why the tftp service is not running on the spacewalk server?<div><br></div><div><div># netstat -ntulp | grep -i tftp</div><div><br></div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Mon, Dec 3, 2012 at 4:41 PM, Mohit Vadhera <span dir="ltr"><<a href="mailto:project.linux.proj@gmail.com" target="_blank">project.linux.proj@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div>Can you please check my below 3 steps that i used to create kickstart configuration. It is not working.</div><div>
<br></div><div>1)  Created Distribution </div><div><br></div><div>Distribution Label*: <span style="white-space:pre-wrap">      </span>Centos-6-x86_64_kickstart</div>
<div>Tree Path*: <span style="white-space:pre-wrap">                      </span>/var/distro-trees/Centos-6-x86_64</div><div>Base Channel*: <span style="white-space:pre-wrap">                 </span>spacewalk_cli</div>
<div>Installer Generation*: <span style="white-space:pre-wrap">   </span>Red Hat Enterprise Linux 6</div><div><br></div><div><br></div><div><br></div><div>2) Under Kickstart > Profile > Kickstart file.</div>
<div><br></div><div># Kickstart config file generated by Spacewalk Config Management</div><div># Profile Label : Centos6_kickstart</div><div># Date Created  : 2012-11-28 04:50:35.814851</div><div><br></div><div>install</div>

<div>text</div><div>network --bootproto dhcp</div><div>url --url <a href="http://172.20.3.32/ks/dist/Centos-6-x86_64_kickstart" target="_blank">http://172.20.3.32/ks/dist/Centos-6-x86_64_kickstart</a></div><div>lang en_US</div>
<div>keyboard us</div>
<div>zerombr</div><div>clearpart --all</div><div>bootloader --location mbr</div><div>timezone America/New_York</div><div>auth --enablemd5 --enableshadow</div><div>rootpw --iscrypted $1$atc.HgK3$59Uy2fE4ZJ30pmY/f2fY//</div>

<div>selinux --permissive</div><div>reboot</div><div>firewall --disabled</div><div>skipx</div><div>part /boot --fstype=ext3 --size=200 </div><div>part pv.01 --size=1000 --grow </div><div>part swap --size=1000   --maxsize=2000 </div>

<div>volgroup myvg pv.01 </div><div>logvol / --vgname=myvg --name=rootvol --size=1000 --grow</div><div><br></div><div>%packages </div><div>@ Base</div><div>%end</div><div><br></div><div>%pre</div><div><br></div><div>wget "<a href="http://172.20.3.32/cblr/svc/op/trig/mode/pre/profile/Centos6_kickstart:1:SpacewalkDefaultOrganization" target="_blank">http://172.20.3.32/cblr/svc/op/trig/mode/pre/profile/Centos6_kickstart:1:SpacewalkDefaultOrganization</a>" -O /dev/null</div>

<div><br></div><div>echo "Saving RHN keys..." > /dev/ttyS0</div><div>SYSTEM_ID=/etc/sysconfig/rhn/systemid</div><div>rhn_keys_found=no</div><div><br></div><div>mkdir -p /tmp/rhn</div><div><br></div><div>drives=$(list-harddrives | awk '{print $1}')</div>

<div>for disk in $drives; do</div><div>    DISKS="$DISKS $(fdisk -l /dev/$disk | grep -v "swap\|LVM\|Extended" | awk '/^\/dev/{print $1}')"</div><div>done</div><div><br></div><div># Try to find the keys on ordinary partitions</div>

<div>for disk in $DISKS; do</div><div>    name=test-$(basename $disk)</div><div>    mkdir -p /tmp/$name</div><div>    mount $disk /tmp/$name</div><div>    [ $? -eq 0 ] || continue # Skip to the next partition if the mount fails</div>

<div><br></div><div>    # Copy current RHN host keys out to be reused</div><div>    if [ -f /tmp/${name}$SYSTEM_ID ]; then</div><div>        cp -a /tmp/${name}$SYSTEM_ID /tmp/rhn</div><div>        rhn_keys_found="yes"</div>

<div>        umount /tmp/$name</div><div>        break</div><div>    fi</div><div>    umount /tmp/$name</div><div>    rm -r /tmp/$name</div><div>done</div><div><br></div><div># Try LVM if that didn't work</div><div>if [ "$rhn_keys_found" = "no" ]; then</div>

<div>    lvm lvmdiskscan</div><div>    vgs=$(lvm vgs | tail -n +2 | awk '{ print $1 }')</div><div>    for vg in $vgs; do</div><div>        # Activate any VG we found</div><div>        lvm vgchange -ay $vg</div><div>

    done</div><div>    </div><div>    lvs=$(lvm lvs | tail -n +2 | awk '{ print "/dev/" $2 "/" $1 }')</div><div>    for lv in $lvs; do</div><div>        tmpdir=$(mktemp -d findkeys.XXXXXX)</div>

