Note: If you didn't migrate your openSUSE account in June , you will need to create a new account with a different email! Results 1 to 7 of 7. Thread: Saving system settings yast settings. Join Date Feb Posts Saving system settings yast settings Is there a way I can save system settings and have yast revert to a config file in case I ever need to reinstall the system again?
I hate having to configure the firewall, runlevels, samba shares, samba workgroup, apparmor, and all the other junk after every install. It's not like I install often, but should suse The YaST sysconfig Editor The X Window System. The YaST sysconfig Editor. Figure System Configuration Using the sysconfig Editor. It is possible to specify parameters given to the script being called. You may have more than one param entry.
They are concatenated by a single space character on the script command line. If any shell quoting should be necessary for example to protect embedded spaces you need to include this.
Optional, default is false scripts only run once. The boot loader is not installed either at this stage. Optional, default is false. This option is only available for chroot environment scripts. The scripts are located in the subdirectory scripts and the output logs in the log directory.
The log consists of the output produced when executing the shell scripts using the following command:. Sysconfig variables, offer the possibility to fine-tune many system components and environment variables exactly to your needs.
Both relative and absolute paths can be provided. For many applications and services you may have a configuration file which should be copied to the appropriate location on the installed system. For example, if you are installing a Web server, you may have a server configuration file httpd.
Using this resource, you can embed the file into the control file by specifying the final path on the installed system. YaST will copy this file to the specified location. This feature requires the autoyast2 package to be installed. If the package is missing, AutoYaST will automatically install the package if it is missing.
A more advanced example is shown below. After the file has been copied to the system, a script is executed. This can be used to modify the file and prepare it for the client's environment. You have the option to let the user decide the values of specific parts of the control file during the installation. If you use this feature, a pop-up will ask the user to enter a specific part of the control file during installation.
If you want a full auto installation, but the user should set the password of the local account, you can do this via the ask directive in the control file.
The default value is the path to the element the path often looks strange, so we recommend entering a question. Set a preselection for the user. A text entry will be filled out with this value. A check box will be true or false and a selection will have the given value preselected. The type of the element you want to change. Possible values are symbol , boolean , string and integer. The file system in the partition section is a symbol, while the encrypted element in the user configuration is a boolean.
The default is string. If type is symbol , you must provide the selection element too see below. If this boolean is set to true , a password dialog pops up instead of a simple text entry. Setting this to true only makes sense if type is string. A list of path elements. A path is a comma separated list of elements that describes the path to the element you want to change. This information is optional but you should at least provide path or file.
You can store the answer to a question in a file, to use it in one of your scripts later. This information is optional, but you should at least provide path or file. Stage configures the installation stage in which the question pops up. You can set this value to cont or initial. Questions you answer during the initial stage will write their answer into the control file on the hard disk. You should know that if you enter clear text passwords during initial.
Of course it does not make sense to ask for the file system to use during the cont phase. The hard disk is already partitioned at that stage and the question will have no effect. The selection element contains a list of entry elements. Each entry represents a possible option for the user to choose. The user cannot enter a value in a text box, but he can choose from a list of values. You can ask more than one question per dialog. To do so, specify the dialog-id with an integer.
All questions with the same dialog-id belong to the same dialog. The dialogs are sorted by the id too. To make that possible you need to specify the element-id with an integer. The questions in a dialog are sorted by id. You can increase the default width of dialog. If there are multiple width specifications per dialog, the largest one is used. The number is roughly equivalent to the number of characters. You can increase default height of dialog. If there are multiple height specifications per dialog, largest one is used.
The number is roughly equivalent to number of lines. You can have more than one question per dialog. Each question on a dialog has a frame that can have a frame title, a small caption for each question.
You can put multiple elements into one frame. They need to have the same frame title. You can run scripts after a question has been answered see the table below for detailed instructions about scripts. You can change the label on the Ok button. The last element that specifies the label for a dialog wins. You can change the label on the Back button. You can specify an integer here that is used as timeout in seconds. If the user does not answer the question before the timeout, the default value is taken as answer.
