This SUSE product includes materials licensed to SUSE under the GNU General Public License (GPL). The GPL requires that SUSE makes available certain source code that corresponds to the GPL-licensed material. The source code is available for download.
Version Revision History
-
October 2018: 3.2.3 release
-
September 26th, 2018: 3.2.2 release
-
September 4th, 2018: 3.2.1 release
-
June 25th, 2018: 3.2.0 release
About SUSE Manager
SUSE Manager is a best-in-class open source infrastructure management solution for your software-defined infrastructure. Designed to help your enterprise DevOps and IT Operations teams to reduce complexity and regain control of IT and IoT assets, increase efficiency while meeting security policies and optimize operations with automation to reduce costs.
SUSE Manager helps your enterprise DevOps and IT operations teams to:
Optimize operations while reducing costs with automated Linux server and IoT device provisioning, patching and configuration for faster, consistent and repeatable server deployments.
-
Easily manage and optimize usage of your SUSE subscriptions helping you to ensure you aren’t buying subscriptions you don’t need
-
Improve onboarding efficiency of new HW with automated discovery (via PXE boot)
-
Optimize operations by enabling IT to quickly build container images based on their SUSE Manager repositories
-
Increase operational efficiency and support CI/CD, with a single tool (using Salt) for automated deployment of hardened OS templates (bare metal, VMs or containers) to tens of thousands of servers and IoT devices for faster, consistent & repeatable provisioning and configuration without compromising speed or security
-
Reduce costs with automated patch management enabling you to deploy patches based on software channel assigned to ensure systems are kept up to date
Reduce complexity and regain control of IT assets with a single tool to manage Linux systems across a variety of hardware architectures, hypervisors as well as container, IoT and cloud platforms
-
Reduce complexity with a single tool that lets you easily onboard and manage any Linux server connected to the network, from edge devices to your Kubernetes environment, no matter where it is located – in your data center, a 3rd party data center or in the cloud
-
Improve visibility of your infrastructure – with improved graphical visualization of your IT systems status and their relationships. Once an asset has been on-boarded, you’ll never “lose” it. So, if it goes offline or stops responding you will know. Quickly view your Linux assets and identify assets that need attention.
-
Simplify management and regain control of your IT assets with graphical visualization of your IT systems and their relationships as well as the capability to organize Linux servers into logical groupings – group them, tag them with additional details (location in the DC, Rack, etc)
-
Locate and store HW specifics for the servers and IoT devices enabling grouping/tagging by HW characteristics (vendor tags, CPU architecture, RAM)
-
Ensure compliance with internal security policies and external regulations with automated monitoring, tracking, auditing and reporting of your systems/devices, VMs and containers across your development, test and production environments.
-
Comprehensive monitoring solution, that enables operations to monitor your Linux environments from the HW through the OS layer up to their applications
-
Detailed compliance auditing and reporting with the ability to track all HW and SW changes made to your managed Linux infrastructure
-
Easily track system compliance with automated patch management ensures daily notifications of systems not compliant with the current patch level
-
Faster non-compliant remediation with the ability to quickly identify systems deployed in hybrid cloud and container infrastructures that are out of compliance to hardened profiles/templates based on your own internal security policies
About SUSE Manager 3.2
SUSE Manager 3.2, the latest release of SUSE’s best-in-class open source infrastructure management software, comes with new enhancements focused on lowering costs, improving DevOps efficiency and easily managing large complex deployments across IoT, cloud and container infrastructures. As a key component of a software-defined infrastructure, SUSE Manager 3.2 provides three key benefits:
-
Lower costs and simplify deployment while easily scaling larger environments for Public Cloud infrastructures and Kubernetes deployments.
-
Improve DevOps efficiency and meet compliance requirements with a single tool to manage and maintain everything from your IoT edge devices to your containerized workloads.
