This demonstrates the use of Image Builder to
create a (custom) RHEL for Edge OSTree
commit and how to install those to a disk or a virtual machine image.
The latest version of Image Builder can create several types of RHEL for Edge artifacts, all of these are essentially a delivery mechanism for the OSTree commit. Think of this as the OS image, as it literally contains the entire operating system. This demo will show how to create the initial OSTree commit, make it available via HTTP/HTTPS, install a system, and create updates.
┌─────────────────┐
│ │
│ Image Builder │
│ │
└────────┬────────┘
│
▼
┌───────────────┐
│ │
│ OSTree Commit │
│ │
└───────┬───────┘
│
┌─────────────────┼──────────────────┐
│ │ │
┌───────▼───────┐ ┌──────▼──────┐ ┌───────▼───────┐
│ │ │ │ │ │
│ OCI Container │ │ Installer │ │ Raw OSTree │
│ (tar) │ │ (iso) │ │ (tar) │
└───────────────┘ └─────────────┘ └───────────────┘
Install Image Builder on the latest release of RHEL.
8.3 is the minimal required version, but this demo will include features from
later releases. The KVM Guest Image is used to install Image Builder and build a
RHEL for Edge commit. The Boot ISO is then used to install that commit.
| Name | Filename |
|---|---|
| Boot ISO | rhel-8.x-x86_64-boot.iso |
| KVM Guest Image | rhel-8.x-x86_64-kvm.qcow2 |
A small helper script is used to start the RHEL 8.x Guest Image. It uses
cloud-init to provision a
root user (password r). The script also enables port forwarding for
the ssh and web console ports (22 → 2222 (host) and
9090 → 9091).
vm --persist rhel-8.x-x86_64-kvm.qcow2
To be able to install packages the VM must be registered via:
subscription-manager register --username <redhat_login_username> --password <redhat_login_password>
subscription-manager role --set="Red Hat Enterprise Linux Server"
subscription-manager service-level --set="Self-Support"
subscription-manager usage --set="Development/Test"
subscription-manager attach
Image Builder consists of different components: osbuild-composer is the
service that sits between the low level osbuild tool and various front
ends, such as cockpit-composer (web) and composer-cli (command line).
It provides an API that is used front-ends, does job queue management, and
internally calls out to one or more worker services which in turn then use
osbuild to actually assemble the operating system artifacts such as
virtual machine images or in the case of RHEL for Edge OSTree commits.
All necessary components are now included in RHEL 8.3+, and can easily be
installed via:
yum install -y osbuild-composer cockpit-composer
The osbuild-compser service needs to be explicitly enabled:
sudo systemctl enable --now osbuild-composer.socket
NB: Technically only the socket, i.e. the API endpoint is enabled here, not
the service itself. The services will be started on-demand as soon as the
first client connects.
The Image Builder front end is a plugin to the web console (cockpit),
which needs to be enabled.
systemctl enable --now cockpit.socket
Navigate to the web console via a browser on the host. URL: http://localhost:9091
There, Image Builder is found under Apps in the right menu.
Images, or in our case, commits, are generated from so called Blueprints,
which are customizations that are applied to existing Image Types,
e.g. “RHEL for Edge Container”. Internally there is a queue that will
distribute compose requests to workers, which in turn are building the
commits / images. The UI flow is as follows:





Commits can also build from the command line, via the help of
the composer-cli tool (yum install composer-cli).
A new blueprint is created from a TOML file, e.g. blueprint.toml:
$> composer-cli blueprints push blueprint.toml
From this a compose is created for the previously created blueprint
(Edge). The type of the compose here is rhel-edge-container. The
UUID if the compose can later be used to obtain the artifact.
