[Spacewalk-list] Please verify my kickstart configuration

Mohit Vadhera project.linux.proj at gmail.com
Tue Dec 4 07:42:12 UTC 2012


why the tftp service is not running on the spacewalk server?

# netstat -ntulp | grep -i tftp



On Mon, Dec 3, 2012 at 4:41 PM, Mohit Vadhera
<project.linux.proj at gmail.com>wrote:

> Can you please check my below 3 steps that i used to create kickstart
> configuration. It is not working.
>
> 1)  Created Distribution
>
> Distribution Label*: Centos-6-x86_64_kickstart
> Tree Path*: /var/distro-trees/Centos-6-x86_64
> Base Channel*: spacewalk_cli
> Installer Generation*: Red Hat Enterprise Linux 6
>
>
>
> 2) Under Kickstart > Profile > Kickstart file.
>
> # Kickstart config file generated by Spacewalk Config Management
> # Profile Label : Centos6_kickstart
> # Date Created  : 2012-11-28 04:50:35.814851
>
> install
> text
> network --bootproto dhcp
> url --url http://172.20.3.32/ks/dist/Centos-6-x86_64_kickstart
> lang en_US
> keyboard us
> zerombr
> clearpart --all
> bootloader --location mbr
> timezone America/New_York
> auth --enablemd5 --enableshadow
> rootpw --iscrypted $1$atc.HgK3$59Uy2fE4ZJ30pmY/f2fY//
> selinux --permissive
> reboot
> firewall --disabled
> skipx
> part /boot --fstype=ext3 --size=200
> part pv.01 --size=1000 --grow
> part swap --size=1000   --maxsize=2000
> volgroup myvg pv.01
> logvol / --vgname=myvg --name=rootvol --size=1000 --grow
>
> %packages
> @ Base
> %end
>
> %pre
>
> wget "
> http://172.20.3.32/cblr/svc/op/trig/mode/pre/profile/Centos6_kickstart:1:SpacewalkDefaultOrganization"
> -O /dev/null
>
> echo "Saving RHN keys..." > /dev/ttyS0
> SYSTEM_ID=/etc/sysconfig/rhn/systemid
> rhn_keys_found=no
>
> mkdir -p /tmp/rhn
>
> drives=$(list-harddrives | awk '{print $1}')
> for disk in $drives; do
>     DISKS="$DISKS $(fdisk -l /dev/$disk | grep -v "swap\|LVM\|Extended" |
> awk '/^\/dev/{print $1}')"
> done
>
> # Try to find the keys on ordinary partitions
> for disk in $DISKS; do
>     name=test-$(basename $disk)
>     mkdir -p /tmp/$name
>     mount $disk /tmp/$name
>     [ $? -eq 0 ] || continue # Skip to the next partition if the mount
> fails
>
>     # Copy current RHN host keys out to be reused
>     if [ -f /tmp/${name}$SYSTEM_ID ]; then
>         cp -a /tmp/${name}$SYSTEM_ID /tmp/rhn
>         rhn_keys_found="yes"
>         umount /tmp/$name
>         break
>     fi
>     umount /tmp/$name
>     rm -r /tmp/$name
> done
>
> # Try LVM if that didn't work
> if [ "$rhn_keys_found" = "no" ]; then
>     lvm lvmdiskscan
>     vgs=$(lvm vgs | tail -n +2 | awk '{ print $1 }')
>     for vg in $vgs; do
>         # Activate any VG we found
>         lvm vgchange -ay $vg
>     done
>
>     lvs=$(lvm lvs | tail -n +2 | awk '{ print "/dev/" $2 "/" $1 }')
>     for lv in $lvs; do
>         tmpdir=$(mktemp -d findkeys.XXXXXX)
>         mkdir -p /tmp/${tmpdir}
>         mount $lv /tmp/${tmpdir} || continue # Skip to next volume if this
> fails
>
>         # Let's see if the keys are in there
>         if [ -f /tmp/${tmpdir}$SYSTEM_ID ]; then
>             cp -a /tmp/${tmpdir}$SYSTEM_ID /tmp/rhn/
>             rhn_keys_found="yes"
>             umount /tmp/${tmpdir}
>             break # We're done!
>         fi
>         umount /tmp/${tmpdir}
>         rm -r /tmp/${tmpdir}
>     done
>
>     # And clean up..
