Deploying to Openshift a GUIDE for BUSY DEVELOPERS

Total Page:16

File Type:pdf, Size:1020Kb

Deploying to Openshift a GUIDE for BUSY DEVELOPERS Compliments of Deploying to Graham Dumpleton OpenShift A GUIDE FOR BUSY DEVELOPERS Deploying to OpenShift A Guide for Busy Developers Graham Dumpleton Beijing Boston Farnham Sebastopol Tokyo Deploying to OpenShift by Graham Dumpleton Copyright © 2018 Red Hat, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com/safari). For more information, contact our corporate/insti‐ tutional sales department: 800-998-9938 or [email protected]. Editors: Virginia Wilson and Nikki McDonald Indexer: Judy McConville Production Editor: Melanie Yarbrough Interior Designer: David Futato Copyeditor: Dwight Ramsey Cover Designer: Karen Montgomery Proofreader: Rachel Head Illustrator: Rebecca Demarest April 2018: First Edition Revision History for the First Edition 2018-03-05: First Release This work is part of a collaboration between O’Reilly and Red Hat. See our statement of editorial independ‐ ence. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Deploying to OpenShift, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights. 978-1-492-03248-9 [LSI] Table of Contents Preface. ix 1. The OpenShift Container Platform. 1 The Role of Containers 2 Orchestrating at Scale 3 Containers as a Service 4 Platform as a Service 4 Deploying Your Application 5 2. Running an OpenShift Cluster. 7 Using OpenShift Online 7 Installing OpenShift Origin 8 Launching Using Minishift 8 Running oc cluster up 10 Summary 11 3. Accessing the OpenShift Cluster. 13 Using the Web Console 13 Using the Command Line 14 Using the OpenShift REST API 17 Summary 18 4. Adding Applications to a Project. 19 The Role of a Project 19 Creating a Project 20 Adding a Collaborator 22 Deploying Applications 23 Deploying from the Catalog 24 iii Deploying an Image 26 Deploying a Set of Resources 27 Summary 28 5. Deploying Applications from Images. 29 Deploying Your First Image 29 Scaling Up the Application 33 Runtime Configuration 33 Deleting the Application 34 Deploying Using the Web Console 34 Importing an Image 36 Pushing to the Registry 37 Images and Security 38 Summary 38 6. Building and Deploying from Source. 41 The Source Build Strategy 42 Deploying from Source 42 Creating a Separate Build 43 Triggering a New Build 45 Building from a Local Source 46 Binary Input Builds 46 Testing the Container Image 47 Build and Runtime Configuration 48 Summary 49 7. Building an Image from a Dockerfile. 51 The Docker Build Strategy 51 Security and Docker Builds 52 Creating the Build 52 Deploying the Image 53 Build and Runtime Configuration 53 Using an Inline Dockerfile 55 Summary 56 8. Understanding Source-to-Image Builders. 57 The Source-to-Image Project 57 Building the Application Image 58 Assembling the Source Code 59 Creating an S2I Builder Image 60 Building the S2I Builder Image 62 Using the S2I Builder with OpenShift 62 iv | Table of Contents Adding an S2I Builder to the Catalog 63 Summary 64 9. Customizing Source-to-Image Builds. 65 Using Environment Variables 65 Overriding the Builder Scripts 66 Read-Only Code Repositories 68 Overriding the Runtime Image 68 Updating the Image Metadata 69 Summary 71 10. Using Incremental and Chained Builds. 73 Faster Builds Using Caching 73 Using Incremental Builds 74 Saving Artifacts from a Build 75 Restoring the Build Artifacts 75 Enabling Incremental Builds 76 Using Chained Builds 77 Summary 78 11. Webhooks and Build Automation. 79 Using a Hosted Git Repository 79 Accessing a Private Git Repository 80 Adding a Repository Webhook 82 Customized Build Triggers 83 Summary 83 12. Configuration and Secrets. 85 Passing Environment Variables 85 Working with Configuration Files 87 Handling of Secret Information 89 Deleting Configuration and Secrets 91 Summary 92 13. Services, Networking, and Routing. 93 Containers and Pods 93 Services and Endpoints 94 Connecting Between Projects 96 Creating External Routes 96 Using Secure Connections 98 Internal and External Ports 99 Exposing Non-HTTP Services 100 Table of Contents | v Local Port Forwarding 100 Summary 101 14. Working with Persistent Storage. 103 Types of Persistent Storage 103 Claiming a Persistent Volume 105 Unmounting a Persistent Volume 106 Reusing a Persistent Volume Claim 106 Sharing Between Applications 106 Sharing Between Containers 107 Deleting a Persistent Volume 107 Copying Data to a Volume 108 Summary 108 15. Resource Quotas and Limits. 