$> composer-cli compose start-ostree Edge rhel-edge-container "" ""
Compose <uuid> added to the queue
The status of a compose can be inspected via:
$> composer-cli compose status
<uuid> RUNNING Thu Jul 30 09:36:14 2020 Edge 0.0.1 rhel-edge-container
Finally the container can be downloaded via
$> composer-cli compose image <uuid>
<uuid>-container.tar: 778.73 MB
Extract the downloaded tarball via tar xvf <uuid>-commit.tar. It should
contain a compose.json and a repo directory. The former contains the
metadata about the commit, like the “Ref” (ref) and the commit id
(ostree-commit). The repo folder is a OSTree repository that contains
the commit.
The ostree and rpm-ostree commands can be used to inspect the contents:
The list of rpm packages included in the commit can be listed via
# print a list of packages in the commit
rpm-ostree db list rhel/8/x86_64/edge --repo=repo
In order to fetch the commit from the (generic) installer, it needs to be
served via HTTP. The container that was just created runs httpd and will serve the OSTree commit.
Import & tag the container
$> skopeo copy oci-archive:<UUID>-rhel84-container.tar containers-storage:localhost/rfe-mirror:latest
Run the container
$> podman run --rm -p 8000:80 -v ./edge.ks:/var/www/html/edge.ks:z edge-server
The repo will now be available at http://10.0.2.2:8000/repo and the supplied kickstart at http://10.0.2.2:8000/edge.ks
The installer, anaconda, on the boot.iso installation medium can
be used to install the commit. To configure the installer to use the
newly build commit, a “kickstart” configuration edge.ks,
is used. It is setup for non-interactive, text-based installation.
The important line within the kickstart is the ostreesetup directive
which instructs the installer to fetch and deploy the commit.
Additionally a user core (pw: edge) is created.
For demonstration purposes we create an empty qcow2 with a size of
5G, to act as the installation target:
qemu-img create -f qcow2 disk.qcow2 5G
The installer is run with qemu:
qemu-system-x86_64 \
-m 2048 \
-enable-kvm \
-device virtio-net-pci,netdev=n0 \
-netdev user,id=n0,net=10.0.2.0/24 \
-drive file=disk.qcow2 \
-cdrom rhel-8.4-x86_64-boot.iso
To use the prepared kickstart file, instead of the default one of
the boot.iso, an additional kernel parameter is needed (hit TAB
on the Install Red Hat Enterprise Linux 8.3 entry):
inst.ks=http://10.0.2.2:8000/edge.ks

As an alternative to supplying the kickstart location via the kernel
command line, the mkksiso (lorax package) can be used to inject
the kickstart file into the boot iso:
mkksiso edge.ks rhel-8.4-x86_64-boot.iso boot.iso
Image Builder can create installer media that embeds the OSTree commit. This is perfect for disconnected environments that require an ISO, thumb drive, or some form of media that doesn’t depend on network access.
An empty blueprint is required to create an installer. An example TOML file is included in this repo, e.g. installer.toml:
$> composer-cli blueprints push installer.toml
Next, start a rhel-edge-installer compose for the blueprint created in the previous step. Passing the --url to the OSTree repository of the commit to embed in the image.
$> composer-cli compose start-ostree RFE-Installer rhel-edge-installer --url http://10.0.2.2:8000/repo/
Compose c5c160a4-8f41-43d0-b842-495e24826b1a added to the queue
When the compose is complete download the ISO
$> composer-cli compose image <uuid>
<uuid>-rhel84-boot.iso: 1646.39 MB
The installer image can be written to optical or flash media using standard methods. A streamlined UI is provided for network & storage configuration and a kickstart can be injected for further customizations and fully automated installs.
The same workflow is available in the web UI as well:

Updates are delivered in form of new commits. This provides one
of the most important features of OSTree: atomic and safe updates.
This means that an update of the system to a new commit will be
deployed either fully or not at all, even if the update process
gets interrupted. Additionally, the old state of the system, i.e.
the deployment of the old commit, is kept around. In case the new
update does not work as expected, it is easy to go back to the
old commit.
