- Cloud providers
Satellite connects to private and public cloud providers to provision instances of hosts from images stored in the cloud environment. When provisioning from cloud with Satellite, you can do the following:
- Select which hardware profile to use.
- Provision cloud instances from specific providers by using their APIs.
- Virtualization infrastructure
Satellite connects to virtualization infrastructure services, such as Red Hat Virtualization and VMware. When provisioning virtual machines with Satellite, you can do the following:
- Provision virtual machines from virtual image templates.
- Use the same PXE-based boot methods that you use to provision bare-metal hosts.
1.2.2. Additional resources Copy linkLink copied to clipboard!
- For information about how to provision hosts with Satellite, see Provisioning hosts.
1.3. Major Satellite components Copy linkLink copied to clipboard!
A typical Satellite deployment consists of the following components: a Satellite Server, Capsule Servers that mirror content from Satellite Server, and hosts that receive content and configuration from Satellite Server and Capsule Servers.
1.3.1. Satellite Server overview Copy linkLink copied to clipboard!
Satellite Server is the central component of a Satellite deployment where you plan and manage the content lifecycle.
A typical Satellite deployment includes one Satellite Server on which you perform the following operations:
- Content lifecycle management
- Configuration of Capsule Servers
- Configuration of hosts
- Host provisioning
- Patch management
- Subscription management
Satellite Server delegates content distribution, host provisioning, and communication to Capsule Servers. Satellite Server itself also includes a Capsule.
Satellite Server also contains a fine-grained authentication system. You can grant Satellite users permissions to access precisely the parts of the infrastructure for which they are responsible.
Additional resources
- For more information about managing permissions, see Managing Users and Roles in Administering Red Hat Satellite.
1.3.2. Capsule overview Copy linkLink copied to clipboard!
With Capsule Servers, you can extend the reach and scalability of your Satellite deployment. Capsule Servers provide the following functionalities in a Red Hat Satellite deployment:
- Mirroring content from Satellite Server to establish content sources in various geographical or logical locations. By registering a host to a Capsule Server, you can configure this host to receive content and configuration from the Capsule in their location instead of from the central Satellite Server.
- Running localized services to discover, provision, control, and configure hosts.
By using content views, you can specify the exact subset of content that Capsule Server makes available to hosts. For more information, see Section 1.1, “Content and patch management with Red Hat Satellite”.
1.3.3. Overview of hosts in Satellite Copy linkLink copied to clipboard!
A host is any Linux client that Red Hat Satellite manages. Hosts can be physical or virtual.
You can deploy virtual hosts on any platform supported by Red Hat Satellite, such as Amazon EC2, Google Compute Engine, KVM, libvirt, Microsoft Azure, OpenStack, Red Hat Virtualization, Rackspace Cloud Services, or VMware vSphere.
With Satellite, you can manage hosts at scale, including monitoring, provisioning, remote execution, configuration management, software management, and subscription management.
1.3.4. List of key open source components of Satellite Server Copy linkLink copied to clipboard!
Satellite consists of several open source projects integrated with each other, such as the following:
- Foreman
- Foreman is a lifecycle management application for physical and virtual systems. It helps manage hosts throughout their lifecycle, from provisioning and configuration to orchestration and monitoring.
- Katello
- Katello is a plugin of Foreman that extends Foreman capabilities with additional features for content, subscription, and repository management. Katello enables Satellite to subscribe to Red Hat repositories and to download content.
- Candlepin
- Candlepin is a service for subscription management.
- Pulp
- Pulp is a service for repository and content management.
1.3.5. Capsule features Copy linkLink copied to clipboard!
Capsule Servers provide local host management services and can mirror content from Satellite Server.
To mirror content from Satellite Server, Capsule provides the following functionalities:
- Repository synchronization
- Capsule Servers pull content for selected lifecycle environments from Satellite Server and make this content available to the hosts they manage.
- Content delivery
- Hosts configured to use Capsule Server download content from that Capsule rather than from Satellite Server.
- Host action delivery
- Capsule Server executes scheduled actions on hosts.
- Red Hat Subscription Management (RHSM) proxy
- Hosts are registered to their associated Capsule Servers rather than to the central Satellite Server or the Red Hat Customer Portal.
You can use Capsule to run the following services for infrastructure and host management:
- DHCP
- Capsule can manage a DHCP server, including integration with an existing solution, such as ISC DHCP servers, Active Directory, and Libvirt instances.
- DNS
- Capsule can manage a DNS server, including integration with an existing solution, such as ISC BIND and Active Directory.
- TFTP
- Capsule can integrate with any UNIX-based TFTP server.
- Realm
- Capsule can manage Kerberos realms or domains so that hosts can join them automatically during provisioning. Capsule can integrate with an existing infrastructure, including Identity Management and Active Directory.
- Puppet server
- Capsule can act as a configuration management server by running a Puppet server.
- Puppet Certificate Authority
- Capsule can integrate with the Puppet certificate authority (CA) to provide certificates to hosts.
- Baseboard Management Controller (BMC)
- Capsule can provide power management for hosts by using the Intelligent Platform Management Interface (IPMI) or Redfish standards.
- Provisioning template proxy
- Capsule can serve provisioning templates to hosts.
- OpenSCAP
- Capsule can perform security compliance scans on hosts.
- Remote Execution (REX)
- Capsule can run remote job execution on hosts.
You can configure a Capsule Server for a specific limited purpose by enabling only selected features on that Capsule. Common configurations include the following:
- Infrastructure Capsules: DNS + DHCP + TFTP
- Capsules with these services provide infrastructure services for hosts and have all necessary services for provisioning new hosts.
- Content Capsules: Pulp
- Capsules with this service provide content synchronized from Satellite Server to hosts.
- Configuration Capsules: Pulp + Puppet + PuppetCA
- Capsules with these services provide content and run configuration services for hosts.
- Capsules with DNS + DHCP + TFTP + Pulp + Puppet + PuppetCA
- Capsules with these services provide a full set of Capsule features. By configuring a Capsule with all these features, you can isolate hosts assigned to that Capsule by providing a single point of connection for the hosts.
1.3.6. Capsule networking Copy linkLink copied to clipboard!
The communication between Satellite Server and hosts registered to a Capsule Server is routed through that Capsule Server. Capsule Server also provides Satellite services to hosts.
Many of the services that Capsule Server manages use dedicated network ports. However, Capsule Server ensures that all communications from the host to Satellite Server use a single source IP address, which simplifies firewall administration.
Satellite topology with hosts connecting to a Capsule
In this topology, Capsule provides a single endpoint for all host network communications so that in remote network segments, only firewall ports to the Capsule itself must be open.
Figure 1.2. How Satellite components interact when hosts connect to a Capsule
Satellite topology with hosts connecting directly to Satellite Server
In this topology, hosts connect to Satellite Server rather than a Capsule. This applies also to Capsules themselves because the Capsule Server is a host of Satellite Server.
Figure 1.3. How Satellite components interact when hosts connect directly to Satellite Server
Additional resources
You can find complete instructions for configuring the host-based firewall to open the required ports in the following documents:
- Ports and Firewalls Requirements in Installing Satellite Server in a connected network environment
- Ports and Firewalls Requirements in Installing Satellite Server in a disconnected network environment
- Ports and Firewalls Requirements in Installing Capsule Server
1.3.7. Additional resources Copy linkLink copied to clipboard!
- See Installing Capsule Server for details on Capsule Server requirements, installation, and scalability considerations.
- See Configuring Capsules with a load balancer for details on distributing load among Capsule Servers.
1.4. Satellite infrastructure organization concepts Copy linkLink copied to clipboard!
You can use several elements to structure and organize the resources within your Satellite environment.
1.4.1. Organizations and locations in Red Hat Satellite Copy linkLink copied to clipboard!
On your Satellite Server, you can define organizations and locations to help organize content, hosts, and configurations. Organizations and locations enable you to arrange Satellite resources into logically structured groups. For example, you can create groups based on ownership, purpose, content, or security level. You can create and manage multiple organizations through Red Hat Satellite, then divide and assign your Red Hat subscriptions to each individual organization.
- Organizations
Organizations typically represent different business units, departments, or teams, such as Finance, Marketing, or Web Development. Each organization requires a separate Red Hat subscription manifest.
By creating organizations, you can create logical containers to isolate and manage their configurations separately according to their specific requirements.
- Locations
Locations typically represent physical locations, such as countries or cities.
By creating locations, you can define geographical sites where hosts are located. For example, this is useful in environments with multiple data centers.
You can use locations to map the network infrastructure to prevent incorrect host placement or configuration. While you cannot assign a subnet, domain, or compute resources directly to a Capsule Server, you can assign them to a location.
Unlike organizations, locations can have a hierarchical structure.
Satellite Server defines all locations and organizations. Each Capsule Server synchronizes content and handles configuration of hosts in a different location.
