catalog.redhat.com Open in urlscan Pro
2a02:26f0:3500:18::1724:a288  Public Scan

Submitted URL: https://access.redhat.com/containers/#/registry.access.redhat.com/ubi8-minimal/images/8.6-854
Effective URL: https://catalog.redhat.com/
Submission: On April 22 via api from GB — Scanned from GB

Form analysis 1 forms found in the DOM

<form class="pf-c-form" style="margin-top:16px" id="ecoFeedbackForm"><input type="hidden" name="form_build_id" value="form-Se0bIPh-L26lbPDwUP218Z2oRfKjEYbIRvKBM4Eo1R8"> <input type="hidden" name="form_token"
    value="w3-skVyKDZSGJUXAawp-QF6jqc-WeSZqCxXqWnqMaBg"> <input type="hidden" name="form_id" value="rhec_feedback_entityform_edit_form">
  <div style="display:flex" class="mobile-stack">
    <div class="pf-c-form__group" style="flex:1;padding-right:16px"><label class="pf-c-form__label" for="field_eco_company[und][0][value]"><span class="pf-c-form__label-text">Your company/organization</span></label>
      <div class="pf-c-form__horizontal-group"><input class="pf-c-form-control" id="company" name="field_eco_company[und][0][value]"></div>
    </div>
    <div class="pf-c-form__group" style="flex:1"><label class="pf-c-form__label" for="field_eco_role[und][0][value]"><span class="pf-c-form__label-text">Your role</span></label>
      <div class="pf-c-form__horizontal-group"><select class="pf-c-form-control" style="padding-left:8px" id="role" name="field_eco_role[und][0][value]">
          <option value="">Select your role</option>
          <option value="Architect">Architect</option>
          <option value="Developer">Developer</option>
          <option value="DevOps Engineer">DevOps Engineer</option>
          <option value="Product Manager">Product Manager</option>
          <option value="Systems Administrator">Systems Administrator</option>
          <option value="Other">Other</option>
        </select></div>
    </div>
  </div>
  <div class="pf-c-form__group"><label class="pf-c-form__label" for="field_eco_what_is_working_well[und][0][value]"><span class="pf-c-form__label-text">What is working well?</span></label>
    <div class="pf-c-form__horizontal-group"><textarea class="pf-c-form-control" type="text" id="workingWell" name="field_eco_what_is_working_well[und][0][value]" aria-label="textarea example"></textarea></div>
  </div>
  <div class="pf-c-form__group"><label class="pf-c-form__label" for="field_eco_how_can_we_improve[und][0][value]"><span class="pf-c-form__label-text">How can we continue to improve?</span></label>
    <div class="pf-c-form__horizontal-group"><textarea class="pf-c-form-control" type="text" id="toImprove" name="field_eco_how_can_we_improve[und][0][value]" aria-label="textarea example"></textarea></div>
  </div>
  <div class="pf-c-form__group"><label class="pf-c-form__label" for="field_eco_email[und][0][value]"><span class="pf-c-form__label-text">Email address (optional)</span></label>
    <div class="pf-c-form__horizontal-group pf-c-form__horizontal-group--email"><input class="pf-c-form-control" type="email" id="email" name="field_eco_email[und][0][value]">
      <p>We may follow up with you if we need more information to act on your feedback.</p>
    </div>
  </div>
  <div class="pf-c-form__group hidden"><label class="pf-c-form__label" for="field_eco_describe_your_issue[und][0][value]"><span class="pf-c-form__label-text">Describe your issue (optional)</span></label>
    <div class="pf-c-form__horizontal-group"><textarea class="pf-c-form-control" type="text" id="toDescribeIssue" name="field_eco_describe_your_issue[und][0][value]" aria-label="textarea example"></textarea></div>
  </div>
  <div class="pf-c-form__group">
    <div class="pf-c-form__actions">
      <div class="cover-spinner__container"><pfe-progress-indicator indeterminate="" size="md" pfelement="" class="PFElement" on="light"></pfe-progress-indicator></div><button class="pf-c-button pf-m-primary" id="ecoFeedbackFormSubmitBtn"
        disabled="true">Submit</button> <button class="pf-c-button pf-m-secondary" type="button" id="modalClose">Cancel</button>
    </div>
  </div>
</form>

Text Content

Skip to navigation Skip to contentYou need to enable JavaScript to run this app.
 * Platforms & industries
   
   
   RED HAT ENTERPRISE LINUX
   
    * Certified software
    * Certified hardware
    * Cloud & service providers
   
   
   RED HAT OPENSHIFT
   
    * Certified software
    * Cloud & service providers
   
   
   RED HAT OPENSTACK
   
    * Certified software
    * Certified hardware
    * Cloud & service providers
   
   
   INDUSTRIES AND SEGMENTS
   
    * Telecommunications

 * Hardware
   
   
   BY CATEGORY
   
    * Servers
    * Edge systems
    * Workstations
    * Components
   
   
   FEATURED LISTS
   
    * Red Hat Enterprise Linux 8 certified servers
    * Red Hat OpenStack 16 certified servers
    * Red Hat Virtualization 4 certified servers
   
