Redhat NETWORK WORKGROUP 1.0 User Manual

Red Hat Network Workgroup
User Reference Guide 1.0
Red Hat, Inc.
Red Hat Network Workgroup: User Reference Guide 1.0
Copyright © 2001, 2002 by Red Hat, Inc.
Red Hat, Inc.
2600 Meridian Parkway Durham NC 27713 USA Phone: +1 919 547 0012 Phone: 888 733 4281 Fax: +1 919 547 0024 PO Box 13588 Research Triangle Park NC 27709 USA
RHNworkgroup(EN)-1.0-Print-RHI (2002-01-18T17:410400) Copyright © 2002 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. The admonition graphics (note, tip, important, caution, and warning) were created by Marianne Pecci <goddess@ipass.net>. They may be redistributed with explicit permission from Marianne Pecci and Red Hat, Inc. Red Hat, Red Hat Network, the Red Hat "Shadow Man" logo, RPM, Maximum RPM, the RPM logo, Linux Library, PowerTools, Linux Undercover, RHmember, RHmember More, Rough Cuts, Rawhide and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Motif and UNIX are registered trademarks of The Open Group. Itanium is a registered trademark of Intel Corporation. Netscape is a registered trademark of Netscape Communications Corporation in the United States and other countries. Windows is a registered trademark of Microsoft Corporation. SSH and Secure Shell are trademarks of SSH Communications Security, Inc. FireWire is a trademark of Apple Computer Corporation. S/390 and zSeries are trademarks of International Business Machines Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Printed in Canada, Ireland, and Japan
Table of Contents
Introduction .................................................................................................................................... vii
1. Document Conventions ..................................................................................................vii
2. More to Come .....................................................................................................................x
2.1. Send in Your Feedback .......................................................................................x
1. What is Red Hat Network?........................................................................................................ 11
1.1. Basic ................................................................................................................................12
1.2. Workgroup ..................................................................................................................... 12
1.3. Automatic Notifications and Package Installation...................................................13
1.4. Security, Quality Assurance, and Red Hat Network ...............................................13
1.5. Before You Begin ...........................................................................................................13
2. Red Hat Network Registration Client.....................................................................................15
2.1. Configuring the Red Hat Network Registration Client ........................................ 15
2.2. Starting the Red Hat Network Registration Client................................................ 15
2.3. Registering a User Account .........................................................................................18
2.4. Registering a System Profile........................................................................................ 20
2.4.1. Hardware System Profile.............................................................................. 20
2.4.2. Software System Profile ................................................................................21
2.5. Finishing Registration ..................................................................................................23
2.6. Entitling Your System...................................................................................................25
2.7. Text Mode RHN Registration Client ..........................................................................25
3. Red Hat Update Agent Configuration Tool............................................................................ 27
3.1. Configuring the Red Hat Update Agent.................................................................... 27
3.2. General Settings.............................................................................................................27
3.3. Retrieval/Installation Settings .................................................................................... 28
3.4. Package Exceptions Settings........................................................................................29
3.5. Command Line Version of Red Hat Update Agent Configuration Tool .............30
4. Red Hat Update Agent ............................................................................................................... 33
4.1. Starting the Red Hat Update Agent...........................................................................33
4.2. Choosing a Channel......................................................................................................35
4.3. Choosing Packages to Update..................................................................................... 36
4.4. Installing Updated Packages.......................................................................................39
4.5. Update Agent Finished................................................................................................ 40
4.6. Command Line Version of Red Hat Update Agent................................................. 41
4.6.1. Installing the Red Hat GPG key................................................................... 43
4.7. Manual Package Installation ....................................................................................... 44
4.8. Synchronizing Your System Profile............................................................................ 44
4.9. Log File ...........................................................................................................................45
5. Red Hat Network Workgroup .................................................................................................. 47
5.1. Logging into Workgroup .............................................................................................47
5.2. Introduction to the Web Interface...............................................................................48
5.2.1. Errata Alerts....................................................................................................50
5.3. Your RHN....................................................................................................................... 50
5.3.1. Your Account ..................................................................................................52
5.3.2. Entitlements ....................................................................................................52
5.3.3. Organization Information.............................................................................53
5.3.4. Buy Now..........................................................................................................53
5.3.5. The New RHN................................................................................................53
5.4. Systems ........................................................................................................................... 53
5.4.1. System List ......................................................................................................53
5.4.2. System Group List.......................................................................................... 55
