AutoYaST is a system for unattended mass deployment of SUSE Linux Enterprise Server systems. It uses an AutoYaST profile that contains installation and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration.
- Preface
- 1 Introduction to AutoYaST
- I Understanding and creating the AutoYaST control file
- II AutoYaST configuration examples
- 4 Configuration and installation options
- 4.1 General options
- 4.2 Reporting
- 4.3 System registration and extension selection
- 4.4 The GRUB 2 boot loader
- 4.5 The Systemd boot loader
- 4.6 Partitioning
- 4.7 iSCSI initiator overview
- 4.8 Fibre channel over Ethernet configuration (FCoE)
- 4.9 Country settings
- 4.10 Software
- 4.11 Upgrade
- 4.12 Services and targets
- 4.13 Network configuration
- 4.14 Proxy
- 4.15 NIS client and server
- 4.16 NIS server
- 4.17 Hosts definition
- 4.18 Windows domain membership
- 4.19 Samba server
- 4.20 Authentication client
- 4.21 NFS client and server
- 4.22 NTP client
- 4.23 Mail server configuration
- 4.24 Apache HTTP server configuration
- 4.25 Squid server
- 4.26 FTP server
- 4.27 TFTP server
- 4.28 Firstboot workflow
- 4.29 Security settings
- 4.30 Linux audit framework (LAF)
- 4.31 Users and groups
- 4.32 Custom user scripts
- 4.33 System variables (sysconfig)
- 4.34 Adding complete configurations
- 4.35 Ask the user for values during installation
- 4.36 Kernel dumps
- 4.37 DNS server
- 4.38 DHCP server
- 4.39 Firewall configuration
- 4.40 Miscellaneous hardware and system components
- 4.41 Importing SSH keys and configuration
- 4.42 Configuration management
- 4 Configuration and installation options
- III Managing mass installations with dynamic profiles
- IV Understanding the auto-installation process
- V Uses for AutoYaST on installed systems
- VI Appendixes
- 2.1 AutoYaST control file (profile)
- 2.2 Control file container
- 2.3 Nested resources
- 2.4 An empty map
- 3.1 Example file for replacing the host name/domain by script
- 4.1 General options
- 4.2 Reporting behavior
- 4.3 LVM-based guided partitioning
- 4.4 Creating
/
,/home
andswap
partitions - 4.5 Using a whole disk as a file system
- 4.6 Automated partitioning on selected drives
- 4.7 Installing on multiple drives
- 4.8 Mount options
- 4.9 Keeping partitions
- 4.10 Auto-detection of partitions to be kept.
- 4.11 Create LVM physical volume
- 4.12 LVM logical volumes
- 4.13 RAID10 configuration
- 4.14 RAID10 without partitions
- 4.15 Old style RAID10 configuration
- 4.16 Using multipath devices
- 4.17 Listing multipath devices
- 4.18 Using the WWID to identify a multipath device
- 4.19
bcache
definition - 4.20 Multi-device Btrfs configuration
- 4.21 NFS share definition
- 4.22
tmpfs
definition - 4.23 iSCSI client
- 4.24 FCoE configuration
- 4.25 Language
- 4.26 Time zone
- 4.27 Keyboard
- 4.28 Explicit product selection
- 4.29 Package selection in the control file with patterns and packages sections
- 4.30 Packages selection using a regular expression
- 4.31 Creating a package database with the additional package inst-source-utils.rpm
- 4.32
add_on_products.xml
- 4.33 Adding the SDK extension and a user defined repository
- 4.34 Kernel selection in the control file
- 4.35 Package selection in control file
- 4.36 Upgrade and backup
- 4.37 Configuring services and targets
- 4.38 Network configuration
- 4.39 Bonding interface configuration
- 4.40 Bridge interface configuration
- 4.41 Multiple IP Addresses
- 4.42 Assigning a persistent name using the MAC address
- 4.43 Network routing configuration
- 4.44 Network configuration: proxy
- 4.45 Network configuration: NIS
- 4.46 NIS server configuration
- 4.47 /etc/hosts
- 4.48 Samba client configuration
- 4.49 Samba server configuration
- 4.50 Network configuration: NFS client