Your Satellite Server retains the management function, while the content and configuration is synchronized between your Satellite Server and Capsule Servers assigned to certain locations.
Example 1.2. Example of using organizations and locations in Satellite
The structure of a multi-national company includes the Finance, Marketing, and Sales departments. The company operates across United States, United Kingdom, and Japan.
The system administrator creates the following organizations on their Satellite Server:
- Finance
- Marketing
- Sales
Additionally, the administrator creates the following locations on their Satellite Server:
- United States
- United Kingdom
- Japan
The administrator can define a nested location hierarchy to divide the United States location into additional locations based on specific cities:
- Boston
- Phoenix
- San Francisco
1.4.2. Host groups overview Copy linkLink copied to clipboard!
A host group acts as a template for common host settings.
With host groups, you can define many settings for hosts, such as lifecycle environment, content view, or Ansible roles that are available to the hosts. Instead of defining the settings individually for each host, you can use host groups to define common settings once and apply them to multiple hosts.
You can create nested host groups.
When you change the settings of an existing host group, the new settings do not propagate to the hosts assigned to the host group. Only Puppet class settings get updated on hosts after you change them in the host group.
1.4.3. Host collections overview Copy linkLink copied to clipboard!
A host collection is a group of content hosts.
With host collections, you can perform the same action on multiple hosts at once. These actions include installing, removing, and updating packages and errata, and assigning content view environments.
For example, you can use host collections to group hosts by function, department, or business unit.
1.4.4. Additional resources Copy linkLink copied to clipboard!
- For examples of Satellite deployment, see Chapter 2, Satellite deployment planning.
1.5. Tools for administration of Red Hat Satellite Copy linkLink copied to clipboard!
You can use multiple tools to manage Red Hat Satellite.
1.5.1. Satellite web UI overview Copy linkLink copied to clipboard!
You can manage and monitor your Satellite infrastructure from a browser with the Satellite web UI. For example, you can use the following navigation features in the Satellite web UI:
Navigation feature | Description |
---|---|
Organization dropdown | Choose the organization you want to manage. |
Location dropdown | Choose the location you want to manage. |
Monitor | Provides summary dashboards and reports. |
Content | Provides content management tools. This includes content views, activation keys, and lifecycle environments. |
Hosts | Provides host inventory and provisioning configuration tools. |
Configure | Provides general configuration tools and data, including host groups and Ansible content. |
Infrastructure | Provides tools on configuring how Satellite interacts with the environment. |
| Provides event notifications to keep administrators informed of important environment changes. |
Administer | Provides advanced configuration for settings such as users, role-based access control (RBAC), and general settings. |
1.5.2. Hammer CLI overview Copy linkLink copied to clipboard!
You can configure and manage your Satellite Server with CLI commands by using Hammer.
Using Hammer has the following benefits:
- Create shell scripts based on Hammer commands for basic task automation.
- Redirect output from Hammer to other tools.
-
Use the
--debug
option with Hammer to test responses to API calls before applying the API calls in a script. For example:hammer --debug organization list
.
To issue Hammer commands, a user must have access to your Satellite Server.
To ensure a user-friendly and intuitive experience, the Satellite web UI takes priority when developing new functionality. Therefore, some features that are available in the Satellite web UI might not yet be available for Hammer.
In the background, each Hammer command first establishes a binding to the API, then sends a request. This can have performance implications when executing a large number of Hammer commands in sequence. In contrast, scripts that use API commands communicate directly with the Satellite API and they establish the binding only once.
Additional resources
- See Using the Hammer CLI tool for details on using Hammer CLI.
1.5.3. Satellite API overview Copy linkLink copied to clipboard!
You can write custom scripts and external applications that access the Satellite API over HTTP with the Representational State Transfer (REST) API provided by Satellite Server. Use the REST API to integrate with enterprise IT systems and third-party applications, perform automated maintenance or error checking tasks, and automate repetitive tasks with scripts.
Using the REST API has the following benefits:
- Configure any programming language, framework, or system with support for HTTP protocol to use the API.
- Create client applications that require minimal knowledge of the Satellite infrastructure because users discover many details at runtime.
- Adopt the resource-based REST model for intuitively managing a virtualization platform.
Scripts based on API commands communicate directly with the Satellite API, which makes them faster than scripts based on Hammer commands or Ansible Playbooks relying on modules within redhat.satellite.
API commands differ between versions of Satellite. When you prepare to upgrade Satellite Server, update all the scripts that contain Satellite API commands.
Additional resources
- See Using the Satellite REST API for details on using the Satellite API.
1.5.4. Remote execution in Red Hat Satellite Copy linkLink copied to clipboard!
With remote execution, you can run jobs on hosts from Capsules by using shell scripts or Ansible roles and playbooks.
Use remote execution for the following benefits in Satellite:
- Run jobs on multiple hosts at once.
- Use variables in your commands for more granular control over the jobs you run.
- Use host facts and parameters to populate the variable values.
- Specify custom values for templates when you run the command.
Communication for remote execution occurs through Capsule Server, which means that Satellite Server does not require direct access to the target host, and can scale to manage many hosts.
To use remote execution, you must define a job template. A job template is a command that you want to apply to remote hosts. You can execute a job template multiple times.
Satellite uses ERB syntax job templates. For more information, see Template Writing Reference in Managing hosts.
By default, Satellite includes several job templates for shell scripts and Ansible.
Additional resources
- See Configuring and Setting Up Remote Jobs in Managing configurations by using Ansible integration.
1.5.5. Automating Satellite management with Satellite Ansible Collection Copy linkLink copied to clipboard!
Satellite Ansible Collection is a set of Ansible modules that interact with the Satellite API. You can use these modules to automate many aspects of Satellite administration.
Additional resources
- For more information about using Ansible to configure hosts, see Managing configurations by using Ansible integration.
- For more information about automating Satellite using Ansible, see Automating Satellite management with Satellite Ansible Collection in Administering Red Hat Satellite.
1.5.6. Kickstart workflow Copy linkLink copied to clipboard!
You can automate the installation process of a Satellite Server or Capsule Server by creating a Kickstart file that contains all the information that is required for the installation.
When you run a Red Hat Satellite Kickstart script, the script performs the following actions:
- It specifies the installation location of a Satellite Server or a Capsule Server.
- It installs the predefined packages.
- It installs Subscription Manager.
- It uses Activation Keys to subscribe the hosts to Red Hat Satellite.
-
It installs Puppet, and configures a
puppet.conf
file to indicate the Red Hat Satellite or Capsule instance. - It enables Puppet to run and request a certificate.
- It runs user defined snippets.
Additional resources
For more information about Kickstart, see Automated installation workflow in Automatically installing RHEL 9.
1.6. Supported usage and versions of Satellite components Copy linkLink copied to clipboard!
Satellite supports the following use cases, architectures, and versions.
1.6.1. Supported usage of Satellite components Copy linkLink copied to clipboard!
Usage of all Red Hat Satellite components is supported within the context of Red Hat Satellite only as described below.
- Red Hat Enterprise Linux Server
Each Red Hat Satellite subscription includes one supported instance of Red Hat Enterprise Linux Server. Reserve this instance solely for the purpose of running Red Hat Satellite.
Not supported: Using the operating system included with Satellite to run other daemons, applications, or services within your environment.
- SELinux
Ensure SELinux is in enforcing or permissive mode.
Not supported: Installation with disabled SELinux.
- Foreman
You can extend Foreman with plugins packaged with Red Hat Satellite. See Satellite 6 Component Versions in Red Hat Knowledgebase for information about supported Foreman plugins.
Not supported: Extending Foreman with plugins in the Red Hat Satellite Optional repository.
Red Hat Satellite also includes components, configuration, and functionality to provision and configure operating systems other than Red Hat Enterprise Linux. While these features are included, Red Hat supports their usage only for Red Hat Enterprise Linux.
- Pulp
Interact with Pulp only by using the Satellite web UI, CLI, and API.
Not supported: Direct modification or interaction with the Pulp local API or database. This can cause irreparable damage to the Red Hat Satellite databases.
- Candlepin
Interact with Candlepin only by using the Satellite web UI, CLI, and API.
Not supported: Direct interaction with Candlepin, its local API, or database. This can cause irreparable damage to the Red Hat Satellite databases.
- Embedded Tomcat Application Server
Interact with the embedded Tomcat application server only by using the Satellite web UI, API, and database.
Not supported: Direct interaction with the embedded Tomcat application server local API or database.
- Puppet
- When you run the Satellite installation program, you can install and configure Puppet servers as part of Capsule Servers. A Puppet module, running on a Puppet server on your Satellite Server or any Capsule Server, is also supported by Red Hat.
Additional resources
- Red Hat supports many different scripting and other frameworks. See How does Red Hat support scripting frameworks in Red Hat Knowledgebase.