-
Easily manage large complex deployments with new extended forms-based UI capabilities
Keep Informed
You can stay up-to-date regarding information about SUSE Manager and SUSE products:
-
Check the SUSE Manager Wiki
-
Read the SUSE Blog
Installation
Requirements
SUSE Manager 3.2 Server is an extension for SLES 12 SP3 for x86-64, Power Systems (ppc64le), or z Systems (s390x).
This means that installation is done in two steps
-
base operating system (SLES 12 SP3)
-
SUSE Manager 3.2 Server extension
This addresses the need of enterprise deployments to standardize on the base operating system as well as specific storage setups.
It is strongly recommended to use SUSE Manager with the embedded database. PostgreSQL is only supported as a local (embedded) database.
Registration code
The SUSE Manager 3.2 Server registration code, matching your hardware architecture, can be used to register the SLES 12 SP3 base system as well.
Installing the SUSE Manager 3.2 Server extension on SLES 12 SP3
You’ll need a physical or virtual SLES 12 SP3 x86_64, ppc64le, or s390x system to install SUSE Manager 3.2 Server.
When you install and register SLES 12 SP3, SUSE Manager 3.2 Server will show up in the list of available extensions.
You’ll need a valid SUSE Manager 3.2 Server registration code to access this extension.
Update from previous versions of SUSE Manager Server
You can update from SUSE Manager 3.1 Server to SUSE Manager 3.2 Server.
Updates from older versions than 3.1 are not supported.
SUSE Manager 3.1 Server must be on the latest patch level (3.1.6 as of this writing), based on SLES 12 SP3, and have PostgreSQL 9.6 running.
If your SUSE Manager 3.1 Server lacks any of these requisites, please refer to the SUSE Manager 3.1 Server release notes and documentation for further advise.
See the best practices manual for detailed instructions on how to upgrade.
All connected clients will continue to run and are manageable unchanged.
Migrating from RHN Satellite
Is conditionally supported with SUSE Manager 3.2 Server.
If you have the need to migrate from RHN Satellite to SUSE Manager 3.2 Server, please get in contact with a SUSE sales engineer or a SUSE consultant before starting the migration.
Major changes since SUSE Manager Server 3.2 GA
Features and changes
Version 3.2.3
Enablement for Retail scenarios
This update provides enablement for SUSE Manager in Retail (formerly: SLEPOS) scenarios.
New and updated formulas
-
branch-network-formula
-
pxe-formula
-
image-sync-formula
-
saltboot-formula
-
dhcpd-formula
-
bind-formula
-
vsftpd-formula
-
tftpd-formula
terminal deployment using saltboot event-based boot process
Ability to deploy and boot PXE/saltboot based OS images.
Templates for OS images are published in https://github.com/SUSE/manager-build-profiles/tree/master/OSImage repository.
commandline tools and Python API for mass configuration
-
retail_branch_init
for branch server configuration -
retail_yaml
for mass configuration from YAML source files
Version 3.2.2
Prevent sudoers corruption
This update includes a fix to prevent a corrupted /etc/sudoers.d/spacewalk
file
(see bsc#1099517).
Any custom modifications to this file will be saved in /root/sudoers-spacewalk.save
.
This should not happen as users should NOT modify /etc/sudoers.d/spacewalk
changed XMLRPC API calls
The following renames were done to ensure API consistency
-
populateSystemFormulaData
tosetSystemFormulaData
-
populateGroupFormulaData
tosetGroupFormulaData
The API calls
-
getSystemFormulaData
-
getGroupFormulaData
have changed parameters for the same reason.
OS Image building with Kiwi
The Kiwi build feature of SUSE Manager was extended to build installable Linux OS images and virtual machines.
Configuration channel label restriction
The dot (.
) character is now forbidden in configuration channel
labels, as it does not work with salt clients.
Dot (.
) characters in existing configuration channels need to be
manually replaced by another character, like underline (_
)
Check for Dynamic CA-Trust Updates while bootstrapping on RES
When bootstrapping an ES6.x system the SUSE Manager CA certificate will be imported by the client.
When dynamic CA-Trust Updates are disabled ( as per default ), the registration and bootstrapping of the client will fail, giving a lot of output and making it difficult to find the real cause.
