AutoYaST is a system for unattended mass deployment of SUSE Linux Enterprise Server systems. It uses an AutoYaST profile that contains installation and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration.
- Preface
- 1 Introduction to AutoYaST
- I Understanding and creating the AutoYaST control file
- II AutoYaST configuration examples
- 4 Configuration and installation options
- 4.1 General options
- 4.2 Reporting
- 4.3 System registration and extension selection
- 4.4 The GRUB 2 boot loader
- 4.5 The Systemd boot loader
- 4.6 Partitioning
- 4.7 iSCSI initiator overview
- 4.8 Fibre channel over Ethernet configuration (FCoE)
- 4.9 Country settings
- 4.10 Software
- 4.11 Upgrade
- 4.12 Services and targets
- 4.13 Network configuration
- 4.14 Proxy
- 4.15 NIS client and server
- 4.16 NIS server
- 4.17 Hosts definition
- 4.18 Windows domain membership
- 4.19 Samba server
- 4.20 Authentication client
- 4.21 NFS client and server
- 4.22 NTP client
- 4.23 Mail server configuration
- 4.24 Apache HTTP server configuration
- 4.25 Squid server
- 4.26 FTP server
- 4.27 TFTP server
- 4.28 Firstboot workflow
- 4.29 Security settings
- 4.30 Linux audit framework (LAF)
- 4.31 Users and groups
- 4.32 Custom user scripts
- 4.33 System variables (sysconfig)
- 4.34 Adding complete configurations
- 4.35 Ask the user for values during installation
- 4.36 Kernel dumps
- 4.37 DNS server
- 4.38 DHCP server
- 4.39 Firewall configuration
- 4.40 Miscellaneous hardware and system components
- 4.41 Importing SSH keys and configuration
- 4.42 Configuration management
- 4 Configuration and installation options
- III Managing mass installations with dynamic profiles
- IV Understanding the auto-installation process
- V Uses for AutoYaST on installed systems
- VI Appendixes
- 2.1 AutoYaST control file (profile)
- 2.2 Control file container
- 2.3 Nested resources
- 2.4 An empty map
- 3.1 Example file for replacing the host name/domain by script
- 4.1 General options
- 4.2 Reporting behavior
- 4.3 LVM-based guided partitioning
- 4.4 Creating
/
,/home
andswap
partitions - 4.5 Using a whole disk as a file system
- 4.6 Automated partitioning on selected drives
- 4.7 Installing on multiple drives
- 4.8 Mount options
- 4.9 Keeping partitions
- 4.10 Auto-detection of partitions to be kept.
- 4.11 Create LVM physical volume
- 4.12 LVM logical volumes
- 4.13 RAID10 configuration
- 4.14 RAID10 without partitions
- 4.15 Old style RAID10 configuration
- 4.16 Using multipath devices
- 4.17 Listing multipath devices
- 4.18 Using the WWID to identify a multipath device
- 4.19
bcache
definition - 4.20 Multi-device Btrfs configuration
- 4.21 NFS share definition
- 4.22
tmpfs
definition - 4.23 iSCSI client
- 4.24 FCoE configuration
- 4.25 Language
- 4.26 Time zone
- 4.27 Keyboard
- 4.28 Explicit product selection
- 4.29 Package selection in the control file with patterns and packages sections
- 4.30 Packages selection using a regular expression
- 4.31 Creating a package database with the additional package inst-source-utils.rpm
- 4.32
add_on_products.xml
- 4.33 Adding the SDK extension and a user defined repository
- 4.34 Kernel selection in the control file
- 4.35 Package selection in control file
- 4.36 Upgrade and backup
- 4.37 Configuring services and targets
- 4.38 Network configuration
- 4.39 Bonding interface configuration
- 4.40 Bridge interface configuration
- 4.41 Multiple IP Addresses
- 4.42 Assigning a persistent name using the MAC address
- 4.43 Network routing configuration
- 4.44 Network configuration: proxy
- 4.45 Network configuration: NIS
- 4.46 NIS server configuration
- 4.47 /etc/hosts
- 4.48 Samba client configuration
- 4.49 Samba server configuration