1.6.2. Supported client architectures for content management Copy linkLink copied to clipboard!
You can use the following combinations of major versions of Red Hat Enterprise Linux and hardware architectures for registering and managing hosts with Satellite. The Red Hat Satellite Client 6 repositories are also available for these combinations.
Platform | Architectures |
---|---|
Red Hat Enterprise Linux 10 | x86_64, ppc64le, s390x, aarch64 |
Red Hat Enterprise Linux 9 | x86_64, ppc64le, s390x, aarch64 |
Red Hat Enterprise Linux 8 | x86_64, ppc64le, s390x |
Red Hat Enterprise Linux 7 | x86_64, ppc64 (BE), ppc64le, aarch64, s390x |
1.6.3. Supported client architectures for host provisioning Copy linkLink copied to clipboard!
You can use the following combinations of major versions of Red Hat Enterprise Linux and hardware architectures for host provisioning with Satellite.
Platform | Architectures |
---|---|
Red Hat Enterprise Linux 10 | x86_64 |
Red Hat Enterprise Linux 9 | x86_64 |
Red Hat Enterprise Linux 8 | x86_64 |
Red Hat Enterprise Linux 7 | x86_64 |
1.6.4. Supported client architectures for configuration management Copy linkLink copied to clipboard!
You can use the following combinations of major versions of Red Hat Enterprise Linux and hardware architectures for configuration management with Satellite.
Platform | Architectures |
---|---|
Red Hat Enterprise Linux 10 | x86_64 |
Red Hat Enterprise Linux 9 | x86_64 |
Red Hat Enterprise Linux 8 | x86_64, aarch64 |
Red Hat Enterprise Linux 7 | x86_64 |
Note that Puppet agent is currently unavailable for Red Hat Enterprise Linux 10.
1.6.5. Additional resources Copy linkLink copied to clipboard!
- See Red Hat Satellite Product Life Cycle for information about support periods for Red Hat Satellite releases.
Chapter 2. Satellite deployment planning Copy linkLink copied to clipboard!
2.1. Deployment path for Red Hat Satellite Copy linkLink copied to clipboard!
During installation and initial configuration of Satellite, you can customize your deployment to fit your specific needs and operational environment. By customizing each stage of the deployment process, you can choose deployment options that meet the requirements of your organization.
2.1.1. Installing a Satellite Server Copy linkLink copied to clipboard!
Installing an instance of Satellite Server on a dedicated server is the first step to a working Satellite infrastructure. You can install a Satellite Server in a connected or disconnected setup:
- Connected deployment is suitable for networked environments where your Satellite Server is connected to the Red Hat CDN.
- Disconnected deployment is suitable for high-security environments where direct Internet access is restricted or prohibited.
A disconnected Satellite Server is isolated from Red Hat CDN but you can still provision systems with the latest security updates, errata, packages, and other content. You can use the following methods to import content to a disconnected Satellite Server:
- Content ISO
In this setup, you download ISO images with content from the Red Hat Customer Portal and extract them to Satellite Server or a local web server. The content on Satellite Server is then synchronized locally.
This allows for complete network isolation of Satellite Server, however, the release frequency of content ISO images is around six weeks and not all product content is included.
- Disconnected Satellite with Inter-Satellite Synchronization
In this setup, you install a connected Satellite Server and export content from it to populate a disconnected Satellite using a storage device.
This allows for exporting both Red Hat provided and custom content at the frequency you choose, but requires deploying an additional server with a separate subscription.
Additional resources
For complete information on installing a Satellite Server, including prerequisites and predefined tuning profiles, see the following documents:
2.1.1.1. Configuring Satellite Server with external database Copy linkLink copied to clipboard!
Running the satellite-installer
command, used to install a Satellite Server, also installs PostgreSQL databases on the server. However, you can configure your Satellite Server to use external databases instead. Moving to external databases distributes the workload and can reduce overall Satellite memory usage.
Red Hat does not provide support or tools for external database maintenance. If you deploy Satellite with external databases, you will need to support and maintain the external databases yourself.
Consider using external databases if you plan to use your Satellite deployment for the following scenarios:
- Frequent remote execution tasks. This requires a high volume of records in PostgreSQL and generates heavy database workloads.
- High disk I/O workloads from frequent repository synchronization or content view publishing. This requires Satellite to create a record in PostgreSQL for each job.
- High volume of hosts.
- High volume of synchronized content.
Additional resources
For more information about using an external database, see the following documents:
- Using external databases with Satellite in Installing Satellite Server in a connected network environment
- Using external databases with Satellite in Installing Satellite Server in a disconnected network environment
2.1.2. Scenarios for Satellite on AWS Copy linkLink copied to clipboard!
You can deploy Satellite on Amazon Web Services (AWS) in several scenarios.
One-region setup
This is the least complex configuration of Satellite in AWS. Deploy both Satellite Server and the hosts residing within the same region and within the Virtual Private Cloud (VPC) You can also use a different availability zone.
Connecting on-premises and AWS region
Create a VPN connection between the on-premises location and the AWS region where your Capsule Server is located. It is also possible to use the external host name of Satellite Server when you register the instance that runs Capsule.
Site-to-site VPN connection between the AWS region and the on-premises data center
Direct connection using the external DNS host name
Connecting different regions
Create a site-to-site VPN connection between different regions so that you can use the internal DNS host name when you register the instance that runs Capsule to Satellite Server. If you do not establish a site-to-site VPN connection, use the external DNS host name when you register the instance that runs Capsule to Satellite Server.
Most public cloud providers do not charge for data being transferred into a region or between availability zones within a single region. However, they charge for data leaving the region to the Internet.
Site-to-site VPN connection between AWS regions
Direct connection using the external DNS host name
2.1.3. Configuring external authentication in Satellite Copy linkLink copied to clipboard!
Red Hat Satellite includes native support for authentication with a username and password. If you require additional methods of authentication, configure your Satellite Server to use an external authentication source.
Username and password | Single sign-on (SSO) | One-time password (OTP) | Time-based one-time password (TOTP) | |
---|---|---|---|---|
Active Directory (direct integration) | Yes | Yes | No | No |
Identity Management | Yes (Linux and Active Directory users) | Yes (Linux users only) | No | No |
Red Hat Single Sign-On | Yes | Yes | Yes | Yes |
LDAP | Yes | No | No | No |
Additional resources
- For more information, see Configuring authentication for Red Hat Satellite users.
2.1.4. Planning organization and location context Copy linkLink copied to clipboard!
Context in Satellite consists of organizations and locations. You can associate most resources, for example hosts, subnets, and domains, with at least one organization and location context.
Resources and users can generally only access resources within their own context, which makes configuring organizations and locations an integral part of access management in Satellite.
If you use host groups to bundle provisioning and configuration information, avoid mismatching resources from mutually exclusive contexts. For example, setting a subnet from one organization or location and a compute resource from a different organization or location creates an invalid host group.
Additional resources
- For examples of deployment scenarios, see Section 2.2, “Common deployment scenarios”.
- For information about managing organizations, see Managing organizations in Administering Red Hat Satellite.
- For information about managing locations, see Managing locations in Administering Red Hat Satellite.
2.1.5. Installing Capsule Servers Copy linkLink copied to clipboard!
By installing Capsule Servers, you extend the reach and scalability of your Satellite deployment. Setting up a Capsule Server registers the base operating system on which you are installing to Satellite Server and configures the new Capsule Server to provide the required services within your Satellite deployment.
You can install a Capsule Server in each of your geographic locations. By assigning a Capsule to each location, you decrease the load on Satellite Server, increase redundancy, and reduce bandwidth usage.
The maximum number of Capsule Servers that Satellite Server can support has no fixed limit. It was tested that a Satellite Server can support 17 Capsule Servers with 2 vCPUs.
Decide what services you want to enable on each Capsule Server. You can configure the DNS, DHCP, and TFTP services on one of your Capsule Servers or you can use an external server to provide these services to your Capsule Servers.
Additional resources
- For information on installing Capsule Servers, including prerequisites and configuring external services, see Installing Capsule Server.
- For information on tuning performance by using Capsules, see Capsule configuration tuning in Tuning performance of Red Hat Satellite.
2.1.6. Adding a Red Hat subscription to Satellite Copy linkLink copied to clipboard!
A Red Hat subscription manifest is a set of encrypted files that contains your subscription information. Satellite Server uses this information to access the Red Hat CDN and find what repositories are available for the associated subscription.
Deleting a subscription manifest removes all the subscriptions attached to running hosts and activation keys.
Additional resources
- For instructions about creating and importing a Red Hat subscription manifest, see Managing Red Hat subscriptions in Managing content.
- For details about using subscription manifests with Satellite, see Creating and managing manifests for a connected Satellite Server.