This update adds a short check at the start of the bootstrap script to advise the sysadmin to enable ca trust updates.
Set DNS name in createSystemRecord
The system.createSystemRecord()
call now sets a dnsname in the
generated cobbler configuration.
New products added
-
CaaSP 3.0 (deployment only)
-
Product class for Live Patching on PPC
Version 3.2.1
Repository metadata signing
It is now possible to optionally sign repository metadata in SUSE Manager.
While not strictly needed (packages are signed and all traffic is secure), it adds another layer of trust to the package distribution.
Please see 'Signing Repository Metadata' in the securiy chapter of the advanced topics guide for full details.
Test mode for highstate UI
In the Highstate UI we have added a toggle-button next to the "Apply Highstate" button to enable Salt test mode.
If enabled, salt apply.highstate
is executed with test=True
.
It cannot be guaranteed that this does not change anything due to bugs in Salt modules. That’s why it’s not called "dry-run".
In case you encounter a badly written Salt module not fully honoring test mode, please open a support request.
Ordered and formated output of state apply results
The event history of a state apply is now similar to the output salt produces on the command line.
The result is ordered in the execution order and failed states are marked red.
In test mode, red marked states are states which would change something.
Ignore inactive containers in Kubernetes clusters
Non-running containers are now ignored when querying a kubernetes cluster.
Patches
The SUSE Patch Finder is a simple online service to view released patches.
Version 3.2.3
- bind-formula
-
-
Do not allow empty values in SOA pillar
-
Generate rev zones for any zone
-
Include forwarders, allow generic options in bind formula
-
Advanced features in form
-
Updated from upstream
-
- dhcpd-formula
-
-
Form hardware address clarification (bsc#1106243)
-
Allow hosts to be specified under specific subnet
-
Mark domain name as optional in form
-
Update form.yml to use edit-groups
-
Remove no longer needed local changes
-
Update formula from upstream:
-
Add support for several config options
-
Add domain-search option
-
Class and subnet pool minor fixes / additions
-
Add option next-server for hosts in dhcpd.conf
-
-
- nutch-core
-
-
Change default hadoop.log location to /var/log/nutch
-
Disable log file rotation in the log4j configuration in order to handle rotation using logrotate and change the path of hadoop.log to /var/log/nutch (bsc#1107869)
-
- patterns-suse-manager
-
-
Adjusted pacakges list for Retail pattern
-
- py26-compat-salt
-
-
Fix wrong recurse behavior on for linux_acl.present (bsc#1106164)
-
Adding backport for string arg normalization and fix for SUSE ES os
-
- spacecmd
-
-
Add summary to softwarechannel.clone when calling older API versions (bsc#1109023)
-
New function/Update old functions to handle state channels as well
-
- spacewalk-java
-
-
Fix 'image deployed' event data parsing (bsc#1110316)
-
Handle 'image deployed' salt event by executing post-deployment procedures
-
Fix NullPointerException when refreshing deleted software channel (bsc#1094992)
-
Remove special characters from HW type string
-
Fix script is deleted too early (bsc#1105807)
-
Make Kiwi OS Image building enabled by default
-
Change Saltboot grain trigger from "initrd" to "saltboot_initrd"
-
Optimize execution of actions in minions (bsc#1099857)
-
Add last_boot to listSystems() API call
-
Changed localization strings for file summaries (bsc#1090676)
-
Added menu item entries for creating/deleting file preservation lists (bsc#1034030)
-
Check valid postgresql database version
-
Fix displayed number of systems requiring reboot in Tasks pane (bsc#1106875)
-
Modify acls: hide 'System details -> Groups and Formulas' tab for non-minions with bootstrap entitlement
-
Double check if the websocket connection is still open on sendText failure (bsc#1080474)
-
Remove the reference of channel from revision before deleting it(bsc#1107850)
-
Pair a new starting minion with empty profile based on its HW address (MAC)
-
Allow creating empty minion profiles via XMLRPC, allow assigning and editing formula for them
-
Added link from virtualization tab to Scheduled > Pending Actions (bsc#1037389)
-
- spacewalk-search
-
-
Limit number of old java logfiles (bsc#1107869)
-
