This SUSE product includes materials licensed to SUSE under the GNU General Public License (GPL). The GPL requires that SUSE makes available certain source code that corresponds to the GPL-licensed material. The source code is available for download.
Version Revision History
July 21st, 2020: 4.1.0 release
About SUSE Manager 4.1
SUSE Manager 4.1, the latest release from SUSE, delivers a best-in-class open source infrastructure management and automation solution that lowers costs, identifies risk, enhances availability and reduces complexity.
As a key component of a software-defined infrastructure, SUSE Manager 4.1 delivers the following new or enhanced capabilities to your Edge, Cloud & Datacenter environments:
Expanded Operating System support and Cluster integration and management
Simplify management and regain control with SUSE Manager 4.1
You can now get even better control of complex heterogeneous IT environments with extended target operating system support now including: Red Hat Enterprise Linux 8 (including modular repositories flattening), CentOS 6, 7 and 8, Oracle Linux 6, 7 and 8, openSUSE Leap 15.2 and Ubuntu 20.04 LTS.
Only SUSE Manager combines software content lifecycle management (CLM) with a centrally staged repository, class leading configuration management and automation, plus optional state of the art monitoring capabilities, for all major Linux distributions.
You can also significantly simplify your patch and configuration management stacks by standardizing on SUSE Manager across all Linux distributions and deployment modes (physical, virtual, and public cloud).
Simplify cluster operations with the first cluster-aware version of SUSE Manager
As you modernize your IT landscape and make use of Software Defined Infrastructure stacks based on technologies like Kubernetes and Ceph, your focus of managing the IT infrastructure has to move from managing individual Linux servers and VMs to managing infrastructure clusters. Multiple cluster types will be supported in coming releases, with SUSE Manager 4.1 initially providing support for managing SUSE CaaS Platform clusters.
Lower costs and streamline management with enhanced usability, virtual machine management and monitoring capabilities
Operations and DevOps staff can now streamline the setup, daily use and maintenance of SUSE Manager simplifying and automating routine tasks; such as the mass on boarding of rootless or password-less clients.
With enhanced virtual machine management capabilities the management of highly distributed virtualized server infrastructures becomes a lot easier. If you run virtual machine environments at the edge such as telco, manufacturing or retail, SUSE Manager now enables the efficient management of tens to thousands of VMs across an entire estate.
If you run SAP workloads virtualized on SLES, with SUSE Manager 4.1 you can eliminate complexity and simplify deployments by reducing the number of vendors in your software defined infrastructure management stack (OS, virtualization and virtualization management and monitoring all come from SUSE). SUSE Manager also significantly simplifies your environments where the frequent setup of virtualized test deployments of SAP workloads are required.
Need to virtualize Kubernetes to best leverage your powerful hardware? You can accelerate and maximize implementations by gaining higher scale from your container platform while simplifying deployments (no need for separate VMware layer, high automation from bare metal deployment to VMs to cluster). You can now also use virtualization to securely separate multiple clusters/tenants in a Kubernetes environment.
To keep your infrastructure safe and healthy SUSE Manager 4.1 expands the new Prometheus/Grafana-based monitoring stack introduced with version SUSE Manager 4 with enhanced support for large federated and non-routable network environments. Allowing your Linux systems and devices to be monitored wherever they reside and irrespective of how they are network connected.
Scale SUSE Manager 4.1 to tens of thousands of client devices without compromise
With ever growing Linux footprints you need your management tool be able to scale to tens of thousands of Linux devices and beyond. With the performance and scalability enhancements in 4.1, your SUSE Manager deployment can easily scale in your environment in any direction, while providing better performance than any previous version even in very large-scale environments.
This allows you the flexibility to grow your infrastructure as required by your business needs, with the peace of mind that SUSE Manager will be able to manage your large estate, and the cost implications of growing their footprint will not be exaggeratedly high.
With the “SUSE Manager Hub – Tech Preview” multi-server architecture we are gradually introducing a framework that allows for scaling SUSE Manager deployments to the hundreds of thousands of nodes with tiered management servers.