When the user touches or changes any widget in the dialog, the timeout is turned off and the dialog needs to be confirmed via Ok. A missing value is interpreted as 0 , which means that there is no timeout. You can run scripts to set the default value for a question see Section 4. This feature is useful if you can calculate a default value, especially in combination with the timeout option. You can run scripts to set the default value for a question. The source code of the script.
If your script has an exit code other than 0, the normal default element is used. The default value is shell. A value of -1 terminates the ask sequence. If that file is not created, AutoYaST will run the dialogs in the normal order since A boolean that passes the value of the answer to the question as an environment variable to the script.
The variable is named VAL. A boolean that turns on feedback for the script execution. Optional, default is true. This value needs feedback to be turned on, too. A boolean that keeps the dialog open until the script has an exit code of 0 zero.
So you can parse and check the answers the user gave in the script and display an error with the feedback option. This value should be used together with the feedback option.
Below you can see an example of the usage of the ask feature. The following example shows a to choose between AutoYaST control files. AutoYaST will read the modified. This way you can fetch a complete new control file. With Kdump the system can create crashdump files if the whole kernel crashes. Crash dump files contain the memory contents while the system crashed. Such core files can be analyzed later by support or a kernel developer to find the reason for the system crash.
Kdump is mostly useful for servers where you cannot easily reproduce such crashes but it is important to get the problem fixed. There is a downside to this. It does not describe how Kdump works.
For details, refer to the kdump 7 manual page. The first step is to reserve memory for Kdump at boot-up. Because the memory must be reserved very early during the boot process, the configuration is done via a kernel command line parameter called crashkernel. The reserved memory will be used to load a second kernel which will be executed without rebooting if the first kernel crashes. This second kernel has a special initrd, which contains all programs necessary to save the dump over the network or to disk, send a notification e-mail, and finally reboot.
The kernel can auto-detect the right offset except for the Xen hypervisor, where you need to specify 16M as offset. The amount of memory that needs to be reserved depends on architecture and main memory. Refer to Section You can also use the extended command line syntax to specify the amount of reserved memory depending on the System RAM.
That is useful if you share one AutoYaST control file for multiple installations or if you often remove or install memory on one machine. The syntax is:. On the other hand, it is possible to specify multiple values for the crashkernel parameter.
For example, when you need to reserve different segments of low and high memory, use values like 72M,low and M,high :. Set to true if memory should be reserved and Kdump enabled. The following methods are possible:. For details see the kdump 5 manual page. A subdirectory, with the time stamp contained in the name, will be created and the dumps saved there.
Set it to the number of old dumps that should be kept. You will have everything you need to analyze the dump in one directory except kernel modules and their debugging information. The kernel dump is uncompressed and unfiltered. It can get as large as your system RAM.
To get smaller files, compress the dump file afterward. The dump needs to be decompressed before opening. You may not want to save all memory pages, for example those filled with zeroes. The manual pages kdump 5 and makedumpfile 8 list for each value which pages will be saved.
A URL that specifies the target to which the dump and related files will be saved. Disk space in megabytes that must remain free after saving the dump. If not enough space is available, the dump will not be saved. Specify 0 if you do not want any dumps to be automatically deleted, specify -1 if all dumps except the current one should be deleted.
Configure e-mail notification if you want to be informed when a machine crashes and a dump is saved. Because Kdump runs in the initrd, a local mail server cannot send the notification e-mail. An SMTP server needs to be specified see below. Only use e-mail addresses in both cases, not a real name. Exactly one e-mail address to which the e-mail should be sent.
Zero, one or more recipients that are in the cc line of the notification e-mail. Host name of the SMTP server used for mail delivery. As already mentioned, a special kernel is booted to save the dump. You can specify the command line used to boot the Kdump kernel.
Normally the boot command line is used, minus settings that are not relevant for Kdump like the crashkernel parameter plus some settings needed by Kdump see the manual page kdump 5. Version string for the kernel used for Kdump. Leave it empty to use the auto-detection mechanism strongly recommended.
