You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/enterprise-support-for-almalinux/README.md
+85-20Lines changed: 85 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,10 @@ Extended Security Updates (ESU) for AlmaLinux extend the lifecycle of specific A
22
22
23
23
### ESU lifecycle
24
24
25
+
AlmaLinux provides a 10-year lifecycle with a new minor release arriving every 6 months, bringing new features until the fifth year. Each of the minor releases is supported for 6 months. Customers who want to remain with the specific AlmaLinux minor release for longer can opt for Extended Security Updates (ESU).
26
+
27
+
ESU delivers an extended period of security fixes for critical and high-risk vulnerabilities for select AlmaLinux minor versions, as well as the full suite of five FIPS-validated modules (kernel, openssl, libcrypt, nss and gnutls) and FIPS-compliant security patches for FIPS-certified AlmaLinux deployments. The product also unlocks commercial use of the FIPS-validated packages.
28
+
25
29
Extended Security Updates are currently available for AlmaLinux 9.2 and have planned support for AlmaLinux 9.6 and 9.10. This provision ensures that a given minor release continues to receive essential updates, allowing customers to avoid upgrading every six months and test/certify their applications against the next minor version at their own pace.
@@ -92,7 +96,7 @@ The TuxCare ESU/FIPS packages and repositories are cryptographically signed with
92
96
`tuxctl` is the setup tool for TuxCare's Enterprise Support for AlmaLinux, which will configure your system to receive patches from the TuxCare repositories. To install `tuxctl` you need to install the `tuxcare-release` package first. This package contains the TuxCare repo definitions, TuxCare GPG key and the `tuxctl` setup tool. Run the following as root:
The second step is to activate your license on the system. You should run the `tuxctl` tool as root with your ESU license key provided as a command line argument like so:
@@ -135,6 +139,43 @@ Then you will have to run `tuxctl` like this:
135
139
136
140
:::
137
141
142
+
### SaaS usage
143
+
144
+
If you are using ESU with our SaaS license in AWS, then the instructions are slightly different. You should login to your instance and run the following as root (use of `--fips` is optional depending on your needs):
If you want to reclaim a license when you terminate an instance, you should first run:
153
+
154
+
```text
155
+
# tuxctl --delete
156
+
157
+
De-registration successful
158
+
```
159
+
160
+
Then you can use that license to register another instance.
161
+
162
+
If you want to check if you've already registered an instance, you can run the following to display your token:
163
+
164
+
```text
165
+
# tuxctl --validate
166
+
167
+
Server is registered with token EXTENDED_SECURITY_UPDATES-SERVER-xxxxx
168
+
```
169
+
170
+
If the instance has no license installed, it will return:
171
+
172
+
```text
173
+
Server is not registered
174
+
```
175
+
176
+
:::warning
177
+
We can provide a systemd unit file and instructions, should you want to incorporate installing tuxcare-release and registering using tuxctl into your AMI, so that when you spin-up an instance its ready to receive patches, simply email [[email protected]]([email protected])
178
+
:::
138
179
139
180
### Enabling FIPS 140-3 mode
140
181
@@ -144,15 +185,17 @@ To enable the FIPS repo, install the FIPS 140-3 validated packages, enable FIPS
Note the aarch64 platform doesn't currently have FIPS-validated gnutls/libgcrypt/nss packages, so ARM users should only run the first `dnf` command to install the openssl and kernel packages.
197
+
198
+
We also provide multilib i686 packages of the userspace modules in the x86_64 repo for backwards compatibility, note that these are not FIPS-validated but are built from the same source.
156
199
:::
157
200
158
201
Once you've logged in after the reboot, run these commands and check the output matches to confirm it worked:
@@ -162,7 +205,7 @@ $ fips-mode-setup --check
162
205
FIPS mode is enabled.
163
206
164
207
$ uname -r
165
-
5.14.0-284.11.1.el9_2.tuxcare.5.x86_64
208
+
5.14.0-284.11.1.el9_2.tuxcare.6.x86_64
166
209
167
210
$ openssl list -providers | grep -A3 fips
168
211
fips
@@ -187,14 +230,14 @@ To uninstall tuxctl, disable the ESU/FIPS functionality and revert to AlmaLinux
Note that by disabling ESU, you will revert to tracking major version releases instead of sticking to a specific minor version, so you may be upgraded from 9.2 to 9.3 for example - a process you cannot undo.
240
+
Note that by disabling ESU, you will revert to tracking major version releases instead of sticking to a specific minor version, so you may be upgraded from 9.2 to 9.4 for example - a process you cannot undo.
198
241
:::
199
242
200
243
To completely remove the TuxCare packages, after following the above steps, run the following as root:
@@ -285,6 +328,28 @@ TuxCare Technical Support is designed for enterprise clients with trained IT sta
If you are a user of our SaaS product on AWS Marketplace, before you contact support, you should have your AWS accountId to hand, there are various ways to find it.
333
+
334
+
If you have the aws cli tool installed on your computer, you can run:
335
+
336
+
```text
337
+
$ aws sts get-caller-identity --query Account --output text
338
+
339
+
123456789012
340
+
```
341
+
342
+
Alternatively you can make a request to the AWS API from within a running instance, as described [here](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html#retrieve-iid), for example using IMDSv1:
Or if you have access to the [ec2 console](https://console.aws.amazon.com/console/home) you can simply click your username at the top right of the page. Your Account ID is the 12 digits in the dropdown.
351
+
:::
352
+
288
353
All customers are entitled to access the Support knowledgebase, FAQs, and other self-service tools as may be offered by Enterprise Support for AlmaLinux.
289
354
290
355
#### Response Time
@@ -350,28 +415,28 @@ Technical support covered by any of the TuxCare Support Programs shall not be pr
350
415
* Incidents for which the Customer cannot provide accurate information, as reasonably requested by TuxCare, in order to reproduce, investigate, and resolve the incident
351
416
* Incidents which arise as a result of neglect or incorrect use of TuxCare instructions, which, if properly used, would have prevented the Incident
352
417
353
-
### Switching repositories
418
+
### Installing tuxctl (Essential Support)
419
+
420
+
Similarly to the ESU instructions [above](/enterprise-support-for-almalinux/#installing-tuxctl), Essential Support customers should install tuxcare-release and register their server using tuxctl. The main difference is the choice of OS version - you must install the RPM specifically for your AlmaLinux version, currently 8.8, 8.10, 9.2 and 9.4 are supported.
354
421
355
-
For Essential Support customers wishing to use our vetted TuxCare repos instead of the community AlmaLinux ones, all you have to do is run the following as root:
422
+
If you are unsure, run this to find your exact OS version:
This method will work for any version of AlmaLinux 8.x or 9.x, we currently don't mirror the vault (debuginfo/source) repo's.
430
+
You can browse [https://repo.tuxcare.com/tuxcare/](https://repo.tuxcare.com/tuxcare/) and find the correct RPM, or you can figure it out by substituting the version number (8.8, 8.10, 9.2 or 9.4) then install it as root, for example:
366
431
367
-
To revert back to the community mirrors you can run the following as root:
The second step is to activate your license on the system. You should run the `tuxctl` tool as root with your Essential Support license key provided as a command line argument like so:
0 commit comments