Unattended Installation of ensim-installer.
To perform an unattended installation:
Run the install script with the—assume-yes option.
The—assume-yes option sets the value yes to installation queries that require a yes or no response. For key script options, see the command options. Use the—help option with the script to learn more about the various command line options you can use with the script.
python ensim-installer.py -n[admin_username] -p[admin_passwd] -m[admin_email] [installation_files_source] [os_update_repository] –assume-yes
Example
In the following example, the command installs Parallels Pro Control Panel on RHEL by obtaining the necessary Parallels Pro Control Panel files from Parallels Pro Control Panel FTP server and the operating system RPMs and updates from RHN.
python ensim-installer.py -nadmin -ppasswd -m example1@example.com
The installer begins installation of Parallels Pro Control Panel.
All the services and add-ons provided by Parallels Pro Control Panel are installed. The
installation events are recorded in the log file
/var/log/ensim/installer.[version].[release]-[install attempt].log
Tags: ensim-installer, Installation, Unattended
Installation Instructions
Obtaining the Installer Script
You can obtain the installer script from the FTP server or from the download page
http://download.pro.parallels.com/ensim/apt/ensim/EPL/10.3.4/ensim-installer.py
Before you start the installation make sure that if you select any option other than the Everything option, then refer the List of RPMs to verify the RPMs required on the Parallels Pro Control Panel server.
Attended Installation
python ensim-installer.py -n [admin_username] -p [admin_passwd] -m [admin_email]
[installation_files_source] [os_update_repository]
Examples
In the following example, the command installs Parallels Pro Control Panel on RHEL by obtaining the necessary Parallels Pro Control Panel files from Parallels FTP server and the operating system RPMs, updates RPM and extras RPM from RHN.
python ensim-installer.py -n admin -p passwd -m example1@example.com
Note:
Parallels Pro Control Panel can also be installed on a Virtuozzo server. The Virtuozzo server allows you to create multiple, isolated virtual environments on a single physical server.
Tags: Control, Installer, Panel, Parallels, Pro, server
Parallels Pro Control Panel (formerly known as Ensim Pro) Requirements.
Operating Systems supported in Parallels Pro Control Panel for Linux v10.3.1:
Supported Linux Versions:
* Fedora Core 4 (32 bits)
* Fedora Core 6( 32 and 64 bits)
* Red Hat Enterprise Linux ES 4ES (32 and 64 bits)
* Red Hat Enterprise Linux ES 5ES (32 and 64 bits)
* CentOS 4.4 (32 and 64 bits)
* CentOS 5.0 (32 and 64 bits)
Note: FC 4 operating system is supported only with 32-bit architecture, and all other operating systems are supported with both 32-bit and 64-bit architecture.
Disk space At least 40 GB.
Disk partition /boot: At least 75 MB
License Control Panel. You need a valid license key before you can install Parallels Pro.
Other requirements root user access.
spamassassin-3 or later version. You must install the RPM spamassassin-3 or later on the server before you install Parallels Pro Control Panel.
Important: Parallels Pro Control Panel is compatible with yum version 2.4 or later.
Verify that you have disabled SELinux (if installed).
Tags: Control, Ensim Pro, Panel, Parallels, Pro, Requirements
SSh key passphrase and SSH Agent
It is recommended to protect the keys with a passphrase. it is straightforward to do so. In fact you will be asked to provide a passphrase to your private key during key generation and you can skip it if you want. In case you did skip it you can lock it again with a passphrase using the following.
Then it will prompt to put the key file path and you should enter then the password which must be more than five chrs.
Of course using keys is not only useful for security reasons, but also for not asking for password every time you use ssh. But thanks to ssh-agent we could save ourselves a few keystrokes, and more importantly use ssh in automated scripts without interrupting the script to prompt for passwords.
SSH Agent
$ eval `ssh-agent`
$ ssh-add /home/buddies/.ssh/buddies_rsa
$ ssh root@myremote.serverbuddies.com
We first ran the ssh agent, which is actually a service.
Then use ssh-add to add the key, then ssh the remote server with only the user name and the remote server address, without providing the key, and if you have protected the key with passphrase you will be asked for the passphrase when you add it.
The ssh-agent help in opening a session so we can use ssh to access remote server without giving any keys or password.
Tags: Agent, key, passphrase, SSH
SSH Key generation for Security
We need to generate a pair of keys, on public for the server to encrypt the data and a private key, which is the only key that could decipher the encrypted data, and this private key is by definition should be kept private. There is many secure algorithm for encryption with different degree of encryption strength.
There is DSA and RSA, DSA is the standard encryption for the USA government, DSA keys has a 1024 size limit, whereas RSA is unlimited .
RSA key with a 2048 length, here are the steps.
$ ssh-keygen -v -t rsa -b 2048
Generating public/private rsa key pair.
Enter file in which to save the key (/home/buddies/.ssh/id_rsa): /home/buddies/.ssh/buddies_rsa
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/buddies/.ssh/buddies_rsa.
Your public key has been saved in /home/buddies/.ssh/buddies_rsa.pub.
The key fingerprint is:
66:d2:cc:7b:6a:62:f9:f5:c6:ef:69:fc:7b:87:0d:46 buddies@buddies
and then
$ chmod 600 /home/buddies/.ssh/buddies_rsa
$ scp /home/buddies/.ssh/buddies_rsa.pub buddies@myremote.server.com:/home/buddies/.ssh
on remote server we should do the following.
$ cat /home/buddies/.ssh/buddies_rsa.pub > /home/buddies/.ssh/authorized_keys
You will be asked for the login password on remote before the copying commences.
The file will be copied to login user home directory on remote (/home/buddies in that case).
Tags: generation, key, Security, SSH