2.1.7. Defining your content library Copy linkLink copied to clipboard!
To ensure that your Satellite Server can manage software and provide it to your hosts, you must create repositories and synchronize them.
- Red Hat content
The Red Hat subscription manifest determines what Red Hat repositories your Satellite Server can access. Red Hat content is already organized into products.
For example, Red Hat Enterprise Linux Server is a product in Satellite. The repositories for the Red Hat Enterprise Linux Server product consist of different versions, architectures, and add-ons. When you enable a Red Hat repository, Satellite automatically creates an associated product.
- Other sources of content
To distribute content from custom sources, you must create products and repositories manually. You can organize other content into custom products however you want.
For example, you can create an EPEL (Extra Packages for Enterprise Linux) product and add an "EPEL 9 x86_64" repository to it.
Creating repositories allows you to choose the specific software required for your environment. By creating only the necessary repositories, you avoid downloading unnecessary content.
Synchronizing repositories downloads the content from Red Hat CDN or another source to your Satellite Server. The synchronized content is stored on your Satellite Server, eliminating the need for hosts to access the repositories. You can synchronize repositories manually, or you can create a sync plan to ensure synchronization runs on a regular basis.
Additional resources
- For more information, including procedures for enabling and synchronizing repositories, see Importing custom content in Managing content.
2.1.8. Defining content access strategies for hosts Copy linkLink copied to clipboard!
When defining your content lifecycle in Satellite, you can use content views and lifecycle environments to define which hosts can access which content and content versions. By default, Satellite includes the Default Organization View content view and the Library lifecycle environment.
- Default Organization View
- The Default Organization View is the default content view in Satellite that contains all the content that is synchronized to Satellite. After you update your content, such as by adding or removing a repository, the update is immediately reflected in Default Organization View.
- Library
- The Library lifecycle environment is the default lifecycle environment in Satellite. Every newly published content view version is automatically published to the Library lifecycle environment. You can also promote specific content view versions to the Library lifecycle environment if needed.
In smaller deployments or when you do not require content versioning and environment promotion, you can associate a host to the Library environment under the Default Organization View without configuring additional lifecycle environments.
Additional resources
- For more information, see Managing application lifecycles, Managing content views, and Restricting hosts' access to content in Managing content.
- For examples of content view deployments, see Section 2.2, “Common deployment scenarios”.
2.1.9. Defining role-based access control policies Copy linkLink copied to clipboard!
Users in Satellite can have one or more roles assigned. These roles are associated with permissions that enable users to perform specified administrative actions in Satellite. Permission filters define the actions allowed for a certain resource type.
Satellite provides a set of predefined roles with permissions sufficient for standard tasks. You can also configure custom roles.
One of the predefined roles is the Default role. Satellite assigns the Default role to every user in the system. By default, the Default role grants only a limited set of permissions. Be aware that if you add a permission to the Default role, every Satellite users will gain that permission. Assigning a different role to a user does not remove the Default role from the user.
The following types of roles are commonly defined within various Satellite deployments:
- Roles related to applications or parts of infrastructure
- For example, roles for owners of Red Hat Enterprise Linux as the operating system as opposed to roles for owners of application servers and database servers.
- Roles related to a particular stage of the software lifecycle
- For example, roles divided among the development, testing, and production phases, where each phase has one or more owners.
- Roles related to specific tasks
- For example, you can create a role for security managers and a role for license managers, depending on the specific tasks users need to be able to perform within your organization.
Additional resources
- For more information, including details about creating custom roles and granting permissions to roles, see Managing users and roles in Administering Red Hat Satellite.
2.1.9.1. Best practices for role-based access control in Satellite Copy linkLink copied to clipboard!
- Define the expected tasks and responsibilities: Define the subset of the Satellite infrastructure that you want the role to access as well as actions permitted on this subset. Think of the responsibilities of the role and how it differs from other roles.
- Use predefined roles whenever possible: Satellite provides several sample roles that you can use. Copying and editing an existing role can be a good start for creating a custom role.
- Adopt a granular approach to user role management: Define roles with specific and well-scoped permissions. Note that each user can have multiple roles assigned and that permissions from these roles are cumulative.
- Add permissions gradually and test the results: When creating a custom role, start with a limited set of permissions and add permissions one by one, while testing continuously. Ensure to test your custom role to verify that it works as intended.
- Consider areas of interest and granting read-only access: Even though a role has a limited area of responsibility, it might need a wider set of permissions. Therefore, you can grant the role a read-only access to parts of Satellite infrastructure that influence its area of responsibility.
2.1.10. Configuring provisioning Copy linkLink copied to clipboard!
After your basic Satellite infrastructure is in place, you can start configuring provisioning to ensure that Satellite can seamlessly create, configure, and manage hosts.
The process depends on whether you want to provision bare-metal hosts, virtual machines, or cloud instances, but it includes defining installation media, configuring provisioning templates, and other tasks. If you are provisioning virtual machines or cloud instances, you must also integrate your compute provider with Satellite by connecting the provider as a compute resource to Satellite.
The following Satellite features support automating the provisioning of your hosts:
- Provisioning templates enable you to define the way Satellite installs an operating system on your hosts.
- The Discovery service enables you to detect unknown hosts and virtual machines on the provisioning network.
- Host groups enable you to standardize provisioning of host configurations.
Additional resources
- For a complete guide to provisioning, see Provisioning hosts.
2.1.11. Overview of recommended disaster recovery plans Copy linkLink copied to clipboard!
Choose a disaster recovery plan that best helps ensure the continuity of Satellite services in your deployment.
- Snapshots of virtualized Satellite Server
- How do I back up?
- Virtualize your Satellite Server and use the hypervisor tools to take virtual machine snapshots of the server. This method is suitable if you can run Satellite in a virtual machine.
- How will I recover in case of a disruptive event?
- To recover Satellite services, restore a virtual machine snapshot.
- Disadvantages and expected impact
- Expect some amount of data inconsistency after recovery, based on how old your last snapshot is. You will lose data changes that have occurred since the snapshot you are using to recover was taken.
- Active and passive Satellite Server, with external storage
- How do I back up?
-
Store the following critical data on network attached storage: content in
/var/lib/pulp
and database in/var/lib/pgsql
. Replicate this storage into a different data center. Attach the storage to a Satellite Server that is a clone of the primary Satellite Server but runs passively. - How will I recover in case of a disruptive event?
- To recover Satellite services, switch DNS records of the active Satellite Server with the passive Satellite Server. This ensures that the passive server becomes the active server. All hosts remain connected without configuration updates.
- Disadvantages and expected impact
- If the network attached storage is replicated to another location, expect some amount of data inconsistency after recovery based on the synchronization interval.
- Active and passive Satellite Server, with backup and restore
- How do I back up?
- Ensure periodic backups of your Satellite Server. Copy this backup to a passive Satellite Server and restore it on the passive server.
- How will I recover in case of a disruptive event?
- To recover Satellite services, switch DNS records of the active Satellite Server with the passive Satellite Server. This ensures that the passive server becomes the active server. All hosts remain connected without configuration updates.
- Disadvantages and expected impact
- Expect some amount of data inconsistency after recovery, based on how often you took and restored backups and on how long it takes to complete the restore process.
- Dual active Satellite Server
- How do I back up?
Operate an active, independent Satellite Server per data center. Hosts from each data center are registered to the Satellite Server in that data center. Then configure automation to ensure recovery in case of a disruptive event. For example, you can periodically run a health check and if the health check discovers that the current Satellite Server a host is registered to does not resolve, the host is re-registered to the other Satellite Server.
To minimize downtime, you can automate the recovery in various ways. For example, you can use the Satellite Ansible collection. For more information, see Automating Satellite management with Satellite Ansible Collection in Administering Red Hat Satellite.
- How will I recover in case of a disruptive event?
- To recover Satellite services, re-register all hosts to the Satellite Server in the other data center.
- Disadvantages and expected impact
- You must ensure that content synchronization and content view creation are synchronized to create the same content view in each Satellite and prevent content drift. Content drift occurs when available content deviates from the intended state defined by a content view. If you fail to prevent content drift, expect inconsistency in the content that is available to hosts.
Additional resources
- For a complete guide to disaster recovery, see Preparing for disaster recovery and recovering from data loss in Administering Red Hat Satellite.
-
To create backups of your Satellite Server and Capsule Servers, use the
satellite-maintain backup
command. For more information, see Backing up Satellite Server and Capsule Server in Administering Red Hat Satellite. - To back up your hosts, you can use remote execution to configure recurring backup tasks that Satellite will run on the hosts. For more information, see Configuring and setting up remote jobs in Managing hosts.
2.1.12. Additional deployment tasks Copy linkLink copied to clipboard!
Satellite offers a range of additional capabilities that you can use to further enhance your Satellite deployment. For example:
- Remote execution commands on hosts
With remote execution, you can perform various tasks on multiple hosts simultaneously. Satellite supports the following modes of transport for remote execution: pull-based mode (over MQTT/HTTPS) and push-based mode (over SSH).