- spacewalk-web
-
-
Fix applying default values to edit-group
-
Respect $name in dictionary edit-group
-
Filter out empty values in edit-group (bsc#1104837)
-
- subscription-matcher
-
-
Set core dumps location for IBM java (bsc#1107302)
-
Fix OutOfMemoryError crashes (bsc#1094524)
-
- supportutils-plugin-susemanager
-
-
Add postgresql version info
-
- susemanager-branding-oss
-
-
Use ASCII quotation marks in license file (bsc#1098970)
-
- susemanager-docs_en
-
-
Rebuilt same bsc bugs apply from former push
-
SUSE Manager documentation doesn’t contain note that third party software is not allowed on the server (bsc#1105497)
-
SUSE Manager 3.2 Proxy online doc: broken links (bsc#1102857)
-
Entities added to single file entities.adoc
-
Cleaned up adoc sources
-
Added a Dockerfile for building docs via a single command see: doc-susemanager/docker-builder instructions coming soon
-
- susemanager-schema
-
-
Check valid postgresql database version
-
Add index for HW address on network interface
-
- susemanager-sls
-
-
Install all available known kiwi boot descriptions
-
Fix: Cleanup Kiwi cache in highstate (bsc#1109892)
-
Removed the ssl certificate verification while checking bootstrap repo URL (bsc#1095220)
-
Removed the need for curl to be present at bootstrap phase (bsc#1095220)
-
- susemanager-sync-data
-
-
Add SUSE Manager for Retail Branch Server (bsc#1108004)
-
- tftpd-formula
-
-
Adjust tftpd defaults for standalone use
-
- vsftpd-formula
-
-
Adjusted default directory
-
Use boolean values in pillar
-
Version 3.2.2
- patterns-suse-manager
-
-
Remove unneeded requires for minion proxy; traditional clients still will get those packages via bootstrap repo
-
- py26-compat-salt
-
-
Prepend current directory when path is just filename (bsc#1095942)
-
- spacecmd
-
-
Suggest not to use password option for spacecmd (bsc#1103090)
-
- spacewalk-backend
-
-
Channels to be actually un-subscribed from the assigned systems when being removed using spacewalk-remove-channel tool(bsc#1104120)
-
Take only text files from /srv/salt to make spacewalk-debug smaller (bsc#1103388)
-
- spacewalk-branding
-
-
Missing link to LDAP instructions (bsc#1102464)
-
Fix copyright for the package specfile (bsc#1103696)
-
Feat: add OS Image building with Kiwi (fate#322959 fate#323057 fate#323056)
-
- spacewalk-certs-tools
-
-
Feat: check for Dynamic CA-Trust Updates while bootstrapping on RES (FATE#325588)
-
Feat: add OS Image building with Kiwi (fate#322959 fate#323057 fate#323056)
-
- spacewalk-config
-
-
Feat: add OS Image building with Kiwi fate#322959 fate#323057 fate#323056
-
Fix /etc/sudoers.d/spacewalk file (related to bsc#1099517)
-
- spacewalk-java
-
-
Fix mgr-sync refresh when subscription was removed (bsc#1105720)
-
Method to Unsubscribe channel from system (bsc#1104120)
-
Enable auto patch updates for salt clients
-
Fix ACLs for system details settings
-
Fix: delete old custom OS images pillar before generation (bsc#1105107)
-
Fix an error in the system software channels UI due to SUSE product channels missing a corresponding synced channel (bsc#1105886)
-
Fix 'Compare Config Files' task hanging (bsc#1103218)
-
Reschedule taskomatic jobs if task threads limit reached (bsc#1096511)
-
XMLRPC API for state channels
-
Subscribe saltbooted minion to software channels, respect activation key in final registration steps
-
Fix deletion of Taskomatic schedules via the GUI (bsc#1095569)
-
Generate OS image pillars via Java
-
Logic constraint: results must be ordered and grouped by systemId first (bsc#1101033)
-
Store activation key in the Kiwi built image
-
Do not wrap output if stderr is not present (bsc#1105074)
-
Store image size in image pillar as integer value
-
Fix retrieving salt-ssh pub key for proxy setup when key already exists (bsc#1105062)
-
Implement the 2-phase registration of saltbooted minions (SUMA for Retail)
-
Avoid an NPE on expired tokens (bsc#1104503)
-
Generate systemid certificate on suse/systemid/generate event (fate#323069)
-
Fix system group overview patch status (bsc#1102478)
-
Allow salt systems to be registered as proxies (fate#323069)
-
Add DNS name to cobbler network interface (fate#326501, bsc#1104020)
-
Fix behavior when canceling actions (bsc#1098993)
-
Speedup listing systems of a group (bsc#1102009)
-
Disallow '.' in config channel names (bsc#1100731)
-
Add python3 xmlrpc api example to docs.