109 What Is Managed by Quotas 109 Quotas versus Limit Ranges 111 Requests Versus Limits 112 Resource Requirements 113 Overriding Build Resources 114 Summary 114 16. Monitoring Application Health. 115 The Role of a Readiness Probe 115 The Role of a Liveness Probe 116 Using an HTTP Request 116 Using a Container Command 117 Using a Socket Connection 118 Probe Frequency and Timeouts 118 Summary 120 17. Application Lifecycle Management. 121 Deployment Strategies 121 Rolling Deployment 122 Recreate Deployment 123 Custom Deployments 124 Container Runtime Hooks 125 Init Containers 126 Summary 127 18. Logging, Monitoring, and Debugging. 129 Viewing the Build Logs 129 vi | Table of Contents Viewing Application Logs 130 Monitoring Resource Objects 131 Monitoring System Events 132 Viewing Container Metrics 132 Running an Interactive Shell 133 Debugging Startup Failures 133 Summary 134 Afterword. 137 Index. 139 Table of Contents | vii Preface OpenShift implements a polyglot platform for the deployment of web applications and services. It uses containers in conjunction with a Security-Enhanced Linux (SELi‐ nux) environment to implement a secure multitenant environment suitable for the enterprise. You can deploy OpenShift in your own infrastructure or on public clouds, or you can use OpenShift Online, Red Hat’s cloud-based hosting service. The latest version of OpenShift uses the industry-standard Kubernetes platform from the Cloud Native Computing Foundation (CNCF) for managing and running appli‐ cations within containers at scale. The ability to run any application image is ensured through adherence to image and runtime specifications from the Open Container Initiative (OCI). OpenShift offers you the ability to easily deploy your web application code directly using a library of predefined image builders, or you can bring your own container images. With support in OpenShift for features such as persistent volumes, you are not limited to just running stateless 12-factor or cloud-native applications. Using OpenShift, you can also deploy databases and many legacy applications that you otherwise would not be able to run on a traditional Platform as a Service (PaaS) offer‐ ing. OpenShift is a complete container application platform. It is a modern take on the traditional PaaS that you can use with your existing applications, but that also pro‐ vides the power and flexibility to meet future needs. Who Should Read This Book This book is intended for developers who are evaluating OpenShift, or have already decided to use it, and who seek a more in-depth knowledge of the core features of OpenShift that are used to deploy applications. It will also be of interest to adminis‐ trators who are managing an OpenShift cluster and who need to provide assistance to developers using the platform. ix The book is the third in a series of books from Red Hat about the latest version of OpenShift. The prior books in the series are: • OpenShift for Developers: A Guide for Impatient Beginners • DevOps with OpenShift: Cloud Deployments Made Easy Why I Wrote This Book The first book, OpenShift for Developers, which I coauthored with Grant Shipley, aimed to get you started as quickly as possible by skipping many of the details. Those details are important, though, when you want to make the most of OpenShift. In this book I wanted to fill in some of those gaps to give you that broader understanding of OpenShift and how it can make your job of deploying applications to the cloud easier. The topics I have chosen for the book are based on my experience of having to answer many a question on public community forums (such as Stack Overflow and Google Groups) and at conferences, in my role at Red Hat working as a Developer Advocate for OpenShift. The aim is that this book will act as a quick reference guide you can keep coming back to in order to refresh your memory on commonly used patterns, or to learn more about additional topics as you continue to use OpenShift. Online Resources As with many new technologies, OpenShift is still evolving as it adapts to the wide range of use cases it is applied to. When you come to read this book, some informa‐ tion may not provide the most up-to-date picture. That’s why we encourage you to check online resources for the latest details on OpenShift and how to use it. The OpenShift documentation is a great place to start when you’re looking for infor‐ mation about OpenShift, from OpenShift Online to Red Hat’s enterprise products. To learn more about OpenShift by working through online training exercises, you can use the interactive learning portal for OpenShift, implemented on top of Kata‐ coda.
