This SUSE product includes materials licensed to SUSE under the GNU General Public License (GPL). The GPL requires that SUSE makes available certain source code that corresponds to the GPL-licensed material. The source code is available for download.
Version revision history
-
March 2023: 4.3.5 release
-
February 10th, 2023: 4.3.4 release
-
December 14th, 2022: 4.3.3 release
-
October 26th, 2022: 4.3.2 release
-
September 8th, 2022: 4.3.1 release
-
June 20th, 2022: 4.3 GA
About SUSE Manager 4.3
SUSE Manager 4.3, the latest release from SUSE based on SUSE Linux Enterprise Server 15 SP4 and the Uyuni Project, delivers a best-in-class open source infrastructure management and automation solution that lowers costs, identifies risk, enhances availability and reduces complexity.
As a key component of a software-defined infrastructure, SUSE Manager 4.3 delivers the following new or enhanced capabilities to your Edge, Cloud & Datacenter environments.
Expanded operating system support
Adding to its extensive list of Linux distributions, SUSE Manager 4.3 introduces support for Debian 11, further enabling the management of all your Enterprise Linux distributions from a single tool – no matter where they are located.
SUSE Manager now supports the management of SLES, SLES for SAP, SLE-Micro, RHEL, openSUSE, SUSE Liberty Linux, Oracle Linux, CentOS, AlmaLinux, Rocky Linux, Ubuntu, Debian, and Amazon Linux.
Scaling SUSE Manager
With the "SUSE Manager Hub" multi-server architecture we are gradually introducing a framework that allows you to scale SUSE Manager deployments to hundreds of thousands of nodes using tiered management servers.
SUSE Manager 4.3 further introduces new features in Hub framework, optimizing it for the edge deployments, and fill the gaps by introducing centralized reporting and enhancing ISSv2 by adding capabilities to transfer OS Images and configuration channels from Hub to peripheral servers.
With ever growing Linux footprints you need your management tool be able to scale to tens of thousands of Linux devices and beyond. With the performance and scalability enhancements in 4.3, your SUSE Manager deployment can easily scale in your environment in any direction, while providing better performance than any previous version even in very large-scale environments.
This allows you the flexibility to grow your infrastructure as required by your business needs, with the peace of mind that SUSE Manager will be able to manage your large estate, and the cost implications of growing their footprint will not be exaggeratedly high.
Before you begin , you should always get advice from a SUSE partner, sales engineer, or consultant.
Updating and Configuration Management
With SUSE Manager 4.3, one of the goal is to make typical system administration tasks even more easier. There will be number of improvments when it comes to SSM, action status at given time, to name a few.
Interoperability
One of the main areas that we wanted to improve with SUSE Manager 4.3 is interoperability. Our goal was to make SUSE Manager play well with the existing tools that users already have.
Salt bundle
One effort in this regard has been around salt. SUSE Manager 4.3 comes with salt-bundle. The Salt Bundle can be used on systems that already run another Salt Minion or systems which do not meet Salt’s requirements or already provide a newer salt version that is used instead of the version provided by SUSE Manager.
Containerization
Another goal that we want to achieve in a long run is to enable SUSE Manager to be deployed in container-only environments, independently from the base OS. Allow SUSE Manager components (specifically Proxies/Retail Branch servers) to run in more resource-constrained environments. Edge market is our main audience here with this effort. It will allow users to install SUSE Manager components on top of kubernetes, increasing flexibility and future viability
Enabling SUSE Manager Proxy and Retail Branch Servers to also run in containers, is in SUSE Manager 4.3 scope.
HTTP API
With SUSE Manager 4.3, in addition to the current XML-RPC API, a new JSON over HTTP API will also be provided to make SUSE Manager API even easier to consume.
SUSE Manager is seeing more and more use in automated scenarios, where it is a part of a bigger system and is driven via its APIs. The XML-RPC protocol has served users well so far and will continue to do so, but HTTP APIs are more in demand and have better tooling support.
Keep Informed
You can stay up-to-date regarding information about SUSE Manager and SUSE products:
-
Check the newest SUSE Manager 4.3 release notes
-
Read the SUSE Blog
-
Use the SUSE Best Practices for SUSE Manager
-
Join the SUSE Manager discussion forum
-
Join the upstream Uyuni community and monthly community meetings
Installation
Requirements
SUSE Manager Server 4.3 is provided through SUSE Customer Center and can be installed with the unified installer for SUSE Linux Enterprise 15 Service Pack 4. It is available for x86-64, POWER (ppc64le), or IBM Z (s390x). No separate SUSE Linux Enterprise subscription is required.
With the adoption of a unified installer in SUSE Linux Enterprise 15, system roles are used to customize the installation for each product. The unified installer provides an easier way to install the operating system and the SUSE Manager Server application together with specific pre-configured system settings. This addresses the need for enterprise deployments to standardize on the base operating system as well as on specific storage setups.
PostgreSQL is the only supported database. Using a remote PostgreSQL database is not supported.
Update from previous versions of SUSE Manager Server
In-place update from SUSE Manager Server 4.1 and 4.2 is supported.
All connected clients will continue to run and remain unchanged.
For detailed upgrading instructions, see the Installation and Upgrade Guide
Major changes since SUSE Manager Server 4.3 GA
Features and changes
Version 4.3.5
Salt 3000 EOL
Upstream Salt 3000 went End of life on August 31, 2021. However, because it was part of the Advanced Systems Management Module of SUSE Linux Enterprise 12 and there was no bundle available for SUSE Manager 4.1, we needed to keep it supported for the life of SUSE Manager 4.1.
Salt 3000 will no longer be supported in the context of SUSE Manager now that both SUSE Manager 4.1 and the Advanced Systems Management Module of SUSE Linux Enterprise 12 are End of Life. Customers are required to migrate existing Salt 3000 minions for SUSE Linux Enterprise Server 12, Red Hat Enterprise Linux 7, CentOS 7, Oracle Linux 7, and Amazon Linux 2 to the Salt Bundle in order to get the support.
For more information about performing Salt 3000 to Salt Bundle migrations, please consult the Client Configuration Guide.
IMPORTANT: The Salt 3000 will no longer receive updates or L3 support. For updates and support, all minions currently using Salt 3000 must be migrated to the Salt Bundle.
Content Lifecycle Management: Disabling modularity for AppStream repositories
Starting with SUSE Manager 4.3.5, AppStream modularity can be disabled by removing the module metadata from the target repositories without having to enable any modules.
This can be achieved by using the new none
matcher with the AppStream filters.
This new feature is especially useful for RHEL 9, SUSE Liberty Linux 9, AlmaLinux 9, Rocky Linux 9 or Oracle Linux 9, as default versions of most applications are now served as regular packages.
Check the Administration Guide for more information.
SUSE Linux Enterprise Server Micro product migration
We resolved known issues related to SUSE Linux Enterprise Server Micro. In addition, SUSE Manager 4.3.5 now supports the migration of SUSE Linux Enterprise Server Micro to newer versions.
Check the Client Configuration Guide for a complete list of supported features.
Monitoring: Grafana update to 8.5.20
Grafana has been upgraded to 8.5.20. This update fixes some important security vulnerabilities:
-
CVE-2022-23552
-
CVE-2022-39324
-
CVE-2022-41723
-
CVE-2022-46146
Check the upstream changelog for all the details.
Subscription warning notifications will now happen weekly
Previous versions of SUSE Manager created a notification each day when a SUSE Customer Center (SCC) subscription was about to expire, starting 90 days before the subscription expiration and 30 days after expiration.
With SUSE Manager 4.3.5 we are adressing the feedback we got about the frequency, and we are changing it to happen weekly, on Mondays.
The warning box at the Dashboard (Home > Overview) will still show up any time there is a subscription expiring in the next 90 days, or expired in the last 30 days.
Documentation: New look and feel
We have recently introduced a new branding for our documentation. The documentation team has created a modern and visually appealing design that enhances the overall user experience. With this new update, we aim to provide a more intuitive and streamlined approach to accessing the information you need. We believe this new design will make it easier for users to navigate and locate the information they need quickly and efficiently.
We look forward to receiving your feedback.
New API methods for kickstart.tree
The following new API endpoints have been added to the kickstart.tree
namespace.
create
: API endpoint to create a Kickstart Tree (Distribution) that also accepts kernel options and post kernel options
update
: API endpoint to update an existing Kickstart Tree (Distribution) that also accepts kernel options and post kernel options
These methods could further help in improving the automation workflows.
Version 4.3.4
SUSE Liberty Linux 9 support as client
SUSE has announced the general availability of SUSE Liberty Linux 9 (SLL9). The SLL9 and SLL9-HA products are immediately available for customers. With SUSE Manager 4.3.4, we are happy to announce that SLL9 is a fully supported client in SUSE Manager. SUSE Liberty Linux 9 instances can now be managed right from SUSE Manager.
Check the Client Configuration Guide for information about it.
SUSE Linux Enterprise Server Micro support as client
SUSE Linux Enterprise Server Micro is an ultra-reliable, lightweight operating system purpose built for containerized and virtualized workloads. It leverages the enterprise hardened security and compliance components of SUSE Linux Enterprise and merges them with a modern, immutable, developer-friendly OS platform.
Support for SUSE Linux Enterprise Server Micro in SUSE Manager was added as a tech preview. In the meanwhile, we have made some significant improvements around it to make sure that user get the seamless usability experience in case of an immutable OS such as SUSE Linux Enterprise Server Micro.
Check the Client Configuration Guide for information about the supported features.
Please consult the Known issues section for some issues around SUSE Linux Enterprise Server Micro support.
Note: SUSE Linux Enterprise Server Micro is only supported as regular minion for the time being; we are working on managing it as Salt SSH client.
Indications for systems requiring reboot or with a scheduled reboot
SUSE Manager 4.3.4 brings several improvements to the reboot status of the managed clients:
-
The System List page now provides a new icon at the
Updates
column when a reboot is required. This new icon allows scheduling the reboot. -
The System Overview page for the clients will show the text
System reboot scheduled
when a reboot is scheduled.
Notification messages via email
SUSE Manager shows notification messages on the webUI, but they are not very useful for those users that do not login very often.
With SUSE Manager 4.3.4, each user can enable such notifications to be delivered via email using the user preferences (checkbox Receive email notifications
).
Monitoring: Grafana update to 8.5.15
This update fixes several security vulnerabilities:
-
CVE-2022-39306
-
CVE-2022-39307
-
CVE-2022-39201
-
CVE-2022-31130
-
CVE-2022-31123
-
CVE-2022-39229
No other bugfixes, features or changelogs are part of this update.
Check the upstream changelog for all the details.
Subscription warning notifications
In order to help users with the compliance and to be notified of SUSE subscriptions which are already expired or about to expire in near future, SUSE Manager will show the alert at the Overview page and also as a notification under notifications tab. This will not affect users not using SUSE subscriptions.
Limit changelogs at repositories metadata to the last 20 entries
Up until recently, SUSE Manager added all the changelog entries for all packages to the generated metadata for each repository generated at the SUSE Manager Server. This caused the file others.xml.gz
to be very big in some situations, and therefore increasing the time it takes to synchronize the metadata on the SUSE Manager clients.
Starting with SUSE Manager 4.3.4, this is now limited to 20 entries for each package by default for new packages. Already synced packages will keep the whole changelog.
This change is only about the repository metadata and will not affect the packages themselves, which will keep the complete changelogs.
If you want to go back to keeping all the changelog entries, increase the number of entries, or apply the new default for all existing packages, check the Administration Guide.
Drop legacy way to prevent disabling local repositories at bootstrap scripts
In the past, using DISABLE_LOCAL_REPOS=0
with the bootstrap script allowed users to keep local repositories enabled after registration. This has been dropped now.
One can still prevent disabling local repositories for any kind of onboarding (webUI, API, Bootstrap script, etc.) using instructions as explained at the Client Configuration Guide.