-
Feat: add OS Image building with Kiwi (fate#322959 fate#323057 fate#323056)
-
Apply State Result - use different color for applied changes
-
Fix missing acl to toggle notifications in user prefs in salt clients (bsc#1100131)
-
- spacewalk-setup
-
-
Clean up correct system sudoers file (bsc#1099517)
-
Feat: add OS Image building with Kiwi (fate#322959 fate#323057 fate#323056)
-
- spacewalk-web
-
-
Allow relative path in
visibleIf
tag in formulas -
Feat: add OS Image building with Kiwi (fate#322959 fate#323057 fate#323056)
-
Refactor the fetching and cache the child channels and mandatory channels in System Details change channels page
-
- subscription-matcher
-
-
Update partnumbers rule file (bsc#1095972)
-
Use intermediate object to store confirmed matches within a penalty group and prevent infinite reactivation of Inherited virtualization rule (bsc#1094524)
-
- susemanager
-
-
Bootstrap repos for SLE12 SP4 (bsc#1107117)
-
Do not fail if postgresql user has no interactive login shell
-
Fix broken stderr redirection in mgr-setup
-
Add new dependency python-setuptools to bootstrap packages (bsc#1106026)
-
Add debug mode for mgr-create-bootstrap-repo
-
Feat: add OS Image building with Kiwi (fate#322959 fate#323057 fate#323056)
-
- susemanager-docs_en
-
-
OS Image building with Kiwi: SUSE Manager can now build Kiwi-based image creation for installable Linux OS images and virtual machines.
-
Missing link to LDAP instructions (bsc#1102464)
-
- susemanager-schema
-
-
Enable auto patch updates for Salt minions
-
Enable system preferences for Salt minions (bsc#1098388)
-
Feat: add OS Image building with Kiwi (fate#322959 fate#323057 fate#323056)
-
- susemanager-sls
-
-
Fix merging of image pillars
-
Fix: delete old custom OS images pillar before generation (bsc#1105107)
-
Generate OS image pillars via Java
-
Store activation key in the Kiwi built image
-
Implement the 2-phase registration of saltbooted minions (SUSE Manager for Retail)
-
Feat: add OS Image building with Kiwi (fate#322959 fate#323057 fate#323056)
-
- susemanager-sync-data
-
-
Support SLE12 SP4 product family (bsc#1107117)
-
Add CaaSP 3.0 channels (bsc#1105045)
-
Add product class for Live Patching on PPC (bsc#1104025)
-
Version 3.2.1
- cobbler
-
-
Do not try to hardlink to a symlink. The result will be a dangling symlink in the general case (bsc#1097733)
-
- nutch-core
-
-
Fix nutch log level (bsc#1097145)
-
Fix hadoop log dir (bsc#1061574)
-
- py26-compat-salt
-
-
Handle packages with multiple version properly with zypper (bsc#1096514)
-
Fix file.get_diff regression in 2018.3 (bsc#1098394)
-
Fix file.managed binary file utf8 error (bsc#1098394)
-
Add custom SUSE capabilities as Grains (bsc#1089526)
-
Bugfix: state file.line warning (bsc#1093458)
-
Enable '--with-salt-version' parameter for setup.py script
-
Add environment variable to know if yum is invoked from Salt (bsc#1057635)
-
- spacewalk-backend
-
-
Fix directory permissions (bsc#1101152)
-
Feature: implement optional signing repository metadata
-
Fix truncated result message of server actions (bsc#1039043)
-
Do not copy 'foreign_entitlement' from virtual host to the registered guest (bsc#1093381)
-
- spacewalk-branding
-
-
Disable child channel selection only if channel is actually assigned (bsc#1097697)
-
- spacewalk-config
-
-
Remove not needed build dependency to cobbler (bsc#1102137)
-
- spacewalk-java
-
-
Fix: errata id should be unique (bsc#1089662)
-
Fix race condition when applying patches to systems (bsc#1097250)
-
Improve cve-server-channels Taskomatic task’s performance (bsc#1094524)
-
Fix union and intersection button in grouplist (bsc#1100570)