For more information, see Configuring and setting up remote jobs in Managing hosts.
- Automating tasks with a configuration management tool
By integrating Satellite with a configuration management tool, you can automate repetitive tasks and ensure consistent configuration of your hosts.
For more information on using Ansible with Satellite, see Managing configurations by using Ansible integration.
For more information on using Puppet with Satellite, see Managing configurations by using Puppet integration.
- Security management with OpenSCAP
With OpenSCAP, you can manage compliance policies and run security compliance scans on your hosts. After the scan completes, a compliance report is uploaded to your Satellite Server.
For more information, see Managing security compliance.
- Load balancing
With load balancing configured on your Capsule Servers, you can improve performance on Capsule Servers while also improving performance and stability for host connections to Satellite.
For more information, see Configuring Capsules with a load balancer.
- Incident management with Red Hat Insights
With Red Hat Insights enabled on your Satellite Server, you can identify key risks to stability, security, and performance.
For more information, see Using Red Hat Insights with Satellite Server in Installing Satellite Server in a connected network environment.
2.2. Common deployment scenarios Copy linkLink copied to clipboard!
This section provides a brief overview of common deployment scenarios for Red Hat Satellite. Note that many variations and combinations of the following layouts are possible.
2.2.1. Single location with segregated subnets Copy linkLink copied to clipboard!
Your infrastructure might require multiple isolated subnets even if Red Hat Satellite is deployed in a single geographic location. This can be achieved for example by deploying multiple Capsule Servers with DHCP and DNS services, but the recommended way is to create segregated subnets using a single Capsule. This Capsule is then used to manage hosts and compute resources in those segregated networks to ensure they only have to access the Capsule for provisioning, configuration, errata, and general management. For more information on configuring subnets, see Managing hosts.
2.2.2. Multiple locations Copy linkLink copied to clipboard!
Red Hat recommends to create at least one Capsule Server per geographic location. This practice can save bandwidth since hosts obtain content from a local Capsule Server. Synchronization of content from remote repositories is done only by the Capsule, not by each host in a location. In addition, this layout makes the provisioning infrastructure more reliable and easier to configure.
2.2.3. Content view scenarios Copy linkLink copied to clipboard!
The following section provides general scenarios for deploying content views as well as lifecycle environments.
The default lifecycle environment called Library gathers content from all connected sources. It is not recommended to associate hosts directly with the Library as it prevents any testing of content before making it available to hosts. Instead, create a lifecycle environment path that suits your content workflow. The following scenarios are common:
A single lifecycle environment – content from Library is promoted directly to the production stage. This approach limits the complexity but still allows for testing the content within the Library before making it available to hosts.
A single lifecycle environment path – both operating system and applications content is promoted through the same path. The path can consist of several stages (for example Development, QA, Production), which enables thorough testing but requires additional effort.
Application specific lifecycle environment paths – each application has a separate path, which allows for individual application release cycles. You can associate specific compute resources with application lifecycle stages to facilitate testing. On the other hand, this scenario increases the maintenance complexity.
The following content view scenarios are common:
- All in one content view – a content view that contains all necessary content for the majority of your hosts. Reducing the number of content views is an advantage in deployments with constrained resources (time, storage space) or with uniform host types. However, this scenario limits the content view capabilities such as time based snapshots or intelligent filtering. Any change in content sources affects a proportion of hosts.
- Host specific content view – a dedicated content view for each host type. This approach can be useful in deployments with a small number of host types (up to 30). However, it prevents sharing content across host types as well as separation based on criteria other than the host type (for example between operating system and applications). With critical updates every content view has to be updated, which increases maintenance efforts.
- Host specific composite content view – a dedicated combination of content views for each host type. This approach enables separating host specific and shared content, for example you can have dedicated content views for the operating system and application content. By using a composite, you can manage your operating system and applications separately and at different frequencies.
- Component based content view – a dedicated content view for a specific application. For example a database content view can be included into several composite content views. This approach allows for greater standardization but it leads to an increased number of content views.
The optimal solution depends on the nature of your host environment. Avoid creating a large number of content views, but keep in mind that the size of a content view affects the speed of related operations (publishing, promoting). Also make sure that when creating a subset of packages for the content view, all dependencies are included as well. Note that Kickstart repositories should not be added to content views, as they are used for host provisioning only.
2.2.4. Satellite Server with multiple manifests Copy linkLink copied to clipboard!
If you plan to have more than one Red Hat Network account, or if you want to manage systems belonging to another entity that is also a Red Hat Network account holder, then you and the other account holder can assign subscriptions, as required, to manifests. A customer that does not have a Satellite subscription can create a Subscription Asset Manager manifest, which can be used with Satellite, if they have other valid subscriptions. You can then use the multiple manifests in one Satellite Server to manage multiple organizations.
If you must manage systems but do not have access to the subscriptions for the RPMs, you must use Red Hat Enterprise Linux Satellite Add-On. For more information, see Satellite Add-On.
The following diagram shows two Red Hat Network account holders, who want their systems to be managed by the same Satellite installation. In this scenario, Example Corporation 1 can allocate any subset of their 60 subscriptions, in this example they have allocated 30, to a manifest. This can be imported into the Satellite as a distinct Organization. This allows system administrators the ability to manage Example Corporation 1’s systems using Satellite completely independently of Example Corporation 2’s organizations (R&D, Operations, and Engineering).
Figure 2.1. Satellite Server with multiple manifests
When creating a Red Hat subscription manifest:
- Add the subscription for Satellite Server to the manifest if planning a disconnected or self-registered Satellite Server. This is not necessary for a connected Satellite Server that is subscribed using the Subscription Manager utility on the base system.
- Add subscriptions for all Capsule Servers you want to create.
- Add subscriptions for all Red Hat products you want to manage with Satellite.
- Note the date when the subscriptions are due to expire and plan for their renewal before the expiry date.
- Create one manifest per organization. You can use multiple manifests and they can be from different Red Hat subscriptions.
Red Hat Satellite allows the use of future-dated subscriptions in the manifest. This enables uninterrupted access to repositories when future-dated subscriptions are added to a manifest before the expiry date of existing subscriptions.
Note that the Red Hat subscription manifest can be modified and reloaded to Satellite Server in case of any changes in your infrastructure, or when adding more subscriptions. Manifests should not be deleted. If you delete the manifest from the Red Hat Customer Portal or in the Satellite web UI it will unregister all of your content hosts.
2.2.5. Host group structures Copy linkLink copied to clipboard!
The fact that host groups can be nested to inherit parameters from each other allows for designing host group hierarchies that fit particular workflows. A well planned host group structure can help to simplify the maintenance of host settings. This section outlines four approaches to organizing host groups.
Figure 2.2. Host group structuring examples
- Flat structure
- The advantage of a flat structure is limited complexity, as inheritance is avoided. In a deployment with few host types, this scenario is the best option. However, without inheritance there is a risk of high duplication of settings between host groups.
- Lifecycle environment based structure
- In this hierarchy, the first host group level is reserved for parameters specific to a lifecycle environment. The second level contains operating system related definitions, and the third level contains application specific settings. Such structure is useful in scenarios where responsibilities are divided among lifecycle environments (for example, a dedicated owner for the Development, QA, and Production lifecycle stages).
- Application based structure
- This hierarchy is based on roles of hosts in a specific application. For example, it enables defining network settings for groups of back-end and front-end servers. The selected characteristics of hosts are segregated, which supports Puppet-focused management of complex configurations. However, the content views can only be assigned to host groups at the bottom level of this hierarchy.
- Location based structure
- In this hierarchy, the distribution of locations is aligned with the host group structure. In a scenario where the location (Capsule Server) topology determines many other attributes, this approach is the best option. On the other hand, this structure complicates sharing parameters across locations, therefore in complex environments with a large number of applications, the number of host group changes required for each configuration change increases significantly.
2.2.6. Inter-Satellite Synchronization scenarios Copy linkLink copied to clipboard!
Red Hat Satellite uses Inter-Satellite Synchronization (ISS) to synchronize content between two Satellite Servers including those that are air gapped.
You can use ISS in cases such as:
- If you want to copy some but not all content from your Satellite Server to other Satellite Servers. For example, you have content views that your IT department consumes from Satellite Server, and you want to copy content from those content views to other Satellite Servers.
- If you want to copy all Library content from your Satellite Server to other Satellite Servers. For example, you have products and repositories that your IT department consumes from Satellite Server in the Library, and you want to copy all products and repositories in that organization to other Satellite Servers.
You cannot use ISS to synchronize content from Satellite Server to Capsule Server. Capsule Server supports synchronization natively. For more information, see Capsule Server Overview in Overview, concepts, and deployment considerations.