Recommended publications
  • Fedora Core Works--Without the Fluff That Bogs Down Other Books and Help/How-To Web Sites
    Fedora Linux By Chris Tyler ............................................... Publisher: O'Reilly Pub Date: October 01, 2006 ISBN-10: 0-596-52682-2 ISBN-13: 978-0-596-52682-5 Pages: 504 Table of Contents | Index "Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros." -- Behdad Esfahbod, Fedora developer This book will get you up to speed quickly on Fedora Linux, a securely-designed Linux distribution that includes a massive selection of free software packages. Fedora is hardened out-of-the-box, it's easy to install, and extensively customizable - and this book shows you how to make Fedora work for you. Fedora Linux: A Complete Guide to Red Hat's Community Distribution will take you deep into essential Fedora tasks and activities by presenting them in easy-to-learn modules. From installation and configuration through advanced topics such as administration, security, and virtualization, this book captures the important details of how Fedora Core works--without the fluff that bogs down other books and help/how-to web sites. Instead, you can learn from a concise task-based approach to using Fedora as both a desktop and server operating system. In this book, you'll learn how to: Install Fedora and perform basic administrative tasks Configure the KDE and GNOME desktops Get power management working on your notebook computer and hop on a wired or wireless network Find, install, and update any of the thousands of packages available for Fedora Perform backups, increase reliability with RAID, and manage your disks with logical volumes Set up a server with file sharing, DNS, DHCP, email, a Web server, and more Work with Fedora's security features including SELinux, PAM, and Access Control Lists (ACLs) Whether you are running the stable version of Fedora Core or bleeding-edge Rawhide releases, this book has something for every level of user.
    [Show full text]
  • Spacewalk 2.4 for Oracle® Linux Concepts and Getting Started Guide
    Spacewalk 2.4 for Oracle® Linux Concepts and Getting Started Guide E71709-03 January 2017 Oracle Legal Notices Copyright © 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S.
    [Show full text]
  • Foot Prints Feel the Freedom of Fedora!
    The Fedora Project: Foot Prints Feel The Freedom of Fedora! RRaahhuull SSuunnddaarraamm SSuunnddaarraamm@@ffeeddoorraapprroojjeecctt..oorrgg FFrreeee ((aass iinn ssppeeeecchh aanndd bbeeeerr)) AAddvviiccee 101011:: KKeeeepp iitt iinntteerraaccttiivvee!! Credit: Based on previous Fedora presentations from Red Hat and various community members. Using the age old wisdom and Indian, Free software tradition of standing on the shoulders of giants. Who the heck is Rahul? ( my favorite part of this presentation) ✔ Self elected Fedora project monkey and noisemaker ✔ Fedora Project Board Member ✔ Fedora Ambassadors steering committee member. ✔ Fedora Ambassador for India.. ✔ Editor for Fedora weekly reports. ✔ Fedora Websites, Documentation and Bug Triaging projects volunteer and miscellaneous few grunt work. Agenda ● Red Hat Linux to Fedora & RHEL - Why? ● What is Fedora ? ● What is the Fedora Project ? ● Who is behind the Fedora Project ? ● Primary Principles. ● What are the Fedora projects? ● Features, Future – Fedora Core 5 ... The beginning: Red Hat Linux 1994-2003 ● Released about every 6 months ● More stable “ .2” releases about every 18 months ● Rapid innovation ● Problems with retail channel sales model ● Impossible to support long-term ● Community Participation: ● Upstream Projects ● Beta Team / Bug Reporting The big split: Fedora and RHEL Red Hat had two separate, irreconcilable goals: ● To innovate rapidly. To provide stability for the long-term ● Red Hat Enterprise Linux (RHEL) ● Stable and supported for 7 years plus. A platform for 3rd party standardization ● Free as in speech ● Fedora Project / Fedora Core ● Rapid releases of Fedora Core, every 6 months ● Space to innovate. Fedora Core in the tradition of Red Hat Linux (“ FC1 == RHL10” ) Free as in speech, free as in beer, free as in community support ● Built and sponsored by Red Hat ● ...with increased community contributions.