-
Fix checking for salt pkg upgrade when generating action chain sls
-
Add queue=true to state.apply calls generated in action chain sls files
-
Feature: show ordered and formated output of state apply results
-
Fix defining a schedule for repo-sync (bsc#1100793)
-
Drop removed network interfaces on hardware profile update (bsc#1099781)
-
Feature: implement test-mode for highstate UI
-
Feature: implement optional signing repository metadata
-
Valid optional channel must be added before reposync starts (bsc#1099583)
-
Fix tabs and links in the SSM "Misc" section (bsc#1098388)
-
Handle binary files appropriately (bsc#1096264)
-
XML-RPC API call system.scheduleChangeChannels() fails when no children are given (bsc#1098815)
-
Ignore inactive containers in Kubernetes clusters
-
Explicitly require IBM java for SLES < SLE15 (bsc#1099454)
-
Do not break backward compatibility on package installation/removal (bsc#1096514)
-
Fix minion software profile to allow multiple installed versions for the same package name (bsc#1089526)
-
Fix NPE in image pages when showing containers with non-SUSE distros (bsc#1097676)
-
Do not log when received 'docker://' prefix from Kubernetes clusters
-
Fix cleaning up tasks when starting up taskomatic (bsc#1095210)
-
Mark all proceeding actions in action-chain failed after an action failed(bsc#1096510)
-
Check if directory /srv/susemanager/salt/actionchains exists before deleting minion action chain files
-
Specify old udev name as alternative when parsing hw results
-
Fix detection of a xen virtualization host (bsc#1096056)
-
Fix hardware refresh with multiple IPs on a network interface (bsc#1041134)
-
Fix truncated result message of server actions (bsc#1039043)
-
Fix: limit naming of action chain (bsc#1086335)
-
Add missing result fields for errata query (bsc#1097615)
-
Add new 'upgrade_satellite_refresh_custom_sls_files' task to refresh custom SLS files generated for minions (bsc#1094543)
-
Improve gatherer-matcher Taskomatic task’s performance (bsc#1094524)
-
Show chain of proxies correctly (bsc#1084128)
-
- spacewalk-search
-
-
Fix the search when server is missing primary interface (bsc#1099638)
-
- spacewalk-setup
-
-
Sudoers file is now in /etc/sudoers.d/spacewalk (bsc#1099517)
-
- spacewalk-web
-
-
Refactor buttons.js
-
Feature: implement test-mode for highstate UI
-
Disable child channel selection only if channel is actually assigned(bsc#1097697)
-
Fix typo in 'Installed Products' label in image overview page
-
Fix css issues on minion-state pages (bsc#1083295)
-
Show feedback on button clicked (bsc#1085464)
-
Show chain of proxies correctly (bsc#1084128)
-
Improve the gulpfile watch mode performance (bsc#1096747)
-
- susemanager
-
-
Fix mgr-create-bootstrap-repo with custom channels (bsc#1099934)
-
Add package python-pyudev for bootstrapping (bsc#1099311)
-
Feat: allow cleanup of bootstrap repo (bsc#1096204)
-
- susemanager-frontend-libs
-
-
Update susemanager-nodejs-sdk-devel to 1.0.2 (bsc#1096747)
-
- susemanager-schema
-
-
Copy missing action-chain schema migration to correct directory (bsc#1100760)
-
Fix truncated result message of server actions (bsc#1039043)
-
Fix config channels state revision inconsistency after migration (bsc#1094543)
-
- susemanager-sls
-
-
Use custom Salt capabilities to prevent breaking backward compatibility (bsc#1096514)
-
Update profileupdate.sls to report all versions installed (bsc#1089526)
-
Do not install 'python-salt' on container build hosts with older Salt versions (bsc#1097699)
-
Major changes since SUSE Manager 3.1 Server
Salt 2018.3.0
Salt has been upgraded to the final 2018.3.0 release.