SUSE Manager Server 4.1 is provided through SUSE Customer Center and can be installed with the unified installer for SUSE Linux Enterprise 15 Service Pack 2. It is available for x86-64, POWER (ppc64le), or IBM Z (s390x). No separate SUSE Linux Enterprise subscription is required.
With the adoption of a unified installer in SUSE Linux Enterprise 15, system roles are used to customize the installation for each product. The unified installer provides an easier way to install the operating system and the SUSE Manager Server application together with specific pre-configured system settings. This addresses the need for enterprise deployments to standardize on the base operating system as well as on specific storage setups.
PostgreSQL is the only supported database. Using a remote PostgreSQL database is not supported.
Update from previous versions of SUSE Manager Server
In-place update from SUSE Manager Server 4.0 is supported.
For SUSE Manager 3.2 Server users, the supported upgrade method is to migrate the data from your SUSE Manager Server 3.2 installation to SUSE Manager Server 4.1 and perform a clean installation. If your SUSE Manager Server 3.2 uses an older version of PostgreSQL, you will need to upgrade to PostgreSQL 10 before performing the migration.
All connected clients will continue to run and remain unchanged.
For detailed upgrading instructions, see the Upgrade Guide on https://documentation.suse.com/suma/4.1/.
Migrating from Red Hat Satellite
Migrating from Red Hat Satellite 5.x or Spacewalk 2.x to SUSE Manager Server 4.1 is conditionally supported.
To perform this migration, we strongly recommend you get in contact with a SUSE sales engineer or consultant before starting the migration.
Scaling SUSE Manager
The default configuration of SUSE Manager will scale around one thousand clients, when deployed according to the instructions in the Installation Guide on https://documentation.suse.com/suma/4.1/. Scaling beyond that number needs special consideration.
For more information and instructions on large-scale deployments, see the Large Deployments Guide.
Before you begin, you should always get advice from a SUSE partner, sales engineer, or consultant.
Channels with a large number of packages
Some channels, like SUSE Linux Enterprise Server with Expanded Support
or Red Hat Enterprise Linux, come with a very large number of packages
that may cause
taskomatic to run out of memory.
If this occurs, we recommended that you increase the maximum amount of memory allowed for
taskomatic by editing
/etc/rhn/rhn.conf and adding this line:
You will need to restart
taskomatic after this change.
taskomatic up to 8 GB of memory (up from the default of 4 GB).
taskomatic continues to run out of memory, you can increase the number further.
However, keep in mind that this will affect the total memory required by SUSE Manager Server.
Major changes since SUSE Manager Server 4.0
New SUSE branding
The new theme is lighter and gives a bit more of free space between elements for better readability.
New products enabled
SUSE Linux Enterprise Real Time 12 SP5
SUSE Linux Enterprise 15 SP2 family
openSUSE Leap 15.2
MicroFocus Open Enterprise Server 2018 SP2
CentOS 6, 7, and 8
Oracle Linux 6, 7 and 8
Ubuntu 20.04 LTS
Starting with SUSE Manager 4.1, CentOS is supported as a client and shows in the product tree in the WebUI.
If you were using CentOS via
spacewalk-common-channels, you will need to delete your existing channels, synchronize the channel information from SCC, and reassign the channels to the clients.
Starting with SUSE Manager 4.1, Oracle Linux is supported as a client and shows in the product tree in the WebUI.
As you modernize your IT landscape and make use of Software Defined Infrastructure stacks based on technologies like Kubernetes and Ceph, your focus of managing the IT infrastructure has to move from managing individual Linux servers and VMs to managing infrastructure clusters. Multiple cluster types will be supported in coming releases, with SUSE Manager 4.1 initially providing support for SUSE CaaSP.
Computing is increasingly being a more complex architecure: redundant servers, scale out, high-availability, etc where you deploy different kinds of clusters, such as SUSE CaaS Platform, SUSE Enterprise Storage or SAP. Managing those as a whole piece of infrastructure instead of as discrete nodes puts you in charge.