>     for vg in $vgs; do
>         lvm vgchange -an $vg
>     done
> fi
>
>
> %end
>
> %post --nochroot
> mkdir /mnt/sysimage/tmp/ks-tree-copy
> if [ -d /oldtmp/ks-tree-shadow ]; then
> cp -fa /oldtmp/ks-tree-shadow/* /mnt/sysimage/tmp/ks-tree-copy
> elif [ -d /tmp/ks-tree-shadow ]; then
> cp -fa /tmp/ks-tree-shadow/* /mnt/sysimage/tmp/ks-tree-copy
> fi
> cp /etc/resolv.conf /mnt/sysimage/etc/resolv.conf
> cp -f /tmp/ks-pre.log* /mnt/sysimage/root/ || :
>
> %end
>
> %post --nochroot --interpreter /usr/bin/python
> try:
>     import xmlrpclib
>     import shutil
>     import sys
>     import os.path
>     old_system_id = "/tmp/rhn/systemid"
>     new_system_id = "/mnt/sysimage/root/systemid.old"
>
>     new_keys = "1-cf6f587afe9af315b2e2b87ceb11c4a9"
>     for key in new_keys.split(','):
>         if key.startswith('re-'):
>             sys.exit(0)
>     if os.path.exists(old_system_id):
>         client =  xmlrpclib.Server("http://172.20.3.32/rpc/api")
>         key =
> client.system.obtain_reactivation_key(open(old_system_id).read())
>         f = open("/mnt/sysimage/tmp/key","w")
>         f.write(key)
>         f.close()
>         shutil.copy(old_system_id, new_system_id)
> except:
>     # xml rpc due to  a old/bad system id
>     # we don't care about those
>     # we'll register those as new.
>     pass
>
>
> %end
>
> %post --log /root/ks-rhn-post.log
> # --Begin Spacewalk command section--
> cat > /tmp/ssl-key-1 <<'EOF'
> Certificate:
>     Data:
>         Version: 3 (0x2)
>         Serial Number:
>             d6:8b:86:88:9f:13:e6:ee
>         Signature Algorithm: sha1WithRSAEncryption
>         Issuer: C=IN, ST=Delhi, L=India, O=opera solutions, OU=Infra-Yum1,
> CN=Infra-Yum1
>         Validity
>             Not Before: Nov 20 09:24:23 2012 GMT
>             Not After : Nov 14 09:24:23 2036 GMT
>         Subject: C=IN, ST=Delhi, L=India, O=opera solutions,
> OU=Infra-Yum1, CN=Infra-Yum1
>         Subject Public Key Info:
>             Public Key Algorithm: rsaEncryption
>                 Public-Key: (2048 bit)
>                 Modulus:
>                     00:e7:2a:d4:76:f4:ad:92:de:4c:60:3e:2e:bd:ba:
>                     89:96:3c:88:0c:7d:bb:a0:62:7d:2a:6b:00:d1:0c:
>                     c0:93:bd:d1:12:05:ac:7b:52:a7:6f:2a:bb:3d:12:
>                     86:0d:45:3c:a8:c2:8b:90:50:4e:82:40:f0:c0:53:
>                     1f:5a:03:24:14:07:24:79:e1:b4:8c:5c:f5:b5:bc:
>                     ca:d0:07:b4:4c:5b:2e:b3:01:d8:12:0e:27:74:02:
>                     8d:59:e6:56:6b:b0:3a:45:68:24:08:72:9e:98:e0:
>                     cf:e0:59:88:3a:08:e1:a0:90:58:7b:ca:8d:41:9f:
>                     56:70:73:7e:d6:19:dc:4d:8a:ef:83:5b:d5:fb:27:
>                     a1:97:36:86:ac:4f:7c:db:01:3f:4c:6e:a3:40:20:
>                     8c:2e:34:5d:f3:d6:ef:ec:02:d3:34:b6:7c:67:60:
>                     69:c9:94:7f:39:b2:06:24:91:6c:04:c0:cb:cb:2b:
>                     ae:03:3a:8b:d4:40:b3:d9:fd:52:f6:3c:fe:70:2d:
>                     ba:f5:44:54:32:d1:96:7f:12:b1:c6:a9:f1:fa:ea:
>                     4a:9b:a9:5d:c1:f4:d9:b3:db:a4:13:ce:59:5c:ea:
>                     4c:c7:b2:ba:63:2e:bf:35:79:1f:7a:56:c4:1c:e4:
>                     fc:0a:fd:c1:8c:f4:47:11:15:20:bf:ab:cc:76:74:
>                     86:bd
