4 Configuration and Installation Options #
This chapter introduces important parts of a control file for standard purposes. To learn about other available options, use the configuration management system.
Note that for some configuration options to work, additional packages need to be installed, depending on the software selection you have configured. If you choose to install a minimal system then some packages might be missing and need to be added to the individual package selection.
   YaST will install packages required in the second phase of the
   installation and before the post-installation phase of AutoYaST has
   started. However, if necessary YaST modules are not available in the
   system, important configuration steps will be skipped. For example, no
   security settings will be configured if
   yast2-security is not
   installed.
  
4.1 General Options #
The general section includes all settings that influence the installation workflow. The overall structure of this section looks like the following:
<?xml version="1.0"?> <!DOCTYPE profile> <profile xmlns="http://www.suse.com/1.0/yast2ns" xmlns:config="http://www.suse.com/1.0/configns"> <general> <ask-list>1 ... </ask-list> <cio_ignore>2 ... </cio_ignore> <mode>3 ... </mode> <proposals>4 ... </proposals> <self_update>5 ... </self_update> <self_update_url> ... </self_update_url> <semi-automatic config:type="list">6 ... </semi-automatic> <signature-handling>7 ... </signature-handling> <storage>8 ... </storage> <wait>9 ... </wait> </general> <profile>
4.1.1 The Mode Section #
    The mode section configures the behavior of AutoYaST with regard to user
    confirmations and rebooting. The following elements are allowed in the
    mode section:
   
- activate_systemd_default_target
- If you set this entry to - false, the default- systemdtarget will not be activated via the call- systemctl isolate. Setting this value is optional. The default is- true.- <general> <mode> <activate_systemd_default_target config:type="boolean"> true </activate_systemd_default_target> </mode> ... </general> 
- confirm
- By default, the installation stops at the screen. Up to this point, no changes have been made to the system and settings may be changed on this screen. To proceed and finally start the installation, the user needs to confirm the settings. By setting this value to - falsethe settings are automatically accepted and the installation starts. Only set to- falseif you want to carry out a fully unattended installation. Setting this value is optional. The default is- true.- <general> <mode> <confirm config:type="boolean">true</confirm> </mode> ... </general> 
- confirm_base_product_license
- If you set this to - true, the EULA of the base product will be shown. The user needs to accept this license. Otherwise the installation will be canceled. Setting this value is optional. The default is- false. This setting applies to the base product license only. Use the flag- confirm_licensein the- add-onsection for additional licenses (see Section 4.9.2, “Installing Additional/Customized Packages or Products” for details).- <general> <mode> <confirm_base_product_license config:type="boolean"> false </confirm_base_product_license> </mode> ... </general> 
- final_halt
- If you set this to - true, the machine will shut down at the very end of the installation (when everything is installed and configured at the end of the second stage). Setting this value is optional. The default is- true. It makes no sense to set both this and- final_rebootto- true.- <general> <mode> <final_halt config:type="boolean">true</final_halt> </mode> ... </general> 
- final_reboot
- If you set this to - true, the machine will reboot at the end of the installation (when everything is installed and configured at the end of the second stage). Setting this value is optional. The default is- true. It makes no sense to set both this and- final_haltto- true.- <general> <mode> <final_reboot config:type="boolean">true</final_reboot> </mode> ... </general> 
- final_restart_services
- If you set this entry to - false, services will not be restarted at the end of the installation (when everything is installed and configured at the end of the second stage). Setting this value is optional. The default is- true.- <general> <mode> <final_restart_services config:type="boolean"> true </final_restart_services> </mode> ... </general> 
- halt
- Shuts down the machine after the first stage. All packages and the boot loader have been installed and all your chroot scripts have run. Instead of rebooting into stage two, the machine is turned off. If you turn it on again, the machine boots and the second stage of the autoinstallation starts. Setting this value is optional. The default is - false.- <general> <mode> <halt config:type="boolean">false</halt> </mode> ... </general> 
- max_systemd_wait
- Specifies how long AutoYaST waits (in seconds) at most for - systemdto set up the default target. Setting this value is optional and should not normally be required. The default is- 30(seconds).- <general> <mode> <max_systemd_wait config:type="integer">30</max_systemd_wait> </mode> ... </general> 
- ntp_sync_time_before_installation
- Specify the NTP server with which to synchronize time before starting the installation. Time synchronization will only occur if this option is set. Keep in mind that you need a network connection and access to a time server. Setting this value is optional. By default no time synchronization will occur. - <general> <mode> <ntp_sync_time_before_installation> ntp.example.com </max_systemd_wait> </mode> ... </general> 
- second_stage
- A regular installation of SUSE Linux Enterprise Server is performed in a single stage. The auto-installation process, however, is divided into two stages. After the installation of the basic system the system boots into the second stage where the system configuration is done. Set this option to - falseto disable the second stage. Setting this value is optional. The default is- true.- <general> <mode> <second_stage config:type="boolean">true</second_stage> </mode> ... </general> 
4.1.2 Configuring the Installation Settings Screen #
    AutoYaST allows you to configure the 
    screen, which shows a summary of the installation settings. On this screen,
    the user can change the settings before confirming them to start the
    installation. Using the proposal tag, you can
    control which settings (“proposals”) are shown in the
    installation screen. A list of valid proposals for your products is
    available from the /control.xml file on the
    installation medium. This setting is optional. By default all configuration
    options will be shown.
   
<proposals config:type="list"> <proposal>partitions_proposal</proposal> <proposal>timezone_proposal</proposal> <proposal>software_proposal</proposal> </proposals>
4.1.3 The Self-Update Section #
During the installation, YaST can update itself to solve bugs in the installer that were discovered after the release. Refer to the Deployment Guide for further information about this feature. Use the following tags to configure the YaST self-update:
- self_update
- This option enables (set to - true) or disables (set to- false) the YaST self-update feature. Setting this value is optional. The default is- true.- <general> <self_update config:type="boolean">true</self_update> ... </general> - Alternatively, you can specify the boot parameter - self_update=1on the kernel command line.
- self_update_url
- Location of the update repository to use during the YaST self-update. For more information, refer to the Deployment Guide. Important: Installer Self-Update Repository Only- The - self_update_urlparameter expects only the installer self-update repository URL. Do not supply any other repository URL—for example the URL of the software update repository.- <general> <self_update_url> http://example.com/updates/$arch </self_update_url> ... </general> - The URL may contain the variable - $arch. It will be replaced by the system's architecture, such as- x86_64,- s390x, etc.- Alternatively, you can specify the boot parameter - self_update=1together with- self_update=URLon the kernel command line.
4.1.4 The Semi-Automatic Section #
AutoYaST offers to start some YaST modules during the installation. This is useful if you want to give administrators installing the machine the possibility to manually configure some aspects of the installation while at the same time automating the rest of the installation. Within the semi-automatic section you can start the following YaST modules:
- The network settings module ( - networking)
- The partitioner ( - partitioning)
- The registration module ( - scc)
The following example starts all three supported YaST modules during the installation:
<general> <semi-automatic config:type="list"> <semi-automatic_entry>networking</semi-automatic_entry> <semi-automatic_entry>scc</semi-automatic_entry> <semi-automatic_entry>partitioning</semi-automatic_entry> </semi-automatic> </general>
4.1.5 The Signature Handling Section #
By default AutoYaST will only install signed packages from sources with known GPG keys. Use this section to overwrite the default settings.
Installing unsigned packages, packages with failing checksum checks, or when accepting packages from sources you do not trust is a major security risk. Packages may have been modified and may install malicious software on your machine. Only overwrite the defaults in this section if you are sure the repository and the packages can be trusted. SUSE is not responsible for any problems arising from software installed with integrity checks disabled.
Default values for all options are false. If an option is set to false and a package or repository fails the respective test, it is silently ignored and will not be installed.
- accept_unsigned_file
- If set to - true, AutoYaST will accept unsigned files like the content file.- <general> <signature-handling> <accept_unsigned_file config:type="boolean"> false </accept_unsigned_file> <signature-handling> ... <general> 
- accept_file_without_checksum
- If set to - true, AutoYaST will accept files without a checksum in the content file.- <general> <signature-handling> <accept_file_without_checksum config:type="boolean"> false </accept_file_without_checksum> <signature-handling> ... <general> 
- accept_verification_failed
- If set to - true, AutoYaST will accept signed files even when the signature verification fails.- <general> <signature-handling> <accept_verification_failed config:type="boolean"> false </accept_verification_failed> <signature-handling> ... <general> 
- accept_unknown_gpg_key
- If set to - true, AutoYaST will accept new GPG keys of the installation sources, for example the key used to sign the content file.- <general> <signature-handling> <accept_unknown_gpg_key config:type="boolean"> false </accept_unknown_gpg_key> <signature-handling> ... <general> 
- accept_non_trusted_gpg_key
- Set this option to - trueto accept known keys you have not yet trusted.- <general> <signature-handling> <accept_non_trusted_gpg_key config:type="boolean"> false </accept_non_trusted_gpg_key> <signature-handling> ... <general> 
- import_gpg_key
- If set to - true, AutoYaST will accept and import new GPG keys on the installation source in its database.- <general> <signature-handling> <import_gpg_key config:type="boolean"> false </import_gpg_key> <signature-handling> ... <general> 
4.1.6 The Storage Section #
This section lets you enable multipath support for the installation. You may also configure the partition alignment settings here.
- btrfs_set_default_subvolume_name
- See Section 4.5.3, “Btrfs subvolumes” for more information. 
- start_multipath
- When installing on a network storage that is accessed via multiple paths, you need to enable multipath for the installation by setting this parameter to - true. Setting this value is optional. The default is- false.- <general> <storage> <start_multipath config:type="boolean">true</start_multipath> <storage> ... </general> - Alternatively, you can use the following parameter on the Kernel command line: - LIBSTORAGE_MULTIPATH_AUTOSTART=ON
4.1.7 The Wait Section #
    In the second stage of the installation the system is configured by running
    modules, for example the network configuration. Within the wait section you can define scripts that will get
    executed before and after a specific module has run. You can also configure
    a span of time in which the system is inactive (“sleeps”)
    before and after each module.
   
- pre-modules
- Defines scripts and sleep time executed before a configuration module starts. The following code shows an example setting the sleep time to ten seconds and executing an echo command before running the network configuration module. - <general> <wait> <pre-modules config:type="list"> <module> <name>networking</name> <sleep> <time config:type="integer">10</time> <feedback config:type="boolean">true</feedback> </sleep> <script> <source>echo foo</source> <debug config:type="boolean">false</debug> </script> </module> </pre-modules> ... <general>
- post-modules
- Defines scripts and sleep time executed after a configuration module starts. The following code shows an example setting the sleep time to ten seconds and executing an echo command after running the network configuration module. - <general> <wait> <post-modules config:type="list"> <module> <name>networking</name> <sleep> <time config:type="integer">10</time> <feedback config:type="boolean">true</feedback> </sleep> <script> <source>echo foo</source> <debug config:type="boolean">false</debug> </script> </module> </post-modules> ... <general>
4.1.8 Blacklisting Unused Devices on IBM IBM Z #
    On IBM IBM Z you can prevent the kernel from looking at unused hardware
    devices, by running cio_ignore and blacklisting them.
    This is done by setting the AutoYaST parameter with the same name to
    true. Setting this value is optional and only applies to
    installations on IBM IBM Z hardware. The default is
    true.
   
<general> <cio_ignore config:type="boolean">true</cio_ignore> ... <general>
4.1.9 Examples for the general Section #
Find examples covering several use cases in this section.
This example shows the most commonly used options in the general section. The scripts in the pre and post module sections are only dummy scripts illustrating the concept.
<?xml version="1.0"?>
<!DOCTYPE profile>
<profile xmlns="http://www.suse.com/1.0/yast2ns"
 xmlns:config="http://www.suse.com/1.0/configns">
 <general>
  <! -- Use cio_ignore on IBM IBM Z only -->
  <cio_ignore config:type="boolean">false</cio_ignore>
  <mode>
   <halt config:type="boolean">false</halt>
   <forceboot config:type="boolean">false</forceboot>
   <final_reboot config:type="boolean">false</final_reboot>
   <final_halt config:type="boolean">false</final_halt>
   <confirm_base_product_license config:type="boolean">
    false
   </confirm_base_product_license>
   <confirm config:type="boolean">true</confirm>
   <second_stage config:type="boolean">true</second_stage>
  </mode>
  <proposals config:type="list">
   <proposal>partitions_proposal</proposal>
  </proposals>
  <self_update config:type="boolean">true</self_update>
  <self_update_url>http://example.com/updates/$arch</self_update_url>
  <signature-handling>
   <accept_unsigned_file config:type="boolean">
    true
   </accept_unsigned_file>
   <accept_file_without_checksum config:type="boolean">
    true
   </accept_file_without_checksum>
   <accept_verification_failed config:type="boolean">
    true
   </accept_verification_failed>
   <accept_unknown_gpg_key config:type="boolean">
    true
   </accept_unknown_gpg_key>
   <import_gpg_key config:type="boolean">true</import_gpg_key>
   <accept_non_trusted_gpg_key config:type="boolean">
   true
   </accept_non_trusted_gpg_key>
  </signature-handling>
  <storage>
   <partition_alignment config:type="symbol">
    align_cylinder
   </partition_alignment>
  </storage>
  <wait>
   <pre-modules config:type="list">
    <module>
     <name>networking</name>
     <sleep>
      <time config:type="integer">10</time>
      <feedback config:type="boolean">true</feedback>
     </sleep>
     <script>
     <source>>![CDATA[
echo "Sleeping 10 seconds"
      ]]></source>
     <debug config:type="boolean">false</debug>
     </script>
    </module>
   </pre-modules>
   <post-modules config:type="list">
    <module>
     <name>networking</name>
     <sleep>
      <time config:type="integer">10</time>
      <feedback config:type="boolean">true</feedback>
     </sleep>
     <script>
      <source>>![CDATA[
echo "Sleeping 10 seconds"
      ]]></source>
      <debug config:type="boolean">false</debug>
     </script>
    </module>
   </post-modules>
  </wait>
 </general>
</profile>4.2 Reporting #
    The report resource manages three types of pop-ups
    that may appear during installation:
   
- message pop-ups (usually non-critical, informative messages), 
- warning pop-ups (if something might go wrong), 
- error pop-ups (in case an error occurs). 
<report>
  <errors>
    <show config:type="boolean">true</show>
    <timeout config:type="integer">0</timeout>
    <log config:type="boolean">true</log>
  </errors>
  <warnings>
    <show config:type="boolean">true</show>
    <timeout config:type="integer">10</timeout>
    <log config:type="boolean">true</log>
  </warnings>
  <messages>
    <show config:type="boolean">true</show>
    <timeout config:type="integer">10</timeout>
    <log config:type="boolean">true</log>
  </messages>
  <yesno_messages>
    <show config:type="boolean">true</show>
    <timeout config:type="integer">10</timeout>
    <log config:type="boolean">true</log>
  </yesno_messages>
</report>
    Depending on your experience, you can skip, log and show (with timeout)
    those messages. It is recommended to show all
    messages with timeout. Warnings can be skipped in
    some places but should not be ignored.
   
The default setting in auto-installation mode is to show errors without timeout and to show all warnings/messages with a timeout of 10 seconds.
     Note that not all messages during installation are controlled by the
     report resource. Some critical messages concerning
     package installation and partitioning will show up ignoring your
     settings in the report section. Usually those
     messages will need to be answered with  or
     .
    
4.3 System Registration and Extension Selection #
    Registering the system with the can be configured within the
    suse_register resource. The following example registers
    the system with the SUSE Customer Center. In case your organization provides its own
    registration server, you need to specify the required data with the
    reg_server* properties. Refer to the table below for
    details.
   
<suse_register> <do_registration config:type="boolean">true</do_registration> <email>tux@example.com</email> <reg_code>MY_SECRET_REGCODE</reg_code> <install_updates config:type="boolean">true</install_updates> <slp_discovery config:type="boolean">false</slp_discovery> </suse_register>
As an alternative to the fully automated registration, AutoYaST can also be configured to start the YaST registration module during the installation. this offers the possibility to enter the registration data manually. The following XML code is required:
<general> <semi-automatic config:type="list"> <semi-automatic_entry>scc</semi-automatic_entry> </semi-automatic> </general>
In case you need to use the same network settings that were used for the installation, AutoYaST needs to run the network setup in stage 1 right before the registration is started:
<networking> <setup_before_proposal config:type="boolean">true</setup_before_proposal> </networking>
| Element | Description | Comment | 
|---|---|---|
| 
          | Boolean <do_registration config:type="boolean" >true</do_registration> | 
         Specify whether the system should be registered or not. If set to
          | 
| 
          | E-mail address <email>tux@example.com</email> | Optional. The e-mail address matching the registration code. | 
| 
          | Text <reg_code>SECRET_REGCODE</reg_code> | Required. Registration code. | 
| 
          | Boolean <install_updates config:type="boolean" >true</install_updates> | 
         Optional. Determines if updates from the Updates channels should be
         installed. The default value is to not install them ( | 
| 
          | Boolean <slp_discovery config:type="boolean" >true</slp_discovery> | 
         Optional. Search for a registration server via SLP. The default value
         is  
         Expects to find a single server. If more than one server is found,
         the installation will fail. In case there is more than one
         registration server available, you need to specify one with
          
         If neither  This setting also affects the self-update feature: If it is disabled, no SLP search will be performed. | 
| 
          | URL <reg_server> https://smt.example.com </reg_server> | 
         Optional. SMT server URL. If neither  
         The SMT server is queried for a URL of the self-update repository. So if
          | 
| 
          | 
          <reg_server_cert_fingerprint_type> SHA1 </reg_server_cert_fingerprint_type> | 
         Optional. Requires a checksum value provided with
          | 
| 
          | Server Certificate Fingerprint value in hexadecimal notion (case-insensitive). <reg_server_cert_fingerprint> 01:AB...:EF </reg_server_cert_fingerprint> | 
         Optional. Requires a fingerprint type value provided with
          | 
| 
          | URL <reg_server_cert> http://smt.example.com/smt.crt </reg_server_cert> | 
         Optional. URL of the SSL certificate on the server. Using this option is
         not recommended, since the certificate that is downloaded is not verified.
         Use  | 
| 
          | Add-ons list | Specify an extension from the registration server that should be added to the installation repositories. See Section 4.3.1, “Extensions” for details. | 
     To obtain a server certificate fingerprint for use with the
     reg_server_cert_fingerprint entry, run the following
     command on the SMT server (edit the default path to the
     smt.crt file, if needed):
    
openssl x509 -noout -in /srv/www/htdocs/smt.crt -fingerprint -sha256
To retrieve a fingerprint from the SMT server, use the following command:
curl --insecure -v https://scc.suse.com/smt.crt 2> /dev/null | openssl x509 -noout -fingerprint -sha256
     Replace scc.suse.com with your server.
    
Note: This can be used in a trusted network only! In a non-trusted network, for example the Internet, you should get the fingerprint directly from the server by other means. Fingerprints can be fetched via SSH, a saved server configuration and other sources. Alternatively, you can verify that the downloaded certificate is exactly the same as on the server.
4.3.1 Extensions #
     The SUSE Customer Center provides several extensions, such as sle-sdk
     (SUSE Software Development Kit - SDK) that can be included as additional sources during the
     installation. Extensions can be added via the addons
     property within the suse_register block.
     
    
      The availability of extensions is product and architecture dependent.
      
      Not all extensions are available on other architectures.  The only
      extension available for SUSE Linux Enterprise Desktop is the sle-sdk.
     
      Some extensions, such as the sle-we,
      sle-ha and sle-ha-geo
      require a registration code.
     
     With SUSEConnect --list-extensions (available
     since SLES 12 SP1), you can list all available extensions in a
     registered system. The result looks like:
    
Install with: SUSEConnect -p sle-sdk/12.2/x86_64
     The -p argument displays the
     NAME/VERSION/ARCH values that can be
     used in the AutoYaST profile as follows:
    
<addons config:type="list"> <addon> <!-- SUSE Linux Enterprise Software Development Kit --> <name>sle-sdk</name> <version>12.2</version> <arch>x86_64</arch> </addon> </addons>
For background information and add-on listings for SLES 12, 12 SP1, and 12 SP2, see https://github.com/yast/yast-registration/wiki/Available-SCC-Extensions-for-Use-in-Autoyast. The listings will get updated from time to time.
4.4 The Boot Loader #
    This documentation is for yast2-bootloader and applies
    to GRUB 2. For older product versions shipping with legacy GRUB, refer to
    the documentation that comes with your distribution in
    /usr/share/doc/packages/autoyast2/
   
The general structure of the AutoYaST boot loader part looks like the following:
<bootloader>
  <loader_type>
    <!-- boot loader type (grub2 or grub2-efi) -->
  </loader_type>
  <global>
    <!--
      entries defining the installation settings for GRUB 2 and
      the generic boot code
    -->
  </global>
  <device_map config:type="list">
    <!-- entries defining the order of devices -->
  </device_map>
 </bootloader>4.4.1 Loader Type #
     Define which boot loader to use: grub2 or
     grub2-efi.
    
<loader_type>grub2</loader_type>
4.4.2 Globals #
     This is an important if optional part. Define here where to install
     GRUB 2 and how the boot process will work. Again,
     yast2-bootloader proposes a configuration if you
     do not define one. Usually the AutoYaST control file includes only this
     part and all other parts are added automatically during installation by
     yast2-bootloader. Unless you have some special
     requirements, do not specify the boot loader configuration in the XML
     file.
    