SUSE Manager 4.1 implements cluster management of SUSE CaaS Platform clusters. SUSE Manager works hand-in-hand with CaaS Platform to make sure that all cluster operations are issued properly.
The following actions are currently supported:
Register an existing cluster to SUSE Manager
Add or remove nodes to the cluster
Promote SLES system to managing node
Upgrade the cluster
Deployment of CaaS Platform clusters from scratch will be supported in an upcoming version of SUSE Manager.
Recurring highstate scheduling
You can schedule automated recurring highstate actions for Salt clients.
Recurring highstate actions apply the highstate to clients on a specified schedule. You can apply recurring action to individual clients, to all clients in a system group, or to an entire organization. The Recurring Actions section in the Administration Guide contains all the details for this feature.
More improvements in regards to automation will be coming in subsequent releases of SUSE Manager, including maintenance windows and patch automation.
The new version of the Prometheus formula allows configuring federation and pulling relevant metrics from Prometheus instances to provide a global monitoring view. This configuration is useful for a number of cases, such as:
Remote sites, each one with its own Prometheus server
Collecting monitoring data from multiple applications, each one of them providing its own Prometheus server (e. g. multiple SUSE products: SUSE Manager, CaaSP, SES, HA)
The combined data can then be visualized using Grafana.
Note that suitable recording rules have to be configured on the Prometheus instances (for example at CaaSP Prometheus instances). For more information about Prometheus federation, check the official documentation.
Pre-configured default alerting rules
A default set of alerting rules have been added to monitor the Prometheus instances themselves (meta-monitoring) and the availability of configured targets. These rules can be changed in the WebUI.
Specific Grafana dashboards for SUSE Container as a Service Platform have been integrated and can be deployed via the WebUI.
Updated Grafana and Prometheus
Grafana has been updated to version 7.0.3 and Prometheus to version 2.18.
Updated Node Exporter
The Prometheus Node Exporter has been updated to version 0.18.1.
The new version includes some breaking changes:
devicein netclass collector for consistency with other network metrics
cpufreqmetrics now separate the cpufreq and scaling data based on what the driver provides
The labels for the
network_up metrichave changed
Bonding collector now uses
Several systemd metrics have been turned off by default to improve performance. These include
systemdcollector blacklist now includes
sliceunits by default
Virtual storage pool support
Virtual machine disks are stored in storage pools. Previously, SUSE Manager could only list storage pools.
With SUSE Manager 4.1, it is now possible to create, edit, start, stop, refresh, and delete storage pools. This is available from the WebUI, or through Salt states.
Repository syncing has been optimized to perform in less time with respect to past versions. The performance improvement could be up to 6 times faster, depending on the hardware setup (specifically CPUs and network bandwidth) and number of packages.
Content Lifecycle Magement
Content Lifecycle Management has been optimized, with basic operations (build, promotion) up to two orders of magnitude faster and a quicker UI loading in installations with many channels and organizations.
Prometheus Service Discovery
Thanks to a number of enhancements and optimizations, Prometheus Service Discovery is now 10 times faster, on average, than it was in SUSE Manager 4.0.
Automatic generation of bootstrap repositories
A bootstrap repository contains packages for installing Salt on clients, as well as the required packages for registering Salt or traditional clients during bootstrapping.
In SUSE Manager 4.0 and earlier, bootstrap repository creation was a manual step, using the
In SUSE Manager 4.1, bootstrap repositories are automatically created and regenerated on the SUSE Manager Server after a product is synchronized (and all mandatory channels have been fully mirrored).
More details, including how to revert to manual invocation, are available from the Client Configuration Guide.
Automatic database schema migrations and fail-over mechanism
Database schema upgrades are now applied automatically during services startup, so there is no need to call
To prevent SUSE Manager services from starting if the schema upgrade has not successfully completed, a fail-over security mechanism has been implemented.
