10 Steps to Build an SOE

Total Page:16

File Type:pdf, Size:1020Kb

10 Steps to Build an SOE 10 Steps to Build an SOE How Red Hat Satellite 6 Supports Setting up a Standard Operating Environment Dirk Herrmann Principal Software Engineer Benjamin Kruell Senior Domain Architect Version 1.0 19th August 2015 100 East Davie Street Raleigh NC 27601 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA Linux is a registered trademark of Linus Torvalds. Red Hat, Red Hat Enterprise Linux and the Red Hat "Shadowman" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. UNIX is a registered trademark of The Open Group. Intel, the Intel logo and Xeon are registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. VMware, VMware Tools, vSphere, vCetner, and ESXi are registered trademarks of VMware, Inc. Docker and the Docker logo are trademarks or registered trademarks of Docker, Inc. ITIL® is a Registered Trade Mark of AXELOS Limited. All other trademarks referenced herein are the property of their respective owners. © 2015 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). The information contained herein is subject to change without notice. Red Hat, Inc. shall not be liable for technical or editorial errors or omissions contained herein. Distribution of modified versions of this document is prohibited without the explicit permission of Red Hat Inc. Distribution of this work or derivative of this work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from Red Hat Inc. The GPG fingerprint of the [email protected] key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E www.redhat.com ii [email protected] Executive Summary Over time the complexity of IT infrastructures increases. Businesses that used to run on a small number of physical servers a decade ago have had to add more servers to grow and keep up with new technology. The advent of virtualization adds another layer of complexity to an already complicated, multi-vendor environment. The result is an environment that is difficult to navigate and control and increasing labor costs. With labor costs making up nearly 60% of overall IT infrastructure costs, the price of complexity adds up quickly. Standardized operating environments help businesses operate effectively and efficiently. Red Hat solutions provide additional benefits, such as improved Total Cost of Ownership (TCO), better IT productivity, and increased agility, which all drive your business forward. Red Hat Enterprise Linux with Red Hat Satellite provides an ideal platform for standardized operating environments with lower TCO and greater IT efficiency and productivity. We can improve your bottom line and increase your business' agility and competitiveness. This solution guide provides an example of an implementation based on a sample customer scenario that includes a distributed datacenter topology, sample applications, and an example of an IT organization and its roles. It is an end-to-end story starting with a fresh installation of Satellite 6 and a step-by-step configuring of all necessary Satellite 6 entities, up to an up-and-running infrastructure with servers and applications and their ongoing maintenance. Most parts of the setup can be automated with the powerful hammer command-line interface, which is documented in this reference architecture. Nearly all Satellite entities are covered. For the most critical ones (content views, host groups, and lifecycle environments), multiple scenarios are illustrated. By using this comprehensive documentation, customers can configure Red Hat Satellite 6 in a way that best fits their needs. The following sections provide a brief overview of each of the ten steps and include the core content items, the Satellite 6 entities covered, and the achievements for each step. Step 1: Set up your System Management Infrastructure. Perform a basic configuration of Sat6 and its embedded Capsule. We also create an organization and import the subscription manifest. Corresponding Satellite 6 Entities: Satellite 6 Installer, Organization, and Subscription Manifest Outcome: You now have an up-and-running system management infrastructure and your Red Hat subscription manifest uploaded and activated. Step 2: Map your Location and Datacenter Topology. Configure two datacenters with different underlying virtualization platforms (RHEV and RHELOSP), one with a DMZ. [email protected] III www.redhat.com Corresponding Entities: Capsules and their corresponding Locations, Subnets, and Domains. Outcome: You now have three different Capsules to manage the three different locations. Step 3: Define Your Definitive Media Library Content. Import software content into Satellite 6, focusing on different software entry points and formats. The content includes RPM packages and Puppet modules for Red Hat, third-party, and custom applications. Corresponding Entities: Products, Repositories, Third-party and custom GPG Keys and Sync Plans. Outcome: You have defined multiple custom and third-party Products and Repositories, successfully imported their corresponding content, and enabled continual updates of content using synchronization plans. Step 4: Define your Content lifecycle. Learn the differences between content views and composite content views. Learn how to use them and lifecycle environments to match your particular scenario. Outcome: You have created lifecycle environments and their paths, which allow you to segregate the duties of the different stack layers (Example: the OS and the applications running on top of it) and to create independent release cycles for each of them. Step 5: Define your Core Build. Define your OS-deployment (core build) configuration and its corresponding content items. Create, publish, and promote content views using sample Puppet modules, Config Groups and Content Views. Outcome: You have created two different core-build (OS) definitions for applications running on top of the OS. The core build consists of Red Hat Enterprise Linux, third-party packages, and some sample Puppet modules used to make the core build definition more flexible. Step 6: Define Your Application Content. Learn about application layer content views (profiles). Learn how to assemble them with the Core Build content views from Step 5. You can also learn about roles and profiles and the separation of responsibilities between the OS and applications. Corresponding Entities: Sample Puppet modules for roles and profiles, Config Groups and Composite Content Views. Outcome: You now have 5 different applications, including some common infrastructure services and a two-tier web application. Step 7: Automate your provisioning. Configure the automated provisioning to deploy the composite content views created earlier. Learn about different scenarios for host groups and enhanced provisioning that uses dynamic partition tables and Foreman hooks. Corresponding Entities: PXE & Boot ISO, Provisioning Templates, Host Groups & Activation Keys, Global Parameters & Smart Class Parameters, and Foreman Hooks www.redhat.com iv [email protected] Outcome: You have configured all entities required to provision new servers and to deploy the composite content views created earlier by using Satellite 6 provisioning templates and parameters. Step 8: Map your IT organization and roles to your Satellite setup. Map typical IT organizations and roles to Satellite 6 roles and the RBAC model. Corresponding Entities: Users & User Groups, Roles and RBAC (roles, permissions, filters). Outcome: You have 5 sample roles that reflect the typical roles of a two-dimensional responsibility matrix. This matrix is used to separate responsibilities and to reduce the complexity of visible entities in the UI. Step 9: Manage the Content Lifecycle Continuously. Manage the Satellite 6 content lifecycle, including errata management, content view update operations, and puppet module changes. Corresponding Entities: Errata Management, including Errata notification emails, Content Dashboard and Incremental Updates. Outcome: You know how to execute different content update scenarios and the new errata management features of Satellite 6.1. Step 10: Automate and extend your setup outlines possible enhancements (based on the setup chosen in earlier steps). Some examples include: Importing existing hosts, Using the host discovery features, Using Satellite 6 to support various IT processes. Outcome: You have some ideas for enhancing the setup created in the earlier steps of this document. [email protected] v www.redhat.com Table of Contents Executive Summary.......................................................................................... III About this Document.......................................................................................... 1 Target Audience...................................................................................................................... 1 ACME as a customer (and content) journey.......................................................................... 2 Comments and Feedback...................................................................................................... 2 Staying In Touch....................................................................................................................
Recommended publications
  • Naemonbox Manual Documentation Release 0.0.7
    NaemonBox Manual Documentation Release 0.0.7 NaemonBox Team September 16, 2016 Contents 1 Introduction 3 1.1 Target audience..............................................3 1.2 Prerequisite................................................3 2 About Naemonbox 5 2.1 Project..................................................5 2.2 Features..................................................6 3 Installation Guide 7 3.1 System requirements...........................................7 3.2 Recommended system requirements...................................7 3.3 Client Operating Systems........................................7 3.4 Openvz VPS installation.........................................8 3.5 GNU/Linux Debian 7 (or later) Installation...............................8 3.6 Installing Naemonbox..........................................8 4 Getting Started 9 4.1 Step one.................................................9 4.2 Step two................................................. 10 4.3 Step three................................................. 10 4.4 Step four................................................. 10 5 Configuring Naemon 11 5.1 Introduction............................................... 11 5.2 Actions.................................................. 11 5.3 Hosts Definition............................................. 12 5.4 Services.................................................. 13 5.5 Commands................................................ 14 5.6 Time periods............................................... 15 5.7 Contacts................................................