    [Show full text]
  • Openshift Virtualization Aka Container-Native Virtualization (CNV)
    OpenShift virtualization Aka Container-native virtualization (CNV) Robert Bohne SR. SPECIALIST SOLUTION ARCHITECT | OPENSHIFT Twitter: @RobertBohne 1 Red Hat OpenShift and OpenShift virtualization Modernize workloads and support mixed applications consisting of VMs, containers, and serverless ● Accelerate application delivery with a single platform that can manage “mixed VMs Containers applications” with the same tools and teams Red Hat OpenShift Container Platform ● Add VMs to new and existing applications ● Modernize legacy VM applications over Red Hat Enterprise Linux CoreOS time, or maintain them as VMs Physical machine 2 V0000000 KVM-based (containerized) VMs ● KVM is a part of the Red Hat Enterprise Linux kernel OTHER APPS libvirt ● QEMU uses KVM to execute virtual machines QEMU ● libvirt provides a management abstraction RHEL layer KVM ● Red Hat Virtualization, Red Hat OpenStack DRIVER DRIVER DRIVER Platform, and OpenShift virtualization all leverage KVM, QEMU, and libvirt CPU/RAM STORAGE NETWORK HARDWARE 3 Containerized virtual machines ● Inherit many features and functions from Kubernetes ○ Scheduling, high availability, attach/detach resources ● Containerized virtual machines have the same limitations as non-containerized ○ CPU, RAM, etc. limitations dictated by libvirt and QEMU ○ Linux and Windows guest operating systems ● Storage ○ Use Persistent Volumes Claims (PVCs) for VM disks ○ Containerized Data Importer (CDI) import VM images ● Network ○ Inherit pod network by default 4 ○ Multus enables direct connection to external network Architectural Overview kubelet (DaemonSet) Pod VM Pod Other Pod(s) API Server virt-handler virt-launcher container 1 virt-controller libvirtd container 2 VM container n Cluster Services Nodes 5 KubeVirt ▸ Open Source, Go ▸ Initiated in 2016 by Red Hat ▸ Contributions by other companies e.g (v)GPU support by Nvidia ▸ CNCF sandbox project since 2019 ▸ Provides an API for running KVM based virtual machines in Kubernetes ▸ Goal: run those VMs alongside with containerized workloads, using the same networks / storage etc.
    [Show full text]
  • Openshift Container Platform 4.6 Architecture
    OpenShift Container Platform 4.6 Architecture An overview of the architecture for OpenShift Container Platform Last Updated: 2021-09-22 OpenShift Container Platform 4.6 Architecture An overview of the architecture for OpenShift Container Platform Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Fedora (Operating System) 1 Fedora (Operating System)
    Fedora (operating system) 1 Fedora (operating system) Fedora Fedora 17 (Beefy Miracle) running GNOME Shell 3.4 Company / developer Fedora Project, (sponsored by Red Hat, Inc.) OS family Unix-like (based on Red Hat Linux) Working state Current [1] Source model Free and open source software (with exceptions) [2] Initial release 2003-11-16 It was codenamed Yarrow. Fedora Core 1 was based on Red Hat Linux 9 and shipped with version 2.4.19 [3] of the Linux kernel, version 2.4 of the GNOME desktop environment, and K Desktop Environment 3.1. Latest stable release 17 (Beefy Miracle) / May 29, 2012 Available language(s) Multilingual Update method Yum (PackageKit) Package manager RPM Package Manager Supported platforms i686, x86-64 Kernel type Monolithic (Linux) Userland GNU Default user interface GNOME 3 [1] License Various free software licenses, plus proprietary binary blobs. Official website [4] www.fedoraproject.org Fedora ( /fɪˈdɒr.ə/), formerly Fedora Core, is an RPM-based, general purpose collection of software, including an operating system based on the Linux kernel, developed by the community-supported Fedora Project and sponsored by Red Hat. Fedora’s flexibility makes it capable of serving as a digital repository for a variety of use cases. The Fedora Project's mission is to lead the advancement of free and open source software and content as a collaborative community.[5] One of Fedora's main objectives is not only to contain software distributed under a free and open source license, but also to be on the leading edge of such technologies.[6][7] Fedora developers prefer to make upstream changes instead of applying fixes specifically for Fedora—this ensures that their updates are available to all Linux distributions.[8] Compared to more mainstream non-Linux operating systems, Fedora has a short life cycle.