<global> <activate config:type="boolean">true</activate> <timeout config:type="integer">10</timeout> <suse_btrfs config:type="boolean">true</suse_btrfs> <terminal>gfxterm</terminal> <gfxmode>1280x1024x24</gfxmode> </global>
| Attribute | Description | 
|---|---|
| 
           | 
          Set the boot flag on the boot partition. The boot partition can be
           <activate config:type="boolean">true</activate> | 
| 
           | Kernel parameters added at the end of boot entries for normal and recovery mode. <append>nomodeset vga=0x317</append> | 
| 
           | 
          Write GRUB 2 to a separate /boot partition. If no separate
          /boot partition exists, GRUB 2 will be written to
           <boot_boot>false</boot_boot> | 
| 
           | Write GRUB 2 to a custom device. <boot_custom>/dev/sda3</boot_custom> | 
| 
           | 
          Write GRUB 2 to the extended partition (important if you want
          to use a generic boot code and the  <boot_extended>false</boot_extended> | 
| 
           | Write GRUB 2 to MBR of the first disk in the order (device.map includes order of disks). <boot_mbr>false</boot_mbr> | 
| 
           | 
          Write GRUB 2 to  <boot_root>false</boot_root> | 
| 
           | 
          Write generic boot code to MBR, will be ignored if boot_mbr is set
          to  <generic_mbr config:type="boolean">false</generic_mbr> | 
| 
           | 
          Graphical resolution of the GRUB 2 screen (requires
          <terminal> to be set to  <gfxmode>1280x1024x24</gfxmode> | 
| 
           | 
          If set to  <os_prober config:type="boolean">false</os_prober> | 
| 
           | Allows to choose a default setting of kernel boot command line parameters for CPU mitigation (and at the same time strike a balance between security and performance). Possible values are: 
 
 
 
            <cpu_mitigations>auto</cpu_mitigations> 
          If not set in AutoYaST, the respective settings can be changed via
          kernel command line. By default, the (product-specific) settings in
          the  | 
| 
           | Obsolete and no longer used. Booting from Btrfs snapshots is automatically enabled from SLES 12 SP2 onward. | 
| 
           | 
          Command to execute if the GRUB 2 terminal mode is set to
           <serial> serial --speed=115200 --unit=0 --word=8 --parity=no --stop=1 </serials> | 
| 
           | 
          Specify the GRUB 2 terminal mode to use, Valid entries are
           <terminal>serial</terminal> | 
| 
           | The timeout in seconds until the default boot entry is booted automatically. <timeout config:type="integer">10</timeout> | 
| 
           | 
          If set to  <trusted_boot>true</trusted_boot> | 
| 
           | 
          Adds the kernel parameter
           <vgamode>0x317</vgamode> | 
| 
           | Kernel parameters added at the end of boot entries for Xen guests. <append>nomodeset vga=0x317</append> | 
| 
           | Kernel parameters added at the end of boot entries for Xen kernels on the VM Host Server. <xen-append>dom0_mem=768M</xen-append> | 
4.4.3 Device map #
GRUB 2 avoids mapping problems between BIOS drives and Linux devices by using device ID strings (UUIDs) or file system labels when generating its configuration files. GRUB 2 utilities create a temporary device map on the fly, which is usually sufficient, particularly on single-disk systems. However, if you need to override the automatic device mapping mechanism, create your custom mapping in this section.
<device_map config:type="list">
  <device_map_entry>
    <firmware>hd0</firmware> <!-- order of devices in target map  -->
    <linux>/dev/disk/by-id/ata-ST3500418AS_6VM23FX0</linux> <!-- name of device (disk)  -->
  </device_map_entry>
</device_map>4.5 Partitioning #
4.5.1 Drive Configuration #
The elements listed below must be placed within the following XML structure:
<profile>
  <partitioning config:type="list">
    <drive>
     ...
    </drive>
  </partitioning>
</profile>| Attribute | Values | Description | 
|---|---|---|
| 
           | 
          The device you want to configure in this <drive>
          section. You can use persistent device names via id, like
           <device>/dev/sda</device> | Optional. If left out, AutoYaST tries to guess the device. See Tip: Skipping Devices on how to influence guessing. 
          A RAID must always have  | 
| 
           | 
          If set to  <initialize config:type="boolean">true</initialize> | 
          Optional. The default is  | 
| 
           | A list of <partition> entries (see Section 4.5.2, “Partition Configuration”). <partitions config:type="list"> <partition>...</partition> ... </partitions> | Optional. If no partitions are specified, AutoYaST will create a reasonable partitioning (see Section 4.5.6, “Automated Partitioning”). | 
| 
           | This value only makes sense with LVM. <pesize>8M</pesize> | Optional. Default is 4M for LVM volume groups. | 
| 
           | Specifies the strategy AutoYaST will use to partition the hard disk. Choose between: 
 | This parameter should be provided. | 
| 
           | 
          Specify the type of the  Choose between: 
 <type config:type="symbol">CT_LVM</type> | 
          Optional. Default is  | 
| 
           | Describes the type of the partition table. Choose between: 
 <disklabel>gpt</disklabel> | Optional. By default YaST decides what makes sense. | 
| 
           | 
          This value only makes sense for type=CT_LVM drives. If you are
          reusing a logical volume group and you set this to
           <keep_unknown_lv config:type="boolean" >false</keep_unknown_lv> | 
          Optional. The default is  | 
| 
           | 
          Enables snapshots on Btrfs file systems mounted at  <enable_snapshots config:type="boolean" >false</enable_snapshots> | 
          Optional. The default is  | 
You can influence AutoYaST's device-guessing for cases where you do not specify a <device> entry on your own. Usually AutoYaST would use the first device it can find that looks reasonable but you can configure it to skip some devices like this:
<partitioning config:type="list">
  <drive>
    <initialize config:type="boolean">true</initialize>
    <skip_list config:type="list">
      <listentry>
        <!-- skip devices that use the usb-storage driver -->
        <skip_key>driver</skip_key>
        <skip_value>usb-storage</skip_value>
      </listentry>
      <listentry>
        <!-- skip devices that are smaller than 1GB -->
        <skip_key>size_k</skip_key>
        <skip_value>1048576</skip_value>
        <skip_if_less_than config:type="boolean">true</skip_if_less_than>
      </listentry>
      <listentry>
        <!-- skip devices that are larger than 100GB -->
        <skip_key>size_k</skip_key>
        <skip_value>104857600</skip_value>
        <skip_if_more_than config:type="boolean">true</skip_if_more_than>
      </listentry>
    </skip_list>
  </drive>
</partitioning>
      For a list of all possible <skip_key>, run yast2
      ayast_probe on an already installed system.
     
4.5.2 Partition Configuration #
The elements listed below must be placed within the following XML structure:
<drive>
  <partitions config:type="list">
    <partition>
      ...
    </partition>
  </partitions>
</drive>| Attribute | Values | Description | |||||
|---|---|---|---|---|---|---|---|
| 
           | Specify if this partition must be created or if it already exists. <create config:type="boolean" >false</create> | 
          If set to  | |||||
| 
           | Partition will be encrypted. <crypt_fs config:type="boolean">false</crypt_fs> | 
          Default is  | |||||
| 
           | Encryption key <crypt_key>xxxxxxxx</crypt_key> | 
          Only needed if  | |||||
| 
           | The mount point of this partition. <mount>/</mount> <mount>swap</mount> | You should have at least a root partition (/) and a swap partition. | |||||
| 
           | Mount options for this partition. <fstopt> ro,noatime,user,data=ordered,acl,user_xattr </fstopt> | 
          See  | |||||
| 
           | 
          The label of the partition (useful for the
           <label>mydata</label> | 
          See  | |||||
| 
           | 
          The UUID of the partition (only useful for the
           <uuid >1b4e28ba-2fa1-11d2-883f-b9a761bde3fb</uuid> | 
          See  | |||||
| 
           | 
          The size of the partition, for example 4G, 4500M, etc. The /boot
          partition and the swap partition can have  You can also specify the size in percentage. So 10% will use 10% of the size of the hard disk or volume group. You can mix auto, max, size, and percentage as you like. <size>10G</size> | ||||||
| 
           | Specify if AutoYaST should format the partition. <format config:type="boolean">false</format> | 
          If you set  | |||||
| 
           | Specify the file system to use on this partition: 
 <filesystem config:type="symbol" >ext3</filesystem> | 
          Optional. The default is  | |||||
| 
           | Specify an option string that is added to the mkfs command. <mkfs_options>-I 128</mkfs_options> | Optional. Only use this when you know what you are doing. | |||||
| 
           | 
          The partition number of this partition. If you have set
           <partition_nr config:type="integer" >2</partition_nr> | Usually, numbers 1 to 4 are primary partitions while 5 and higher are logical partitions. | |||||
| 
           | 
          The  <partition_id config:type="integer" >131</partition_id> Possible values are: 
 | 
          The default is  | |||||
| 
           | 
          When using an  <partition_type>primary</partition_type> | 
          Optional. Allowed values are  | |||||
| 
           | 
          Instead of a partition number, you can tell AutoYaST to mount a
          partition by  <mountby config:type="symbol" >label</mountby> | 
          See  | |||||
| 
           | List of subvolumes to create for a file system of type Btrfs. This key only makes sense for file systems of type Btrfs. See Section 4.5.3, “Btrfs subvolumes” for more information. <subvolumes config:type="list"> <path>tmp</path> <path>opt</path> <path>srv</path> <path>var/crash</path> <path>var/lock</path> <path>var/run</path> <path>var/tmp</path> <path>var/spool</path> ... </subvolumes> | ||||||
| 
           | 
          If this partition is on a logical volume in a volume group, specify
          the logical volume name here (see the  <lv_name>opt_lv</lv_name> | ||||||
| 
           | An integer that configures LVM striping. Specify across how many devices you want to stripe (spread data). <stripes config:type="integer">2</stripes> | ||||||
| 
           | Specify the size of each block in KB. <stripesize config:type="integer" >4</stripesize> | ||||||
| 
           | If this is a physical partition used by (part of) a volume group (LVM), you need to specify the name of the volume group here. <lvm_group>system</lvm_group> | ||||||
| 
           | 
           <pool config:type="boolean">false</pool> | ||||||
| 
           | The name of the LVM thin pool that is used as a data store for this thin logical volume. If this is set to something non-empty, it implies that the volume is a so-called thin logical volume. <used_pool>my_thin_pool</used_pool> | ||||||
| 
           | If this physical volume is part of a RAID, specify the name of the RAID. <raid_name>/dev/md0</raid_name> | ||||||
| 
           | Specify the type of the RAID. <raid_type>raid1</raid_type> | ||||||
| 
           | Specify RAID options, see below. <raid_options>...</raid_options> | ||||||
| 
           | 
          This boolean must be  <resize config:type="boolean" >false</resize> | Resizing only works with physical disks, not with LVM volumes. | 
4.5.3 Btrfs subvolumes #
As mentioned in Section 4.5.2, “Partition Configuration”, it is possible to define a set of subvolumes for each Btrfs file system. In its simplest form, is just a list of entries:
<subvolumes config:type="list"> <path>tmp</path> <path>opt</path> <path>srv</path> <path>var/crash</path> <path>var/lock</path> <path>var/run</path> <path>var/tmp</path> <path>var/spool</path> </subvolumes>
AutoYaST supports disabling copy-on-write for a given subvolume. In that case, a slightly more complex syntax should be used:
<subvolumes config:type="list"> <listentry>tmp</listentry> <listentry>opt</listentry> <listentry>srv</listentry> <listentry> <path>var/lib/pgsql</path> <copy_on_write config:type="boolean">false</copy_on_write> </listentry> </subvolumes>
      If there is a default subvolume used for the distribution (for example
      @ in SUSE Linux Enterprise Server), the name of this default
      subvolume is automatically prefixed to the names in this list. This
      behavior can be disabled by setting the
      btrfs_set_default_subvolume_name in the
      general/storage section.
     
<general>
  <storage>
    <btrfs_set_default_subvolume_name config:type="boolean">false</btrfs_set_default_subvolume_name>
  </storage>
</general>4.5.4 Using the Whole Disk #
     AutoYaST will format a whole disk as a single partition by setting
     the partition_nr to 0 as described
     in Section 4.5.1, “Drive Configuration”. In such cases, the
     configuration in the first partition from the
     drive will be applied to the whole disk.
    
     In the example below, we are using the second disk (/dev/sdb)
     as the /home file system.
    
<partitioning config:type="list">
  <drive>
    <device>/dev/sda</device>
    <partitions config:type="list">
      <partition>
        <create config:type="boolean">true</create>
        <format config:type="boolean">true</format>
        <mount>/</mount>
        <size>max</size>
      </partition>
    </partitions>
  </drive>
  <drive>
    <device>/dev/sdb</device>
    <partitions config:type="list">
      <partition>
        <partition_nr config:type="integer">0<partition_nr>
        <format config:type="boolean">true</format>
        <mount>/home</mount>
      </partition>
    </partitions>
  </drive>In addition, the whole disk can be used as an LVM physical volume or as a software RAID member. See Section 4.5.9, “Logical Volume Manager (LVM)” and Section 4.5.10, “Software RAID” for further details about setting up an LVM or a software RAID.
4.5.5 RAID Options #
The following elements must be placed within the following XML structure:
<partition>
  <raid_options>
    ...
  </raid_options>
</partition>| Attribute | Values | Description | 
|---|---|---|
| 
           | <chunk_size>4</chunk_size> | |
| 
           | Possible values are: 
           For RAID6 and RAID10 the following values can be used: 
           <parity_algorithm >left_asymmetric</parity_algorithm> | |
| 
           | 
          Possible values are:  <raid_type>raid1</raid_type> | 
          The default is  | 
| 
           | This list contains the optional order of the physical devices: <device_order config:type="list"> <device>/dev/sdb2</device> <device>/dev/sda1</device> ... </device_order> | This is optional and the default is alphabetical order. | 
4.5.6 Automated Partitioning #
For automated partitioning, you only need to provide the sizes and mount points of partitions. All other data needed for successful partitioning is calculated during installation—unless provided in the control file.
If no partitions are defined and the specified drive is also the drive where the root partition should be created, the following partitions are created automatically:
- /boot- The size of the - /bootpartition is determined by the architecture of the target system.
- swap- The size of the swap partition is determined by the amount of memory available in the system. 
- /(root partition)- The size of the root partition is determined by the space left after creating - swapand- /boot.
Depending on the initial status of the drive and how it was previously partitioned, it is possible to create the default partitioning in the following ways:
- Use Free Space
- If the drive is already partitioned, it is possible to create the new partitions using the free space on the hard disk. This requires the availability of sufficient space for all selected packages in addition to swap. 
- Reuse all available space
- Use this option to delete all existing partitions (Linux and non-Linux). 
- Reuse all available Linux partitions
- This option deletes all existing Linux partitions. Other partitions (for example Windows partitions) remain untouched. Note that this works only if the Linux partitions are at the end of the device. 
- Reuse only specified partitions
- This option allows you to select specific partitions to delete. Start the selection with the last available partition. 
Repartitioning only works if the selected partitions are neighbors and located at the end of the device.
      The value provided in the use property determines
      how existing data and partitions are treated. The value
      all means that the entire disk will be erased. Make
      backups and use the confirm property if you need to
      keep some partitions with important data. Otherwise, no pop-ups will
      notify you about partitions being deleted.
     
If multiple drives are in the target system, identify all drives with their device names and specify how the partitioning should be performed.
     Partition sizes can be given in gigabytes, megabytes or can be set to a
     flexible value using the keywords auto and
     max. max uses all available space
     on a drive, therefore should only be set for the last partition on the
     drive. With auto the size of a
     swap or boot partition is
     determined automatically, depending on the memory available and the
     type of the system.
    
A fixed size can be given as shown below:
     1GB, 1G,
     1000MB, or 1000M will all create a
     partition of the size 1 Gigabyte.
    
The following is an example of a single drive system, which is not pre-partitioned and should be automatically partitioned according to the described pre-defined partition plan. If you do not specify the device, it will be automatically detected.
<partitioning  config:type="list">
  <drive>
    <device>/dev/sda</device>
    <use>all</use>
  </drive>
</partitioning>A more detailed example shows how existing partitions and multiple drives are handled.
<partitioning  config:type="list">
  <drive>
    <device>/dev/sda</device>
    <partitions config:type="list">
      <partition>
        <mount>/</mount>
        <size>10G</size>
      </partition>
      <partition>
        <mount>swap</mount>
        <size>1G</size>
      </partition>
    </partitions>
  </drive>
  <drive>
    <device>/dev/sdb</device>
    <use>all</use>
    <partitions config:type="list">
      <partition>
        <filesystem  config:type="symbol">reiser</filesystem>
        <mount>/data1</mount>
        <size>15G</size>
      </partition>
      <partition>
        <filesystem  config:type="symbol">jfs</filesystem>
        <mount>/data2</mount>
        <size>auto</size>
      </partition>
    </partitions>
    <use>free</use>
  </drive>
</partitioning>4.5.7 Advanced Partitioning Features #
4.5.7.1 Wipe out Partition Table #
Usually this is not needed because AutoYaST can delete partitions one by one automatically. But you need the option to let AutoYaST clear the partition table instead of deleting partitions individually.
      Go to the drive section and add:
     
<initialize config:type="boolean">true</initialize>
With this setting AutoYaST will delete the partition table before it starts to analyze the actual partitioning and calculates its partition plan. Of course this means, that you cannot keep any of your existing partitions.
4.5.7.2 Mount Options #
      By default a file system to be mounted is identified in
      /etc/fstab by the device name. This
      identification can be changed so the file system is found by searching
      for a UUID or a volume label. Note that not all file systems can be
      mounted by UUID or a volume label. To specify how a partition is to be
      mounted, use the mountby property which has the
      symbol type. Possible options are:
     
- device(default)
- label
- UUID
      If you choose to mount the partition using a label, the name entered
      for the label property is used as the volume label.
     
      Add any valid mount option in the fourth field of
      /etc/fstab. Multiple options are separated by
      commas. Possible fstab options:
     
- Mount read-only (ro)
- No write access to the file system. Default is - false.
- No access time (noatime)
- Access times are not updated when a file is read. Default is - false.
- Mountable by User (user)
- The file system can be mounted by a normal user. Default is - false.
- 
        Data Journaling Mode (ordered,journal,writeback)
- journal
- All data is committed to the journal prior to being written to the main file system. 
- ordered
- All data is directly written to the main file system before its metadata is committed to the journal. 
- writeback
- Data ordering is not preserved. 
 
- Access Control List (acl)
- Enable access control lists on the file system. 
- Extended User Attributes (user_xattr)
- Allow extended user attributes on the file system. 
<partitions config:type="list">
  <partition>
    <filesystem config:type="symbol">reiser</filesystem>
    <format config:type="boolean">true</format>
    <fstopt>ro,noatime,user,data=ordered,acl,user_xattr</fstopt>
    <mount>/local</mount>
    <mountby config:type="symbol">uuid</mountby>
    <partition_id config:type="integer">131</partition_id>
    <size>10G</size>
  </partition>
</partitions>4.5.7.3 Keeping Specific Partitions #
In some cases you should leave partitions untouched and only format specific target partitions, rather than creating them from scratch. For example, if different Linux installations coexist, or you have another operating system installed, likely you do not want to wipe these out. You may also want to leave data partitions untouched.
Such scenarios require certain knowledge about the target systems and hard disks. Depending on the scenario, you might need to know the exact partition table of the target hard disk with partition ids, sizes and numbers. With this data you can tell AutoYaST to keep certain partitions, format others and create new partitions if needed.
The following example will keep partitions 1, 2 and 5 and delete partition 6 to create two new partitions. All remaining partitions will only be formatted.
<partitioning config:type="list">
  <drive>
    <device>/dev/sdc</device>
      <partitions config:type="list">
        <partition>
          <create config:type="boolean">false</create>
          <format config:type="boolean">true</format>
          <mount>/</mount>
          <partition_nr config:type="integer">1</partition_nr>
        </partition>
        <partition>
          <create config:type="boolean">false</create>
          <format config:type="boolean">false</format>
          <partition_nr config:type="integer">2</partition_nr>
          <mount>/space</mount>
        </partition>
        <partition>
          <create config:type="boolean">false</create>
          <format config:type="boolean">true</format>
          <filesystem config:type="symbol">swap</filesystem>
          <partition_nr config:type="integer">5</partition_nr>
          <mount>swap</mount>
        </partition>
        <partition>
          <format config:type="boolean">true</format>
          <mount>/space2</mount>
          <size>5G</size>
        </partition>
        <partition>
          <format config:type="boolean">true</format>
          <mount>/space3</mount>
          <size>max</size>
        </partition>
      </partitions>
    <use>6</use>
  </drive>
</partitioning>The last example requires exact knowledge of the existing partition table and the partition numbers of those partitions that should be kept. In some cases however, such data may not be available, especially in a mixed hardware environment with different hard disk types and configurations. The following scenario is for a system with a non-Linux OS with a designated area for a Linux installation.
In this scenario, shown in figure Figure 4.1, “Keeping partitions”, AutoYaST will not create new partitions. Instead it searches for certain partition types on the system and uses them according to the partitioning plan in the control file. No partition numbers are given in this case, only the mount points and the partition types (additional configuration data can be provided, for example file system options, encryption and file system type).
<partitioning config:type="list">
  <drive>
    <partitions config:type="list">
      <partition>
        <create config:type="boolean">false</create>
        <format config:type="boolean">true</format>
        <mount>/</mount>
        <partition_id config:type="integer">131</partition_id>
      </partition>
      <partition>
        <create config:type="boolean">false</create>
        <format config:type="boolean">true</format>
        <filesystem config:type="symbol">swap</filesystem>
        <partition_id config:type="integer">130</partition_id>
        <mount>swap</mount>
      </partition>
    </partitions>
  </drive>
</partitioning>4.5.8 Using an Existing Mount Table (fstab) #
partitioning Section
     
      This section will be ignored if you have defined your own
      partitioning section too.
     
     This option will allow AutoYaST to use an existing
     /etc/fstab and use the partition data from a
     previous installation. All partitions are kept and no new partitions
     are created. The partitions will be formatted and mounted as specified
     in /etc/fstab on a Linux root partition.
    
     Although the default behavior is to format all partitions, it is also
     possible to leave some partitions (for
     example data partitions) untouched and only mount them. If multiple installations are found on the
     system (multiple root partitions with different
     fstab files, the installation will abort, unless
     the root partition is configured in the control file. The following
     example illustrates how this option can be used:
    
/etc/fstab #<partitioning_advanced>
  <fstab>
    <!-- Read data from existing fstab. If multiple root partitions are
            found, use the one specified below. Otherwise the first root
            partition is taken -->
    <!-- <root_partition>/dev/sda5</root_partition> -->
    <use_existing_fstab config:type="boolean">true</use_existing_fstab>
    <!-- all partitions found in fstab will be formatted and mounted
            by default unless a partition is listed below with different
            settings -->
    <partitions config:type="list">
      <partition>
        <format config:type="boolean">false</format>
        <mount>/bootmirror</mount>
      </partition>
    </partitions>
  </fstab>
</partitioning_advanced>4.5.9 Logical Volume Manager (LVM) #
To configure LVM, first create a physical volume using the normal partitioning method described above.
      The following example shows how to prepare for LVM in the
      partitioning resource. A non-formatted partition is
      created on device /dev/sda1 of the type
      LVM and with the volume group
      system. This partition will use all space available
      on the drive.
     