Creating a new update commit, which can include new versions of
packages or additional packages, is the same as creating a new
“image”, in Image Builder terms, but with the commit id of the
current deployment (or commit) as the parent. On a booted system
the commit id can be found via rpm-ostree status and can optionally be passed to Image Builder via the Web UI or CLI. An easier option is to supply the Repository URL and let Image Builder fetch the commit id on your behalf.

After the new commit is built, it needs to be served via http,
very much like the initial commit above. Then the system can
be updated via
rpm-ostree update
This will create a new deployment of the new commit. A reboot, via
systemctl reboot, is all that is necessary to boot into that
new deployment.
If something in the new deployment is not as it should be, the old
deployment can be restored via rpm-ostree rollback.
The second kickstart example, edge2.ks, will install the
same ostree commit as well as demonstrate the use of a few features in
%post that makes the OS much easier to manage when using a large
fleet of systems. To use this example simply adjust the kickstart
being used:
inst.ks=http://10.0.2.2:8000/edge2.ks
As new OStree commits are created via Image Builder and made
avaialable, clients will stage the updates locally. Enable staging
by setting AutomaticUpdatePolicy=stage in /etc/rpm-ostreed.conf.
The rpm-ostreed-automatic.timer will also need to be enabled as
shown in the example.
Containers are an ideal vehicle to help minimize “patch Tuesday”
style problems, thus making the this means of application
packaging perfect for long life devices deployed outside of
traditional data centers. Podman natively supports systemd as a
manager and this results in one of the lightest weight solutions
for running containers. The boinc example container shows a
modified unit file generated by podman generate systemd. systemd
will ensure the container-boinc.service is running at startup
and in the case that it fails at runtime, automatically restarted
via Restart=on-failure. This same concept can apply to multiple
containers and/or pods.
Podman has recently implemented the ability to automatically update
containers. The example includes the label
io.containers.autoupdate=image to notify Podman that it should be
running the latest image with the defined tag. systemd timers are
included to schedule this operation.
Timers are very similar to chron jobs, but also offer some amazing
features that benefit this use case. Essentially they’re managed like
any other systemd unit file and the details for options can be found
here.
$ systemctl list-timers
NEXT LEFT LAST PASSED UNIT ACTIVATES
Thu 2020-09-03 00:42:57 UTC 21h left Wed 2020-09-02 00:08:54 UTC 3h 30min ago podman-auto-update.timer podman-auto-update.service
Thu 2020-09-03 01:30:00 UTC 21h left n/a n/a applyupdate.timer applyupdate.service
Thu 2020-09-03 03:00:07 UTC 23h left Wed 2020-09-02 03:00:07 UTC 39min ago rpm-ostreed-automatic.timer rpm-ostreed-automatic.service
Some actions like downloading an OS update or a container image should
ideally use some type of splay to ensure that a reasonable load is
placed on the registry and ostree mirror. Using RandomizedDelaySec=86400
will randomize the timer across a 24 hour period. This is a highly
effect approach for events that are not time sensative and when it
is desireable to spread the load to conserve backend resources.
For events like applying OS updates, it’s best to carefully target a
maintenance window to ensure the SLA is met and the downtime is very
minimal and predictible. The provided example will apply updates
nighly at 1:30 UTC (OnCalendar=--* 01:30:00). A more realistic example
might follow a weekly maintenance window on Sunday nights
(OnCalendar=Sun --* 00:00:00).
When nodes are deployed in numbers ranging from 10s of thousands into
the millions, we need to think differently about how we interact with
the fleet. Also as connectivity increases with systems and devices, the
importance of keeping everything updated while minimizing downtime and
application disruptions also become critical. The example kickstarts
demonstrate how to configure nodes to automatically stay current on
available updates. These concepts can be built upon and adapted for
many other use cases.
We use cookies
We use cookies to analyze traffic and improve your experience. You can accept or reject analytics cookies.