    [Show full text]
  • Software Requirements Specification
    Software Requirements Specification for Connectome Version 3.0 Prepared by: 1. Jon Schuck 2. Kennan Meyer 3. Nate Bender 4. Sheik Hassan 5. Khaled Alhendi 6. Bairavi Venkatesh 7. Kevin Garrone Senior Design Project Advisor: Mr. Jeff Salvage Fall 2016 to Spring 2017 1 Table of Contents Revision History.............................................................................................................................. 4 1. Introduction ............................................................................................................................. 5 1.1. Purpose ............................................................................................................................. 5 1.2. Overview .......................................................................................................................... 5 1.3. Product Scope ................................................................................................................... 6 1.3.1. In Scope .................................................................................................................... 6 1.3.2. Out of Scope ............................................................................................................. 7 1.4. Definitions ........................................................................................................................ 7 2. Overall Description ................................................................................................................. 9 2.1. Hardware Functions
    [Show full text]
  • Guidelines for Tools Development and Operating Environments
    Managing social, behavioral and economic data and metadata Guidelines for Tools Development and Operating Environments Author/Maintainer Pascal Heus, Open Data Foundation Contributors Jack Gager(Metadata Technology), Jannick Jensen (Danish Data Archive), Herve Lhours (UKDA) Version 2010-08-03 Table of Contents Overview....................................................................................................................................................2 Product Development.................................................................................................................................3 Environment.......................................................................................................................................... 3 Collaborative environment.................................................................................................................... 4 Licensing............................................................................................................................................... 5 Products Guide...........................................................................................................................................8 Overview............................................................................................................................................... 8 Web server software.............................................................................................................................. 8 Rich client Platforms...........................................................................................................................10
    [Show full text]
  • Red Hat Satellite 6.7 Provisioning Guide
    Red Hat Satellite 6.7 Provisioning Guide A guide to provisioning physical and virtual hosts on Red Hat Satellite Servers. Last Updated: 2021-05-14 Red Hat Satellite 6.7 Provisioning Guide A guide to provisioning physical and virtual hosts on Red Hat Satellite Servers. Red Hat Satellite Documentation Team [email protected] Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA
    heck What the #%!@ is wrong ^ with my server?!? Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA 1 Agenda • Intro to Monitoring • Internet protocols 101 • • Nagios SMTP • IMAP • Install/Config • HTTP • Usage • Custom plugins • Packet sniffing for dummies • Intro to Troubleshooting • Tools • telnet, openssl • grep, sed • ps, lsof, netstat 2 MONITORING 3 Automated Monitoring Workflow 4 Monitoring Packages: Open Source • • Pandora FMS • Opsview Core • Naemon • • • • • • Captialware ServerStatus • Core • Sensu All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 5 Monitoring Packages: Commercial • Nagios XI • Groundwork • PRTG network monitor • CopperEgg • WhatsUp Gold • PRTG network monitor • op5 (Naemon) All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 6 Why Automatic Service Monitoring? • Spot small problems before they become big ones • Learn about outages before your users do • Checklist when restoring from a power outage • Gives you better problem reports than users • Problems you might never spot otherwise • Failed HDDs in RAIDs • Full /var partitions • Logs not rotating • System temperature rising 7 Why Automatic Service Monitoring? • Capacity planning • Performance data can generate graphs of utilization • RAM, Disk, etc. • Availability reports - CAUTION • Easy to generate -- even easier to generate wrong • Make sure your configurations actually catch problems • Will also include problems with Nagios itself :( • If you’re going to quote your availability numbers (SLAs, etc.) make sure you understand what you’re actually monitoring.
    [Show full text]
  • Monitoring Bareos with Icinga 2 Version: 1.0
    Monitoring Bareos with Icinga 2 Version: 1.0 We love Open Source 1 © NETWAYS Table of Contents 1 Environment 2 Introduction 3 Host 4 Active Checks 5 Passive Events 6 Graphite 2 © NETWAYS 1 Environment 3 © NETWAYS Pre-installed Software Bareos Bareos Database (PostgreSQL) Bareos WebUI Icinga 2 IDO (MariaDB) Icinga Web 2 Graphite 4 © NETWAYS 2 Introduction 5 © NETWAYS 2.1 Bareos 6 © NETWAYS What is Bareos? Backup Archiving Recovery Open Sourced Backup, archiving and recovery of current operating systems Open Source Fork of Bacula (http://bacula.org) Forked 2010 (http://bareos.org) AGPL v3 License (https://github.com/bareos/bareos) A lot of new features: LTO Hardware encryption Bandwidth limitation Cloud storage connection New console commands Many more 7 © NETWAYS Bareos Structure 8 © NETWAYS 2.2 Icinga 2 9 © NETWAYS Icinga - Open Source Enterprise Monitoring Icinga is a scalable and extensible monitoring system which checks the availability of your resources, notifies users of outages and provides extensive BI data. International community project Everything developed by the Icinga Project is Open Source Originally forked from Nagios in 2009 Independent version Icinga 2 since 2014 10 © NETWAYS Icinga - Availability Monitoring Monitors everything Gathering status Collect performance data Notifies using any channel Considers dependencies Handles events Checks and forwards logs Deals with performance data Provides SLA data 11 © NETWAYS What is Icinga 2? Core based on C++ and Boost Supports all major *NIX and Windows platforms Powerful configuration