Version 4.3.3
RHEL 9 and clones support as client
Now RHEL 9 and its clones, Rocky Linux 9, AlmaLinux 9, and Oracle Linux 9, can be managed by SUSE Manager as Salt or Salt SSH minions. All the features that work in previous versions of RHEL and its clones will work now for RHEL 9 and clones as well. Check the Client Configuration Guide for information about how to configure the SUSE Manager Server to work with these distributions.
Please consult the Known issues section for an issue around Rocky 9 Linux support with SELinux enabled.
Improved SUSE Linux Enterprise Micro support
SUSE Manager 4.3.3 includes a number of enhancements to SUSE Linux Enterprise Micro support in SUSE Manager.
These changes include the following:
-
The onboarding process has been improved to be more fluid and to behave the same way as with any other SUSE Linux Enterprise minion. The only exception from the general workflow is that after onboarding is done, the SUSE Linux Enterprise Micro minion needs to be restarted to activate it.
-
The handling of SUSE Linux Enterprise Micro’s need for a reboot has been improved so that the user always has correct and up-to-date information in the Web UI about whether or not a reboot is required.
-
The action chains can now handle reboot actions correctly for SUSE Linux Enterprise Micro as well.
Note: Onboarding of SUSE Linux Enterprise Micro from WebUI is not functioning right now, however we are working on a fix. All other ways of bootstrapping should be working.
Instructions to disable custom channel automatic syncronization
With SUSE Manager 4.3.3, the custom channels are now synced automatically.
By default, a synchronization will start automatically after adding a new repository to a custom channel. Moreover, they will all update daily as a part of the mgr-sync-refresh-default
scheduled task.
To disable this new feature and revert back to the old behaviour, you can set in /etc/rhn/rhn.conf
:
java.unify_custom_channel_management = 0
Custom Channels section of the Administration guide for information about the custom channel synchronization.
Monitoring: Grafana update to 8.5.13
SUSE Manager 4.3.3 updates Grafana from version 8.3.5 to 8.5.13.
This update fixes several security vulnerabilities:
-
CVE-2022-36062
-
CVE-2022-35957
-
CVE-2022-31107
-
CVE-2022-31097
-
CVE-2022-29170
Check the upstream changelog for all the details on what has changed.
There is one breaking change:
- For a data source query made via /api/ds/query
, if the DatasourceQueryMultiStatus
feature is enabled and the data source response has an error set as part of the DataResponse
, the resulting HTTP status code is now 207 Multi Status
instead of 400 Bad gateway
.
Updating Grafana is strongly recommended.
Monitoring: Fix TLS configuration and enable client certificate authentication for Blackbox exporter
Previous SUSE Manager versions were using basic authentication for the Blackbox exporter scrapping, even when using TLS client certificates was enabled at the prometheus-formula.
With SUSE Manager 4.3.3, the Prometheus formula adds a section for the Blackbox exporter with TLS certificate and key for client certificate authentication.
Version 4.3.2
Fully supported Containerized Proxy/RBS and HTTP API
SUSE Manager 4.3 came with containerized SUSE Manager Proxy and Retail branch server as Tech Preview. We can now happily announce that we are moving this feature from the Technology Preview umbrella to under the fully supported one. Please consult the Known issues section for some limitations around this.
The same goes for our other initiative around the SUSE Manager API where besides the current XML-RPC API, a new JSON over HTTP API was provided to make SUSE Manager API even easier to consume. This new API was also a Technology Preview but starting with SUSE Manager 4.3.2, this would not be the case and this will be a fully supported alternate API.
Ubuntu 22.04 as client
To keep up with our goal to be OS agnostic, SUSE Manager is now able to manage Ubuntu 22.04 clients as Salt or Salt SSH minions. All other features that work for previous versions of Ubuntu will work now, with the exception of the Prometheus Exporters(for now Prometheus Exporters are available in the Universe repositories) and OpenSCAP (as profiles for Ubuntu 22.04 are not available yet), which will be part of a future SUSE Manager release. For more details about the supported features, check the Client Configuration Guide.
The following architectures can be managed:
-
amd64 (x86_64)
Check the Client Configuration Guide for information about how to configure SUSE Manager Server to work with Ubuntu 22.04 clients.
Cobbler updated to version 3.3.3
Cobbler was updated from version 3.1.2 to version 3.3.3. This upgrade comes with the frequently requested feature of building ISOs with UEFI support. Major changes in the context of SUSE Manager are the following
-
cobbler buildiso
now supports building ISOs with UEFI support -
Cobbler has a new command "cobbler mkloaders" that can be called optionally after GRUB or Syslinux was updated on the Uyuni Server
For the complete list of changes, see the upstream release notes:
NOTE: The migration of stored Cobbler collections and settings from previous Cobbler version to 3.3.3 will run automatically during this upgrade.
A backup of old Cobbler settings file will be created at /etc/cobbler/settings.before-migration-backup
and old collections backup under /var/lib/cobbler/
.
pip support for the Salt Bundle
The Salt Bundle now includes support for pip
, allowing users to extend the functionality of the bundled Salt Minion with extra Python modules.
Keep in mind that not all of the functions are available with the state, but the missing functionality can still be accessed with module.run
.
Monitoring: Apache exporter updated to version 0.11.0 for SUSE Linux Enterprise and openSUSE
Prometheus exporter for Apache has been upgraded from version 0.7 to the version 0.10.0 for SUSE Linux Enterprise and openSUSE, including the SUSE Manager Server, the SUSE Manager Proxy and the SUSE Manager Retail Branch Server.
Check the upstream release notes for more details, including new metrics.
Version 4.3.1
GPG key handling in SUSE Manager
SUSE Manager is now taking care of trusting the required GPG keys on the clients, in order to install packages from assigned channels
The GPG key URL can be defined for Software Channels which will be used to find the key needed for that channel.
When the channel is assigned to the client the key will be trusted on repository refresh or when installing a package out of the channels.
For more information, check the documentation.
Disabling locally defined repositories
To prevent problems with local defined repositories providing wrong or unwanted packages, we disable now all these repositories as the first step in bootstraping.
Additionlly we try to keep local repositories disabled and perform this in the channel state which is also used during highstate.
For more information, check the documentation.
Technology Preview: Helm chart to deploy containerized SUSE Manager Proxy and Retail Branch Server
Deploying Proxy and Retail Branch Servers as containers is now also possible using a Helm chart.
For more information check this README file. The information will be part of the SUSE Manager official documentation in a future release.
WARNING: The container images configuration has a new format and it is now packaged as tar.gz file. All previously deployed container Proxies and Retail Branch Servers will need to get their configuration regenerated and deployed again before pulling these images.
Patches
The SUSE Patch Finder is a simple online service to view released patches.
Version 4.3.5
cobbler:
-
Items: Fix creation of "default" NetworkInterface (bsc#1206520)
grafana-formula:
-
Version 0.8.1
-
Fix Uyuni/SUMA dashboard names
-
inter-server-sync:
-
Version 0.2.7
-
Do not update pillars table if it does not exists like in 4.2
-
mgr-libmod:
-
Version 4.3.4-1
-
Ignore extra metadata fields for Liberty Linux (bsc#1208908)
-
patterns-suse-manager:
-
Move the required cobbler version from the packages to the Server pattern
salt-netapi-client:
-
Version 0.21.0
-
Add transactional_update module
-
Improve logging when creating salt exception
spacecmd:
-
Version 4.3.19-1
-
Fix spacecmd not showing any output for softwarechannel_diff and softwarechannel_errata_diff (bsc#1207352)
-
Prevent string api parameters to be parsed as dates if not in ISO-8601 format (bsc#1205759)
-
spacewalk:
-
Version 4.3.6-1
-
Do not specify a cobbler version, as that is now centralized at the patterns
-
spacewalk-backend:
-
Version 4.3.19-1
-
set new CPU core value for traditional registration
-
Fix reposync error about missing "content-type" key when syncing certain channels
-
Enhance passwords cleanup and add extra files in spacewalk-debug (bsc#1201059)
-
Do not specify a cobbler version, as that is now centralized at the patterns
-
spacewalk-client-tools:
-
Version 4.3.15-1
-
Update translation strings
-
spacewalk-java:
-
Version 4.3.49-1
-
Refactor Java notification synchronize to avoid dead locks (bsc#1209369)
-
-
Version 4.3.48-1
-
Fix rendering of notifications list with subscription warnings (bsc#1209259)
-
-
Version 4.3.47-1
-
Allow single-value lists in query strings in HTTP API (bsc#1207297)
-
send subscription warning notifications only on monday
-
set uptime at package profile update
-
Install the reboot info beacon using a conf file instead of using pillars
-
Do not execute immediately Package Refresh action for the SSH minion (bsc#1208325)
-
Mark as failed actions that cannot be scheduled because earliest date is too old
-
Update earliest date when rescheduling failed actions (bsc#1206562)
-
send virtualization information to SCC
-
Prevent HTTP API restricted args from being logged (bsc#1208119)
-
Fix reconnection of postgres event stream
-
Add the create/update methods for kickstart to accepts kernel and kernel post options (jsc#suma-251)
-
Fix duplicate keys in suseImageFile and other tables (bsc#1207799)
-
Fix CLM environments UI for environment labels containing dots (bsc#1207838)
-
fix NumberFormatException when syncing ubuntu errata (bsc#1207883)
-
Fix taskomatic logging (bsc#1207867)
-
Do not specify a cobbler version, as that is now centralized at the patterns
-
Fix not being able to delete CLM environment if there are custom child channels that where not built by the environment (bsc#1206932)
-
Add 'none' matcher to CLM AppStream filters (bsc#1206817)
-
Makes systems column sortable on relevant patch page, to list by most affected systems
-
Fix issue where subscription warning would show incorrectly
-
Include missing 'gpg' states to avoid issues on SSH minions.
-
Standardize the login response format with other HTTP API endpoints (bsc#1206800)
-
Add
mgr_server_is_uyuni
minion pillar item -
disable cloned vendor channel auto selection by default (bsc#1204186)
-
spacewalk-setup:
-
Version 4.3.15-1
-
Do not specify a cobbler version, as that is now centralized at the patterns
-
spacewalk-web:
-
Version 4.3.28-1
-
Deprecate jQuery datepicker, integrate React datepicker
-
Fix UI inconsistencies in susemanager-light and susemanager-dark theme
-
Fix CLM environments UI for environment labels containing dots (bsc#1207838)
-
Add 'none' matcher to CLM AppStream filters (bsc#1206817)
-
susemanager:
-
Version 4.3.25-1
-
Tune the database after copying the old configuration (bsc#1208611)
-
-
Version 4.3.24-1
-
Create repostories with sha256 instead of sha1.
