Copyright © 2006–2025 diff --git a/main/html/SLE-Micro-administration/index.html b/main/html/SLE-Micro-administration/index.html index cf2653c7f6..7005c6e103 100644 --- a/main/html/SLE-Micro-administration/index.html +++ b/main/html/SLE-Micro-administration/index.html @@ -96,7 +96,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Copyright © 2006–2025 diff --git a/main/html/SLE-Micro-autoyast/book-autoyast.html b/main/html/SLE-Micro-autoyast/book-autoyast.html index d9a88b8869..6473bcc6ca 100644 --- a/main/html/SLE-Micro-autoyast/book-autoyast.html +++ b/main/html/SLE-Micro-autoyast/book-autoyast.html @@ -115,7 +115,7 @@ of SUSE Linux Enterprise Micro systems. It uses an AutoYaST profile that contains installation and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration. -
- Preface
- 1 Introduction to AutoYaST
- I Understanding and creating the AutoYaST control file
- II AutoYaST configuration examples
- 4 Configuration and installation options
- 4.1 General options
- 4.2 Reporting
- 4.3 System registration and extension selection
- 4.4 The GRUB 2 boot loader
- 4.5 The Systemd boot loader
- 4.6 Partitioning
- 4.7 iSCSI initiator overview
- 4.8 Fibre channel over Ethernet configuration (FCoE)
- 4.9 Country settings
- 4.10 Software
- 4.11 Services and targets
- 4.12 Network configuration
- 4.13 Proxy
- 4.14 Security settings
- 4.15 Users and groups
- 4.16 Custom user scripts
- 4.17 Adding complete configurations
- 4.18 Ask the user for values during installation
- 4.19 Kernel dumps
- 4.20 Firewall configuration
- 4.21 Importing SSH keys and configuration
- 4.22 Configuration management
- 4 Configuration and installation options
- III Managing mass installations with dynamic profiles
- IV Understanding the auto-installation process
- V Appendixes
- 2.1 AutoYaST control file (profile)
- 2.2 Control file container
- 2.3 Nested resources
- 2.4 An empty map
- 3.1 Example file for replacing the host name/domain by script
- 4.1 General options
- 4.2 Reporting behavior
- 4.3 LVM-based guided partitioning
- 4.4 Creating
/
,/home
andswap
partitions - 4.5 Using a whole disk as a file system
- 4.6 Automated partitioning on selected drives
- 4.7 Installing on multiple drives
- 4.8 Mount options
- 4.9 Keeping partitions
- 4.10 Auto-detection of partitions to be kept.
- 4.11 Create LVM physical volume
- 4.12 LVM logical volumes
- 4.13 RAID10 configuration
- 4.14 RAID10 without partitions
- 4.15 Using multipath devices
- 4.16 Listing multipath devices
- 4.17 Using the WWID to identify a multipath device
- 4.18
bcache
definition - 4.19 Multi-device Btrfs configuration
- 4.20 NFS share definition
- 4.21
tmpfs
definition - 4.22 iSCSI client
- 4.23 FCoE configuration
- 4.24 Language
- 4.25 Time zone
- 4.26 Keyboard
- 4.27 Package selection in the control file with patterns and packages sections
- 4.28 Packages selection using a regular expression
- 4.29 Creating a package database with the additional package inst-source-utils.rpm
- 4.30
add_on_products.xml
- 4.31 Adding the SDK extension and a user defined repository
- 4.32 Kernel selection in the control file
- 4.33 Configuring services and targets
- 4.34 Network configuration
- 4.35 Bonding interface configuration
- 4.36 Bridge interface configuration
- 4.37 Multiple IP Addresses
- 4.38 Assigning a persistent name using the MAC address
- 4.39 Network routing configuration
- 4.40 Network configuration: proxy
- 4.41 Security configuration
- 4.42 Select the Defense Information Systems Agency Security Technical Implementation Guide
- 4.43 Minimal user configuration
- 4.44 Complex user configuration
- 4.45 Group configuration
- 4.46 Enabling autologin and password-less login
- 4.47 Dumping files into the installed system
- 4.48 Dumping files into the installed system
- 4.49 Kdump configuration
- 4.50 Disabled Kdump configuration
- 4.51 Kdump memory reservation with multiple values
- 4.52 Example firewall section
- 4.53 Importing SSH keys and configuration from /dev/sda2
- 4.54 Client/server with manual authentication
- 4.55 Client/server with preseed keys
- 4.56 Stand-alone mode
- 6.1 Simple rules file
- 6.2 Simple rules file
- 7.1 Including a file using ERB
- 7.2 Using the largest disk
- 7.3 Configure the connected network cards
- 8.1 Using the MAC address to get the profile
- 8.2 Accessing ERB helpers from a Ruby script
- 9.1 Determine HEX code for an IP address
- 9.2
linuxrc
Options in the AutoYaST control file
Copyright © 2006–2025 diff --git a/main/html/SLE-Micro-autoyast/index.html b/main/html/SLE-Micro-autoyast/index.html index d9a88b8869..6473bcc6ca 100644 --- a/main/html/SLE-Micro-autoyast/index.html +++ b/main/html/SLE-Micro-autoyast/index.html @@ -115,7 +115,7 @@ of SUSE Linux Enterprise Micro systems. It uses an AutoYaST profile that contains installation and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration. -
- Preface
- 1 Introduction to AutoYaST
- I Understanding and creating the AutoYaST control file
- II AutoYaST configuration examples
- 4 Configuration and installation options
- 4.1 General options
- 4.2 Reporting
- 4.3 System registration and extension selection
- 4.4 The GRUB 2 boot loader
- 4.5 The Systemd boot loader
- 4.6 Partitioning
- 4.7 iSCSI initiator overview
- 4.8 Fibre channel over Ethernet configuration (FCoE)
- 4.9 Country settings
- 4.10 Software
- 4.11 Services and targets
- 4.12 Network configuration
- 4.13 Proxy
- 4.14 Security settings
- 4.15 Users and groups
- 4.16 Custom user scripts
- 4.17 Adding complete configurations
- 4.18 Ask the user for values during installation
- 4.19 Kernel dumps
- 4.20 Firewall configuration
- 4.21 Importing SSH keys and configuration
- 4.22 Configuration management
- 4 Configuration and installation options
- III Managing mass installations with dynamic profiles
- IV Understanding the auto-installation process
- V Appendixes
- 2.1 AutoYaST control file (profile)
- 2.2 Control file container
- 2.3 Nested resources
- 2.4 An empty map
- 3.1 Example file for replacing the host name/domain by script
- 4.1 General options
- 4.2 Reporting behavior
- 4.3 LVM-based guided partitioning
- 4.4 Creating
/
,/home
andswap
partitions - 4.5 Using a whole disk as a file system
- 4.6 Automated partitioning on selected drives
- 4.7 Installing on multiple drives
- 4.8 Mount options
- 4.9 Keeping partitions
- 4.10 Auto-detection of partitions to be kept.
- 4.11 Create LVM physical volume
- 4.12 LVM logical volumes
- 4.13 RAID10 configuration
- 4.14 RAID10 without partitions
- 4.15 Using multipath devices
- 4.16 Listing multipath devices
- 4.17 Using the WWID to identify a multipath device
- 4.18
bcache
definition - 4.19 Multi-device Btrfs configuration
- 4.20 NFS share definition
- 4.21
tmpfs
definition - 4.22 iSCSI client
- 4.23 FCoE configuration
- 4.24 Language
- 4.25 Time zone
- 4.26 Keyboard
- 4.27 Package selection in the control file with patterns and packages sections
- 4.28 Packages selection using a regular expression
- 4.29 Creating a package database with the additional package inst-source-utils.rpm
- 4.30
add_on_products.xml
- 4.31 Adding the SDK extension and a user defined repository
- 4.32 Kernel selection in the control file
- 4.33 Configuring services and targets
- 4.34 Network configuration
- 4.35 Bonding interface configuration
- 4.36 Bridge interface configuration
- 4.37 Multiple IP Addresses
- 4.38 Assigning a persistent name using the MAC address
- 4.39 Network routing configuration
- 4.40 Network configuration: proxy
- 4.41 Security configuration
- 4.42 Select the Defense Information Systems Agency Security Technical Implementation Guide
- 4.43 Minimal user configuration
- 4.44 Complex user configuration
- 4.45 Group configuration
- 4.46 Enabling autologin and password-less login
- 4.47 Dumping files into the installed system
- 4.48 Dumping files into the installed system
- 4.49 Kdump configuration
- 4.50 Disabled Kdump configuration
- 4.51 Kdump memory reservation with multiple values
- 4.52 Example firewall section
- 4.53 Importing SSH keys and configuration from /dev/sda2
- 4.54 Client/server with manual authentication
- 4.55 Client/server with preseed keys
- 4.56 Stand-alone mode
- 6.1 Simple rules file
- 6.2 Simple rules file
- 7.1 Including a file using ERB
- 7.2 Using the largest disk
- 7.3 Configure the connected network cards
- 8.1 Using the MAC address to get the profile
- 8.2 Accessing ERB helpers from a Ruby script
- 9.1 Determine HEX code for an IP address
- 9.2
linuxrc
Options in the AutoYaST control file
Copyright © 2006–2025 diff --git a/main/html/SLE-Micro-deployment/book-deployment-slemicro.html b/main/html/SLE-Micro-deployment/book-deployment-slemicro.html index b2f6384a7a..dc13b3dbbc 100644 --- a/main/html/SLE-Micro-deployment/book-deployment-slemicro.html +++ b/main/html/SLE-Micro-deployment/book-deployment-slemicro.html @@ -102,7 +102,7 @@ This guide details how to install single or multiple systems, and how to exploit the product-inherent capabilities for a deployment infrastructure. -
- Preface
- I Installation preparation
- II Pre-built image deployment
- III Manual installation
- A GNU licenses
- 11.1 The boot screen on machines with a traditional BIOS
- 11.2 The boot screen on machines with UEFI
- 11.3 GRUB options editor
- 12.1 Network settings
- 12.2 License agreement
- 12.3 Disk activation
- 12.4 DASD disk management
- 12.5 Configured zFCP Devices
- 12.6 Registration
- 12.7 Extensions
- 12.8 NTP configuration
- 12.9 Authentication for
root
- 12.10 Installation Settings
- 12.11 Suggested partitioning
- 12.12 Expert Partitioner
- 12.13 Software configuration
- 12.14 Time zone configuration
- 12.15 Booting
- 12.16 Kdump configuration
- 12.17 System overview
- 12.18 Security configuration
- 14.1 US keyboard layout
- 4.1 Configuration of a z/VM directory
- 4.2 Example domain XML file
- 4.3 Transferring the binaries via FTP
- 4.4 sles.exec
- 4.5 Supported network connection types and driver parameters
- 4.6 Network device driver parameters
- 4.7 Networking parameters
- 4.8 Parmfile for an installation from NFS with VNC and AutoYaST, with I/O device auto configuration
- 4.9 Parmfile for installation with NFS, SSH, and HSI and AutoYaST with NFS
- 4.10 Parmfile for installation in VLAN
- 12.1
regcodes.txt
- 12.2
regcodes.xml
Copyright © 2006–2025 diff --git a/main/html/SLE-Micro-deployment/index.html b/main/html/SLE-Micro-deployment/index.html index b2f6384a7a..dc13b3dbbc 100644 --- a/main/html/SLE-Micro-deployment/index.html +++ b/main/html/SLE-Micro-deployment/index.html @@ -102,7 +102,7 @@ This guide details how to install single or multiple systems, and how to exploit the product-inherent capabilities for a deployment infrastructure. -
- Preface
- I Installation preparation
- II Pre-built image deployment
- III Manual installation
- A GNU licenses
- 11.1 The boot screen on machines with a traditional BIOS
- 11.2 The boot screen on machines with UEFI
- 11.3 GRUB options editor
- 12.1 Network settings
- 12.2 License agreement
- 12.3 Disk activation
- 12.4 DASD disk management
- 12.5 Configured zFCP Devices
- 12.6 Registration
- 12.7 Extensions
- 12.8 NTP configuration
- 12.9 Authentication for
root
- 12.10 Installation Settings
- 12.11 Suggested partitioning
- 12.12 Expert Partitioner
- 12.13 Software configuration
- 12.14 Time zone configuration
- 12.15 Booting
- 12.16 Kdump configuration
- 12.17 System overview
- 12.18 Security configuration
- 14.1 US keyboard layout
- 4.1 Configuration of a z/VM directory
- 4.2 Example domain XML file
- 4.3 Transferring the binaries via FTP
- 4.4 sles.exec
- 4.5 Supported network connection types and driver parameters
- 4.6 Network device driver parameters
- 4.7 Networking parameters
- 4.8 Parmfile for an installation from NFS with VNC and AutoYaST, with I/O device auto configuration
- 4.9 Parmfile for installation with NFS, SSH, and HSI and AutoYaST with NFS
- 4.10 Parmfile for installation in VLAN
- 12.1
regcodes.txt
- 12.2
regcodes.xml
Copyright © 2006–2025 diff --git a/main/html/SLE-Micro-podman/article-podman.html b/main/html/SLE-Micro-podman/article-podman.html index 39e2718913..be2fba0f1f 100644 --- a/main/html/SLE-Micro-podman/article-podman.html +++ b/main/html/SLE-Micro-podman/article-podman.html @@ -103,7 +103,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Podman Guide #
This guide describes Podman and containers. diff --git a/main/html/SLE-Micro-podman/index.html b/main/html/SLE-Micro-podman/index.html index 39e2718913..be2fba0f1f 100644 --- a/main/html/SLE-Micro-podman/index.html +++ b/main/html/SLE-Micro-podman/index.html @@ -103,7 +103,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Podman Guide #
This guide describes Podman and containers. diff --git a/main/html/SLE-Micro-security/book-security-slemicro.html b/main/html/SLE-Micro-security/book-security-slemicro.html index 15b34df926..672a193540 100644 --- a/main/html/SLE-Micro-security/book-security-slemicro.html +++ b/main/html/SLE-Micro-security/book-security-slemicro.html @@ -97,7 +97,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- 3.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 3.2 Default configuration for the
auth
section (common-auth
) - 3.3 Default configuration for the
account
section (common-account
) - 3.4 Default configuration for the
password
section (common-password
) - 3.5 Default configuration for the
session
section (common-session
) - 3.6 pam_env.conf
Copyright © 2006–2025 diff --git a/main/html/SLE-Micro-security/index.html b/main/html/SLE-Micro-security/index.html index 15b34df926..672a193540 100644 --- a/main/html/SLE-Micro-security/index.html +++ b/main/html/SLE-Micro-security/index.html @@ -97,7 +97,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- 3.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 3.2 Default configuration for the
auth
section (common-auth
) - 3.3 Default configuration for the
account
section (common-account
) - 3.4 Default configuration for the
password
section (common-password
) - 3.5 Default configuration for the
session
section (common-session
) - 3.6 pam_env.conf
Copyright © 2006–2025 diff --git a/main/html/SLE-Micro-upgrade/book-upgrade-slemicro.html b/main/html/SLE-Micro-upgrade/book-upgrade-slemicro.html index 5c654be736..0d5f904a98 100644 --- a/main/html/SLE-Micro-upgrade/book-upgrade-slemicro.html +++ b/main/html/SLE-Micro-upgrade/book-upgrade-slemicro.html @@ -97,7 +97,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Copyright © 2006–2025 diff --git a/main/html/SLE-Micro-upgrade/index.html b/main/html/SLE-Micro-upgrade/index.html index 5c654be736..0d5f904a98 100644 --- a/main/html/SLE-Micro-upgrade/index.html +++ b/main/html/SLE-Micro-upgrade/index.html @@ -97,7 +97,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Copyright © 2006–2025 diff --git a/main/html/SLE-kubevirt/article-kubevirt.html b/main/html/SLE-kubevirt/article-kubevirt.html index 2cc85d785a..c74559fcf3 100644 --- a/main/html/SLE-kubevirt/article-kubevirt.html +++ b/main/html/SLE-kubevirt/article-kubevirt.html @@ -107,7 +107,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Using KubeVirt on SUSE Linux Enterprise
KubeVirt is a virtual machine management add-on for Kubernetes. diff --git a/main/html/SLE-kubevirt/index.html b/main/html/SLE-kubevirt/index.html index 2cc85d785a..c74559fcf3 100644 --- a/main/html/SLE-kubevirt/index.html +++ b/main/html/SLE-kubevirt/index.html @@ -107,7 +107,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Using KubeVirt on SUSE Linux Enterprise
KubeVirt is a virtual machine management add-on for Kubernetes. diff --git a/main/html/SLED-administration/book-administration.html b/main/html/SLED-administration/book-administration.html index 16ed313953..76ac8d7e03 100644 --- a/main/html/SLED-administration/book-administration.html +++ b/main/html/SLED-administration/book-administration.html @@ -111,7 +111,7 @@ like maintaining, monitoring and customizing an initially installed system.