There are different ways of using ISS. The way you can use depends on your multi-server setup that can fall to one of the following scenarios.
2.2.6.1. ISS network sync in a disconnected scenario Copy linkLink copied to clipboard!
In a disconnected scenario, there is the following setup:
- The upstream Satellite Server is connected to the Internet. This server consumes content from the Red Hat Content Delivery Network (CDN) or custom sources.
- The downstream Satellite Server is completely isolated from all external networks.
- The downstream Satellite Server can communicate with a connected upstream Satellite Server over an internal network.
Figure 2.3. Satellite ISS disconnected scenario
You can configure your downstream Satellite Server to synchronize content from the upstream Satellite Server over the network.
2.2.6.2. ISS export sync in an air-gapped scenario Copy linkLink copied to clipboard!
In an air-gapped scenario, there is the following setup:
- The upstream Satellite Server is connected to the Internet. This server consumes content from the Red Hat CDN or custom sources.
- The downstream Satellite Server is completely isolated from all external networks.
- The downstream Satellite Server does not have a network connection to a connected upstream Satellite Server.
Figure 2.4. Satellite ISS air-gapped scenario
The only way for an air-gapped downstream Satellite Server to receive content updates is by exporting payload from the upstream Satellite Server, bringing it physically to the downstream Satellite Server, and importing the payload. For more information, see Synchronizing Content Between Satellite Servers in Managing content.
You can configure your downstream Satellite Server to synchronize content by using exports.
2.3. Provisioning requirements Copy linkLink copied to clipboard!
An important feature of Red Hat Satellite is unattended provisioning of hosts. To achieve this, Red Hat Satellite uses DNS and DHCP infrastructures, PXE booting, TFTP, and Kickstart. Use this chapter to understand the working principle of these concepts.
2.3.1. PXE booting Copy linkLink copied to clipboard!
Preboot execution environment (PXE) provides the ability to boot a system over a network. Instead of using local hard drives or a CD-ROM, PXE uses DHCP to provide host with standard information about the network, to discover a TFTP server, and to download a boot image. For more information about setting up a PXE server see the Red Hat Knowledgebase solution How to set-up/configure a PXE Server.
2.3.1.1. PXE sequence Copy linkLink copied to clipboard!
- The host boots the PXE image if no other bootable image is found.
- A NIC of the host sends a broadcast request to the DHCP server.
- The DHCP server receives the request and sends standard information about the network: IP address, subnet mask, gateway, DNS, the location of a TFTP server, and a boot image.
-
The host obtains the boot loader
image/pxelinux.0
and the configuration filepxelinux.cfg/00:MA:CA:AD:D
from the TFTP server. -
The host configuration specifies the location of a kernel image,
initrd
and Kickstart. - The host downloads the files and installs the image.
For an example of using PXE Booting by Satellite Server, see Provisioning Workflow in Provisioning hosts.
2.3.1.2. PXE booting requirements Copy linkLink copied to clipboard!
To provision machines using PXE booting, ensure that you meet the following requirements:
Network requirements
- Optional: If the host and the DHCP server are separated by a router, configure the DHCP relay agent and point to the DHCP server.
Client requirements
- Ensure that all the network-based firewalls are configured to allow clients on the subnet to access the Capsule. For more information, see Section 1.3.6, “Capsule networking”.
- Ensure that your client has access to the DHCP and TFTP servers.
Satellite requirements
- Ensure that both Satellite Server and Capsule have DNS configured and are able to resolve provisioned host names.
- Ensure that the UDP ports 67 and 68 are accessible by the client to enable the client to receive a DHCP offer with the boot options.
- Ensure that the UDP port 69 is accessible by the client so that the client can access the TFTP server on the Capsule.
- Ensure that the TCP port 80 is accessible by the client to allow the client to download files and Kickstart templates from the Capsule.
- Ensure that the host provisioning interface subnet has a DHCP Capsule set.
- Ensure that the host provisioning interface subnet has a TFTP Capsule set.
- Ensure that the host provisioning interface subnet has a Templates Capsule set.
- Ensure that DHCP with the correct subnet is enabled using the Satellite installer.
- Enable TFTP using the Satellite installer.
2.3.2. HTTP booting Copy linkLink copied to clipboard!
You can use HTTP booting to boot systems over a network using HTTP.
2.3.2.1. HTTP booting requirements with managed DHCP Copy linkLink copied to clipboard!
To provision machines through HTTP booting ensure that you meet the following requirements:
Client requirements
For HTTP booting to work, ensure that your environment has the following client-side configurations:
- All the network-based firewalls are configured to allow clients on the subnet to access the Capsule. For more information, see Section 1.3.6, “Capsule networking”.
- Your client has access to the DHCP and DNS servers.
- Your client has access to the HTTP UEFI Boot Capsule.
Network requirements
- Optional: If the host and the DHCP server are separated by a router, configure the DHCP relay agent and point to the DHCP server.
Satellite requirements
Although TFTP protocol is not used for HTTP UEFI Booting, Satellite uses TFTP Capsule API to deploy boot loader configuration.
For HTTP booting to work, ensure that Satellite has the following configurations:
- Both Satellite Server and Capsule have DNS configured and are able to resolve provisioned host names.
- The UDP ports 67 and 68 are accessible by the client so that the client can send and receive a DHCP request and offer.
- Ensure that the TCP port 8000 is open for the client to download the boot loader and Kickstart templates from the Capsule.
- The TCP port 9090 is open for the client to download the boot loader from the Capsule using the HTTPS protocol.
- The subnet that functions as the host’s provisioning interface has a DHCP Capsule, an HTTP Boot Capsule, a TFTP Capsule, and a Templates Capsule
2.3.2.2. HTTP booting requirements with unmanaged DHCP Copy linkLink copied to clipboard!
To provision machines through HTTP booting without managed DHCP ensure that you meet the following requirements:
Client requirements
HTTP UEFI Boot URL must be set to one of:
-
http://capsule.example.com:8000
-
https://capsule.example.com:9090
-
- Ensure that your client has access to the DHCP and DNS servers.
- Ensure that your client has access to the HTTP UEFI Boot Capsule.
- Ensure that all the network-based firewalls are configured to allow clients on the subnet to access the Capsule. For more information, see Section 1.3.6, “Capsule networking”.
Network requirements
- An unmanaged DHCP server available for clients.
- An unmanaged DNS server available for clients. In case DNS is not available, use IP address to configure clients.
Satellite requirements
Although TFTP protocol is not used for HTTP UEFI Booting, Satellite use TFTP Capsule API to deploy boot loader configuration.
- Ensure that both Satellite Server and Capsule have DNS configured and are able to resolve provisioned host names.
- Ensure that the UDP ports 67 and 68 are accessible by the client so that the client can send and receive a DHCP request and offer.
- Ensure that the TCP port 8000 is open for the client to download boot loader and Kickstart templates from the Capsule.
- Ensure that the TCP port 9090 is open for the client to download the boot loader from the Capsule through HTTPS.
- Ensure that the host provisioning interface subnet has an HTTP Boot Capsule set.
- Ensure that the host provisioning interface subnet has a TFTP Capsule set.
- Ensure that the host provisioning interface subnet has a Templates Capsule set.
Appendix A. Technical users provided and required by Satellite Copy linkLink copied to clipboard!
During the installation of Satellite, system accounts are created. They are used to manage files and process ownership of the components integrated into Satellite. Some of these accounts have fixed UIDs and GIDs, while others take the next available UID and GID on the system instead. To control the UIDs and GIDs assigned to accounts, you can define accounts before installing Satellite. Because some of the accounts have hard-coded UIDs and GIDs, it is not possible to do this with all accounts created during Satellite installation.
The following table lists all the accounts created by Satellite during installation. You can predefine accounts that have Yes in the Flexible UID and GID column with custom UID and GID before installing Satellite.
Do not change the home and shell directories of system accounts because they are requirements for Satellite to work correctly.
Because of potential conflicts with local users that Satellite creates, you cannot use external identity providers for the system users of the Satellite base operating system.
User name | UID | Group name | GID | Flexible UID and GID | Home | Shell |
---|---|---|---|---|---|---|
foreman | N/A | foreman | N/A | yes | /usr/share/foreman | /sbin/nologin |
foreman-proxy | N/A | foreman-proxy | N/A | yes | /usr/share/foreman-proxy | /sbin/nologin |
apache | 48 | apache | 48 | no | /usr/share/httpd | /sbin/nologin |
postgres | 26 | postgres | 26 | no | /var/lib/pgsql | /bin/bash |
pulp | N/A | pulp | N/A | no | N/A | /sbin/nologin |
puppet | 52 | puppet | 52 | no | /opt/puppetlabs/server/data/puppetserver | /sbin/nologin |
saslauth | N/A | saslauth | 76 | no | /run/saslauthd | /sbin/nologin |
tomcat | 53 | tomcat | 53 | no | /usr/share/tomcat | /bin/nologin |
unbound | N/A | unbound | N/A | yes | /etc/unbound | /sbin/nologin |
Appendix B. Glossary of terms used in Satellite Copy linkLink copied to clipboard!