>                 Exponent: 65537 (0x10001)
>         X509v3 extensions:
>             X509v3 Basic Constraints:
>                 CA:TRUE
>             X509v3 Key Usage:
>                 Digital Signature, Key Encipherment, Certificate Sign
>             X509v3 Extended Key Usage:
>                 TLS Web Server Authentication, TLS Web Client
> Authentication
>             Netscape Comment:
>                 RHN SSL Tool Generated Certificate
>             X509v3 Subject Key Identifier:
>                 C8:40:CC:F0:B8:FA:C5:2F:28:E3:B3:76:34:4F:28:5D:61:32:49:D1
>             X509v3 Authority Key Identifier:
>
> keyid:C8:40:CC:F0:B8:FA:C5:2F:28:E3:B3:76:34:4F:28:5D:61:32:49:D1
>                 DirName:/C=IN/ST=Delhi/L=India/O=opera
> solutions/OU=Infra-Yum1/CN=Infra-Yum1
>                 serial:D6:8B:86:88:9F:13:E6:EE
>
>     Signature Algorithm: sha1WithRSAEncryption
>         de:a9:e9:cb:7a:4f:bc:bb:ac:d2:53:4c:08:bf:12:dd:ed:8e:
>         c9:b4:47:1d:64:13:c9:42:b7:48:92:a3:32:2e:83:a2:76:27:
>         a0:d1:5d:93:8c:de:c3:ff:b6:79:7d:e1:ca:54:e5:30:b8:05:
>         de:23:1b:56:2e:ee:62:eb:4d:5e:54:5b:3b:70:e2:97:6c:87:
>         27:8a:b4:e0:f7:ae:31:ee:c8:a6:a7:60:8e:3a:1b:b0:9f:1e:
>         70:a2:7b:2f:ab:51:d1:e3:cc:b2:e3:b3:5a:72:8b:15:36:1d:
>         48:4a:08:68:04:31:20:f6:42:79:c8:13:9b:b6:c6:bb:f3:4d:
>         07:96:69:8f:74:63:2d:27:3f:4f:97:ef:e8:cb:c3:71:f3:2b:
>         0d:22:3d:89:33:f0:ab:4a:f3:e6:3d:44:7b:24:c3:f8:c7:ec:
>         92:92:b9:f9:b1:cb:50:cd:25:fd:52:c4:8a:e6:ab:d9:cb:15:
>         83:d5:2c:0c:b2:06:9f:97:73:43:90:91:23:b7:95:f1:35:8e:
>         32:77:0c:cf:5b:65:65:00:5a:6b:b7:27:34:c5:a6:ce:92:76:
>         e2:ab:e6:2a:0b:c6:40:2f:8d:9c:96:52:fa:ea:d0:a0:6a:34:
>         92:8f:9f:0d:b3:37:57:86:cb:54:c3:6f:c4:da:89:e0:9c:80:
>         fb:df:08:cb
> -----BEGIN CERTIFICATE-----
> MIIEnTCCA4WgAwIBAgIJANaLhoifE+buMA0GCSqGSIb3DQEBBQUAMHExCzAJBgNV
> BAYTAklOMQ4wDAYDVQQIEwVEZWxoaTEOMAwGA1UEBxMFSW5kaWExGDAWBgNVBAoT
> D29wZXJhIHNvbHV0aW9uczETMBEGA1UECxMKSW5mcmEtWXVtMTETMBEGA1UEAxMK
> SW5mcmEtWXVtMTAeFw0xMjExMjAwOTI0MjNaFw0zNjExMTQwOTI0MjNaMHExCzAJ
> BgNVBAYTAklOMQ4wDAYDVQQIEwVEZWxoaTEOMAwGA1UEBxMFSW5kaWExGDAWBgNV
> BAoTD29wZXJhIHNvbHV0aW9uczETMBEGA1UECxMKSW5mcmEtWXVtMTETMBEGA1UE
> AxMKSW5mcmEtWXVtMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOcq
> 1Hb0rZLeTGA+Lr26iZY8iAx9u6BifSprANEMwJO90RIFrHtSp28quz0Shg1FPKjC
> i5BQToJA8MBTH1oDJBQHJHnhtIxc9bW8ytAHtExbLrMB2BIOJ3QCjVnmVmuwOkVo
> JAhynpjgz+BZiDoI4aCQWHvKjUGfVnBzftYZ3E2K74Nb1fsnoZc2hqxPfNsBP0xu
> o0AgjC40XfPW7+wC0zS2fGdgacmUfzmyBiSRbATAy8srrgM6i9RAs9n9UvY8/nAt
> uvVEVDLRln8Sscap8frqSpupXcH02bPbpBPOWVzqTMeyumMuvzV5H3pWxBzk/Ar9
> wYz0RxEVIL+rzHZ0hr0CAwEAAaOCATYwggEyMAwGA1UdEwQFMAMBAf8wCwYDVR0P
> BAQDAgKkMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAxBglghkgBhvhC
> AQ0EJBYiUkhOIFNTTCBUb29sIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
> FgQUyEDM8Lj6xS8o47N2NE8oXWEySdEwgaMGA1UdIwSBmzCBmIAUyEDM8Lj6xS8o
> 47N2NE8oXWEySdGhdaRzMHExCzAJBgNVBAYTAklOMQ4wDAYDVQQIEwVEZWxoaTEO
> MAwGA1UEBxMFSW5kaWExGDAWBgNVBAoTD29wZXJhIHNvbHV0aW9uczETMBEGA1UE
> CxMKSW5mcmEtWXVtMTETMBEGA1UEAxMKSW5mcmEtWXVtMYIJANaLhoifE+buMA0G
> CSqGSIb3DQEBBQUAA4IBAQDeqenLek+8u6zSU0wIvxLd7Y7JtEcdZBPJQrdIkqMy
