Spacewalk -Open Source Systems Management
Spacewalk is open source systems management software developed by Red Hat. It was formerly the upstream version of the Red Hat Satellite, which was open sourced in 2008. Spacewalk includes the web interface and back-end, as well as Red Hat Proxy Server and associated client software of Satellite and makes them available to users and developers under a free and open source software (FOSS) license.
Inventory your systems (hardware and software information)
Install and update software on your systems
Collect and distribute your custom software packages into manageable groups
Provision (kickstart) your systems
Manage and deploy configuration files to your systems
Monitor your systems
Provision virtual guests
Start/stop/configure virtual guests
Distribute content across multiple geographical sites in an efficient manner
Read more differences between Spacewalk and Red Hat Satellite.
Outbound open ports 80, 443, 4545 (only if you want to enable monitoring)
Inbound open ports 80, 443, 5222 (only if you want to push actions to client machines) and 5269 (only for push actions to a Spacewalk Proxy), 69 udp if you want to use tftp
Storage for database: 250 KiB per client system + 500 KiB per channel + 230 KiB per package in channel (i.e. 1.1GiB for channel with 5000 packages)
Storage for packages (default /var/satellite): Depends on what you’re storing; Red Hat recommend 6GB per channel for their channels
2GB RAM minimum, 4GB recommended
Make sure your underlying OS up-to-date.
If you use LDAP as a central identity service and wish to pull user and group information from it.
Make sure your operating system is fully up-to-date.
In the following steps we assume you have a default, vanilla installation of your operating system, without any customized setup of yum repositories, user management, security, etc.
Setting up Spacewalk repo -CentOS 5
rpm -Uvh http://yum.spacewalkproject.org/2.0/RHEL/5/x86_64/spacewalk-repo-2.0-3.el5.noarch.rpm
Spacewalk requires a Java Virtual Machine with version 1.6.0 or greater.
rpm -Uvh http://dl.fedoraproject.org/pub/epel/5/x86_64/epel-release-5-4.noarch.rpm
Follow the instructions to use EPEL 5 with the additions:
Necessary packages rhn-client-tools and rhnlib were removed from CentOS, they can be found in spacewalk-client repo. Setup it by installing spacewalk-client-repo package.
rpm -ihv http://yum.spacewalkproject.org/2.0-client/RHEL/5/x86_64/spacewalk-client-repo-2.0-3.el5.noarch.rpm
Import Red Hat’s RPM GPG key:
# wget -O /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release http://www.redhat.com/security/37017186.txt
# rpm –import /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
PostgreSQL server, set up by Spacewalk (embedded)
You can let Spacewalk setup the PostgreSQL server on your machine without any manual intervention. Run:
yum install spacewalk-setup-postgresql
and skip to the section Installing Spacewalk.
yum install spacewalk-postgresql
Your Spacewalk server should have a resolvable FQDN such as ‘hostname.domain.com’. If the installer complains that the hostname is not the FQDN, do not use the –skip-fqdn-test flag to skip !
The setup requires that the database account has a password.
Note: Please don’t use ‘#’ (number sign/pound/hash) and ‘@’ in your database password otherwise installation will fail.
Once the Spacewalk RPM is installed you need to configure the application.
If you have installed spacewalk-setup-postgresql, run
admin-email = root@localhost
ssl-set-org = Spacewalk Org
ssl-set-org-unit = spacewalk
ssl-set-city = My City
ssl-set-state = My State
ssl-set-country = My Country
ssl-password = spacewalk
ssl-set-email = root@localhost
ssl-config-sslvhost = Y
Configuring the firewall
Spacewalk needs various inbound ports to be connectible. Use system-config-firewall or edit /etc/sysconfig/iptables, adding the ports needed — 80 and 443. On system with firewalld use firewall-cmd –add-service=http ; firewall-cmd –add-service=https. Add port 5222 if you want to push actions to client machines and 5269 for push actions to a Spacewalk Proxy, 69 udp if you want to use tftp.
Spacewalk Proxy Installation
Around 6GB storage per distribution under /var/spool/squid (or wherever you want your Squid cache to be)
Outbound open ports 80, 443, 4545 (only if you want to enable monitoring) and 5269
Inbound open ports 80, 443 and 5222
An upstream RHN Satellite server with an available Proxy entitlement or a Spacewalk server
Machine where you will install Spacewalk Proxy must be registered against Spacewalk Server, which you will proxy.
A provisioning entitlement for the Proxy server
Enable EPEL yum repository
Ensure your machine is registered in Spacewalk and has a provisioning entitlement. Then just ask yum to install the application:
yum install spacewalk-proxy-selinux spacewalk-proxy-installer
If this is the first time installing an RPM from the Spacewalk repo, yum will prompt you to install the GPG key:
Importing GPG key 0x863A853D “Spacewalk <email@example.com>” from http://yum.spacewalkproject.org/RPM-GPG-KEY-spacewalk-2012
Is this ok [y/N]: y
Then you need to configure the proxy. Run:
The configure-proxy.sh install script supports an answer file to allow you to preanswer the questions. For the full list of variables see “man configure-proxy.sh”.