In case the database migration has not finished, or if it finishes with an error:
spacewalk-service startcommand fails, and information is provided about the error.
No services will start, including the Apache service. This means the WebUI will also be unavailable.
Third-party GPG keys now included
Enabling verification of non-SUSE product metadata used to require manual acceptance, and sometimes even manual installation, of the third-party keys for products available from the product tree. Alternatively, an option to not verify the GPG key signature was there.
In addition to SUSE’s, SUSE Manager 4.1 now includes the GPG keys used to sign packages and/or metadata by other vendors whose products are available in the product tree in the WebUI:
MicroFocus Open Enterprise Server
Manual acceptance of those keys is no longer required for GPG signature verification for those products to work.
Manual acceptance of GPG keys for any other product or repository is still required for security reasons.
Onboarding of clients with SSH keys
In SUSE Manager 4.0, password authentication was the only authentication type available to bootstrap clients from the Server.
SUSE Manager 4.1 introduces a new SSH private key authentication method, including use of a passphrase on the private key. This is specially useful on the public cloud, where images prefer to authenticate with SSH instead of user and password.
To protect your security, the private key is only stored on the SUSE Manager Server during the bootstrap procedure and removed immediately after bootstrapping is complete, therefore the private key must be provided for each bootstrap.
This feature is available in the WebUI for Salt clients.
From the API, the new method
bootstrapWithPrivateSshKey in the namespace
system is documented in the
You can use this example by adjusting the
MANAGER_PASSWORD according to your environment:
#!/usr/bin/python import xmlrpclib client = '192.168.1.2' keyfile = '/path/to/priv/key' passphrase = '' # empty string = no passphrase conn = xmlrpclib.Server(MANAGER_URL, verbose=0) key = conn.auth.login(MANAGER_LOGIN, MANAGER_PASSWORD) with open(keyfile, 'r') as file: data = file.read() conn.system.bootstrapWithPrivateSshKey(key, server, 22, 'root', data, passphrase, '', False); conn.auth.logout(key)
Service Pack migration: remember settings
A common source of errors in Service Pack Migrations is the human factor: a complex migration is carefully crafted, dry-run to a success, only to mysteriously fail in production. More often than not, the reason for this is when re-creating the migration for production, some step was forgotten.
In SUSE Manager 4.1, the Service Pack Migration feature has gained memory: you can now re-run successful dry-runs. This is especially useful when you have configured a complex migration, tested it successfully, and would like to make sure it runs in production with exactly the same settings it was designed to run with. To do this, go to the System Event History of the Dry-run action. There is a button "Run migration" which lets you execute the Service Package Migration.
SUSE Manager requires an active subscription to connect to the SUSE Customer Center and download content and data.
We have now added a check in the Products page that will show a warning when the subscription is not available for one of these reasons:
Subscription was not added
Subscription was disabled
Proxy visibility in Systems Overview
SUSE Manager Proxy nodes are now included in the Systems Overview page, with system type "Proxy".
Improved sync status visibility
In the product page, a new sync status icon has been added to convey the right information.
When a channel contains root and child products, separate feedback is provided for each product, to make sure a synchornization failure in either the root product, or a child product, will be immediately noticed.
Single Page Application UI (SPA)
In an effort to provide our WebUI users with a smoother navigation, we have implemented large parts of the user interface as a single page application.
This enhancement was started in SUSE Manager 4.0 as an opt-in feature and now becomes the default in SUSE Manager 4.1.
RHEL 8 enhancements
Content Lifecycle Management filters for AppStreams
RHEL, SLES ES, CentOS, and Oracle Linux 8 appstreams can now be mixed and converted to flat repositories using a new type of CLM filter.