<div>        mkdir -p /tmp/${tmpdir}</div><div>        mount $lv /tmp/${tmpdir} || continue # Skip to next volume if this fails</div><div><br></div><div>        # Let's see if the keys are in there</div><div>        if [ -f /tmp/${tmpdir}$SYSTEM_ID ]; then</div>

<div>            cp -a /tmp/${tmpdir}$SYSTEM_ID /tmp/rhn/</div><div>            rhn_keys_found="yes"</div><div>            umount /tmp/${tmpdir}</div><div>            break # We're done!</div><div>        fi</div>

<div>        umount /tmp/${tmpdir}</div><div>        rm -r /tmp/${tmpdir}</div><div>    done</div><div>    </div><div>    # And clean up..</div><div>    for vg in $vgs; do</div><div>        lvm vgchange -an $vg</div><div>

    done</div><div>fi</div><div><br></div><div><br></div><div>%end</div><div><br></div><div>%post --nochroot</div><div>mkdir /mnt/sysimage/tmp/ks-tree-copy</div><div>if [ -d /oldtmp/ks-tree-shadow ]; then</div><div>cp -fa /oldtmp/ks-tree-shadow/* /mnt/sysimage/tmp/ks-tree-copy</div>

<div>elif [ -d /tmp/ks-tree-shadow ]; then</div><div>cp -fa /tmp/ks-tree-shadow/* /mnt/sysimage/tmp/ks-tree-copy</div><div>fi</div><div>cp /etc/resolv.conf /mnt/sysimage/etc/resolv.conf</div><div>cp -f /tmp/ks-pre.log* /mnt/sysimage/root/ || :</div>

<div><br></div><div>%end</div><div><br></div><div>%post --nochroot --interpreter /usr/bin/python</div><div>try:</div><div>    import xmlrpclib</div><div>    import shutil</div><div>    import sys</div><div>    import os.path</div>

<div>    old_system_id = "/tmp/rhn/systemid"</div><div>    new_system_id = "/mnt/sysimage/root/systemid.old"</div><div><br></div><div>    new_keys = "1-cf6f587afe9af315b2e2b87ceb11c4a9"</div>

<div>    for key in new_keys.split(','):</div><div>        if key.startswith('re-'):</div><div>            sys.exit(0)</div><div>    if os.path.exists(old_system_id):</div><div>        client =  xmlrpclib.Server("<a href="http://172.20.3.32/rpc/api" target="_blank">http://172.20.3.32/rpc/api</a>")</div>

<div>        key = client.system.obtain_reactivation_key(open(old_system_id).read())</div><div>        f = open("/mnt/sysimage/tmp/key","w")</div><div>        f.write(key)</div><div>        f.close()</div>

<div>        shutil.copy(old_system_id, new_system_id)</div><div>except:</div><div>    # xml rpc due to  a old/bad system id</div><div>    # we don't care about those</div><div>    # we'll register those as new.</div>

<div>    pass</div><div><br></div><div><br></div><div>%end</div><div><br></div><div>%post --log /root/ks-rhn-post.log</div><div># --Begin Spacewalk command section--</div><div>cat > /tmp/ssl-key-1 <<'EOF'</div>

<div>Certificate:</div><div>    Data:</div><div>        Version: 3 (0x2)</div><div>        Serial Number:</div><div>            d6:8b:86:88:9f:13:e6:ee</div><div>        Signature Algorithm: sha1WithRSAEncryption</div><div>

        Issuer: C=IN, ST=Delhi, L=India, O=opera solutions, OU=Infra-Yum1, CN=Infra-Yum1</div><div>        Validity</div><div>            Not Before: Nov 20 09:24:23 2012 GMT</div><div>            Not After : Nov 14 09:24:23 2036 GMT</div>

<div>        Subject: C=IN, ST=Delhi, L=India, O=opera solutions, OU=Infra-Yum1, CN=Infra-Yum1</div><div>        Subject Public Key Info:</div><div>            Public Key Algorithm: rsaEncryption</div><div>                Public-Key: (2048 bit)</div>

<div>                Modulus:</div><div>                    00:e7:2a:d4:76:f4:ad:92:de:4c:60:3e:2e:bd:ba:</div><div>                    89:96:3c:88:0c:7d:bb:a0:62:7d:2a:6b:00:d1:0c:</div><div>                    c0:93:bd:d1:12:05:ac:7b:52:a7:6f:2a:bb:3d:12:</div>