<partitioning config:type="list">
  <drive>
    <device>/dev/sda</device>
    <partitions config:type="list">
      <partition>
        <create config:type="boolean">true</create>
        <lvm_group>system</lvm_group>
        <partition_type>primary</partition_type>
        <partition_id config:type="integer">142</partition_id>
        <partition_nr config:type="integer">1</partition_nr>
        <size>max</size>
      </partition>
    </partitions>
    <use>all</use>
  </drive>
</partitioning><partitioning config:type="list">
  <drive>
    <device>/dev/sda</device>
    <partitions config:type="list">
      <partition>
        <lvm_group>system</lvm_group>
        <partition_type>primary</partition_type>
        <size>max</size>
      </partition>
    </partitions>
    <use>all</use>
  </drive>
  <drive>
    <device>/dev/system</device>
      <is_lvm_vg config:type="boolean">true</is_lvm_vg>
      <partitions config:type="list">
        <partition>
          <filesystem config:type="symbol">reiser</filesystem>
          <lv_name>user_lv</lv_name>
          <mount>/usr</mount>
          <size>15G</size>
        </partition>
        <partition>
          <filesystem config:type="symbol">reiser</filesystem>
          <lv_name>opt_lv</lv_name>
          <mount>/opt</mount>
          <size>10G</size>
        </partition>
        <partition>
          <filesystem config:type="symbol">reiser</filesystem>
          <lv_name>var_lv</lv_name>
          <mount>/var</mount>
          <size>1G</size>
        </partition>
      </partitions>
      <pesize>4M</pesize>
    <use>all</use>
  </drive>
</partitioning>
     It is possible to set the size to
     max for the logical volumes. Of course, you can only
     use max for one(!) logical volume. You cannot set
     two logical volumes in one volume group to max.
    
4.5.10 Software RAID #
Using AutoYaST, you can create and assemble software RAID devices. The supported RAID levels are the following:
- RAID 0
- This level increases your disk performance. There is no redundancy in this mode. If one of the drives crashes, data recovery will not be possible. 
- RAID 1
- This mode offers the best redundancy. It can be used with two or more disks. An exact copy of all data is maintained on all disks. As long as at least one disk is still working, no data is lost. The partitions used for this type of RAID should have approximately the same size. 
- RAID 5
- This mode combines management of a larger number of disks and still maintains some redundancy. This mode can be used on three disks or more. If one disk fails, all data is still intact. If two disks fail simultaneously, all data is lost. 
- Multipath
- This mode allows access to the same physical device via multiple controllers for redundancy against a fault in a controller card. This mode can be used with at least two devices. 
As with LVM, you need to create all RAID partitions first and assign them to the RAID device you want to create afterward. Additionally you need to specify whether a partition or a device should be part of the RAID or if it should be a Spare device.
The following example shows a simple RAID1 configuration:
<partitioning config:type="list">
  <drive>
    <device>/dev/sda</device>
    <partitions config:type="list">
      <partition>
        <partition_id config:type="integer">253</partition_id>
        <format config:type="boolean">false</format>
        <raid_name>/dev/md0</raid_name>
        <raid_type>raid</raid_type>
        <size>4G</size>
      </partition>
        <!-- Insert a configuration for the regular partitions located on
                /dev/sda here (for example / and swap) -->
    </partitions>
    <use>all</use>
  </drive>
  <drive>
    <device>/dev/sdb</device>
    <partitions config:type="list">
      <partition>
        <format config:type="boolean">false</format>
        <partition_id config:type="integer">253</partition_id>
        <raid_name>/dev/md0</raid_name>
        <raid_type>raid</raid_type>
        <size>4gb</size>
      </partition>
    </partitions>
    <use>all</use>
  </drive>
  <drive>
    <device>/dev/md</device>
    <partitions config:type="list">
      <partition>
        <filesystem config:type="symbol">reiser</filesystem>
        <format config:type="boolean">true</format>
        <mount>/space</mount>
        <partition_id config:type="integer">131</partition_id>
        <partition_nr config:type="integer">0</partition_nr>
        <raid_options>
          <chunk_size>4</chunk_size>
          <parity_algorithm>left-asymmetric</parity_algorithm>
          <raid_type>raid1</raid_type>
        </raid_options>
      </partition>
    </partitions>
    <use>all</use>
  </drive>
</partitioning>Keep the following in mind when configuring a RAID:
- The device for raid is always - /dev/md
- The property - partition_nris used to determine the MD device number. If- partition_nris equal to 0, then- /dev/md0is configured.
- All RAID-specific options are contained in the - raid_optionsresource.
4.5.11 Multipath Support #
     AutoYaST is able to handle multipath devices. In order to take advantage of
     them, you need to enable multipath support, as described in Section 4.1.6, “The Storage Section”, and set the
     type element of each drive section to
     CT_DMMULTIPATH, instead of CT_DISK. Mixing
     CT_DISK and CT_DMMULTIPATH types will not
     work.
    
Example 4.13, “Using Multipath Devices” shows the relevant parts of a profile that instructs AutoYaST to partition a multipath device.
<general>
  <storage>
    <start_multipath config:type="boolean">true</start_multipath>
  <storage>
</general>
<partitioning>
  <drive>
    <partitions config:type="list">
      <partition>
        <size>20G</size>
        <mount>/</mount>
        <filesystem config:type="symbol">ext4</filesystem>
      </partition>
      <partition>
        <size>auto</size>
        <mount>swap</mount>
      </partition>
    </partitions>
    <type config:type="symbol">CT_DMMULTIPATH</type>
    <use>all</use>
  </drive>
</partitioning>4.5.12 IBM IBM Z Specific Configuration #
4.5.12.1 Configuring DASD Disks #
The elements listed below must be placed within the following XML structure:
<dasd> <devices config:type="list"> <listentry> ... </listentry> </devices> </dasd>
tags in the <profile> section. Each disk needs to be configured in a separate <listentry> ... </listentry> section.
| Attribute | Values | Description | 
|---|---|---|
| 
            | 
            <device >DASD</dev_name> | |
| 
            | 
           The device ( <dev_name >/dev/dasda</dev_name> | Optional but recommended. If left out, AutoYaST tries to guess the device. | 
| 
            | Channel by which the disk is accessed. <channel>0.0.0150</channel> | Mandatory. | 
| 
            | 
           Enable or disable the use of  <diag config:type="boolean">true</diag> | Optional. | 
       For AutoYaST to successfully partition an LDL-formatted MDisk, set the
       parameters below to false as follows:
      
<initialize config:type="boolean">false</initialize> <create config:type="boolean">false</create>
4.5.12.2 Configuring zFCP disks #
The following elements must be placed within the following XML structure:
<profile>
  <zfcp>
    <devices config:type="list">
      <listentry>
        ...
      </listentry>
    </devices>
  </zfcp>
<profile>
      Each disk needs to be configured in a separate
      listentry section.
     
- controller_id
- Channel number - <controller_id>0.0.fc00</controller_id> 
       The controller_id element is required.
     
       There are two optional elements, wwpn
       (Worldwide Port Number, the target port through which the SCSI device
       is attached), and fcp_lun
       (logical unit number of the SCSI device). It is not necessary to
       specify these for FCP devices running in NPIV (Node Port ID
       Virtualization) mode, and when the zfcp module parameter
       allow_lun_scan is set to 1 (the default setting),
       which enables automatic LUN scanning by the zfcp device driver.
     
       If automatic LUN scanning is not available, set the
       wwpn and fcp_lun options
       manually.
     
- wwpn
- Worldwide port number - <wwpn>0x500507630300c562</wwpn> 
- fcp_lun
- Logical unit number - <fcp_lun>0x4010403200000000</fcp_lun> 
See the IBM documentation for more information, https://www.ibm.com/docs/en/linux-on-systems?topic=wsd-configuring-devices.
4.6 iSCSI Initiator Overview #
    Using the iscsi-client resource, you can configure
    the target machine as an iSCSI client.
   
  <iscsi-client>
    <initiatorname>iqn.2013-02.de.suse:01:e229358d2dea</initiatorname>
    <targets config:type="list">
      <listentry>
         <authmethod>None</authmethod>
         <portal>192.168.1.1:3260</portal>
         <startup>onboot</startup>
         <target>iqn.2001-05.com.doe:test</target>
         <iface>default</iface>
      </listentry>
    </targets>
    <version>1.0</version>
  </iscsi-client>| Attribute | Description | 
|---|---|
| initiatorname | 
            | 
| version | Version of the YaST module. Default: 1.0 | 
| targets | List of targets. Each entry contains: 
            
            
            
            
            | 
4.7 Fibre Channel over Ethernet Configuration (FCoE) #
    Using the fcoe_cfg resource, you can configure
    a Fibre Channel over Ethernet (FCoE).
   
  <fcoe-client>
    <fcoe_cfg>
      <DEBUG>no</DEBUG>
      <USE_SYSLOG>yes</USE_SYSLOG>
    </fcoe_cfg>
    <interfaces config:type="list">
      <listentry>
        <dev_name>eth3</dev_name>
        <mac_addr>01:000:000:000:42:42</mac_addr>
        <device>Gigabit 1313</device>
        <vlan_interface>200</vlan_interface>
        <fcoe_vlan>eth3.200</fcoe_vlan>
        <fcoe_enable>yes</fcoe_enable>
        <dcb_required>yes</dcb_required>
        <auto_vlan>no</auto_vlan>
        <dcb_capable>no</dcb_capable>
        <cfg_device>eth3.200</cfg_device>
      </listentry>
    </interfaces>
    <service_start>
      <fcoe config:type="boolean">true</fcoe>
      <lldpad config:type="boolean">true</lldpad>
    </service_start>
  </fcoe-client>| Attribute | Description | Values | 
|---|---|---|
| fcoe_cfg | 
            
            | yes/no | 
| interfaces | List of network cards including the status of VLAN and FCoE configuration. | |
| service_start | 
           Enable or disable the start of the services
            
           Starting the service  
           The  | yes/no | 
4.8 Country Settings #
Language, timezone, and keyboard settings.
       <language>
         <language>en_GB</language>
         <languages>de_DE,en_US</languages>
       </language>| Attribute | Description | Values | 
|---|---|---|
| 
            | Primary language | 
           A list of available languages can be found under
            | 
| 
            | Secondary languages separated by commas | 
           A list of available languages can be found under
            | 
    If the configured value for the primary language is unknown, it will be reset
    to the default, en_US.
   
       <timezone>
         <hwclock>UTC</hwclock>
         <timezone>Europe/Berlin</timezone>
       </timezone>| Attribute | Description | Values | 
|---|---|---|
| hwclock | Whether the hardware clock uses local time or UTC | localtime/UTC | 
| timezone | Timezone | 
           A list of available timezones can be found under
            | 
       <keyboard>
         <keymap>german</keymap>
       </keyboard>| Attribute | Description | Values | 
|---|---|---|
| keymap | Keyboard layout | 
         A list of available keymaps can be found in
          | 
4.9 Software #
4.9.1 Package Selection with Patterns #
Patterns are configured like this:
<software>
  <patterns config:type="list">
    <pattern>directory_server</pattern>
  </patterns>
  <packages  config:type="list">
    <package>apache</package>
    <package>postfix</package>
  </packages>
  <do_online_update config:type="boolean">true</do_online_update>
</software>
     It is possible to specify package and pattern names using regular expressions. In that case,
     AutoYaST will select all packages or patterns that match the expression. Beware that such
     expressions must be enclosed within slashes. In
     Example 4.20, “Packages selection using a regular expression”, all packages whose name starts with
     nginx will be selected (e.g., nginx and
     nginx-macros).
    
<software>
  <packages config:type="list">
    <package>/nginx.*/</package>
  </packages>
</software>4.9.2 Installing Additional/Customized Packages or Products #
In addition to the packages available for installation on the DVD-ROMs, you can add external packages including customized kernels. Customized kernel packages must be compatible to the SUSE packages and must install the kernel files to the same locations.
Unlike in earlier in versions, you do not need a special resource in the control file to install custom and external packages. Instead you need to re-create the package database and update it with any new packages or new package versions in the source repository.
     A script is provided for this task which will query packages available
     in the repository and create the package database. Use the command
     /usr/bin/create_package_descr. It can be found in
     the inst-source-utils package in the openSUSE Build Service.
     When creating the database, all languages will be reset to English.
    
     The unpacked DVD is located in /usr/local/DVDs/LATEST.
     
cp /tmp/inst-source-utils-2016.7.26-1.2.noarch.rpm /usr/local/DVDs/LATEST/suse/noarch cd /usr/local/DVDs/LATEST/suse create_package_descr -d /usr/local/CDs/LATEST/suse
     In the above example, the directory
     /usr/local/CDs/LATEST/suse contains the
     architecture dependent (for example x86_64) and
     architecture independent packages (noarch). This
     might look different on other architectures.
    
The advantage of this method is that you can keep an up-to-date repository with fixed and updated package. Additionally this method makes the creation of custom CD-ROMs easier.
     To add your own module such as the SDK (SUSE Software Development Kit), add a file
     add_on_products.xml to the installation source in the
     root directory.
    
     The following example shows how the SDK module can be added to the base product
     repository. The complete SDK repository will be stored in the directory
     /sdk.
    
add_on_products.xml
      #This file describes an SDK module included in the base product.
<?xml version="1.0"?>
<add_on_products xmlns="http://www.suse.com/1.0/yast2ns"
   xmlns:config="http://www.suse.com/1.0/configns">
   <product_items config:type="list">
      <product_item>
         <name>SUSE Linux Enterprise Software Development Kit</name>
         <url>relurl:////sdk?alias=SLE_SDK</url>
         <path>/</path>
         <-- Users are asked whether to add such a product -->
         <ask_user config:type="boolean">false</ask_user>
         <-- Defines the default state of pre-selected state in case of ask_user used. -->
         <selected config:type="boolean">true</selected>
      </product_item>
   </product_items>
</add_on_products>
     With a normal installation now the SDK module will be installed automatically.
     It will be not done via an AutoYaST installation. An additional entry would be needed for this
     in the AutoYaST control file add-on section.
    
Besides this special case, all other modules, extensions and add-on products can be added from almost every other location during an AutoYaST installation.
<add-on>
  <add_on_products config:type="list">
    <listentry>
      <media_url>cd:///sdk</media_url>
      <product>sle-sdk</product>
      <alias>SLES SDK</alias>
      <product_dir>/</product_dir>
      <priority config:type="integer">20</priority>
      <ask_on_error config:type="boolean">false</ask_on_error>
      <confirm_license config:type="boolean">false</confirm_license>
      <name>SUSE Linux Enterprise Software Development Kit</name>
    </listentry>
  </add_on_products>
</add-on>| Attribute | Values | 
|---|---|
| 
           | 
          Product URL. Can have the prefix  | 
| 
           | 
          Internal product name if the add-on is a product.
          The command  | 
| 
           | Repository alias name. Defined by the user. | 
| 
           | Additional subpath. Optional. | 
| 
           | Sets the repository libzypp priority. Priority of 1 is the highest. The higher the number the lower the priority. Default is 99. | 
| 
           | 
          AutoYaST can ask the user to make add-on products, modules or extensions available
          instead of reporting a time-out error when no repository can be found at
          the given location. Set ask_on_error to  | 
| 
           | 
          The user has to confirm the license. Default is  | 
| 
           | 
          Repository name.
          The command  | 
To use unsigned installation sources with AutoYaST, turn off the checks with the following configuration in your AutoYaST control file.
You can only disable signature checking during the first stage of the auto-installation process. In stage two, the installed system's configuration takes precedence over AutoYaST configuration.
The elements listed below must be placed within the following XML structure:
<general>
  <signature-handling>
    ...
  </signature-handling>
</general>
     Default values for all options are false. If an
     option is set to false and a package or repository
     fails the respective test, it is silently ignored and will not be
     installed. Note that setting any of these options to
     true is a potential security risk. Never do it when
     using packages or repositories from third party sources.
    
| Attribute | Values | 
|---|---|
| 
           | 
          If set to  <accept_unsigned_file config:type="boolean" >true</accept_unsigned_file> | 
| 
           | 
          If set to  <accept_file_without_checksum config:type="boolean" >true</accept_file_without_checksum> | 
| 
           | 
          If set to  <accept_verification_failed config:type="boolean" >true</accept_verification_failed> | 
| 
           | 
          If set to  <accept_unknown_gpg_key config:type="boolean" >true</accept_unknown_gpg_key> | 
| 
           | 
          Set this option to  <accept_non_trusted_gpg_key config:type="boolean" >true</accept_non_trusted_gpg_key> | 
| 
           | 
          If set to  <import_gpg_key config:type="boolean" >true</import_gpg_key> | 
     It is possible to configure the signature handling for each add-on
     product, module, or extension individually. The following elements must
     be between the signature-handling section of the
     individual add-on product, module, or extension. All settings are
     optional. If not configured, the global signature-handling from the
     general section is used.
    
| Attribute | Values | 
|---|---|
| 
           | 
          If set to  <accept_unsigned_file config:type="boolean" >true</accept_unsigned_file> | 
| 
           | 
          If set to  <accept_file_without_checksum config:type="boolean" >true</accept_file_without_checksum> | 
| 
           | 
          If set to  <accept_verification_failed config:type="boolean" >true</accept_verification_failed> | 
| 
           | 
          If  <accept_unknown_gpg_key> <all config:type="boolean">true</all> </accept_unknown_gpg_key> Otherwise you can define single keys too. <accept_unknown_gpg_key>
  <all config:type="boolean">false</all>
  <keys config:type="list">
    <keyid>3B3011B76B9D6523</keyid>
  </keys>
</accept_unknown_gpg_key> | 
| 
           | This means, the key is known, but it is not trusted by you. You can trust all keys by adding: <accept_non_trusted_gpg_key> <all config:type="boolean">true</all> </accept_non_trusted_gpg_key> Or you can trust specific keys: <accept_non_trusted_gpg_key>
  <all config:type="boolean">false</all>
  <keys config:type="list">
    <keyid>3B3011B76B9D6523</keyid>
  </keys>
</accept_non_trusted_gpg_key> | 
| 
           | 
          If  <import_gpg_key> <all config:type="boolean">true</all> </import_gpg_key> This can be done for specific keys only: <import_gpg_key>
  <all config:type="boolean">false</all>
  <keys config:type="list">
    <keyid>3B3011B76B9D6523</keyid>
  </keys>
</import_gpg_key> | 
4.9.3 Kernel Packages #
Kernel packages are not part of any selection. The required kernel is determined during installation. If the kernel package is added to any selection or to the individual package selection, installation will mostly fail because of conflicts.
     To force the installation of a specific kernel, use the
     kernel property. The following is an example of
     forcing the installation of the default kernel. This kernel will be
     installed even if an SMP or other kernel is required.
    
<software> <kernel>kernel-default</kernel> ... </software>
4.9.4 Removing Automatically Selected Packages #
Some packages are selected automatically either because of a dependency or because it is available in a selection.
     Removing these packages might break the system consistency, and it is not
     recommended to remove basic packages unless a replacement which
     provides the same services is provided. The best example for this case
     are mail transfer agent (MTA) packages. By default,
     postfix will be selected and installed. To use another MTA like sendmail, then
     postfix can be removed from the list of selected package using a list
     in the software resource. However, note that sendmail is not shipped
     with SUSE Linux Enterprise Server. The following example shows how this can be
     done:
    
<software>
  <packages  config:type="list">
    <package>sendmail</package>
  </packages>
  <remove-packages  config:type="list">
    <package>postfix</package>
  </remove-packages>
</software>Note that it is not possible to remove a package, that is part of a pattern (see Section 4.9.1, “Package Selection with Patterns”). When specifying such a package for removal, the installation will fail with the following error message:
The package resolver run failed. Check
      your software section in the AutoYaST profile.4.9.5 Installing Recommended Packages/Patterns #
     By default all recommended packages/patterns will be installed.
     To have a minimal installation which includes required
     packages only, you can switch off this behavior with the flag
     install_recommended. Note that this flag only affects
     a fresh installation and will be ignored during an upgrade.
    
<software> <install_recommended config:type="boolean">false </install_recommended> </software>
     Default: If this flag has not been set in the configuration file all
     recommended packages and no
     recommended pattern will be installed.
    
4.9.6 Installing Packages in Stage 2 #
     To install packages after the reboot during stage two, you can
     use the post-packages element for that:
    
<software>
  <post-packages config:type="list">
    <package>yast2-cim</package>
  </post-packages>
</software>4.9.7 Installing Patterns in Stage 2 #
     You can also install patterns in stage 2. Use the
     post-patterns element for that:
    
<software>
  <post-patterns config:type="list">
    <pattern>apparmor</pattern>
  </post-patterns>
</software>4.9.8 Online Update in Stage 2 #
     You can perform an online update at the end of the installation. Set
     the boolean do_online_update to
     true. Of course this only makes sense if you add an
     online update repository in the suse-register/customer-center section,
     for example, or in a post-script. If the online update repository was
     already available in stage one via the add-on section, then AutoYaST has
     already installed the latest packages available. If a kernel update is
     done via online-update, a reboot at the end of stage two is triggered.
    
<software> <do_online_update config:type="boolean">true</do_online_update> </software>
4.10 Upgrade #
AutoYaST can also be used for doing a system upgrade. Besides upgrade packages, the following sections are supported too:
- scripts/pre-scriptsRunning user scripts very early, before anything else really happens.
- add-onDefining an additional add-on product.
- languageSetting language.
- timezoneSetting timezone.
- keyboardSetting keyboard.
- softwareInstalling additional software/patterns. Removing installed packages.
- suse_registerRunning registration process.
To control the upgrade process the following sections can be defined:
<upgrade>
    <stop_on_solver_conflict config:type="boolean">true</stop_on_solver_conflict>
  </upgrade>
  <backup>
    <sysconfig config:type="boolean">true</sysconfig>
    <modified config:type="boolean">true</modified>
    <remove_old config:type="boolean">true</remove_old>
  </backup>| Element | Description | Comment | 
|---|---|---|
| stop_on_solver_conflict | Halt installation if there are package dependency issues. | |
| modified | Create backup of modified files. | |
| sysconfig | 
          Create backup of  | |
| remove_old | Remove backups from previous updates. | 
To start the AutoYaST upgrade mode, you need:
- Copy the AutoYaST profile to - /root/autoupg.xmlon its file system.
- Boot the system from the installation media. 
- Select the - Installationmenu item.
- On the command line, set - autoupgrade=1.
- Press Enter to start the upgrade process. 
4.11 Services and Targets #
    With the services-manager resource you can set the
    default systemd target and specify in detail which system services you
    want to start or deactivate.
   