5.4.3. System Search.................................................................................................56
v
5.4.4. System Details ................................................................................................56
5.5. Channels and Packages................................................................................................57
5.5.1. System List ......................................................................................................57
5.5.2. Channel List....................................................................................................57
5.5.3. Channel Details ..............................................................................................57
5.5.4. Channel Subscribe and Unsubscribe...........................................................59
5.5.5. Package Details...............................................................................................59
5.5.6. Package Install................................................................................................ 59
5.5.7. Package Download ........................................................................................60
5.6. Errata............................................................................................................................... 61
5.6.1. All Errata .........................................................................................................62
5.6.2. Applicable Errata ...........................................................................................62
5.6.3. Errata Search...................................................................................................62
5.6.4. Apply Errata Updates ...................................................................................62
5.6.5. Errata Details .................................................................................................. 63
5.7. Scheduled Actions ........................................................................................................ 63
5.8. Users................................................................................................................................65
5.8.1. User List...........................................................................................................65
5.8.2. User Approval ................................................................................................ 65
5.8.3. User Details.....................................................................................................65
5.9. System Groups ..............................................................................................................66
5.9.1. System Group List.......................................................................................... 66
5.9.2. System Group Creation.................................................................................67
5.9.3. System Group Addition and Removal........................................................ 67
5.9.4. System Group Details....................................................................................67
5.10. System Set Manager....................................................................................................68
6. Red Hat Network Daemon........................................................................................................ 71
7. Using Red Hat Network with Red Hat Linux 6.2 .................................................................73
Glossary ............................................................................................................................................75
Index ..................................................................................................................................................81
Introduction
Welcome to the Red Hat Network Workgroup User Reference Guide 1.0.
The Red Hat Network Workgroup User Reference Guide will guide you through registering your system for Red Hat Network and using its many features. Depending on which version of Red Hat Linux you have installed, the Red Hat Network Registration Client and the Red Hat Update Agent might be differentthan the ones described in this manual as new features are added. Once you use Red Hat Network to update these applications, you can use the latest version of this manual. All versions of this manual are available in HTML and PDF formats at http://www.redhat.com/docs/manuals/RHNetwork/.
This version of the manual covers version 2.7.0 of the Red Hat Update Agent and version
1.5.0 of the Red Hat Network Registration Client.
For a more detailed, technical overview of Red Hat Network, please refer to the Red Hat Network Technical Paper available at http://www.redhat.com/docs/wp/.
1. Document Conventions
When you read this manual, you will see that certain words are represented in different fonts, typefaces, sizes, and weights. This highlighting is systematic; different words are rep­resented in the samestyle to indicate their inclusion in a specific category.The types of words that are represented this way include the following:
command
Linux commands (and other operating system commands, when used) are represented this way. This style should indicate to you that youcan type in the wordor phrase on the command line and press [Enter] to invoke a command. Sometimes a command contains words that would be displayed in a different style on their own (such as filenames). In these cases, they are considered to be part of the command, so the entire phrase will be displayed as a command. For example:
Use the cat testfile command to view the contents of a file, named testfile, in the current working directory.
filename
Filenames, directory names, paths, and RPM package names are represented this way. This style should indicate that a particular file or directory exists by that name on your Red Hat Linux system. Examples:
The .bashrc file in your home directory contains bash shell definitions and aliases for your own use.
The /etc/fstab file contains information about different system devices and filesys­tems.
Install the webalizer RPM if you want to use a Web server log file analysis program.
application
This style should indicate to you that theprogram named is an end-user application (as opposed to system software). For example:
Use Netscape Navigator to browse the Web.
vii
viii Introduction
[key]
A key on the keyboard is shown in this style. For example:
To use [Tab] completion, type in a character and then press the [Tab] key. Your terminal will display the list of files in the directory that start with that letter.
[key]-[combination]
A combination of keystrokes is represented in this way. For example:
The [Ctrl]-[Alt]-[Backspace] key combination will restart the X Window System.
text found on a GUI interface
A title, word, or phrase found on a GUI interface screen or window will be shown in this style. When you see text shown in this style, it is being used to identify a particular GUI screen or an element on a GUI screen (such as text associated with a checkbox or field). Example:
Select the Require Password checkbox if you would like your screensaver to require a password before stopping.
top level of a menu on a GUI screen or window
When you see a word in this style, it indicates that the word is the top level of a pull­down menu. If you click on the word on the GUI screen, the rest of the menu should appear. For example:
Under Settings on a GNOME terminal, you will see the following menu items: Prefer- ences, Reset Terminal, Reset and Clear, and Color selector.