    [Show full text]
  • How to Modernize AIX Applications In- Place Using Red Hat Openshift
    January 2021 How to Modernize AIX Applications In- place Using Red Hat OpenShift By: Angshuman Roy [email protected] IBM IT Economics Consulting & Research © 2021 IBM Corporation Enterprises are modernizing their application to bring in cloud-native capabilities that work in a Hybrid Multicloud environment. In its Total Economic Impact study, Forrester found that clients accelerated development cycles by up to 66% by modernizing (ibm.co/3fvl8d2). Quite often, these organizations are looking at multiple cloud providers to host different parts of their applications while keeping mission critical workloads in-house. According to Flexera 2020 State of the Cloud Report (bit.ly/3iYCCR4), 93% of enterprises are pursuing a multicloud strategy, which helps them from being tied to a single vendor. To make an application more portable across multiple clouds, it must run on a unifying platform. Red Hat® OpenShift® is that platform. OpenShift extends the Kubernetes with built-in tools to enhance app lifecycle development, operations and security. With OpenShift, clients can consistently deploy workloads across multiple public or private clouds with ease. This article will break down how my team modernized a banking application running on AIX®. We built a new User Interface and deployed it on Red Hat OpenShift running on the existing IBM Power Systems™ server, while the business logic continued to run on the AIX backend. We added new functionality that ran on three different public clouds: IBM Cloud™, Amazon Web Services and Microsoft® Azure. All these environments were managed using IBM Cloud Pak® for Multicloud Management, also running on POWER®. Advantages of Containers in App Modernization One of the most common approaches to modernizing legacy applications starts by containerizing them so that they can be migrated to cloud.
    [Show full text]
  • Cobbler Documentation Release 2.8.5
    Cobbler Documentation Release 2.8.5 Jörgen Maas Nov 19, 2020 Contents 1 About 3 1.1 Release Notes.........................................3 1.2 Distribution Support......................................5 1.3 Distribution Notes.......................................7 1.4 How We Model Things..................................... 13 2 Installation 15 2.1 Prerequisites.......................................... 15 2.2 Installing from packages.................................... 16 2.3 Installing from Source..................................... 18 2.4 Configuration Files....................................... 20 2.5 Relocating your installation.................................. 21 3 General 23 3.1 Cobbler Primitives....................................... 23 3.2 Cobbler Direct Commands................................... 54 3.3 Cobbler Settings........................................ 69 3.4 Managing Services with Cobbler............................... 90 3.5 Kickstart Templating...................................... 94 3.6 Snippets............................................ 102 3.7 Package Management and Mirroring............................. 112 3.8 File System Information.................................... 114 4 Advanced 119 4.1 Advanced Networking..................................... 119 4.2 SELinux............................................ 122 4.3 Configuration Management.................................. 123 4.4 Extending cobbler....................................... 131 4.5 Power Management...................................... 135 4.6
    [Show full text]
  • Openshift Container Platform 4.6 Release Notes
    OpenShift Container Platform 4.6 Release notes Highlights of what is new and what has changed with this OpenShift Container Platform release Last Updated: 2021-09-22 OpenShift Container Platform 4.6 Release notes Highlights of what is new and what has changed with this OpenShift Container Platform release Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • Scientific Linux - the Future of DESY Linux (?)