In order to make this feature easier to use, in SUSE Manager 4.1:
SUSE Manager will show an error and prevent the user from proceeding when there are module conflics, a module is unavailable or modular filters are in use but no modular sources have been added (and viceversa)
Module names can be picked via a UI widget instead of typing this manually, thus avoiding errors
Exporters for RHEL, SLES ES, CentOS, and Oracle Linux 8 are now available:
Node exporter: hardware and operating system metrics
Apache exporter: Apache HTTP server metrics
PostgreSQL exporter: PostgreSQL database metrics
SUSE Manager for Retail
SLEPOS 15 SP2 clients
Pre-defined templates for SLEPOS 15 SP2 are now provided. SLEPOS 15 SP2 is supported for 7.5 years since the release date.
Where a dedicated SUSE Manager Server or SUSE Manager Retail Branch Server is not feasible, it is now possible to use a Retail Branch Server running in a remote datacenter or public cloud.
EFI HTTP booting
The DHCP, branch network, and PXE formulas have been updated to support booting EFI terminals (systems) using HTTP in addition to TFTP.
Custom headers for reposync
Reposync can now send additional custom HTTP headers configured in the
This new feature serves a number of special use cases, such as feeding special data to network proxies, bypassing MFA or informing traffic inspection devices your data is secure to avoid wasting resources inspecting e. g. large RPMs or containers.
Details are available in the Reference Guide.
Two new books have been added to the SUSE Manager 4.1 documentation:
Large Deployments Guide. Everything related to architecture and configuration for large (thousands of clients) deployments is contained in this guide. It contains all the documentation for the SUSE Manager Hub component. Some parts of the Salt guide that dealt with parameter tuning for large deployments have now been moved here too.
Public Cloud QuickStart Guide. This new guide shows you the fastest way to get SUSE Manager up and running in a public cloud. It includes instructions for Amazon Web Services, Microsoft Azure, and Google Cloud Engine.
A new section on how to configure Salt for GitFS to achieve GitOps has now been added to the Salt Guide
In-place automatic upgrade of SUSE Linux Enterprise clients is now documented, with a sample AutoYaST profile.
Lots of revised and updated content across all guides
As part of SUSE’s Home Office Workplace initiative in response to the crisis caused by the COVID-19, the SUSE Manager team has created a formula with forms to provision an OpenVPN Server node and manage client certificates from SUSE Manager.
In SUSE Manager 4.0 and earlier, the
spacewalk-utils package contained a mix of L3 and L1 supported tools.
In SUSE Manager 4.1, we have split
spacewalk-utils in two packages, with clear support levels for each:
spacewalk-utilscontains only fully-supported (i. e. L3) tools:
spacewalk-common-channels: add channels not provided by SCC
spacewalk-hostname-rename: change SUSE Manager Server hostname
spacewalk-clone-by-date: clone channels by a specific date
spacewalk-sync-setup: set up ISS master/slave organization mappings
spacewalk-manage-channel-lifecycle: manage channels lifecycle
spacewalk-utils-extrascontains the tools for which SUSE only provides limited (i. e. L1) support:
apply_errata: apply errata to systems
delete-old-systems-interactive: remove idle systems
migrate-system-profile: migrate systems between organizations
spacewalk-api: alternative to
spacewalk-export: export Spacewalk 2.x and Red Hat Satellite 5 data
spacewalk-export-channels: export Spacewalk 2.x and Red Hat Satellite 5 channels
spacewalk-final-archive: archive information from a running Spacewalk 2.x and Red Hat Satellite 5 server prior to a final shutdown
spacewalk-manage-snapshots: report on and purge snapshot entries by age
sw-ldap-user-sync: creates new SUSE Manager accounts for users in a specific LDAP group and removes SUSE Manager accounts after deleting users from a specific LDAP group
sw-system-snapshot: list or delete system snapshots from the management server
taskotop: displays a summary of Taskomatic activities in progress
spacewalk-utils-extras are valuable but they are so specific, or require additional customization for each customer, that it is not possible for SUSE to fully support them. If you were using these scripts in
spacewalk-utils in SUSE Manager 4.0 or earlier, you will need to install
spacewalk-utils-extras in SUSE Manager 4.1.
