Hello JP,
Thankyou for the prompt reply.
The system was built using satellite 6.7
A .treeinfo was created to make AppStream available:
[general]
timestamp = 1605916713.4751067
family = Springdale Linux
version = 8.3
name = Springdale Linux-8.3
short = SDL
variant = BaseOS
arch = x86_64
packagedir = Packages
variants = AppStream,BaseOS
platforms = x86_64,xen
[header]
type = productmd.treeinfo
version = 1.2
[stage2]
mainimage = images/install.img
[images-x86_64]
kernel = images/pxeboot/vmlinuz
initrd = images/pxeboot/initrd.img
efiboot.img = images/efiboot.img
boot.iso = images/boot.iso
[images-xen]
kernel = images/pxeboot/vmlinuz
initrd = images/pxeboot/initrd.img
[release]
name = Springdale Linux
short = SDL
version = 8.3
[tree]
arch = x86_64
build_timestamp = 1559832596
platforms = x86_64,xen
variants = AppStream,BaseOS
[variant-AppStream]
id = AppStream
name = AppStream
packages = ../Springdale_8_3_x86_64_os_AppStream//Packages
repository = ../Springdale_8_3_x86_64_os_AppStream
type = variant
uid = AppStream
[variant-BaseOS]
id = BaseOS
name = BaseOS
packages = Packages
repository = .
type = variant
uid = BaseOS
The standard satellite kickstart template was used with no customizations.
Here is the kickstart:
lang en_US.UTF-8
selinux --enforcing
keyboard us
skipx
network --bootproto static --ip=192.168.100.82 --netmask=255.255.255.0 --gateway=192.168.100.4 --nameserver=192.168.1.161 --mtu=1500 --hostname
chad-burchess.test.netremedies.ca --device=00:50:56:96:05:be
rootpw --iscrypted $5$MnF7RkL5iTuRaGjq$2G.FFC3HM4wtRW/3WTXYEWFu0EQwPTAyYw.bloogHo.
firewall --service=ssh
authselect --useshadow --passalgo=sha256 --kickstart
timezone --utc UTC
services --disabled gpm,sendmail,cups,pcmcia,isdn,rawdevices,hpoj,bluetooth,openibd,avahi-daemon,avahi-dnsconfd,hidd,hplip,pcscd
bootloader --location=mbr --append="nofb quiet splash=quiet"
zerombr
clearpart --all --initlabel
autopart
text
reboot --eject
%packages
yum
dhclient
chrony
wget
@Core
redhat-lsb-core
%end
%post --nochroot
exec < /dev/tty3 > /dev/tty3
#changing to VT 3 so that we can see whats going on....
/usr/bin/chvt 3
(
cp -va /etc/resolv.conf /mnt/sysimage/etc/resolv.conf
/usr/bin/chvt 1
) 2>&1 | tee /mnt/sysimage/root/install.postnochroot.log
%end
%post --log=/mnt/sysimage/root/install.post.log
exec < /dev/tty3 > /dev/tty3
#changing to VT 3 so that we can see whats going on....
/usr/bin/chvt 3
# interface
real=`grep -l 00:50:56:96:05:be /sys/class/net/*/{bonding_slave/perm_hwaddr,address} 2>/dev/null | awk -F '/' '// {print $5}' | head -1`
sanitized_real=`echo $real | sed s/:/_/`
cat << EOF > /etc/sysconfig/network-scripts/ifcfg-$sanitized_real
BOOTPROTO="none"
IPADDR="192.168.100.82"
NETMASK="255.255.255.0"
GATEWAY="192.168.100.4"
DEVICE=$real
HWADDR="00:50:56:96:05:be"
ONBOOT=yes
PEERDNS=yes
PEERROUTES=yes
DEFROUTE=yes
DNS1="192.168.1.161"
MTU=1500
EOF
echo "Updating system time"