    [Show full text]
  • Standard Operating Environment Guideline
    STANDARD This guideline outlines the scope OPERATING and approach to the Computer Desktop Standard Operating ENVIRONMENT Environment (SOE) implemented by GUIDELINE Massey University. This guideline is intended to apply to computers and devices owned by Massey University and supported by Information Technology Services. Standard Operating Environment Guideline Purpose Massey University Information Technology Services (ITS) support a Standard Operating Environment (SOE) for desktop and notebook computers. The SOE is designed to ensure that the large number of desktop and notebook computers provide the necessary functionality to staff and students; can be loaded with a standard software image, maintained, updated, audited and repaired by ITS staff in a manner that improves availability and reliability, with a minimum disruption to staff and students; and at a cost that is appropriate to the University. The delivery of the Standard Operating Environment (SOE) to client computers is achieved through automated deployment and management tools. The expanded use of automation tools across all levels of ITS infrastructure, systems and services is designed to minimise support costs. The maintenance of desktop computers is most efficiently managed and delivered through the deployment of operating systems, software applications, patches and updates via online desktop management applications and tools. As part of its objective to provide cost effective and efficient management of ICT resources, Information Technology Services (ITS) maintains a Standard
    [Show full text]
  • Information Systems
    Information Systems IS100 Introduction to Computer Applications Cr-4 IS130 Desktop Publishing for Business Cr-3 and Concepts This course introduces the principles of desktop publishing in a This course satisfies the IS101 Computers and Society requirement business environment. Professional quality business documents are for students with little or no prior computer experience. It focuses on designed and produced that combine text, graphics, illustrations, and providing a solid foundation in basic computer skills and terminology, photographs in documents such as letterheads, business cards, flyers, and an understanding of how computer technology works. Experience brochures, promotional documents, and newsletters. is provided with a variety of microcomputer software applications, including word processing, electronic spreadsheets, and graphics, file IS200 Spreadsheet Concepts and Cr-3 management, and integrated software. Concepts and terms focus on Applications preparing for a technology oriented society and using the computer as This course expands the knowledge of those already familiar with the a tool for productivity, research and communication. basic elements of electronic spreadsheets. It examines the various uses for a spreadsheet in business. Intermediate and advanced spreadsheet IS101 Computers and Society Cr-3 techniques are examined, including the power of functions, formatting, This course provides knowledge of relevant computer skills and a solid analytical graphics, and macros. Prerequisites: IS101 Computers and foundation in the terminology and concepts of computer technology. Society or IS100 Introduction to Computers and Society. Experience is provided with a variety of microcomputer software applications, including word processing, electronic spreadsheets, IS201 Principles of Computer Security Cr-3 graphics, file management, and integrated software. Concepts and This course provides a comprehensive view of the field of computer terms focus on preparing for a technologically oriented society and network security.
    [Show full text]
  • Network Monitoring Using Nagios and Autoconfiguration for Cyber Defense Competitions
    NETWORK MONITORING USING NAGIOS AND AUTOCONFIGURATION FOR CYBER DEFENSE COMPETITIONS Jaipaul Vasireddy B.Tech, A.I.E.T, Jawaharlal Nehru Technological University, India, 2006 PROJECT Submitted in partial satisfaction of the requirements for the degree of MASTER OF SCIENCE in COMPUTER SCIENCE at CALIFORNIA STATE UNIVERSITY, SACRAMENTO FALL 2009 NETWORK MONITORING USING NAGIOS AND AUTOCONFIGURATION FOR CYBER DEFENSE COMPETITIONS A Project by Jaipaul Vasireddy Approved by: __________________________________, Committee Chair Dr. Isaac Ghansah __________________________________, Second Reader Prof. Richard Smith __________________________ Date ii Student: Jaipaul Vasireddy I certify that this student has met the requirements for format contained in the University format manual, and that this Project is suitable for shelving in the Library and credit is to be awarded for the Project. __________________________, Graduate Coordinator ________________ Dr. Cui Zhang Date Department of Computer Science iii Abstract of NETWORK MONITORING USING NAGIOS AND AUTOCONFIGURATION FOR CYBER DEFENSE COMPETITIONS by Jaipaul Vasireddy The goal of the project is to monitor the services running on the CCDC (College Cyber Defense Competition) network, using Nagios which uses plugins to monitor the services running on a network. Nagios is configured by building configuration files for each machine which is usually done to monitor small number of systems. The configuration of Nagios can also be automated by using shell scripting which is generally done in an industry, where the numbers of systems to be monitored are large. Both the above methods of configuration have been implemented in this project. The project has been successfully used to know the status of each service running on the defending team’s network.
