Jump to contentJump to page navigation: previous page [access key p]/next page [access key n]
SUSE Linux Enterprise Server 15 SP2

AutoYaST Guide


AutoYaST is a system for unattended mass deployment of SUSE Linux Enterprise Server systems. AutoYaST installations are performed using an AutoYaST control file (also called a profile) with your customized installation and configuration data.

Publication Date: July 26, 2022
1 Introduction to AutoYaST
1.1 Motivation
1.2 Overview and Concept
I Understanding and Creating the AutoYaST Control File
2 The AutoYaST Control File
2.1 Introduction
2.2 Format
2.3 Structure
3 Creating an AutoYaST Control File
3.1 Collecting Information
3.2 Using the Configuration Management System (CMS)
3.3 Creating/Editing a Control File Manually
3.4 Creating a Control File via Script with XSLT
II AutoYaST Configuration Examples
4 Configuration and Installation Options
4.1 General Options
4.2 Reporting
4.3 System Registration and Extension Selection
4.4 The Boot Loader
4.5 Partitioning
4.6 iSCSI Initiator Overview
4.7 Fibre Channel over Ethernet Configuration (FCoE)
4.8 Country Settings
4.9 Software
4.10 Upgrade
4.11 Services and Targets
4.12 Network Configuration
4.13 NIS Client and Server
4.14 NIS Server
4.15 Hosts Definition
4.16 Windows Domain Membership
4.17 Samba Server
4.18 Authentication Client
4.19 NFS Client and Server
4.20 NTP Client
4.21 Mail Server Configuration
4.22 Apache HTTP Server Configuration
4.23 Squid Server
4.24 FTP Server
4.25 TFTP Server
4.26 Firstboot Workflow
4.27 Security Settings
4.28 Linux Audit Framework (LAF)
4.29 Users and Groups
4.30 Custom User Scripts
4.31 System Variables (Sysconfig)
4.32 Adding Complete Configurations
4.33 Ask the User for Values during Installation
4.34 Kernel Dumps
4.35 DNS Server
4.36 DHCP Server
4.37 Firewall Configuration
4.38 Miscellaneous Hardware and System Components
4.39 Importing SSH Keys and Configuration
4.40 Configuration Management
III Managing Mass Installations with Rules and Classes
5 Rules and Classes
5.1 Rule-based Automatic Installation
5.2 Classes
5.3 Mixing Rules and Classes
5.4 Merging of Rules and Classes
IV Understanding the Auto-Installation Process
6 The Auto-Installation Process
6.1 Introduction
6.2 Choosing the Right Boot Medium
6.3 Invoking the Auto-Installation Process
6.4 System Configuration
V Uses for AutoYaST on Installed Systems
7 Running AutoYaST in an Installed System
VI Appendices
A Handling Rules
B AutoYaST FAQ—Frequently Asked Questions
C Advanced linuxrc Options
C.1 Passing Parameters to linuxrc
C.2 info File Format
C.3 Advanced Network Setup
D Differences Between AutoYaST Profiles in SLE 12 and 15
D.1 Product Selection
D.2 Software
D.3 Registration of Module and Extension Dependencies
D.4 Partitioning
D.5 Firewall Configuration
D.6 NTP Configuration
D.7 AutoYaST Packages Are Needed for the Second Stage
D.8 The CA Management Module Has Been Dropped
D.9 Upgrade
List of Examples
2.1 AutoYaST Control File (Profile)
2.2 Control file container
2.3 Nested Resources
3.1 Example File for Replacing the Host Name/Domain by Script
4.1 General Options
4.2 Reporting Behavior
4.3 LVM-based Guided Partitioning
4.4 Creating /, /home and swap partitions
4.5 Using a Whole Disk as a File System
4.6 Automated Partitioning on Selected Drives
4.7 Installing on Multiple Drives
4.8 Mount Options
4.9 Keeping partitions
4.10 Auto-detection of partitions to be kept.
4.11 Create LVM Physical Volume
4.12 LVM Logical Volumes
4.13 RAID1 Configuration
4.14 RAID1 Without Partitions
4.15 Old Style RAID1 Configuration
4.16 Using Multipath Devices
4.17 Listing multipath devices
4.18 Using the WWID to Identify a Multipath Device
4.19 bcache Definition
4.20 Multi-device Btrfs configuration
4.21 NFS Share Definition
4.22 iSCSI client
4.23 FCoE configuration
4.24 Language
4.25 Timezone
4.26 Keyboard