If you need to type in a sequence of commands from a GUI menu, they will be shown like the following example:
Click on Programs=>Applications=>Emacs to start the Emacs text editor.
button on a GUI screen or window
This style indicates that the text will be found on a clickable button on a GUI screen.
For example:
Click on the Back button to return to the Web page you last viewed.
computer output
When you see text in this style, it indicates text displayed by the computer on the command line. You will see responses to commands you typed in, error messages, and interactive prompts for your input during scripts or programs shown this way. For ex­ample:
Use the ls command to display the contents of a directory:
$ ls Desktop axhome logs paulwesterberg.gif Mail backupfiles mail reports
Introduction ix
The output returned in response to the command (in this case, the contents of the direc­tory) is shown in this style.
prompt
A prompt, which is a computer ’s way of signifying that it is ready for you to input something, will be shown in this style. Examples:
$ # [stephen@maturin stephen]$ leopard login:
user input
Text that the user has to type, either on the command line, or into a text box on a GUI
screen, is displayed in this style. In the following example, text is displayed in this style:
To boot your system into the text based installation program, you will need to type in the text command at the boot: prompt.
Additionally, we use several different strategies to draw your attention to certain pieces of information. In order of how critical the information is to your system, these items will be marked as note, tip, important, caution, or a warning. For example:
Note
Remember that Linux is case sensitive. In other words, a rose is not a ROSE isnot a rOsE.
Tip
The directory /usr/share/doc contains additional documentation for packages installed on your system.
Important
If you modify the DHCPconfiguration file, the changes will not take effect untilyou restart the DHCP daemon.
Caution
Do not perform routine tasks as root — use a regular user account unless you need to use the root account for system administration tasks.
x Introduction
Warning
If you choose not to partition manually, a server installation will remove all existing partitions on all installed hard drives. Do not choose this installation class unless you are sureyou have no data you need to save.
2. More to Come
The Red Hat Network Workgroup User Reference Guide is constantly expanding as new Red Hat Network features and service plans are launched.
2.1. Send in Your Feedback
If you would like to make suggestions about the Red Hat Network Workgroup User Reference Guide, please mention this guide’s identifier:
RHNworkgroup(EN)-1.0-Print-RHI (2002-01-18T17:410400)
You can send mail to: <rhn-feedback@redhat.com>
Chapter 1. What is Red Hat Network?
Have you ever read about a new version of a software package and wanted to install it but could not find it?
Have you evertried to find an RPM through an Internet search engine or an RPM Repository and been linked to a site that you have never heard of?
Have you ever tried to find an RPM but instead you are only able to find the source files that you have to compile yourself?
Have you ever spent hours or even days visiting different websites to see if you have the latest packages installed on your system, only to have to do it again in a few months?
Those days are over with Red Hat Network (RHN). RHN provides the solution to all your system software management needs.
Red Hat Network is an Internet solution for managing a Red Hat Linux system or a network of Red Hat Linux systems. All Security Alerts, Bug Fix Alerts, and Enhancement Alerts (col­lective known as Errata Alerts) can be downloaded directly from Red Hat. You can even have updates automatically delivered directly to your system as soon as they are released.
The three main components of Red Hat Network are as follows:
The Red Hat Network Registration Client
The Red Hat Network user interface
Red Hat Network Daemon
The Red Hat Network Registration Client allows you to register your system with RHN. Registration involves creating a unique RHN user name and password, probing the hard­ware on your system to create a Hardware Profile, and probing the software packages in­stalled on your system to create a Package Profile. This information is sent to RHNm and RHN returns a unique System ID to your system (see Chapter 2 for further information).
You can use either of the two Red Hat Network user interfaces:
https://rhn.redhat.com
The Red Hat Update Agent
Both the Web interface and the Red Hat Update Agent allow you to view Errata Alerts from in the Red Hat Errata list. Only packages relevant to your system are shown. Red Hat Network can also be configured to verify packages once downloaded, ignore update notifi­cations for certain packages, and view package details before downloading them.