    The default-target property specifies the default
    systemd target into which the system boots. Valid options are
    graphical for a graphical login, or
    multi-user for a console login.
   
The <enable config:type="list"> and <disable config:type="list"> let you explicitly enable or disable services.
<services-manager>
  <default_target>multi-user</default_target>
  <services>
    <disable config:type="list">
      <service>cups</service>
    </disable>
    <enable config:type="list">
      <service>sshd</service>
    </enable>
  </services>
</services-manager>4.12 Network Configuration #
Network configuration is used to connect a single workstation to an Ethernet-based LAN or to configure a dial-up connection. More complex configurations (multiple network cards, routing, etc.) are also provided.
    If the following setting is set to true, YaST
    will keep network settings created during the installation (via Linuxrc)
    and/or merge it with network settings from the AutoYaST control file (if
    defined). AutoYaST settings have higher priority than already present
    configuration files. YaST will write ifcfg-* files based on the
    entries in the control file without removing old ones. If there is an
    empty or no DNS and routing section, YaST will keep already
    existing values. Otherwise settings from the control file will be
    applied.
   
<keep_install_network config:type="boolean">true</keep_install_network>
    During the second stage, installation of additional packages will take
    place before the network, as described in the profile, is configured.
    keep_install_network is set by default to
    true to ensure that a network is available
    in case it is needed to install those packages. If all packages
    are installed during the first stage and the network is not needed early
    during the second one, setting keep_install_network
    to false will avoid copying the configuration.
   
To configure network settings and activate networking automatically, one global resource is used to store the whole network configuration.
<networking>
  <dns>
    <dhcp_hostname config:type="boolean">true</dhcp_hostname>
    <domain>site</domain>
    <hostname>linux-bqua</hostname>
    <nameservers config:type="list">
      <nameserver>192.168.1.116</nameserver>
      <nameserver>192.168.1.117</nameserver>
      <nameserver>192.168.1.118</nameserver>
    </nameservers>
    <resolv_conf_policy>auto</resolv_conf_policy>
    <searchlist config:type="list">
      <search>example.com</search>
      <search>example.net</search>
    </searchlist>
    <write_hostname config:type="boolean">false</write_hostname>
  </dns>
  <interfaces config:type="list">
    <interface>
      <bootproto>dhcp</bootproto>
      <device>eth0</device>
      <startmode>auto</startmode>
    </interface>
    <interface>
      <bootproto>static</bootproto>
      <broadcast>127.255.255.255</broadcast>
      <device>lo</device>
      <firewall>no</firewall>
      <ipaddr>127.0.0.1</ipaddr>
      <netmask>255.0.0.0</netmask>
      <network>127.0.0.0</network>
      <prefixlen>8</prefixlen>
      <startmode>nfsroot</startmode>
      <usercontrol>no</usercontrol>
    </interface>
  </interfaces>
  <ipv6 config:type="boolean">true</ipv6>
  <keep_install_network config:type="boolean">false</keep_install_network>
  ## false means use Wicked, true means use NetworkManager
  <managed config:type="boolean">false</managed>
  <net-udev config:type="list">
    <rule>
      <name>eth0</name>
      <rule>ATTR{address}</rule>
      <value>00:30:6E:08:EC:80</value>
    </rule>
  </net-udev>
  <s390-devices config:type="list">
    <listentry>
      <chanids>0.0.0800 0.0.0801 0.0.0802</chanids>
      <type>qeth</type>
    </listentry>
  </s390-devices>
  <routing>
    <ipv4_forward config:type="boolean">false</ipv4_forward>
    <ipv6_forward config:type="boolean">false</ipv6_forward>
    <routes config:type="list">
      <route>
        <destination>192.168.2.1</destination>
        <device>eth0</device>
        <extrapara>foo</extrapara>
        <gateway>-</gateway>
        <netmask>-</netmask>
      </route>
      <route>
        <destination>default</destination>
        <device>eth0</device>
        <gateway>192.168.1.1</gateway>
        <netmask>-</netmask>
      </route>
      <route>
        <destination>default</destination>
        <device>lo</device>
        <gateway>192.168.5.1</gateway>
        <netmask>-</netmask>
      </route>
    </routes>
  </routing>
</networking><interfaces config:type="list">
  <interface>
    <device>br0</device>
    <bootproto>static</bootproto>
    <bridge>yes</bridge>
    <bridge_forwarddelay>0</bridge_forwarddelay>
    <bridge_ports>eth0 eth1</bridge_ports>
    <bridge_stp>off</bridge_stp>
    <ipaddr>192.168.122.100</ipaddr>
    <netmask>255.255.255.0</netmask>
    <network>192.168.122.0</network>
    <prefixlen>24</prefixlen>
    <startmode>auto</startmode>
  </interface>
  <interface>
    <device>eth0</device>
    <bootproto>none</bootproto>
    <startmode>hotplug</startmode>
  </interface>
  <interface>
    <device>eth1</device>
    <bootproto>none</bootproto>
    <startmode>hotplug</startmode>
  </interface>
</interfaces>Using IPv6 addresses in AutoYaST is fully supported. To disable IPv6 Address Support, set <ipv6 config:type="boolean">false</ipv6>
4.12.1 Persistent Names of Network Interfaces #
The following elements must be between the <net-udev>...</net-udev> tags.
| Element | Description | Comment | 
|---|---|---|
| name | 
          Network interface name, for example  | required | 
| rule | 
           | required | 
| value | 
          for example  | required | 
4.12.2 s390 Options #
The following elements must be between the <s390-devices>...</s390-devices> tags.
| Element | Description | Comment | 
|---|---|---|
| type | qeth, ctc or iucv | |
| chanids | channel ids separated by spaces <chanids>0.0.0700 0.0.0701 0.0.0702</chanids> | |
| layer2 | <layer2 config:type="boolean">true</layer2> | boolean; default: false | 
| portname | QETH port name (deprecated since SLE 12 SP2) | |
| protocol | CTC / LCS protocol, a small number (as a string) <protocol>1</protocol> | optional | 
| router | IUCV router/user | 
     In addition to the options mentioned above, AutoYaST also supports IBM
     IBM Z-specific options in other sections of the configuration file.
     In particular, you can define the logical link address, or LLADDR (in the
     case of Ethernet, that is the MAC address). To do so, use the option
     LLADDR in the device definition.
    
VLAN devices inherit their LLADDR from the underlying physical devices. To set a particular address for a VLAN device, set the LLADDR option for the underlying physical device.
4.12.3 Proxy #
Configure your Internet proxy (caching) settings.
     Configure proxies for HTTP, HTTPS, and FTP with
     http_proxy, https_proxy
     and ftp_proxy, respectively. Addresses or names that
     should be directly accessible need to be specified with
     no_proxy (space separated values). If you are using
     a proxy server with authorization, fill in
     proxy_user and proxy_password,
    
<proxy> <enabled config:type="boolean">true</enabled> <ftp_proxy>http://192.168.1.240:3128</ftp_proxy> <http_proxy>http://192.168.1.240:3128</http_proxy> <no_proxy>www.example.com .example.org localhost</no_proxy> <proxy_password>testpw</proxy_password> <proxy_user>testuser</proxy_user> </proxy>
4.12.4 (X)Inetd #
The control file has elements to specify which superserver should be used (netd_service), whether it should be enabled (netd_status) and how the services should be configured (netd_conf).
A service description element needs two parts: key and non-key. When writing the configuration, services are matched using the key fields; to the matching service, non-key fields are applied. If no service matches, it is created. If more services match, a warning is reported. The key fields are script, service, protocol and server.
     service and protocol are
     matched literally. script is the base name of the
     configuration file: usually a file in
     /etc/xinetd.d, for example "echo-udp", or "inetd.conf". For
     compatibility with 8.2, server is matched more
     loosely: if it is /usr/sbin/tcpd, the real server
     name is taken from server_args. After that, the
     basename of the first whitespace-separated word is taken and these
     values are compared.
    
<profile>
  <inetd>
    <netd_service config:type="symbol">xinetd</netd_service>
    <netd_status config:type="integer">0</netd_status>
    <netd_conf config:type="list">
      <conf>
        <script>imap</script>
        <service>pop3</service>
        <enabled config:type="boolean">true</enabled>
      </conf>
      <conf>
        <server>in.ftpd</server>
        <server_args>-A</server_args>
        <enabled config:type="boolean">true</enabled>
      </conf>
      <conf>
        <service>daytime</service>
        <protocol>tcp</protocol>
      </conf>
      <conf>...</conf>
    </netd_conf>
  </inetd>
</profile>4.13 NIS Client #
    Using the nis resource, you can configure the target
    machine as a NIS client. The following example shows a detailed
    configuration using multiple domains.
   
 <nis>
  <nis_broadcast config:type="boolean">true</nis_broadcast>
  <nis_broken_server config:type="boolean">true</nis_broken_server>
    <nis_domain>test.com</nis_domain>
  <nis_local_only config:type="boolean">true</nis_local_only>
  <nis_options></nis_options>
  <nis_other_domains config:type="list">
    <nis_other_domain>
      <nis_broadcast config:type="boolean">false</nis_broadcast>
      <nis_domain>domain.com</nis_domain>
      <nis_servers config:type="list">
        <nis_server>10.10.0.1</nis_server>
      </nis_servers>
    </nis_other_domain>
  </nis_other_domains>
  <nis_servers config:type="list">
    <nis_server>192.168.1.1</nis_server>
  </nis_servers>
  <start_autofs config:type="boolean">true</start_autofs>
  <start_nis config:type="boolean">true</start_nis>
</nis>4.14 NIS Server #
You can configure the target machine as a NIS server. NIS Master Server and NIS Slave Server and a combination of both are available.
  <nis_server>
    <domain>mydomain.de</domain>
    <maps_to_serve config:type="list">
      <nis_map>auto.master</nis_map>
      <nis_map>ethers</nis_map>
    </maps_to_serve>
    <merge_passwd config:type="boolean">false</merge_passwd>
    <mingid config:type="integer">0</mingid>
    <minuid config:type="integer">0</minuid>
    <nopush config:type="boolean">false</nopush>
    <pwd_chfn config:type="boolean">false</pwd_chfn>
    <pwd_chsh config:type="boolean">false</pwd_chsh>
    <pwd_srcdir>/etc</pwd_srcdir>
    <securenets config:type="list">
      <securenet>
        <netmask>255.0.0.0</netmask>
        <network>127.0.0.0</network>
      </securenet>
    </securenets>
    <server_type>master</server_type>
    <slaves config:type="list"/>
    <start_ypbind config:type="boolean">false</start_ypbind>
    <start_yppasswdd config:type="boolean">false</start_yppasswdd>
    <start_ypxfrd config:type="boolean">false</start_ypxfrd>
  </nis_server>| Attribute | Values | Description | 
|---|---|---|
| 
          | NIS domain name. | |
| 
          | List of maps which are available for the server. | Values: auto.master, ethers, group, hosts, netgrp, networks, passwd, protocols, rpc, services, shadow | 
| 
          | Select if your passwd file should be merged with the shadow file (only possible if the shadow file exists). | Value: true/false | 
| 
          | Minimum GID to include in the user maps. | |
| 
          | Minimum UID to include in the user maps. | |
| 
          | Do not push the changes to slave servers. (Useful if there are none). | Value: true/false | 
| 
          | YPPWD_CHFN - allow changing the full name | Value: true/false | 
| 
          | YPPWD_CHSH - allow changing the login shell | Value: true/false | 
| 
          | YPPWD_SRCDIR - source directory for passwd data | 
         Default:  | 
| 
          | List of allowed hosts to query the NIS server | A host address will be allowed if network is equal to the bitwise AND of the host's address and the netmask. The entry with netmask 255.0.0.0 and network 127.0.0.0 must exist to allow connections from the local host. Entering netmask 0.0.0.0 and network 0.0.0.0 gives access to all hosts. | 
| 
          | Select whether to configure the NIS server as a master or a slave or not to configure a NIS server. | Values: master, slave, none | 
| 
          | List of host names to configure as NIS server slaves. | |
| 
          | This host is also a NIS client (only when client is configured locally). | Value: true/false | 
| 
          | Also start the password daemon. | Value: true/false | 
| 
          | Also start the map transfer daemon. Fast Map distribution; it will speed up the transfer of maps to the slaves. | Value: true/false | 
4.15 LDAP Server (Authentication Server) #
    Using the auth-server resource, you can configure the
    target machine as an LDAP server. The following example shows a detailed
    configuration.
   
  <auth-server>
    <daemon>
      <listeners config:type="list">
        <listentry>ldap</listentry>
        <listentry>ldapi</listentry>
      </listeners>
      <serviceEnabled>1</serviceEnabled>
      <slp/>
    </daemon>
    <databases config:type="list">
      <listentry>
        <access config:type="list">
          <listentry>
            <access config:type="list">
              <listentry>
                <control/>
                <level>write</level>
                <type>self</type>
                <value/>
              </listentry>
              <listentry>
                <control/>
                <level>auth</level>
                <type>*</type>
                <value/>
              </listentry>
            </access>
            <target>
              <attrs>userPassword</attrs>
            </target>
          </listentry>
          <listentry>
            <access config:type="list">
              <listentry>
                <control/>
                <level>write</level>
                <type>self</type>
                <value/>
              </listentry>
              <listentry>
                <control/>
                <level>read</level>
                <type>*</type>
                <value/>
              </listentry>
            </access>
            <target>
              <attrs>shadowLastChange</attrs>
            </target>
          </listentry>
          <listentry>
            <access config:type="list">
              <listentry>
                <control/>
                <level>read</level>
                <type>self</type>
                <value/>
              </listentry>
              <listentry>
                <control/>
                <level>none</level>
                <type>*</type>
                <value/>
              </listentry>
            </access>
            <target>
              <attrs>userPKCS12</attrs>
            </target>
          </listentry>
          <listentry>
            <access config:type="list">
              <listentry>
                <control/>
                <level>read</level>
                <type>*</type>
                <value/>
              </listentry>
            </access>
            <target/>
          </listentry>
        </access>
        <checkpoint config:type="list">
          <listentry>1024</listentry>
          <listentry>5</listentry>
        </checkpoint>
        <directory>/var/lib/ldap</directory>
        <entrycache>10000</entrycache>
        <idlcache>30000</idlcache>
        <indexes>
          <cn>
            <eq>1</eq>
            <sub>1</sub>
          </cn>
          <displayName>
            <eq>1</eq>
            <sub>1</sub>
          </displayName>
          <gidNumber>
            <eq>1</eq>
          </gidNumber>
          <givenName>
            <eq>1</eq>
            <sub>1</sub>
          </givenName>
          <mail>
            <eq>1</eq>
          </mail>
          <member>
            <eq>1</eq>
          </member>
          <memberUid>
            <eq>1</eq>
          </memberUid>
          <objectclass>
            <eq>1</eq>
          </objectclass>
          <sn>
            <eq>1</eq>
            <sub>1</sub>
          </sn>
          <uid>
            <eq>1</eq>
            <sub>1</sub>
          </uid>
          <uidNumber>
            <eq>1</eq>
          </uidNumber>
        </indexes>
        <rootdn>cn=Administrator,DC=corp,DC=Fabrikam,DC=COM,CN=Karen Berge</rootdn>
        <rootpw>{SSHA}LCdgE3gNejqBogGI3ac1Xf4DOIVMSk9ZQg==</rootpw>
        <suffix>DC=corp,DC=Fabrikam,DC=COM,CN=Karen Berge</suffix>
        <type>hdb</type>
      </listentry>
    </databases>
    <globals>
      <allow config:type="list"/>
      <disallow config:type="list"/>
      <loglevel config:type="list">
        <listentry>none</listentry>
      </loglevel>
      <tlsconfig>
        <caCertDir/>
        <caCertFile/>
        <certFile/>
        <certKeyFile/>
        <crlCheck>0</crlCheck>
        <crlFile/>
        <verifyClient>0</verifyClient>
      </tlsconfig>
    </globals>
    <schema config:type="list">
      <listentry>
        <definition>dn: cn=schema,cn=config
            objectClass: olcSchemaConfig
            ......
            .....
            ....
            ...
            ..
            .
        </definition>
        <name>schema</name>
      </listentry>
      <listentry>
        <includeldif>/etc/openldap/schema/core.ldif</includeldif>
      </listentry>
      <listentry>
        <includeldif>/etc/openldap/schema/cosine.ldif</includeldif>
      </listentry>
      <listentry>
        <includeldif>/etc/openldap/schema/inetorgperson.ldif</includeldif>
      </listentry>
      <listentry>
        <includeschema>/etc/openldap/schema/rfc2307bis.schema</includeschema>
      </listentry>
      <listentry>
        <includeschema>/etc/openldap/schema/yast.schema</includeschema>
      </listentry>
    </schema>
  </auth-server>4.16 Windows Domain Membership #
    Using the samba-client resource, you can configure a
    membership of a workgroup, NT domain, or Active Directory domain.
   
  <samba-client>
    <disable_dhcp_hostname config:type="boolean">true</disable_dhcp_hostname>
    <global>
      <security>domain</security>
      <usershare_allow_guests>No</usershare_allow_guests>
      <usershare_max_shares>100</usershare_max_shares>
      <workgroup>WORKGROUP</workgroup>
    </global>
    <winbind config:type="boolean">false</winbind>
  </samba-client>| Attribute | Values | Description | 
|---|---|---|
| 
          | Do not allow DHCP to change the host name. | Value: true/false | 
| 
          | Kind of authentication regime (domain technology or Active Directory server (ADS)). | Value: ADS/domain | 
| 
          | Sharing guest access is allowed. | Value: No/Yes | 
| 
          | 
         Max. number of shares from  | 0 means that shares are not enabled. | 
| 
          | Workgroup or domain name. | |
| 
          | Using winbind. | Value: true/false | 
4.17 Samba Server #
Configuration of a simple Samba server.
  <samba-server>
    <accounts config:type="list"/>
    <backend/>
    <config config:type="list">
      <listentry>
        <name>global</name>
        <parameters>
          <security>domain</security>
          <usershare_allow_guests>No</usershare_allow_guests>
          <usershare_max_shares>100</usershare_max_shares>
          <workgroup>WORKGROUP</workgroup>
        </parameters>
      </listentry>
    </config>
    <service>Disabled</service>
    <trustdom/>
    <version>2.11</version>
  </samba-server>| Attribute | Values | Description | 
|---|---|---|
| 
          | List of Samba accounts. | |
| 
          | List of available back-ends | Value: true/false | 
| 
          | 
         Setting additional user defined parameters in  | 
        The example shows parameters in the  | 
| 
          | Samba service starts during boot. | Value: Enabled/Disabled | 
| 
          | Trusted Domains. | 
         A map of two maps (keys:  | 
| 
          | Samba version. | Default: 2.11 | 
4.18 Authentication Client #
The configuration file must be in the JSON format. Use the module in YaST to generate a valid JSON configuration file. Install the autoyast2 package. Launch YaST and switch to the › . Choose › , press , and configure the available settings. Press when done. To save the generated configuration file, use the › .
     To use LDAP with native SSL (rather than TLS), add the
     ldaps resource.
    
4.19 NFS Client and Server #
Configuring a system as an NFS client or an NFS server is can be done using the configuration system. The following examples show how both NFS client and server can be configured.
    From SUSE Linux Enterprise Server 12 SP5 on, the structure of NFS client configuration has
    changed. Some global configuration options were introduced:
    enable_nfs4 to switch NFS4 support on/off and
    idmapd_domain to define domain name for rpc.idmapd
    (this only makes sense when NFS4 is enabled). Attention: the old
    structure is not compatible with the new one and the control files with
    an NFS section created on older releases will not work with newer
    products.
   
<nfs>
  <enable_nfs4 config:type="boolean">true</enable_nfs4>
  <idmapd_domain>suse.cz</idmapd_domain>
  <nfs_entries config:type="list">
    <nfs_entry>
      <mount_point>/home</mount_point>
      <nfs_options>sec=krb5i,intr,rw</nfs_options>
      <server_path>saurus.suse.cz:/home</server_path>
      <vfstype>nfs4</vfstype>
    </nfs_entry>
    <nfs_entry>
      <mount_point>/work</mount_point>
      <nfs_options>defaults</nfs_options>
      <server_path>bivoj.suse.cz:/work</server_path>
      <vfstype>nfs</vfstype>
    </nfs_entry>
    <nfs_entry>
      <mount_point>/mnt</mount_point>
      <nfs_options>defaults</nfs_options>
      <server_path>fallback.suse.cz:/srv/dist</server_path>
      <vfstype>nfs</vfstype>
    </nfs_entry>
  </nfs_entries>
</nfs><nfs_server>
  <nfs_exports config:type="list">
    <nfs_export>
      <allowed config:type="list">
        <allowed_clients>*(ro,root_squash,sync)</allowed_clients>
      </allowed>
      <mountpoint>/home</mountpoint>
    </nfs_export>
    <nfs_export>
      <allowed config:type="list">
        <allowed_clients>*(ro,root_squash,sync)</allowed_clients>
      </allowed>
      <mountpoint>/work</mountpoint>
    </nfs_export>
  </nfs_exports>
  <start_nfsserver config:type="boolean">true</start_nfsserver>
</nfs_server>4.20 NTP Client #
Select whether to start the NTP daemon when booting the system. The NTP daemon resolves host names when initializing.
    To run NTP daemon in chroot jail, set
    start_in_chroot. Starting any daemon in a chroot jail
    is more secure and strongly recommended. To adjust NTP servers, peers,
    local clocks, and NTP broadcasting, add the appropriate entry to the
    control file. An example of various configuration options is shown
    below.
   