- Preface
- I Common tasks
- 1 Bash and Bash scripts
- 2
sudo
basics - 3 Using YaST
- 4 YaST in text mode
- 5 Changing language and country settings with YaST
- 6 Managing users with YaST
- 7 YaST online update
- 8 Installing or removing software
- 9 Managing software with command line tools
- 10 System recovery and snapshot management with Snapper
- 10.1 Default setup
- 10.2 Using Snapper to undo changes
- 10.3 System rollback by booting from snapshots
- 10.4 Enabling Snapper in user home directories
- 10.5 Creating and modifying Snapper configurations
- 10.6 Manually creating and managing snapshots
- 10.7 Automatic snapshot clean-up
- 10.8 Showing exclusive disk space used by snapshots
- 10.9 Frequently asked questions
- 11 Live kernel patching with KLP
- 12 User space live patching
- 13 Transactional updates
- 14 Remote graphical sessions with VNC
- 15 File copying with RSync
- II Booting a Linux system
- III System
- 20 32-bit and 64-bit applications in a 64-bit system environment
- 21
journalctl
: query thesystemd
journal - 22
update-alternatives
: managing multiple versions of commands and files - 23 Basic networking
- 24 Printer operation
- 25 Graphical user interface
- 26 Accessing file systems with FUSE
- 27 Installing multiple kernel versions
- 28 Managing kernel modules
- 29 Dynamic kernel device management with
udev
- 29.1 The
/dev
directory - 29.2 Kernel
uevents
andudev
- 29.3 Drivers, kernel modules and devices
- 29.4 Booting and initial device setup
- 29.5 Monitoring the running
udev
daemon - 29.6 Influencing kernel device event handling with
udev
rules - 29.7 Persistent device naming
- 29.8 Files used by
udev
- 29.9 More information
- 29.1 The
- 30 Special system features
- 31 Using NetworkManager
- IV Hardware configuration
- V Services
- VI Troubleshooting
- A An example network
- B GNU licenses
- 4.1 Main window of YaST in text mode
- 4.2 The software installation module
- 6.1 YaST user and group administration
- 7.1 YaST online update
- 7.2 Viewing retracted patches and history
- 7.3 YaST online update configuration
- 8.1 Conflict management of the software manager
- 8.2 Adding a software repository
- 8.3 Update notification on GNOME desktop
- 8.4 — view
- 10.1 Boot loader: snapshots
- 14.1 vncviewer
- 14.2 Remmina's main window
- 14.3 Remote desktop preference
- 14.4 Quick-starting
- 14.5 Remmina viewing remote session
- 14.6 Reading path to the profile file
- 14.7 Remote administration
- 14.8 VNC session settings
- 14.9 Joining a persistent VNC session
- 17.1 Secure boot support
- 17.2 UEFI: secure boot process
- 18.1 GRUB 2 boot editor
- 18.2 Boot code options
- 18.3 Boot loader options
- 18.4 Kernel parameters
- 19.1 Services Manager
- 21.1 YaST systemd journal
- 23.1 Simplified layer model for TCP/IP
- 23.2 TCP/IP Ethernet packet
- 23.3 Configuring network settings
- 23.4
wicked
architecture - 25.1 Warning about a missing GNOME Shell extension
- 25.2 GNOME gTile extension activated
- 25.3 gTile tray icon
- 27.1 The YaST software manager: multiversion view
- 31.1 GNOME Network Connections dialog
- 31.2
firewalld
zones in NetworkManager - 38.1 YaST service manager
- 39.1 NTP configuration window
- 39.2 Adding a time server
- 41.1 HTML report generated by SCA tool
- 41.2 HTML report generated by SCA appliance
- 1.1 Bash configuration files for login shells
- 1.2 Bash configuration files for non-login shells
- 1.3 Special files for Bash
- 1.4 Overview of a standard directory tree
- 1.5 Useful environment variables
- 9.1 Essential RPM query options
- 9.2 RPM verify options
- 19.1 Service management commands
- 19.2 Commands for enabling and disabling services
- 19.3 System V runlevels and
systemd
target units - 23.1 Private IP address domains
- 23.2 Parameters for /etc/host.conf
- 23.3 Databases available via /etc/nsswitch.conf
- 23.4 Configuration options for NSS “databases”
- 23.5 Feature comparison between bonding and team
- 25.1 Generating PFL from fontconfig rules
- 25.2 Results from generating PFL from fontconfig rules with changed order
- 25.3 Results from generating PFL from fontconfig rules
- 30.1
ulimit
: Setting resources for the user - 40.1 Man pages—categories and descriptions
- 41.1 Comparison of features and file names in the TAR archive
- 42.1 Log files
- 42.2 System information with the
/proc
file system - 42.3 System information with the
/sys
file system
- 1.1 A shell script printing a text
- 2.1 Create a user-specific configuration file
- 2.2 Create custom configurations by grouping items
- 2.3 Simplify configurations by applying aliases
- 9.1 Zypper—list of known repositories
- 9.2
rpm -q -i wget
- 9.3 Script to search for packages
- 10.1 Example timeline configuration
- 18.1 Usage of grub2-mkconfig
- 18.2 Usage of grub2-mkrescue
- 18.3 Usage of grub2-script-check
- 18.4 Usage of grub2-once
- 19.1 List active services
- 19.2 List failed services
- 19.3 List all processes belonging to a service
- 22.1 Alternatives System of the
java
command - 23.1 Writing IP addresses
- 23.2 Linking IP addresses to the netmask
- 23.3 Sample IPv6 address
- 23.4 IPv6 address specifying the prefix length
- 23.5 Common network interfaces and some static routes
- 23.6
/var/run/netconfig/resolv.conf
- 23.7
/etc/hosts
- 23.8
/etc/networks
- 23.9
/etc/host.conf
- 23.10
/etc/nsswitch.conf
- 23.11 Output of the command ping
- 23.12 Configuration for load balancing with Network Teaming
- 23.13 Configuration for DHCP Network Teaming device
- 24.1 Error message from
lpd
- 24.2 Broadcast from the CUPS network server
- 25.1 Specifying rendering algorithms
- 25.2 Aliases and family name substitutions
- 25.3 Aliases and family name substitutions
- 25.4 Aliases and family names substitutions
- 29.1 Example
udev
rules - 30.1 Entry in /etc/crontab
- 30.2 /etc/crontab: remove time stamp files
- 30.3
ulimit
: Settings in~/.bashrc
- 41.1 Output of
hostinfo
when logging in asroot
Copyright © 2006–2025 diff --git a/main/html/SLED-administration/index.html b/main/html/SLED-administration/index.html index 16ed313953..76ac8d7e03 100644 --- a/main/html/SLED-administration/index.html +++ b/main/html/SLED-administration/index.html @@ -111,7 +111,7 @@ like maintaining, monitoring and customizing an initially installed system.
- Preface
- I Common tasks
- 1 Bash and Bash scripts
- 2
sudo
basics - 3 Using YaST
- 4 YaST in text mode
- 5 Changing language and country settings with YaST
- 6 Managing users with YaST
- 7 YaST online update
- 8 Installing or removing software
- 9 Managing software with command line tools
- 10 System recovery and snapshot management with Snapper
- 10.1 Default setup
- 10.2 Using Snapper to undo changes
- 10.3 System rollback by booting from snapshots
- 10.4 Enabling Snapper in user home directories
- 10.5 Creating and modifying Snapper configurations
- 10.6 Manually creating and managing snapshots
- 10.7 Automatic snapshot clean-up
- 10.8 Showing exclusive disk space used by snapshots
- 10.9 Frequently asked questions
- 11 Live kernel patching with KLP
- 12 User space live patching
- 13 Transactional updates
- 14 Remote graphical sessions with VNC
- 15 File copying with RSync
- II Booting a Linux system
- III System
- 20 32-bit and 64-bit applications in a 64-bit system environment
- 21
journalctl
: query thesystemd
journal - 22
update-alternatives
: managing multiple versions of commands and files - 23 Basic networking
- 24 Printer operation
- 25 Graphical user interface
- 26 Accessing file systems with FUSE
- 27 Installing multiple kernel versions
- 28 Managing kernel modules
- 29 Dynamic kernel device management with
udev
- 29.1 The
/dev
directory - 29.2 Kernel
uevents
andudev
- 29.3 Drivers, kernel modules and devices
- 29.4 Booting and initial device setup
- 29.5 Monitoring the running
udev
daemon - 29.6 Influencing kernel device event handling with
udev
rules - 29.7 Persistent device naming
- 29.8 Files used by
udev
- 29.9 More information
- 29.1 The
- 30 Special system features
- 31 Using NetworkManager
- IV Hardware configuration
- V Services
- VI Troubleshooting
- A An example network
- B GNU licenses
- 4.1 Main window of YaST in text mode
- 4.2 The software installation module
- 6.1 YaST user and group administration
- 7.1 YaST online update
- 7.2 Viewing retracted patches and history
- 7.3 YaST online update configuration
- 8.1 Conflict management of the software manager
- 8.2 Adding a software repository
- 8.3 Update notification on GNOME desktop
- 8.4 — view
- 10.1 Boot loader: snapshots
- 14.1 vncviewer
- 14.2 Remmina's main window
- 14.3 Remote desktop preference
- 14.4 Quick-starting
- 14.5 Remmina viewing remote session
- 14.6 Reading path to the profile file
- 14.7 Remote administration
- 14.8 VNC session settings
- 14.9 Joining a persistent VNC session
- 17.1 Secure boot support
- 17.2 UEFI: secure boot process
- 18.1 GRUB 2 boot editor
- 18.2 Boot code options
- 18.3 Boot loader options
- 18.4 Kernel parameters
- 19.1 Services Manager
- 21.1 YaST systemd journal
- 23.1 Simplified layer model for TCP/IP
- 23.2 TCP/IP Ethernet packet
- 23.3 Configuring network settings
- 23.4
wicked
architecture - 25.1 Warning about a missing GNOME Shell extension
- 25.2 GNOME gTile extension activated
- 25.3 gTile tray icon
- 27.1 The YaST software manager: multiversion view
- 31.1 GNOME Network Connections dialog
- 31.2
firewalld
zones in NetworkManager - 38.1 YaST service manager
- 39.1 NTP configuration window
- 39.2 Adding a time server
- 41.1 HTML report generated by SCA tool
- 41.2 HTML report generated by SCA appliance
- 1.1 Bash configuration files for login shells
- 1.2 Bash configuration files for non-login shells
- 1.3 Special files for Bash
- 1.4 Overview of a standard directory tree
- 1.5 Useful environment variables
- 9.1 Essential RPM query options
- 9.2 RPM verify options
- 19.1 Service management commands
- 19.2 Commands for enabling and disabling services
- 19.3 System V runlevels and
systemd
target units - 23.1 Private IP address domains
- 23.2 Parameters for /etc/host.conf
- 23.3 Databases available via /etc/nsswitch.conf
- 23.4 Configuration options for NSS “databases”
- 23.5 Feature comparison between bonding and team
- 25.1 Generating PFL from fontconfig rules
- 25.2 Results from generating PFL from fontconfig rules with changed order
- 25.3 Results from generating PFL from fontconfig rules
- 30.1
ulimit
: Setting resources for the user - 40.1 Man pages—categories and descriptions
- 41.1 Comparison of features and file names in the TAR archive
- 42.1 Log files
- 42.2 System information with the
/proc
file system - 42.3 System information with the
/sys
file system
- 1.1 A shell script printing a text
- 2.1 Create a user-specific configuration file
- 2.2 Create custom configurations by grouping items
- 2.3 Simplify configurations by applying aliases
- 9.1 Zypper—list of known repositories
- 9.2
rpm -q -i wget
- 9.3 Script to search for packages
- 10.1 Example timeline configuration
- 18.1 Usage of grub2-mkconfig
- 18.2 Usage of grub2-mkrescue
- 18.3 Usage of grub2-script-check
- 18.4 Usage of grub2-once
- 19.1 List active services
- 19.2 List failed services
- 19.3 List all processes belonging to a service
- 22.1 Alternatives System of the
java
command - 23.1 Writing IP addresses
- 23.2 Linking IP addresses to the netmask
- 23.3 Sample IPv6 address
- 23.4 IPv6 address specifying the prefix length
- 23.5 Common network interfaces and some static routes
- 23.6
/var/run/netconfig/resolv.conf
- 23.7
/etc/hosts
- 23.8
/etc/networks
- 23.9
/etc/host.conf
- 23.10
/etc/nsswitch.conf
- 23.11 Output of the command ping
- 23.12 Configuration for load balancing with Network Teaming
- 23.13 Configuration for DHCP Network Teaming device
- 24.1 Error message from
lpd
- 24.2 Broadcast from the CUPS network server
- 25.1 Specifying rendering algorithms
- 25.2 Aliases and family name substitutions
- 25.3 Aliases and family name substitutions
- 25.4 Aliases and family names substitutions
- 29.1 Example
udev
rules - 30.1 Entry in /etc/crontab
- 30.2 /etc/crontab: remove time stamp files
- 30.3
ulimit
: Settings in~/.bashrc
- 41.1 Output of
hostinfo
when logging in asroot
Copyright © 2006–2025 diff --git a/main/html/SLED-deployment/book-deployment.html b/main/html/SLED-deployment/book-deployment.html index b01f6348c1..b71b0c6483 100644 --- a/main/html/SLED-deployment/book-deployment.html +++ b/main/html/SLED-deployment/book-deployment.html @@ -106,7 +106,7 @@ This guide details how to install single or multiple systems, and how to exploit the product-inherent capabilities for a deployment infrastructure. -
- Preface
- I Installation preparation
- II Installation procedure
- 4 Boot parameters
- 5 Installation steps
- 5.1 Overview
- 5.2 Installer self-update
- 5.3 Language, keyboard and product selection diff --git a/main/html/SLED-deployment/index.html b/main/html/SLED-deployment/index.html index b01f6348c1..b71b0c6483 100644 --- a/main/html/SLED-deployment/index.html +++ b/main/html/SLED-deployment/index.html @@ -106,7 +106,7 @@ This guide details how to install single or multiple systems, and how to exploit the product-inherent capabilities for a deployment infrastructure. -
- Preface
- I Installation preparation
- II Installation procedure
- 4 Boot parameters
- 5 Installation steps
- 5.1 Overview
- 5.2 Installer self-update
- 5.3
Language, keyboard and product selection
diff --git a/main/html/SLED-gnome-user/book-gnome-user.html b/main/html/SLED-gnome-user/book-gnome-user.html
index 9340f49cc1..9010899ab7 100644
--- a/main/html/SLED-gnome-user/book-gnome-user.html
+++ b/main/html/SLED-gnome-user/book-gnome-user.html
@@ -104,7 +104,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7This guide introduces the GNOME desktop of SUSE Linux Enterprise Desktop. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- 9 LibreOffice: the office suite
- 9.1 LibreOffice modules
- 9.2 Starting LibreOffice
- 9.3 The LibreOffice user interface
- 9.4 Compatibility with other office applications
- 9.5 Saving files with a password
- 9.6 Signing documents
- 9.7 Customizing LibreOffice
- 9.8 Changing the global settings
- 9.9 Using templates
- 9.10 Setting metadata and properties
- 9.11 More information
- 10 LibreOffice Writer
- 11 LibreOffice Calc
- 12 LibreOffice Impress, Base, Draw, and Math
- 9 LibreOffice: the office suite
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 GNOME Background settings
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Configuring sound settings
- 3.6 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
diff --git a/main/html/SLED-gnome-user/index.html b/main/html/SLED-gnome-user/index.html
index 9340f49cc1..9010899ab7 100644
--- a/main/html/SLED-gnome-user/index.html
+++ b/main/html/SLED-gnome-user/index.html
@@ -104,7 +104,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7This guide introduces the GNOME desktop of SUSE Linux Enterprise Desktop. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- 9 LibreOffice: the office suite
- 9.1 LibreOffice modules
- 9.2 Starting LibreOffice
- 9.3 The LibreOffice user interface
- 9.4 Compatibility with other office applications
- 9.5 Saving files with a password
- 9.6 Signing documents
- 9.7 Customizing LibreOffice
- 9.8 Changing the global settings
- 9.9 Using templates
- 9.10 Setting metadata and properties
- 9.11 More information
- 10 LibreOffice Writer
- 11 LibreOffice Calc
- 12 LibreOffice Impress, Base, Draw, and Math
- 9 LibreOffice: the office suite
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 GNOME Background settings
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Configuring sound settings
- 3.6 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
diff --git a/main/html/SLED-installation/article-installation.html b/main/html/SLED-installation/article-installation.html
index e1f8831b6e..14a7c061f8 100644
--- a/main/html/SLED-installation/article-installation.html
+++ b/main/html/SLED-installation/article-installation.html
@@ -99,7 +99,7 @@
});
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7Installation Quick Start #
Publication Date: - January 07, 2025 + January 09, 2025This Quick Start guides you step by step diff --git a/main/html/SLED-installation/index.html b/main/html/SLED-installation/index.html index e1f8831b6e..14a7c061f8 100644 --- a/main/html/SLED-installation/index.html +++ b/main/html/SLED-installation/index.html @@ -99,7 +99,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7Installation Quick Start #
Publication Date: - January 07, 2025 + January 09, 2025This Quick Start guides you step by step diff --git a/main/html/SLED-modules/article-modules.html b/main/html/SLED-modules/article-modules.html index 7d4e0f2b64..d24e243c0c 100644 --- a/main/html/SLED-modules/article-modules.html +++ b/main/html/SLED-modules/article-modules.html @@ -103,7 +103,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7Modules and Extensions Quick Start
Publication Date: - January 07, 2025 + January 09, 2025This Quick Start gives you an overview of the @@ -274,7 +274,7 @@
Dependencies: Basesystem
- Availability: SLES, SLES for SAP, SLE RT SLED + Availability: SLES, SLES for SAP, SLE RT, SLED
Lifecycle: None
diff --git a/main/html/SLED-modules/index.html b/main/html/SLED-modules/index.html index 7d4e0f2b64..d24e243c0c 100644 --- a/main/html/SLED-modules/index.html +++ b/main/html/SLED-modules/index.html @@ -103,7 +103,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7Modules and Extensions Quick Start
Publication Date: - January 07, 2025 + January 09, 2025This Quick Start gives you an overview of the @@ -274,7 +274,7 @@
Dependencies: Basesystem
- Availability: SLES, SLES for SAP, SLE RT SLED + Availability: SLES, SLES for SAP, SLE RT, SLED
Lifecycle: None
diff --git a/main/html/SLED-security/book-security.html b/main/html/SLED-security/book-security.html index 951d9b2533..68419788e8 100644 --- a/main/html/SLED-security/book-security.html +++ b/main/html/SLED-security/book-security.html @@ -105,7 +105,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7This guide introduces basic concepts of system security and describes the usage of security software included with the product, such as AppArmor, SELinux, or the auditing system. The guide also supports system - administrators in hardening an installation.