The Red Hat Network Daemon (rhnsd) runs in the background as a service and probes the Red Hat Network for notifications and updates at set time intervals (see Chapter 6 for further information). This daemon is necessary if you want to receive automatic updates or if you schedule an action through the Web interface.
Many Red Hat Network terms are used throughout this manual. As you read the Red Hat Network User Reference Guide, refer to the Glossary as necessary for explanation of common terms.
Tip
Refer to https://rhn.redhat.com/help/faq.pxt for a list of Frequently Asked Questions.
11
12 Chapter 1. What is Red Hat Network?
1.1. Basic
The first subscription service offered through Red Hat Network was called Software Man­ager. This subscription service, now known as RHN Basic, has all the same features that Software Manager offered, plus more new features. All existing Software Manager subscrip­tions were automatically transfered to Basic subscriptions. Registering a system with Red Hat Network is free, as is your first RHN Basic subscription. Additional subscription to Ba­sic can be purchased at http://rhn.redhat.com/purchase_info.pxt.
With each Basic subscription, you receive:
Errata Alerts — learn when Security Alerts, Bug Fix Alerts, and Enhancement Alerts are
issued for all the systems in your network through the Basic interface
Automatic email notifications — receive an email notification when an Errata Alert is is-
sued for your system
Scheduled Errata Updates— schedule delivery of Errata Updates with optional automatic
installation
Package installation — Schedule package installation on one or more systems with the
click of a button
Red Hat UpdateAgent — use the Red Hat Update Agent todownload the lastest software
packages for your system with optional package installation
Access to the Red Hat Network website to manage multiple systems, downloaded indi-
vidual packages, and schedule actions such as Errata Updates.
1.2. Workgroup
In addition to the features offered in the RHN Basic subscription service, the RHN Work­group subscription service allows you to manage your network of Red Hat Linux systems manage users, and manage system groups through its System Set Manager interface.
Workgroup is based around the concept of an organization. Each enterprise level Red Hat customer is assigned a Red Hat Customer Number. A Red Hat Network organization can be established for each Red Hat Customer Number. Each Red Hat Network organization contains users who have administration privileges to system groups. An Organization Ad­ministrator has overall control over each Red Hat Network organization with the ability to add and remove systems and users. When users other than the Organization Administrators log into Red Hat Network Workgroup, they only see the systems they have permission to administer.
To create a corporate account that can be used to entitle systems to the RHN Workgroup, go to http://rhn.redhat.com/ and click on the Create Account link under the Your RHN category. On the Sign Up for Red Hat Network page, click Create a Corporate Account. After creating a corporate account, users within your organization need to click the Join a Cor- porate Account link to create an RHN user account. In the Corporate Account Information section, they should enter the customer number and password configured when you created the corporate account. Before the new corporate user can log in, an existing Organization Administrator for the corporation must approve the addition of the user and configure the new user ’s roles and permissions. Refer to Section 5.3 for more information on approving new users.
The Red Hat Network features available to you depends on the subscription level for each Red Hat Linux system.
Chapter 1. What is Red Hat Network? 13
Systems subscribed to Workgroup may access the following features:
1. System Set Manager that allows administrators to perform an action on a selected set of systems at the same time
2. Enhanced system details including the location of the system
3. System groups
4. User management
5. Grant or deny users access to selected system groups
6. Organization Administrators can modify the user details of all users within the orga­nization
1.3. Automatic Notifications and Package Installation
You can configure Red Hat Network to send you email notifications of new and updated software packages as soon as the packages are available through RHN. You can also config­ure your systems todownload and optionally install packageupdates automatically. Because no user intervention is required, the benefits include:
Reduced time and effort required by system administrators to stay on top of the Red Hat
Errata list
Minimized security vulnerabilities in your network by providing the patches as soon as
Red Hat releases them
Filtered list of package updates (packages not relevant to your network are not included)
Reliable method of managing multiple systems with similar configurations
1.4. Security, Quality Assurance, and Red Hat Network
Red Hat Network provides significant benefits to your network including security and qual­ity assurance. All transactions made between you and Red Hat Network are encrypted, and all RPM packages are signed with Red Hat’s GNU Privacy Guard (GPG) signature to ensure authenticity.