<div>                    86:0d:45:3c:a8:c2:8b:90:50:4e:82:40:f0:c0:53:</div><div>                    1f:5a:03:24:14:07:24:79:e1:b4:8c:5c:f5:b5:bc:</div><div>                    ca:d0:07:b4:4c:5b:2e:b3:01:d8:12:0e:27:74:02:</div>

<div>                    8d:59:e6:56:6b:b0:3a:45:68:24:08:72:9e:98:e0:</div><div>                    cf:e0:59:88:3a:08:e1:a0:90:58:7b:ca:8d:41:9f:</div><div>                    56:70:73:7e:d6:19:dc:4d:8a:ef:83:5b:d5:fb:27:</div>

<div>                    a1:97:36:86:ac:4f:7c:db:01:3f:4c:6e:a3:40:20:</div><div>                    8c:2e:34:5d:f3:d6:ef:ec:02:d3:34:b6:7c:67:60:</div><div>                    69:c9:94:7f:39:b2:06:24:91:6c:04:c0:cb:cb:2b:</div>

<div>                    ae:03:3a:8b:d4:40:b3:d9:fd:52:f6:3c:fe:70:2d:</div><div>                    ba:f5:44:54:32:d1:96:7f:12:b1:c6:a9:f1:fa:ea:</div><div>                    4a:9b:a9:5d:c1:f4:d9:b3:db:a4:13:ce:59:5c:ea:</div>

<div>                    4c:c7:b2:ba:63:2e:bf:35:79:1f:7a:56:c4:1c:e4:</div><div>                    fc:0a:fd:c1:8c:f4:47:11:15:20:bf:ab:cc:76:74:</div><div>                    86:bd</div><div>                Exponent: 65537 (0x10001)</div>

<div>        X509v3 extensions:</div><div>            X509v3 Basic Constraints: </div><div>                CA:TRUE</div><div>            X509v3 Key Usage: </div><div>                Digital Signature, Key Encipherment, Certificate Sign</div>

<div>            X509v3 Extended Key Usage: </div><div>                TLS Web Server Authentication, TLS Web Client Authentication</div><div>            Netscape Comment: </div><div>                RHN SSL Tool Generated Certificate</div>

<div>            X509v3 Subject Key Identifier: </div><div>                C8:40:CC:F0:B8:FA:C5:2F:28:E3:B3:76:34:4F:28:5D:61:32:49:D1</div><div>            X509v3 Authority Key Identifier: </div><div>                keyid:C8:40:CC:F0:B8:FA:C5:2F:28:E3:B3:76:34:4F:28:5D:61:32:49:D1</div>

<div>                DirName:/C=IN/ST=Delhi/L=India/O=opera solutions/OU=Infra-Yum1/CN=Infra-Yum1</div><div>                serial:D6:8B:86:88:9F:13:E6:EE</div><div><br></div><div>    Signature Algorithm: sha1WithRSAEncryption</div>

<div>        de:a9:e9:cb:7a:4f:bc:bb:ac:d2:53:4c:08:bf:12:dd:ed:8e:</div><div>        c9:b4:47:1d:64:13:c9:42:b7:48:92:a3:32:2e:83:a2:76:27:</div><div>        a0:d1:5d:93:8c:de:c3:ff:b6:79:7d:e1:ca:54:e5:30:b8:05:</div><div>

        de:23:1b:56:2e:ee:62:eb:4d:5e:54:5b:3b:70:e2:97:6c:87:</div><div>        27:8a:b4:e0:f7:ae:31:ee:c8:a6:a7:60:8e:3a:1b:b0:9f:1e:</div><div>        70:a2:7b:2f:ab:51:d1:e3:cc:b2:e3:b3:5a:72:8b:15:36:1d:</div><div>        48:4a:08:68:04:31:20:f6:42:79:c8:13:9b:b6:c6:bb:f3:4d:</div>

<div>        07:96:69:8f:74:63:2d:27:3f:4f:97:ef:e8:cb:c3:71:f3:2b:</div><div>        0d:22:3d:89:33:f0:ab:4a:f3:e6:3d:44:7b:24:c3:f8:c7:ec:</div><div>        92:92:b9:f9:b1:cb:50:cd:25:fd:52:c4:8a:e6:ab:d9:cb:15:</div><div>

        83:d5:2c:0c:b2:06:9f:97:73:43:90:91:23:b7:95:f1:35:8e:</div><div>        32:77:0c:cf:5b:65:65:00:5a:6b:b7:27:34:c5:a6:ce:92:76:</div><div>        e2:ab:e6:2a:0b:c6:40:2f:8d:9c:96:52:fa:ea:d0:a0:6a:34:</div><div>        92:8f:9f:0d:b3:37:57:86:cb:54:c3:6f:c4:da:89:e0:9c:80:</div>