L1 support is limited to problem determination, which means technical support designed to provide compatibility information, usage support, on-going maintenance, information gathering and basic troubleshooting using available documentation. Should you need more advanced help or customization with a tool from
spacewalk-utils-extras, please contact SUSE Consulting.
Single Sign-On (SSO)
SUSE Manager supports Single Sign-On authentication to the WebUI by implementing the Security Assertion Markup Language (SAML) 2 protocol. This feature, introduced in 4.0 as a Technology Preview, is now declared stable and fully supported.
SUSE Manager must be reconfigured to use the IdP as the source of authentication and post-login mapped users must be already created before enabling SSO.
For more on configuring SSO, see the Authentication Methods chapter in the Administration guide and the Example SSO implemenation with Keycloak.
SUSE Manager Hub XML-RPC API
The SUSE Manager Hub is a new multi-server architecture we are introducing as a technology preview in SUSE Manager 4.1.
Multiple SUSE Manager Servers can be managed from a single Hub node. The Hub is a Salt master itself and the managed SUSE Manager Server servers are both a minion (to the hub) and a master (to their own minions).
The Hub covers a number of use cases, such as:
Scalability: when a single SUSE Manager Server will no longer be enough
Intermittently connected and bandwidth-limited sites, which can now be managed with their own schedule thanks to the Hub
Multi-tenancy with individual SUSE Manager Servers. While SUSE Manager is multi-organization itself, in some scenarios, an even stronger separation is required. The Hub provides a way to manage and aggregate back information for all those SUSE Manager Server servers.
The Hub comprises a number of components that we will be releasing and enhancing during the SUSE Manager 4.1 lifecycle. The first component of the Hub we are now introducing as a Technology Preview is the Hub XML-RPC API, which provides an extended version of the SUSE Manager Server XML-RPC API, targeted for the multi-server case.
Everything related to the Hub is documented in the new Large Deployments Guide.
Yomi (yet one more installer) is a Salt-based installer for SUSE and openSUSE operating systems.
In SUSE Manager 4.1, Yomi can be used as part of provisioning new clients, as an alternative to AutoYaST. Yomi consists of two components:
The Yomi formula, which contains the Salt states and modules required to perform the installation.
The operating system image, which includes the pre-configured
Detailed information on how to use Yomi is available from the Salt Guide.
Yomi is work in progress and more operating systems and features will be added in coming releases.
Salt has been upgraded to upstream version 3000, plus a number of patches, backports and enhancements by SUSE, for the SUSE Manager Server, Proxy and Client Tools. In particular, CVE-2020-11651 and CVE-2020-11652 fixes are included in our release.
As part of this upgrade, cryptography is now managed by the Python-M2Crypto library (which is itself based on the well-known OpenSSL library).
We intend to regularly upgrade Salt to more recent versions.
For more details about changes in your manually-created Salt states, see the Salt upstream release notes 3000
Please note Salt 3000 is the last version of Salt which will support the old syntax of the
The database engine has been updated from PostgreSQL 10 to PostgreSQL 12, which brings a number of performance and reliability improvements. A detailed changelog is available upstream.
To prevent inconsistent configurations and data on upgrade or update, SUSE Manager 4.1 will refuse to start until the database migration from PostgreSQL 10 to PostgreSQL 12 has completed successfully.
Base system upgrade
The base system was upgraded to SUSE Linux Enterprise 15 SP2.
The Unpublished Patches feature has been dropped in SUSE Manager 4.1.0.
This was a very old feature which originated more than 15 years ago when Spacewalk was used internally by vendors to manage patches before making them available to their customers. This functionality has been superseded a long (more than 10 years) time ago by other features in Uyuni for sysadmins, and by tools such as the Open Build Service for operating system vendors.
After a consultation period with users both in the upstream Uyuni community and the SUSE Manager community, we received no feedback against the removal and executed on it.
This will help us realize even further performance improvements in several areas, including the commonly-used Content Lifecycle Management build and promotion operations.
If you still have any unpublished patches, make sure you publish them with SUSE Manager 4.0 before migrating to SUSE Manager 4.1.