Red Hat Network incorporates the following security measures:
1. Your System Profile available at http://rhn.redhat.com is only accessible with an RHN verified user name and password.
2. A Digital Certificate is written to the client system after registration and is used to au­thenticate the system during each transaction betweenthe client and Red Hat Network. The file is only readable by the root user on the client system.
3. All notifications and information messages are signed by Red Hat with an electronic signature using GPG. The rpm utility can be used to verify the authenticity of the pack­age before it is installed.
4. All transactions are encrypted using a Secure Sockets Layer (SSL) connection.
5. All packages are tested and verified by the Red Hat Quality Assurance Team before they are added to the Red Hat Errata list and Red Hat Network.
14 Chapter 1. What is Red Hat Network?
1.5. Before You Begin
Red Hat Network is available for Red Hat Linux 6.2 and higher. For instructions on config­uring Red Hat Linux 6.2 for Red Hat Network, refer to Chapter 7.
By default, all the software packages you need to use Red Hat Network are installed with Red Hat Linux7 and higher. However, if you chose not to install them during the installation process or performed an upgrade from Red Hat Linux 6.2 or lower, you may not have the Red Hat Network Registration Client or the Red Hat Update Agent installed. To verify that the Red Hat Network Registration Client is installed, type the following command:
rpm -q rhn_register
If the Red Hat Network Registration Client is installed, it will return something similar to
rhn_register-1.5.0-1
The version number might differ slightly if you have a newer version installed.
If you do not have the Red Hat Network Registration Client installed, the command will return
package rhn_register is not installed
Perform this check for every package in Table 1-1. If you prefer not to use the graphical versions, you do not have to install the two packages ending in gnome.
Table 1-1. Red Hat Network Packages
Package Name Description
rhn_register Provides the Red Hat Network Registration Client program and
rhn_register-gnome Provides the GNOMEinterface (graphical version) for the Red Hat
up2date Provides the Red Hat Update Agent command line version and
up2date-gnome Provides the GNOME interface (graphical version) for the Red Hat
If the packages are not installed, they can be found on the Red Hat Linux 7 (or higher) CD-ROM #1 in the RedHat/RPMS directory or downloaded from the Red Hat FTP site available at ftp://ftp.redhat.com (or from a Red Hat FTP mirror available at http://www.redhat.com/mirrors.html). Always check the Red Hat Errata page, available at http://www.redhat.com/errata/, for package updates. If you install an older version of these packages, you can retreive the latest versions using Red Hat Network. The first time that you request the RPM updates for your system, they will be included.
the text mode interface
Network Registration Client; runs if the X Window System is available
the Red Hat Network Daemon
Update Agent; runs if the X Window System is available
Chapter 2. Red Hat Network Registration Client
Before you begin using Red Hat Network, you need to create a user name, password, and System Profile. The Red Hat Network Registration Client will walk you through this pro­cess.
2.1. Configuring the Red Hat Network Registration Client
Warning
Most users do not need to configure the Red Hat Network Registration Client before registering their systems. Do not attempt to use this option unless you must.
To start the configuration tool, use the command:
rhn_register --configure
You will be presented with a list of options and their current values:
0. enableProxyAuth No
1. noSSLServerURL http://www.rhns.redhat.com/XMLRPC
2. enableProxy No
3. httpProxy
4. proxyUser
5. serverURL https://www.rhns.redhat.com/XMLRPC
6. proxyPassword
7. debug No
Enter number of item to edit
Enter the number of the item that you want to modify, and enter a new value for the option. When you finish changing your configuration, press [Enter] to save your changes and exit. Press [q] and then [Enter] to quit without saving your changes.
The most common options configured are numbers 2 and 3 to enable a proxy server. To enable a proxy server, change the value for enableProxy to Yes and the value of httpProxy to the name of the proxy server and port number in the format http://HOST:PORT. For example, to use the proxy server http://squid.mysite.org on port 3128, you would change the value to http://squid.mysite.org:3128.