We do intend to upgrade Salt regularly to more recent versions.
Salt action chains
Action chains are enabled for Salt minions now. It works like action chains for traditional clients, see the documentation for details.
SLE 15
The SLE 15 product family is fully supported as a client operating system.
Due to its new module concept, the product selection page in SUSE Manager was redesigned. Please see the documentation about choosing SLE 15 modules.
SLES 15 and Python 3
SLES 15 utilizes Python 3 as its default system version. Due to this change any older bootstrap scripts (based on python 2) must be regenerated for SLES 15 systems.
Attempting to register SLES 15 systems with SUSE Manager using Python 2 versions of the bootstrap script will fail.
Formulas with Forms improvements
-
Formula data can now be managed with XMLRPC API.
-
New types so almost any kind of upstream formula can be handled by SUSE Manager.
SUSE Manager Proxy versions
SUSE Manager 3.2 Server can work with version 3.1 of SUSE Manager Proxy.
When upgrading, upgrade the server first, followed by proxies. See the advanced topics manual for detailed upgrade instructions.
Upstream changes since SUSE Manager 3.1
Note: Changes from the upstream project are listed here as-is. There’s no guarantee that all of them are actually available in SUSE Manager 3.2 Server.
Spacewalk 2.8
SUSE Manager 3.2 Server is based on Spacewalk 2.8 with many new features added by SUSE.
-
Spacewalk now installable on Fedora 27 and has been tested on Fedora 28 Beta as well
-
Spacewalk supports Fedora 27 and Fedora 28 clients
-
Python 2 packages are no longer needed on systems with Python 3 as default
-
Spacewalk server is now capable of syncing and distributing of Fedora modularity (modules.yaml) files.
-
PostgreSQL 10 is now supported
-
Package dwr updated to version 3.0.2 fixing security vulnerabilities
-
It’s now possible to manage errata severities via Spacewalk server Several bugfixes
-
Updated API calls:
-
- add possibility to manage severitieserrata.create/setDetails
-
- support removal of packages which are not in databasesystem.schedulePackageRemoveByNevra
-
Spacewalk 2.7
-
Spacewalk now supported on Fedora 25 and Fedora 26
-
Spacewalk supports Fedora 25 and Fedora 26 clients
-
Improved Debian/Ubuntu version parsing and matching
-
Spacewalk wiki now hosted on GitHub
-
Significant improvements to channel synchronization speed
-
New utility to monitor what taskomatic daemon is doing - taskotop is part of spacewalk-utils package
-
jabberd, which support OSAD, now uses sqlite database for improved reliability
-
jpackage libraries/packages replaced with standard ones
-
Improved kickstart profile support
-
New API calls:
-
channel.listManageableChannels
-
schedule.failSystemAction
-
-
API calls restored for backward compatibility:
-
proxy.createMonitoringScout
-
satellite.isMonitoringEnabled
-
satellite.isMonitoringEnabledBySystemId
-
Support
Supportconfig confidentiality disclaimer
When handling Service Requests, supporters and engineers may ask for the output of the supportconfig tool from the SUSE Manager Server or clients.