Satellite is a complete lifecycle management tool for physical hosts, virtual machines, and cloud instances. Key features include automated host provisioning, configuration management, and content management including patch and errata management. You can automate tasks and quickly provision hosts, all through a single unified interface.
This alphabetically ordered glossary provides an overview of Satellite related technical terms.
- Activation key
Activation keys are used by Subscription Manager to register hosts to Satellite. They define content view and lifecycle environment associations, content overrides, system purpose attributes, and other parameters to be associated with a newly created host.
They are associated to exactly one lifecycle environment and exactly one content view, though this may be a composite content view. You can use them on multiple machines and they behave like configuration information rather than traditional software license keys. You can also use multiple activation keys with a single host. When you register a host using an activation key, certain content from Satellite is provided to the host. The content that is made available depends on the content in the activation key’s content view and lifecycle environment, any content overrides present, any repository-level restrictions such as operating system or architecture, and system purpose attributes such as release version.
- Ansible
Ansible is an agentless open-source automation engine. Ansible uses SSH to connect to hosts. It uses playbooks and roles to describe and bundle tasks. Within Satellite, you can use Ansible to configure hosts and perform remote execution.
For more information about using Ansible to configure hosts, see Managing configurations by using Ansible integration. For more information about automating Satellite using Ansible, see Automating Satellite management with Satellite Ansible Collection in Administering Red Hat Satellite.
- Answer file
-
A configuration file that defines settings for an installation scenario. Answer files are defined in the YAML format and stored in the
/etc/foreman-installer/scenarios.d/
directory. To see the default values for installation scenario parameters, use thesatellite-installer --full-help
command on your Satellite Server.
- ARF report
- Asset Reporting Format (ARF) reports are the result of OpenSCAP compliance scans on hosts which have a policy assigned. Summarizes the security compliance of hosts managed by Red Hat Satellite. They list compliance criteria and whether the scanned host has passed or failed.
- Audits
- Provide a report on changes made by a specific user. Audits can be viewed in the Satellite web UI under Monitor > Audits.
- Baseboard management controller (BMC)
- Enables remote power management of bare-metal hosts. In Satellite, you can create a BMC interface to manage selected hosts.
- Boot disk
- An ISO image used for PXE-less provisioning. This ISO enables the host to connect to Satellite Server, boot the installation media, and install the operating system. There are several kinds of boot disks: host image, full host image, generic image, and subnet image.
- Capsule Server
Capsule Servers can provide DHCP, DNS, and TFTP services and act as an Ansible control node or Puppet server in separate networks. They interact with Satellite Server in a client-server model. Satellite Server always comes bundled with an integrated Capsule.
Capsule Servers are required in Satellite deployments that manage IT infrastructure spanning across multiple networks and useful for Satellite deployments across various geographical locations.
- Catalog
- A document that describes the desired system state for one specific host managed by Puppet. It lists all of the resources that need to be managed, as well as any dependencies between those resources. Catalogs are compiled by a Puppet server from Puppet Manifests and data from Puppet agents.
- Candlepin
- A service within Katello responsible for subscription management.
- Compliance policy
- Compliance policies refer to the application of SCAP content to hosts by using Satellite with its OpenSCAP plugin. You can create compliance policies by using the Satellite web UI, Hammer CLI, or API. A compliance policy requires the setting of a specific XCCDF profile from a SCAP content, optionally using a tailoring file. You can set up scheduled tasks on Satellite that check your hosts for compliance against SCAP content. When a compliance policy scan completes, the host sends an ARF report to Satellite.
- Compute profile
- Specifies default attributes for new virtual machines on a compute resource.
- Compute resource
- A compute resource is an external virtualization or cloud infrastructure that you can attach to Satellite. Satellite can provision, configure, and manage hosts within attached compute resources. Examples of compute resources include VMware or libvirt and cloud providers such as Microsoft Azure or Amazon EC2.
- Configuration Management
- Configuration management describes the task of configuring and maintaining hosts. In Satellite, you can use Ansible and Puppet to configure and maintain hosts with Satellite as a single source of infrastructure truth.
- Container (Docker container)
- An isolated application sandbox that contains all runtime dependencies required by an application. Satellite supports container provisioning on a dedicated compute resource.
- Container image
- A static snapshot of the container’s configuration. Satellite supports various methods of importing container images as well as distributing images to hosts through content views.
- Content
-
A general term for everything Satellite distributes to hosts. Content includes software packages such as
.rpm
packages, errata, or Docker images. Content is synchronized into the Library and then promoted into lifecycle environments using content views so that they can be consumed by hosts.
- Content delivery network (CDN)
- The mechanism used to deliver Red Hat content to Satellite Server.
- Content view
- Content views are named and versioned collections of repositories. When you publish a content view, Satellite creates a new content view version. This content view version is a frozen snapshot of the current state of the repositories within the content view. Any subsequent changes to the underlying repositories will no longer affect the published content view version. Once a content view is published, it can be promoted through the lifecycle environment path, or modified using incremental upgrades.
- Composite content view
- Composite content views contain content views, which allows for a more modular approach to manage and version content. You can choose which version of each content view is used in a composite content view.
- Discovered host
- A bare-metal host detected on the provisioning network by the Discovery plugin.
- Discovery image
- Refers to the minimal operating system based on Red Hat Enterprise Linux that is PXE-booted on hosts to acquire initial hardware information and to communicate with Satellite Server before starting the provisioning process.
- Discovery plugin
- Enables automatic bare-metal discovery of unknown hosts on the provisioning network. The plugin consists of three components: services running on Satellite Server and Capsule Server, and the Discovery image running on host.
- Discovery rule
- A set of predefined provisioning rules which assigns a host group to discovered hosts and triggers provisioning automatically.
- Docker tag
- A mark used to differentiate container images, typically by the version of the application stored in the image. In the Satellite web UI, you can filter images by tag under Content > Docker Tags.
- ERB
- Embedded Ruby (ERB) is a template syntax used in provisioning and job templates.
- Errata
- Updated packages containing security fixes, bug fixes, and enhancements. In relationship to a host, erratum is applicable if it updates a package installed on the host and installable if it is present in the host’s content view (which means it is accessible for installation on the host).
- External node classifier (ENC)
- A construct that provides additional data for a server to use when configuring hosts. When Puppet obtains information about nodes from an external source instead of its own database, the external source is called External node classifier. If the Puppet plugin is installed, Red Hat Satellite can act as an External node classifier to Puppet servers in a Satellite deployment.
- Facter
- A program that provides information (facts) about the system on which it is run; for example, Facter can report total memory, operating system version, architecture, and more. Puppet modules enable specific configurations based on host data gathered by Facter.
- Facts
- Host parameters such as total memory, operating system version, or architecture. Facts are reported by Facter and used by Puppet.
- Foreman
- Foreman is an open-source component to provision and manage hosts. Foreman is the core upstream component of Red Hat Satellite.
- Full host image
- A boot disk used for PXE-less provisioning of a specific host. The full host image contains an embedded Linux kernel and init RAM disk of the associated operating system installer.
- Generic image
- A boot disk for PXE-less provisioning that is not tied to a specific host. The generic image sends the MAC address of your host to Satellite Server, which matches it against the host entry.
- Hammer
- Hammer is a command-line interface tool for Satellite. You can execute Hammer commands from the command line or utilize it in scripts. You can use Hammer to automate certain recurring tasks as an alternative to Satellite Ansible collection or Satellite API.
- Host
- A host is a physical, virtual, or cloud instance registered to Satellite.
- Host collection
- A user defined group of one or more Hosts used for bulk actions such as errata installation.
- Host group
- A host group is a template to build hosts that holds shared parameters, such as subnet or lifecycle environment. It helps to unify configuration management in Ansible and Puppet by grouping hosts. You can nest host groups to create a hierarchical structure. For more information, see Working with host groups in Managing hosts.
- Host image
- A boot disk used for PXE-less provisioning of a specific host. The host image only contains the boot files necessary to access the installation media on Satellite Server.
- Incremental upgrade (of a content view)
- The act of creating a new (minor) content view version in a lifecycle environment. Incremental upgrades provide a way to make in-place modification of an already published content view. Useful for rapid updates, for example when applying security errata.
- Installation Media
Installation media are sets of installation files used to install the base operating system during the provisioning process. An installation medium in Satellite represents the installation files for one or more operating systems, which must be accessible over the network, either through an URL or an NFS server location. It is usually either a mirror or a CD or DVD image.
Every operating system depends on exactly one path of an installation medium, whereas installation media paths may serve different operating systems at the same time. You can use operating system parameters such as
$version
,$major
, and$minor
to parameterize the URL.