-
fix bootstrap repo path for SLES for SAP 12 (bsc#1207141)
-
show RHEL target for bootstrap repo creation only if it is really connected to the CDN (bsc#1206861)
-
susemanager-build-keys:
-
Version 15.4.7 (jsc#PED-2777):
-
add new 4096 bit RSA build key gpg-pubkey-3fa1d6ce-63c9481c.asc
-
add new 4096 bit RSA reserve build key gpg-pubkey-d588dc46-63c939db.asc
-
add new 4096 bit RSA PTF key suse_ptf_key_2023.asc
-
susemanager-docs_en:
-
Reworked Retail documentation to contain generic configuration examples
-
Warned about installing a containerized proxy on a traditional container host in Installation and Upgrade Guide
-
Branding updated for 2023
-
New search engine optimization improvements for documentation
-
Translations are now included in the webui help documentation
-
Local search is now provided with the webui help documentation
-
Removed z196 and z114 from listing in System Z chapter of the Installation and Upgrade Guide (bsc#1206973)
-
Updated System Security with OpenSCAP chapter in Administration Guide replacing the "standard" by "stig" profile
-
Added description for using a custom container image in a containerized proxy
-
Remove SUSE Linux Enterprise Micro requirement to preinstall salt-transactional package
-
Added information about java.salt_event_thread_pool_size in Large Deployments Guide
-
Re-added statement about Cobbler support in Reference Guide and Client Configuration Guide (bsc#1206963)
susemanager-schema:
-
Version 4.3.17-1
-
Remove rhnTaskoRun log paths
-
enhance CPU table by core and thread information
-
add trigger on cpu and virtual instance to re-sending virtualization information to SCC
-
Add 'none' matcher to CLM AppStream filters (bsc#1206817)
-
susemanager-sls:
-
Version 4.3.30-1
-
get uptime with package profile update
-
Fix missing module when bootstraping transactional systems (bsc#1207792)
-
Install the reboot info beacon using a conf file instead of using pillars
-
add CPU sockets, threads and total number to standard CPU grains
-
Fix current limitation on Action Chains for SLE Micro
-
Support SLE Micro migration (bsc#1205011)
-
Do not pass server grains to minions (bsc#1207087)
-
Fix mgrnet custom module to be compatible with old Python 2.6 (bsc#1206979) (bsc#1206981)
-
Do not use non-compatible unique filter in old jinja2 (bsc#1206979) (bsc#1206981)
-
Fix custom "mgrcompat.module_run" state module to work with Salt 3005.1
-
filter out libvirt engine events (bsc#1206146)
-
uyuni-setup-reportdb:
-
Version 4.3.7-1
-
improve postgres user check
-
uyuni-setup-reportdb: Test postgres user (bsc#1205088)
-
virtual-host-gatherer:
-
Version 1.0.25-1
-
Report total CPU numbers in the libvirt module
-
Version 4.3.4
cobbler:
-
Improve Cobbler performance with item cache and threadpool (bsc#1205489)
-
Skip collections that are inconsistent instead of crashing (bsc#1205749)
-
Add new "cobbler-tests-containers" subpackage which contains setup and configuration files to run Cobbler tests in containers.
-
Add missing code for previous patch file around boot_loaders migration.
-
Avoid possible override of existing values during migration of collections to 3.0.0 (bsc#1206160)
-
Fix regression: allow empty string as interface_type value (bsc#1203478)
-
Fix failing Cobbler tests after upgrading to 3.3.3.
drools:
-
Deserialization of Untrusted Data: unsafe data deserialization in DroolsStreamUtils.java (bsc#1204879, CVE-2022-1415)
grafana-formula:
-
Version 0.8.0
-
Set dashboard names depending on project
-
Update dashboards to use new JSON schema
-
Fix PostgreSQL dashboard queries
-
Migrate deprecated panels to their current replacements
-
image-sync-formula:
-
Update to version 0.1.1673279145.e7616bd
-
Add form entry for use lates boot image pillar value (bsc#1206055)
-
inter-server-sync:
-
Version 0.2.6
-
Export package extra tags for complete debian repo metatdata (bsc#1206375)
-
Replace URLs in OS Images pillars when exporting and importing images
-
mgr-osad:
-
Version 4.3.7-1
-
Updated logrotate configuration (bsc#1206470)
-
mgr-push:
-
Version 4.3.5-1
-
Update translation strings
-
rhnlib:
-
Version 4.3.5-1
-
Don’t get stuck at the end of SSL transfers (bsc#1204032)
-
saltboot-formula:
-
Update to version 0.1.1673279145.e7616bd
-
Add failsafe stop file when salt-minion does not stop (bsc#1172110)
-
Add use case of saltboot group formula outside containerized env (bsc#1206186)
-
Add 'kernel_action' to saltboot form (bsc#1206055)
-
spacecmd:
-
Version 4.3.18-1
-
Add python-dateutil dependency, required to process date values in spacecmd api calls
-
-
Version 4.3.17-1
-
Remove python3-simplejson dependency
-
Correctly understand 'ssm' keyword on scap scheduling
-
Add vendor_advisory information to errata_details call (bsc#1205207)
-
Added two missing options to schedule product migration: allow-vendor-change and remove-products-without-successor (bsc#1204126)
-
Changed schedule product migration to use the correct API method
-
Change default port of "Containerized Proxy configuration" 8022
-
spacewalk-backend:
-
Version 4.3.18-1
-
Add 'octet-stream' to accepted content-types for reposync mirrorlists
-
Exclude invalid mirror urls for reposync (bsc#1203826)
-
Compute headers as list of two-tuples to be used by url grabber (bsc#1205523)
-
Updated logrotate configuration (bsc#1206470)
-
Add rhel_9 as Salt-enabled kickstart installation
-
do not fetch mirrorlist when a file url is given
-
spacewalk-certs-tools:
-
Version 4.3.17-1
-
Backport SLE Micro bootstrap fixes
-
spacewalk-client-tools:
-
Version 4.3.14-1
-
Update translation strings
-
spacewalk-java:
-
Version 4.3.45-1
-
Improve logs when sls action chain file is missing
-
-
Version 4.3.44-1
-
Add reboot needed indicator to systems list
-
Fix transaction commit behavior for Spark routes
-
Fix modular channel check during system update via XMLRPC (bsc#1206613)
-
Fix CVE Audit ignoring errata in parent channels if patch in successor product exists (bsc#1206168)
-
Fix CVE Audit incorrectly displaying predecessor product (bsc#1205663)
-
Improve automatic dependency selection for vendor clones
-
Optimize the number of salt calls on minion startup (bsc#1203532)
-
Fix name for autoinstall snippets after Cobbler 3.3.3
-
prevent ISE on activation key page when selected base channel value is null
-
Trigger a package profile update when a new live-patch is installed (bsc#1206249)
-
Fix HTTP API login status code when using wrong credentials (bsc#1206666)
-
Configure the reboot action for transactional systems appropriately
-
Fix link to documentation in monitoring page
-
Fix server error in product migration outside maintenance window (bsc#1206276)
-
Updated logrotate configuration (bsc#1206470)
-
Only remove product catalog if PAYG ssh credentials are defined (bsc#1205943)
-
Source Select2 and jQuery UI from susemanager-frontend-libs
-
Don’t use hash in apidoc links
-
Limit changelog data in generated metadata to 20 entries
-
Fix internal server error when transferring system between organizations
-
Fix products controller to keep loading mandatory channels even when there are broken channels (bsc#1204270)
-
Move web dependencies from susemanager-frontend-libs to spacewalk-web
-
Fix server error while bootstrapping SSH-managed Red Hat-like minion (bsc#1205890)
-
send notifications also as email if email notifications are enabled
-
Add subscription warning notification to overview page
-
Fix CLM to not remove necessary packages when filtering erratas (bsc#1195979)
-
Add vendor_advisory to errata.getDetails (bsc#1205207)
-
Fix ClassCastException
-
disable cloned vendor channel auto selection by default (bsc#1204186)
-
Add SUSE Liberty Linux support for RHEL9 based clients
-
Removed contents of certificates from the web UI logs (bsc#1204715)
-
Fix kickstart for RHEL 9 to not add install command
-
Remove RHEL kickstart types below 6
-
Don’t persist the YAML parser in FormulaFactory (bsc#1205754)
-
format results for package, errata and image build actions in system history similar to state apply results
-
check for NULL in DEB package install size value
-
adapt permissions of temporary ssh key directory
-
Fixed traditional stack warning message to be displayed only when the system has enterprise entitlement (bsc#1205350)
-
Remove invalid errata selection after patch installation (bsc#1204235)
-
Ignore insert conflicts during reporting database update (bsc#1202150)
-
Allowed cancelling pending actions with a failed prerequisite (bsc#1204712)
-
Run only minion actions that are in the pending status (bsc#1205012)
-
Allow usage of one FQDN to deploy containerized proxy in VM (#19586)
-
Migrate formulas with default values to database (bsc#1204932)
-
spacewalk-search:
-
Version 4.3.8-1
-
Updated logrotate configuration (bsc#1206470)
-
fix logging configuration of the search daemon (bsc#1206336)
-
spacewalk-utils:
-
Version 4.3.16-1
-
spacewalk-hostname-rename changes also report db host(bsc#1200801)
-
Add Uyuni SLE-Micro Client Tools repositories
-
spacewalk-web:
-
Version 4.3.27-1
-
Add reboot needed indicator to systems list
-
Fix salt keys page keeps loading when no key exists (bsc#1206799)
-
Fix link to documentation in monitoring page
-
Source Select2 and jQuery UI from susemanager-frontend-libs
-
fix frontend logging in react pages
-
Move web dependencies from susemanager-frontend-libs to spacewalk-web
-
supportutils-plugin-susemanager:
-
Version 4.3.6-1
-
update susemanager plugin to export the number of pending salt events
-
susemanager:
-
Version 4.3.23-1
-
fix bootstrap repo definition for SUSE Liberty Linux 9 and RHEL9 (bsc#1207136)
-
-
Version 4.3.22-1
-
fix tools channel detection on Uyuni
-
susemanager-build-keys:
-
Version 15.4.7:
-
add SUSE Liberty v2 key
-
susemanager-docs_en:
-
Remove SUSE Linux Enterprise Micro requirement to preinstall salt-transactional package
-
Organized navigation bar in the Installation and Upgrade Guide
-
Fixed SUSE Linux Enterprise Micro channel names in the Client Configuration Guide
-
Added SUSE Liberty Linux 9 clients as supported and now use the SUSE Liberty Linux name more consistently
-
Containerized proxy now allows usage of single FQDN. Documented in the Installation and Upgrade Guide
-
Added information about GPG key usuage in the Debian section of the Client Configuration Guide
-
Clarified monitoring components support matrix in the Client Configuration Guide
-
Added information on using Hub when managing greater than 10K clients to the Hardware Requirements in the Installation and Upgrade Guide
-
Improved Grafana configuration instructions in the Administration Guide
-
Limit the changelog data in generated metadata in Administration Guide. The default number of entries is now 20 and it is consistent with the number of entries from SUSE Linux Enterprise
-
Warning to emphasize about storage requirements before migration in the Installation and Upgrade Guide
susemanager-schema:
-
Version 4.3.16-1
-
Remove legacy cluster_admin user group
-
add subscription warning info pane
-
Remove data related to RHEL below 6
-
Increase cron_expr varchar length to 120 in suseRecurringAction table (bsc#1205040)
-
susemanager-sls:
-
Version 4.3.29-1
-
Improve _mgractionchains.conf logs
-
Prevent possible errors from "mgractionschains" module when there is no action chain to resume
-
-
Version 4.3.28-1
-
Move transactional_update.conf to correct location
-
-
Version 4.3.27-1
-
Do not include pillar_only formulas in highstate
-
Optimize the number of salt calls on minion startup (bsc#1203532)
-
install SUSE Liberty v2 GPG key
-
Bootstrap state now writes salt config in correct overlay on SLE Micro (bsc#1206294)
-
Fix reboot info beacon installation
-
Add state to properly configure the reboot action for transactional systems
-
Updated logrotate configuration (bsc#1206470)
-
Fix server error while bootstrapping SSH-managed Red Hat-like minion (bsc#1205890)
-
Avoid installing recommended packages from assigned products (bsc#1204330) with suma_minion salt pillar extension module (bsc#1205255)
-
susemanager-sync-data:
-
Version 4.3.12-1
-
change OES 2023 URL to https and make the tools channels mandatory (bsc#1205644)
-
remove version from product names as they are held separate
-
susemanager-tftpsync:
-
Version 4.3.3-1
-
Introduce threadpool for tftpsync to increase performance while syncing files to proxies (bsc#1205489)
-
uyuni-common-libs:
-
Version 4.3.7-1
-
unify user notification code on java side
-
uyuni-setup-reportdb:
-
Version 4.3.6-1
-
Fix password generation in uyuni-setup-reportdb (bsc#1205919)
-
virtual-host-gatherer:
-
Version 1.0.24-1
-
Report total memory of a libvirt hypervisor
-
Improve interoperability with other Python projects
-
Version 4.3.3
grafana-formula:
-
Version 0.7.1
-
Fix default password field description (bsc#1203698)
-
Do not require default admin and password fields
-
hub-xmlrpc-api:
-
Use golang(API) = 1.18 for building on SUSE (bsc#1203599) This source fails to build with the current go1.19 on SUSE and we need to use go1.18 instead.