/usr/bin/chronyc makestep
/usr/sbin/hwclock --systohc
# update all the base packages from the updates repository
if [ -f /usr/bin/dnf ]; then
dnf -y update
else
yum -t -y update
fi
# SSH keys setup snippet for Remote Execution plugin
#
# Parameters:
#
# remote_execution_ssh_keys: public keys to be put in ~/.ssh/authorized_keys
#
# remote_execution_ssh_user: user for which remote_execution_ssh_keys will be
# authorized
#
# remote_execution_create_user: create user if it not already existing
#
# remote_execution_effective_user_method: method to switch from ssh user to
# effective user
#
# This template sets up SSH keys in any host so that as long as your public
# SSH key is in remote_execution_ssh_keys, you can SSH into a host. This
# works in combination with Remote Execution plugin by querying smart proxies
# to build an array.
#
# To use this snippet without the plugin provide the SSH keys as host parameter
# remote_execution_ssh_keys. It expects the same format like the authorized_keys
# file.
user_exists=false
getent passwd root >/dev/null 2>&1 && user_exists=true
if $user_exists; then
mkdir -p ~root/.ssh
cat << EOF >> ~root/.ssh/authorized_keys
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIIL4AwvCE1Tuboy1eJWcqzMUbljontaNqBr2F1HJVv977NZpnZxZoDSJRRigPDyNsRV3dOOheaXnSZtvbGbqGlxvGqaGw8O7uUpHrx+/pHhsYlSGcB5RolC3d0/Sww1lR0zMBnSgX2r34bWAisNDyTtK5kRMqueDQq0m7SJw/uqeySigVDDvoq1Am2EWJW73qSNLpCyt6jN1ZJoYMpKpD4wlOFjfscQdz6FCmbGYSVol/UnpD1B2uUqdJxJV9HyKB1VDKG9ozlbKx0BwUyicCrRpm7g25uq+cmhmilVqJxomIpT89zxwSPe2+7avoI3tDfflU4wphlQBuddzLy5Ed
forema...@satellite.test.netremedies.cassh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIIL4AwvCE1Tuboy1eJWcqzMUbljontaNqBr2F1HJVv977NZpnZxZoDSJRRigPDyNsRV3dOOheaXnSZtvbGbqGlxvGqaGw8O7uUpHrx+/pHhsYlSGcB5RolC3d0/Sww1lR0zMBnSgX2r34bWAisNDyTtK5kRMqueDQq0m7SJw/uqeySigVDDvoq1Am2EWJW73qSNLpCyt6jN1ZJoYMpKpD4wlOFjfscQdz6FCmbGYSVol/UnpD1B2uUqdJxJV9HyKB1VDKG9ozlbKx0BwUyicCrRpm7g25uq+cmhmilVqJxomIpT89zxwSPe2+7avoI3tDfflU4wphlQBuddzLy5Ed
forema...@satellite.test.netremedies.cassh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIIL4AwvCE1Tuboy1eJWcqzMUbljontaNqBr2F1HJVv977NZpnZxZoDSJRRigPDyNsRV3dOOheaXnSZtvbGbqGlxvGqaGw8O7uUpHrx+/pHhsYlSGcB5RolC3d0/Sww1lR0zMBnSgX2r34bWAisNDyTtK5kRMqueDQq0m7SJw/uqeySigVDDvoq1Am2EWJW73qSNLpCyt6jN1ZJoYMpKpD4wlOFjfscQdz6FCmbGYSVol/UnpD1B2uUqdJxJV9HyKB1VDKG9ozlbKx0BwUyicCrRpm7g25uq+cmhmilVqJxomIpT89zxwSPe2+7avoI3tDfflU4wphlQBuddzLy5Ed
forema...@satellite.test.netremedies.cassh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIIL4AwvCE1Tuboy1eJWcqzMUbljontaNqBr2F1HJVv977NZpnZxZoDSJRRigPDyNsRV3dOOheaXnSZtvbGbqGlxvGqaGw8O7uUpHrx+/pHhsYlSGcB5RolC3d0/Sww1lR0zMBnSgX2r34bWAisNDyTtK5kRMqueDQq0m7SJw/uqeySigVDDvoq1Am2EWJW73qSNLpCyt6jN1ZJoYMpKpD4wlOFjfscQdz6FCmbGYSVol/UnpD1B2uUqdJxJV9HyKB1VDKG9ozlbKx0BwUyicCrRpm7g25uq+cmhmilVqJxomIpT89zxwSPe2+7avoI3tDfflU4wphlQBuddzLy5Ed
forema...@satellite.test.netremedies.caEOF
chmod 0700 ~root/.ssh
chmod 0600 ~root/.ssh/authorized_keys
chown -R root: ~root/.ssh
# Restore SELinux context with restorecon, if it's available:
command -v restorecon && restorecon -RvF ~root/.ssh || true
else
echo 'The remote_execution_ssh_user does not exist and remote_execution_create_user is not set to true. remote_execution_ssh_keys snippet will not install keys'
fi
if [ -f /usr/bin/dnf ]; then
dnf -y install puppet-agent
else
yum -t -y install puppet-agent
fi
cat > /etc/puppetlabs/puppet/puppet.conf << EOF
[main]
vardir = /opt/puppetlabs/puppet/cache
logdir = /var/log/puppetlabs/puppet
rundir = /var/run/puppetlabs
ssldir = /etc/puppetlabs/puppet/ssl
[agent]
pluginsync = true
report = true
ignoreschedules = true
environment = production
EOF
puppet_unit=puppet
/usr/bin/systemctl list-unit-files | grep -q puppetagent && puppet_unit=puppetagent
/usr/bin/systemctl enable ${puppet_unit}
# export a custom fact called 'is_installer' to allow detection of the installer environment in Puppet modules
export FACTER_is_installer=true
# passing a non-existent tag like "no_such_tag" to the puppet agent only initializes the node
/opt/puppetlabs/bin/puppet agent --config /etc/puppetlabs/puppet/puppet.conf --onetime --tags no_such_tag --server
satellite.test.netremedies.ca --no-daemonize
touch /tmp/foreman_built
%end
%post --erroronfail
if test -f /tmp/foreman_built; then
echo "calling home: build is done!"
if [ -x /usr/bin/curl ]; then
elif [ -x /usr/bin/wget ]; then
else
fi
else
echo "calling home: build failed!"
if [ -x /usr/bin/curl ]; then
elif [ -x /usr/bin/wget ]; then
else
fi
fi
sync
%end