- Job
- A command executed remotely on a host from Satellite Server. Every job is defined in a job template.
- Katello
- Katello is an open-source plugin to perform content management and subscription handling. It depends on Pulp for content management, which fetches software from repositories and stores various versions of it. It also depends on Candlepin for host registration and managing subscription manifests. The Katello plugin is always installed on Satellite.
- Lazy sync
- The ability to change the default download policy of a repository from Immediate to On Demand. The On Demand setting saves storage space and synchronization time by only downloading the packages when requested by a host.
- Location
- A collection of default settings that represent a physical place. Location is a tag mostly used for geographical separation of hosts within Satellite. Examples include different cities or different data centers.
- Library
- A container for content from all synchronized repositories on Satellite Server. Libraries exist by default for each organization as the root of every lifecycle environment path and the source of content for every content view.
- Lifecycle environment
- A lifecycle environment represents a step in the lifecycle environment path. It defines the stage in which certain versions of content are available to hosts, such as development, testing, and production. This way, new versions of software can be developed and tested before being deployed in a production environment, thus reducing the risk of disruption by prematurely rolled out updates. Content moves through lifecycle environments by publishing and promoting content views.
- Lifecycle environment path
- A sequence of lifecycle environments through which content views are promoted. You can promote a content view through a typical promotion path, for example, from development to test to production. All lifecycle environment paths originate from the Library environment, which is always present by default.
- Manifest (Red Hat subscription manifest)
- A mechanism for transferring subscriptions from the Red Hat Customer Portal to Red Hat Satellite. Do not confuse with Puppet manifest.
- Migrating Satellite
- The process of moving an existing Satellite installation to a new instance.
- OpenSCAP
- A project implementing security compliance auditing according to the Security Content Automation Protocol (SCAP). OpenSCAP is integrated in Satellite to provide compliance auditing for hosts.
- Organization
- An isolated collection of systems, content, and other functionality within Satellite. Organization is a tag used for organizational separation of hosts within Satellite. Examples include different teams or business units.
- Parameter
- Defines the behavior of Red Hat Satellite components during provisioning. Depending on the parameter scope, we distinguish between global, domain, host group, and host parameters. Depending on the parameter complexity, we distinguish between simple parameters (key-value pair) and smart parameters (conditional arguments, validation, overrides).
- Parametrized class (smart class parameter)
- A parameter created by importing a class from Puppet server.
- Patch and release management
- Patch and release management describes the process of acquiring, managing, and installing patches and software updates to your infrastructure. Using Satellite, you can keep control of the package versions available to your hosts and deliver applicable errata.
- Permission
- Defines an action related to a selected part of Satellite infrastructure (resource type). Each resource type is associated with a set of permissions, for example the Architecture resource type has the following permissions: view_architectures, create_architectures, edit_architectures, and destroy_architectures. You can group permissions into roles and associate them with users or user groups.
- Product
- Products are named collections of one or more repositories. When you upload a Red Hat manifest, Satellite automatically groups Red Hat content within products.
- Promote (a content view)
- The act of moving a content view from one lifecycle environment to another. For more information, see Promoting a content view in Managing content.
- Provisioning
- The provisioning of a host is the deployment of the base operating system on the host and registration of the host to Satellite. Optionally, the process continues with the supply of content and configuration. This process is ideally automated. Provisioned hosts run on compute resources or bare metal, never Satellite Server or Capsule Servers.
- Provisioning template
- Provisioning templates are templates that automate deployment of an operating system on hosts. Satellite contains provisioning templates for Red Hat Enterprise Linux.
- Publish (a content view)
- The act of making a content view version available in a lifecycle environment and usable by hosts.
- Pulp
- A service within Katello responsible for repository and content management.
- Puppet
- Puppet is a configuration management tool utilizing a declarative language in a server-client architecture. For more information about using Puppet to configure hosts, see Managing configurations by using Puppet integration.
- Puppet agent
- A service running on a host that applies configuration changes to that host.
- Puppet environment
- An isolated set of Puppet agent nodes that can be associated with a specific set of Puppet Modules.
- Puppet manifest
Refers to Puppet scripts, which are files with the .pp extension. The files contain code to define a set of necessary resources, such as packages, services, files, users and groups, and so on, using a set of key-value pairs for their attributes.
Do not confuse with Manifest (Red Hat subscription manifest).
- Puppet server
- A Capsule Server component that provides a Puppet catalog to hosts for execution by the Puppet agent.
- Puppet module
- A self-contained bundle of code (Puppet Manifests) and data (facts) that you can use to manage resources such as users, files, and services.
- PXE
- PXE stands for preboot execution environment and is used to boot operating systems received from the network rather than a local disk. It requires a compatible network interface card (NIC) and relies on DHCP and TFTP.
- Recurring logic
- A job executed automatically according to a schedule. In the Satellite web UI, you can view those jobs under Monitor > Recurring logics.
- Registry
- An archive of container images. Satellite supports importing images from local and external registries. Satellite itself can act as an image registry for hosts. However, hosts cannot push changes back to the registry.
- Remote execution (REX)
- Remote execution is the process of using Satellite to run commands on registered hosts.
- Repository
- A repository is a single source and the smallest unit of content in Satellite. You can either synchronize a repository with a URL or manually upload content to Satellite. Satellite supports multiple content types. For more information, see Content types in Satellite in Managing content. One or more repositories form a product.
- Resource type
- Refers to a part of Satellite infrastructure, for example host, Capsule, or architecture. Used in permission filtering.
- Role
- Specifies a collection of permissions that are applied to a set of resources, such as hosts. Roles can be assigned to users and user groups. Satellite provides a number of predefined roles.
- SCAP content
-
SCAP stands for Security Content Automation Protocol and refers to
.xml
files containing the configuration and security baseline against which hosts are checked. Satellite uses SCAP content in compliance policies.
- Subnet image
- A type of generic image for PXE-less provisioning that communicates through Capsule Server.
- Subscription
- An entitlement for receiving content and service from Red Hat.
- Subscription Manager
-
Subscription Manager is a client application to register hosts to Satellite.
subscription-manager
uses activation keys to consume content on hosts.
- Synchronization
- Synchronization describes the process of fetching content from external repositories into the Satellite Server.
- Sync plan
- Sync plans describe the scheduled synchronization of content from external content.
- Tailoring files
- Tailoring files specify a set of modifications to existing SCAP content. They adapt SCAP content to your particular needs without changing the original SCAP content itself.
- Task
- A background process executed on the Satellite or Capsule Server, such as repository synchronization or content view publishing. You can monitor the task status in the Satellite web UI under Monitor > Satellite Tasks > Tasks.
- Updating Satellite
- The process of advancing your Satellite Server and Capsule Server installations from one patch release to the next, for example Satellite 6.17.0 to Satellite 6.17.1.
- Upgrading Satellite
- The process of advancing your Satellite Server and Capsule Server installations from one minor release to the next, for example Satellite 6.16 to Satellite 6.17.
- User group
- A collection of roles which can be assigned to a collection of users.
- User
- Anyone registered to use Red Hat Satellite. Authentication and authorization is possible through built-in logic, through external resources (LDAP, Identity Management, or Active Directory), or with Kerberos.
- Virtualization
- Virtualization describes the process of running multiple operating systems with various applications on a single hardware host using hypervisors like VMware or libvirt. It facilitates scalability and cost savings. You can attach virtualization infrastructure as compute resources to Satellite.
- virt-who
- An agent for retrieving IDs of virtual machines from the hypervisor. When used with Satellite, virt-who reports those IDs to Satellite Server so that it can provide subscriptions for hosts provisioned on virtual machines.
- XCCDF profiles
- Extensible configuration checklist description format (XCCDF) profiles are a component of SCAP content. XCCDF is a language to write security checklists and benchmarks. An XCCDF file contains security configuration rules for lists of hosts.
Appendix C. CLI help Copy linkLink copied to clipboard!
Satellite offers multiple user interfaces: Satellite web UI, Hammer CLI, API, and through Ansible collection redhat.satellite. If you want to administer Satellite on the command line, have a look at the following help output.
- Satellite services
-
A set of services that Satellite Server and Capsule Servers use for operation. You can use the
satellite-maintain
tool to manage these services. To see the full list of services, enter thesatellite-maintain service list
command on the machine where Satellite or Capsule Server is installed. For more information, runsatellite-maintain --help
on your Satellite Server or Capsule Server.
- Satellite plugins
-
You can extend Satellite by installing plugins. For more information, run
satellite-installer --full-help
on your Satellite Server or Capsule Server.
- Hammer CLI
-
You can manage Satellite on the command line using
hammer
. For more information on using Hammer CLI, see Using the Hammer CLI tool or runhammer --help
on your Satellite Server or Capsule Server.