> LoOidieg0V2TjN7D/7Z5feHKVOUwuAXeIxtWLu5i601eVFs7cOKXbIcnirTg964x
> 7simp2COOhuwnx5wonsvq1HR48yy47NacosVNh1ISghoBDEg9kJ5yBObtsa7800H
> lmmPdGMtJz9Pl+/oy8Nx8ysNIj2JM/CrSvPmPUR7JMP4x+ySkrn5sctQzSX9UsSK
> 5qvZyxWD1SwMsgafl3NDkJEjt5XxNY4ydwzPW2VlAFprtyc0xabOknbiq+YqC8ZA
> L42cllL66tCgajSSj58NszdXhstUw2/E2ongnID73wjL
> -----END CERTIFICATE-----
>
> EOF
> # ssl-key1
> cat /tmp/ssl-key-* > /usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT
> perl -pe 's/RHNS-CA-CERT/RHN-ORG-TRUSTED-SSL-CERT/g' -i
> /etc/sysconfig/rhn/up2date
>
> mkdir -p /tmp/rhn_rpms/optional
> cd /tmp/rhn_rpms/optional
> wget -P /tmp/rhn_rpms/optional
> http://172.20.3.32/download/package/7a24d4867f44d92cccea1f84f48d644acc0e7be5/0/1/8226/rhnlib-2.5.55-1.el6.noarch.rpm
>
> rpm -Uvh --replacepkgs --replacefiles /tmp/rhn_rpms/optional/pyOpenSSL*
> /tmp/rhn_rpms/optional/rhnlib* /tmp/rhn_rpms/optional/libxml2-python*
> perl -npe 's|^(\s*(noSSLS\|s)erverURL\s*=\s*[^:]+://)[^/]*/|${1}
> 172.20.3.32/| <http://172.20.3.32/%7C>' -i /etc/sysconfig/rhn/up2date
>
> # now copy from the ks-tree we saved in the non-chroot checkout
> cp -fav /tmp/ks-tree-copy/* /
> rm -Rf /tmp/ks-tree-copy
> # --End Spacewalk command section--
>
> # begin cobbler snippet
> # set default MOTD
> echo "Kickstarted on $(date +'%Y-%m-%d')" >> /etc/motd
>
> # begin Red Hat management server registration
> mkdir -p /usr/share/rhn/
> wget http://172.20.3.32/pub/RHN-ORG-TRUSTED-SSL-CERT -O
> /usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT
> perl -npe 's/RHNS-CA-CERT/RHN-ORG-TRUSTED-SSL-CERT/g' -i
> /etc/sysconfig/rhn/*
> if [ -f /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release ]; then
>     rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
> fi
> key=""
> if [ -f /tmp/key ]; then
>     key=`cat /tmp/key`
> fi
>
> if [ $key ]; then
>     rhnreg_ks --serverUrl=https://172.20.3.32/XMLRPC--sslCACert=/usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT
> --activationkey=$key,1-cf6f587afe9af315b2e2b87ceb11c4a9
> else
>      rhnreg_ks --serverUrl=https://172.20.3.32/XMLRPC--sslCACert=/usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT
> --activationkey=1-cf6f587afe9af315b2e2b87ceb11c4a9
> fi
> # end Red Hat management server registration
>
> # end cobbler snippet
>
> rhn_check
>
> # Start post_install_network_config generated code
> # End post_install_network_config generated code
>
> %end
>
>
> %post
>
>
> # Start koan environment setup
> echo "export COBBLER_SERVER=172.20.3.32" > /etc/profile.d/cobbler.sh
> echo "setenv COBBLER_SERVER 172.20.3.32" > /etc/profile.d/cobbler.csh
> # End koan environment setup
>
>
>
> wget "
> http://172.20.3.32/cblr/svc/op/ks/profile/Centos6_kickstart:1:SpacewalkDefaultOrganization"
> -O /root/cobbler.ks
> wget "
> http://172.20.3.32/cblr/svc/op/trig/mode/post/profile/Centos6_kickstart:1:SpacewalkDefaultOrganization"
> -O /dev/null
> %end
>
>
>
> 3) Then i moved to my vmware client , started with PXE  and got the below
> error while booting.
>
> PXE-E53: No boot filename received
> PXE-M0F: Exiting Intel PXE ROM
> Operating System not found.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listman.redhat.com/archives/spacewalk-list/attachments/20121204/de0abf3a/attachment.htm>


More information about the Spacewalk-list mailing list