If you require a proxy username and password, change the values of numbers 0, 4, and 6. Set enableProxyAuthto Yesto enable username/password authentication forthe proxy. Set
proxyUser and proxyPassword to the appropriate username and password for the proxy.
return to exit, q to quit without saving:
2.2. Starting the Red Hat Network Registration Client
You must be root to register a system with RHN. If you start the Red Hat Network Registra­tion Client as a standard user, you will be prompted to enter the root password before pro-
ceeding. To start the Red Hat Network Registration Client in Red Hat Linux 6.2 or higher, use one of the following methods:
1. On the GNOME desktop, go to the Main Menu Button (on the Panel) => Programs =>
System => Red Hat Network
15
16 Chapter 2. Red Hat Network Registration Client
2. On the KDE desktop, go to the Main Menu Button (on the Panel) => Red Hat => System => Red Hat Network
3. Type the command rhn_register at a shell prompt (for example an xterm or gnome­terminal)
4. If you are not running the X Window System, type the command rhn_register at a virtual console or remote terminal. Please refer to Section 2.7 for further details.
Caution
You must use Python 1.5.2-24 or later with Secure Sockets Layer (SSL) support. If not, the infor­mation you transfer will not be encrypted. If you have an earlier version of Python, you will see the message shown in Figure 2-1. To determine the versionof Python on your system, use thecommand
rpm -q python. It is strongly recommended you use Python 1.5.2-24 or later.
Figure 2-1. Use Python 1.5.2-24 or later
The opening screen for the Red Hat Network Registration Client gives you a brief overview of the services available and the steps required to register (see Figure 2-2). Click Next to continue with the registration process. If you click Cancel, the registration process will end and no information will be sent.
Chapter 2. Red Hat Network Registration Client 17
Figure 2-2. Welcome Screen
Red Hat is committed to protecting your privacy (see Figure 2-3). The information gathered during the Red Hat Network registration process is used to create a System Profile. The System Profile is essential if you wish to receive update notifications about your system. If you have any questions about how your information is being used, please contact us at <feedback@redhat.com>.
18 Chapter 2. Red Hat Network Registration Client
Figure 2-3. Red Hat Privacy Statement
2.3. Registering a User Account
Before you can create a System Profile, you must create a user account. The only required information in this section is a unique user name, password, and a valid email address.
In the screen shown in Figure 2-6, you must choose a user name and password. Once logged in to Red Hat Network, you can modify your preferences, view your existing System Profile, or obtain the lastest Red Hat software packages. You mustchoose a unique user name. If you enter one already in use, you will see an error message (see Figure 2-4). Try different user names until you find one that has not been used.
Figure 2-4. Error: Username Already Exists
Chapter 2. Red Hat Network Registration Client 19
Note
If you are already a member of redhat.com, you can use the same user name and password. How­ever, you will still need to continue with the registration process to create yourSystem Profile.
Your user name and password have the following restrictions:
Must be at least four characters long
Are case-insentitive
Can not contain any spaces
Can not contain any tabs
Can not contain any line feeds
Can not contain the characters &, +, %, or ’
If you have already registered your system and try to register it again, the dialog box shown in Figure 2-5 will appear. If you continue, it will overwrite your existing systemid file (/etc/sysconfig/rhn/systemid) and you will create a different System Profile. You will no longer be able to use your previous System Profile — be sure this is what you want to do before you choose Yes.
Figure 2-5. Warning: This System Already Registered
If you have already registered a machine and created a System Profile, you can add a new machine to your account. Run the Red Hat Network Registration Client on the new ma­chine you wish to add and enter your existing Red Hat Network user name and password. The new machine will be added to your existing account, and you can log into Red Hat Network with your user name and password to view all your systems simultaneously.
20 Chapter 2. Red Hat Network Registration Client
Figure 2-6. Create a Unique User Name and Password
Most users can leave the Org Info section blank. If you have an existing organization ac­count, enter your organization’s ID and password in the provided text fields. If the values are valid, the system will be added to the organization’s Red Hat Network account.
Click Next to continue.
2.4. Registering a System Profile
Now that you have a user account, you can create a System Profile that consists of hardware and software information about your Red Hat Linux system. The software System Profile information is used by Red Hat Network to determine what software update notifications you receive.
2.4.1. Hardware System Profile
After creating a user name and password for your Red Hat Network account, the Red Hat Network Registration Client probes your system for the following information:
Red Hat Linux version
Hostname
IP address
CPU model
CPU speed
Amount of RAM
Chapter 2. Red Hat Network Registration Client 21
PCI devices
Disk sizes
Mount points
The next step is choosing a profile name for your system as shown in Figure 2-7. The default value is the hostname for the system. You may modify this to be a more descriptive string, such as Email Server for Support Team, if you find it more helpful. Optionally, you can enter a computer serial or identification number for the system.