With the removal of the unpublished patches feature, some APIs have changed and are therefore incompatible with SUSE Manager 4.0 and earlier:
errata.createhas one less parameter (the
publishboolean, now always
true) and it is now mandatory to specify at least one channel label in the last parameter (
channelLabels). Previously specifying at least one channel label was mandatory only if
publishwas set to true.
Upgrading with SUSE Manager Proxy
SUSE Manager Server 4.1 works with SUSE Manager Proxy 4.0 and SUSE Manager Retail Branch Server 4.0. When upgrading, upgrade the SUSE Manager Server first, followed by the SUSE Manager Proxy and Retail Branch Servers.
For instructions on upgrading when SUSE Manager Proxy or SUSE Manager Retail Branch Servers are in use, see the Upgrade Guide on https://documentation.suse.com/suma/4.1/.
Upgrading with inter-server synchronization
When upgrading, upgrade the ISS master first, followed by the ISS slaves.
Supportconfig confidentiality disclaimer
When handling Service Requests, supporters and engineers may ask for the output of the
supportconfig tool from SUSE Manager Server or clients.
This disclaimer applies:
Detailed system information and logs are collected and organized in a manner that helps reduce service request resolution times. Private system information can be disclosed when using this tool. If this is a concern, please prune private data from the log files. Several startup options are available to exclude more sensitive information. Supportconfig data is used only for diagnostic purposes and is considered confidential information.
When you run
supportconfig on the SUSE Manager Server, the output will contain information about your clients as well as about the Server.
In particular, debug data for the subscription matching feature contains a list of registered clients, their installed products, and some minimal hardware information (such as the CPU socket count).
It also contains a copy of the subscription data available from the SUSE Customer Center.
If this is a concern, please prune data in the
subscription-matcher directory in the
spacewalk-debug tarball before sending it to SUSE.
Supportability of embedded software components
All software components embedded into SUSE Manager, like Cobbler for PXE booting, are only supported in the context of SUSE Manager. Stand-alone usage (e. g. Cobbler command-line) is not supported.
Support for older products
The SUSE Manager engineering team provides 'best effort' support for products past their end-of-life date. For more information about product support, see Product Support Lifecycle.
Support for products that are considered past their end-of-life is limited to assisting you to bring production systems to a supported state. This could be either by migrating to a supported service pack or by upgrading to a supported product version.
Support for Ubuntu Clients
SUSE Manager supports Ubuntu 16.04 LTS, 18.04 LTS and 20.04 LTS clients using Salt. Traditional clients are not supported.
Support for Ubuntu is limited to a growing list of specific features. For a detailed list of supported features, check the Client Configuration Guide.
L1 support for Debian clients
For Debian clients, SUSE Manager only offers a subset of its functionality, mostly aligned with Ubuntu. Client tools are not available yet from SCC but the Debian 9 and Debian 10 client tools from Uyuni can be enabled using
Debian is only supported at L1 level support. L1 support is limited to problem determination, which means technical support designed to provide compatibility information, usage support, on-going maintenance, information gathering and basic troubleshooting using available documentation. At this moment, any problems or bugs specific Debian will only be fixed in a best-effort mode.
Please contact your Sales Engineer or SUSE Consulting if you need additional support or features for these operating systems.
Microsoft Internet Explorer fails to render some parts of the SUSE Manager Web UI and is therefore not a supported browser, in any version.
Please refer to the General Requirements for a list of supported browsers.
SUSE Manager installation
The SUSE Unified Installer, and installing SUSE Manager on top of SLE JeOS, are the only supported mechanisms to install SUSE Manager.
Installing SUSE Manager 4.1 on top of an existing SUSE Linux Enterprise Server 15 SP2 is known to generate an incomplete installation. If you require such a setup, please contact SUSE Consulting.
Single Sign On, API and CLI tools
Single Sign On can be used to authenticate in the Web UI but not with the API or CLI tools. This will be fixed in a future release of SUSE Manager.