The standard disclaimer applies:
Detailed system information and logs are collected and organized in a manner that helps reduce service request resolution times. Private system information can be disclosed when using this tool. If this is a concern, please prune private data from the log files. Several startup options are available to exclude more sensitive information. Supportconfig data is used only for diagnostic purposes and is considered confidential information.
In the SUSE Manager Server’s case, please be aware that supportconfig’s output will contain information about clients as well.
In particular, debug data for the Subscription Matching feature contain a list of the registered clients, their installed product and some minimal hardware information (CPU socket count). It also contains a copy of subscription data available from the SUSE Customer Center.
If this is a concern, please prune data in the subscription-matcher directory in the spacewalk-debug tarball.
Supportability of embedded software components
All software components embedded into SUSE Manager, like Cobbler for PXE booting, are only supported in the context of SUSE Manager. Stand-alone usage is not supported.
Red Hat Channels
Managing Red Hat clients requires availability of appropriate Red Hat packages. These are not available through the SUSE Customer Center (SCC) but must be provided by other means, e.g. from a retired Red Hat Satellite installation.
Support for EOL’ed products
The SUSE Manager engineering team provides 'best effort' support for products past their end-of-life date. See the Product Support Lifecycle page.
This support is limited to scenarios to bring production systems to a supported state. Either by migrating to a supported service pack or by upgrading to a supported product version.
spacewalk-utils
spacewalk-utils, a packaged set of command line tools, continues to be L1* supported only - with some exceptions. Any of these commands needs expertise and can break your system. However, we consider these tools valuable enough to be included, but not fully supported.
-
L1 (Problem determination, which means technical support designed to provide compatibility information, usage support, on-going maintenance, information gathering and basic troubleshooting using available documentation.)
The following tools of spacewalk-utils are fully supported:
-
spacewalk-clone-by-date
-
spacewalk-sync-setup
-
spacewalk-manage-channel-lifecycle
Providing feedback to our products
In case of encountering a bug please report it through your support contact.
Documentation and other information
Technical Information: SUSE Manager contains additional or updated documentation for SUSE Manager Server 3.2.
These Release Notes are available online. Further information about SUSE Manager is available [in the Wiki http://wiki.microfocus.com/index.php/SUSE_Manager]
Visit http://www.suse.com for the latest Linux product news from SUSE and http://www.suse.com/download-linux/source-code.html for additional information on the source code of SUSE Linux Enterprise products.
Legal Notices
SUSE Linux GmbH Maxfeldstr. 5 D-90409 Nürnberg Tel: +49 (0)911 740 53 - 0 Email: feedback@suse.com Registrierung/Registration Number: HRB 21284 AG Nürnberg Geschäftsführer/Managing Director: Felix Imendörffer, Jane Smithard, Graham Norton, Steuernummer/Sales Tax ID: DE 192 167 791 Erfüllungsort/Legal Venue: Nürnberg
SUSE makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, SUSE reserves the right to revise this publication and to make changes to its content, at any time, without the obligation to notify any person or entity of such revisions or changes.
Further, SUSE makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, SUSE reserves the right to make changes to any and all parts of SUSE software, at any time, without any obligation to notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classifications to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical/biological weaponry end uses. Please refer to the Microfocus Legal information page for more information on exporting SUSE software. SUSE assumes no responsibility for your failure to obtain any necessary export approvals.
Copyright © 2012-2018 SUSE LLC. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher.
SUSE has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at https://www.microfocus.com/about/legal and one or more additional patents or pending patent applications in the U.S. and other countries.
For SUSE trademarks, see SUSE Trademark and Service Mark list. All third-party trademarks are the property of their respective owners.
Colophon
Thank you for using SUSE Manager Server in your business.
Your SUSE Manager Server Team.