Publication Date: January 07, 2025 + administrators in hardening an installation.Publication Date: January 09, 2025- Preface
- 1 Security and confidentiality
- I Authentication
- 2 Authentication with PAM
- 3 Using NIS
- 4 Setting up authentication clients using YaST
- 5 LDAP with 389 Directory Server
- 5.1 Structure of an LDAP directory tree
- 5.2 Creating and managing a Docker container for 389 Directory Server
- 5.3 Installing 389 Directory Server
- 5.4 Firewall configuration
- 5.5 Backing up and restoring 389 Directory Server
- 5.6 Managing LDAP users and groups
- 5.7 Managing plug-ins
- 5.8 Using SSSD to manage LDAP authentication
- 5.9 Migrating to 389 Directory Server from OpenLDAP
- 5.10 Importing TLS server certificates and keys
- 5.11 Setting up replication
- 5.12 Synchronizing with Microsoft Active Directory
- 5.13 More information
- 6 Network authentication with Kerberos
- 7 Active Directory support
- 8 Setting up a freeRADIUS server
- II Local security
- 9 Physical security
- 10 Software management
- 11 File management
- 12 Encrypting partitions and files
- 13 Storage encryption for hosted applications with cryptctl
- 13.1 Setting up a
cryptctl
server - 13.2 Setting up a
cryptctl
client - 13.3 Configuring /etc/fstab for LUKS volumes
- 13.4 Checking partition unlock status using server-side commands
- 13.5 Unlocking encrypted partitions manually
- 13.6 Maintenance downtime procedure
- 13.7 Setting up an HA environment for cryptctl-server service
- 13.8 More information
- 13.1 Setting up a
- 14 User management
- 14.1 Various account checks
- 14.2 Enabling password aging
- 14.3 Stronger password enforcement
- 14.4 Password and login management with PAM
- 14.5 Restricting
root
logins - 14.6 Restricting
sudo
users - 14.7 Setting an inactivity timeout for interactive shell sessions
- 14.8 Preventing accidental denial of service
- 14.9 Displaying login banners
- 14.10 Connection accounting utilities
- 15 Restricting
cron
andat
- 16 Spectre/Meltdown checker
- 17 Configuring security settings with YaST
- 18 The Polkit authentication framework
- 19 Access control lists in Linux
- 20 Intrusion detection with AIDE
- III Network security
- 21 X Window System and X authentication
- 22 Securing network operations with OpenSSH
- 22.1 OpenSSH overview
- 22.2 Server hardening
- 22.3 Password authentication
- 22.4 Managing user and host encryption keys
- 22.5 Rotating host keys
- 22.6 Public key authentication
- 22.7 Passphrase-less public key authentication
- 22.8 OpenSSH certificate authentication
- 22.9 Automated public key logins with gnome-keyring
- 22.10 Automated public key logins with ssh-agent
- 22.11 Changing an SSH private key passphrase
- 22.12 Retrieving a key fingerprint
- 22.13 Starting X11 applications on a remote host
- 22.14 Agent forwarding
- 22.15
scp
—secure copy - 22.16
sftp
—secure file transfer - 22.17 Port forwarding (SSH tunneling)
- 22.18 More information
- 22.19 Stopping SSH brute force attacks with Fail2Ban
- 23 Masquerading and firewalls
- 24 Configuring a VPN server
- 25 Managing a PKI with XCA, X certificate and key manager
- 26 Improving network security with
sysctl
variables
- IV Regulations and compliance
- V Confining privileges with AppArmor
- 29 Introducing AppArmor
- 30 Getting started
- 31 Immunizing programs
- 32 Profile components and syntax
- 32.1 Breaking an AppArmor profile into its parts
- 32.2 Profile types
- 32.3 Include statements
- 32.4 Capability entries (POSIX.1e)
- 32.5 Network access control
- 32.6 Profile names, flags, paths, and globbing
- 32.7 File permission access modes
- 32.8 Mount rules
- 32.9 Pivot root rules
- 32.10 PTrace rules
- 32.11 Signal rules
- 32.12 Execute modes
- 32.13 Resource limit control
- 32.14 Auditing rules
- 33 AppArmor profile repositories
- 34 Building and managing profiles with YaST
- 35 Building profiles from the command line
- 36 Profiling your Web applications using ChangeHat
- 37 Confining users with
pam_apparmor
- 38 Managing profiled applications
- 39 Support
- 40 AppArmor glossary
- VI The Linux Audit Framework
- 41 Understanding Linux audit
- 41.1 Introducing the components of Linux audit
- 41.2 Configuring the audit daemon
- 41.3 Controlling the audit system using
auditctl
- 41.4 Passing parameters to the audit system
- 41.5 Understanding the audit logs and generating reports
- 41.6 Querying the audit daemon logs with
ausearch
- 41.7 Analyzing processes with
autrace
- 41.8 Visualizing audit data
- 41.9 Relaying audit event notifications
- 42 Setting up the Linux audit framework
- 43 Introducing an audit rule set
- 43.1 Adding basic audit configuration parameters
- 43.2 Adding watches on audit log files and configuration files
- 43.3 Monitoring file system objects
- 43.4 Monitoring security configuration files and databases
- 43.5 Monitoring miscellaneous system calls
- 43.6 Filtering system call arguments
- 43.7 Managing audit event records using keys
- 44 Useful resources
- 41 Understanding Linux audit
- A GNU licenses
List of Figures- 3.1 Setting domain and address of a NIS server
- 5.1 Structure of an LDAP directory
- 7.1 Schema of Winbind-based Active Directory authentication
- 7.2 Main window of
- 7.3 Enrolling into a domain
- 7.4 Configuration window of
- 7.5 Determining Windows domain membership
- 7.6 Providing administrator credentials
- 13.1 Key retrieval with
cryptctl
(model without connection to KMIP server) - 16.1 Output from spectre-meltdown-checker
- 17.1 YaST security center and hardening: security overview
- 19.1 Minimum ACL: ACL entries compared to permission bits
- 19.2 Extended ACL: ACL entries compared to permission bits
- 22.1 jail.local file settings
- 23.1 iptables: a packet's possible paths
- 24.1 Routed VPN
- 24.2 Bridged VPN - scenario 1
- 24.3 Bridged VPN - scenario 2
- 24.4 Bridged VPN - scenario 3
- 25.1 Create a new XCA database
- 35.1
aa-notify Message in GNOME
- 36.1 Adminer login page
- 41.1 Introducing the components of Linux audit
- 41.2 Flow graph—program versus system call relationship
- 41.3 Bar chart—common event types
List of Tables- 5.1 Commonly used object classes and attributes
- 13.1 List of all parameters to define the resource group with the cryptctl crm script.
- 14.1 Sample rules/constraints for password enforcement
- 19.1 ACL entry types
- 19.2 Masking access permissions
- 20.1 Important AIDE check boxes
- 23.1 Important sysconfig variables for static port configuration
- 39.1 Man pages: sections and categories
- 41.1 Audit status flags
List of Examples- 2.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default configuration for the
auth
section (common-auth
) - 2.3 Default configuration for the
account
section (common-account
) - 2.4 Default configuration for the
password
section (common-password
) - 2.5 Default configuration for the
session
section (common-session
) - 2.6 pam_env.conf
- 5.1 Excerpt from CN=schema
- 5.2 Minimal 389 Directory Server instance configuration file
- 5.3 A
.dsrc
file for local administration - 5.4 Two supplier replicas
- 5.5 Four supplier replicas
- 5.6 Six replicas
- 5.7 Six replicas with read-only consumers
- 9.1 Configuration
- 22.1 Example sshd_config
- 23.1 Callback port configuration for the
nfs
kernel module in/etc/modprobe.d/60-nfs.conf
- 23.2 Commands to define a new
firewalld
RPC service for NFS - 24.1 VPN server configuration file
- 24.2 VPN client configuration file
- 30.1 Output of
aa-unconfined
- 35.1 Learning mode exception: controlling access to specific resources
- 35.2 Learning mode exception: defining permissions for an entry
- 41.1 Default /etc/audit/auditd.conf
- 41.2 Example output of
auditctl
-s
- 41.3 Example audit rules—audit system parameters
- 41.4 Example audit rules—file system auditing
- 41.5 Example audit rules—system call auditing
- 41.6 Deleting audit rules and events
- 41.7 Listing rules with
auditctl
-l
- 41.8 A simple audit event—viewing the audit log
- 41.9 An advanced audit event—login via SSH
- 41.10 Example /etc/audit/auditd.conf
- 41.11 Example /etc/audit/plugins.d/syslog.conf
Copyright © 2006–2025 diff --git a/main/html/SLED-security/index.html b/main/html/SLED-security/index.html index 951d9b2533..68419788e8 100644 --- a/main/html/SLED-security/index.html +++ b/main/html/SLED-security/index.html @@ -105,7 +105,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7This guide introduces basic concepts of system security and describes the usage of security software included with the product, such as AppArmor, SELinux, or the auditing system. The guide also supports system - administrators in hardening an installation.
Publication Date: January 07, 2025 + administrators in hardening an installation.Publication Date: January 09, 2025- Preface
- 1 Security and confidentiality
- I Authentication
- 2 Authentication with PAM
- 3 Using NIS
- 4 Setting up authentication clients using YaST
- 5 LDAP with 389 Directory Server
- 5.1 Structure of an LDAP directory tree
- 5.2 Creating and managing a Docker container for 389 Directory Server
- 5.3 Installing 389 Directory Server
- 5.4 Firewall configuration
- 5.5 Backing up and restoring 389 Directory Server
- 5.6 Managing LDAP users and groups
- 5.7 Managing plug-ins
- 5.8 Using SSSD to manage LDAP authentication
- 5.9 Migrating to 389 Directory Server from OpenLDAP
- 5.10 Importing TLS server certificates and keys
- 5.11 Setting up replication
- 5.12 Synchronizing with Microsoft Active Directory
- 5.13 More information
- 6 Network authentication with Kerberos
- 7 Active Directory support
- 8 Setting up a freeRADIUS server
- II Local security
- 9 Physical security
- 10 Software management
- 11 File management
- 12 Encrypting partitions and files
- 13 Storage encryption for hosted applications with cryptctl
- 13.1 Setting up a
cryptctl
server - 13.2 Setting up a
cryptctl
client - 13.3 Configuring /etc/fstab for LUKS volumes
- 13.4 Checking partition unlock status using server-side commands
- 13.5 Unlocking encrypted partitions manually
- 13.6 Maintenance downtime procedure
- 13.7 Setting up an HA environment for cryptctl-server service
- 13.8 More information
- 13.1 Setting up a
- 14 User management
- 14.1 Various account checks
- 14.2 Enabling password aging
- 14.3 Stronger password enforcement
- 14.4 Password and login management with PAM
- 14.5 Restricting
root
logins - 14.6 Restricting
sudo
users - 14.7 Setting an inactivity timeout for interactive shell sessions
- 14.8 Preventing accidental denial of service
- 14.9 Displaying login banners
- 14.10 Connection accounting utilities
- 15 Restricting
cron
andat
- 16 Spectre/Meltdown checker
- 17 Configuring security settings with YaST
- 18 The Polkit authentication framework
- 19 Access control lists in Linux
- 20 Intrusion detection with AIDE
- III Network security
- 21 X Window System and X authentication
- 22 Securing network operations with OpenSSH
- 22.1 OpenSSH overview
- 22.2 Server hardening
- 22.3 Password authentication
- 22.4 Managing user and host encryption keys
- 22.5 Rotating host keys
- 22.6 Public key authentication
- 22.7 Passphrase-less public key authentication
- 22.8 OpenSSH certificate authentication
- 22.9 Automated public key logins with gnome-keyring
- 22.10 Automated public key logins with ssh-agent
- 22.11 Changing an SSH private key passphrase
- 22.12 Retrieving a key fingerprint
- 22.13 Starting X11 applications on a remote host
- 22.14 Agent forwarding
- 22.15
scp
—secure copy - 22.16
sftp
—secure file transfer - 22.17 Port forwarding (SSH tunneling)
- 22.18 More information
- 22.19 Stopping SSH brute force attacks with Fail2Ban
- 23 Masquerading and firewalls
- 24 Configuring a VPN server
- 25 Managing a PKI with XCA, X certificate and key manager
- 26 Improving network security with
sysctl
variables
- IV Regulations and compliance
- V Confining privileges with AppArmor
- 29 Introducing AppArmor
- 30 Getting started
- 31 Immunizing programs
- 32 Profile components and syntax
- 32.1 Breaking an AppArmor profile into its parts
- 32.2 Profile types
- 32.3 Include statements
- 32.4 Capability entries (POSIX.1e)
- 32.5 Network access control
- 32.6 Profile names, flags, paths, and globbing
- 32.7 File permission access modes
- 32.8 Mount rules
- 32.9 Pivot root rules
- 32.10 PTrace rules
- 32.11 Signal rules
- 32.12 Execute modes
- 32.13 Resource limit control
- 32.14 Auditing rules
- 33 AppArmor profile repositories
- 34 Building and managing profiles with YaST
- 35 Building profiles from the command line
- 36 Profiling your Web applications using ChangeHat
- 37 Confining users with
pam_apparmor
- 38 Managing profiled applications
- 39 Support
- 40 AppArmor glossary
- VI The Linux Audit Framework
- 41 Understanding Linux audit
- 41.1 Introducing the components of Linux audit
- 41.2 Configuring the audit daemon
- 41.3 Controlling the audit system using
auditctl
- 41.4 Passing parameters to the audit system
- 41.5 Understanding the audit logs and generating reports
- 41.6 Querying the audit daemon logs with
ausearch
- 41.7 Analyzing processes with
autrace
- 41.8 Visualizing audit data
- 41.9 Relaying audit event notifications
- 42 Setting up the Linux audit framework
- 43 Introducing an audit rule set
- 43.1 Adding basic audit configuration parameters
- 43.2 Adding watches on audit log files and configuration files
- 43.3 Monitoring file system objects
- 43.4 Monitoring security configuration files and databases
- 43.5 Monitoring miscellaneous system calls
- 43.6 Filtering system call arguments
- 43.7 Managing audit event records using keys
- 44 Useful resources
- 41 Understanding Linux audit
- A GNU licenses
List of Figures- 3.1 Setting domain and address of a NIS server
- 5.1 Structure of an LDAP directory
- 7.1 Schema of Winbind-based Active Directory authentication
- 7.2 Main window of
- 7.3 Enrolling into a domain
- 7.4 Configuration window of
- 7.5 Determining Windows domain membership
- 7.6 Providing administrator credentials
- 13.1 Key retrieval with
cryptctl
(model without connection to KMIP server) - 16.1 Output from spectre-meltdown-checker
- 17.1 YaST security center and hardening: security overview
- 19.1 Minimum ACL: ACL entries compared to permission bits
- 19.2 Extended ACL: ACL entries compared to permission bits
- 22.1 jail.local file settings
- 23.1 iptables: a packet's possible paths
- 24.1 Routed VPN
- 24.2 Bridged VPN - scenario 1
- 24.3 Bridged VPN - scenario 2
- 24.4 Bridged VPN - scenario 3
- 25.1 Create a new XCA database
- 35.1
aa-notify Message in GNOME
- 36.1 Adminer login page
- 41.1 Introducing the components of Linux audit
- 41.2 Flow graph—program versus system call relationship
- 41.3 Bar chart—common event types
List of Tables- 5.1 Commonly used object classes and attributes
- 13.1 List of all parameters to define the resource group with the cryptctl crm script.