EPEL and Salt packages
Using the Extra Packages for Enterprise Linux directly on RHEL clients (or compatible: SLES ES, CentOS, Oracle Linux, etc) will install the Salt packages from EPEL, which miss some features in the SUSE Manager-provided Salt packages. This is an unsupported scenario.
If you need to enable the EPEL repository, make sure you filter out the Salt packages from EPEL (for instance, by creating a new channel using Content Lifecycle Management).
RHEL 6, CentOS 6 and Oracle Linux 6 minimal installations
In the case of RHEL 6, CentOS 6 and Oracle Linux 6, the "Minimal" installation set is missing some packages required for the onboarding to work. It is recommented to install at least a "Basic Server".
Alternatively, if using a minimal installation, you must install the
openssh-clients packages before onboarding.
RHEL native clients
When autogenerating bootstrap repositories for native RHEL clients, some errors may be logged from the moment the official Red Hat channels are added until the moment those channels are fully synchornized for the first time.
This does not affect SLES Expanded Support, CentOS or Oracle Linux.
Registering Spacewalk 2.x/Red Hat Satellite 5.x clients to SUSE Manager as Salt minions
If a client machine is running the Red Hat Satellite 5.x agent, registering it to SUSE Manager as a Salt minion will fail due to package conflicts.
Registering a RH Satellite 5.x client as a SUSE Manager traditional client works fine.
Registering a SUSE Manager traditional client as a SUSE Manager Salt minion will also work.
RH Satellite 5.x ⇒ SUSE Manager traditional
RH Satellite 5.x ⇒ SUSE Manager Salt minion
SUSE Manager traditional ⇒ SUSE Manager Salt minion
In order to register Red Hat Satellite 5.x clients to SUSE Manager as Salt minions, you will need to modify the bootstrap script to remove the Satellite agent packages first.
Spacewalk 2.x and Oracle Spacewalk 2.x clients will show the same behavior as Red Hat Satellite 5.x clients
If you encounter a bug in any SUSE product, please report it through your support contact or in the SUSE Forums:
Latest product documentation: https://documentation.suse.com/suma/4.1/.
Technical product information for SUSE Manager: https://www.suse.com/products/suse-manager/
These release notes are available online: https://www.suse.com/releasenotes/
Visit https://www.suse.com for the latest Linux product news from SUSE.
Visit https://www.suse.com/download-linux/source-code.html for additional information on the source code of SUSE Linux Enterprise products.
SUSE LLC Maxfeldstr. 5 D-90409 Nürnberg Tel: +49 (0)911 740 53 - 0 Email: firstname.lastname@example.org Registrierung/Registration Number: HRB 36809 AG Nürnberg Geschäftsführer/Managing Director: Felix Imendörffer Steuernummer/Sales Tax ID: DE 192 167 791 Erfüllungsort/Legal Venue: Nürnberg
SUSE makes no representations or warranties with regard to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, SUSE reserves the right to revise this publication and to make changes to its content, at any time, without the obligation to notify any person or entity of such revisions or changes.
Further, SUSE makes no representations or warranties with regard to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, SUSE reserves the right to make changes to any and all parts of SUSE software, at any time, without any obligation to notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classifications to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical/biological weaponry end uses. Please refer to the SUSE Legal information page for more information on exporting SUSE software. SUSE assumes no responsibility for your failure to obtain any necessary export approvals.
Copyright © 2012-2020 SUSE LLC.
This release notes document is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License (CC-BY-ND-4.0). You should have received a copy of the license along with this document. If not, see https://creativecommons.org/licenses/by-nd/4.0/.
SUSE has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at https://www.suse.com/company/legal/ and one or more additional patents or pending patent applications in the U.S. and other countries.
For SUSE trademarks, see SUSE Trademark and Service Mark list (https://www.suse.com/company/legal/). All third-party trademarks are the property of their respective owners.
Thank you for using SUSE Manager Server in your business.
Your SUSE Manager Server Team.