Overwrite the automatically generated Kdump command line. Use with care. The default is to reboot the system automatically. Bitmask that specifies how verbose the Kdump process should be. Read kdump 5 for details. Additional options that are passed to kexec when loading the Kdump kernel. Normally empty.
The Bind DNS server can be configured by adding a dns-server resource. The three more straightforward properties of that resource can have a value of 1 to enable them or 0 to disable. In addition to those basic settings, there are three properties of type list that can be used to fine-tune the service configuration.
Bind options like the files and directories to use, the list of forwarders and other configuration settings. The dhcp-server resource makes it possible to configure all the settings of a DHCP server by means of the six following properties. If set to 1, the settings will be stored in LDAP instead of native configuration files. String with parameters that will be passed to the DHCP server executable when started.
For example, use "-p " to listen on a non-standard port. For all possible options, consult the dhcpd manual page. If left blank, default values will be used. List of network cards in which the DHCP server will be operating. See the example below for the exact format. List of settings to configure the behavior of the DHCP server. The configuration is defined in a tree-like structure where the root represents the global options, with subnets and host nested from there.
SUSE Firewall can be configured using the firewall resource. Check the comments in that file for further information. Log every accepted package. Log every dropped package. Used to enable network masquerading, which allows to transparently redirect ports from one interface in the external zone to ports of another interface in a different zone. Masquerading needs at least one external interface and one other not external interface. Whether routing between external, dmz and internal network should be activated.
The behavior of each zone can be tweaked in several ways. Therefore, there are many almost equivalent AutoYaST properties that differ only by name and the zone to which they apply.
Name of the interfaces that are considered to belong to the zone. The special keyword "any" means that packets arriving on interfaces not explicitly configured as int, ext or dmz will be considered to belong to this zone.
Suppress logging of dropped broadcast packets. Useful if you do not allow broadcasts on a LAN interface. Services to allow. Each rule following the format net,protocol[,dport[,sport[,flags]]]. Format of each rule: net,protocol[,sport[,dport]]. Which IP services should be accessible from the zone. Every entry in the list can be a port, a port range or a well known protocol name. RPC services that should be accessible from the zone.
Which TCP services should be accessible from the zone. Which UDP services should be accessible from the zone. A full example of the firewall section, including general and zone specific properties could look like this. In addition to the core component configuration, like network authentication and security, AutoYaST offers a wide range of hardware and system configuration options, the same as available by default on any system installed manually and in an interactive way.
For example, it is possible to configure printers, sound devices, TV cards and any other hardware components which have a module within YaST. There is no AutoYaST support for setting up local print queues. Modern printers are usually connected via USB. Therefore it is not possible to set up local print queues with AutoYaST.
On client workstations application programs submit print jobs to the CUPS daemon process cupsd. The server sends the printer specific data to the printer device.
In this case application programs that run on client workstations submit print jobs directly to the specified CUPS print server. The printer section contains the cupsd configuration but it does not specify whether the cupsd should run. With release 1. An example of the sound configuration created using the configuration system is shown below. The behavior of this feature can also be controlled through an AutoYaST profile.
SSH keys will be imported. If set to false , nothing will be imported. Additionally, SSH server configuration will be imported. This setting will not have effect if import is set to false. Partition to import keys and configuration from. If it is not set, the partition which contains the most recently accessed key is used. AutoYaST allows delegating part of the configuration to a configuration management tool like Salt:. This module configures the connection to a configuration management tool and uploads SSH keys which are needed for establishing connections.
At the end of the installation, the configuration management Master will be contacted to retrieve state files and other resources. Configuration management name. Currently only salt is supported. The default is 3 attempts. Time between the configuration management master connection attempts. The default is 15 seconds. This key has to be known to the configuration management master. Enables the configuration management services on the client side.