inter-server-sync:
-
Version 0.2.5
-
Correct error when importing without debug log level (bsc#1204699)
-
-
Version 0.2.4
-
Improve memory usage and log information #17193
-
Conditional insert check for FK reference exists (bsc#1202785)
-
Correct navigation path for table rhnerratafilechannel (bsc#1202785)
-
prometheus-formula:
-
Version 0.7.0
-
Switch from basic authentication to TLS certificate client authentication for Blackbox exporter
-
Fix scheme label in clients targets configration
-
Add README.md
-
python-urlgrabber:
-
Incorporate latest changes for the fix of wrong logic on find_proxy method causing proxy not being used (bsc#1201788)
smdba:
-
Version 1.7.11
-
Fix config update from wal_keep_segments to wal_keep_size for newer postgresql versions (bsc#1204519)
-
spacecmd:
-
Version 4.3.16-1
-
Fix dict_keys not supporting indexing in systems_setconfigchannelorger
-
Improve Proxy FQDN hint message
-
Added a warning message for traditional stack deprecation
-
Stop always showing help for valid proxy_container_config calls
-
Remove "Undefined return code" from debug messages (bsc#1203283)
-
spacewalk-backend:
-
Version 4.3.17-1
-
Require python3-debian version which supports new compression methods to sync ubuntu22-04 repositories (bsc#1205212)
-
Used the legacy reporting system in spacewalk-debug to obtain up-to-date information
-
Keep older module metadata files in database (bsc#1201893)
-
Added an optional component_type property to the LOG object and included it to a log message
-
Add an optional component property to the log messages
-
spacewalk-certs-tools:
-
Version 4.3.16-1
-
Generated bootstrap scripts installs all needed Salt 3004 dependencies for Ubuntu 18.04 (bsc#1204517)
-
add transactional system support to the bootstrap generator
-
change bootstrap script generator to detect SLE Micro
-
spacewalk-client-tools:
-
Version 4.3.13-1
-
Update translation strings
-
spacewalk-java:
-
Version 4.3.43-1
-
Changed proxy settings retrieval to not include password (bsc#1205339)
-
-
Version 4.3.42-1
-
Update jackson-databind version
-
-
Version 4.3.41-1
-
Manage reboot in transactional update action chain (bsc#1201476)
-
Enable monitoring for RHEL 9 Salt clients
-
Optimize performance of config channels operations for UI and API (bsc#1204029)
-
Don’t add the same channel twice in the System config addChannel API (bsc#1204029)
-
Optimize action chain processing on job return event (bsc#1203532)
-
Re-calculate salt event queue numbers on restart
-
Improved reboot needed handling for SLE Micro
-
Check if system has all formulas correctly assigned (bsc#1201607)
-
Remove group formula assignements and data on group delete (bsc#1201606)
-
Process salt events in FIFO order (bsc#1203532)
-
Remove 'SSM' column text where not applicable (bsc#1203588)
-
Fix rendering of ssm/MigrateSystems page (bsc#1204651)
-
Pass mgr_sudo_user pillar on salt ssh client cleanup (bsc#1202093)
-
Upgrade Bootstrap to 3.4.1
-
Refresh pillar data for the assigned systems when a CLM channel is built (bsc#1200169)
-
Improve Amazon EC2/Nitro detection (bsc#1203685)
-
Add channel availability check for product migration (bsc#1200296)
-
Deny packages from older module metadata when building CLM projects (bsc#1201893)
-
fix xmlrpc call randomly failing with translation error (bsc#1203633)
-
Do not explicitely remove old pillars on minion rename (bsc#1203451)
-
Fix out of memory error when building a CLM project (bsc#1202217)
-
Added a warning message for traditional stack deprecation
-
Fix hardware update where there is no DNS FQDN changes (bsc#1203611)
-
spacewalk-utils:
-
Version 4.3.15-1
-
Add EL9 Client Tools for SUSE Liberty Linux
-
spacewalk-web:
-
Version 4.3.26-1
-
Prevent proxy data from being logged (bsc#1205339)
-
-
Version 4.3.25-1
-
Fix checkbox and radio input misalignment
-
Upgrade Bootstrap to 3.4.1
-
Update translation strings
-
supportutils-plugin-susemanager:
-
Version 4.3.5-1
-
Added dependency for XML Simple
-
susemanager:
-
Version 4.3.20-1
-
add bootstrap repository definitions for SLE-Micro 5.2 and 5.3
-
add bootstrap repo definitions for oracle, alma and rocky linux 9
-
add bootstrap repo data for SUSE Liberty Linux 9
-
add python3-extras to bootstrap repo as dependency of python3-libxml2 (bsc#1204437)
-
susemanager-build-keys:
-
Version 15.4.6:
-
rename and update old SUSE PTF key + Removed: gpg-pubkey-b37b98a9-5aaa951b.asc + Added: suse_ptf_key_old-B37B98A9.asc
-
add new SUSE PTF Key + Added: suse_ptf_key-6F5DA62B.asc
-
-
Version 15.4.5:
-
Add rpmlintrc configuration, so "W: backup-file-in-package" for the keyring is ignored. We do not ship backup files, but we own them because they are created each time gpg is called, and we want them removed if the package is removed
-
-
uyuni-build-keys.rpmlintrc
-
Version 15.4.4:
-
Add key for SUSE product addons (required for SUSE Manager EL9 client tools)
-
susemanager-docs_en:
-
Fixed Rocky Linux documentation in Client Configuration Guide. Rocky Linux 8 was partially removed by accident (bsc#1205470)
-
Added explanation of automatic custom channels synchronization to the Administration Guide
-
Added Almalinux 9, Oracle Linux 9, and Rocky Linux 9 as supported Client systems
-
Added Rocky Linux 9 in Client Configuration Guide
-
Added note about shell quotation in Mass Migration section of Client Configuration Guide.
-
Added information about OES repository enablement to Troubleshooting section in the Administration Guide (bsc#1204195)
-
Documented the mgr-bootstrap command in Client Configuration Guide
susemanager-schema:
-
Version 4.3.15-1
-
added kickstart distribution data for RHEL 9
-
Fix previous 'Amazon EC2' schema upgrade script to prevent possible issues on schema upgrade.
-
Change 'Amazon EC2/KVM' to 'Amazon EC2/Nitro' (bsc#1203685)
-
Keep older module metadata files in database (bsc#1201893)
-
Fix setting of last modified date in channel clone procedure
-
susemanager-sls:
-
Version 4.3.26-1
-
Manager reboot in transactional update action chain (bsc#1201476)
-
Detect bootstrap repository path for SLE Micro
-
Fix kiwi inspect regexp to allow image names with "-" (bsc#1204541)
-
Add beacon to check if a reboot is required in transactional systems
-
Use the actual sudo user home directory for salt ssh clients on bootstrap and clean up (bsc#1202093)
-
dnf repo definition does not support multiline gpgkeys (bsc#1204444)
-
remove forced refresh in channel state as gpg key trust is now handled in a different way (bsc#1204061)
-
import gpg keys directly to prevent using gpg-auto-import-keys on package operations (bsc#1203580)
-
Perform refresh with packages.pkgupdate state (bsc#1203884)
-
Prevent possible tracebacks on reading postgres opts with suma_minion salt pillar extension module
-
susemanager-sync-data:
-
version 4.3.11-1
-
change "EL 9 Base" to "RHEL and Liberty 9 Base"
-
-
Version 4.3.10-1
-
add SLES15 SP3 LTSS
-
add sll 9, oraclelinux 9, almalinux 9 and rockylinux 9
-
release oes2023 products
-
Version 4.3.2
cobbler:
-
Consider case of "next_server" being a hostname during migration of Cobbler collections.
-
Fix problem with "proxy_url_ext" setting being None type.
-
Fix settings migration schema to work while upgrading on existing running Uyuni and SUSE Manager servers running with old Cobbler settings (bsc#1203478)
-
Do generate boot menus even if no profiles or systems - only local boot
-
Avoid crashing running buildiso in certain conditions.
-
Fix issue that a custom kernel with the extension ".kernel" is not accepted by "cobbler distro add"
-
Fix issue with "get_item_resolved_value" that prevented it from returning in cases where a complex object would have been returned
-
Fix issue where the logs would have been spammed with "grab_tree" messages that are meant for debugging
-
Buildiso - Fix DNS append line generation
-
Change apache2 conf dir for SUSE distros to allow integration with Uyuni and SUSE Manager
-
Avoid permissions errors during cobbler sync
-
Update to version 3.3.3
-
Add UEFI capabilities to "cobbler buildiso" (jsc#SUMA-112)
-
Relevant changes on this release:
-
New:
-
Uyuni Proxies can now be set with the schema validation.
-
Cobbler should now build on AlmaLinux.
-
The initrd is not required anymore as it is an optional file.
-
XML-RPC: Added dump_vars endpoint. This is intended to replace get_blended_data as of 3.4.0.
-
XML-RPC: Added get_item_resolved_value & set_item_resolved_value endpoints.
-
Breaking Changes:
-
The field virt_file_size is now a float and the related settings as well.
-
Changes:
-
The error messages for duplicated objects now contains the name of the duplicated object.
-
Bugfixes:
-
Dictionaries had the wrong value set for [inherit].
-
There were some cases in which the autoinstallation manager was handed the wrong object and then crashed.
-
The inheritance of the owners field was fixed.
-
Serial Console options should not contain bogous -1 value anymore.
-
HTTP API should not throw permission errors anymore.
-
During build the log was not visible due to a custom logger without output.
-
cobbler mkloaders now also copies dependencies of menu.c32.
-
We now generate the grub configuration for the architectures correct again.
-
virt_file_size now is a float at all times.
-
Cobbler should restart successfully now if you have attached an image to a system.
-
If you have a system named default the bootloader was not removed properly before.
-
cobbler buildiso: The isolinux.cfg was not properly formatted.
-
There were unharmful templating errors in the log related to redhat_management_type. The parts depending on this were removed.
-
The DNS managers were non-functional before because of a not existing function call.
-
cobbler buildiso failed with --tmpdirs that don’t end in buildiso.
-
cobbler buildiso had outdated docs and help messages for some parameters.
-
cobbler import: It was impossible to import Rocky Linux 8.5 successfully.
-
Cobbler created duplicated settings files before.
-
cobbler sync was broken by refactoring to shell=False before.
-
-
CVE-2022-0860: Improper Authorization in Cobbler. (bsc#1197027)
-
Version 3.3.0 fixed jsc#SUMA-112
-
Update to version 3.3.2
-
cobbler sync doesn’t have to be executed no more after enable_ipxe was flipped
-
Auth: Support for Global Secure Catalog via LDAP provider
-
Reposync now deletes old metadata to prevent metadata merge conflicts
-
The automigration of the settings is now not enabled per default.