- 4.51 Network configuration: NFS server
- 4.52 Network configuration: NTP client
- 4.53 Mail configuration
- 4.54 HTTP server configuration
- 4.55 Squid server configuration
- 4.56 FTP server configuration:
- 4.57 TFTP server configuration:
- 4.58 Enabling firstboot workflow
- 4.59 Security configuration
- 4.60 Select the Defense Information Systems Agency Security Technical Implementation Guide
- 4.61 LAF configuration
- 4.62 Minimal user configuration
- 4.63 Complex user configuration
- 4.64 Group configuration
- 4.65 Enabling autologin and password-less login
- 4.66 Script configuration
- 4.67 Sysconfig configuration
- 4.68 Dumping files into the installed system
- 4.69 Dumping files into the installed system
- 4.70 Kdump configuration
- 4.71 Disabled Kdump configuration
- 4.72 Kdump memory reservation with multiple values
- 4.73 Basic DNS server settings
- 4.74 Configuring DNS server zones and advanced settings
- 4.75 Example dhcp-server section
- 4.76 Example firewall section
- 4.77 Printer configuration
- 4.78 Sound configuration
- 4.79 Importing SSH keys and configuration from /dev/sda2
- 4.80 Client/server with manual authentication
- 4.81 Client/server with preseed keys
- 4.82 Stand-alone mode
- 6.1 Simple rules file
- 6.2 Simple rules file
- 7.1 Including a file using ERB
- 7.2 Running commands with Ruby
- 7.3 Using Ruby structures
- 7.4 Configuring the boot loader
- 7.5 Using the largest disk
- 7.6 Configure the connected network cards
- 7.7 Reusing the same profile for different distributions
- 7.8 Filtering USB devices
- 7.9 Running helpers
- 7.10 Rendering profile
- 7.11 Preparing the debug environment
- 7.12 Adding a breakpoint
- 7.13 Rules and classes
- 7.14 ERB
- 8.1 Using the MAC address to get the profile
- 8.2 Accessing ERB helpers from a Ruby script
- 9.1 Determine HEX code for an IP address
- 9.2
linuxrc
Options in the AutoYaST control file - D.1 Adding modules and extensions (online)
- D.2 Adding modules and extensions (offline)
- D.3 Specifying the Btrfs default subvolume name
- D.4 Disabling Btrfs subvolumes
- D.5 Assigning zones: default configuration (deprecated syntax)
- D.6 Assigning zones: default configuration (SLE 15 syntax)
- D.7 Masquerading and protecting internal zones (deprecated syntax)
- D.8 Masquerading and protecting internal zones (SLE 15 syntax)
- D.9 Opening ports (deprecated syntax)
- D.10 Opening ports (SLE 15 syntax)
- D.11 Opening Services (Deprecated Syntax)
- D.12 Opening services (SLE 15 syntax)
- D.13 NTP configuration (SLE 15 syntax)
- D.14 Minimal registration configuration for upgrade
Copyright © 2006–2024 SUSE LLC y colaboradores. Reservados todos los derechos.
Está permitido copiar, distribuir y modificar este documento según los términos de la licencia de documentación gratuita GNU, versión 1.2 o (según su criterio) versión 1.3. Este aviso de copyright y licencia deberán permanecer inalterados. En la sección titulada “GNU Free Documentation License” (Licencia de documentación gratuita GNU) se incluye una copia de la versión 1.2 de la licencia.
Para obtener información sobre las marcas comerciales de SUSE, consulte https://www.suse.com/company/legal/. Todas las marcas comerciales de otros fabricantes son propiedad de sus propietarios respectivos. Los símbolos de marcas comerciales (®, ™, etc.) indican marcas comerciales de SUSE y sus filiales. Los asteriscos (*) indican marcas comerciales de otros fabricantes.
Toda la información recogida en esta publicación se ha compilado prestando toda la atención posible al más mínimo detalle. Sin embargo, esto no garantiza una precisión total. Ni SUSE LLC, ni sus filiales, ni los autores o traductores serán responsables de los posibles errores o las consecuencias que de ellos pudieran derivarse.