<ntp-client>
  <configure_dhcp config:type="boolean">false</configure_dhcp>
  <peers config:type="list">
    <peer>
      <address>ntp.example.com</address>
      <options></options>
      <type>server</type>
    </peer>
  </peers>
  <start_at_boot config:type="boolean">true</start_at_boot>
  <start_in_chroot config:type="boolean">true</start_in_chroot>
</ntp-client>The following example illustrates an IPv6 configuration. You may use the server's IP address, host name, or both:
<peer> <address>2001:418:3ff::1:53</address> <comment/> <options/> <type>server</type> </peer> <peer> <address>2.pool.ntp.org</address> <comment/> <options/> <type>server</type> </peer>
4.21 Mail Configuration #
For the mail configuration of the client, this module lets you create a detailed mail configuration. The module contains various options. We recommended you use it at least for the initial configuration.
<mail>
  <aliases config:type="list">
    <alias>
      <alias>root</alias>
      <comment></comment>
      <destinations>foo</destinations>
    </alias>
    <alias>
      <alias>test</alias>
      <comment></comment>
      <destinations>foo</destinations>
    </alias>
  </aliases>
  <connection_type config:type="symbol">permanent</connection_type>
  <fetchmail config:type="list">
    <fetchmail_entry>
      <local_user>foo</local_user>
      <password>bar</password>
      <protocol>POP3</protocol>
      <remote_user>foo</remote_user>
      <server>pop.foo.com</server>
    </fetchmail_entry>
    <fetchmail_entry>
      <local_user>test</local_user>
      <password>bar</password>
      <protocol>IMAP</protocol>
      <remote_user>test</remote_user>
      <server>blah.com</server>
    </fetchmail_entry>
  </fetchmail>
  <from_header>test.com</from_header>
  <listen_remote config:type="boolean">true</listen_remote>
  <local_domains config:type="list">
    <domains>test1.com</domains>
  </local_domains>
  <masquerade_other_domains config:type="list">
      <domain>blah.com</domain>
  </masquerade_other_domains>
  <masquerade_users config:type="list">
    <masquerade_user>
      <address>joe@test.com</address>
      <comment></comment>
      <user>joeuser</user>
    </masquerade_user>
    <masquerade_user>
      <address>bar@test.com</address>
      <comment></comment>
      <user>foo</user>
    </masquerade_user>
  </masquerade_users>
  <mta config:type="symbol">postfix</mta>
  <outgoing_mail_server>test.com</outgoing_mail_server>
  <postfix_mda config:type="symbol">local</postfix_mda>
  <smtp_auth config:type="list">
    <listentry>
      <password>bar</password>
      <server>test.com</server>
      <user>foo</user>
    </listentry>
  </smtp_auth>
  <use_amavis config:type="boolean">true</use_amavis>
  <virtual_users config:type="list">
    <virtual_user>
      <alias>test.com</alias>
      <comment></comment>
      <destinations>foo.com</destinations>
    </virtual_user>
    <virtual_user>
      <alias>geek.com</alias>
      <comment></comment>
      <destinations>bar.com</destinations>
    </virtual_user>
  </virtual_users>
</mail>4.22 HTTP Server Configuration #
This section is used for configuration of an Apache HTTP server.
    For less experienced users, we would suggest to configure the Apache
    server using the HTTP server YaST module. After that,
    call the AutoYaST configuration module,
    select the HTTP server YaST module and clone the
    Apache settings. These settings can be exported via the menu
    File.
   
  <http-server>
    <Listen config:type="list">
      <listentry>
        <ADDRESS/>
        <PORT>80</PORT>
      </listentry>
    </Listen>
    <hosts config:type="list">
      <hosts_entry>
        <KEY>main</KEY>
        <VALUE config:type="list">
          <listentry>
            <KEY>DocumentRoot</KEY>
            <OVERHEAD>
            #
            # Global configuration that will be applicable for all
            # virtual hosts, unless deleted here or overriden elsewhere.
            #
            </OVERHEAD>
            <VALUE>"/srv/www/htdocs"</VALUE>
          </listentry>
          <listentry>
            <KEY>_SECTION</KEY>
            <OVERHEAD>
            #
            # Configure the DocumentRoot
            #
            </OVERHEAD>
            <SECTIONNAME>Directory</SECTIONNAME>
            <SECTIONPARAM>"/srv/www/htdocs"</SECTIONPARAM>
            <VALUE config:type="list">
              <listentry>
                <KEY>Options</KEY>
                <OVERHEAD>
                # Possible values for the Options directive are "None", "All",
                # or any combination of:
                #   Indexes Includes FollowSymLinks SymLinksifOwnerMatch
                #   ExecCGI MultiViews
                #
                # Note that "MultiViews" must be named *explicitly*
                # --- "Options All"
                # does not give it to you.
                #
                # The Options directive is both complicated and important.
                #  Please see
                #  http://httpd.apache.org/docs/2.4/mod/core.html#options
                # for more information.
                </OVERHEAD>
                <VALUE>None</VALUE>
              </listentry>
              <listentry>
                <KEY>AllowOverride</KEY>
                <OVERHEAD>
                # AllowOverride controls what directives may be placed in
                # .htaccess files. It can be "All", "None", or any combination
                # of the keywords:
                #   Options FileInfo AuthConfig Limit
                </OVERHEAD>
                <VALUE>None</VALUE>
              </listentry>
              <listentry>
                <KEY>_SECTION</KEY>
                <OVERHEAD>
                # Controls who can get stuff from this server.
                </OVERHEAD>
                <SECTIONNAME>IfModule</SECTIONNAME>
                <SECTIONPARAM>!mod_access_compat.c</SECTIONPARAM>
                <VALUE config:type="list">
                  <listentry>
                    <KEY>Require</KEY>
                    <VALUE>all granted</VALUE>
                  </listentry>
                </VALUE>
              </listentry>
              <listentry>
                <KEY>_SECTION</KEY>
                <SECTIONNAME>IfModule</SECTIONNAME>
                <SECTIONPARAM>mod_access_compat.c</SECTIONPARAM>
                <VALUE config:type="list">
                  <listentry>
                    <KEY>Order</KEY>
                    <VALUE>allow,deny</VALUE>
                  </listentry>
                  <listentry>
                    <KEY>Allow</KEY>
                    <VALUE>from all</VALUE>
                  </listentry>
                </VALUE>
              </listentry>
            </VALUE>
          </listentry>
          <listentry>
            <KEY>Alias</KEY>
            <OVERHEAD>
            # Aliases: aliases can be added as needed (with no limit).
            # The format is Alias fakename realname
            #
            # Note that if you include a trailing / on fakename then the
            # server will require it to be present in the URL.  So "/icons"
            # is not aliased in this example, only "/icons/".  If the fakename
            # is slash-terminated, then the realname must also be slash
            # terminated, and if the fakename omits the trailing slash, the
            # realname must also omit it.
            # We include the /icons/ alias for FancyIndexed directory listings.
            # If you do not use FancyIndexing, you may comment this out.
            #
            </OVERHEAD>
            <VALUE>/icons/ "/usr/share/apache2/icons/"</VALUE>
          </listentry>
          <listentry>
            <KEY>_SECTION</KEY>
            <OVERHEAD>
            </OVERHEAD>
            <SECTIONNAME>Directory</SECTIONNAME>
            <SECTIONPARAM>"/usr/share/apache2/icons"</SECTIONPARAM>
            <VALUE config:type="list">
              <listentry>
                <KEY>Options</KEY>
                <VALUE>Indexes MultiViews</VALUE>
              </listentry>
              <listentry>
                <KEY>AllowOverride</KEY>
                <VALUE>None</VALUE>
              </listentry>
              <listentry>
                <KEY>_SECTION</KEY>
                <SECTIONNAME>IfModule</SECTIONNAME>
                <SECTIONPARAM>!mod_access_compat.c</SECTIONPARAM>
                <VALUE config:type="list">
                  <listentry>
                    <KEY>Require</KEY>
                    <VALUE>all granted</VALUE>
                  </listentry>
                </VALUE>
              </listentry>
              <listentry>
                <KEY>_SECTION</KEY>
                <SECTIONNAME>IfModule</SECTIONNAME>
                <SECTIONPARAM>mod_access_compat.c</SECTIONPARAM>
                <VALUE config:type="list">
                  <listentry>
                    <KEY>Order</KEY>
                    <VALUE>allow,deny</VALUE>
                  </listentry>
                  <listentry>
                    <KEY>Allow</KEY>
                    <VALUE>from all</VALUE>
                  </listentry>
                </VALUE>
              </listentry>
            </VALUE>
          </listentry>
          <listentry>
            <KEY>ScriptAlias</KEY>
            <OVERHEAD>
            # ScriptAlias: This controls which directories contain server
            # scripts. ScriptAliases are essentially the same as Aliases,
            # except that documents in the realname directory are treated
            # as applications and run by the server when requested rather
            # than as documents sent to the client.
            # The same rules about trailing "/" apply to ScriptAlias
            # directives as to Alias.
            #
            </OVERHEAD>
            <VALUE>/cgi-bin/ "/srv/www/cgi-bin/"</VALUE>
          </listentry>
          <listentry>
            <KEY>_SECTION</KEY>
            <OVERHEAD>
            # "/srv/www/cgi-bin" should be changed to wherever your
            # ScriptAliased CGI directory exists, if you have that configured.
            #
            </OVERHEAD>
            <SECTIONNAME>Directory</SECTIONNAME>
            <SECTIONPARAM>"/srv/www/cgi-bin"</SECTIONPARAM>
            <VALUE config:type="list">
              <listentry>
                <KEY>AllowOverride</KEY>
                <VALUE>None</VALUE>
              </listentry>
              <listentry>
                <KEY>Options</KEY>
                <VALUE>+ExecCGI -Includes</VALUE>
              </listentry>
              <listentry>
                <KEY>_SECTION</KEY>
                <SECTIONNAME>IfModule</SECTIONNAME>
                <SECTIONPARAM>!mod_access_compat.c</SECTIONPARAM>
                <VALUE config:type="list">
                  <listentry>
                    <KEY>Require</KEY>
                    <VALUE>all granted</VALUE>
                  </listentry>
                </VALUE>
              </listentry>
              <listentry>
                <KEY>_SECTION</KEY>
                <SECTIONNAME>IfModule</SECTIONNAME>
                <SECTIONPARAM>mod_access_compat.c</SECTIONPARAM>
                <VALUE config:type="list">
                  <listentry>
                    <KEY>Order</KEY>
                    <VALUE>allow,deny</VALUE>
                  </listentry>
                  <listentry>
                    <KEY>Allow</KEY>
                    <VALUE>from all</VALUE>
                  </listentry>
                </VALUE>
              </listentry>
            </VALUE>
          </listentry>
          <listentry>
            <KEY>_SECTION</KEY>
            <OVERHEAD>
            # UserDir: The name of the directory that is appended onto a
            # user's home directory if a ~user request is received.
            # To disable it, simply remove userdir from the list of modules
            # in APACHE_MODULES in /etc/sysconfig/apache2.
            #
            </OVERHEAD>
            <SECTIONNAME>IfModule</SECTIONNAME>
            <SECTIONPARAM>mod_userdir.c</SECTIONPARAM>
            <VALUE config:type="list">
              <listentry>
                <KEY>UserDir</KEY>
                <OVERHEAD>
                # Note that the name of the user directory ("public_html")
                # cannot simply be changed here, since it is a compile time
                # setting. The apache package would have to be rebuilt.
                # You could work around by deleting /usr/sbin/suexec, but
                # then all scripts from the directories would be executed
                # with the UID of the webserver.
                </OVERHEAD>
                <VALUE>public_html</VALUE>
              </listentry>
              <listentry>
                <KEY>Include</KEY>
                <OVERHEAD>
                # The actual configuration of the directory is in
                # /etc/apache2/mod_userdir.conf.
                </OVERHEAD>
                <VALUE>/etc/apache2/mod_userdir.conf</VALUE>
              </listentry>
            </VALUE>
          </listentry>
          <listentry>
            <KEY>IncludeOptional</KEY>
            <OVERHEAD>
            # Include all *.conf files from /etc/apache2/conf.d/.
            #
            # This is mostly meant as a place for other RPM packages to drop
            # in their configuration snippet.
            #
            # 
            # You can comment this out here if you want those bits include
            # only in a certain virtual host, but not here.
            </OVERHEAD>
            <VALUE>/etc/apache2/conf.d/*.conf</VALUE>
          </listentry>
          <listentry>
            <KEY>IncludeOptional</KEY>
            <OVERHEAD>
            # The manual... if it is installed ('?' means it will not complain)
            </OVERHEAD>
            <VALUE>/etc/apache2/conf.d/apache2-manual?conf</VALUE>
          </listentry>
          <listentry>
            <KEY>ServerName</KEY>
            <VALUE>linux-wtyj</VALUE>
          </listentry>
          <listentry>
            <KEY>ServerAdmin</KEY>
            <OVERHEAD>
            </OVERHEAD>
            <VALUE>root@linux-wtyj</VALUE>
          </listentry>
          <listentry>
            <KEY>NameVirtualHost</KEY>
            <VALUE>192.168.43.2</VALUE>
          </listentry>
        </VALUE>
      </hosts_entry>
      <hosts_entry>
        <KEY>192.168.43.2/secondserver.suse.de</KEY>
        <VALUE config:type="list">
          <listentry>
            <KEY>DocumentRoot</KEY>
            <VALUE>/srv/www/htdocs</VALUE>
          </listentry>
          <listentry>
            <KEY>ServerName</KEY>
            <VALUE>secondserver.suse.de</VALUE>
          </listentry>
          <listentry>
            <KEY>ServerAdmin</KEY>
            <VALUE>second_server@suse.de</VALUE>
          </listentry>
          <listentry>
            <KEY>_SECTION</KEY>
            <SECTIONNAME>Directory</SECTIONNAME>
            <SECTIONPARAM>/srv/www/htdocs</SECTIONPARAM>
            <VALUE config:type="list">
              <listentry>
                <KEY>AllowOverride</KEY>
                <VALUE>None</VALUE>
              </listentry>
              <listentry>
                <KEY>Require</KEY>
                <VALUE>all granted</VALUE>
              </listentry>
            </VALUE>
          </listentry>
        </VALUE>
      </hosts_entry>
    </hosts>
    <modules config:type="list">
      <module_entry>
        <change>enable</change>
        <name>socache_shmcb</name>
        <userdefined config:type="boolean">true</userdefined>
      </module_entry>
      <module_entry>
        <change>enable</change>
        <name>reqtimeout</name>
        <userdefined config:type="boolean">true</userdefined>
      </module_entry>
      <module_entry>
        <change>enable</change>
        <name>authn_core</name>
        <userdefined config:type="boolean">true</userdefined>
      </module_entry>
      <module_entry>
        <change>enable</change>
        <name>authz_core</name>
        <userdefined config:type="boolean">true</userdefined>
      </module_entry>
    </modules>
    <service config:type="boolean">true</service>
    <version>2.9</version>
  </http-server>| List Name | List Elements | Description | 
|---|---|---|
| Listen | 
          List of host  | |
| PORT | port address | |
| ADDRESS | Network address. All addresses will be taken if this entry is empty. | |
| hosts | List of Hosts configuration | |
| KEY | 
          Host name;  | |
| VALUE | List of different values describing the host. | |
| modules | Module list. Only user defined modules need to be described. | |
| name | Module name | |
| userdefined | 
          For historical reasons, it is always set to  | |
| change | 
          For historical reasons, it is always set to  | 
| Element | Description | Comment | 
|---|---|---|
| version | Version of used Apache server | Only for information. Default 2.9 | 
| service | Enable Apache service | Optional. Default: false | 
To run an Apache server correctly, make sure the firewall is configured appropriately.
4.23 Squid Server #
Squid is a caching and forwarding Web proxy.
  <squid>
    <acls config:type="list">
      <listentry>
        <name>QUERY</name>
        <options config:type="list">
          <option>cgi-bin \?</option>
        </options>
        <type>urlpath_regex</type>
      </listentry>
      <listentry>
        <name>apache</name>
        <options config:type="list">
          <option>Server</option>
          <option>^Apache</option>
        </options>
        <type>rep_header</type>
      </listentry>
      <listentry>
        <name>all</name>
        <options config:type="list">
          <option>0.0.0.0/0.0.0.0</option>
        </options>
        <type>src</type>
      </listentry>
      <listentry>
        <name>manager</name>
        <options config:type="list">
          <option>cache_object</option>
        </options>
        <type>proto</type>
      </listentry>
      <listentry>
        <name>localhost</name>
        <options config:type="list">
          <option>127.0.0.1/255.255.255.255</option>
        </options>
        <type>src</type>
      </listentry>
      <listentry>
        <name>to_localhost</name>
        <options config:type="list">
          <option>127.0.0.0/8</option>
        </options>
        <type>dst</type>
      </listentry>
      <listentry>
        <name>SSL_ports</name>
        <options config:type="list">
          <option>443</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>Safe_ports</name>
        <options config:type="list">
          <option>80</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>Safe_ports</name>
        <options config:type="list">
          <option>21</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>Safe_ports</name>
        <options config:type="list">
          <option>443</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>Safe_ports</name>
        <options config:type="list">
          <option>70</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>Safe_ports</name>
        <options config:type="list">
          <option>210</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>Safe_ports</name>
        <options config:type="list">
          <option>1025-65535</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>Safe_ports</name>
        <options config:type="list">
          <option>280</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>Safe_ports</name>
        <options config:type="list">
          <option>488</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>Safe_ports</name>
        <options config:type="list">
          <option>591</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>Safe_ports</name>
        <options config:type="list">
          <option>777</option>
        </options>
        <type>port</type>
      </listentry>
      <listentry>
        <name>CONNECT</name>
        <options config:type="list">
          <option>CONNECT</option>
        </options>
        <type>method</type>
      </listentry>
    </acls>
    <http_accesses config:type="list">
      <listentry>
        <acl config:type="list">
          <listentry>manager</listentry>
          <listentry>localhost</listentry>
        </acl>
        <allow config:type="boolean">true</allow>
      </listentry>
      <listentry>
        <acl config:type="list">
          <listentry>manager</listentry>
        </acl>
        <allow config:type="boolean">false</allow>
      </listentry>
      <listentry>
        <acl config:type="list">
          <listentry>!Safe_ports</listentry>
        </acl>
        <allow config:type="boolean">false</allow>
      </listentry>
      <listentry>
        <acl config:type="list">
          <listentry>CONNECT</listentry>
          <listentry>!SSL_ports</listentry>
        </acl>
        <allow config:type="boolean">false</allow>
      </listentry>
      <listentry>
        <acl config:type="list">
          <listentry>localhost</listentry>
        </acl>
        <allow config:type="boolean">true</allow>
      </listentry>
      <listentry>
        <acl config:type="list">
          <listentry>all</listentry>
        </acl>
        <allow config:type="boolean">false</allow>
      </listentry>
    </http_accesses>
    <http_ports config:type="list">
      <listentry>
        <host/>
        <port>3128</port>
        <transparent config:type="boolean">false</transparent>
      </listentry>
    </http_ports>
    <refresh_patterns config:type="list">
      <listentry>
        <case_sensitive config:type="boolean">true</case_sensitive>
        <max>10080</max>
        <min>1440</min>
        <percent>20</percent>
        <regexp>^ftp:</regexp>
      </listentry>
      <listentry>
        <case_sensitive config:type="boolean">true</case_sensitive>
        <max>1440</max>
        <min>1440</min>
        <percent>0</percent>
        <regexp>^gopher:</regexp>
      </listentry>
      <listentry>
        <case_sensitive config:type="boolean">true</case_sensitive>
        <max>4320</max>
        <min>0</min>
        <percent>20</percent>
        <regexp>.</regexp>
      </listentry>
    </refresh_patterns>
    <service_enabled_on_startup config:type="boolean">true</service_enabled_on_startup>
    <settings>
      <access_log config:type="list">
        <listentry>/var/log/squid/access.log</listentry>
      </access_log>
      <cache_dir config:type="list">
        <listentry>ufs</listentry>
        <listentry>/var/cache/squid</listentry>
        <listentry>100</listentry>
        <listentry>16</listentry>
        <listentry>256</listentry>
      </cache_dir>
      <cache_log config:type="list">
        <listentry>/var/log/squid/cache.log</listentry>
      </cache_log>
      <cache_mem config:type="list">
        <listentry>8</listentry>
        <listentry>MB</listentry>
      </cache_mem>
      <cache_mgr config:type="list">
        <listentry>webmaster</listentry>
      </cache_mgr>
      <cache_replacement_policy config:type="list">
        <listentry>lru</listentry>
      </cache_replacement_policy>
      <cache_store_log config:type="list">
        <listentry>/var/log/squid/store.log</listentry>
      </cache_store_log>
      <cache_swap_high config:type="list">
        <listentry>95</listentry>
      </cache_swap_high>
      <cache_swap_low config:type="list">
        <listentry>90</listentry>
      </cache_swap_low>
      <client_lifetime config:type="list">
        <listentry>1</listentry>
        <listentry>days</listentry>
      </client_lifetime>
      <connect_timeout config:type="list">
        <listentry>2</listentry>
        <listentry>minutes</listentry>
      </connect_timeout>
      <emulate_httpd_log config:type="list">
        <listentry>off</listentry>
      </emulate_httpd_log>
      <error_directory config:type="list">
        <listentry/>
      </error_directory>
      <ftp_passive config:type="list">
        <listentry>on</listentry>
      </ftp_passive>
      <maximum_object_size config:type="list">
        <listentry>4096</listentry>
        <listentry>KB</listentry>
      </maximum_object_size>
      <memory_replacement_policy config:type="list">
        <listentry>lru</listentry>
      </memory_replacement_policy>
      <minimum_object_size config:type="list">
        <listentry>0</listentry>
        <listentry>KB</listentry>
      </minimum_object_size>
    </settings>
  </squid>| Attribute | Values | Description | 
|---|---|---|
| 
          | List of Access Control Settings (ACLs). | Each list entry contains the name, type, and additional options. Use the YaST Squid configuration module to get an overview of possible entries. | 
| 
          | In the Access Control table, access can be denied or allowed to ACL Groups. | If there are more ACL Groups in one definition, access will be allowed or denied to members who belong to all ACL Groups at the same time. The Access Control table is checked in the order listed here. The first matching entry is used. | 
| 
          | Define all ports where Squid will listen for clients' HTTP requests. | 
          