<div>        fb:df:08:cb</div><div>-----BEGIN CERTIFICATE-----</div><div>MIIEnTCCA4WgAwIBAgIJANaLhoifE+buMA0GCSqGSIb3DQEBBQUAMHExCzAJBgNV</div><div>BAYTAklOMQ4wDAYDVQQIEwVEZWxoaTEOMAwGA1UEBxMFSW5kaWExGDAWBgNVBAoT</div><div>

D29wZXJhIHNvbHV0aW9uczETMBEGA1UECxMKSW5mcmEtWXVtMTETMBEGA1UEAxMK</div><div>SW5mcmEtWXVtMTAeFw0xMjExMjAwOTI0MjNaFw0zNjExMTQwOTI0MjNaMHExCzAJ</div><div>BgNVBAYTAklOMQ4wDAYDVQQIEwVEZWxoaTEOMAwGA1UEBxMFSW5kaWExGDAWBgNV</div>
<div>
BAoTD29wZXJhIHNvbHV0aW9uczETMBEGA1UECxMKSW5mcmEtWXVtMTETMBEGA1UE</div><div>AxMKSW5mcmEtWXVtMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOcq</div><div>1Hb0rZLeTGA+Lr26iZY8iAx9u6BifSprANEMwJO90RIFrHtSp28quz0Shg1FPKjC</div>
<div>
i5BQToJA8MBTH1oDJBQHJHnhtIxc9bW8ytAHtExbLrMB2BIOJ3QCjVnmVmuwOkVo</div><div>JAhynpjgz+BZiDoI4aCQWHvKjUGfVnBzftYZ3E2K74Nb1fsnoZc2hqxPfNsBP0xu</div><div>o0AgjC40XfPW7+wC0zS2fGdgacmUfzmyBiSRbATAy8srrgM6i9RAs9n9UvY8/nAt</div>
<div>
uvVEVDLRln8Sscap8frqSpupXcH02bPbpBPOWVzqTMeyumMuvzV5H3pWxBzk/Ar9</div><div>wYz0RxEVIL+rzHZ0hr0CAwEAAaOCATYwggEyMAwGA1UdEwQFMAMBAf8wCwYDVR0P</div><div>BAQDAgKkMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAxBglghkgBhvhC</div>
<div>
AQ0EJBYiUkhOIFNTTCBUb29sIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E</div><div>FgQUyEDM8Lj6xS8o47N2NE8oXWEySdEwgaMGA1UdIwSBmzCBmIAUyEDM8Lj6xS8o</div><div>47N2NE8oXWEySdGhdaRzMHExCzAJBgNVBAYTAklOMQ4wDAYDVQQIEwVEZWxoaTEO</div>
<div>
MAwGA1UEBxMFSW5kaWExGDAWBgNVBAoTD29wZXJhIHNvbHV0aW9uczETMBEGA1UE</div><div>CxMKSW5mcmEtWXVtMTETMBEGA1UEAxMKSW5mcmEtWXVtMYIJANaLhoifE+buMA0G</div><div>CSqGSIb3DQEBBQUAA4IBAQDeqenLek+8u6zSU0wIvxLd7Y7JtEcdZBPJQrdIkqMy</div>
<div>
LoOidieg0V2TjN7D/7Z5feHKVOUwuAXeIxtWLu5i601eVFs7cOKXbIcnirTg964x</div><div>7simp2COOhuwnx5wonsvq1HR48yy47NacosVNh1ISghoBDEg9kJ5yBObtsa7800H</div><div>lmmPdGMtJz9Pl+/oy8Nx8ysNIj2JM/CrSvPmPUR7JMP4x+ySkrn5sctQzSX9UsSK</div>
<div>
5qvZyxWD1SwMsgafl3NDkJEjt5XxNY4ydwzPW2VlAFprtyc0xabOknbiq+YqC8ZA</div><div>L42cllL66tCgajSSj58NszdXhstUw2/E2ongnID73wjL</div><div>-----END CERTIFICATE-----</div><div><br></div><div>EOF</div><div># ssl-key1</div><div>cat /tmp/ssl-key-* > /usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT</div>