- 14.1 Sample rules/constraints for password enforcement
- 19.1 ACL entry types
- 19.2 Masking access permissions
- 20.1 Important AIDE check boxes
- 23.1 Important sysconfig variables for static port configuration
- 39.1 Man pages: sections and categories
- 41.1 Audit status flags
List of Examples- 2.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default configuration for the
auth
section (common-auth
) - 2.3 Default configuration for the
account
section (common-account
) - 2.4 Default configuration for the
password
section (common-password
) - 2.5 Default configuration for the
session
section (common-session
) - 2.6 pam_env.conf
- 5.1 Excerpt from CN=schema
- 5.2 Minimal 389 Directory Server instance configuration file
- 5.3 A
.dsrc
file for local administration - 5.4 Two supplier replicas
- 5.5 Four supplier replicas
- 5.6 Six replicas
- 5.7 Six replicas with read-only consumers
- 9.1 Configuration
- 22.1 Example sshd_config
- 23.1 Callback port configuration for the
nfs
kernel module in/etc/modprobe.d/60-nfs.conf
- 23.2 Commands to define a new
firewalld
RPC service for NFS - 24.1 VPN server configuration file
- 24.2 VPN client configuration file
- 30.1 Output of
aa-unconfined
- 35.1 Learning mode exception: controlling access to specific resources
- 35.2 Learning mode exception: defining permissions for an entry
- 41.1 Default /etc/audit/auditd.conf
- 41.2 Example output of
auditctl
-s
- 41.3 Example audit rules—audit system parameters
- 41.4 Example audit rules—file system auditing
- 41.5 Example audit rules—system call auditing
- 41.6 Deleting audit rules and events
- 41.7 Listing rules with
auditctl
-l
- 41.8 A simple audit event—viewing the audit log
- 41.9 An advanced audit event—login via SSH
- 41.10 Example /etc/audit/auditd.conf
- 41.11 Example /etc/audit/plugins.d/syslog.conf
Copyright © 2006–2025 diff --git a/main/html/SLED-tuning/book-tuning.html b/main/html/SLED-tuning/book-tuning.html index 7ee6abc1be..eb5f715d6e 100644 --- a/main/html/SLED-tuning/book-tuning.html +++ b/main/html/SLED-tuning/book-tuning.html @@ -107,7 +107,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7This guide supports administrators in problem detection, - resolution and optimization.
Publication Date: January 07, 2025 + resolution and optimization.Publication Date: January 09, 2025- Preface
- I Basics
- II System monitoring
- III Kernel monitoring
- IV Resource management
- V Kernel tuning
- VI Handling system dumps
- VII Synchronized clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
output on a lightly used machine - 2.2
vmstat
output on a heavily used machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap script
- 4.2 Probe with timer event
- 4.3
printf
Function with format specifiers - 4.4 Using global variables
- 4.5 Monitoring incoming TCP connections with
tcp_connections.stp
- 12.1 Example output of
cpupower frequency-info
- 12.2 Example output of
cpupower idle-info
- 12.3 Example
cpupower monitor
output - 20.1 Slave clock using software time stamping
- 20.2 Slave clock using hardware time stamping
- 20.3 Master clock using hardware time stamping
- 20.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2025 diff --git a/main/html/SLED-tuning/index.html b/main/html/SLED-tuning/index.html index 7ee6abc1be..eb5f715d6e 100644 --- a/main/html/SLED-tuning/index.html +++ b/main/html/SLED-tuning/index.html @@ -107,7 +107,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7This guide supports administrators in problem detection, - resolution and optimization.
Publication Date: January 07, 2025 + resolution and optimization.Publication Date: January 09, 2025- Preface
- I Basics
- II System monitoring
- III Kernel monitoring
- IV Resource management
- V Kernel tuning
- VI Handling system dumps
- VII Synchronized clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
output on a lightly used machine - 2.2
vmstat
output on a heavily used machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap script
- 4.2 Probe with timer event
- 4.3
printf
Function with format specifiers - 4.4 Using global variables
- 4.5 Monitoring incoming TCP connections with
tcp_connections.stp
- 12.1 Example output of
cpupower frequency-info
- 12.2 Example output of
cpupower idle-info
- 12.3 Example
cpupower monitor
output - 20.1 Slave clock using software time stamping
- 20.2 Slave clock using hardware time stamping
- 20.3 Master clock using hardware time stamping
- 20.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2025 diff --git a/main/html/SLED-upgrade/book-upgrade.html b/main/html/SLED-upgrade/book-upgrade.html index 354b00a19c..f3072449aa 100644 --- a/main/html/SLED-upgrade/book-upgrade.html +++ b/main/html/SLED-upgrade/book-upgrade.html @@ -101,7 +101,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7This book guides you through upgrades of SUSE Linux Enterprise Desktop. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- 1 Lifecycle and support
- 2 Upgrade paths and methods
- 3 Preparing the upgrade
- 3.1 Make sure the system is up-to-date
- 3.2 Read the release notes
- 3.3 Make a backup
- 3.4 Check the available disk space
- 3.5 Listing installed packages and repositories
- 3.6 Disable the LTSS extension
- 3.7 Create non-MD5 server certificates for Java applications
- 3.8 Shut down virtual machine guests
- 3.9 Adjust your SMT client setup
- 3.10 Adjust the
resume
boot parameter
- 4 Upgrading offline
- 5 Upgrading online
- 6 Finishing the upgrade
- 7 Backports of source code
- A GNU licenses
List of FiguresList of TablesList of ExamplesCopyright © 2006–2025 diff --git a/main/html/SLED-upgrade/index.html b/main/html/SLED-upgrade/index.html index 354b00a19c..f3072449aa 100644 --- a/main/html/SLED-upgrade/index.html +++ b/main/html/SLED-upgrade/index.html @@ -101,7 +101,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP7This book guides you through upgrades of SUSE Linux Enterprise Desktop. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- 1 Lifecycle and support
- 2 Upgrade paths and methods
- 3 Preparing the upgrade
- 3.1 Make sure the system is up-to-date
- 3.2 Read the release notes
- 3.3 Make a backup
- 3.4 Check the available disk space
- 3.5 Listing installed packages and repositories
- 3.6 Disable the LTSS extension
- 3.7 Create non-MD5 server certificates for Java applications
- 3.8 Shut down virtual machine guests
- 3.9 Adjust your SMT client setup
- 3.10 Adjust the
resume
boot parameter
- 4 Upgrading offline
- 5 Upgrading online
- 6 Finishing the upgrade
- 7 Backports of source code
- A GNU licenses
List of FiguresList of TablesList of ExamplesCopyright © 2006–2025 diff --git a/main/html/SLES-administration/book-administration.html b/main/html/SLES-administration/book-administration.html index a4ef2e7a37..82d8d6da44 100644 --- a/main/html/SLES-administration/book-administration.html +++ b/main/html/SLES-administration/book-administration.html @@ -111,7 +111,7 @@ like maintaining, monitoring and customizing an initially installed system.
Publication Date: - January 07, 2025 + January 09, 2025- Preface
- I Common tasks
- 1 Bash and Bash scripts
- 2
sudo
basics - 3 Using YaST
- 4 YaST in text mode
- 5 Changing language and country settings with YaST
- 6 Managing users with YaST
- 7 YaST online update
- 8 Installing or removing software
- 9 Managing software with command line tools
- 10 System recovery and snapshot management with Snapper
- 10.1 Default setup
- 10.2 Using Snapper to undo changes
- 10.3 System rollback by booting from snapshots
- 10.4 Enabling Snapper in user home directories
- 10.5 Creating and modifying Snapper configurations
- 10.6 Manually creating and managing snapshots
- 10.7 Automatic snapshot clean-up
- 10.8 Showing exclusive disk space used by snapshots
- 10.9 Frequently asked questions
- 11 Live kernel patching with KLP
- 12 User space live patching
- 13 Transactional updates
- 14 Remote graphical sessions with VNC
- 15 File copying with RSync
- II Booting a Linux system
- III System
- 20 32-bit and 64-bit applications in a 64-bit system environment
- 21
journalctl
: query thesystemd
journal - 22
update-alternatives
: managing multiple versions of commands and files - 23 Basic networking
- 23.1 IP addresses and routing
- 23.2 IPv6—the next generation Internet
- 23.3 Name resolution
- 23.4 Configuring a network connection with YaST
- 23.5 Configuring a network connection manually
- 23.6 Basic router setup
- 23.7 Setting up bonding devices
- 23.8 Setting up team devices for Network Teaming
- 23.9 Software-defined networking with Open vSwitch
- 24 Printer operation
- 25 Graphical user interface
- 26 Accessing file systems with FUSE
- 27 Installing multiple kernel versions
- 28 Managing kernel modules
- 29 Dynamic kernel device management with
udev
- 29.1 The
/dev
directory - 29.2 Kernel
uevents
andudev
- 29.3 Drivers, kernel modules and devices
- 29.4 Booting and initial device setup
- 29.5 Monitoring the running
udev
daemon - 29.6 Influencing kernel device event handling with
udev
rules - 29.7 Persistent device naming
- 29.8 Files used by
udev
- 29.9 More information
- 29.1 The
- 30 Special system features
- 31 Using NetworkManager
- IV Hardware configuration
- V Services
- 37 Service management with YaST
- 38 Time synchronization with NTP
- 39 The domain name system
- 40 DHCP
- 41 SLP
- 42 The Apache HTTP server
- 42.1 Quick start
- 42.2 Configuring Apache
- 42.3 Starting and stopping Apache
- 42.4 Installing, activating and configuring modules
- 42.5 Enabling CGI scripts
- 42.6 Setting up a secure Web server with SSL
- 42.7 Running multiple Apache instances on the same server
- 42.8 Avoiding security problems
- 42.9 Troubleshooting
- 42.10 More information
- 43 Setting up an FTP server with YaST
- 44 Squid caching proxy server
- 44.1 Facts about proxy servers
- 44.2 System requirements
- 44.3 Basic usage of Squid
- 44.4 The YaST Squid module
- 44.5 The Squid configuration file
- 44.6 Configuring a transparent proxy
- 44.7 Using the Squid cache manager CGI interface (
cachemgr.cgi
) - 44.8 Cache report generation with Calamaris
- 44.9 More Information
- 45 Web Based Enterprise Management using SFCB
- VI Troubleshooting
- A An example network
- B GNU licenses
List of Figures- 4.1 Main window of YaST in text mode
- 4.2 The software installation module
- 6.1 YaST user and group administration
- 7.1 YaST online update
- 7.2 Viewing retracted patches and history
- 7.3 YaST online update configuration
- 8.1 Conflict management of the software manager
- 8.2 Adding a software repository
- 8.3 Update notification on GNOME desktop
- 8.4 — view
- 10.1 Boot loader: snapshots
- 14.1 vncviewer
- 14.2 Remmina's main window
- 14.3 Remote desktop preference
- 14.4 Quick-starting
- 14.5 Remmina viewing remote session
- 14.6 Reading path to the profile file
- 14.7 Remote administration
- 14.8 VNC session settings
- 14.9 Joining a persistent VNC session
- 17.1 Secure boot support
- 17.2 UEFI: secure boot process
- 18.1 GRUB 2 boot editor
- 18.2 Boot code options
- 18.3 Boot loader options
- 18.4 Kernel parameters
- 19.1 Services Manager
- 21.1 YaST systemd journal
- 23.1 Simplified layer model for TCP/IP
- 23.2 TCP/IP Ethernet packet
- 23.3 Configuring network settings
- 23.4
wicked
architecture - 27.1 The YaST software manager: multiversion view
- 31.1 GNOME Network Connections dialog
- 31.2
firewalld
zones in NetworkManager - 37.1 YaST service manager
- 38.1 NTP configuration window
- 38.2 Adding a time server
- 39.1 DNS server installation: forwarder settings
- 39.2 DNS server installation: DNS zones
- 39.3 DNS server installation: finish wizard
- 39.4 DNS server: logging
- 39.5 DNS server: Zone Editor (Basics)
- 39.6 DNS server: Zone Editor (NS Records)
- 39.7 DNS server: Zone Editor (MX Records)
- 39.8 DNS server: Zone Editor (SOA)
- 39.9 Adding a record for a primary zone
- 39.10 Adding a reverse zone
- 39.11 Adding a reverse record
- 40.1 DHCP server: card selection
- 40.2 DHCP server: global settings
- 40.3 DHCP server: dynamic DHCP
- 40.4 DHCP server: start-up
- 40.5 DHCP server: host management
- 40.6 DHCP server: chroot jail and declarations
- 40.7 DHCP server: selecting a declaration type
- 40.8 DHCP server: configuring subnets
- 40.9 DHCP server: TSIG configuration
- 40.10 DHCP server: interface configuration for dynamic DNS
- 40.11 DHCP server: network interface and firewall
- 42.1 HTTP server wizard: default host
- 42.2 HTTP server wizard: summary
- 42.3 HTTP server configuration: listen ports and addresses
- 42.4 HTTP server configuration: server modules
- 43.1 FTP server configuration — start-up
- 47.1 HTML report generated by SCA tool
- 47.2 HTML report generated by SCA appliance
List of Tables- 1.1 Bash configuration files for login shells
- 1.2 Bash configuration files for non-login shells
- 1.3 Special files for Bash
- 1.4 Overview of a standard directory tree
- 1.5 Useful environment variables
- 9.1 Essential RPM query options
- 9.2 RPM verify options
- 19.1 Service management commands
- 19.2 Commands for enabling and disabling services
- 19.3 System V runlevels and
systemd
target units - 23.1 Private IP address domains
- 23.2 Parameters for /etc/host.conf
- 23.3 Databases available via /etc/nsswitch.conf
- 23.4 Configuration options for NSS “databases”
- 23.5 Feature comparison between bonding and team
- 25.1 Generating PFL from fontconfig rules
- 25.2 Results from generating PFL from fontconfig rules with changed order
- 25.3 Results from generating PFL from fontconfig rules
- 30.1
ulimit
: Setting resources for the user - 45.1 Commands for managing sfcbd
- 46.1 Man pages—categories and descriptions
- 47.1 Comparison of features and file names in the TAR archive
- 48.1 Log files
- 48.2 System information with the
/proc
file system - 48.3 System information with the
/sys
file system
List of Examples- 1.1 A shell script printing a text
- 2.1 Create a user-specific configuration file
- 2.2 Create custom configurations by grouping items
- 2.3 Simplify configurations by applying aliases
- 9.1 Zypper—list of known repositories
- 9.2
rpm -q -i wget
- 9.3 Script to search for packages
- 10.1 Example timeline configuration
- 18.1 Usage of grub2-mkconfig
- 18.2 Usage of grub2-mkrescue
- 18.3 Usage of grub2-script-check
- 18.4 Usage of grub2-once
- 19.1 List active services
- 19.2 List failed services
- 19.3 List all processes belonging to a service
- 22.1 Alternatives System of the
java
command - 23.1 Writing IP addresses
- 23.2 Linking IP addresses to the netmask
- 23.3 Sample IPv6 address
- 23.4 IPv6 address specifying the prefix length
- 23.5 Common network interfaces and some static routes
- 23.6
/var/run/netconfig/resolv.conf
- 23.7
/etc/hosts
- 23.8
/etc/networks
- 23.9
/etc/host.conf
- 23.10
/etc/nsswitch.conf
- 23.11 Output of the command ping
- 23.12 Configuration for load balancing with Network Teaming
- 23.13 Configuration for DHCP Network Teaming device
- 24.1 Error message from
lpd
- 24.2 Broadcast from the CUPS network server
- 25.1 Specifying rendering algorithms
- 25.2 Aliases and family name substitutions
- 25.3 Aliases and family name substitutions
- 25.4 Aliases and family names substitutions
- 29.1 Example
udev
rules - 30.1 Entry in /etc/crontab
- 30.2 /etc/crontab: remove time stamp files
- 30.3
ulimit
: Settings in~/.bashrc
- 39.1 Forwarding options in named.conf
- 39.2 A basic /etc/named.conf
- 39.3 Entry to disable logging
- 39.4 Zone entry for example.com
- 39.5 Zone entry for example.net
- 39.6 The /var/lib/named/example.com.zone file
- 39.7 Reverse lookup
- 40.1 The configuration file /etc/dhcpd.conf
- 40.2 Additions to the configuration file
- 42.1 Basic examples of name-based
VirtualHost
entries - 42.2 Name-based
VirtualHost
directives - 42.3 IP-based
VirtualHost
directives - 42.4 Basic
VirtualHost
configuration - 42.5 VirtualHost CGI configuration
- 44.1 A request with
squidclient
- 44.2 Defining ACL rules
- 47.1 Output of
hostinfo
when logging in asroot
Copyright © 2006–2025 diff --git a/main/html/SLES-administration/index.html b/main/html/SLES-administration/index.html index a4ef2e7a37..82d8d6da44 100644 --- a/main/html/SLES-administration/index.html +++ b/main/html/SLES-administration/index.html @@ -111,7 +111,7 @@ like maintaining, monitoring and customizing an initially installed system.