-
We removed ppc from RedHat EL 7 as it is not supported
-
Network interface is not subscriptable errors were fixed
-
The stacktraces related to the package and file pre & post triggers should no longer appear
-
You should be able to add multiple initrds if needed again
-
Debian: Fix regex for SHIM_FILE which now provides a working reasonable default
-
drools:
-
CVE-2021-41411: XML External Entity injection in KieModuleModelImpl.java (bsc#1200629)
image-sync-formula:
-
Update to version 0.1.1661440542.6cbe0da
-
Sort boot images by version instead of name-version (bsc#1196729)
-
Do not send events if syncing fails
-
inter-server-sync:
-
Compress exported sql data and decompress during import
-
Add gzip dependency to decompress data file during import process
locale-formula:
-
Update to version 0.3
-
Remove .map.gz from kb_map dictionary (bsc#1203406)
-
python-urlgrabber:
-
Avoid crashing when setting URLGRABBER_DEBUG=1 environment variable
reprepro:
-
Update from version 5.3.0 to version 5.4.0
-
Add shunit2 based tests
-
Support multiple versions
-
Add the commands move, movesrc, movematched, movefilter
-
Add Limit and Archive option
-
fix manpage to add the behaviour if reprepro is linked against liblzma
-
Mark 'dumpcontents' command as deprecated
-
saltboot-formula:
-
Update to version 0.1.1661440542.6cbe0da
-
Fallback to local boot if the configured image is not synced
-
Support salt bundle
-
spacecmd:
-
Version 4.3.15-1
-
Process date values in spacecmd api calls (bsc#1198903)
-
spacewalk-admin:
-
Version 4.3.10-1
-
Ensure "cobbler mkloaders" is executed after restarting services
-
Add --help option to mgr-monitoring-ctl
-
reportdb access: force new report_db_sslrootcert if previous default is set
-
spacewalk-backend:
-
Version 4.3.16-1
-
Prevent mixing credentials for proxy and repository server while using basic authentication and avoid hiding errors i.e. timeouts while having proxy settings issues with extra logging in verbose mode (bsc#1201788)
-
Fix the condition of hiding the token from URL on logging
-
export armored GPG key to salt filesystem as well
-
Upgrade Cobbler requirement to 3.3.3 or later
-
Make reposync use the configured http proxy with mirrorlist (bsc#1198168)
-
spacewalk-certs-tools:
-
Version 4.3.15-1
-
fix mgr-ssl-cert-setup for root CAs which do not set authorityKeyIdentifier (bsc#1203585)
-
spacewalk-client-tools:
-
Version 4.3.12-1
-
Update translation strings
-
spacewalk-java:
-
version 4.3.38-1
-
delay hardware refresh action to avoid missing channels (bsc#1204208)
-
-
Version 4.3.37-1
-
Fix get_item_resolved_value call
-
-
Version 4.3.36-1
-
Fix prerequisite action serialization (bsc#1202899, bsc#1203484)
-
Fix hardware update where there is no DNS FQDN changes (bsc#1203611)
-
Fix UI crash when filtering on systems list (bsc#1203169)
-
Filter out successors that have no repositories on SP migration (bsc#1202367)
-
Reduced the usage of deprecated Hibernate API
-
Use mgrnet.dns_fqdns module to improve FQDN detection (bsc#1199726)
-
Support Pay-as-you-go new CA location for SUSE Linux Enterprise Server 15 SP4 and higher (bsc#1202729)
-
Fixed pagination for completed/failed systems in action details
-
Add support in rhn.conf for smtp port, auth, ssl/tls config
-
Calculate dependencies between cloned channels of vendor channels (bsc#1201626)
-
Fix sync for external repositories (bsc#1201753)
-
Detect the clients running on Amazon EC2 (bsc#1195624)
-
Adjust cobbler requirement to version 3.3.3
-
Support inherited values for kernel options from Cobbler API
-
Fix virtFileSize type after cobbler upgrade
-
Redefine available power_management.types for cobbler >= 3.3.1
-
fix state.apply result parsing in test mode (bsc#1201913)
-
require tomcat native interface to prevent misleading warning in tomcat startup log (bsc#1202455)
-
Reduce the length of image channel URL (bsc#1201220)
-
Fixed formula deselection in systemgroup (bsc#1202271)
-
Added a new configuration property to allow custom channels to be synced together with vendor channels.
-
add onlyRelevant argument to addErrataUpdate API
-
fix taskomatic task remain in progress
-
spacewalk-search:
-
Version 4.3.7-1
-
update dependencies after package rename
-
spacewalk-setup:
-
version 4.3.12-1
-
Fix detected issues to perform migration of Cobbler settings and collections.
-
-
Version 4.3.11-1
-
Trigger migration of Cobbler settings and collections if necessary during package installation (bsc#1203478)
-
Execute "cobbler mkloaders" when setting up cobbler
-
Adjust next_server cobbler settings for cobbler >= 3.3.1
-
fix prototype missmatch in idn_to_ascii (bsc#1203385)
-
spacewalk-utils:
-
Version 4.3.14-1
-
Make spacewalk-hostname-rename working with settings.yaml cobbler config file (bsc#1203564)
-
spacewalk-common-channels now syncs the channels automatically on creation, if the new configuration property named 'unify_custom_channel_management' is enabled
-
spacewalk-web:
-
Version 4.3.24-1
-
Upgrade moment-timezone
-
CVE-2021-43138: Obtain privileges via the
mapValues()
method. (bsc#1200480) -
CVE-2021-42740: Command injection in the shell-quote package. (bsc#1203287)
-
CVE-2022-31129: Denial-of-Service moment: inefficient parsing algorithm (bsc#1203288)
-
Fix table header layout for unselectable tables
-
subscription-matcher:
-
Added Guava maximum version requirement
susemanager:
-
Version 4.3.19-1
-
mark new dependencies for python-py optional in bootstrap repo to fix generation for older service packs (bsc#1203449)
-
add bootstrap repository definition for OES2023 (bsc#1202602)
-
add missing packages on SUSE Linux Enterprise Server 15
-
remove server-migrator.sh from SUSE Manager installations (bsc#1202728)
-
create bootstrap repository data for Ubuntu 22.04 Vendor Channels
-
remove obsoleted sysv init script (bsc#1191857)
-
mgr-create-bootstrap-repo: flush directory also when called for a specific label (bsc#1200573)
-
pg-migrate-x-to-y.sh: improve output (bsc#1201260)
-
remove python-tornado from bootstrap repo, since no longer required for salt version >= 3000
-
add missing packages on SUSE Linux Enterprise Server 12 SP5 bootstrap repo (bsc#1201918)
-
revert "bootstrap repo: set optional packages"
-
susemanager-build-keys:
-
Add release and auxiliary GPG keys for RedHat
-
Add keys for Rocky Linux 9
-
RPM-GPG-KEY-redhat-release
-
RPM-GPG-KEY-redhat-auxiliary
-
RPM-GPG-KEY-Rocky-9
-
susemanager-docs_en:
-
Removed Debian 9 references due to end of life and added missing Debian 11 info
-
Fixed description of default notification settings (bsc#1203422)
-
Added missing Debian 11 references
-
Documented helm deployment of the proxy on k3s and MetalLB in Installation and Upgrade Guide
-
Added secure mail communication settings in Administration Guide
-
Fixed path to state and pillar files
-
Documented how pxeboot works with Secure Boot enabled in Client Configuration Guide
-
Add repository via proxy issues troubleshooting page
-
Change import GPG key description
-
Added SLE Micro 5.2 and 5.3 as available as a technology preview in Client Configuration Guide, and the IBM Z architecture for 5.1, 5.2, and 5.3
-
Added command to remove the obsolete Python module on SUSE Manager Server 4.1 in the Installation and Upgrade Guide (bsc#1203026)
-
Mention CA certificate directory in the proxy setup description in the Installation and Upgrade Guide (bsc#1202805)
-
Documented mandatory channels in the Disconnected Setup chapter of the Administration Guide (bsc#1202464)
-
Documented how to onboard Ubuntu clients with the Salt bundle as a regular user
-
Documented how to onboard Debian clients with the Salt bundle or plain Salt as a regular user
-
Fixed the names of updates channels for Leap
-
Fixed errors in OpenSCAP chapter of Administration Guide
-
Removed CentOS 8 from the list of supported client systems
-
Extend the notes about using noexec option for /tmp and /var/tmp (bsc#1201210)
-
Added Extend Salt Bundle functionality with Python packages using pip
-
Salt Configuration Modules are no longer Technology Preview in the Salt Guide
susemanager-schema:
-
Version 4.3.14-1
-
Add subtypes for Amazon EC2 virtual instances (bsc#1195624)
-
Fix migration of image actions (bsc#1202272)
-
improve schema compatibility with Amazon RDS
-
susemanager-sls:
-
Version 4.3.25-1
-
Fix mgrnet availability check
-
Remove dependence on Kiwi libraries
-
disable always the bootstrap repository also when "mgr_disable_local_repos" is set to False
-
Use mgrnet.dns_fqdns module to improve FQDN detection (bsc#1199726)
-
fix syntax error - remove trailing colon (bsc#1203049)
-
Add mgrnet salt module with mgrnet.dns_fqnd function implementation allowing to get all possible FQDNs from DNS (bsc#1199726)
-
Copy grains file with util.mgr_switch_to_venv_minion state apply (bsc#1203056)
-
Remove the message 'rpm: command not found' on using Salt SSH with Debian based systems which has no Salt Bundle
-
susemanager-sync-data:
-
Version 4.3.9-1
-
add oes2023 (bsc#1202602)
-
add Ubuntu 22.04 amd64
-
susemanager-tftpsync:
-
Version 4.3.2-1
-
Adjust sync_post_tftpd_proxies module to cobbler >= 3.3.1
-
uyuni-common-libs:
-
Version 4.3.6-1
-
Do not allow creating path if nonexistent user or group in fileutils.
-
uyuni-reportdb-schema:
-
Version 4.3.6-1
-
improve schema compatibility with Amazon RDS
-
Version 4.3.1
apache-commons-csv:
-
Fix the URL for the package
-
Declare the LICENSE file as license and not doc
apache-commons-math3:
-
Fix the URL for the package
-
Declare the LICENSE file as license and not doc
drools:
-
Declare the LICENSE file as license and not doc
image-sync-formula:
-
Update to version 0.1.1658330139.861779d
-
Fix deleting of unused boot images
-
Support deltas for system images (bsc#1201498)
-
Do not try to show changes in images (bsc#1199998)
-
inter-server-sync:
-
Version 0.2.3
-
Compress exported sql data #16631
-
jakarta-commons-validator:
-
Declare the LICENSE file as license and not doc
jose4j:
-
Declare the LICENSE file as license and not doc
kie-api:
-
Declare the LICENSE file as license and not doc
mvel2:
-
Declare the LICENSE file as license and not doc
optaplanner:
-
Declare the LICENSE file as license and not doc
python-susemanager-retail:
-
Update to version 0.1.1658330139.861779d
-
Support deltas for system images (bsc#1201498)
-
Fix error message on incorrect --log-level arg (bsc#1199727)
-
python-urlgrabber:
-
Fix wrong logic on find_proxy method causing proxy not being used
reprepro:
-
Bump up the maxsize on a fixed-size C buffer to avoid breaking on some autogenerated rust packages
-
Flush stdout and stderr before execv of an end hook
-
Add support for Zstd compressed debs
-
Added alternative package name for db4-devel.
salt-netapi-client:
-
Declare the LICENSE file as license and not doc
smdba:
-
Declare the LICENSE file as license and not doc
spacecmd:
-
Version 4.3.14-1
-
Fix missing argument on system_listmigrationtargets (bsc#1201003)
-
Show correct help on calling kickstart_importjson with no arguments
-
Fix tracebacks on spacecmd kickstart_export (bsc#1200591)
-
Change proxy container config default filename to end with tar.gz
-
spacewalk:
-
Version 4.3.5-1
-
Simplified PostgreSQL14 requirement.