<div>perl -pe 's/RHNS-CA-CERT/RHN-ORG-TRUSTED-SSL-CERT/g' -i /etc/sysconfig/rhn/up2date</div><div><br></div><div>mkdir -p /tmp/rhn_rpms/optional</div><div>cd /tmp/rhn_rpms/optional </div><div>wget -P /tmp/rhn_rpms/optional <a href="http://172.20.3.32/download/package/7a24d4867f44d92cccea1f84f48d644acc0e7be5/0/1/8226/rhnlib-2.5.55-1.el6.noarch.rpm" target="_blank">http://172.20.3.32/download/package/7a24d4867f44d92cccea1f84f48d644acc0e7be5/0/1/8226/rhnlib-2.5.55-1.el6.noarch.rpm</a> </div>

<div>rpm -Uvh --replacepkgs --replacefiles /tmp/rhn_rpms/optional/pyOpenSSL* /tmp/rhn_rpms/optional/rhnlib* /tmp/rhn_rpms/optional/libxml2-python* </div><div>perl -npe 's|^(\s*(noSSLS\|s)erverURL\s*=\s*[^:]+://)[^/]*/|${1}<a href="http://172.20.3.32/%7C" target="_blank">172.20.3.32/|</a>' -i /etc/sysconfig/rhn/up2date</div>

<div><br></div><div># now copy from the ks-tree we saved in the non-chroot checkout</div><div>cp -fav /tmp/ks-tree-copy/* /</div><div>rm -Rf /tmp/ks-tree-copy</div><div># --End Spacewalk command section--</div><div><br></div>

<div># begin cobbler snippet</div><div># set default MOTD</div><div>echo "Kickstarted on $(date +'%Y-%m-%d')" >> /etc/motd</div><div><br></div><div># begin Red Hat management server registration</div>

<div>mkdir -p /usr/share/rhn/</div><div>wget <a href="http://172.20.3.32/pub/RHN-ORG-TRUSTED-SSL-CERT" target="_blank">http://172.20.3.32/pub/RHN-ORG-TRUSTED-SSL-CERT</a> -O /usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT   </div>
<div>perl -npe 's/RHNS-CA-CERT/RHN-ORG-TRUSTED-SSL-CERT/g' -i /etc/sysconfig/rhn/*  </div>
<div>if [ -f /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release ]; then</div><div>    rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release</div><div>fi</div><div>key=""</div><div>if [ -f /tmp/key ]; then</div><div>

    key=`cat /tmp/key`</div><div>fi</div><div><br></div><div>if [ $key ]; then </div><div>    rhnreg_ks --serverUrl=<a href="https://172.20.3.32/XMLRPC" target="_blank">https://172.20.3.32/XMLRPC</a> --sslCACert=/usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT --activationkey=$key,1-cf6f587afe9af315b2e2b87ceb11c4a9</div>

<div>else</div><div>     rhnreg_ks --serverUrl=<a href="https://172.20.3.32/XMLRPC" target="_blank">https://172.20.3.32/XMLRPC</a> --sslCACert=/usr/share/rhn/RHN-ORG-TRUSTED-SSL-CERT --activationkey=1-cf6f587afe9af315b2e2b87ceb11c4a9</div>

<div>fi</div><div># end Red Hat management server registration</div><div><br></div><div># end cobbler snippet</div><div><br></div><div>rhn_check</div><div><br></div><div># Start post_install_network_config generated code</div>

<div># End post_install_network_config generated code</div><div><br></div><div>%end</div><div><br></div><div><br></div><div>%post</div><div><br></div><div><br></div><div># Start koan environment setup</div><div>echo "export COBBLER_SERVER=172.20.3.32" > /etc/profile.d/cobbler.sh</div>

<div>echo "setenv COBBLER_SERVER 172.20.3.32" > /etc/profile.d/cobbler.csh</div><div># End koan environment setup</div><div><br></div><div><br></div><div><br></div><div>wget "<a href="http://172.20.3.32/cblr/svc/op/ks/profile/Centos6_kickstart:1:SpacewalkDefaultOrganization" target="_blank">http://172.20.3.32/cblr/svc/op/ks/profile/Centos6_kickstart:1:SpacewalkDefaultOrganization</a>" -O /root/cobbler.ks</div>

<div>wget "<a href="http://172.20.3.32/cblr/svc/op/trig/mode/post/profile/Centos6_kickstart:1:SpacewalkDefaultOrganization" target="_blank">http://172.20.3.32/cblr/svc/op/trig/mode/post/profile/Centos6_kickstart:1:SpacewalkDefaultOrganization</a>" -O /dev/null</div>

<div>%end</div><div><br></div><div><br></div><div><br></div><div>3) Then i moved to my vmware client , started with PXE  and got the below error while booting.</div><div><br></div><div>PXE-E53: No boot filename received</div>

<div>PXE-M0F: Exiting Intel PXE ROM</div><div>Operating System not found. </div>
</blockquote></div><br></div>