Publication Date: - January 07, 2025 + January 09, 2025- Preface
- I Common tasks
- 1 Bash and Bash scripts
- 2
sudo
basics - 3 Using YaST
- 4 YaST in text mode
- 5 Changing language and country settings with YaST
- 6 Managing users with YaST
- 7 YaST online update
- 8 Installing or removing software
- 9 Managing software with command line tools
- 10 System recovery and snapshot management with Snapper
- 10.1 Default setup
- 10.2 Using Snapper to undo changes
- 10.3 System rollback by booting from snapshots
- 10.4 Enabling Snapper in user home directories
- 10.5 Creating and modifying Snapper configurations
- 10.6 Manually creating and managing snapshots
- 10.7 Automatic snapshot clean-up
- 10.8 Showing exclusive disk space used by snapshots
- 10.9 Frequently asked questions
- 11 Live kernel patching with KLP
- 12 User space live patching
- 13 Transactional updates
- 14 Remote graphical sessions with VNC
- 15 File copying with RSync
- II Booting a Linux system
- III System
- 20 32-bit and 64-bit applications in a 64-bit system environment
- 21
journalctl
: query thesystemd
journal - 22
update-alternatives
: managing multiple versions of commands and files - 23 Basic networking
- 23.1 IP addresses and routing
- 23.2 IPv6—the next generation Internet
- 23.3 Name resolution
- 23.4 Configuring a network connection with YaST
- 23.5 Configuring a network connection manually
- 23.6 Basic router setup
- 23.7 Setting up bonding devices
- 23.8 Setting up team devices for Network Teaming
- 23.9 Software-defined networking with Open vSwitch
- 24 Printer operation
- 25 Graphical user interface
- 26 Accessing file systems with FUSE
- 27 Installing multiple kernel versions
- 28 Managing kernel modules
- 29 Dynamic kernel device management with
udev
- 29.1 The
/dev
directory - 29.2 Kernel
uevents
andudev
- 29.3 Drivers, kernel modules and devices
- 29.4 Booting and initial device setup
- 29.5 Monitoring the running
udev
daemon - 29.6 Influencing kernel device event handling with
udev
rules - 29.7 Persistent device naming
- 29.8 Files used by
udev
- 29.9 More information
- 29.1 The
- 30 Special system features
- 31 Using NetworkManager
- IV Hardware configuration
- V Services
- 37 Service management with YaST
- 38 Time synchronization with NTP
- 39 The domain name system
- 40 DHCP
- 41 SLP
- 42 The Apache HTTP server
- 42.1 Quick start
- 42.2 Configuring Apache
- 42.3 Starting and stopping Apache
- 42.4 Installing, activating and configuring modules
- 42.5 Enabling CGI scripts
- 42.6 Setting up a secure Web server with SSL
- 42.7 Running multiple Apache instances on the same server
- 42.8 Avoiding security problems
- 42.9 Troubleshooting
- 42.10 More information
- 43 Setting up an FTP server with YaST
- 44 Squid caching proxy server
- 44.1 Facts about proxy servers
- 44.2 System requirements
- 44.3 Basic usage of Squid
- 44.4 The YaST Squid module
- 44.5 The Squid configuration file
- 44.6 Configuring a transparent proxy
- 44.7 Using the Squid cache manager CGI interface (
cachemgr.cgi
) - 44.8 Cache report generation with Calamaris
- 44.9 More Information
- 45 Web Based Enterprise Management using SFCB
- VI Troubleshooting
- A An example network
- B GNU licenses
List of Figures- 4.1 Main window of YaST in text mode
- 4.2 The software installation module
- 6.1 YaST user and group administration
- 7.1 YaST online update
- 7.2 Viewing retracted patches and history
- 7.3 YaST online update configuration
- 8.1 Conflict management of the software manager
- 8.2 Adding a software repository
- 8.3 Update notification on GNOME desktop
- 8.4 — view
- 10.1 Boot loader: snapshots
- 14.1 vncviewer
- 14.2 Remmina's main window
- 14.3 Remote desktop preference
- 14.4 Quick-starting
- 14.5 Remmina viewing remote session
- 14.6 Reading path to the profile file
- 14.7 Remote administration
- 14.8 VNC session settings
- 14.9 Joining a persistent VNC session
- 17.1 Secure boot support
- 17.2 UEFI: secure boot process
- 18.1 GRUB 2 boot editor
- 18.2 Boot code options
- 18.3 Boot loader options
- 18.4 Kernel parameters
- 19.1 Services Manager
- 21.1 YaST systemd journal
- 23.1 Simplified layer model for TCP/IP
- 23.2 TCP/IP Ethernet packet
- 23.3 Configuring network settings
- 23.4
wicked
architecture - 27.1 The YaST software manager: multiversion view
- 31.1 GNOME Network Connections dialog
- 31.2
firewalld
zones in NetworkManager - 37.1 YaST service manager
- 38.1 NTP configuration window
- 38.2 Adding a time server
- 39.1 DNS server installation: forwarder settings
- 39.2 DNS server installation: DNS zones
- 39.3 DNS server installation: finish wizard
- 39.4 DNS server: logging
- 39.5 DNS server: Zone Editor (Basics)
- 39.6 DNS server: Zone Editor (NS Records)
- 39.7 DNS server: Zone Editor (MX Records)
- 39.8 DNS server: Zone Editor (SOA)
- 39.9 Adding a record for a primary zone
- 39.10 Adding a reverse zone
- 39.11 Adding a reverse record
- 40.1 DHCP server: card selection
- 40.2 DHCP server: global settings
- 40.3 DHCP server: dynamic DHCP
- 40.4 DHCP server: start-up
- 40.5 DHCP server: host management
- 40.6 DHCP server: chroot jail and declarations
- 40.7 DHCP server: selecting a declaration type
- 40.8 DHCP server: configuring subnets
- 40.9 DHCP server: TSIG configuration
- 40.10 DHCP server: interface configuration for dynamic DNS
- 40.11 DHCP server: network interface and firewall
- 42.1 HTTP server wizard: default host
- 42.2 HTTP server wizard: summary
- 42.3 HTTP server configuration: listen ports and addresses
- 42.4 HTTP server configuration: server modules
- 43.1 FTP server configuration — start-up
- 47.1 HTML report generated by SCA tool
- 47.2 HTML report generated by SCA appliance
List of Tables- 1.1 Bash configuration files for login shells
- 1.2 Bash configuration files for non-login shells
- 1.3 Special files for Bash
- 1.4 Overview of a standard directory tree
- 1.5 Useful environment variables
- 9.1 Essential RPM query options
- 9.2 RPM verify options
- 19.1 Service management commands
- 19.2 Commands for enabling and disabling services
- 19.3 System V runlevels and
systemd
target units - 23.1 Private IP address domains
- 23.2 Parameters for /etc/host.conf
- 23.3 Databases available via /etc/nsswitch.conf
- 23.4 Configuration options for NSS “databases”
- 23.5 Feature comparison between bonding and team
- 25.1 Generating PFL from fontconfig rules
- 25.2 Results from generating PFL from fontconfig rules with changed order
- 25.3 Results from generating PFL from fontconfig rules
- 30.1
ulimit
: Setting resources for the user - 45.1 Commands for managing sfcbd
- 46.1 Man pages—categories and descriptions
- 47.1 Comparison of features and file names in the TAR archive
- 48.1 Log files
- 48.2 System information with the
/proc
file system - 48.3 System information with the
/sys
file system
List of Examples- 1.1 A shell script printing a text
- 2.1 Create a user-specific configuration file
- 2.2 Create custom configurations by grouping items
- 2.3 Simplify configurations by applying aliases
- 9.1 Zypper—list of known repositories
- 9.2
rpm -q -i wget
- 9.3 Script to search for packages
- 10.1 Example timeline configuration
- 18.1 Usage of grub2-mkconfig
- 18.2 Usage of grub2-mkrescue
- 18.3 Usage of grub2-script-check
- 18.4 Usage of grub2-once
- 19.1 List active services
- 19.2 List failed services
- 19.3 List all processes belonging to a service
- 22.1 Alternatives System of the
java
command - 23.1 Writing IP addresses
- 23.2 Linking IP addresses to the netmask
- 23.3 Sample IPv6 address
- 23.4 IPv6 address specifying the prefix length
- 23.5 Common network interfaces and some static routes
- 23.6
/var/run/netconfig/resolv.conf
- 23.7
/etc/hosts
- 23.8
/etc/networks
- 23.9
/etc/host.conf
- 23.10
/etc/nsswitch.conf
- 23.11 Output of the command ping
- 23.12 Configuration for load balancing with Network Teaming
- 23.13 Configuration for DHCP Network Teaming device
- 24.1 Error message from
lpd
- 24.2 Broadcast from the CUPS network server
- 25.1 Specifying rendering algorithms
- 25.2 Aliases and family name substitutions
- 25.3 Aliases and family name substitutions
- 25.4 Aliases and family names substitutions
- 29.1 Example
udev
rules - 30.1 Entry in /etc/crontab
- 30.2 /etc/crontab: remove time stamp files
- 30.3
ulimit
: Settings in~/.bashrc
- 39.1 Forwarding options in named.conf
- 39.2 A basic /etc/named.conf
- 39.3 Entry to disable logging
- 39.4 Zone entry for example.com
- 39.5 Zone entry for example.net
- 39.6 The /var/lib/named/example.com.zone file
- 39.7 Reverse lookup
- 40.1 The configuration file /etc/dhcpd.conf
- 40.2 Additions to the configuration file
- 42.1 Basic examples of name-based
VirtualHost
entries - 42.2 Name-based
VirtualHost
directives - 42.3 IP-based
VirtualHost
directives - 42.4 Basic
VirtualHost
configuration - 42.5 VirtualHost CGI configuration
- 44.1 A request with
squidclient
- 44.2 Defining ACL rules
- 47.1 Output of
hostinfo
when logging in asroot
Copyright © 2006–2025 diff --git a/main/html/SLES-amd-sev/article-amd-sev.html b/main/html/SLES-amd-sev/article-amd-sev.html index 9025a48efa..54e028827c 100644 --- a/main/html/SLES-amd-sev/article-amd-sev.html +++ b/main/html/SLES-amd-sev/article-amd-sev.html @@ -99,7 +99,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7AMD Secure Encrypted Virtualization (AMD-SEV) Guide
Publication Date: - January 07, 2025 + January 09, 2025AMD's Secure Encrypted Virtualization (SEV) allows the memory of diff --git a/main/html/SLES-amd-sev/index.html b/main/html/SLES-amd-sev/index.html index 9025a48efa..54e028827c 100644 --- a/main/html/SLES-amd-sev/index.html +++ b/main/html/SLES-amd-sev/index.html @@ -99,7 +99,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7AMD Secure Encrypted Virtualization (AMD-SEV) Guide
Publication Date: - January 07, 2025 + January 09, 2025AMD's Secure Encrypted Virtualization (SEV) allows the memory of diff --git a/main/html/SLES-autoyast/book-autoyast.html b/main/html/SLES-autoyast/book-autoyast.html index e7c7650c0f..de02048839 100644 --- a/main/html/SLES-autoyast/book-autoyast.html +++ b/main/html/SLES-autoyast/book-autoyast.html @@ -115,7 +115,7 @@ of SUSE Linux Enterprise Server systems. It uses an AutoYaST profile that contains installation and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- 1 Introduction to AutoYaST
- I Understanding and creating the AutoYaST control file
- II AutoYaST configuration examples
- 4 Configuration and installation options
- 4.1 General options
- 4.2 Reporting
- 4.3 System registration and extension selection
- 4.4 The GRUB 2 boot loader
- 4.5 The Systemd boot loader
- 4.6 Partitioning
- 4.7 iSCSI initiator overview
- 4.8 Fibre channel over Ethernet configuration (FCoE)
- 4.9 Country settings
- 4.10 Software
- 4.11 Upgrade
- 4.12 Services and targets
- 4.13 Network configuration
- 4.14 Proxy
- 4.15 NIS client and server
- 4.16 NIS server
- 4.17 Hosts definition
- 4.18 Windows domain membership
- 4.19 Samba server
- 4.20 Authentication client
- 4.21 NFS client and server
- 4.22 NTP client
- 4.23 Mail server configuration
- 4.24 Apache HTTP server configuration
- 4.25 Squid server
- 4.26 FTP server
- 4.27 TFTP server
- 4.28 Firstboot workflow
- 4.29 Security settings
- 4.30 Linux audit framework (LAF)
- 4.31 Users and groups
- 4.32 Custom user scripts
- 4.33 System variables (sysconfig)
- 4.34 Adding complete configurations
- 4.35 Ask the user for values during installation
- 4.36 Kernel dumps
- 4.37 DNS server
- 4.38 DHCP server
- 4.39 Firewall configuration
- 4.40 Miscellaneous hardware and system components
- 4.41 Importing SSH keys and configuration
- 4.42 Configuration management
- 4 Configuration and installation options
- III Managing mass installations with dynamic profiles
- IV Understanding the auto-installation process
- V Uses for AutoYaST on installed systems
- VI Appendixes
List of FiguresList of TablesList of Examples- 2.1 AutoYaST control file (profile)
- 2.2 Control file container
- 2.3 Nested resources
- 2.4 An empty map
- 3.1 Example file for replacing the host name/domain by script
- 4.1 General options
- 4.2 Reporting behavior
- 4.3 LVM-based guided partitioning
- 4.4 Creating
/
,/home
andswap
partitions - 4.5 Using a whole disk as a file system
- 4.6 Automated partitioning on selected drives
- 4.7 Installing on multiple drives
- 4.8 Mount options
- 4.9 Keeping partitions
- 4.10 Auto-detection of partitions to be kept.
- 4.11 Create LVM physical volume
- 4.12 LVM logical volumes
- 4.13 RAID10 configuration
- 4.14 RAID10 without partitions
- 4.15 Old style RAID10 configuration
- 4.16 Using multipath devices
- 4.17 Listing multipath devices
- 4.18 Using the WWID to identify a multipath device
- 4.19
bcache
definition - 4.20 Multi-device Btrfs configuration
- 4.21 NFS share definition
- 4.22
tmpfs
definition - 4.23 iSCSI client
- 4.24 FCoE configuration
- 4.25 Language
- 4.26 Time zone
- 4.27 Keyboard
- 4.28 Explicit product selection
- 4.29 Package selection in the control file with patterns and packages sections
- 4.30 Packages selection using a regular expression
- 4.31 Creating a package database with the additional package inst-source-utils.rpm
- 4.32
add_on_products.xml
- 4.33 Adding the SDK extension and a user defined repository
- 4.34 Kernel selection in the control file
- 4.35 Package selection in control file
- 4.36 Upgrade and backup
- 4.37 Configuring services and targets
- 4.38 Network configuration
- 4.39 Bonding interface configuration
- 4.40 Bridge interface configuration
- 4.41 Multiple IP Addresses
- 4.42 Assigning a persistent name using the MAC address
- 4.43 Network routing configuration
- 4.44 Network configuration: proxy
- 4.45 Network configuration: NIS
- 4.46 NIS server configuration
- 4.47 /etc/hosts
- 4.48 Samba client configuration
- 4.49 Samba server configuration
- 4.50 Network configuration: NFS client
- 4.51 Network configuration: NFS server
- 4.52 Network configuration: NTP client
- 4.53 Mail configuration
- 4.54 HTTP server configuration
- 4.55 Squid server configuration
- 4.56 FTP server configuration:
- 4.57 TFTP server configuration:
- 4.58 Enabling firstboot workflow
- 4.59 Security configuration
- 4.60 Select the Defense Information Systems Agency Security Technical Implementation Guide
- 4.61 LAF configuration
- 4.62 Minimal user configuration
- 4.63 Complex user configuration
- 4.64 Group configuration
- 4.65 Enabling autologin and password-less login
- 4.66 Script configuration
- 4.67 Sysconfig configuration
- 4.68 Dumping files into the installed system
- 4.69 Dumping files into the installed system
- 4.70 Kdump configuration
- 4.71 Disabled Kdump configuration
- 4.72 Kdump memory reservation with multiple values
- 4.73 Basic DNS server settings
- 4.74 Configuring DNS server zones and advanced settings
- 4.75 Example dhcp-server section
- 4.76 Example firewall section
- 4.77 Printer configuration
- 4.78 Sound configuration
- 4.79 Importing SSH keys and configuration from /dev/sda2
- 4.80 Client/server with manual authentication
- 4.81 Client/server with preseed keys
- 4.82 Stand-alone mode
- 6.1 Simple rules file
- 6.2 Simple rules file
- 7.1 Including a file using ERB
- 7.2 Running commands with Ruby
- 7.3 Using Ruby structures
- 7.4 Configuring the boot loader
- 7.5 Using the largest disk
- 7.6 Configure the connected network cards
- 7.7 Reusing the same profile for different distributions
- 7.8 Filtering USB devices
- 7.9 Running helpers
- 7.10 Rendering profile
- 7.11 Preparing the debug environment
- 7.12 Adding a breakpoint
- 7.13 Rules and classes
- 7.14 ERB
- 8.1 Using the MAC address to get the profile
- 8.2 Accessing ERB helpers from a Ruby script
- 9.1 Determine HEX code for an IP address
- 9.2
linuxrc
Options in the AutoYaST control file - D.1 Adding modules and extensions (online)
- D.2 Adding modules and extensions (offline)
- D.3 Specifying the Btrfs default subvolume name
- D.4 Disabling Btrfs subvolumes
- D.5 Assigning zones: default configuration (deprecated syntax)
- D.6 Assigning zones: default configuration (SLE 15 syntax)
- D.7 Masquerading and protecting internal zones (deprecated syntax)
- D.8 Masquerading and protecting internal zones (SLE 15 syntax)
- D.9 Opening ports (deprecated syntax)
- D.10 Opening ports (SLE 15 syntax)
- D.11 Opening Services (Deprecated Syntax) diff --git a/main/html/SLES-autoyast/index.html b/main/html/SLES-autoyast/index.html index e7c7650c0f..de02048839 100644 --- a/main/html/SLES-autoyast/index.html +++ b/main/html/SLES-autoyast/index.html @@ -115,7 +115,7 @@ of SUSE Linux Enterprise Server systems. It uses an AutoYaST profile that contains installation and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- 1 Introduction to AutoYaST
- I Understanding and creating the AutoYaST control file
- II AutoYaST configuration examples
- 4 Configuration and installation options
- 4.1 General options
- 4.2 Reporting
- 4.3 System registration and extension selection
- 4.4 The GRUB 2 boot loader
- 4.5 The Systemd boot loader
- 4.6 Partitioning
- 4.7 iSCSI initiator overview
- 4.8 Fibre channel over Ethernet configuration (FCoE)
- 4.9 Country settings
- 4.10 Software
- 4.11 Upgrade
- 4.12 Services and targets
- 4.13 Network configuration
- 4.14 Proxy
- 4.15 NIS client and server
- 4.16 NIS server
- 4.17 Hosts definition
- 4.18 Windows domain membership
- 4.19 Samba server
- 4.20 Authentication client
- 4.21 NFS client and server
- 4.22 NTP client
- 4.23 Mail server configuration
- 4.24 Apache HTTP server configuration
- 4.25 Squid server
- 4.26 FTP server
- 4.27 TFTP server
- 4.28 Firstboot workflow
- 4.29 Security settings
- 4.30 Linux audit framework (LAF)
- 4.31 Users and groups
- 4.32 Custom user scripts
- 4.33 System variables (sysconfig)
- 4.34 Adding complete configurations
- 4.35 Ask the user for values during installation
- 4.36 Kernel dumps
- 4.37 DNS server
- 4.38 DHCP server
- 4.39 Firewall configuration
- 4.40 Miscellaneous hardware and system components
- 4.41 Importing SSH keys and configuration
- 4.42 Configuration management
- 4 Configuration and installation options
- III Managing mass installations with dynamic profiles
- IV Understanding the auto-installation process
- V Uses for AutoYaST on installed systems
- VI Appendixes
List of FiguresList of TablesList of Examples- 2.1 AutoYaST control file (profile)
- 2.2 Control file container
- 2.3 Nested resources
- 2.4 An empty map
- 3.1 Example file for replacing the host name/domain by script
- 4.1 General options
- 4.2 Reporting behavior
- 4.3 LVM-based guided partitioning
- 4.4 Creating
/
,/home
andswap
partitions - 4.5 Using a whole disk as a file system
- 4.6 Automated partitioning on selected drives
- 4.7 Installing on multiple drives
- 4.8 Mount options
- 4.9 Keeping partitions
- 4.10 Auto-detection of partitions to be kept.