4.27 Explicit Product Selection
4.28 Package Selection in the Control File with Patterns and Packages Sections
4.29 Creating a Package Database With the Additional Package inst-source-utils.rpm
4.30 add_on_products.xml
4.31 Adding the SDK Extension and a User Defined Repository
4.32 Kernel Selection in the Control File
4.33 Package Selection in Control File
4.34 Upgrade and Backup
4.35 Configuring Services and Targets
4.36 Network configuration
4.37 Bonding interface configuration
4.38 Bridge Interface Configuration
4.39 Assigning a Persistent Name Using the MAC Address
4.40 Network routing configuration
4.41 Network configuration: Proxy
4.42 Network configuration: NIS
4.43 NIS Server Configuration
4.44 /etc/hosts
4.45 Samba Client configuration
4.46 Samba Server configuration
4.47 Network Configuration: NFS Client
4.48 Network Configuration: NFS Server
4.49 Network Configuration: NTP Client
4.50 Mail Configuration
4.51 HTTP Server Configuration
4.52 Squid Server Configuration
4.53 FTP server configuration:
4.54 TFTP server configuration:
4.55 Enabling Firstboot Workflow
4.56 Security configuration
4.57 LAF configuration
4.58 Minimal User Configuration
4.59 Complex User Configuration
4.60 Group Configuration
4.61 Enabling autologin and password-less login
4.62 Script Configuration
4.63 Sysconfig Configuration
4.64 Dumping files into the installed system
4.65 Dumping files into the installed system
4.66 Kdump configuration
4.67 Disabled Kdump configuration
4.68 Kdump memory reservation with multiple values
4.69 Basic DNS server settings
4.70 Configuring DNS server zones and advanced settings
4.71 Example dhcp-server section
4.72 Example firewall section
4.73 Printer configuration
4.74 Sound configuration
4.75 Importing SSH Keys and Configuration from /dev/sda2
4.76 Client/Server with Manual Authentication
4.77 Client/Server with Preseed Keys
4.78 Standalone Mode
5.1 Simple Rules File
5.2 Simple Rules File
6.1 Determine HEX code for an IP address
6.2 linuxrc Options in the AutoYaST Control File
D.1 Adding Modules and Extensions (online)
D.2 Adding Modules and Extensions (offline)
D.3 Specifying the Btrfs Default Subvolume Name
D.4 Disabling Btrfs Subvolumes
D.5 Assigning Zones: Default Configuration (Deprecated Syntax)
D.6 Assigning Zones: Default Configuration (SLE 15 Syntax)
D.7 Masquerading and Protecting Internal Zones (Deprecated Syntax)
D.8 Masquerading and Protecting Internal Zones (SLE 15 Syntax)
D.9 Opening Ports (Deprecated Syntax)
D.10 Opening Ports (SLE 15 Syntax)
D.11 Opening Services (Deprecated Syntax)
D.12 Opening Services (SLE 15 Syntax)
D.13 NTP configuration (SLE 15 Syntax)
D.14 Minimal Registration Configuration for Upgrade

Copyright © 2006– 2022 SUSE LLC y colaboradores. Reservados todos los derechos.

Está permitido copiar, distribuir y modificar este documento según los términos de la licencia de documentación gratuita GNU, versión 1.2 o (según su criterio) versión 1.3. Este aviso de copyright y licencia deberán permanecer inalterados. En la sección titulada GNU Free Documentation License (Licencia de documentación gratuita GNU) se incluye una copia de la versión 1.2 de la licencia.

Para obtener información sobre las marcas comerciales de SUSE, consulte https://www.suse.com/company/legal/. Todas las marcas comerciales de otros fabricantes son propiedad de sus respectivas empresas. Los símbolos de marca comercial (®,™ etc.) indican marcas comerciales de SUSE y sus afiliados. Los asteriscos (*) indican marcas comerciales de otros fabricantes.

Toda la información recogida en esta publicación se ha compilado prestando toda la atención posible al más mínimo detalle. Sin embargo, esto no garantiza una precisión total. Ni SUSE LLC, ni sus filiales, ni los autores o traductores serán responsables de los posibles errores o las consecuencias que de ellos pudieran derivarse.

Print this page