-
Update server-migrator to dist-upgrade to openSUSE 15.4
-
spacewalk-backend:
-
Version 4.3.15-1
-
cleanup leftovers from removing unused xmlrpc endpoint
-
Fix issues with "http proxy" not being used by reposync in some cases
-
spacewalk-certs-tools:
-
Version 4.3.14-1
-
traditional stack bootstrap: install product packages (bsc#1201142)
-
display messages to restart services after certificate change
-
improve CA Chain checking by comparing authorityKeyIdentifier with subjectKeyIdentifier
-
spacewalk-client-tools:
-
Version 4.3.11-1
-
Update translation strings
-
spacewalk-config:
-
Version 4.3.9-1
-
fix posttrans error "RHN-ORG-TRUSTED-SSL-CERT" not found
-
spacewalk-java:
-
Version 4.3.35-1
-
Modify parameter type when communicating with the search server (bsc#1187028)
-
Fix hibernate error on deleting an image with delta
-
Changed logout method to POST on HTTP API (bsc#1199663)
-
Turned API information endpoints public (bsc#1199817)
-
Fix typo and ordering of JSON over HTTP API example scripts
-
Improved log handling in HTTP API (bsc#1199662)
-
set Channel GPG Key info from SCC data
-
set GPG Key Url as channel pillar data (bsc#1199984)
-
new API endpoint for addErrataUpdate, that take multiple servers as argument
-
Move ImageSync pillars to database (bsc#1199157)
-
Fix conflict when system is assigned to multiple instances of the same formula (bsc#1194394)
-
Fix initial profile and build host on Image Build page (bsc#1199659)
-
Convert formula integer values when upgrading (bsc#1200347)
-
Cleanup salt known_hosts when generating proxy containers config
-
Modify proxy containers configuration files set output
-
Change proxy containers config to tarball with yaml files
-
Fixed date format on scheduler related messages (bsc#1195455)
-
Improved dropdown layout handling
-
Fix download CSV
-
Hide authentication data in PAYG UI (bsc#1199679)
-
Clean grub2 reinstall entry in autoyast snippet (bsc#1199950)
-
Show reboot alert message on all system detail pages (bsc#1199779)
-
Show patch as installed in CVE Audit even if successor patch affects additional packages (bsc#1199646)
-
Fix refresh action confirmation message when no system is selected
-
Fix Intenal Server Error when URI contains invalid sysid (bsc#1186011)
-
Fix notification message on system properties update to ensure style consistency (bsc#1172179)
-
Fix containerized proxy configuration machine name
-
Improve CLM channel cloning performance (bsc#1199523)
-
Keep the websocket connections alive with ping/pong frames (bsc#1199874)
-
add detection of Ubuntu 22.04
-
fix missing remote command history events for big output (bsc#1199656)
-
fix api log message references the wrong user (bsc#1179962)
-
Consistently use conf value for SPA engine timeout
-
fix download of packages with caret sign in the version due to missing url decode
-
Add specific requirement for Cobbler 3.2.1 to not conflict with Leap 15.4
-
Fix send login(s) and send password actions to avoid user enumeration (bsc#1199629) (CVE-2022-31248)
-
spacewalk-search:
-
Version 4.3.6-1
-
Add method to handle session id as String
-
Migrated from log4j1.x.x to log4j2.x.x
-
update ivy development files
-
spacewalk-setup:
-
Version 4.3.10-1
-
spacewalk-setup-cobbler assumes /etc/apache2/conf.d now as a default instead of /etc/httpd/conf.d (bsc#1198356)
-
Allow alternative usage of perl-Net-LibIDN2.
-
spacewalk-utils:
-
Version 4.3.13-1
-
change gpg key urls to file urls where possible
-
spacewalk-hostname-rename now correctly replaces the hostname for the mgr-sync configuration file (bsc#1198356)
-
spacewalk-hostname-rename now utilizes the "--apache2-conf-dir" flag for spacewalk-setup-cobbler
-
Add repositories for Ubuntu 22.04 LTS
-
Add AlmaLinux 9 and Oracle Linux 9 to spacewalk-common-channels
-
Add missing SLES 15 SP4 client tools repositories to spacewalk-common-channels.ini
-
add deprecation warning for spacewalk-clone-by-date
-
Add EPEL8 for Almalinux 8 and Rocky 8 in spacewalk-common-channels.ini
-
openSUSE Leap 15.4 repositories
-
spacewalk-web:
-
Version 4.3.23-1
-
Update the version for the WebUI
-
Fix initial profile and build host on Image Build page (bsc#1199659)
-
Handle multi line error messages in proxy containers config creation
-
Hide authentication data in PAYG UI (bsc#1199679)
-
add textarea to formulas
-
Consistently use conf value for SPA engine timeout
-
Remove nodejs-packaging as a build requirement
-
Update translation strings
-
subscription-matcher:
-
Declare the LICENSE file as license and not doc
susemanager:
-
Version 4.3.18-1
-
Add missing python3-gnupg to Debian10 bootstrap repo (bsc#1201842)
-
Add clients tool product to generate bootstrap repo on OpenSUSE 15.x (bsc#1201189)
-
Add Oracle Linux 9 bootstrap repositories for Uyuni
-
Add AlmaLinux 9 bootstrap repositories for Uyuni
-
Add Red Hat Enterprise Linux 9 repositories for Uyuni
-
Make the Salt Bundle optional for bootstrap repositories for Debian 9 and SUSE Manager Proxy 4.2
-
Enable bootstrapping for Ubuntu 22.04 LTS
-
fix pg-migrate-x-to-y.sh comment: migration without creating backup use -f option
-
bootstrap repo: set optional packages
-
Add python3-contextvars and python3-immutables to missing bootstrap repos (bsc#1200606)
-
Update server-migrator to dist-upgrade to openSUSE 15.4
-
susemanager-build-keys:
-
Version 15.4.3
-
Add Uyuni Client Tools key
-
Install keys for Client Tools Channels in salt filesystem to be able to deploy them to clients
-
Add openEuler 22.03 key
-
Add AlmaLinux 9 key
-
Add Oracle Linux 9 keys
-
RPM-GPG-KEY-openEuler
-
RPM-GPG-KEY-AlmaLinux-9
-
RPM-GPG-KEY-oracle
-
RPM-GPG-KEY-oracle-backup
-
susemanager-docs_en:
-
Described disabling local repositories in Client Configuration Guide
-
Remove misleading installation screen shots in the Installation and Upgrade Guide (bsc#1201411)
-
Fixed Ubuntu 18 Client registration in Client Configuration Guide (bsc#1201224)
-
Removed sle-module-pythonX in VM Installation chapter of Installation and Upgrade Guide because SUSE Manager 4.3 does not require it
-
In the Custom Channel section of the Administration Guide add a note about synchronizing repositories regularly
-
Removed SUSE Linux Enterprise 11 from the list of supported client systems
-
Update section about changing SSL certificates
-
Added ports 1232 and 1233 in the Ports section of the Installation and Upgrade Guide; required for Salt SSH Push (bsc#1200532)
-
Fixed 'fast' switch ('-f') of the database migration script in Installation and Upgrade Guide
-
Updated Virtualization chapter in Client Configuration Guide; more on limitation other than Xen and KVM
-
Added information about registering RHEL clients on Azure in the Import Entitlements and Certificates section of the Client Configuration Guide (bsc#1198944)
-
Fixed VisibleIf documentation in Formula section of the Salt Guide
-
Added note about importing CA certifcate in Installation and Upgrade Guide (bsc#1198358)
-
Documented defining monitored targets using file-based service discovery provided in the Prometheus formula in the Salt Guide
-
In Supported Clients and Features chapter in Client Configuration Guide, remove SUSE Linux Enterprise 11 (bsc#1199147)
-
Improve traditional client deprecation statement in Client Configuration Guide (bsc#1199714)
susemanager-schema:
-
Version 4.3.13-1
-
update GPG key urls in channels set by spacewalk-common-channels
-
add gpg key info to suseProductSCCRepository (bsc#1199984)
-
Move ImageSync pillars to database (bsc#1199157)
-
susemanager-sls:
-
Version 4.3.24-1
-
Fix issue bootstrap issue with Debian 9 because missing python3-contextvars (bsc#1201782)
-
Fix deploy of SLE Micro CA Certificate (bsc#1200276)
-
disable local repos before bootstrap and at highstate (bsc#1191925)
-
deploy GPG keys to the clients and define trust in channels (bsc#1199984)
-
Enable basic support for Ubuntu 22.04
-
Add port parameter to mgrutil.remove_ssh_known_host
-
Prevent possible tracebacks on calling module.run from mgrcompat by setting proper globals with using LazyLoader
-
Fix bootstrapping for Ubuntu 18.04 with classic Salt package (bsc#1200707)
-
create CA certificate symlink on Proxies which might get lost due to de-installation of the ca package
-
uyuni-common-libs:
-
Version 4.3.5-1
-
Fix reposync issue about 'rpm.hdr' object has no attribute 'get'
-
virtual-host-gatherer:
-
Declare the LICENSE file as license and not doc
woodstox:
-
Declare the LICENSE file as license and not doc
xmlpull-api:
-
Declare the LICENSE file as license and not doc
Major changes since SUSE Manager Server 4.2
Base system upgrade
The base system has been upgraded to SUSE Linux Enterprise Server 15 SP4.
PostgreSQL 14
The database engine has been updated from PostgreSQL 13 to PostgreSQL 14, which brings a number of performance and reliability improvements. A detailed changelog is available upstream.
To prevent inconsistent configurations and data on upgrade or update, SUSE Manager 4.3 will refuse to start until the database migration from PostgreSQL 13 to PostgreSQL 14 has been completed successfully.
Salt
Salt 3004
Salt has been upgraded to upstream version 3004, plus a number of patches, backports, and enhancements by SUSE, for the SUSE Manager Server, Proxy, and Client Tools.
We intend to regularly upgrade Salt to more recent versions.
For more details about changes in your manually-created Salt states, see the Salt 3004 upstream release notes.
Salt as a Bundle
One of the areas that we want to address in SUSE Manager 4.3 is to co-exist with other configuration management tools, especially Salt-based, and Salt Bundle is what the team came up with as the solution. The Salt Bundle can be used on systems that already run another Salt Minion, that does not meet Salt’s requirements or already provide a newer salt version that is used instead of the version provided by SUSE Manager.
Salt Bundle is a single package called venv-salt-minion
containing the Salt Minion, Python, and all Python modules. It is exactly the same version and codebase for the current salt-minion
RPM package.
SUSE Manager 4.3 comes with the salt bundle and use it as the default way to bootstrap systems for all the supported operating systems.
On bootstrapping new clients the Salt Bundle package will be used instead of salt-minion if the package venv-salt-minion
is present in the bootstrap repo.
Clients already registered will not be changed, but can be switched to Salt Bundle by applying the state util.mgr_switch_to_venv_minion
to them. For more information see the Client Configuration Guide.
Salt SSH now uses the Salt Bundle
The Salt Bundle is now used to handle Salt SSH executions on the client side. The bootstrap of new Salt clients using webUI or API is now also using the Salt Bundle.
To ensure bootstrap works in the proper way, the bootstrap repositories for the clients must be regenerated before bootstrapping new clients.
The bootstrap repository regeneration happens for any given product when a resync for the product repositories happens:
-
For products provided by the SUSE Customer Center, added via de Setup Wizard or
mgr-sync
, this happens each night. -
For products added via
spacewalk-common-channels
there is no automated resync by default, unless it was configured after adding the product. In this case, the regeneration needs to be trigger manually.
To manually trigger the regeneration, use the tool mgr-create-bootstrap-repo
at the SUSE Manager Server.
Reporting
Reporting Database
The reporting database provides SUSE Manager data used for reports in a simplified schema and is accessible by any reporting tool with support for SQL databases as content sources.
This new database is isolated from the one used for the SUSE Manager Server, and created automatically.
The tool uyuni-setup-reportdb-user
can create new users who have read-only access to the data.
For more information on this topic, see Hub reporting.
Reporting Database documentation
The reporting database schema is now fully documented.
The documentation describes the schema in detail, showing all the tables and the views available and highlighting the relationships among them.
You can access it from the SUSE Manager Server WebUI, at Help > Report Database Schema, from the left navigation bar.
spacewalk-report now uses data from the reporting database
spacewalk-report
will use the data from the report database by default. This change affects both new and updated setups.
This means that the newly generated reports will differ in the structure and the format of the data and might break existing integrations.