- 4.11 Create LVM physical volume
- 4.12 LVM logical volumes
- 4.13 RAID10 configuration
- 4.14 RAID10 without partitions
- 4.15 Old style RAID10 configuration
- 4.16 Using multipath devices
- 4.17 Listing multipath devices
- 4.18 Using the WWID to identify a multipath device
- 4.19
bcache
definition - 4.20 Multi-device Btrfs configuration
- 4.21 NFS share definition
- 4.22
tmpfs
definition - 4.23 iSCSI client
- 4.24 FCoE configuration
- 4.25 Language
- 4.26 Time zone
- 4.27 Keyboard
- 4.28 Explicit product selection
- 4.29 Package selection in the control file with patterns and packages sections
- 4.30 Packages selection using a regular expression
- 4.31 Creating a package database with the additional package inst-source-utils.rpm
- 4.32
add_on_products.xml
- 4.33 Adding the SDK extension and a user defined repository
- 4.34 Kernel selection in the control file
- 4.35 Package selection in control file
- 4.36 Upgrade and backup
- 4.37 Configuring services and targets
- 4.38 Network configuration
- 4.39 Bonding interface configuration
- 4.40 Bridge interface configuration
- 4.41 Multiple IP Addresses
- 4.42 Assigning a persistent name using the MAC address
- 4.43 Network routing configuration
- 4.44 Network configuration: proxy
- 4.45 Network configuration: NIS
- 4.46 NIS server configuration
- 4.47 /etc/hosts
- 4.48 Samba client configuration
- 4.49 Samba server configuration
- 4.50 Network configuration: NFS client
- 4.51 Network configuration: NFS server
- 4.52 Network configuration: NTP client
- 4.53 Mail configuration
- 4.54 HTTP server configuration
- 4.55 Squid server configuration
- 4.56 FTP server configuration:
- 4.57 TFTP server configuration:
- 4.58 Enabling firstboot workflow
- 4.59 Security configuration
- 4.60 Select the Defense Information Systems Agency Security Technical Implementation Guide
- 4.61 LAF configuration
- 4.62 Minimal user configuration
- 4.63 Complex user configuration
- 4.64 Group configuration
- 4.65 Enabling autologin and password-less login
- 4.66 Script configuration
- 4.67 Sysconfig configuration
- 4.68 Dumping files into the installed system
- 4.69 Dumping files into the installed system
- 4.70 Kdump configuration
- 4.71 Disabled Kdump configuration
- 4.72 Kdump memory reservation with multiple values
- 4.73 Basic DNS server settings
- 4.74 Configuring DNS server zones and advanced settings
- 4.75 Example dhcp-server section
- 4.76 Example firewall section
- 4.77 Printer configuration
- 4.78 Sound configuration
- 4.79 Importing SSH keys and configuration from /dev/sda2
- 4.80 Client/server with manual authentication
- 4.81 Client/server with preseed keys
- 4.82 Stand-alone mode
- 6.1 Simple rules file
- 6.2 Simple rules file
- 7.1 Including a file using ERB
- 7.2 Running commands with Ruby
- 7.3 Using Ruby structures
- 7.4 Configuring the boot loader
- 7.5 Using the largest disk
- 7.6 Configure the connected network cards
- 7.7 Reusing the same profile for different distributions
- 7.8 Filtering USB devices
- 7.9 Running helpers
- 7.10 Rendering profile
- 7.11 Preparing the debug environment
- 7.12 Adding a breakpoint
- 7.13 Rules and classes
- 7.14 ERB
- 8.1 Using the MAC address to get the profile
- 8.2 Accessing ERB helpers from a Ruby script
- 9.1 Determine HEX code for an IP address
- 9.2
linuxrc
Options in the AutoYaST control file - D.1 Adding modules and extensions (online)
- D.2 Adding modules and extensions (offline)
- D.3 Specifying the Btrfs default subvolume name
- D.4 Disabling Btrfs subvolumes
- D.5 Assigning zones: default configuration (deprecated syntax)
- D.6 Assigning zones: default configuration (SLE 15 syntax)
- D.7 Masquerading and protecting internal zones (deprecated syntax)
- D.8 Masquerading and protecting internal zones (SLE 15 syntax)
- D.9 Opening ports (deprecated syntax)
- D.10 Opening ports (SLE 15 syntax)
- D.11 Opening Services (Deprecated Syntax) diff --git a/main/html/SLES-deployment/book-deployment.html b/main/html/SLES-deployment/book-deployment.html index 8e3845d4f6..4be0c53687 100644 --- a/main/html/SLES-deployment/book-deployment.html +++ b/main/html/SLES-deployment/book-deployment.html @@ -106,7 +106,7 @@ This guide details how to install single or multiple systems, and how to exploit the product-inherent capabilities for a deployment infrastructure. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- I Installation preparation
- II Installation procedure
- 8 Boot parameters
- 9 Installation steps
- 9.1 Overview
- 9.2 Installer self-update
- 9.3 Language, keyboard and product selection diff --git a/main/html/SLES-deployment/index.html b/main/html/SLES-deployment/index.html index 8e3845d4f6..4be0c53687 100644 --- a/main/html/SLES-deployment/index.html +++ b/main/html/SLES-deployment/index.html @@ -106,7 +106,7 @@ This guide details how to install single or multiple systems, and how to exploit the product-inherent capabilities for a deployment infrastructure. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- I Installation preparation
- II Installation procedure
- 8 Boot parameters
- 9 Installation steps
- 9.1 Overview
- 9.2 Installer self-update
- 9.3
Language, keyboard and product selection
diff --git a/main/html/SLES-gnome-user/book-gnome-user.html b/main/html/SLES-gnome-user/book-gnome-user.html
index 78bd445326..b8b3d9dfc5 100644
--- a/main/html/SLES-gnome-user/book-gnome-user.html
+++ b/main/html/SLES-gnome-user/book-gnome-user.html
@@ -104,7 +104,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7This guide introduces the GNOME desktop of SUSE Linux Enterprise Server. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 GNOME Background settings
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Configuring sound settings
- 3.6 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
diff --git a/main/html/SLES-gnome-user/index.html b/main/html/SLES-gnome-user/index.html
index 78bd445326..b8b3d9dfc5 100644
--- a/main/html/SLES-gnome-user/index.html
+++ b/main/html/SLES-gnome-user/index.html
@@ -104,7 +104,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7This guide introduces the GNOME desktop of SUSE Linux Enterprise Server. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 GNOME Background settings
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Configuring sound settings
- 3.6 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
diff --git a/main/html/SLES-installation/article-installation.html b/main/html/SLES-installation/article-installation.html
index fc47212f31..9143e8a609 100644
--- a/main/html/SLES-installation/article-installation.html
+++ b/main/html/SLES-installation/article-installation.html
@@ -99,7 +99,7 @@
});
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7Installation Quick Start #
Publication Date: - January 07, 2025 + January 09, 2025This Quick Start guides you step by step diff --git a/main/html/SLES-installation/index.html b/main/html/SLES-installation/index.html index fc47212f31..9143e8a609 100644 --- a/main/html/SLES-installation/index.html +++ b/main/html/SLES-installation/index.html @@ -99,7 +99,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7Installation Quick Start #
Publication Date: - January 07, 2025 + January 09, 2025This Quick Start guides you step by step diff --git a/main/html/SLES-modules/article-modules.html b/main/html/SLES-modules/article-modules.html index 4113c238e4..9c6dadd8ed 100644 --- a/main/html/SLES-modules/article-modules.html +++ b/main/html/SLES-modules/article-modules.html @@ -103,7 +103,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7Modules and Extensions Quick Start
Publication Date: - January 07, 2025 + January 09, 2025This Quick Start gives you an overview of the @@ -521,7 +521,7 @@
Dependencies: Basesystem
- Availability: SLES, SLES for SAP, SLE RT SLED + Availability: SLES, SLES for SAP, SLE RT, SLED
Lifecycle: None
diff --git a/main/html/SLES-modules/index.html b/main/html/SLES-modules/index.html index 4113c238e4..9c6dadd8ed 100644 --- a/main/html/SLES-modules/index.html +++ b/main/html/SLES-modules/index.html @@ -103,7 +103,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7Modules and Extensions Quick Start
Publication Date: - January 07, 2025 + January 09, 2025This Quick Start gives you an overview of the @@ -521,7 +521,7 @@
Dependencies: Basesystem
- Availability: SLES, SLES for SAP, SLE RT SLED + Availability: SLES, SLES for SAP, SLE RT, SLED
Lifecycle: None
diff --git a/main/html/SLES-raspberry-pi/article-raspberry-pi.html b/main/html/SLES-raspberry-pi/article-raspberry-pi.html index 68a54e381f..b9b3788743 100644 --- a/main/html/SLES-raspberry-pi/article-raspberry-pi.html +++ b/main/html/SLES-raspberry-pi/article-raspberry-pi.html @@ -109,7 +109,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP7Raspberry Pi Quick Start
Publication Date: - January 07, 2025 + January 09, 2025This guide contains an overview of SUSE Linux Enterprise Server for Arm on the Raspberry Pi* diff --git a/main/html/SLES-raspberry-pi/index.html b/main/html/SLES-raspberry-pi/index.html index 68a54e381f..b9b3788743 100644 --- a/main/html/SLES-raspberry-pi/index.html +++ b/main/html/SLES-raspberry-pi/index.html @@ -109,7 +109,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP7Raspberry Pi Quick Start
Publication Date: - January 07, 2025 + January 09, 2025This guide contains an overview of SUSE Linux Enterprise Server for Arm on the Raspberry Pi* diff --git a/main/html/SLES-rmt/book-rmt.html b/main/html/SLES-rmt/book-rmt.html index ee49fcc428..c012049767 100644 --- a/main/html/SLES-rmt/book-rmt.html +++ b/main/html/SLES-rmt/book-rmt.html @@ -109,7 +109,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7An administrator's guide to Repository Mirroring Tool—a proxy system for SUSE Customer Center with repository and registration targets. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- 1 Overview
- 2 RMT installation and configuration
- 3 Migrate from SMT to RMT
- 4 Mirroring repositories on the RMT server
- 5 Configuring clients to use RMT
- 5.1 Configuring clients with boot parameters
- 5.2 Configuring clients with AutoYaST profile
- 5.3 Configuring clients with
rmt-client-setup
- 5.4 Configuring clients with YaST
- 5.5 Configuring clients for custom stand-alone repositories
- 5.6 Listing accessible repositories
- 5.7 Online migration of SUSE Linux Enterprise clients
- 6 RMT tools and configuration files
- 7 Backing up an RMT server
- 8 Managing TLS/SSL certificates
- 9 Deploying a SUSE Linux Enterprise Server instance to support RMT in the public cloud
- A GNU licenses
List of FiguresList of TablesCopyright © 2006–2025 diff --git a/main/html/SLES-rmt/index.html b/main/html/SLES-rmt/index.html index ee49fcc428..c012049767 100644 --- a/main/html/SLES-rmt/index.html +++ b/main/html/SLES-rmt/index.html @@ -109,7 +109,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7An administrator's guide to Repository Mirroring Tool—a proxy system for SUSE Customer Center with repository and registration targets. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- 1 Overview
- 2 RMT installation and configuration
- 3 Migrate from SMT to RMT
- 4 Mirroring repositories on the RMT server
- 5 Configuring clients to use RMT
- 5.1 Configuring clients with boot parameters
- 5.2 Configuring clients with AutoYaST profile
- 5.3 Configuring clients with
rmt-client-setup
- 5.4 Configuring clients with YaST
- 5.5 Configuring clients for custom stand-alone repositories
- 5.6 Listing accessible repositories
- 5.7 Online migration of SUSE Linux Enterprise clients
- 6 RMT tools and configuration files
- 7 Backing up an RMT server
- 8 Managing TLS/SSL certificates
- 9 Deploying a SUSE Linux Enterprise Server instance to support RMT in the public cloud
- A GNU licenses
List of FiguresList of TablesCopyright © 2006–2025 diff --git a/main/html/SLES-security/book-security.html b/main/html/SLES-security/book-security.html index cded51e349..6ee2a704f8 100644 --- a/main/html/SLES-security/book-security.html +++ b/main/html/SLES-security/book-security.html @@ -105,7 +105,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7This guide introduces basic concepts of system security and describes the usage of security software included with the product, such as AppArmor, SELinux, or the auditing system. The guide also supports system - administrators in hardening an installation.