          | 
| 
          | Refresh patterns define how Squid treats the objects in the cache. | The refresh patterns are checked in the order listed here. The first matching entry is used. 
          | 
| 
          | Map of all available general parameters with default values. | Use the YaST Squid configuration module to get an overview about possible entries. | 
| 
          | Squid service start when booting. | Value: true/false | 
4.24 FTP Server #
Configure your FTP Internet server settings.
  <ftp-server>
    <AnonAuthen>2</AnonAuthen>
    <AnonCreatDirs>NO</AnonCreatDirs>
    <AnonMaxRate>0</AnonMaxRate>
    <AnonReadOnly>NO</AnonReadOnly>
    <AntiWarez>YES</AntiWarez>
    <Banner>Welcome message</Banner>
    <CertFile/>
    <ChrootEnable>NO</ChrootEnable>
    <EnableUpload>YES</EnableUpload>
    <FTPUser>ftp</FTPUser>
    <FtpDirAnon>/srv/ftp</FtpDirAnon>
    <FtpDirLocal/>
    <GuestUser/>
    <LocalMaxRate>0</LocalMaxRate>
    <MaxClientsNumber>10</MaxClientsNumber>
    <MaxClientsPerIP>3</MaxClientsPerIP>
    <MaxIdleTime>15</MaxIdleTime>
    <PasMaxPort>40500</PasMaxPort>
    <PasMinPort>40000</PasMinPort>
    <PassiveMode>YES</PassiveMode>
    <SSL>0</SSL>
    <SSLEnable>NO</SSLEnable>
    <SSLv2>NO</SSLv2>
    <SSLv3>NO</SSLv3>
    <StartDaemon>2</StartDaemon>
    <StartXinetd>YES</StartXinetd>
    <TLS>YES</TLS>
    <Umask/>
    <UmaskAnon/>
    <UmaskLocal/>
    <VerboseLogging>NO</VerboseLogging>
    <VirtualUser>NO</VirtualUser>
  </ftp-server>| Element | Description | Comment | 
|---|---|---|
| AnonAuthen | Enable/disable anonymous and local users. | Authenticated Users Only: 1; Anonymous Only: 0; Both: 2 | 
| AnonCreatDirs | Anonymous users can create directories. | Values: YES/NO | 
| AnonReadOnly | Anonymous users can upload. | Values: YES/NO | 
| AnonMaxRate | The maximum data transfer rate permitted for anonymous clients. | KB/s | 
| AntiWarez | Disallow downloading of files that were uploaded but not validated by a local admin. | Values: YES/NO | 
| Banner | Specify the name of a file containing the text to display when someone connects to the server. | |
| CertFile | DSA certificate to use for SSL-encrypted connections | This option specifies the location of the DSA certificate to use for SSL-encrypted connections. | 
| ChrootEnable | When enabled, local users will be (by default) placed in a chroot jail in their home directory after login. | Warning: This option has security implications. Values: YES/NO | 
| EnableUpload | If enabled, FTP users can upload. | 
          To allow anonymous users to upload, enable  | 
| FTPUser | Defining anonymous FTP user. | |
| FtpDirAnon | FTP directory for anonymous users. | Specify a directory which is used for FTP anonymous users. | 
| FtpDirLocal | FTP directory for authenticated users. | Specify a directory which is used for FTP authenticated users. | 
| LocalMaxRate | The maximum data transfer rate permitted for local authenticated users. | KB/s | 
| MaxClientsNumber | The maximum number of clients allowed to connect. | |
| MaxClientsPerIP | Max clients for one IP. | The maximum number of clients allowed to connect from the same source Internet address. | 
| MaxIdleTime | The maximum time (timeout) a remote client may wait between FTP commands. | Minutes | 
| PasMaxPort | Maximum value for a port range for passive connection replies. | 
           | 
| PasMinPort | Minimum value for a port range for passive connection replies. | 
           | 
| PassiveMode | Enable Passive Mode | Value: YES/NO | 
| SSL | Security Settings | Disable SSL/TLS: 0; Accept SSL and TLS: 1; Refuse Connections Without SSL/TLS: 2 | 
| SSLEnable | If enabled, SSL connections are allowed. | Value: YES/NO | 
| SSLv2 | If enabled, SSL version 2 connections are allowed. | Value: YES/NO | 
| SSLv3 | If enabled, SSL version 3 connections are allowed. | Value: YES/NO | 
| StartDaemon | FTP daemon is started. | Manually: 0; when booting: 1; via xinetd: 2 | 
| StartXinetd | Has to be set to YES if StartDaemon is 2. | Value: YES/NO | 
| TLS | If enabled, TLS connections are allowed. | Value: YES/NO | 
| Umask | File creation mask. (umask for files):(umask for directories). | 
          For example  | 
| UmaskAnon | The value to which the umask for file creation is set for anonymous users. | To specify octal values, remember the "0" prefix, otherwise the value will be treated as a base 10 integer. | 
| UmaskLocal | Umask for authenticated users. | To specify octal values, remember the "0" prefix, otherwise the value will be treated as a base 10 integer. | 
| VerboseLogging | When enabled, all FTP requests and responses are logged. | Value: YES/NO | 
| VirtualUser | By using virtual users, FTP accounts can be administrated without affecting system accounts. | Value: YES/NO | 
Proper Firewall setting will be required for the FTP server to run correctly.
4.25 TFTP Server #
Configure your TFTP Internet server settings.
Use this to enable a server for TFTP (trivial file transfer protocol). The server will be started using xinetd.
Note that TFTP and FTP are not the same.
  <tftp-server>
    <start_tftpd config:type="boolean">true</start_tftpd>
    <tftp_directory>/tftpboot</tftp_directory>
  </tftp-server>| Element | Description | Comment | 
|---|---|---|
| start_tftpd | Enabling TFTP server service. | Value: true/false | 
| tftp_directory | Boot Image Directory: Specify the directory where served files are located. | The usual value is /tftpboot. The directory will be created if it does not exist. The server uses this as its root directory (using the -s option). | 
4.26 Firstboot Workflow #
The YaST firstboot utility (YaST Initial System Configuration), which runs after the installation is completed, lets you configure the before creation of the install image. On the first boot after configuration, users are then guided through a series of steps that allow for easier configuration of their desktops. YaST firstboot does not run by default and needs to be configured to run.
      <firstboot>
        <firstboot_enabled config:type="boolean">true</firstboot_enabled>
      </firstboot>4.27 Security Settings #
Using the features of this module, you can to change the local security settings on the target system. The local security settings include the boot configuration, login settings, password settings, user addition settings, and file permissions.
    Configuring the security settings automatically is similar to the
    Custom Settings in the security module available in
    the running system. This allows you create a customized configuration.
   
See the reference for the meaning and the possible values of the settings in the following example.
<security> <console_shutdown>ignore</console_shutdown> <displaymanager_remote_access>no</displaymanager_remote_access> <fail_delay>3</fail_delay> <faillog_enab>yes</faillog_enab> <gid_max>60000</gid_max> <gid_min>101</gid_min> <gdm_shutdown>root</gdm_shutdown> <lastlog_enab>yes</lastlog_enab> <encryption>md5</encryption> <obscure_checks_enab>no</obscure_checks_enab> <pass_max_days>99999</pass_max_days> <pass_max_len>8</pass_max_len> <pass_min_days>1</pass_min_days> <pass_min_len>6</pass_min_len> <pass_warn_age>14</pass_warn_age> <passwd_use_cracklib>yes</passwd_use_cracklib> <permission_security>secure</permission_security> <run_updatedb_as>nobody</run_updatedb_as> <uid_max>60000</uid_max> <uid_min>500</uid_min> </security>
4.27.1 Password Settings Options #
     Change various password settings. These settings are mainly stored in
     the /etc/login.defs file.
    
     Use this resource to activate one of the encryption methods currently
     supported. If not set, DES is configured.
    
     DES, the Linux default method, works in all network
     environments, but it restricts you to passwords no longer than eight
     characters. MD5 allows longer passwords, thus
     provides more security, but some network protocols do not support this,
     and you may have problems with NIS. Blowfish is also
     supported.
    
Additionally, you can set up the system to check for password plausibility and length etc.
4.27.2 Boot Settings #
Use the security resource, to change various boot settings.
- How to interpret Ctrl–Alt–Del?
- When someone at the console has pressed the Ctrl–Alt–Del key combination, the system usually reboots. Sometimes it is desirable to ignore this event, for example, when the system serves as both workstation and server. 
- Shutdown behavior of GDM
- Configure a list of users allowed to shut down the machine from GDM. 
4.27.3 Login Settings #
     Change various login settings. These settings are mainly stored in the
     /etc/login.defs file.
    
4.27.4 New user settings (useradd settings) #
Set the minimum and maximum possible user and group ID
4.28 Linux Audit Framework (LAF) #
This module allows the configuration of the audit daemon and to add rules for the audit subsystem.
  <audit-laf>
    <auditd>
      <flush>INCREMENTAL</flush>
      <freq>20</freq>
      <log_file>/var/log/audit/audit.log</log_file>
      <log_format>RAW</log_format>
      <max_log_file>5</max_log_file>
      <max_log_file_action>ROTATE</max_log_file_action>
      <name_format>NONE</name_format>
      <num_logs>4</num_logs>
    </auditd>
    <rules/>
  </audit-laf>| Attribute | Values | Description | 
|---|---|---|
| 
          | Describes how to write the data to disk. | 
         If set to  | 
| 
          | This parameter tells how many records to write before issuing an explicit flush to disk. | 
         The parameter  | 
| 
          | The full path name to the log file. | |
| 
          | How much information needs to be logged. | 
         Set  | 
| 
          | How much information needs to be logged. | Unit: Megabytes | 
| 
          | Number of log files. | 
          | 
| 
          | What happens if the log capacity has been reached. | 
         If the action is set to  | 
| 
          | Computer Name Format describes how to write the computer name to the log file. | 
         If  | 
| 
          | Rules for auditctl | 
         You can edit the rules manually, which we only recommend for
         advanced users.  For more information about all options, see
          | 
4.29 Users and Groups #
AutoYaST supports defining local users, groups, special login settings and even default options for new users. Those settings are defined in the following sections:
- users
- List of users 
- user_defaults
- Default options for new users 
- groups
- List of groups 
- login_settings
- Special login settings like password-less login or autologin 
Users and groups are set up during the first stage, so you can set up a usable system without running the second stage.
4.29.1 Users #
     A list of users can be defined in the <users>
     section.  Take into account that at least the root users should be
     set up so you can log in after the installation is finished.
    
<users config:type="list">
  <user>
    <username>root</username>
    <user_password>password</user_password>
    <encrypted config:type="boolean">false</encrypted>
  </user>
    <user>
    <username>tux</username>
    <user_password>password</user_password>
    <encrypted config:type="boolean">false</encrypted>
  </user>
</users>
     The following example shows a more complex scenario. System-wide default
     settings from /etc/default/useradd, such as the
     shell or the parent directory for the home directory, are applied.
    
<users config:type="list">
  <user>
    <username>root</username>
    <user_password>password</user_password>
    <uid>1001</uid>
    <gid>100</gid>
    <encrypted config:type="boolean">false</encrypted>
    <fullname>Root User</fullname>
    <authorized_keys config:type="list">
      <listentry>command="/opt/login.sh" ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKLt1vnW2vTJpBp3VK91rFsBvpY97NljsVLdgUrlPbZ/L51FerQQ+djQ/ivDASQjO+567nMGqfYGFA/De1EGMMEoeShza67qjNi14L1HBGgVojaNajMR/NI2d1kDyvsgRy7D7FT5UGGUNT0dlcSD3b85zwgHeYLidgcGIoKeRi7HpVDOOTyhwUv4sq3ubrPCWARgPeOLdVFa9clC8PTZdxSeKp4jpNjIHEyREPin2Un1luCIPWrOYyym7aRJEPopCEqBA9HvfwpbuwBI5F0uIWZgSQLfpwW86599fBo/PvMDa96DpxH1VlzJlAIHQsMkMHbsCazPNC0++Kp5ZVERiH root@example.net</listentry>
    </authorized_keys>
  </user>
  <user>
    <username>tux</username>
    <user_password>password</user_password>
    <uid>1002</uid>
    <gid>100</gid>
    <encrypted config:type="boolean">false</encrypted>
    <fullname>Plain User</fullname>
    <home>/Users/plain</home>
    <password_settings>
      <max>120</max>
      <inact>5</inact>
    </password_settings>
  </user>
</users>authorized_keys File Will Be Overwritten
      If the profile defines a set of SSH authorized keys for a user in the
      authorized_keys section, an existing
      $HOME/.ssh/authorized_keys file will be overwritten.
      If not existing, the file will be created with the content specified.
      Avoid overwriting an existing authorized_keys by not specifying the
      respective section in the AutoYaST control file.
     
uid)
      Each user on a Linux system has a numeric user ID. You can either
      specify such a user ID within the AutoYaST control file manually by using
      uid, or let the system automatically choose a
      user ID by not using uid.
     
      User IDs should be unique throughout the system. If not, some
      applications such as the login manager gdm may no longer work as expected.
     
When adding users with the AutoYaST control file, it is strongly recommended not to mix user defined IDs and automatically provided IDs. When doing so, unique IDs cannot be guaranteed. Either specify IDs for all users added with the AutoYaST control file or let the system choose the ID for all users.
root
      While it is technically possible to create an account with the user ID
      (uid) 0 and a name other than root, certain
      applications, scripts or third-party products may rely on the existence of a user called
      root. While such a configuration always targets individual environments, necessary
      adjustments could be overwritten by vendor updates, so this becomes an ongoing task, not
      a one-time setting. This is especially true in very complex setups involving third-party applications,
      where it needs to be verified with every involved vendor whether a rename of the root account
      is supported.
     
      As the implications for renaming the root account cannot be foreseen, SUSE does not
      support renaming the root account.
     
      Usually, the idea behind renaming the root account is to hide it or make it unpredictable.
      However, /etc/passwd requires 644 permissions for
      regular users, so any user of the system can retrieve the login name for the user ID 0.
      For better ways to secure the root account, refer to
      Section 2.30, “Restricting root Logins” and
      Section 2.30.3, “Restricting SSH Logins”.
     
| Attribute | Values | Description | 
|---|---|---|
| 
           | Text <username>lukesw</username> | 
          Required. It should be a valid user name. Check  | 
| 
           | Text <fullname>Tux Torvalds</fullname> | Optional. User's full name. | 
| 
           | Text <forname>Tux</forename> | Optional. User's forename. | 
| 
           | Text <surname>Skywalker</surname> | Optional. User's surname. | 
| 
           | Number <uid>1001</uid> | 
          Optional. User ID. It should be a unique and must be a non-negative
          number. If not specified, AutoYaST will automatically choose a user
          ID. Also refer to Note: Specifying a user ID ( | 
| 
           | Number <gid>100</gid> | Optional. Initial group ID. It must be a unique and non-negative number. Moreover it must refer to an existing group. | 
| 
           | Path <home>/home/luke</home> | 
          Optional. Absolute path to the user's home directory. By default,
           | 
| 
           | Path <shell>/usr/bin/zsh</shell> | 
          Optional.  | 
| 
           | Text <user_password>some-password</user_password> | 
      Optional. A user's password can be written in
      plain text (not recommended) or in encrypted form. To create an encrypted
      password, use  | 
| 
           | Boolean <encrypted config:type="boolean">true</encrypted> | 
          Optional. Considered  | 
| 
           | Password settings <password_settings> <expire/> <max>60</max> <warn>7</warn> </password_settings> | 
          Optional. Some password settings can be customized:
           | 
| 
           | List of authorized keys <authorized_keys config:type="list"> <listentry>ssh-rsa ...</listentry> </authorized_keys> | 
          A list of authorized keys to be written to  | 
4.29.2 User Defaults #
     The profile can specify a set of default values for new users like
     password expiration, initial group, home directory prefix, etc. Besides using them
     as default values for the users that are defined in the profile, AutoYaST will
     write those settings to /etc/default/useradd to be read for
     useradd.
    
| Attribute | Values | Description | 
|---|---|---|
| 
           | Text <group>100</group> | Optional. Default initial login group. | 
| 
           | Text <groups>users</groups> | Optional. List of additional groups. | 
| 
           | Path <home>/home</home> | Optional. User's home directory prefix. | 
| 
           | Date <expire>2017-12-31</expire> | 
          Optional. Default password expiration date in  | 
| 
           | Number <inactive>3</inactive> | Optional. Number of days after which an expired account is disabled. | 
| 
           | Boolean <no_groups config:type="boolean">true</no_groups> | Optional. Do not use secondary groups. | 
| 
           | Path <shell>/usr/bin/fish</shell> | 
          Default login shell.  | 
| 
           | Path <skel>/etc/skel</skel> | 
          Optional. Location of the files to be used as skeleton directory when adding a new
          user. You can find more information in  | 
| 
           | File creation mode mask <umask>022</umask> | 
          Set the file creation mode mask for the home directory. By default
           | 
4.29.3 Groups #
     A list of groups can be defined in <groups>
     as shown in the example.
    
<groups config:type="list">
  <group>
    <gid>100</gid>
    <groupname>users</groupname>
    <userlist>bob,alice</userlist>
  </group>
</groups>| Attribute | Values | Description | 
|---|---|---|
| 
           | Text <groupname>users</groupname> | 
          Required. It should be a valid group name. Check  | 
| 
           | Number <gid>100</gid> | Optional. Group ID. It must be a unique and non-negative number. | 
| 
           | Text <group_password>password</group_password> | 
          Optional. The group's password can be written in plain text (not
          recommended) or in encrypted form. Check the  | 
| 
           | Boolean <encrypted config:type="boolean">true</encrypted> | Optional. Indicates if the group's password in the profile is encrypted or not. | 
| 
           | Users list <userlist>bob,alice</userlist> | Optional. A list of users who belong to the group. User names must be separated by commas. | 
4.29.4 Login Settings #
Two special login settings can be enabled through an AutoYaST profile: autologin and password-less login. Both of them are disabled by default.
<login_settings> <autologin_user>vagrant</autologin_user> <password_less_login config:type="boolean">true</password_less_login> </login_settings>
| Attribute | Values | Description | 
|---|---|---|
| 
           | Boolean <password_less_login config:type="boolean">true</password_less_login> | Optional. Enables password-less login. It only affects graphical login. | 
| 
           | Text <autologin_user>alice</autologin_user> | Optional. Enables autologin for the given user. | 
4.30 Custom User Scripts #
By adding scripts to the auto-installation process you can customize the installation according to your needs and take control in different stages of the installation.
In the auto-installation process, five types of scripts can be executed at different points in time during the installation:
    Except for init scripts, all scripts must be included in
    the <scripts> section.
   
- pre-scripts(very early, before anything else really happens)
- postpartitioning-scripts(after partitioning and mounting to- /mntbut before RPM installation)
- chroot-scripts(after the package installation, before the first boot)
- post-scripts(during the first boot of the installed system, no services running)
- Init scripts(when the installed system is first booted, when all services are running) are not executed by YaST and therefore have a special Status. See Section 4.30.5, “Init Scripts” for further information.
4.30.1 Pre-Install Scripts #
Executed before YaST does any real change to the system (before partitioning and package installation but after the hardware detection).
     You can use a pre-script to modify your control file and let AutoYaST
     reread it. Find your control file in
     /tmp/profile/autoinst.xml. Adjust the file and
     store the modified version in
     /tmp/profile/modified.xml. AutoYaST will read the
     modified file after the pre-script finishes.
    
It is also possible to change the partitioning in your pre-script.
      Pre-scripts are executed at an early stage of the installation. This
      means if you have requested to confirm the installation, the
      pre-scripts will be executed before the confirmation screen shows up
      (profile/install/general/mode/confirm).
     
To call zypper in the pre-install script you will need to set the environment variable ZYPP_LOCKFILE_ROOT="/var/run/autoyast" to prevent conflicts with the running YaST process.
Pre-Install Script elements must be placed as follows:
<scripts>
  <pre-scripts config:type="list">
    <script>
      ...
    </script>
  </pre-scripts>
</scripts>4.30.2 Post-partitioning Scripts #
     Executed after YaST has done the partitioning and written the
     fstab. The empty system is already mounted to
     /mnt.
    
Post-partitioning script elements must be placed as follows:
<scripts>
  <postpartitioning-scripts config:type="list">
    <script>
      ...
    </script>
  </postpartitioning-scripts>
</scripts>4.30.3 Chroot Environment Scripts #
     Chroot scripts are executed before the machine reboots for the first
     time. You can execute chroot scripts before the installation chroots
     into the installed system and configures the boot loader or you can
     execute a script after the chroot into the installed system has
     happened (look at the chrooted parameter for that).
    
Chroot Environment script elements must be placed as follows:
<scripts>
  <chroot-scripts config:type="list">
    <script>
      ...
    </script>
  </chroot-scripts>
</scripts>4.30.4 Post-Install Scripts #
These scripts are executed after AutoYaST has completed the system configuration and after it has booted the system for the first time.
Post-install script elements must be placed as follows:
<scripts>
    <post-scripts config:type="list">
      <script>
        ...
      </script>
    </post-scripts>
  </scripts>4.30.5 Init Scripts #
     These scripts are executed when YaST has finished, during the
     initial boot process after the network has been initialized. These
     final scripts are executed using
     /usr/lib/YaST2/bin/autoyast-initscripts.sh and are
     executed only once. Init scripts are configured using the tag
     init-scripts.
    