If this change causes trouble in your use case, the new option --legacy-report
can be used to fall back to the old report engine.
For a comprehensive list of what is changed and what reports are affected, see the section "Generate Reports" at the Administration Guide.
Improved image management
SUSE Manager 4.3 comes with a lot of improvements for image management.
-
Kiwi images:
-
Uses name and version from Kiwi config file, revision is increased on each build
-
Built image files are referenced in the database and deleted with the image entry
-
Image pillars are stored in the database
-
The build log is visible in the User Interface
-
-
Docker images:
-
Use a new database entry for each revision
-
Old revision can be shown with the "Show obsolete" checkbox
-
-
Updated XML RPC API to manipulate with images, image files and pillars:
-
For more details about these endpoints, please refer to SUSE Manager API.
-
Technology Previews
Containerized SUSE Manager Proxy and Retail Branch Server
Starting with SUSE Manager 4.3, it will be possible to run the SUSE Manager proxy and Retail branch server also in containers. This could be very helpful in scenarios where adding new virtual machines is not feasible for some reason. Additionally, the ability to run SUSE Manager Proxy and Retail branch servers in containers make it more flexible to run them anywhere without worrying about the underlying OS. Moreover in the future, it will allow users to install SUSE Manager components on top of Kubernetes, increasing flexibility and future viability.
JSON over HTTP API
With SUSE Manager 4.3, in addition to the current XML-RPC API, a new JSON over HTTP API will also be provided to make SUSE Manager API even easier to consume.
SUSE Manager is seeing more and more use in automated scenarios, where it is a part of a bigger system and is driven via its APIs. The XML-RPC protocol has served users well so far and will continue to do so, but HTTP APIs are more in demand and have better tooling support.
The API documentation has been updated to reflect the changes to support the HTTP API, and is available at the SUSE Manager Server WebUI under About > API, and at the online documentation
Usage examples can be found in the "Sample scripts" section of the documentation.
With the addition of the JSON over HTTP API documentation:
-
Mandatory names to the input parameters for each method were added
-
Information about the HTTP request type (GET or POST) was added
-
Example scripts to consume the HTTP API via Curl were added
New products enabled
-
Debian 11
-
SUSE Linux Enterprise 15 SP4
-
SUSE Linux Enterprise Micro 5.2 (tech preview)
For more information about the registration process, refer Registration section, and for more information about supported features, consult Supported Features.
Security
HTTP Strict Transport Security
HTTP Strict Transport Security (HSTS) is a policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking.
SUSE Manager allows enabling HSTS, to enable it for a SUSE Manager Server:
-
Edit
/etc/apache2/conf.d/zz-spacewalk-www.conf
-
Uncomment the line
# Header always set Strict-Transport-Security "max-age=63072000; includeSubDomains"
-
Restart Apache with
systemctl restart apache2
To enable it for SUSE Manager Proxies:
-
Edit
/etc/apache2/conf.d/spacewalk-proxy.conf
-
Uncomment the line
# Header always set Strict-Transport-Security "max-age=63072000; includeSubDomains"
-
Restart Apache with
systemctl restart apache2
IMPORTANT: Once HSTS is enabled while using the default SSL certificate generated by SUSE Manager or a self-signed certificate, browsers will refuse to connect using HTTPS unless the CA used to sign such certificates is trusted by the browser.
If you are using the SSL certificate generated by SUSE Manager, you can trust it by importing the file located at http://<SERVER-HOSTNAME>/pub/RHN-ORG-TRUSTED-SSL-CERT
to the browsers of all users.
Monitoring
Grafana 8.3.5
SUSE Manager 4.3 comes withe the newer Grafana from version 7.5.12 to 8.3.5.
This update fixes several security vulnerabilities:
-
XSS vulnerability in handling data sources (CVE-2022-21702)
-
Cross-origin request forgery vulnerability (CVE-2022-21703)
-
Insecure Direct Object Reference vulnerability in Teams API (CVE-2022-21713)
-
GetUserInfo: return an error if no user was found (CVE-2022-21673)
Updating Grafana is strongly recommended.
Relevant changes are:
-
New Alerting for Grafana 8
-
CloudWatch: Add support for AWS Metric Insights
-
CloudWatch: Add AWS RoboMaker metrics and dimension
-
CloudWatch: Add AWS Transfer metrics and dimension
-
CloudWatch: Add AWS LookoutMetrics
-
CloudWatch: Add Lambda@Edge Amazon CloudFront metrics
-
CloudMonitoring: Add support for preprocessing
-
CloudWatch: Add AWS/EFS StorageBytes metric
-
CloudWatch: Add Amplify Console metrics and dimensions
-
CloudWatch: Add metrics for managed RabbitMQ service
-
Elasticsearch: Add support for Elasticsearch 8.0
-
AzureMonitor: Add support for PostgreSQL and MySQL Flexible Servers
-
AzureMonitor: Add Azure Resource Graph
-
AzureMonitor: Add support for Microsoft.SignalRService/SignalR metrics
Check the upstream changelog for more details on what has changed.
There is one breaking change:
-
Grafana 8 Alerting enabled by default for installations that do not use legacy alerting.
SUSE Manager does not use Grafana alerting, so if you do not need it, you can disable it at the Grafana WebUI.
If you use legacy Grafana alerting in your environment, consider migrating to new Grafana 8 alerting.
Prometheus 2.32.1
SUSE Manager 4.3 comes withe the newer Prometheus from version 2.27.1 to 2.32.1.
The new version contains some breaking changes that need to be addressed after the SUSE Manager is updated.
Breaking changes:
-
Uyuni Service Discovery: The configuration and the returned set of meta labels have changed. Please check the upstream documentation for more details.
-
As a consequence all users with existing monitoring setup must reapply the highstate on the monitoring server(s).
Important changes:
-
Introduced generic HTTP-based service discovery.
-
New expression editor with advanced autocompletion, inline linting, and syntax highlighting.
-
Discovering Kubernetes API servers using a kubeconfig file.
-
Faster server restart times via snapshotting.
-
Controlling scrape intervals and timeouts via relabeling.
Check the upstream changelog for more details on what has changed.
Usabilty
Adding systems with failed/completed actions to System Set Manager
It is now possible to select and add systems that failed or completed actions, with a new button Add Selected to SSM
that shows for the actions at "Completed Systems" and "Failed Systems".
You can the find the actions at the SUSE Manager Server WebUI, at Schedule
on the left navigation bar.
This can be useful to fix issues with systems that failed to complete actions, or to run more actions on those that completed them.
Product Migration
With SUSE Manager 4.3, it is now possible to migrate products even if the target product doesn’t have some of the successors. This is a common scenario in the case of LTSS, where migrating from an LTSS version to the next service pack doesn’t have LTSS successor module.
Now it is up to the user to decide if they want to migrate or not. SUSE Manager will display enough information about the missing successors.
Besides the UI, it is also possible to do it using the API.
New XML-RPC API version 26
SUSE Manager 4.3 updates the XML-RPC API version from 25 to 26.
As CaaSP support has been dropped that also means that corresponding cluster Management APIs have been also removed.
If any of your scripts are checking for the version 25, you can change them to use version 26 without any further changes.
smdba: changed defaults for newer PostgreSQL versions
Starting with PostgreSQL 13, some defaults have changed.
To improve performance, smdba autotuning was adapted to use the new values.
Additionally an extra paramater --ssd
was added to autotuning to tell smdba that the database is stored on ssd or fast network storage.
To change an existing configuration with the new defaults call
smdba system-check autotuning
Remember you can also adjust some other parameters, in case you need them:
smdba system-check autotuning [--max_connections=<number>] [--ssd]
Dropped features
CaaSP support
We had added CaaSP support in previous versions but unfortunately, CaaSP got disconnected and no further development will be happening there.
The currently released versions of CaaSP will soon be going EOL and this naturally implies that we should also remove all the bits related to it from SUSE Manager.
Deprecated features
Traditional Stack has been deprecated
With SUSE Manager 4.3 release, traditional stack has been deprecated.
The release that follows SUSE Manager 4.3 will not support traditional clients and traditional proxies, and is planned for 2023. We encourage all new deployments to use Salt clients and Salt proxies exclusively, and to migrate existing traditional clients and proxies to Salt.
'spacewalk-clone-by-date' has been deprecated
With SUSE Manager 4.3 release, spacewalk-clone-by-date
tool has been deprecated. With CLM (Content Lifecycle Management), we believe customers have a better alternative to spacewalk-clone-by-date
, which is much more flexible and powerful.
CLM provides a comprehensive API to cover all the important features that spacewalk-clone-by-date
tool offers.
We highly encourage users to migrate their workload and scripts to CLM.
Unsupported products
-
Red Hat Enterprise Linux 6
-
SUSE Linux Enterprise Server Expanded Support 6
-
Oracle Linux 6
-
CentOS 6
-
CentOS 8
-
CentOS stream
-
Ubuntu 16.04
-
SUSE Linux Enterprise Server 11
-
Debian 9
We encourage you to migrate your workload to a newer version of each distribution, or to an alternative distribution that is still supported, so you can continue managing your infrastructure with SUSE Manager.
Please note that we will not break things on purpose for these unsupported products, and there is a possibility that they could still continue to work. But if things break, there will not be any support provided, not even on a best-effort basis.
Deprecated products
The support policy of SUSE Manager clients can be summarized as: "if the operating system is under general support by its vendor, then SUSE Manager supports it as a client".
After the EOL of a product, for a grace period of 3 months, a product will be considered as deprecated before moving to unsupported.
For deprecated products, support will only be provided on a best-effort basis.
Upgrade
Upgrading with SUSE Manager Proxy
SUSE Manager Server 4.3 works with SUSE Manager Proxy 4.1/4.2 and SUSE Manager Retail Branch Server 4.1/4.2 but only for upgrade purposes. The product is not intented to be used in a mixed-version scenario in production. When upgrading, upgrade the SUSE Manager Server first, followed by the SUSE Manager Proxy and Retail Branch Servers.
There is a known issue when migrating to 4.3, please consult the Known Issues section for more detail.
For instructions on upgrading when SUSE Manager Proxy or SUSE Manager Retail Branch Servers are in use, see the Upgrade Guide on https://documentation.suse.com/suma/4.3/.
Upgrading with inter-server synchronization
When upgrading, upgrade the ISS master first, followed by the ISS slaves.
Support
Supportconfig confidentiality disclaimer
When handling Service Requests, supporters and engineers may ask for the output of the supportconfig
tool from SUSE Manager Server or clients.
This disclaimer applies:
Detailed system information and logs are collected and organized in a manner that helps reduce service request resolution times. Private system information can be disclosed when using this tool. If this is a concern, please prune private data from the log files. Several startup options are available to exclude more sensitive information. Supportconfig data is used only for diagnostic purposes and is considered confidential information.
When you run supportconfig
on the SUSE Manager Server, the output will contain information about your clients as well as about the Server.
In particular, debug data for the subscription matching feature contains a list of registered clients, their installed products, and some minimal hardware information (such as the CPU socket count).
It also contains a copy of the subscription data available from the SUSE Customer Center.
If this is a concern, please prune data in the subscription-matcher
directory in the spacewalk-debug
tarball before sending it to SUSE.
Support for SLE Micro
SLE Micro is only supported as a Salt minion. The traditional stack will not be supported.
Supportability of embedded software components
All software components embedded into SUSE Manager, like Cobbler for PXE booting, are only supported in the context of SUSE Manager. Stand-alone usage (e. g. Cobbler command-line) is not supported.
Support for older products
The SUSE Manager engineering team provides 'best effort' support for products past their end-of-life date. For more information about product support, see Product Support Lifecycle.
Support for products that are considered past their end-of-life is limited to assisting you to bring production systems to a supported state. This could be either by migrating to a supported service pack or by upgrading to a supported product version.
Support for RHEL, CentOS and Oracle Linux Clients
SUSE Manager supports RHEL/Oracle Linux 7, 8 and 9.