Publication Date: January 07, 2025 + administrators in hardening an installation.Publication Date: January 09, 2025- Preface
- 1 Security and confidentiality
- I Authentication
- 2 Authentication with PAM
- 3 Using NIS
- 4 Setting up authentication clients using YaST
- 5 LDAP with 389 Directory Server
- 5.1 Structure of an LDAP directory tree
- 5.2 Creating and managing a Docker container for 389 Directory Server
- 5.3 Installing 389 Directory Server
- 5.4 Firewall configuration
- 5.5 Backing up and restoring 389 Directory Server
- 5.6 Managing LDAP users and groups
- 5.7 Managing plug-ins
- 5.8 Using SSSD to manage LDAP authentication
- 5.9 Migrating to 389 Directory Server from OpenLDAP
- 5.10 Importing TLS server certificates and keys
- 5.11 Setting up replication
- 5.12 Synchronizing with Microsoft Active Directory
- 5.13 More information
- 6 Network authentication with Kerberos
- 7 Active Directory support
- 8 Setting up a freeRADIUS server
- II Local security
- 9 Physical security
- 10 Software management
- 11 File management
- 12 Encrypting partitions and files
- 13 Storage encryption for hosted applications with cryptctl
- 13.1 Setting up a
cryptctl
server - 13.2 Setting up a
cryptctl
client - 13.3 Configuring /etc/fstab for LUKS volumes
- 13.4 Checking partition unlock status using server-side commands
- 13.5 Unlocking encrypted partitions manually
- 13.6 Maintenance downtime procedure
- 13.7 Setting up an HA environment for cryptctl-server service
- 13.8 More information
- 13.1 Setting up a
- 14 User management
- 14.1 Various account checks
- 14.2 Enabling password aging
- 14.3 Stronger password enforcement
- 14.4 Password and login management with PAM
- 14.5 Restricting
root
logins - 14.6 Restricting
sudo
users - 14.7 Setting an inactivity timeout for interactive shell sessions
- 14.8 Preventing accidental denial of service
- 14.9 Displaying login banners
- 14.10 Connection accounting utilities
- 15 Restricting
cron
andat
- 16 Spectre/Meltdown checker
- 17 Configuring security settings with YaST
- 18 The Polkit authentication framework
- 19 Access control lists in Linux
- 20 Intrusion detection with AIDE
- III Network security
- 21 X Window System and X authentication
- 22 Securing network operations with OpenSSH
- 22.1 OpenSSH overview
- 22.2 Server hardening
- 22.3 Password authentication
- 22.4 Managing user and host encryption keys
- 22.5 Rotating host keys
- 22.6 Public key authentication
- 22.7 Passphrase-less public key authentication
- 22.8 OpenSSH certificate authentication
- 22.9 Automated public key logins with gnome-keyring
- 22.10 Automated public key logins with ssh-agent
- 22.11 Changing an SSH private key passphrase
- 22.12 Retrieving a key fingerprint
- 22.13 Starting X11 applications on a remote host
- 22.14 Agent forwarding
- 22.15
scp
—secure copy - 22.16
sftp
—secure file transfer - 22.17 Port forwarding (SSH tunneling)
- 22.18 More information
- 22.19 Stopping SSH brute force attacks with Fail2Ban
- 23 Masquerading and firewalls
- 24 Configuring a VPN server
- 25 Managing a PKI with XCA, X certificate and key manager
- 26 Improving network security with
sysctl
variables
- IV Regulations and compliance
- V Confining privileges with AppArmor
- 31 Introducing AppArmor
- 32 Getting started
- 33 Immunizing programs
- 34 Profile components and syntax
- 34.1 Breaking an AppArmor profile into its parts
- 34.2 Profile types
- 34.3 Include statements
- 34.4 Capability entries (POSIX.1e)
- 34.5 Network access control
- 34.6 Profile names, flags, paths, and globbing
- 34.7 File permission access modes
- 34.8 Mount rules
- 34.9 Pivot root rules
- 34.10 PTrace rules
- 34.11 Signal rules
- 34.12 Execute modes
- 34.13 Resource limit control
- 34.14 Auditing rules
- 35 AppArmor profile repositories
- 36 Building and managing profiles with YaST
- 37 Building profiles from the command line
- 38 Profiling your Web applications using ChangeHat
- 39 Confining users with
pam_apparmor
- 40 Managing profiled applications
- 41 Support
- 42 AppArmor glossary
- VI SELinux
- VII The Linux Audit Framework
- 44 Understanding Linux audit
- 44.1 Introducing the components of Linux audit
- 44.2 Configuring the audit daemon
- 44.3 Controlling the audit system using
auditctl
- 44.4 Passing parameters to the audit system
- 44.5 Understanding the audit logs and generating reports
- 44.6 Querying the audit daemon logs with
ausearch
- 44.7 Analyzing processes with
autrace
- 44.8 Visualizing audit data
- 44.9 Relaying audit event notifications
- 45 Setting up the Linux audit framework
- 46 Introducing an audit rule set
- 46.1 Adding basic audit configuration parameters
- 46.2 Adding watches on audit log files and configuration files
- 46.3 Monitoring file system objects
- 46.4 Monitoring security configuration files and databases
- 46.5 Monitoring miscellaneous system calls
- 46.6 Filtering system call arguments
- 46.7 Managing audit event records using keys
- 47 Useful resources
- 44 Understanding Linux audit
- A GNU licenses
List of Figures- 3.1 NIS server setup
- 3.2 Master server setup
- 3.3 Changing the directory and synchronizing files for a NIS server
- 3.4 NIS server maps setup
- 3.5 Setting request permissions for a NIS server
- 3.6 Setting domain and address of a NIS server
- 5.1 Structure of an LDAP directory
- 6.1 Kerberos network topology
- 7.1 Schema of Winbind-based Active Directory authentication
- 7.2 Main window of
- 7.3 Enrolling into a domain
- 7.4 Configuration window of
- 7.5 Determining Windows domain membership
- 7.6 Providing administrator credentials
- 13.1 Key retrieval with
cryptctl
(model without connection to KMIP server) - 16.1 Output from spectre-meltdown-checker
- 17.1 YaST security center and hardening: security overview
- 19.1 Minimum ACL: ACL entries compared to permission bits
- 19.2 Extended ACL: ACL entries compared to permission bits
- 22.1 jail.local file settings
- 23.1 iptables: a packet's possible paths
- 24.1 Routed VPN
- 24.2 Bridged VPN - scenario 1
- 24.3 Bridged VPN - scenario 2
- 24.4 Bridged VPN - scenario 3
- 25.1 Create a new XCA database
- 37.1
aa-notify Message in GNOME
- 38.1 Adminer login page
- 44.1 Introducing the components of Linux audit
- 44.2 Flow graph—program versus system call relationship
- 44.3 Bar chart—common event types
List of Tables- 5.1 Commonly used object classes and attributes
- 13.1 List of all parameters to define the resource group with the cryptctl crm script.
- 14.1 Sample rules/constraints for password enforcement
- 19.1 ACL entry types
- 19.2 Masking access permissions
- 20.1 Important AIDE check boxes
- 23.1 Important sysconfig variables for static port configuration
- 41.1 Man pages: sections and categories
- 44.1 Audit status flags
List of Examples- 2.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default configuration for the
auth
section (common-auth
) - 2.3 Default configuration for the
account
section (common-account
) - 2.4 Default configuration for the
password
section (common-password
) - 2.5 Default configuration for the
session
section (common-session
) - 2.6 pam_env.conf
- 5.1 Excerpt from CN=schema
- 5.2 Minimal 389 Directory Server instance configuration file
- 5.3 A
.dsrc
file for local administration - 5.4 Two supplier replicas
- 5.5 Four supplier replicas
- 5.6 Six replicas
- 5.7 Six replicas with read-only consumers
- 6.1 Example KDC configuration,
/etc/krb5.conf
- 9.1 Configuration
- 22.1 Example sshd_config
- 23.1 Callback port configuration for the
nfs
kernel module in/etc/modprobe.d/60-nfs.conf
- 23.2 Commands to define a new
firewalld
RPC service for NFS - 24.1 VPN server configuration file
- 24.2 VPN client configuration file
- 32.1 Output of
aa-unconfined
- 37.1 Learning mode exception: controlling access to specific resources
- 37.2 Learning mode exception: defining permissions for an entry
- 43.1 Security context settings using
ls -Z
- 43.2 Verifying that SELinux is functional
- 43.3 Getting a list of booleans and verifying policy access
- 43.4 Getting file context information
- 43.5 The default context for directories in the root directory
- 43.6 Showing SELinux settings for processes with
ps Zaux
- 43.7 Viewing default file contexts
- 43.8 Example lines from
/var/log/audit/audit.log
- 43.9 Analyzing audit messages
- 43.10 Viewing which lines deny access
- 43.11 Creating a policy module allowing an action previously denied
- 44.1 Default /etc/audit/auditd.conf
- 44.2 Example output of
auditctl
-s
- 44.3 Example audit rules—audit system parameters
- 44.4 Example audit rules—file system auditing
- 44.5 Example audit rules—system call auditing
- 44.6 Deleting audit rules and events
- 44.7 Listing rules with
auditctl
-l
- 44.8 A simple audit event—viewing the audit log
- 44.9 An advanced audit event—login via SSH
- 44.10 Example /etc/audit/auditd.conf
- 44.11 Example /etc/audit/plugins.d/syslog.conf
Copyright © 2006–2025 diff --git a/main/html/SLES-security/index.html b/main/html/SLES-security/index.html index cded51e349..6ee2a704f8 100644 --- a/main/html/SLES-security/index.html +++ b/main/html/SLES-security/index.html @@ -105,7 +105,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7This guide introduces basic concepts of system security and describes the usage of security software included with the product, such as AppArmor, SELinux, or the auditing system. The guide also supports system - administrators in hardening an installation.
Publication Date: January 07, 2025 + administrators in hardening an installation.Publication Date: January 09, 2025- Preface
- 1 Security and confidentiality
- I Authentication
- 2 Authentication with PAM
- 3 Using NIS
- 4 Setting up authentication clients using YaST
- 5 LDAP with 389 Directory Server
- 5.1 Structure of an LDAP directory tree
- 5.2 Creating and managing a Docker container for 389 Directory Server
- 5.3 Installing 389 Directory Server
- 5.4 Firewall configuration
- 5.5 Backing up and restoring 389 Directory Server
- 5.6 Managing LDAP users and groups
- 5.7 Managing plug-ins
- 5.8 Using SSSD to manage LDAP authentication
- 5.9 Migrating to 389 Directory Server from OpenLDAP
- 5.10 Importing TLS server certificates and keys
- 5.11 Setting up replication
- 5.12 Synchronizing with Microsoft Active Directory
- 5.13 More information
- 6 Network authentication with Kerberos
- 7 Active Directory support
- 8 Setting up a freeRADIUS server
- II Local security
- 9 Physical security
- 10 Software management
- 11 File management
- 12 Encrypting partitions and files
- 13 Storage encryption for hosted applications with cryptctl
- 13.1 Setting up a
cryptctl
server - 13.2 Setting up a
cryptctl
client - 13.3 Configuring /etc/fstab for LUKS volumes
- 13.4 Checking partition unlock status using server-side commands
- 13.5 Unlocking encrypted partitions manually
- 13.6 Maintenance downtime procedure
- 13.7 Setting up an HA environment for cryptctl-server service
- 13.8 More information
- 13.1 Setting up a
- 14 User management
- 14.1 Various account checks
- 14.2 Enabling password aging
- 14.3 Stronger password enforcement
- 14.4 Password and login management with PAM
- 14.5 Restricting
root
logins - 14.6 Restricting
sudo
users - 14.7 Setting an inactivity timeout for interactive shell sessions
- 14.8 Preventing accidental denial of service
- 14.9 Displaying login banners
- 14.10 Connection accounting utilities
- 15 Restricting
cron
andat
- 16 Spectre/Meltdown checker
- 17 Configuring security settings with YaST
- 18 The Polkit authentication framework
- 19 Access control lists in Linux
- 20 Intrusion detection with AIDE
- III Network security
- 21 X Window System and X authentication
- 22 Securing network operations with OpenSSH
- 22.1 OpenSSH overview
- 22.2 Server hardening
- 22.3 Password authentication
- 22.4 Managing user and host encryption keys
- 22.5 Rotating host keys
- 22.6 Public key authentication
- 22.7 Passphrase-less public key authentication
- 22.8 OpenSSH certificate authentication
- 22.9 Automated public key logins with gnome-keyring
- 22.10 Automated public key logins with ssh-agent
- 22.11 Changing an SSH private key passphrase
- 22.12 Retrieving a key fingerprint
- 22.13 Starting X11 applications on a remote host
- 22.14 Agent forwarding
- 22.15
scp
—secure copy - 22.16
sftp
—secure file transfer - 22.17 Port forwarding (SSH tunneling)
- 22.18 More information
- 22.19 Stopping SSH brute force attacks with Fail2Ban
- 23 Masquerading and firewalls
- 24 Configuring a VPN server
- 25 Managing a PKI with XCA, X certificate and key manager
- 26 Improving network security with
sysctl
variables
- IV Regulations and compliance
- V Confining privileges with AppArmor
- 31 Introducing AppArmor
- 32 Getting started
- 33 Immunizing programs
- 34 Profile components and syntax
- 34.1 Breaking an AppArmor profile into its parts
- 34.2 Profile types
- 34.3 Include statements
- 34.4 Capability entries (POSIX.1e)
- 34.5 Network access control
- 34.6 Profile names, flags, paths, and globbing
- 34.7 File permission access modes
- 34.8 Mount rules
- 34.9 Pivot root rules
- 34.10 PTrace rules
- 34.11 Signal rules
- 34.12 Execute modes
- 34.13 Resource limit control
- 34.14 Auditing rules
- 35 AppArmor profile repositories
- 36 Building and managing profiles with YaST
- 37 Building profiles from the command line
- 38 Profiling your Web applications using ChangeHat
- 39 Confining users with
pam_apparmor
- 40 Managing profiled applications
- 41 Support
- 42 AppArmor glossary
- VI SELinux
- VII The Linux Audit Framework
- 44 Understanding Linux audit
- 44.1 Introducing the components of Linux audit
- 44.2 Configuring the audit daemon
- 44.3 Controlling the audit system using
auditctl
- 44.4 Passing parameters to the audit system
- 44.5 Understanding the audit logs and generating reports
- 44.6 Querying the audit daemon logs with
ausearch
- 44.7 Analyzing processes with
autrace
- 44.8 Visualizing audit data
- 44.9 Relaying audit event notifications
- 45 Setting up the Linux audit framework
- 46 Introducing an audit rule set
- 46.1 Adding basic audit configuration parameters
- 46.2 Adding watches on audit log files and configuration files
- 46.3 Monitoring file system objects
- 46.4 Monitoring security configuration files and databases
- 46.5 Monitoring miscellaneous system calls
- 46.6 Filtering system call arguments
- 46.7 Managing audit event records using keys
- 47 Useful resources
- 44 Understanding Linux audit
- A GNU licenses
List of Figures- 3.1 NIS server setup
- 3.2 Master server setup
- 3.3 Changing the directory and synchronizing files for a NIS server
- 3.4 NIS server maps setup
- 3.5 Setting request permissions for a NIS server
- 3.6 Setting domain and address of a NIS server
- 5.1 Structure of an LDAP directory
- 6.1 Kerberos network topology
- 7.1 Schema of Winbind-based Active Directory authentication
- 7.2 Main window of
- 7.3 Enrolling into a domain
- 7.4 Configuration window of
- 7.5 Determining Windows domain membership
- 7.6 Providing administrator credentials
- 13.1 Key retrieval with
cryptctl
(model without connection to KMIP server) - 16.1 Output from spectre-meltdown-checker
- 17.1 YaST security center and hardening: security overview
- 19.1 Minimum ACL: ACL entries compared to permission bits
- 19.2 Extended ACL: ACL entries compared to permission bits
- 22.1 jail.local file settings
- 23.1 iptables: a packet's possible paths
- 24.1 Routed VPN
- 24.2 Bridged VPN - scenario 1
- 24.3 Bridged VPN - scenario 2
- 24.4 Bridged VPN - scenario 3
- 25.1 Create a new XCA database
- 37.1
aa-notify Message in GNOME
- 38.1 Adminer login page
- 44.1 Introducing the components of Linux audit
- 44.2 Flow graph—program versus system call relationship
- 44.3 Bar chart—common event types
List of Tables- 5.1 Commonly used object classes and attributes
- 13.1 List of all parameters to define the resource group with the cryptctl crm script.