Default is true. Contents Contents. The network settings module networking The partitioner partitioning The registration module scc. Warning: Overwriting the Signature Handling Defaults Installing unsigned packages, packages with failing checksum checks, or when accepting packages from sources you do not trust is a major security risk.
Warning: Critical System Messages Note that not all messages during installation are controlled by the report resource. Note: Availability of Extensions The availability of extensions is product and architecture dependent. Attribute Description activate Set the boot flag on the boot partition. Attribute Values Description create Specify if this partition must be created or if it already exists. Use Free Space If the drive is already partitioned, it is possible to create the new partitions using the free space on the hard disk.
Reuse all available space Use this option to delete all existing partitions Linux and non-Linux. Reuse all available Linux partitions This option deletes all existing Linux partitions.
Reuse only specified partitions This option allows you to select specific partitions to delete. Important: Beware of Data Loss The value provided in the use property determines how existing data and partitions are treated. Mount read-only ro No write access to the file system. No access time noatime Access times are not updated when a file is read. Mountable by User user The file system can be mounted by a normal user. Data Journaling Mode ordered , journal , writeback journal All data is committed to the journal prior to being written to the main file system.
Figure 4. Note: Cannot Be Combined with partitioning Section This section will be ignored if you have defined your own partitioning section too. If multiple root partitions are found, use the one specified below. RAID 0 This level increases your disk performance. RAID 1 This mode offers the best redundancy. RAID 5 This mode combines management of a larger number of disks and still maintains some redundancy. Multipath This mode allows access to the same physical device via multiple controllers for redundancy against a fault in a controller card.
Default: 1. This file describes an SDK module included in the base product. Defined by the user. Note: Unsigned Installation Sources—Limitations You can only disable signature checking during the first stage of the auto-installation process. Note: Package Removal Failure Note that it is not possible to remove a package, that is part of a pattern see Section 4. When specifying such a package for removal, the installation will fail with the following error message: The package resolver run failed.
Check your software section in the AutoYaST profile. Procedure 4. Boot the system from the installation media. Select the Installation menu item. Press Enter to start the upgrade process. Useful if there are none.
Entering netmask 0. Values: master, slave, none slaves List of host names to configure as NIS server slaves. Attribute Values Description accounts List of Samba accounts. Default: 2. The Options directive is both complicated and important. If the fakename is slash-terminated, then the realname must also be slash terminated, and if the fakename omits the trailing slash, the realname must also omit it. If you do not use FancyIndexing, you may comment this out.
ScriptAliases are essentially the same as Aliases, except that documents in the realname directory are treated as applications and run by the server when requested rather than as documents sent to the client.
The apache package would have to be rebuilt. This is mostly meant as a place for other RPM packages to drop in their configuration snippet. You can comment this out here if you want those bits include only in a certain virtual host, but not here.
All addresses will be taken if this entry is empty. Only user defined modules need to be described. Default 2. Default: false. Note: Firewall To run an Apache server correctly, make sure the firewall is configured appropriately. ChrootEnable When enabled, local users will be by default placed in a chroot jail in their home directory after login. Warning: This option has security implications. Specify a directory which is used for FTP anonymous users. Specify a directory which is used for FTP authenticated users.
LocalMaxRate The maximum data transfer rate permitted for local authenticated users. Minutes PasMaxPort Maximum value for a port range for passive connection replies. PassiveMode needs to be set to YES. PasMinPort Minimum value for a port range for passive connection replies. For example if you feel paranoid.
UmaskAnon The value to which the umask for file creation is set for anonymous users. UmaskLocal Umask for authenticated users.
How to interpret Ctrl — Alt — Del? Note: Users and groups set up during the first stage Users and groups are set up during the first stage, so you can set up a usable system without running the second stage. Note: Pre-Install Scripts with Confirmation Pre-scripts are executed at an early stage of the installation. Table 4. Element Description Comment location Define a location from where the script gets fetched.
Element Description Comment question The question you want to ask the user. Element Description Comment source The source code of the script.
Element Description Comment file name The file name of the script.
0コメント