The following elements must be between the <scripts><init-scripts config:type="list"><script> ... </script></init-scripts>...</scripts> tags
| Element | Description | Comment | 
|---|---|---|
| 
           | Define a location from where the script gets fetched. Locations can be the same as for the profile (HTTP, FTP, NFS, etc.). <location >http://10.10.0.1/myInitScript.sh</location> | Either <location> or <source> must be defined. | 
| 
           | The script itself (source code), encapsulated in a CDATA tag. If you do not want to put the whole shell script into the XML profile, use the location parameter. <source> <![CDATA[ echo "Testing the init script" > /tmp/init_out.txt ]]> </source> | Either <location> or <source> must be defined. | 
| 
           | 
          The file name of the script. It will be stored in a temporary
          directory under  <filename>mynitScript5.sh</filename> | 
          Optional in case you only have a single init script. The default
          name ( | 
| 
           | 
          A script is only run once. Even if you use ayast_setup to run an
          XML file multiple times, the script is only run once. Change this
          default behavior by setting this boolean to
           <rerun config:type="boolean">true</rerun> | 
          Optional. Default is  | 
When added to the control file manually, scripts need to be included in a CDATA element to avoid confusion with the file syntax and other tags defined in the control file.
4.30.6 Script XML Representation #
Most of the XML elements described below can be used for all the script types described above, except for init scripts, whose definitions can contain only a subset of these elements. See Section 4.30.5, “Init Scripts” for further information about them.
| Element | Description | Comment | 
|---|---|---|
| 
           | Define a location from where the script gets fetched. Locations can be the same as for the control file (HTTP, FTP, NFS, etc.). <location >http://10.10.0.1/myPreScript.sh</location> | 
          Either  | 
| 
           | The script itself (source code), encapsulated in a CDATA tag. If you do not want to put the whole shell script into the XML control file, refer to the location parameter. <source> <![CDATA[ echo "Testing the pre script" > /tmp/pre-script_out.txt ]]> </source> | 
          Either  | 
| 
           | Specify the interpreter that must be used for the script. Supported options are shell and perl. <interpreter>perl</interpreter> | 
          Optional (default is  | 
| 
           | 
          The file name of the script. It will be stored in a temporary
          directory under  <filename>myPreScript5.sh</filename> | Optional. Default is the type of the script (pre-scripts in this case). If you have more than one script, you should define different names for each script. | 
| 
           | 
          If this boolean is  <feedback config:type="boolean">true</feedback> | 
          Optional, default is  | 
| 
           | 
          This can be  <feedback_type>warning</feedback_type> | Optional, if missing, an always blocking pop-up is used. | 
| 
           | 
          If this is  <debug config:type="boolean">true</debug> | 
          Optional, default is  | 
| 
           | This text will be shown in a pop-up for the time the script is running in the background. <notification>Please wait while script is running...</notification> | Optional, if not configured, no notification pop-up will be shown. | 
| 
           | 
          It is possible to specify parameters given to the script being
          called. You may have more than one  <param-list config:type="list"> <param>par1</param> <param>par2 par3</param> <param>"par4.1 par4.2"</param> </param-list> | Optional, if not configured, no parameters get passed to script. | 
| 
           | 
          A script is only run once. Even if you use
           <rerun config:type="boolean">true</rerun> | 
          Optional, default is  | 
| 
           | 
          If set to  <chrooted config:type="boolean" >true</chrooted> | 
          Optional, default is  | 
4.30.7 Script Example #
<?xml version="1.0"?>
<!DOCTYPE profile>
<profile xmlns="http://www.suse.com/1.0/yast2ns" xmlns:config="http://www.suse.com/1.0/configns">
<scripts>
  <chroot-scripts config:type="list">
    <script>
      <chrooted config:type="boolean">true</chrooted>
      <filename>chroot.sh</filename>
      <interpreter>shell</interpreter>
      <source><![CDATA[
#!/bin/sh
echo "Testing chroot (chrooted) scripts"
ls
]]>
      </source>
    </script>
    <script>
      <filename>chroot.sh</filename>
        <interpreter>shell</interpreter>
        <source><![CDATA[
#!/bin/sh
echo "Testing chroot scripts"
df
cd /mnt
ls
]]>
        </source>
      </script>
    </chroot-scripts>
    <post-scripts config:type="list">
      <script>
        <filename>post.sh</filename>
        <interpreter>shell</interpreter>
        <source><![CDATA[
#!/bin/sh
echo "Running Post-install script"
systemctl start portmap
mount -a 192.168.1.1:/local /mnt
cp /mnt/test.sh /tmp
umount /mnt
]]>
        </source>
      </script>
      <script>
        <filename>post.pl</filename>
        <interpreter>perl</interpreter>
        <source><![CDATA[
#!/usr/bin/perl
print "Running Post-install script";
]]>
        </source>
      </script>
    </post-scripts>
    <pre-scripts config:type="list">
      <script>
        <interpreter>shell</interpreter>
        <location>http://192.168.1.1/profiles/scripts/prescripts.sh</location>
      </script>
      <script>
        <filename>pre.sh</filename>
        <interpreter>shell</interpreter>
        <source><![CDATA[
#!/bin/sh
echo "Running pre-install script"
]]>
        </source>
      </script>
    </pre-scripts>
    <postpartitioning-scripts config:type="list">
      <script>
        <filename>postpart.sh</filename>
        <interpreter>shell</interpreter>
        <debug config:type="boolean">false</debug>
        <feedback config:type="boolean">true</feedback>
        <source><![CDATA[
touch /mnt/testfile
echo Hi
]]>
        </source>
      </script>
    </postpartitioning-scripts>
  </scripts>
</profile>
     After installation is finished, the scripts and the output logs can be
     found in the directory /var/adm/autoinstall. The
     scripts are located in the subdirectory scripts
     and the output logs in the log directory.
    
The log consists of the output produced when executing the shell scripts using the following command:
/bin/sh -x SCRIPT_NAME 2&>/var/adm/autoinstall/logs/SCRIPT_NAME.log
4.31 System Variables (Sysconfig) #
    Using the sysconfig resource, it is possible to define configuration
    variables in the sysconfig repository
    (/etc/sysconfig) directly. Sysconfig variables,
    offer the possibility to fine-tune many system components and
    environment variables exactly to your needs.
   
The following example shows how a variable can be set using the sysconfig resource.
<sysconfig config:type="list" >
  <sysconfig_entry>
    <sysconfig_key>XNTPD_INITIAL_NTPDATE</sysconfig_key>
    <sysconfig_path>/etc/sysconfig/xntp</sysconfig_path>
    <sysconfig_value>ntp.host.com</sysconfig_value>
  </sysconfig_entry>
  <sysconfig_entry>
    <sysconfig_key>HTTP_PROXY</sysconfig_key>
    <sysconfig_path>/etc/sysconfig/proxy</sysconfig_path>
    <sysconfig_value>proxy.host.com:3128</sysconfig_value>
  </sysconfig_entry>
  <sysconfig_entry>
    <sysconfig_key>FTP_PROXY</sysconfig_key>
    <sysconfig_path>/etc/sysconfig/proxy</sysconfig_path>
    <sysconfig_value>proxy.host.com:3128</sysconfig_value>
  </sysconfig_entry>
</sysconfig>
     Both relative and absolute paths can be provided. If no absolute path
     is given, it is treated as a sysconfig file under the
     /etc/sysconfig directory.
    
4.32 Adding Complete Configurations #
    For many applications and services you may have a
    configuration file which should be copied to the appropriate location on
    the installed system. For example, if you are installing a Web server, you may have a server configuration file
    (httpd.conf).
   
Using this resource, you can embed the file into the control file by specifying the final path on the installed system. YaST will copy this file to the specified location.
This feature requires the autoyast2 package to be installed. If the package is missing, AutoYaST will automatically install the package if it is missing.
    You can specify the file_location where the file
    should be retrieved from. This can also be a location on the network
    such as an HTTP server:
    <file_location>http://my.server.site/issue</file_location>.
   
    You can create directories by specifying a file_path
    that ends with a slash.
   
<files config:type="list">
  <file>
    <file_path>/etc/apache2/httpd.conf</file_path>
    <file_contents>
<![CDATA[
some content
]]>
    </file_contents>
  </file>
  <file>
    <file_path>/mydir/a/b/c/</file_path> <!-- create directory -->
  </file>
</files>
    A more advanced example is shown below. This configuration will create a
    file using the content supplied in file_contents and
    change the permissions and ownership of the file. After the file has
    been copied to the system, a script is executed. This can be used to
    modify the file and prepare it for the client's environment.
   
<files config:type="list">
  <file>
    <file_path>/etc/someconf.conf</file_path>
    <file_contents>
<![CDATA[
some content
]]>
    </file_contents>
    <file_owner>tux.users</file_owner>
    <file_permissions>444</file_permissions>
    <file_script>
      <interpreter>shell</interpreter>
      <source>
<![CDATA[
#!/bin/sh
echo "Testing file scripts" >> /etc/someconf.conf
df
cd /mnt
ls
]]>
      </source>
    </file_script>
  </file>
</files>4.33 Ask the User for Values during Installation #
    You have the option to let the user decide the values of specific parts
    of the control file during the installation. If you use this feature, a
    pop-up will ask the user to enter a specific part of the control file
    during installation. If you want a full auto installation, but the user
    should set the password of the local account, you can do this via the
    ask directive in the control file.
   
The elements listed below must be placed within the following XML structure:
<general>
  <ask-list config:type="list">
    <ask>
      ...
    </ask>
  </ask-list>
</general>| Element | Description | Comment | 
|---|---|---|
| 
          | The question you want to ask the user. <question>Enter the LDAP server</question> | The default value is the path to the element (the path often looks strange, so we recommend entering a question). | 
| 
          | Set a preselection for the user. A text entry will be filled out with this value. A check box will be true or false and a selection will have the given value preselected. <default>dc=suse,dc=de</default> | Optional. | 
| 
          | An optional help text that is shown on the left side of the question. <help>Enter the LDAP server address.</help> | Optional. | 
| 
          | An optional title that is shown above the questions. <title>LDAP server</title> | Optional. | 
| 
          | 
         The type of the element you want to change. Possible values are
          <type>symbol</type> | 
         Optional. The default is  | 
| 
          | 
         If this boolean is set to  <password config:type="boolean">true</password> | 
         Optional. The default is  | 
| 
          | 
         A list of  <pathlist config:type="list"> <path>networking,dns,hostname</path> <path>...</path> </pathlist> To change the
         password of the first user in the control file, you need to set the
         path to  <users config:type="list">
  <user>
    <username>root</username>
    <user_password>password to change</user_password>
    <encrypted config:type="boolean">false</encrypted>
  </user>
  <user>
    <username>tux</username>
    <user_password>password to change</user_password>
    <encrypted config:type="boolean">false</encrypted>
  </user>
</users> | 
         This information is optional but you should at least provide
          | 
| 
          | 
         You can store the answer to a question in a file, to use it in one
         of your scripts later. If you ask during
          <file>/tmp/answer_hostname</file> | 
         This information is optional, but you should at least provide
          | 
| stage | 
         Stage configures the installation stage in which the question pops
         up. You can set this value to  <stage>cont</stage> | 
         Optional. The default is  | 
| 
          | 
         The selection element contains a list of  <selection config:type="list">
  <entry>
    <value>
        btrfs
    </value>
    <label>
        Btrfs File System
    </label>
  </entry>
  <entry>
    <value>
        ext3
    </value>
    <label>
        Extended3 File System
    </label>
  </entry>
</selection> | 
         Optional for  | 
| 
          | You can ask more than one question per dialog. To do so, specify the dialog-id with an integer. All questions with the same dialog-id belong to the same dialog. The dialogs are sorted by the id too. <dialog config:type="integer">3</dialog> | Optional. | 
| 
          | you can have more than one question per dialog. To make that possible you need to specify the element-id with an integer. The questions in a dialog are sorted by id. <element config:type="integer">1</element> | Optional (see dialog). | 
| 
          | You can increase the default width of dialog. If there are multiple width specifications per dialog, the largest one is used. The number is roughly equivalent to the number of characters. <width config:type="integer">50</width> | Optional. | 
| 
          | You can increase default height of dialog. If there are multiple height specifications per dialog, largest one is used. The number is roughly equivalent to number of lines. <height config:type="integer">15</height> | Optional. | 
| 
          | You can have more than one question per dialog. Each question on a dialog has a frame that can have a frame title, a small caption for each question. You can put multiple elements into one frame. They need to have the same frame title. <frametitle>User data</frametitle> | Optional. Default is no frame title. | 
| 
          | You can run scripts after a question has been answered (see the table below for detailed instructions about scripts). <script>...</script> | Optional (default is no script). | 
| 
          | You can change the label on the button. The last element that specifies the label for a dialog wins. <ok_label>Finish</ok_label> | Optional. | 
| 
          | You can change the label on the button. The last element that specifies the label for a dialog wins. <back_label>change values</back_label> | Optional. | 
| 
          | You can specify an integer here that is used as timeout in seconds. If the user does not answer the question before the timeout, the default value is taken as answer. When the user touches or changes any widget in the dialog, the timeout is turned off and the dialog needs to be confirmed via . <timeout config:type="integer">30</timeout> | 
         Optional. A missing value is interpreted as  | 
| 
          | 
         You can run scripts to set the default value for a question (see
         Section 4.33.1, “Default Value Scripts” for detailed
         instructions about default value scripts). This feature is useful
         if you can  <default_value_script>...</default_value_script> | Optional. Default is no script. | 
4.33.1 Default Value Scripts #
     You can run scripts to set the default value for a question. This
     feature is useful if you can calculate a default
     value, especially in combination with the timeout
     option.
    
The elements listed below must be placed within the following XML structure:
<general>
  <ask-list config:type="list">
    <ask>
      <default_value_script>
        ...
      </default_value_script>
    </ask>
  </ask-list>
</general>| Element | Description | Comment | 
|---|---|---|
| 
           | 
          The source code of the script. Whatever you
           <source>...</source> | This value is required, otherwise nothing would be executed. | 
| 
           | The interpreter to use. <interpreter>perl</interpreter> | 
          The default value is  | 
4.33.2 Scripts #
You can run scripts after a question has been answered.
The elements listed below must be placed within the following XML structure:
<general>
  <ask-list config:type="list">
    <ask>
      <script>
        ...
      </script>
    </ask>
  </ask-list>
</general>| Element | Description | Comment | 
|---|---|---|
| 
           | The file name of the script. <filename>my_ask_script.sh</filename> | The default is ask_script.sh | 
| 
           | 
          The source code of the script. Together with
           <source>...</source> | This value is required, otherwise nothing would be executed. | 
| 
           | 
          A boolean that passes the value of the answer to the question as
          an environment variable to the script. The variable is named
           <environment config:type="boolean">true</environment> | 
          Optional. Default is  | 
| 
           | A boolean that turns on feedback for the script execution. STDOUT will be displayed in a pop-up window that must be confirmed after the script execution. <feedback config:type="boolean">true</feedback> | 
          Optional, default is  | 
| 
           | A boolean that turns on debugging for the script execution. <debug config:type="boolean">true</debug> | 
          Optional, default is  | 
| 
           | 
          A boolean that keeps the dialog open until the script has an exit
          code of 0 (zero). So you can parse and check the answers the user
          gave in the script and display an error with the
           <rerun_on_error config:type="boolean">true</rerun_on_error> | 
          Optional, default is  | 
     Below you can see an example of the usage of the ask
     feature.
    
<general>
  <ask-list config:type="list">
    <ask>
      <pathlist config:type="list">
        <path>ldap,ldap_server</path>
      </pathlist>
      <stage>cont</stage>
      <help>Choose your server depending on your department</help>
      <selection config:type="list">
        <entry>
          <value>ldap1.mydom.de</value>
          <label>LDAP for development</label>
        </entry>
        <entry>
          <value>ldap2.mydom.de</value>
          <label>LDAP for sales</label>
        </entry>
      </selection>
      <default>ldap2.mydom.de</default>
      <default_value_script>
        <source> <![CDATA[
echo -n "ldap1.mydom.de"
]]>
        </source>
      </default_value_script>
    </ask>
    <ask>
      <pathlist config:type="list">
        <path>networking,dns,hostname</path>
      </pathlist>
      <question>Enter Hostname</question>
      <stage>initial</stage>
      <default>enter your hostname here</default>
    </ask>
    <ask>
      <pathlist config:type="list">
        <path>partitioning,0,partitions,0,filesystem</path>
      </pathlist>
      <question>File System</question>
      <type>symbol</type>
      <selection config:type="list">
        <entry>
          <value config:type="symbol">reiser</value>
          <label>default File System (recommended)</label>
        </entry>
        <entry>
          <value config:type="symbol">ext3</value>
          <label>Fallback File System</label>
        </entry>
      </selection>
    </ask>
  </ask-list>
</general>
     The following example shows a to choose between AutoYaST control files.
     AutoYaST will read the modified.xml file again
     after the ask-dialogs are done. This way you can fetch a complete new
     control file.
    
<general>
  <ask-list config:type="list">
    <ask>
      <selection config:type="list">
        <entry>
          <value>part1.xml</value>
          <label>Simple partitioning</label>
        </entry>
        <entry>
          <value>part2.xml</value>
          <label>encrypted /tmp</label>
        </entry>
        <entry>
          <value>part3.xml</value>
          <label>LVM</label>
        </entry>
      </selection>
      <title>XML Profile</title>
      <question>Choose a profile</question>
      <stage>initial</stage>
      <default>part1.xml</default>
      <script>
        <filename>fetch.sh</filename>
        <environment config:type="boolean">true</environment>
        <source>
<![CDATA[
wget http://10.10.0.162/$VAL -O /tmp/profile/modified.xml 2>/dev/null
]]>
        </source>
        <debug config:type="boolean">false</debug>
        <feedback config:type="boolean">false</feedback>
      </script>
    </ask>tion>
  </ask-list>
</general>You can verify the answer of a question with a script like this:
<general>
  <ask-list config:type="list">
    <ask>
      <script>
        <filename>my.sh</filename>
        <rerun_on_error config:type="boolean">true</rerun_on_error>
        <environment config:type="boolean">true</environment>
        <source><![CDATA[
if [ "$VAL" = "myhost" ]; then
    echo "Illegal Hostname!";
    exit 1;
fi
exit 0
]]>
        </source>
        <debug config:type="boolean">false</debug>
        <feedback config:type="boolean">true</feedback>
      </script>
      <dialog config:type="integer">0</dialog>
      <element config:type="integer">0</element>
      <pathlist config:type="list">
        <path>networking,dns,hostname</path>
      </pathlist>
      <question>Enter Hostname</question>
      <default>enter your hostname here</default>
    </ask>
  </ask-list>
</general>4.34 Kernel Dumps #
This feature is not available on the IBM IBM Z (s390x) architecture.
With Kdump the system can create crashdump files if the whole kernel crashes. Crash dump files contain the memory contents while the system crashed. Such core files can be analyzed later by support or a (kernel) developer to find the reason for the system crash. Kdump is mostly useful for servers where you cannot easily reproduce such crashes but it is important to get the problem fixed.
There is a downside to this. Enabling Kdump requires between 64 MB and 128 MB of additional system RAM reserved for Kdump in case the system crashes and the dump needs to be generated.
This section only describes how to set up Kdump with AutoYaST. It does not describe how Kdump works. For details, refer to the kdump(7) manual page.
The following example shows a general Kdump configuration.
<kdump>
  <!-- memory reservation -->
  <add_crash_kernel config:type="boolean">true</add_crash_kernel>
  <crash_kernel>256M-:64M</crash_kernel>
  <general>
    <!-- dump target settings -->
    <KDUMP_SAVEDIR>ftp://stravinsky.suse.de/incoming/dumps</KDUMP_SAVEDIR>
    <KDUMP_COPY_KERNEL>true</KDUMP_COPY_KERNEL>
    <KDUMP_FREE_DISK_SIZE>64</KDUMP_FREE_DISK_SIZE>
    <KDUMP_KEEP_OLD_DUMPS>5</KDUMP_KEEP_OLD_DUMPS>
    <!-- filtering and compression -->
    <KDUMP_DUMPFORMAT>compressed</KDUMP_DUMPFORMAT>
    <KDUMP_DUMPLEVEL>1</KDUMP_DUMPLEVEL>
    <!-- notification -->
    <KDUMP_NOTIFICATION_TO>tux@example.com</KDUMP_NOTIFICATION_TO>
    <KDUMP_NOTIFICATION_CC>spam@example.com devnull@example.com</KDUMP_NOTIFICATION_CC>
    <KDUMP_SMTP_SERVER>mail.example.com</KDUMP_SMTP_SERVER>
    <KDUMP_SMTP_USER></KDUMP_SMTP_USER>
    <KDUMP_SMTP_PASSWORD></KDUMP_SMTP_PASSWORD>
    <!-- kdump kernel -->
    <KDUMP_KERNELVER></KDUMP_KERNELVER>
    <KDUMP_COMMANDLINE></KDUMP_COMMANDLINE>
    <KDUMP_COMMANDLINE_APPEND></KDUMP_COMMANDLINE_APPEND>
    <!-- expert settings -->
    <KDUMP_IMMEDIATE_REBOOT>yes</KDUMP_IMMEDIATE_REBOOT>
    <KDUMP_VERBOSE>15</KDUMP_VERBOSE>
    <KEXEC_OPTIONS></KEXEC_OPTIONS>
  </general>
</kdump>4.34.1 Memory Reservation #
     The first step is to reserve memory for Kdump at boot-up. Because the
     memory must be reserved very early during the boot process, the
     configuration is done via a kernel command line parameter called
     crashkernel. The reserved memory will be used to
     load a second kernel which will be executed without rebooting if the
     first kernel crashes. This second kernel has a special initrd, which
     contains all programs necessary to save the dump over the network or to
     disk, send a notification e-mail, and finally reboot.
    
     To reserve memory for Kdump, specify the amount
     (such as 64M to reserve 64 MB of memory from the
     RAM) and the offset. The syntax is
     crashkernel=AMOUNT@OFFSET. The kernel can
     auto-detect the right offset (except for the Xen hypervisor, where
     you need to specify 16M as offset). The amount of
     memory that needs to be reserved depends on architecture and main
     memory. Refer to
     Section 17.7.1, “Manual Kdump Configuration” for recommendations on
     the amount of memory to reserve for Kdump.
    
You can also use the extended command line syntax to specify the amount of reserved memory depending on the System RAM. That is useful if you share one AutoYaST control file for multiple installations or if you often remove or install memory on one machine. The syntax is:
BEGIN_RANGE_1-END_RANGE_1:AMOUNT_1,BEGIN_RANGE_2-END_RANGE_2:AMOUNT_2@OFFSET
     BEGIN_RANGE_1 is the start of the first memory range
     (for example: 0M) and END_RANGE_1
     is the end of the first memory range (can be empty in case
     infinity should be assumed) and so on. For example,
     256M-2G:64M,2G-:128M reserves 64 MB of
     crashkernel memory if the system has between 256 MB and 2 GB RAM and
     reserves 128 MB of crashkernel memory if the system has more than 2 GB
     RAM.
    
     On the other hand, it is possible to specify multiple values for the
     crashkernel parameter. For example, when you need to reserve different
     segments of low and high memory, use values like
     72M,low and 256M,high:
    
<kdump>
  <!-- memory reservation (high and low) -->
  <add_crash_kernel config:type="boolean">true</add_crash_kernel>
  <crash_kernel config:type="list">
    <listentry>72M,low</listentry>
    <listentry>256M,high</listentry>
  </crash_kernel>
</kdump>The following table shows the settings necessary to reserve memory:
| Element | Description | Comment | 
|---|---|---|
| 
           | 
          Set to  <add_crash_kernel config:type="boolean">true</add_crash_kernel> | required | 
| 
           | Use the syntax of the crashkernel command line as discussed above. <crash_kernel>256M:64M</crash_kernel> A list of values is also supported. <crash_kernel config:type="list"> <listentry>72M,low</listentry> <listentry>256M,high</listentry> </crash_kernel> | required | 
4.34.2 Dump Saving #
4.34.2.1 Target #
      The element KDUMP_SAVEDIR specifies the URL to
      where the dump is saved. The following methods are possible:
     
- fileto save to the local disk,
- ftpto save to an FTP server (without encryption),
- sftpto save to an SSH2 SFTP server,
- nfsto save to an NFS location and
- cifsto save the dump to a CIFS/SMP export from Samba or Microsoft Windows.
      For details see the kdump(5) manual page. Two examples are:
      file:///var/crash (which is the default location
      according to FHS) and
      ftp://user:password@host:port/incoming/dumps. A
      subdirectory, with the time stamp contained in the name, will be
      created and the dumps saved there.
     