SUSE Manager has the ability to mirror all entitled content for the supported operating systems. Although SUSE Manager doesn’t assign content for specific systems using subscription-manager
, it does rely on it initially to retrieve the list of repositories that are available.
By utilizing the same EUS channels that RedHat provides, customers can limit content to individual dot
releases.
CentOS Stream is explicitly not supported by SUSE. You may try to register CentOS Stream clients by:
-
Using the
spacewalk-common-channels
command-line tool to synchronize the product -
Using the CentOS Stream client tools from the upstream Uyuni Project.
Support for SUSE Liberty Linux
SUSE Manager supports SUSE Liberty Linux 7, 8 and 9. SUSE Liberty Linux clients are sometimes also called SUSE Linux Enterprise Server with Expanded Support (SLESES) or simply RES.
For a detailed list of supported features, check the Client Configuration Guide.
Support for Rocky Linux & AlmaLinux
SUSE Manager supports Rocky Linux 8/9 and AlmaLinux 8/9.
For a detailed list of supported features for AlmaLinux, check the Client Configuration Guide. For a detailed list of supported features for Rocky Linux, check the Client Configuration Guide.
Support for Ubuntu Clients
SUSE Manager supports Ubuntu 18.04 LTS, 20.04 LTS and 22.04 LTS clients using Salt. Traditional clients are not supported.
Support for Ubuntu is limited to a growing list of specific features. For a detailed list of supported features, check the Client Configuration Guide.
Support for Debian Clients
SUSE Manager supports Debian 10 "Buster" & Debian 11 "bullseye" clients using Salt. Traditional clients are not supported.
Support for Debian is limited to a growing list of specific features. For a detailed list of supported features, check the Client Configuration Guide.
L1 support for RHEL and CentOS ppc64le clients
For RHEL and CentOS clients on the ppc64le architecture, SUSE Manager offers the same functionality that is supported for the x86_64 architecture. Client tools are not available yet from SCC but the CentOS 7 client tools from Uyuni can be enabled using spacewalk-common-channels
. CentOS 8 is dead.
RHEL and CentOS ppc64le are only supported at L1 level support. L1 support is limited to problem determination, which means technical support designed to provide compatibility information, usage support, on-going maintenance, information gathering, and basic troubleshooting using available documentation. At the time of writing, any problems or bugs specific to RHEL and CentOS on ppc64le will only be fixed on a best-effort basis.
Please contact your Sales Engineer or SUSE Consulting if you need additional support or features for these operating systems.
SCAP Security Guide support
SUSE provide scap-security-guide
package for different openscap profiles. In the current version of scap-security-guide
, SUSE supports the following profiles:
-
DISA STIG profile for SUSE Linux Enterprise Server 12 and 15
-
PCI-DSS profile for SUSE Linux Enterprise Server 12 and 15
-
HIPAA profile for SUSE Linux Enterprise Server 12 and 15
Other profiles, like the CIS profile, are community supplied and not officially supported by SUSE.
For Non-SUSE OSs, please note that the included profiles are community supplied and not officially supported by SUSE.
Browser support
Microsoft Internet Explorer fails to render some parts of the SUSE Manager Web UI and is therefore not a supported browser, in any version.
Please refer to the General Requirements for a list of supported browsers.
SUSE Manager installation
The SUSE Unified Installer, and installing SUSE Manager on top of Minimal-VM images (formely known as SLE JeOS), are the only supported mechanisms to install SUSE Manager.
Known issues
Monitoring: SUSE Linux Enterprise Server Micro
When enabling the monitoring formula on a transactional system like SUSE Linux Enterprise Server Micro 5, the necessary services are not enabled and started by the highstate.
Workaround: The proposed workaround is to manually enable and start the corresponding exporter’s service on the minion.
Containerized Proxy & Retail Branch server
Although this is fully supported, there are a couple of limitations that the user needs to be aware of.
-
Scaling the pod up in a Kubernetes environment will not work since multiple squid instances would access the same cache volume.
-
For Retail Branch Server all branches are shown in the PXE menu on the terminal boot. This makes the branch selection more complex if the list is long.
-
The Containerized Proxy cannot be used to set up DHCP and DNS services on the same host like a normal Proxy. By design, it can only work with external DHCP and DNS servers.
-
Once POS image is build and made available on SUSE Manager Server, it is immediately available to the Saltboot clients as well. Image synchronization is not needed, nor available. This may have implications on how images are deployed to production.
GPG keys acceptance issue
Some Enterprise Linux distributions do not trust their own GPG key for package installation. In case of GPG key errors, try to import the GPG key manually. The key files are installed but the name depends on the OS
CentOS Linux 7: '/etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-7'
CentOS Linux 8: '/etc/pki/rpm-gpg/RPM-GPG-KEY-centosofficial'
AlmaLinux 8: '/etc/pki/rpm-gpg/RPM-GPG-KEY-AlmaLinux'
AlmaLinux 9: '/etc/pki/rpm-gpg/RPM-GPG-KEY-AlmaLinux'
Rocky Linux 8: '/etc/pki/rpm-gpg/RPM-GPG-KEY-rockyofficial'
Rocky Linux 9: '/etc/pki/rpm-gpg/RPM-GPG-KEY-rockyofficial'
Red Hat Enterprise Linux Server 7: '/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release'
Red Hat Enterprise Linux 8: '/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release'
Red Hat Enterprise Linux 9: '/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release'
Amazon Linux 2: '/etc/pki/rpm-gpg/RPM-GPG-KEY-amazon-linux-2'
Oracle Linux 7: '/etc/pki/rpm-gpg/RPM-GPG-KEY-oracle'
Oracle Linux 8: '/etc/pki/rpm-gpg/RPM-GPG-KEY-oracle'
Oracle Linux 9: '/etc/pki/rpm-gpg/RPM-GPG-KEY-oracle'
Workaround: Import the keys using the following command:
$> rpm --import /path/to/key/file
We are working on a final solution to automate this.
AlmaLinux
-
AlmaLinux 8 repository URLs have been changed to use the mirrors list. To use the new URLs on an existing installation, updating and then running "mgr-sync refresh" or waiting for its nightly execution is required. Please update as soon as possible. New updates for AlmaLinux cannot be fetched from the server until this change happened.
-
Because of an upstream bug, the original package shipped with AlmaLinux 8.5 is providing a broken repository file (containing duplicated identificators). We have already reported this issue to AlmaLinux.
Workaround: Update the package
almalinux-release
before registering the instance to SUSE Manager so at least the version8.5-3
is installed.
UI discrepancies
SUSE Manager 4.3 comes with a new look and feel. We have fixed most of the known issues related to this but there could be still some UI discrepancies because susemanager-light
and susemanager-dark
themes are under active development.
If the user faces any issue related to UI, we suggest reporting a bug. In the meanwhile, one can also choose to fall back to uyuni
theme which is older but more mature.
To change a theme, the user needs to login into SUSE Manager and then choose the needed theme from the dropdown list under Home → My Preferences→ Style Theme.
Migration from 4.1 and 4.2 to 4.3
SUSE Manager 4.3 is the base product for SLE15 SP4, this applies to Server, Proxy, and Retail Branch Server. In SLE 15 SP4, sle-module-python2
is no longer available (in favor of sle-module-python3
).
This means that migration(using yast2 migration
or zypper migration
) from 4.1/4.2 to 4.3 will not work without deactivating this module first.
yast2
and zypper
raise the following error if the module is still activated during migration
Can't get available migrations from server: SUSE::Connect::ApiError: There are activated extensions/modules on this system that cannot be migrated.
Deactivate them first, and then try migrating again.
The product(s) are 'Python 2 Module 15 SP3 x86_64'.
You can deactivate them with:
SUSEConnect -d -p sle-module-python2/15.3/x86_64
As suggested in the error message one can deactivate the module using SUSEConnect -d -p sle-module-python2/15.3/x86_64
.
After this, migration should work.
Migration of SUMA Proxy 4.2 to 4.3
When upgrading SUSE Manager Proxy 4.2 based on JeOS image to 4.3, before proceeding with the migration, please uninstall the kernel-default-base
package, otherwise, the migration will not work.
CLM and custom repositories
When building a CLM project, if it includes custom channels with custom repositories. The custom repositories might not be selected in the new cloned custom channels. As workaround, one can go to the new cloned custom channels, select the custom repositories and synchronize them.
Container build host and salt bundle
Container build host will not work with salt bundle. We are working on the fix. In the meanwhile, in the case of Container build host, don’t use Salt bundle but rather a normal Salt.
Bootstrap with web UI using non-root user
Onboarding of clients with the non-root
user from SUSE Manager UI fails the following error:
ERROR com.suse.manager.webui.controllers.utils.AbstractMinionBootstrapper - Error during bootstrap: SaltSSHError(13, stderr: "", stdout: "ERROR: Failure deploying ext_mods:"
The root cause of this problem is wrong ownership of salt thin directory when using the salt bundle.
Workaround: Once bootstrap fails, run chown -R $USER:$GROUP /var/tmp/.*_salt
once and try onboarding again, it shouldn’t fail this time.
Registering Spacewalk 2.x/Red Hat Satellite 5.x clients to SUSE Manager as Salt minions
If a client machine is running the Red Hat Satellite 5.x agent, registering it to SUSE Manager as a Salt minion will fail due to package conflicts.
Registering a RH Satellite 5.x client as a SUSE Manager traditional client works fine.
Registering a SUSE Manager traditional client as a SUSE Manager Salt minion will also work.
Works | Fails |
---|---|
RH Satellite 5.x ⇒ SUSE Manager traditional |
RH Satellite 5.x ⇒ SUSE Manager Salt minion |
SUSE Manager traditional ⇒ SUSE Manager Salt minion |
In order to register Red Hat Satellite 5.x clients to SUSE Manager as Salt minions, you will need to modify the bootstrap script to remove the Satellite agent packages first.
Spacewalk 2.x and Oracle Spacewalk 2.x clients will show the same behavior as Red Hat Satellite 5.x clients
Providing feedback
If you encounter a bug in any SUSE product, please report it through your support contact or in the SUSE Forums:
Resources
Latest product documentation: https://documentation.suse.com/suma/4.3/.
Technical product information for SUSE Manager: https://www.suse.com/products/suse-manager/
These release notes are available online: https://www.suse.com/releasenotes/
Visit https://www.suse.com for the latest Linux product news from SUSE.
Visit https://www.suse.com/download-linux/source-code.html for additional information on the source code of SUSE Linux Enterprise products.
Legal Notices
SUSE Software Solutions Germany GmbH Frankenstraße 146 D-90461 Nürnberg Tel: +49 (0)911 740 53 - 0 Email: feedback@suse.com Registrierung/Registration Number: HRB 36809 AG Nürnberg Managing Director/Geschäftsführer: Ivo Totev
SUSE makes no representations or warranties with regard to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, SUSE reserves the right to revise this publication and to make changes to its content, at any time, without the obligation to notify any person or entity of such revisions or changes.
Further, SUSE makes no representations or warranties with regard to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, SUSE reserves the right to make changes to any and all parts of SUSE software, at any time, without any obligation to notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classifications to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical/biological weaponry end uses. Please refer to the SUSE Legal information page for more information on exporting SUSE software. SUSE assumes no responsibility for your failure to obtain any necessary export approvals.
Copyright © 2012-2023 SUSE LLC.
This release notes document is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License (CC-BY-ND-4.0). You should have received a copy of the license along with this document. If not, see https://creativecommons.org/licenses/by-nd/4.0/.
SUSE has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at https://www.suse.com/company/legal/ and one or more additional patents or pending patent applications in the U.S. and other countries.
For SUSE trademarks, see SUSE Trademark and Service Mark list (https://www.suse.com/company/legal/). All third-party trademarks are the property of their respective owners.
Colophon
Thank you for using SUSE Manager Server in your business.
Your SUSE Manager Server Team.