    Scientific Linux - The Future of DESY Linux (?) Stephan Wiesand DESY -DV - September 14, 2004 Outline What DESY Linux (DL) is What Scientific Linux (SL) is What Scientific Linux DESY (SLD) will be What the status of SLD3 is What will change from the user's point of view When it's going to happen DESY Linux base distribution criteria: usability, size, lifetime (availability of security fixes), use/acceptance in HEP, ISV support + bug fixes example: make screen lock usable in kerberized environment + customization examples: HEPiX, HEPiX11, continuity for users + additional software /opt/products + automatic installation, configuration and maintenance VAMOS/sue/cfengine Base Distribution Candidates: debian lifetime: 12 months after next release release cycle completely undefined when we picked the DL5 base distro last year, we wondered whether a new debian stable would be released the same year it wasn't, and the question remains the same debian stable is completely out of date not usable on current hardware not available for amd64 (platform younger than distro) not widely accepted in HEP debian is not for us Candidates: SuSE Professional current choice for DL5 8.2 9.0 for notebooks, amd64 defined release cycle: every 6 months defined lifetime: 2 years barely enough after release, security fixes only no bug fixes or enhancements not widely accepted in HEP acquisition by Novell may improve acceptance in US Candidates: SuSE Enterprise release cycle: 12-18 months lifetime: 5 years security fixes bug fixes, enhancements for < 5 years much shorter
    [Show full text]
  • Contents at a Glance
    04_579495 ftoc.qxd 12/27/04 9:52 PM Page xii Contents at a Glance Preface . vii Acknowledgments . xi Part I: Linux First Steps. 1 Chapter 1: Starting with Linux . 3 Chapter 2: Running Commands from the Shell . 29 Chapter 3: Getting into the Desktop . 77 Part II: Running the Show . 123 Chapter 4: Learning Basic Administration . 125 Chapter 5: Getting on the Internet . 169 Chapter 6: Securing Linux . 191 Part III: Choosing and Installing a Linux Distribution . 241 Chapter 7: Installing Linux . 243 Chapter 8: Running Fedora Core and Red Hat Enterprise Linux . 273 Chapter 9: Running Debian GNU/Linux . 295 Chapter 10: Running SUSE Linux . 315 Chapter 11: Running KNOPPIX . 329 Chapter 12: Running Yellow Dog Linux . 351 Chapter 13: Running Gentoo Linux . 367 Chapter 14: Running Slackware Linux . 383 Chapter 15: Running Linspire . 399 Chapter 16: Running Mandrakelinux . 409 Chapter 17: Running a Linux Firewall/Router . 423 Chapter 18: RunningCOPYRIGHTED Bootable Linux Distributions MATERIAL . 447 Part IV: Running Applications . 459 Chapter 19: Playing Music and Video . 461 Chapter 20: Working with Words and Images . 501 Chapter 21: E-Mailing and Web Browsing . 541 Chapter 22:Gaming Alone and Online . 569 04_579495 ftoc.qxd 12/27/04 9:52 PM Page xiii Part V:Running Servers . 593 Chapter 23: Running a Linux, Apache, MySQL, and PHP (LAMP) Server . 595 Chapter 24: Running a Mail Server . 617 Chapter 25: Running a Print Server . 635 Chapter 26: Running a File Server . 659 Part VI: Programming in Linux. 693 Chapter 27: Programming Environments and Interfaces . 695 Chapter 28: Programming Tools and Utilities .
    [Show full text]
  • Best Practices Best Practices
    Best Practices Best Practices Publication Date: 2019-09-03 SUSE LLC 10 Canal Park Drive Suite 200 Cambridge MA 02141 USA https://www.suse.com/documentation Contents 1 Introduction 1 1.1 What’s Covered in this Guide? 1 1.2 Prerequisites 1 1.3 Network Requirements 3 1.4 Hardware Recommendations 6 2 Managing Your Subscriptions 9 2.1 SUSE Customer Center (SCC) 9 2.2 Disconnected Setup with RMT or SMT (DMZ) 9 Repository Management Tool (RMT) and Disconnected Setup (DMZ) 10 • Repository Management Tool (SMT) and Disconnected Setup (DMZ) 11 • Updating Repositories on SUSE Manager From Storage Media 12 • Refreshing Data on the Storage Medium 13 3 Expanded Support 15 3.1 Managing Red Hat Enterprise Linux Clients 15 Server Configuration for Red Hat Enterprise Linux Channels 15 • Red Hat Enterprise Linux Channel Management Tips 16 • Mirroring RHEL Media into a Channel 16 • Registering RES Salt Minions with SUSE Manager 17 • Register a Salt Minion via Bootstrap 19 • Manual Salt Minion Registration 20 3.2 Preparing Channels and Repositories for CentOS Traditional Clients 20 3.3 Registering CentOS Salt Minions with SUSE Manager 23 3.4 Managing Ubuntu Clients 24 3.5 Prepare to Register Ubuntu Clients 25 iii Best Practices 4 Salt Formulas and SUSE Manager 28 4.1 What are Salt Formulas? 28 4.2 Installing Salt Formulas via RPM 28 4.3 File Structure Overview 30 4.4 Editing Pillar Data in SUSE Manager 31 Simple edit-group Example 38 4.5 Writing Salt Formulas 41 4.6 Separating Data 42 4.7 SUSE Manager Generated Pillar Data 43 4.8 Formula Requirements 44 4.9
    [Show full text]