      When the dump is saved to the local disk,
      KDUMP_KEEP_OLD_DUMPS can be used to delete old
      dumps automatically. Set it to the number of old dumps that should be
      kept. If the target partition would end up with less free disk space
      than specified in KDUMP_FREE_DISK_SIZE, the dump is
      not saved.
     
      To save the whole kernel and the debug information (if
      installed) to the same directory, set
      KDUMP_COPY_KERNEL to true. You
      will have everything you need to analyze the dump in one directory
      (except kernel modules and their debugging information).
     
4.34.2.2 Filtering and Compression #
The kernel dump is uncompressed and unfiltered. It can get as large as your system RAM. To get smaller files, compress the dump file afterward. The dump needs to be decompressed before opening.
      To use page compression, which compresses every page and allows
      dynamic decompression with the crash(8) debugging tool, set
      KDUMP_DUMPFORMAT to compressed
      (default).
     
      You may not want to save all memory pages, for example those filled
      with zeroes. To filter the dump, set the
      KDUMP_DUMPLEVEL. 0 produces a full dump and 31 is
      the smallest dump. The manual pages kdump(5) and makedumpfile(8) list
      for each value which pages will be saved.
     
4.34.2.3 Summary #
| Element | Description | Comment | 
|---|---|---|
| 
            | A URL that specifies the target to which the dump and related files will be saved. <KDUMP_SAVEDIR>file:///var/crash/</KDUMP_SAVEDIR> | required | 
| 
            | 
           Set to  <KDUMP_COPY_KERNEL>false</KDUMP_COPY_KERNEL> | optional | 
| 
            | Disk space in megabytes that must remain free after saving the dump. If not enough space is available, the dump will not be saved. <KDUMP_FREE_DISK_SIZE>64</KDUMP_FREE_DISK_SIZE> | optional | 
| 
            | 
           The number of dumps that are kept (not deleted) if
            <KDUMP_KEEP_OLD_DUMPS>4</KDUMP_KEEP_OLD_DUMPS> | optional | 
4.34.3 E-Mail Notification #
Configure e-mail notification if you want to be informed when a machine crashes and a dump is saved.
Because Kdump runs in the initrd, a local mail server cannot send the notification e-mail. An SMTP server needs to be specified (see below).
     You need to provide exactly one address in
     KDUMP_NOTIFICATION_TO. More addresses can be
     specified in KDUMP_NOTIFICATION_CC. Only use e-mail
     addresses in both cases, not a real name.
    
     Specify KDUMP_SMTP_SERVER and (if the server needs
     authentication) KDUMP_SMTP_USER and
     KDUMP_SMTP_PASSWORD. Support for TLS/SSL is not
     available but may be added in the future.
    
| Element | Description | Comment | 
|---|---|---|
| 
           | 
          Exactly one e-mail address to which the e-mail should be sent.
          Additional recipients can be specified in
           <KDUMP_NOTIFICATION_TO >tux@example.com</KDUMP_NOTIFICATION_TO> | optional (notification disabled if empty) | 
| 
           | Zero, one or more recipients that are in the cc line of the notification e-mail. <KDUMP_NOTIFICATION_CC >wilber@example.com suzanne@example.com</KDUMP_NOTIFICATION_CC> | optional | 
| 
           | 
          Host name of the SMTP server used for mail delivery. SMTP
          authentication is supported (see
           <KDUMP_SMTP_SERVER>email.suse.de</KDUMP_SMTP_SERVER> | optional (notification disabled if empty) | 
| 
           | 
          User name used together with
           <KDUMP_SMTP_USER>bwalle</KDUMP_SMTP_USER> | optional | 
| 
           | 
          Password used together with  <KDUMP_SMTP_PASSWORD>geheim</KDUMP_SMTP_PASSWORD> | optional | 
4.34.4 Kdump Kernel Settings #
     As already mentioned, a special kernel is booted to save the dump. If
     you do not want to use the auto-detection mechanism to find out which
     kernel is used (see the kdump(5) manual page that describes the
     algorithm which is used to find the kernel), you can specify the
     version of a custom kernel in KDUMP_KERNELVER. If
     you set it to foo, then the kernel located in
     /boot/vmlinuz-foo or
     /boot/vmlinux-foo (in that order on platforms that
     have a vmlinuz file) will be used.
    
     You can specify the command line used to boot the Kdump kernel.
     Normally the boot command line is used, minus settings that are not
     relevant for Kdump (like the crashkernel parameter)
     plus some settings needed by Kdump (see the manual page kdump(5)). To
     specify additional parameters, use KDUMP_COMMANDLINE_APPEND. If you
     know what you are doing and you want to specify the entire command line,
     set KDUMP_COMMANDLINE.
    
| Element | Description | Comment | 
|---|---|---|
| 
           | Version string for the kernel used for Kdump. Leave it empty to use the auto-detection mechanism (strongly recommended). <KDUMP_KERNELVER >4.12.14-94.37-default</KDUMP_KERNELVER> | optional (auto-detection if empty) | 
| 
           | Additional command line parameters for the Kdump kernel. <KDUMP_COMMANDLINE_APPEND >console=ttyS0,57600</KDUMP_COMMANDLINE_APPEND> | optional | 
| 
           | 
          Overwrite the automatically generated Kdump command line. Use with
          care. Usually,  <KDUMP_COMMANDLINE_APPEND >root=/dev/sda5 maxcpus=1 irqpoll</KDUMP_COMMANDLINE> | optional | 
4.34.5 Expert Settings #
| Element | Description | Comment | 
|---|---|---|
| 
           | 
           <KDUMP_IMMEDIATE_REBOOT >true</KDUMP_IMMEDIATE_REBOOT> | optional | 
| 
           | Bitmask that specifies how verbose the Kdump process should be. Read kdump(5) for details. <KDUMP_VERBOSE>3</KDUMP_VERBOSE> | optional | 
| 
           | Additional options that are passed to kexec when loading the Kdump kernel. Normally empty. <KEXEC_OPTIONS>--noio</KEXEC_OPTIONS> | optional | 
4.35 DNS Server #
    The Bind DNS server can be configured by adding a dns-server
    resource. The three more straightforward properties of that resource can
    have a value of 1 to enable them or 0 to disable.
   
| Attribute | Value | Description | 
|---|---|---|
| 
            | 0 / 1 | The DNS server must be jailed in a chroot. | 
| 
            | 0 / 1 | Bind is enabled (executed on system start). | 
| 
            | 0 / 1 | Store the settings in LDAP instead of native configuration files. | 
<dns-server> <chroot>0</chroot> <start_service>1</start_service> <use_ldap>0</use_ldap> </dns-server>
In addition to those basic settings, there are three properties of type list that can be used to fine-tune the service configuration.
| List | Description | 
|---|---|
| 
          | Options of the DNS server logging. | 
| 
          | Bind options like the files and directories to use, the list of forwarders and other configuration settings. | 
| 
          | List of DNS zones known by the server, including all the settings, records and SOA records. | 
<dns-server>
  <logging config:type="list">
    <listentry>
      <key>channel</key>
      <value>log_syslog { syslog; }</value>
    </listentry>
  </logging>
  <options config:type="list">
    <option>
      <key>forwarders</key>
      <value>{ 10.10.0.1; }</value>
    </option>
  </options>
  <zones config:type="list">
    <listentry>
      <is_new>1</is_new>
      <modified>1</modified>
      <options config:type="list"/>
      <records config:type="list">
        <listentry>
          <key>mydom.uwe.</key>
          <type>MX</type>
          <value>0 mail.mydom.uwe.</value>
        </listentry>
        <listentry>
          <key>mydom.uwe.</key>
          <type>NS</type>
          <value>ns.mydom.uwe.</value>
        </listentry>
      </records>
      <soa>
        <expiry>1w</expiry>
        <mail>root.aaa.aaa.cc.</mail>
        <minimum>1d</minimum>
        <refresh>3h</refresh>
        <retry>1h</retry>
        <serial>2005082300</serial>
        <server>aaa.aaa.cc.</server>
        <zone>@</zone>
      </soa>
      <soa_modified>1</soa_modified>
      <ttl>2d</ttl>
      <type>master</type>
      <update_actions config:type="list">
        <listentry>
          <key>mydom.uwe.</key>
          <operation>add</operation>
          <type>NS</type>
          <value>ns.mydom.uwe.</value>
        </listentry>
      </update_actions>
      <zone>mydom.uwe</zone>
    </listentry>
  </zones>
</dns-server>4.36 DHCP Server #
    The dhcp-server resource makes it possible to configure
    all the settings of a DHCP server by means of the six following properties.
   
| Element | Value | Description | 
|---|---|---|
| 
          | 0 / 1 | A value of 1 means that the DHCP server must be jailed in a chroot. | 
| 
          | 0 / 1 | Set this to 1 to enable the DHCP server (that is, run it on system startup). | 
| 
          | 0 / 1 | If set to 1, the settings will be stored in LDAP instead of native configuration files. | 
| 
          | Text | String with parameters that will be passed to the DHCP server executable when started. For example, use "-p 1234" to listen on a non-standard 1234 port. For all possible options, consult the dhcpd manual page. If left blank, default values will be used. | 
| 
          | List | List of network cards in which the DHCP server will be operating. See the example below for the exact format. | 
| 
          | List | 
         List of settings to configure the behavior of the DHCP server. The
         configuration is defined in a tree-like structure where the root
         represents the global options, with subnets and host nested from there.
         The  | 
<dhcp-server>
  <allowed_interfaces config:type="list">
    <allowed_interface>eth0</allowed_interface>
  </allowed_interfaces>
  <chroot>0</chroot>
  <other_options>-p 9000</other_options>
  <start_service>1</start_service>
  <use_ldap>0</use_ldap>
  <settings config:type="list">
    <settings_entry>
      <children config:type="list"/>
      <directives config:type="list">
        <listentry>
          <key>fixed-address</key>
          <type>directive</type>
          <value>192.168.0.10</value>
        </listentry>
        <listentry>
          <key>hardware</key>
          <type>directive</type>
          <value>ethernet d4:00:00:bf:00:00</value>
        </listentry>
      </directives>
      <id>static10</id>
      <options config:type="list"/>
      <parent_id>192.168.0.0 netmask 255.255.255.0</parent_id>
      <parent_type>subnet</parent_type>
      <type>host</type>
    </settings_entry>
    <settings_entry>
      <children config:type="list">
        <child>
          <id>static10</id>
          <type>host</type>
        </child>
      </children>
      <directives config:type="list">
        <listentry>
          <key>range</key>
          <type>directive</type>
          <value>dynamic-bootp 192.168.0.100 192.168.0.150</value>
        </listentry>
        <listentry>
          <key>default-lease-time</key>
          <type>directive</type>
          <value>14400</value>
        </listentry>
        <listentry>
          <key>max-lease-time</key>
          <type>directive</type>
          <value>86400</value>
        </listentry>
      </directives>
      <id>192.168.0.0 netmask 255.255.255.0</id>
      <options config:type="list"/>
      <parent_id/>
      <parent_type/>
      <type>subnet</type>
    </settings_entry>
    <settings_entry>
      <children config:type="list">
        <child>
          <id>192.168.0.0 netmask 255.255.255.0</id>
          <type>subnet</type>
        </child>
      </children>
      <directives config:type="list">
        <listentry>
          <key>ddns-update-style</key>
          <type>directive</type>
          <value>none</value>
        </listentry>
        <listentry>
          <key>default-lease-time</key>
          <type>directive</type>
          <value>14400</value>
        </listentry>
      </directives>
      <id/>
      <options config:type="list"/>
      <parent_id/>
      <parent_type/>
      <type/>
    </settings_entry>
  </settings>
</dhcp-server>4.37 SUSE Firewall #
    SUSE Firewall can be configured using the firewall
    resource. All the properties in this resource are optional and all of them
    are of type text (except the boolean
    start_firewall and enable_firewall properties).
   
4.37.1 General Firewall Configuration #
     The following properties are intended to configure the general settings of
     SUSE Firewall. Most of them are a direct representation of the corresponding
     setting at /etc/sysconfig/SuSEfirewall2. Check the
     comments in that file for further information.
    
| Attribute | Value | Description | 
|---|---|---|
| 
           | Boolean | Whether SUSE Firewall should be started right after applying the configuration. | 
| 
           | Boolean | Whether SUSE Firewall should be started on every system startup. | 
| 
           | yes / no | 
          Log every accepted package. If set to "yes" the value of  | 
| 
           | yes / no | Log accepted critical packages. | 
| 
           | yes / no | 
          Log every dropped package. If set to "yes" the value of  | 
| 
           | yes / no | Log dropped critical packages. | 
| 
           | yes / no | Allow the firewall to reply to ICMP echo requests. | 
| 
           | yes / no | 
          Used to enable network masquerading, which allows to transparently redirect ports
          from one interface in the external zone to ports of another interface in a different zone.
          Masquerading needs at least one external interface and one other (not external) interface.
          Since routing is needed for masquerading, the values of this property and
           | 
| 
           | Space delimited list of rules | 
          Rules for network masquerading, with each rule following this format:           | 
| 
           | Space separated list of interface names | Bridge interfaces without IP address. | 
| 
           | yes / no / int /ext / dmz | Trust level of IPsec packets. | 
| 
           | Space delimited list | Additional kernel modules to load at startup. | 
| 
           | yes / no | 
          Whether routing between external, dmz and internal network should be activated.
          Related to  | 
| 
           | yes / no / notrack | Whether to protect the firewall from the internal network. | 
4.37.2 Firewall Zones Configuration #
     The configuration of SUSE Firewall is based on the existence of three network zones.
     The behavior of each zone can be tweaked in several ways. Therefore, there are many almost
     equivalent AutoYaST properties that differ only by name and the zone to
     which they apply. For example, FW_DEV_DMZ for the demilitarized zone,
     FW_DEV_EXT for the external zone and FW_DEV_INT
     for the internal one.
    
| Attributes | Value | Description | 
|---|---|---|
| 
           | yes / no | Allow IP broadcasts in that zone. | 
| 
           | Space delimited list | Services that should be accessible from that zone. | 
| 
           | Space delimited list | Name of the interfaces that are considered to belong to the zone. The special keyword "any" means that packets arriving on interfaces not explicitly configured as int, ext or dmz will be considered to belong to this zone. | 
| 
           | yes / no | Suppress logging of dropped broadcast packets. Useful if you do not allow broadcasts on a LAN interface. | 
| 
           | Space separated list of rules | 
          Services to allow. Each rule following the format
           | 
| 
           | Space delimited list of rules | 
          Services to allow that are considered RELATED by the connection tracking engine.
          Format of each rule:  | 
| 
           | Space separated list | 
          Which IP services should be accessible from the zone. Every entry in
          the list can be a port, a port range or a well known protocol name.
          This setting has precedence over  | 
| 
           | Space delimited list | 
          RPC services that should be accessible from the zone.
          This setting has precedence over  | 
| 
           | Space separated list | 
          Which TCP services should be accessible from the zone. Every entry in
          the list can be a port, a port range or a well known protocol name.
          This setting has precedence over  | 
| 
           | Space separated list | 
          Which UDP services should be accessible from the zone. Every entry in
          the list can be a port, a port range or a well known protocol name.
          This setting has precedence over  | 
4.37.3 A Full Example #
A full example of the firewall section, including general and zone specific properties could look like this.
<firewall> <FW_ALLOW_FW_BROADCAST_DMZ>no</FW_ALLOW_FW_BROADCAST_DMZ> <FW_ALLOW_FW_BROADCAST_EXT>no</FW_ALLOW_FW_BROADCAST_EXT> <FW_ALLOW_FW_BROADCAST_INT>no</FW_ALLOW_FW_BROADCAST_INT> <FW_DEV_DMZ></FW_DEV_DMZ> <FW_DEV_EXT>any eth0</FW_DEV_EXT> <FW_DEV_INT></FW_DEV_INT> <FW_FORWARD_ALWAYS_INOUT_DEV></FW_FORWARD_ALWAYS_INOUT_DEV> <FW_FORWARD_MASQ></FW_FORWARD_MASQ> <FW_IGNORE_FW_BROADCAST_DMZ>no</FW_IGNORE_FW_BROADCAST_DMZ> <FW_IGNORE_FW_BROADCAST_EXT>yes</FW_IGNORE_FW_BROADCAST_EXT> <FW_IGNORE_FW_BROADCAST_INT>no</FW_IGNORE_FW_BROADCAST_INT> <FW_IPSEC_TRUST>no</FW_IPSEC_TRUST> <FW_LOAD_MODULES>nf_conntrack_netbios_ns</FW_LOAD_MODULES> <FW_LOG_ACCEPT_ALL>no</FW_LOG_ACCEPT_ALL> <FW_LOG_ACCEPT_CRIT>yes</FW_LOG_ACCEPT_CRIT> <FW_LOG_DROP_ALL>no</FW_LOG_DROP_ALL> <FW_LOG_DROP_CRIT>yes</FW_LOG_DROP_CRIT> <FW_MASQUERADE>no</FW_MASQUERADE> <FW_PROTECT_FROM_INT>no</FW_PROTECT_FROM_INT> <FW_ROUTE>no</FW_ROUTE> <enable_firewall config:type="boolean">true</enable_firewall> <start_firewall config:type="boolean">true</start_firewall> </firewall>
4.38 Miscellaneous Hardware and System Components #
In addition to the core component configuration, like network authentication and security, AutoYaST offers a wide range of hardware and system configuration options, the same as available by default on any system installed manually and in an interactive way. For example, it is possible to configure printers, sound devices, TV cards and any other hardware components which have a module within YaST.
Any new configuration options added to YaST will be automatically available in AutoYaST.
4.38.1 Printer #
AutoYaST support for printing is limited to basic settings defining how CUPS is used on a client for printing via the network.
     There is no AutoYaST support for setting up local print queues. Modern
     printers are usually connected via USB. CUPS accesses USB printers by a
     model-specific device URI like
     usb://ACME/FunPrinter?serial=1a2b3c. Usually it is
     not possible to predict the correct USB device URI in advance, because
     it is determined by the CUPS back-end usb during
     runtime. Therefore it is not possible to set up local print queues with
     AutoYaST.
    
Basics on how CUPS is used on a client workstation to print via network:
     On client workstations application programs submit print jobs to the
     CUPS daemon process (cupsd).
     cupsd forwards the print jobs to a CUPS print
     server in the network where the print jobs are processed. The server
     sends the printer specific data to the printer device.
    
     If there is only a single CUPS print server in the network, there is no
     need to have a CUPS daemon running on each client workstation. Instead
     it is simpler to specify the CUPS server in
     /etc/cups/client.conf and access it directly (only
     one CUPS server entry can be set). In this case application programs
     that run on client workstations submit print jobs directly to the
     specified CUPS print server.
    
     Example 4.62, “Printer configuration” shows a printer
     configuration section. The cupsd_conf_content entry
     contains the whole verbatim content of the
     cupsd configuration file
     /etc/cups/cupsd.conf. The
     client_conf_content entry contains the whole
     verbatim content of /etc/cups/client.conf. The
     printer section contains the
     cupsd configuration but it does
     not specify whether the cupsd should run.
    
  <printer>
    <client_conf_content>
      <file_contents><![CDATA[
... verbatim content of /etc/cups/client.conf ...
]]></file_contents>
    </client_conf_content>
    <cupsd_conf_content>
      <file_contents><![CDATA[
... verbatim content of /etc/cups/cupsd.conf ...
]]></file_contents>
    </cupsd_conf_content>
  </printer>/etc/cups/cups-files.conf
      With release 1.6 the CUPS configuration file has been split into two
      files: cupsd.conf and
      cups-files.conf. As of SUSE Linux Enterprise Server 12 SP5,
      AutoYaST only supports modifying cupsd.conf since
      the default settings in cups-files.conf are
      sufficient for usual printing setups.
     
4.38.2 Sound devices #
An example of the sound configuration created using the configuration system is shown below.
<sound>
  <autoinstall config:type="boolean">true</autoinstall>
  <modules_conf config:type="list">
    <module_conf>
      <alias>snd-card-0</alias>
      <model>M5451, ALI</model>
      <module>snd-ali5451</module>
      <options>
        <snd_enable>1</snd_enable>
        <snd_index>0</snd_index>
        <snd_pcm_channels>32</snd_pcm_channels>
      </options>
    </module_conf>
  </modules_conf>
  <volume_settings config:type="list">
    <listentry>
      <Master config:type="integer">75</Master>
    </listentry>
  </volume_settings>
</sound>4.39 Importing SSH Keys and Configuration #
YaST allows to import SSH keys and server configuration from previous installations. The behavior of this feature can also be controlled through an AutoYaST profile.
<ssh_import> <import config:type="boolean">true</import> <copy_config config:type="boolean">true</copy_config> <device>/dev/sda2</device> </ssh_import>
| Attributes | Value | Description | 
|---|---|---|
| 
           | true / false | 
          SSH keys will be imported. If set to
           | 
| 
           | true / false | 
          Additionally, SSH server configuration will be imported.
          This setting will not have effect if
           | 
| 
           | Partition | Partition to import keys and configuration from. If it is not set, the partition which contains the most recently accessed key is used. | 
4.40 Configuration Management #
AutoYaST allows delegating part of the configuration to a configuration management tool like Salt:
- AutoYaST takes care of system installation (partitioning, network setup, etc.) 
- System configuration can be delegated to a configuration management tool 
This module configures the connection to a configuration management tool and uploads SSH keys which are needed for establishing connections. At the end of the installation, the configuration management Master will be contacted to retrieve state files and other resources.
<configuration_management>
    <type>salt</type>
    <master>linux-addc</master>
    <auth_attempts config:type="integer">5</auth_attempts>
    <auth_time_out config:type="integer">10</auth_time_out>
    <keys_url>http://keys.example.de/keys</keys_url>
</configuration_management>| Attributes | Value | Description | 
|---|---|---|
| 
           | Configuration management type | 
          Configuration management name. Currently only  | 
| 
           | Host name | Host name or IP address of the configuration management master. | 
| 
           | Integer | 
          At the end of installation, YaST connects to the configuration
          management master with maximum  | 
| 
           | Integer | Time between the configuration management master connection attempts. The default is 15 seconds. | 
| 
           | URL of used key | 
          Path to an HTTP server, hard disk, USB drive or similar with
          the files  | 
| 
           | True/false | 
          Enables the configuration management services on the client
          side. Default is  | 
