Skip to content

Commit e3f1d94

Browse files
authored
Merge pull request #84 from sej7278/tokens2
Updates for SaaS, Essential Support authentication and new FIPS kernel
2 parents 3c00afe + 16982d1 commit e3f1d94

File tree

1 file changed

+85
-20
lines changed
  • docs/enterprise-support-for-almalinux

1 file changed

+85
-20
lines changed

docs/enterprise-support-for-almalinux/README.md

Lines changed: 85 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,10 @@ Extended Security Updates (ESU) for AlmaLinux extend the lifecycle of specific A
2222

2323
### ESU lifecycle
2424

25+
AlmaLinux provides a 10-year lifecycle with a new minor release arriving every 6 months, bringing new features until the fifth year. Each of the minor releases is supported for 6 months. Customers who want to remain with the specific AlmaLinux minor release for longer can opt for Extended Security Updates (ESU).
26+
27+
ESU delivers an extended period of security fixes for critical and high-risk vulnerabilities for select AlmaLinux minor versions, as well as the full suite of five FIPS-validated modules (kernel, openssl, libcrypt, nss and gnutls) and FIPS-compliant security patches for FIPS-certified AlmaLinux deployments. The product also unlocks commercial use of the FIPS-validated packages.
28+
2529
Extended Security Updates are currently available for AlmaLinux 9.2 and have planned support for AlmaLinux 9.6 and 9.10. This provision ensures that a given minor release continues to receive essential updates, allowing customers to avoid upgrading every six months and test/certify their applications against the next minor version at their own pace.
2630

2731
![esu lifecycle](/images/esu_lifecycle_graph2.png)
@@ -92,7 +96,7 @@ The TuxCare ESU/FIPS packages and repositories are cryptographically signed with
9296
`tuxctl` is the setup tool for TuxCare's Enterprise Support for AlmaLinux, which will configure your system to receive patches from the TuxCare repositories. To install `tuxctl` you need to install the `tuxcare-release` package first. This package contains the TuxCare repo definitions, TuxCare GPG key and the `tuxctl` setup tool. Run the following as root:
9397

9498
```text
95-
# dnf install -y https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-$(rpm --eval %almalinux.%_arch).rpm
99+
# dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-9.2.$(uname -i).rpm
96100
```
97101

98102
The second step is to activate your license on the system. You should run the `tuxctl` tool as root with your ESU license key provided as a command line argument like so:
@@ -135,6 +139,43 @@ Then you will have to run `tuxctl` like this:
135139

136140
:::
137141

142+
### SaaS usage
143+
144+
If you are using ESU with our SaaS license in AWS, then the instructions are slightly different. You should login to your instance and run the following as root (use of `--fips` is optional depending on your needs):
145+
146+
```text
147+
# dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-9.2.$(uname -i).rpm
148+
149+
# tuxctl --saas --fips
150+
```
151+
152+
If you want to reclaim a license when you terminate an instance, you should first run:
153+
154+
```text
155+
# tuxctl --delete
156+
157+
De-registration successful
158+
```
159+
160+
Then you can use that license to register another instance.
161+
162+
If you want to check if you've already registered an instance, you can run the following to display your token:
163+
164+
```text
165+
# tuxctl --validate
166+
167+
Server is registered with token EXTENDED_SECURITY_UPDATES-SERVER-xxxxx
168+
```
169+
170+
If the instance has no license installed, it will return:
171+
172+
```text
173+
Server is not registered
174+
```
175+
176+
:::warning
177+
We can provide a systemd unit file and instructions, should you want to incorporate installing tuxcare-release and registering using tuxctl into your AMI, so that when you spin-up an instance its ready to receive patches, simply email [[email protected]]([email protected])
178+
:::
138179

139180
### Enabling FIPS 140-3 mode
140181

@@ -144,15 +185,17 @@ To enable the FIPS repo, install the FIPS 140-3 validated packages, enable FIPS
144185

145186
```text
146187
# tuxctl --fips -l ESU-XXXXXXXXXXXXXXXXXXXXXXXX
147-
# dnf -y install openssl-3.0.7-20.el9_2.tuxcare.1 kernel-5.14.0-284.11.1.el9_2.tuxcare.5
188+
# dnf -y install openssl-3.0.7-20.el9_2.tuxcare.1 kernel-5.14.0-284.11.1.el9_2.tuxcare.6
148189
# dnf -y install gnutls-3.7.6-23.el9_2.tuxcare.3 nettle-3.8-3.el9_2.tuxcare.1 libgcrypt-1.10.0-10.el9_2.tuxcare.3 nss-3.90.0-6.el9_2.tuxcare.1
149-
# grubby --set-default=/boot/vmlinuz-5.14.0-284.11.1.el9_2.tuxcare.5.$(uname -i)
190+
# grubby --set-default=/boot/vmlinuz-5.14.0-284.11.1.el9_2.tuxcare.6.$(uname -i)
150191
# fips-mode-setup --enable
151192
# reboot
152193
```
153194

154195
:::warning
155196
Note the aarch64 platform doesn't currently have FIPS-validated gnutls/libgcrypt/nss packages, so ARM users should only run the first `dnf` command to install the openssl and kernel packages.
197+
198+
We also provide multilib i686 packages of the userspace modules in the x86_64 repo for backwards compatibility, note that these are not FIPS-validated but are built from the same source.
156199
:::
157200