   Explore certified hardware
 * Software
   
   
   BY CATEGORY
   
    * OpenShift operators
    * Helm charts
    * Containerized applications
    * OpenStack infrastructure
    * Standalone applications
    * Container images
    * Vulnerability scanners
   
   
   FEATURED LISTS
   
    * OpenShift operators for Red Hat OpenShift 4
    * Standalone applications for Red Hat Enterprise Linux 9
    * CNF certified for Red Hat OpenShift
    * VNF certified for Red Hat OpenStack
   
   
   BASE IMAGES
   
    * About base images
    * Red Hat Universal Base Image 9
    * Red Hat Universal Base Image 8
    * Red Hat Universal Base Image 7
   
   Explore certified softwareManage container registry service accounts
 * Cloud & service providers
   
   
   BY CONSUMPTION TYPE
   
    * Upload an image
    * On demand
   
   
   FEATURED LISTS
   
    * Certified for Red Hat Enterprise Linux 9
   
   
   LEARN MORE
   
    * Red Hat Cloud Access
   
   Explore certified cloud

Help

Resources


RESOURCES

 * Blog
 * Partner podcast


MORE TO EXPLORE

 * All blogs
 * Events and webinars
 * Training and certification
 * Newsroom
 * Resource library
 * Customer success stories

All Red Hat
Back to menu

 * You are here
   
   
   
   
   RED HAT
   
   Learn about our open source products, services, and company.

 * You are here
   
   
   
   
   RED HAT CUSTOMER PORTAL
   
   Get product support and knowledge from the open source experts.

 * You are here
   
   
   
   
   RED HAT DEVELOPER
   
   Read developer tutorials and download Red Hat software for cloud application
   development.

 * You are here
   
   
   
   
   RED HAT PARTNER CONNECT
   
   Become a Red Hat partner and get support in building customer solutions.

--------------------------------------------------------------------------------


 * PRODUCTS
   
   
   * ANSIBLE.COM
     
     Learn about and try our IT automation product.


 * TRY, BUY, SELL
   
   
   * RED HAT HYBRID CLOUD
     
     Access technical how-tos, tutorials, and learning paths focused on Red
     Hat’s hybrid cloud managed services.
   
   
   * RED HAT STORE
     
     Buy select Red Hat products and services online.
   
   
   * RED HAT MARKETPLACE
     
     Try, buy, sell, and manage certified enterprise software for
     container-based environments.


 * COMMUNITY & OPEN SOURCE
   
   
   * THE ENTERPRISERS PROJECT
     
     Read analysis and advice articles written by CIOs, for CIOs.
   
   
   * OPENSOURCE.COM
     
     Read articles on a range of topics about open source.


 *  
   
   
   * RED HAT SUMMIT
     
     Register for and learn about our annual open source IT industry event.
   
   
   * RED HAT ECOSYSTEM CATALOG
     
     Find hardware, software, and cloud providers―and download container
     images―certified to perform with Red Hat technologies.


TESTED. CERTIFIED. SUPPORTED.

Build on Red Hat platforms and technologies with certified, enterprise-grade
products you need to achieve your business outcomes. We make it easy for you to
explore and find certified products from our large and robust ecosystem of
enterprise hardware, software, and cloud and service providers.


BROWSE BY PLATFORM

The leading enterprise Linux operating system, certified on hundreds of clouds
and with thousands of vendors.

Explore

Red Hat® OpenShift® is an enterprise-ready Kubernetes container platform with
full-stack automated operations to manage hybrid cloud, multicloud, and edge
deployments.

Explore

Red Hat® OpenStack® Platform virtualizes resources from industry-standard
hardware, organizes those resources into clouds, and manages them so users can
access what they need—when they need it.

Explore

Red Hat® Ansible® Automation Platform is a foundation for building and operating
automation across an organization.

Explore


STABLE ANYWHERE. AVAILABLE EVERYWHERE.

Red Hat Enterprise Linux 9 has arrived. Browse the latest products certified for
Red Hat Enterprise Linux 9. Learn more

HardwareSoftwareCloud


BROWSE BY CATEGORY


CERTIFIED HARDWARE

Bare metal, appliances, and other hardware from Red Hat partners is certified
and supported for Red Hat technologies.

Explore


CERTIFIED SOFTWARE

OpenShift operators, containerized applications, and traditional software
certified to run on Red Hat platforms.

Explore


CERTIFIED CLOUD AND SERVICE PROVIDERS

Run your applications on Red Hat platforms and technologies in supported clouds
and cloud service providers.