If you do not wish to include information about your hardware or network in your System Profile, deselect Include information about hardware and network (see Figure 2-7).
Click Next to continue with the registration process.
Figure 2-7. System Profile - Hardware
2.4.2. Software System Profile
The software System Profile consists of a list of RPM packages for which you wish to receive notifications. The Red Hat Network Registration Client shows you a list of all RPM pack­ages listed in the RPM database on your system and then allows you to customize the list by deselecting packages.
2.4.2.1. Gathering RPM Database Information
Only those packages you choose during this part of the registration will be included in in your System Profile, and you will only receive notifications about the packages in your Sys­tem Profile. Thus, if you use an older version of a package and deselect it from the list, it will not be replaced with a newer version. This RPM list can be modifed through the Red Hat Network Web interface or by using the Red Hat Update Agent. Figure 2-8 shows the
22 Chapter 2. Red Hat Network Registration Client
progress bar you will see while the Red Hat Network Registration Client gathers a list of the RPM packages installed on your system. This operation may take some time depending on your system.
Figure 2-8. Registration Wizard
Once the RPM package list is built, the list will be displayed as shown in Figure 2-9. Dese­lecting Include RPM Packages installed on this system in my System Profile will omit this information from your System Profile.
Figure 2-9. RPM Package Information
2.4.2.2. Choosing Which RPM Packages to Exclude from the System Profile
By default, all RPM packages in your RPM database are included in your System Profile to be updated by Red Hat Network. To exclude a package, uncheck thepackage from thelist by clicking the X beside the package name. For example, Figure 2-10 shows that the procmail, procps, and psgml packages have been omitted from the package list.
Choose which packages to exclude,if any, from theSystem Profile, and click Next to continue with the registration process.
Chapter 2. Red Hat Network Registration Client 23
Figure 2-10. Choose which RPM Packages to Exclude from System Profile
2.5. Finishing Registration
As seen in Figure 2-11, the last step of registration is to confirm that you want to send your System Profile to the Red Hat Network. If you choose Cancel at this point, no information will be sent. Clicking Next will submit your RHN System Profile.
24 Chapter 2. Red Hat Network Registration Client
Figure 2-11. Finished Collecting Information for System Profile
Figure 2-12 shows the progress bar you will see while your profile is being sent. This process may take some time depending on your connection speed.
Figure 2-12. Send System Profile to Red Hat Network
You will know your System Profile has been successfully sent when you see the Registration Finished screen (Figure 2-13). Click Finish to exit the Red Hat Network Registration Client.
After completing the registration, visit http://rhn.redhat.com to verify your System Profile and make any changes.
Chapter 2. Red Hat Network Registration Client 25
Figure 2-13. Registration Finished
2.6. Entitling Your System
Now that you have registered your system, it must be entitled before you can receive up­dated packages. In other words, you must subscribe it to a service level offering. Everyone automatically receives one free Basic subscription after creating an account by registering a system for RHN or creating a redhat.com account.
To entitle a system, go to http://rhn.redhat.com and login using the same username and password you just used in the Red Hat Network Registration Client. On the left navigation bar, click Entitlements under the Your RHN category. The Entitlement Manager tells you how many entitlements you have left. If you have one or more left, check the checkbox under the Entitled column beside the name of the system that you just registered. Then click the Update Entitlements button at the bottom of the page. The number of entitlements remaining will decrease, and your system is now ready to use the Red Hat Update Agent and Workgroup. Refer to Chapter 4 and Chapter 5 for details on how to use them. If you do not have any entitlement slots left, enter the number you want to purchase and click the Buy Now! button to purchase additional subscriptions.
2.7. Text Mode RHN Registration Client
You can force the Red Hat Network Registration Client to run in text mode with the com­mand:
rhn_register --nox
The screens for the text mode Red Hat Network Registration Client are almost identical to the screens for the graphical Red Hat Network Registration Client. Some of the text in the text mode version is more concise due to lack of space in the interface. However, there is an equal number of screens and fields in both versions. Thus, if you are using the text mode version, you can still follow the instructions that begin in Section 2.2.
26 Chapter 2. Red Hat Network Registration Client
Figure 2-14. Text Mode Welcome Screen
Loading...
+ 58 hidden pages