    [Show full text]
  • Types of LMS Deployment & Common Features
    Types of LMS Deployment & Common Features Daisyane Barreto, Amy Rottmann, & Salena Rabidoux In cooking, you have many different types of tools you can use to make a meal. For example, you have mixers, measuring cups, cutting boards, and so many other tools. Each tool is designed to meet the needs of the cooker and serve a specific purpose in the cooking process. An LMS is not different in that sense. There are several types of LMSs in the market being used for educational as well as training purposes, and one of the most difficult choices for organizations and institutions to make is deciding the type of LMS to select based on deployment or license (Pappas, 2014). Of course, many other factors (e.g., pricing, support, additional features, and others) must be considered and weighed in this decision. Still, the cost combined with financial and technical requirements are still the main focus when selecting an LMS (Croitoru & Dinu, 2016). Indeed, it is important to analyze and examine the type of LMS deployment because of its influence in the overall cost as well as other relevant requirements that can inform the decision about an LMS. There are two main types of LMS deployment you need to be familiar with: (1) proprietary, and (2) open-source. Within those two solutions, there are two other distinct categories to be considered: (a) Software as a Service (SaaS) or cloud-based system and (b) Installed LMS. In order to determine what type of LMS is beneficial to an organization or institution, a clear understanding of the advantages and disadvantages of each solution must be reviewed.
    [Show full text]
  • Performance Monitoring Using Nagios Core Hpc4e-Comcidis Vin´Icius P
    Performance Monitoring Using Nagios Core HPC4e-ComCiDis Vin´ıcius P. Kl^oh Mariza Ferro Gabrieli D. Silva Bruno Schulze LNCC { Petr´opolis,RJ Abstract The High Performance Computing for Energy (HPC4e) project aims to apply\new exascale HPC techniques to energy industry simulations, customizing them if necessary, and going beyond the state-of-the-art in the required HPC exascale simulations for different energy sources that are the present and the future of energy like, wind energy production and design, efficient combustion systems for biomass-derived fuels (biogas), and exploration geophysics for hydrocarbon reservoirs". Beyond the general objective, there are specific technical objectives that will be developed to enhance the final results. Our objective is study the mapping and optimization of the codes proposed for simulations in energy domain (atmosphere, biomass and geophysics for energy), analysing all the aspects related with the performance of these simulations' codes. Trying to meet all these objectives, we are investigating performance tools that would help our research. We investigated at first tools that enable online measurement of performance (online approaches are without code instrumentation). More specifically, in this work we present our initial work with Nagios and the hard begin to put this performance tool on work. In this work we present the steps and instructions, on how to install and configure Nagios Core to enhance it monitoring your local and remote host. July 2016 Contents 1 Introduction 2 2 Nagios Core 3 3 Install and Configure Nagios Core and Basic Plugins 4 4 Plugins 6 4.1 Install and Configure NRPE (Nagios Remote Plugin Executor) .
    [Show full text]
  • Software Requirements Specification to Distribute Manufacturing Data
    NIST Advanced Manufacturing Series 300-2 Software Requirements Specification to Distribute Manufacturing Data Thomas Hedberg, Jr. Moneer Helu Marcus Newrock This publication is available free of charge from: https://doi.org/10.6028/NIST.AMS.300-2 NIST Advanced Manufacturing Series 300-2 Software Requirements Specification to Distribute Manufacturing Data Thomas Hedberg, Jr. Moneer Helu Systems Integration Division Engineering Laboratory Marcus Newrock Office of Data and Informatics Material Measurement Laboratory This publication is available free of charge from: https://doi.org/10.6028/NIST.AMS.300-2 December 2017 U.S. Department of Commerce Wilbur L. Ross, Jr., Secretary National Institute of Standards and Technology Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology SRS to Distribute Manufacturing Data Hedberg, Helu, and Newrock ______________________________________________________________________________________________________ Contents 1 Introduction 1 1.1 Purpose ...................................... 1 1.2 Disclaimer ..................................... 1 This publication is available free of charge from: https://doi.org/10.6028/NIST.AMS.300-2 1.3 Scope ....................................... 1 1.4 Acronyms and abbreviations ........................... 1 1.5 Verbal Forms ................................... 3 1.5.1 Must .................................... 3 1.5.2 Should ................................... 3 1.5.3 May .................................... 3 1.6 References ....................................
    [Show full text]