158201
Once you've logged in after the reboot, run these commands and check the output matches to confirm it worked:
@@ -162,7 +205,7 @@ $ fips-mode-setup --check
162205
FIPS mode is enabled.
163206
164207
$ uname -r
165-
5.14.0-284.11.1.el9_2.tuxcare.5.x86_64
208+
5.14.0-284.11.1.el9_2.tuxcare.6.x86_64
166209
167210
$ openssl list -providers | grep -A3 fips
168211
fips
@@ -187,14 +230,14 @@ To uninstall tuxctl, disable the ESU/FIPS functionality and revert to AlmaLinux
187230
-e 's|$tuxcare_releasever/$tuxcare_token|$releasever|g' \
188231
-e 's|almacare|tuxcare|g' \
189232
-e 's|$tuxcare_releasever|$releasever|g' \
190-
-e 's|$almacare_releasever|$releasever|g' \
233+
-e '/^exclude/d' \
191234
/etc/yum.repos.d/almalinux*.repo
192235
193236
# reboot
194237
```
195238

196239
:::warning
197-
Note that by disabling ESU, you will revert to tracking major version releases instead of sticking to a specific minor version, so you may be upgraded from 9.2 to 9.3 for example - a process you cannot undo.
240+
Note that by disabling ESU, you will revert to tracking major version releases instead of sticking to a specific minor version, so you may be upgraded from 9.2 to 9.4 for example - a process you cannot undo.
198241
:::
199242

200243
To completely remove the TuxCare packages, after following the above steps, run the following as root:
@@ -285,6 +328,28 @@ TuxCare Technical Support is designed for enterprise clients with trained IT sta
285328

286329
* New tickets may be created by simply emailing the support desk: [[email protected]]([email protected])
287330

331+
:::warning
332+
If you are a user of our SaaS product on AWS Marketplace, before you contact support, you should have your AWS accountId to hand, there are various ways to find it.
333+
334+
If you have the aws cli tool installed on your computer, you can run:
335+
336+
```text
337+
$ aws sts get-caller-identity --query Account --output text
338+
339+
123456789012
340+
```
341+
342+
Alternatively you can make a request to the AWS API from within a running instance, as described [here](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html#retrieve-iid), for example using IMDSv1:
343+
344+
```text
345+
$ curl -s http://169.254.169.254/latest/dynamic/instance-identity/document | grep accountId
346+
347+
"accountId" : "123456789012",
348+
```
349+
350+
Or if you have access to the [ec2 console](https://console.aws.amazon.com/console/home) you can simply click your username at the top right of the page. Your Account ID is the 12 digits in the dropdown.
351+
:::
352+
288353
All customers are entitled to access the Support knowledgebase, FAQs, and other self-service tools as may be offered by Enterprise Support for AlmaLinux.
289354

290355
#### Response Time
@@ -350,28 +415,28 @@ Technical support covered by any of the TuxCare Support Programs shall not be pr
350415
* Incidents for which the Customer cannot provide accurate information, as reasonably requested by TuxCare, in order to reproduce, investigate, and resolve the incident
351416
* Incidents which arise as a result of neglect or incorrect use of TuxCare instructions, which, if properly used, would have prevented the Incident
352417

353-
### Switching repositories
418+
### Installing tuxctl (Essential Support)
419+
420+
Similarly to the ESU instructions [above](/enterprise-support-for-almalinux/#installing-tuxctl), Essential Support customers should install tuxcare-release and register their server using tuxctl. The main difference is the choice of OS version - you must install the RPM specifically for your AlmaLinux version, currently 8.8, 8.10, 9.2 and 9.4 are supported.
354421

355-
For Essential Support customers wishing to use our vetted TuxCare repos instead of the community AlmaLinux ones, all you have to do is run the following as root:
422+
If you are unsure, run this to find your exact OS version:
356423

357424
```text
358-
# sed -i \
359-
-e 's|https://repo.almalinux.org/almalinux/|https://repo.tuxcare.com/almalinux/|' \
360-
-e 's|^mirrorlist|# mirrorlist|' \
361-
-e 's|^# baseurl|baseurl|' \
362-
/etc/yum.repos.d/almalinux*.repo
425+
$ cat /etc/almalinux-release
426+
427+
AlmaLinux release 8.10 (Cerulean Leopard)
363428
```
364429

365-
This method will work for any version of AlmaLinux 8.x or 9.x, we currently don't mirror the vault (debuginfo/source) repo's.
430+
You can browse [https://repo.tuxcare.com/tuxcare/](https://repo.tuxcare.com/tuxcare/) and find the correct RPM, or you can figure it out by substituting the version number (8.8, 8.10, 9.2 or 9.4) then install it as root, for example:
366431

367-
To revert back to the community mirrors you can run the following as root:
432+
```text
433+
# dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-8.10.$(uname -i).rpm
434+
```
435+
436+
The second step is to activate your license on the system. You should run the `tuxctl` tool as root with your Essential Support license key provided as a command line argument like so:
368437

369438
```text
370-
# sed -i \
371-
-e 's|https://repo.tuxcare.com/almalinux/|https://repo.almalinux.org/almalinux/|' \
372-
-e 's|^# mirrorlist|mirrorlist|' \
373-
-e 's|^baseurl|# baseurl|' \
374-
/etc/yum.repos.d/almalinux*.repo
439+
# tuxctl --license-key ESA-XXXXXXXXXXXXXXXXXXXXXXXX
375440
```
376441

377442
:::warning

0 commit comments

Comments
 (0)