- 4.50 Network configuration: NFS client
- 4.51 Network configuration: NFS server
- 4.52 Network configuration: NTP client
- 4.53 Mail configuration
- 4.54 HTTP server configuration
- 4.55 Squid server configuration
- 4.56 FTP server configuration:
- 4.57 TFTP server configuration:
- 4.58 Enabling firstboot workflow
- 4.59 Security configuration
- 4.60 Select the Defense Information Systems Agency Security Technical Implementation Guide
- 4.61 LAF configuration
- 4.62 Minimal user configuration
- 4.63 Complex user configuration
- 4.64 Group configuration
- 4.65 Enabling autologin and password-less login
- 4.66 Script configuration
- 4.67 Sysconfig configuration
- 4.68 Dumping files into the installed system
- 4.69 Dumping files into the installed system
- 4.70 Kdump configuration
- 4.71 Disabled Kdump configuration
- 4.72 Kdump memory reservation with multiple values
- 4.73 Basic DNS server settings
- 4.74 Configuring DNS server zones and advanced settings
- 4.75 Example dhcp-server section
- 4.76 Example firewall section
- 4.77 Printer configuration
- 4.78 Sound configuration
- 4.79 Importing SSH keys and configuration from /dev/sda2
- 4.80 Client/server with manual authentication
- 4.81 Client/server with preseed keys
- 4.82 Stand-alone mode
- 6.1 Simple rules file
- 6.2 Simple rules file
- 7.1 Including a file using ERB
- 7.2 Running commands with Ruby
- 7.3 Using Ruby structures
- 7.4 Configuring the boot loader
- 7.5 Using the largest disk
- 7.6 Configure the connected network cards
- 7.7 Reusing the same profile for different distributions
- 7.8 Filtering USB devices
- 7.9 Running helpers
- 7.10 Rendering profile
- 7.11 Preparing the debug environment
- 7.12 Adding a breakpoint
- 7.13 Rules and classes
- 7.14 ERB
- 8.1 Using the MAC address to get the profile
- 8.2 Accessing ERB helpers from a Ruby script
- 9.1 Determine HEX code for an IP address
- 9.2
linuxrc
Options in the AutoYaST control file - D.1 Adding modules and extensions (online)
- D.2 Adding modules and extensions (offline)
- D.3 Specifying the Btrfs default subvolume name
- D.4 Disabling Btrfs subvolumes
- D.5 Assigning zones: default configuration (deprecated syntax)
- D.6 Assigning zones: default configuration (SLE 15 syntax)
- D.7 Masquerading and protecting internal zones (deprecated syntax)
- D.8 Masquerading and protecting internal zones (SLE 15 syntax)
- D.9 Opening ports (deprecated syntax)
- D.10 Opening ports (SLE 15 syntax)
- D.11 Opening Services (Deprecated Syntax)
- D.12 Opening services (SLE 15 syntax)
- D.13 NTP configuration (SLE 15 syntax)
- D.14 Minimal registration configuration for upgrade
Copyright © 2006-2024 SUSE LLC e colaboradores. Todos os direitos reservados.
Permissão concedida para copiar, distribuir e/ou modificar este documento sob os termos da Licença GNU de Documentação Livre, Versão 1.2 ou (por sua opção) versão 1.3; com a Seção Invariante sendo estas informações de copyright e a licença. Uma cópia da versão 1.2 da licença está incluída na seção intitulada “GNU Free Documentation License” (Licença GNU de Documentação Livre).
Para ver as marcas registradas da SUSE, visite https://www.suse.com/company/legal/. Todas as marcas registradas de terceiros pertencem aos seus respectivos proprietários. Os símbolos de marca registrada (®, ™ etc.) indicam marcas registradas da SUSE e de suas afiliadas. Os asteriscos (*) indicam marcas registradas de terceiros.
Todas as informações deste manual foram compiladas com a maior atenção possível aos detalhes. Entretanto, isso não garante uma precisão absoluta. A SUSE LLC, suas afiliadas, os autores ou tradutores não serão responsáveis por possíveis erros nem pelas consequências resultantes de tais erros.