Explore


RED HAT BLOGS


HOW TO BUILD RHEL IMAGES FOR EDGE DEPLOYMENTS

By Chris Santiago|Published Thu, 20 Apr 2023 07:00:00 +0000



As edge infrastructure scales outside the data center into remote locations,
small-factor devices such as IoT, POS, and sensors that have Linux images, need
a way to be updated at scale.

The rpm-ostree core premise is that by default, the updates should base on a
whole base image that is created and tested offline, and once ready deployed
everywhere into the remote locations, overriding the previous image and lowering
the risks of patching at scale.

Figure 1: The image builder.

We know many people are working in secure edge environments and need the ability
to create and lifecycle manage operating systems. In order to help with this we
have created a way to build, host and manage these images using the Red Hat
Ansible Automation Platform.

This article will cover the Ansible collection for management of the osbuild
composer to build rpm-ostree based images for Fedora, Red Hat Enterprise Linux,
and CentOS Stream. This collection has roles to build an osbuild server, an
apache httpd server to host images, and a role to build installer images and
rpm-ostree updates.


2 ROLES OF THE INFRA.OSBUILD COLLECTION

There are two roles that are part of the infra.osbuild collection:


1. THE INFRA.OSBUILD.SETUP_SERVER ROLE

The setup_server role checks to see what type of OS the remote system is
running, ostree-based or non ostree-based. A remote system running an OS based
on ostree will need to have packages already installed via a previous commit or
with the initial install to continue. Non-ostree based hosts will have all the
necessary packages installed.

At the same time the setup_server role also ensures all necessary services are
enabled and started. Lastly it adds support for rpm custom repositories for
adding custom packages to images.


2. THE INFRA.OSBUILD.BUILDER ROLE

This builder role creates a blueprint based on information provided by the
playbook variables such as packages, user info, and compose type. A rpm-ostree
repository is initialized for the blueprint name to handle commits and upgrades.
The builder role creates an image based on the previously created blueprint.
Lastly it creates a kickstart file which supports an optional auto registration
to be used on a system.


HOW TO BUILD IMAGES FOR EDGE DEPLOYMENT

Note: To test this collection you will need either a RHEL, CentOS Stream, or
Fedora system.

Install the infra.osbuild collection using the ansible-galaxy command as
follows:

ansible-galaxy collection install git+https://github.com/redhat-cop/infra.osbuild

Once installed we will make an empty directory to store the example playbooks
and inventory file.

mkdir osbuild_example

Create an inventory file as follows:

touch inventory.ini

Inside the inventory file, create a group named all with the remote systems IP
address underneath.

[all]


Now that we have an inventory file and a remote system to point to. Let’s take a
look into the setup_role. As explained above, this role simply sets up all the
necessary packages and services to get osbuild up and running. If you plan on
using a custom rpm repository to add custom packages that you would like to make
available to osbuild then we need to add some configuration otherwise we can use
the role as is.

Create a playbook named osbuild_setup_server.yaml with the sample playbook as
its contents as follows:

---

- name: Run osbuild_server role

  hosts: all

  become: true

  tasks:

    - name: Run the role

      ansible.builtin.import_role:

        name: infra.osbuild.setup_server

For adding a custom rpm repository, we can pass a list to the
setup_server_custom_repos role variable. Each list entry is a YAML dictionary
type and has the following attributes:

 * repo_name
 * base_url
 * type
 * check_ssl
 * check_gpg
 * rhsm
 * state

If you wanted support for custom rpm repositories your playbook should something
like the following:

---

- name: Run osbuild_server role

  hosts: all

  become: true

  vars:

    setup_server_custom_repos:

      - name: EPEL Everything

        base_url: "https://dl.fedoraproject.org/pub/epel/{{ hostvars[inventory_hostname].ansible_distribution_major_version }}/Everything/x86_64/"

        type: yum-baseurl

        check_ssl: true

        check_gpg: true

        state: present

      - name: My company custom repo

        base_url: "https://repo.example.com/company_repo/x86_64/"

        type: yum-baseurl

  tasks:

    - name: Run the role

      ansible.builtin.import_role:

        name: infra.osbuild.setup_server

Now that we have the osbuild_setup_server file completed, we can run the
playbook using this command:

ansible-playbook -i inventory.ini  –ask-become –ask-pass playbooks/osbuild_setup_server.yaml

Note: We will run the playbook with –ask-become and –ask-pass flags to provide
basic authentication, or if you want to set up proper authentication with ssh
keys and proper user sudo management.

Once the playbook has finished running then the osbuild server is ready for us
to start building images.

As explained  in the infra.osbuild.builder section, there are variables that are
needed to create a blueprint. You can refer to the full list and their
explanations.

