Skip to content

Latest commit

 

History

History
205 lines (143 loc) · 7.74 KB

Client_Management.rst

File metadata and controls

205 lines (143 loc) · 7.74 KB

Client Management

This chapter provides guidance to install and configure SIMP clients, via kickstart, with the resources supplied by the SIMP ISO.

This guide also assumes that your SIMP server is a :term:`yum` package repository.

System Requirements

Client systems should meet the following minimum requirements:

Configuring the Puppet Master

Perform the following actions as root on the Puppet master system prior to attempting to install a client.

Configure DNS

In SIMP, numerous and/or large configuration files are distributed via rsync by Puppet to minimize management cost. These managed files presently include DNS configuration files and can be found at /var/simp/environments/simp/rsync/<OSTYPE>/<MAJORRELEASE>/bind_dns/default.

This section is not a complete manual for named. For more complete documentation on how to set up named, see named(8) and named.conf(5).

The following configuration steps are for a SIMP-managed setup. However, you can use an existing DNS infrastructure.

  1. Navigate to /var/simp/environments/simp/rsync/<OSTYPE>/<MAJORRELEASE>/bind_dns/default
  2. Modify the named files to correctly reflect the environment.
    • The relevant files under bind_dns/default are as follows:
      • named/etc/named.conf
      • named/etc/zones/your.domain
      • named/var/named/forward/your.domain.db
      • named/var/named/reverse/0.0.10.db
    • Review named/etc/named.conf and update the following:
      • Update the :term:`IP` for allow-query and allow-recursion
      • Delete any unnecessary zone stanzas (i.e. forwarding) if not necessary
      • Substitute in the :term:`FQDN` of your domain for all occurrences of your.domain
    • Add clients to named/var/named/forward/your.domain.db and named/var/named/reverse/0.0.10.db and then rename these files to appropriately match your environment.
  3. Type puppet agent -t --tags named on the Puppet master to apply the changes.
  4. Validate DNS and ensure the /etc/resolv.conf is updated appropriately.
  5. If an rndc.key error appears when starting named, see the Bind Documentation. Once you have resolved the issue, re-run the puppet command puppet agent -t on the Puppet master to apply.

Note

You can adjust the list of clients in your named/var/named/forward/<your.domain>.db and named/var/named/reverse/<your reverse domain>.db files at any time. Just remember to run puppet agent -t --tags named on the Puppet master to propagate these updates.

Configure DHCP

Note

The dhcpd.conf file was updated in SIMP 6.2 to include logic in the pxeclients class that determines the appropriate boot loader file on the TFTP server, based on whether the client is booting in :term:`UEFI` or :term:`BIOS` mode. If you have configured DHCP using an earlier version of SIMP and need to add UEFI support, make sure you update your dhcpd.conf in the rsync directory, appropriately.

MAC addresses in the following section need to be lower case letters.

Perform the following actions as root on the Puppet master system prior to attempting to install a client.

Open the /var/simp/environments/simp/rsync/<OSTYPE>/Global/dhcpd/dhcpd.conf file and edit it to suit the necessary environment.

Make sure the following is done in the dhcpd.conf :

  • The next-server setting in the pxeclients class block points to the IP Address of the :term:`TFTP` server.
  • Create a Subnet block and edit the following:
    • Make sure the router and netmask are correct for your environment.
    • Enter the hardware ethernet and fixed-address for each client that will be kickstarted. For increased security, it is suggested that SIMP environments not allow clients to pick random IP Address in a subnet. The MAC address must be associated with and IP Address here. (You can add additional ones as needed.)
    • Enter the domain name for option domain-name
    • Enter the IP Address of the DNS server for option domain-name-servers
    • If PXE booting is being done with this DHCP server, make sure each filename parameter corresponds to the correct boot loader file on the TFTP server. If you are using SIMP's simp::server::kickstart class to manage the TFTP server, the default filename values listed in the pxeclients class of the sample dhpcd.conf will be correct.

Save and close the file.

Run puppet agent -t on the Puppet master to apply the changes.

Setting up the Client

The following lists the steps to :term:`PXE` boot the system and set up the client.

  1. Set up your client's boot settings to boot off of the network.
  2. Make sure the :term:`MAC` address of the client is set up in :term:`DHCP` (see Configure DHCP for more info.)
  3. Restart the system.
  4. Once the client installs, reboots, and begins to bootstrap, it will check in for the first time.
  5. Puppet will not autosign Puppet certificates, by default, and waitforcert is enabled. This means the client will check in every 30 seconds for a signed certificate. Log on to the Puppet master and run puppetserver ca sign --certname <puppet.client.fqdn>.

Upon successful deployment of a new client, it is highly recommended that :ref:`LDAP administrative accounts <Managing LDAP Users>` be created.

Troubleshooting Puppet Issues

If the client has been kickstarted, but is not communicating with the Puppet master, try the following options:

  • Check the forward and reverse :term:`DNS` entries on the client and server; both must be correct. The nslookup command will help here.
  • Check the time on the systems. More than an hour's difference will cause serious issues with certificates.
  • Remove /etc/puppetlabs/puppet/ssl on the client system; run puppetserver ca clean --certname **<Client Host Name>*** on the Puppet master and try again.

If you are getting permission errors, make sure the selinux context is correct on all files as well as the owner and group permissions.

Troubleshooting Certificate Issues

If host certificates do not appear to be working, ensure that all certificates verify against the installed :term:`CA` certificates.

The table below lists the steps to determine which certificates are working and which are not.

  1. Navigate to /var/simp/environments/simp/site_files/pki_files/files/keydist

  2. Run find . -name “****<your.domain>*.pub” -exec openssl verify -CApath cacerts {} \;

    The screen displays ./<Host Name>.<Your.Domain>/<Hostname>.<Your.Domain>.pub: OK If anything other than OK appears for each host, analyze the error and ensure that the CA certificates are correct.

    If the TXT_DB error number 2 appears, revoke the certificate that is being regenerated. The table below lists the steps to revoke the certificate.

  3. Navigate to the directory containing the CA certficates. For the FakeCA, it is /var/simp/environments/simp/FakeCA. The directory should contain the file default.cnf.

  4. Run

    OPENSSL_CONF=default.cnf openssl ca -revoke /var/simp/environments/simp\
    /site_files/pki_files/files/keydist/*<Host to Revoke>*/*<Host to Revoke>*.pub