Let’s create another playbook called osbuild_builder.yaml with the sample
playbook as its contents as follows:

---

- name: Run osbuild_builder role

  become: true

  hosts: all

  vars:

    builder_compose_type: edge-commit

    builder_blueprint_name: mybuild

    builder_pub_key: ~/.ssh/id_rsa.pub

    builder_compose_pkgs:

      - vim-enhanced

      - httpd

      - ansible-core

      - tmux

    builder_compose_customizations:

      user:

        name: "testuser"

        description: "test user"

        password: "testpassword"

        key: "{{ builder_pub_key }}"

        groups: '["users", "wheel"]'

  tasks:

    - name: Run the role

      ansible.builtin.import_role:

        name: infra.osbuild.builder

If you would like to have your image automatically register with Ansible
Automation Platform, add builder_aap_url, builder_set_hostname,
builder_aap_ks_user and builder_aap_ks_password underneath the vars section in
the osbuild_builder.yaml playbook.

Once you have finished writing your playbook run the osbuild_builder.yml
playbook to begin building an image.

ansible-playbook -i inventory.ini –ask-become –ask-pass playbooks/osbuild_builder.yml

After the playbook finishes, log in into your remote system http://// to see the
hosted repo and kickstart file that can be used to provision a new system.


FIND MORE RESOURCES

In summary, infra.osbuild is an easy-to-use solution for creating customizable
images. Ansible validated content for infrastructure osbuild collection, will
let you automate the provisioning and configuration of the required osbuild
components and build a RHEL image for your edge deployments.

If you want to learn more about edge automation, here are a few suggestions:

 * Explore resources at Using Red Hat Ansible Automation Platform for edge
   computing.
 * Download the Automation at the edge e-book.
 * For additional use cases such as industrial protocol integration, read the
   article, How to automate devices using the Ansible CIP collection. 

The post How to build RHEL images for edge deployments appeared first on Red Hat
Developer.







Read the articleView more blog posts



RED HAT MARKETPLACE

Red Hat® Marketplace is a single source to try, buy, and manage certified
operators for Red Hat OpenShift®. It offers responsive support, streamlined
billing and contracting, simplified governance, and a single dashboard across
clouds.

Explore Red Hat Marketplace



WHY CHOOSE RED HAT CERTIFIED SOLUTIONS?

Built and tested to exacting standards. Ready to deploy in your environment with
confidence.

Detailed interoperability, compatibility, and security details to choose the
right solutions for your business needs.

Fully supported by the provider while maintaining your relationship with Red
Hat’s global support services.


PARTNER WITH RED HAT

We provide a variety of partner resources to assist you through the
certification process to deliver the best possible experience to our mutual
customers. Join the Red Hat Certified Ecosystem and showcase your product to
millions of potential clients, customers, sellers, and developers.

Learn more about how Red Hat Partner Connect can help you succeed
Timestamp: Wed Apr 19 16:23:33 UTC 2023SHA: headVersion: 1.198
LinkedInYouTubeFacebookTwitter


PLATFORMS

 * Red Hat Enterprise Linux
 * Red Hat OpenShift
 * Red Hat OpenStack Platform


PRODUCTS & SERVICES

 * Certified hardware
 * Certified software
 * Certified cloud & service providers


TRY, BUY, SELL

 * Product trial center
 * Red Hat Store
 * Red Hat Marketplace
 * Partner with us
 * Contact sales
 * Contact training
 * Contact consulting


HELP

 * My account
 * Customer support
 * Partner resources
 * Developer resources
 * Training and certification
 * Learning community
 * Catalog documentation
 * Resource library


ABOUT RED HAT ECOSYSTEM CATALOG

The Red Hat Ecosystem Catalog is the official source for discovering and
learning more about the Red Hat Ecosystem of both Red Hat and certified
third-party products and services.

We’re the world’s leading provider of enterprise open source solutions—including
Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make
it easier for enterprises to work across platforms and environments, from the
core datacenter to the network edge.


RED HAT LEGAL AND PRIVACY LINKS

 * About Red Hat
 * Jobs
 * Events
 * Locations
 * Contact Red Hat
 * Red Hat Blog
 * Diversity, equity, and inclusion
 * Cool Stuff Store
 * Red Hat Summit


RED HAT LEGAL AND PRIVACY LINKS

 * Privacy statement
 * Terms of use
 * All policies and guidelines
 * Digital accessibility



SUCCESS ALERT: THANK YOU FOR YOUR FEEDBACK!

Have feedback?


YOUR FEEDBACK IS IMPORTANT TO US

Your company/organization

Your role
Select your roleArchitectDeveloperDevOps EngineerProduct ManagerSystems
AdministratorOther
What is working well?

How can we continue to improve?

Email address (optional)

We may follow up with you if we need more information to act on your feedback.

Describe your issue (optional)


Submit Cancel