- 14.1 Sample rules/constraints for password enforcement
- 19.1 ACL entry types
- 19.2 Masking access permissions
- 20.1 Important AIDE check boxes
- 23.1 Important sysconfig variables for static port configuration
- 41.1 Man pages: sections and categories
- 44.1 Audit status flags
List of Examples- 2.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default configuration for the
auth
section (common-auth
) - 2.3 Default configuration for the
account
section (common-account
) - 2.4 Default configuration for the
password
section (common-password
) - 2.5 Default configuration for the
session
section (common-session
) - 2.6 pam_env.conf
- 5.1 Excerpt from CN=schema
- 5.2 Minimal 389 Directory Server instance configuration file
- 5.3 A
.dsrc
file for local administration - 5.4 Two supplier replicas
- 5.5 Four supplier replicas
- 5.6 Six replicas
- 5.7 Six replicas with read-only consumers
- 6.1 Example KDC configuration,
/etc/krb5.conf
- 9.1 Configuration
- 22.1 Example sshd_config
- 23.1 Callback port configuration for the
nfs
kernel module in/etc/modprobe.d/60-nfs.conf
- 23.2 Commands to define a new
firewalld
RPC service for NFS - 24.1 VPN server configuration file
- 24.2 VPN client configuration file
- 32.1 Output of
aa-unconfined
- 37.1 Learning mode exception: controlling access to specific resources
- 37.2 Learning mode exception: defining permissions for an entry
- 43.1 Security context settings using
ls -Z
- 43.2 Verifying that SELinux is functional
- 43.3 Getting a list of booleans and verifying policy access
- 43.4 Getting file context information
- 43.5 The default context for directories in the root directory
- 43.6 Showing SELinux settings for processes with
ps Zaux
- 43.7 Viewing default file contexts
- 43.8 Example lines from
/var/log/audit/audit.log
- 43.9 Analyzing audit messages
- 43.10 Viewing which lines deny access
- 43.11 Creating a policy module allowing an action previously denied
- 44.1 Default /etc/audit/auditd.conf
- 44.2 Example output of
auditctl
-s
- 44.3 Example audit rules—audit system parameters
- 44.4 Example audit rules—file system auditing
- 44.5 Example audit rules—system call auditing
- 44.6 Deleting audit rules and events
- 44.7 Listing rules with
auditctl
-l
- 44.8 A simple audit event—viewing the audit log
- 44.9 An advanced audit event—login via SSH
- 44.10 Example /etc/audit/auditd.conf
- 44.11 Example /etc/audit/plugins.d/syslog.conf
Copyright © 2006–2025 diff --git a/main/html/SLES-storage/book-storage.html b/main/html/SLES-storage/book-storage.html index 93a1afad5d..5a40efb9d0 100644 --- a/main/html/SLES-storage/book-storage.html +++ b/main/html/SLES-storage/book-storage.html @@ -109,7 +109,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7This guide provides information about how to manage storage devices on a SUSE Linux Enterprise Server. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- I File systems and mounting
- 1 Overview of file systems in Linux
- 1.1 Terminology
- 1.2 Btrfs
- 1.3 XFS
- 1.4 Ext2
- 1.5 Ext3
- 1.6 Ext4
- 1.7 ReiserFS
- 1.8 OpenZFS and ZFS
- 1.9 tmpfs
- 1.10 Other supported file systems
- 1.11 Blocked file systems
- 1.12 Large file support in Linux
- 1.13 Linux kernel storage limitations
- 1.14 Freeing unused file system blocks
- 1.15 Troubleshooting file systems
- 1.16 More information
- 2 Resizing file systems
- 3 Mounting storage devices
- 4 Multi-tier caching for block device operations
- 1 Overview of file systems in Linux
- II Logical volumes (LVM)
- 5 LVM configuration
- 5.1 Understanding the logical volume manager
- 5.2 Creating volume groups
- 5.3 Creating logical volumes
- 5.4 Automatically activating non-root LVM volume groups
- 5.5 Resizing an existing volume group
- 5.6 Resizing a logical volume
- 5.7 Deleting a volume group or a logical volume
- 5.8 Disabling LVM on boot
- 5.9 Using LVM commands
- 5.10 Tagging LVM2 storage objects
- 6 LVM volume snapshots
- 5 LVM configuration
- III Software RAID
- IV Network storage
- 14 iSNS for Linux
- 15 Mass storage over IP networks: iSCSI
- 15.1 Installing the iSCSI LIO target server and iSCSI initiator
- 15.2 Setting up an iSCSI LIO target server
- 15.3 Configuring iSCSI initiator
- 15.4 Setting up software targets using targetcli-fb
- 15.5 Using iSCSI disks when installing
- 15.6 Troubleshooting iSCSI
- 15.7 iSCSI LIO target terminology
- 15.8 More information
- 16 Fibre Channel storage over Ethernet networks: FCoE
- 17 NVMe-oF
- 18 Managing multipath I/O for devices
- 18.1 Understanding multipath I/O
- 18.2 Hardware support
- 18.3 Planning for multipathing
- 18.4 Installing SUSE Linux Enterprise Server on multipath systems
- 18.5 Updating SLE on multipath systems
- 18.6 Multipath management tools
- 18.7 Configuring the system for multipathing
- 18.8 Multipath configuration
- 18.9 Configuring policies for failover, queuing, and failback
- 18.10 Configuring path grouping and priorities
- 18.11 Selecting devices for multipathing
- 18.12 Multipath device names and WWIDs
- 18.13 Miscellaneous options
- 18.14 Best practice
- 18.15 Troubleshooting MPIO
- 19 Sharing file systems with NFS
- 20 Samba
- 21 On-demand mounting with autofs
- A GNU licenses
List of Figures- 1.1 Enabling Btrfs quotas
- 1.2 Setting quota for a subvolume
- 1.3 List of subvolumes for a device
- 5.1 Physical partitioning versus LVM
- 5.2 Physical volumes in the volume group named DATA
- 7.1 Example RAID 5 configuration
- 14.1 iSNS discovery domains
- 15.1 iSCSI SAN with an iSNS server
- 16.1 Open Fibre channel over Ethernet SAN
- 19.1 NFS server configuration tool
- 20.1 Determining Windows domain membership
- 20.2 Windows Explorer dialog
- 20.3 Windows Explorer directory listing with compressed files
- 20.4 Adding a new Samba share with snapshots enabled
- 20.5 The tab in Windows explorer
List of Tables- 1.1 File system types in Linux
- 1.2 Maximum sizes of files and file systems (on-disk format, 4 KiB block size)
- 1.3 Storage limitations
- 2.1 File system support for resizing
- 7.1 Comparison of RAID 5 and RAID 6
- 9.1 Nested RAID levels
- 9.2 Scenario for creating a RAID 10 (1+0) by nesting
- 9.3 Scenario for creating a RAID 10 (0+1) by nesting
- 9.4 Complex RAID 10 compared to nested RAID 10
- 9.5 Scenario for creating a RAID 10 using mdadm
- 11.1 Tasks involved in resizing a RAID
- 11.2 Scenario for increasing the size of component partitions
- 12.1 Translation between non-SES-2 patterns and SES-2 patterns
List of ExamplesCopyright © 2006–2025 diff --git a/main/html/SLES-storage/index.html b/main/html/SLES-storage/index.html index 93a1afad5d..5a40efb9d0 100644 --- a/main/html/SLES-storage/index.html +++ b/main/html/SLES-storage/index.html @@ -109,7 +109,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7This guide provides information about how to manage storage devices on a SUSE Linux Enterprise Server. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- I File systems and mounting
- 1 Overview of file systems in Linux
- 1.1 Terminology
- 1.2 Btrfs
- 1.3 XFS
- 1.4 Ext2
- 1.5 Ext3
- 1.6 Ext4
- 1.7 ReiserFS
- 1.8 OpenZFS and ZFS
- 1.9 tmpfs
- 1.10 Other supported file systems
- 1.11 Blocked file systems
- 1.12 Large file support in Linux
- 1.13 Linux kernel storage limitations
- 1.14 Freeing unused file system blocks
- 1.15 Troubleshooting file systems
- 1.16 More information
- 2 Resizing file systems
- 3 Mounting storage devices
- 4 Multi-tier caching for block device operations
- 1 Overview of file systems in Linux
- II Logical volumes (LVM)
- 5 LVM configuration
- 5.1 Understanding the logical volume manager
- 5.2 Creating volume groups
- 5.3 Creating logical volumes
- 5.4 Automatically activating non-root LVM volume groups
- 5.5 Resizing an existing volume group
- 5.6 Resizing a logical volume
- 5.7 Deleting a volume group or a logical volume
- 5.8 Disabling LVM on boot
- 5.9 Using LVM commands
- 5.10 Tagging LVM2 storage objects
- 6 LVM volume snapshots
- 5 LVM configuration
- III Software RAID
- IV Network storage
- 14 iSNS for Linux
- 15 Mass storage over IP networks: iSCSI
- 15.1 Installing the iSCSI LIO target server and iSCSI initiator
- 15.2 Setting up an iSCSI LIO target server
- 15.3 Configuring iSCSI initiator
- 15.4 Setting up software targets using targetcli-fb
- 15.5 Using iSCSI disks when installing
- 15.6 Troubleshooting iSCSI
- 15.7 iSCSI LIO target terminology
- 15.8 More information
- 16 Fibre Channel storage over Ethernet networks: FCoE
- 17 NVMe-oF
- 18 Managing multipath I/O for devices
- 18.1 Understanding multipath I/O
- 18.2 Hardware support
- 18.3 Planning for multipathing
- 18.4 Installing SUSE Linux Enterprise Server on multipath systems
- 18.5 Updating SLE on multipath systems
- 18.6 Multipath management tools
- 18.7 Configuring the system for multipathing
- 18.8 Multipath configuration
- 18.9 Configuring policies for failover, queuing, and failback
- 18.10 Configuring path grouping and priorities
- 18.11 Selecting devices for multipathing
- 18.12 Multipath device names and WWIDs
- 18.13 Miscellaneous options
- 18.14 Best practice
- 18.15 Troubleshooting MPIO
- 19 Sharing file systems with NFS
- 20 Samba
- 21 On-demand mounting with autofs
- A GNU licenses
List of Figures- 1.1 Enabling Btrfs quotas
- 1.2 Setting quota for a subvolume
- 1.3 List of subvolumes for a device
- 5.1 Physical partitioning versus LVM
- 5.2 Physical volumes in the volume group named DATA
- 7.1 Example RAID 5 configuration
- 14.1 iSNS discovery domains
- 15.1 iSCSI SAN with an iSNS server
- 16.1 Open Fibre channel over Ethernet SAN
- 19.1 NFS server configuration tool
- 20.1 Determining Windows domain membership
- 20.2 Windows Explorer dialog
- 20.3 Windows Explorer directory listing with compressed files
- 20.4 Adding a new Samba share with snapshots enabled
- 20.5 The tab in Windows explorer
List of Tables- 1.1 File system types in Linux
- 1.2 Maximum sizes of files and file systems (on-disk format, 4 KiB block size)
- 1.3 Storage limitations
- 2.1 File system support for resizing
- 7.1 Comparison of RAID 5 and RAID 6
- 9.1 Nested RAID levels
- 9.2 Scenario for creating a RAID 10 (1+0) by nesting
- 9.3 Scenario for creating a RAID 10 (0+1) by nesting
- 9.4 Complex RAID 10 compared to nested RAID 10
- 9.5 Scenario for creating a RAID 10 using mdadm
- 11.1 Tasks involved in resizing a RAID
- 11.2 Scenario for increasing the size of component partitions
- 12.1 Translation between non-SES-2 patterns and SES-2 patterns
List of ExamplesCopyright © 2006–2025 diff --git a/main/html/SLES-tuning/book-tuning.html b/main/html/SLES-tuning/book-tuning.html index b464114664..e734dbfa39 100644 --- a/main/html/SLES-tuning/book-tuning.html +++ b/main/html/SLES-tuning/book-tuning.html @@ -107,7 +107,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7This guide supports administrators in problem detection, - resolution and optimization.
Publication Date: January 07, 2025 + resolution and optimization.Publication Date: January 09, 2025- Preface
- I Basics
- II System monitoring
- III Kernel monitoring
- IV Resource management
- V Kernel tuning
- VI Handling system dumps
- VII Synchronized clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
output on a lightly used machine - 2.2
vmstat
output on a heavily used machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap script
- 4.2 Probe with timer event
- 4.3
printf
Function with format specifiers - 4.4 Using global variables
- 4.5 Monitoring incoming TCP connections with
tcp_connections.stp
- 12.1 Example output of
cpupower frequency-info
- 12.2 Example output of
cpupower idle-info
- 12.3 Example
cpupower monitor
output - 13.1 Creating and applying a profile hook
- 13.2 Custom hook script to handle specific tasks before applying the custom profile
- 13.3 TuneD profile with custom script path
- 13.4 Default global TuneD configuration
- 13.5 Merging
balanced
andpowersave
TuneD profiles - 13.6 Merged configuration for
balanced
andpowersave
TuneD profiles - 13.7 Automatic reload of kernel modules by TuneD
- 13.8 TuneD plug-in configuration for CPU-intensive workload
- 13.9 TuneD plug-in configuration for optimal audio performance
- 13.10
disk
plug-in configuration in a TuneD profile - 13.11 Using dynamic variables for plug-in configurations in a TuneD profile
- 13.12 Sample configuration for the
sysctl
plug-in in a TuneD profile - 13.13
sysfs
plug-in configuration in a TuneD profile - 13.14
systemd
plug-in configuration in a TuneD profile - 13.15 Using variables for including a relative script path in a TuneD profile
- 13.16
scheduler
plug-in configuration in a TuneD profile - 13.17
bootloader
plug-in configuration in a TuneD profile - 13.18
net
plug-in configuration in a TuneD profile - 13.19
vm
plug-in configuration in a TuneD profile - 18.1 Checking Parameters
- 22.1 Slave clock using software time stamping
- 22.2 Slave clock using hardware time stamping
- 22.3 Master clock using hardware time stamping
- 22.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2025 diff --git a/main/html/SLES-tuning/index.html b/main/html/SLES-tuning/index.html index b464114664..e734dbfa39 100644 --- a/main/html/SLES-tuning/index.html +++ b/main/html/SLES-tuning/index.html @@ -107,7 +107,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7This guide supports administrators in problem detection, - resolution and optimization.
Publication Date: January 07, 2025 + resolution and optimization.Publication Date: January 09, 2025- Preface
- I Basics
- II System monitoring
- III Kernel monitoring
- IV Resource management
- V Kernel tuning
- VI Handling system dumps
- VII Synchronized clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
output on a lightly used machine - 2.2
vmstat
output on a heavily used machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap script
- 4.2 Probe with timer event
- 4.3
printf
Function with format specifiers - 4.4 Using global variables
- 4.5 Monitoring incoming TCP connections with
tcp_connections.stp
- 12.1 Example output of
cpupower frequency-info
- 12.2 Example output of
cpupower idle-info
- 12.3 Example
cpupower monitor
output - 13.1 Creating and applying a profile hook
- 13.2 Custom hook script to handle specific tasks before applying the custom profile
- 13.3 TuneD profile with custom script path
- 13.4 Default global TuneD configuration
- 13.5 Merging
balanced
andpowersave
TuneD profiles - 13.6 Merged configuration for
balanced
andpowersave
TuneD profiles - 13.7 Automatic reload of kernel modules by TuneD
- 13.8 TuneD plug-in configuration for CPU-intensive workload
- 13.9 TuneD plug-in configuration for optimal audio performance
- 13.10
disk
plug-in configuration in a TuneD profile - 13.11 Using dynamic variables for plug-in configurations in a TuneD profile
- 13.12 Sample configuration for the
sysctl
plug-in in a TuneD profile - 13.13
sysfs
plug-in configuration in a TuneD profile - 13.14
systemd
plug-in configuration in a TuneD profile - 13.15 Using variables for including a relative script path in a TuneD profile
- 13.16
scheduler
plug-in configuration in a TuneD profile - 13.17
bootloader
plug-in configuration in a TuneD profile - 13.18
net
plug-in configuration in a TuneD profile - 13.19
vm
plug-in configuration in a TuneD profile - 18.1 Checking Parameters
- 22.1 Slave clock using software time stamping
- 22.2 Slave clock using hardware time stamping
- 22.3 Master clock using hardware time stamping
- 22.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2025 diff --git a/main/html/SLES-upgrade/book-upgrade.html b/main/html/SLES-upgrade/book-upgrade.html index ae38118b75..6f8637b54d 100644 --- a/main/html/SLES-upgrade/book-upgrade.html +++ b/main/html/SLES-upgrade/book-upgrade.html @@ -103,7 +103,7 @@ of SUSE Linux Enterprise Server. If you use SUSE Linux Enterprise Server as base system for other SLE products or extensions, also see their product documentation for upgrade information specific to this product or extension. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- 1 Lifecycle and support
- 2 Upgrade paths and methods
- 3 Preparing the upgrade
- 3.1 Make sure the system is up-to-date
- 3.2 Read the release notes
- 3.3 Make a backup
- 3.4 Check the available disk space
- 3.5 Listing installed packages and repositories
- 3.6 Disable the LTSS extension
- 3.7 Migrate your PostgreSQL database
- 3.8 Migrate your MySQL or MariaDB database
- 3.9 Create non-MD5 server certificates for Java applications
- 3.10 Shut down virtual machine guests
- 3.11 Adjust your SMT client setup
- 3.12 Changes in AutoYaST profiles from SLE 12 to 15
- 3.13 Upgrading a Subscription Management Tool (SMT) server
- 3.14 Temporarily disabling kernel multiversion support
- 3.15 Adjust the
resume
boot parameter - 3.16 Upgrading on IBM Z
- 3.17 IBM POWER: Starting an X server
- 4 Upgrading offline
- 5 Upgrading online
- 5.1 Conceptual overview
- 5.2 Service pack migration workflow
- 5.3 Canceling service pack migration
- 5.4 Upgrading with the online migration tool (YaST)
- 5.5 Upgrading with Zypper
- 5.6 Upgrading with plain Zypper
- 5.7 Rolling back a service pack
- 5.8 Upgrading with SUSE Manager
- 5.9 Upgrading from openSUSE Leap to SUSE Linux Enterprise Server
- 6 Finishing the upgrade
- 7 Backports of source code
- A GNU licenses
List of FiguresList of TablesList of ExamplesCopyright © 2006–2025 diff --git a/main/html/SLES-upgrade/index.html b/main/html/SLES-upgrade/index.html index ae38118b75..6f8637b54d 100644 --- a/main/html/SLES-upgrade/index.html +++ b/main/html/SLES-upgrade/index.html @@ -103,7 +103,7 @@ of SUSE Linux Enterprise Server. If you use SUSE Linux Enterprise Server as base system for other SLE products or extensions, also see their product documentation for upgrade information specific to this product or extension. -
Publication Date: January 07, 2025 +Publication Date: January 09, 2025- Preface
- 1 Lifecycle and support
- 2 Upgrade paths and methods
- 3 Preparing the upgrade
- 3.1 Make sure the system is up-to-date
- 3.2 Read the release notes
- 3.3 Make a backup
- 3.4 Check the available disk space
- 3.5 Listing installed packages and repositories
- 3.6 Disable the LTSS extension
- 3.7 Migrate your PostgreSQL database
- 3.8 Migrate your MySQL or MariaDB database
- 3.9 Create non-MD5 server certificates for Java applications
- 3.10 Shut down virtual machine guests
- 3.11 Adjust your SMT client setup
- 3.12 Changes in AutoYaST profiles from SLE 12 to 15
- 3.13 Upgrading a Subscription Management Tool (SMT) server
- 3.14 Temporarily disabling kernel multiversion support
- 3.15 Adjust the
resume
boot parameter - 3.16 Upgrading on IBM Z
- 3.17 IBM POWER: Starting an X server
- 4 Upgrading offline
- 5 Upgrading online
- 5.1 Conceptual overview
- 5.2 Service pack migration workflow
- 5.3 Canceling service pack migration
- 5.4 Upgrading with the online migration tool (YaST)
- 5.5 Upgrading with Zypper
- 5.6 Upgrading with plain Zypper
- 5.7 Rolling back a service pack
- 5.8 Upgrading with SUSE Manager
- 5.9 Upgrading from openSUSE Leap to SUSE Linux Enterprise Server
- 6 Finishing the upgrade
- 7 Backports of source code
- A GNU licenses
List of FiguresList of TablesList of ExamplesCopyright © 2006–2025 diff --git a/main/html/SLES-virtualization-best-practices/article-virtualization-best-practices.html b/main/html/SLES-virtualization-best-practices/article-virtualization-best-practices.html index 8840f1b84b..d6401b7222 100644 --- a/main/html/SLES-virtualization-best-practices/article-virtualization-best-practices.html +++ b/main/html/SLES-virtualization-best-practices/article-virtualization-best-practices.html @@ -99,7 +99,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7Virtualization Best Practices #
Publication Date: - January 07, 2025 + January 09, 20251 Virtualization scenarios #
Virtualization offers a lot of capabilities for your environment. It can diff --git a/main/html/SLES-virtualization-best-practices/index.html b/main/html/SLES-virtualization-best-practices/index.html index 8840f1b84b..d6401b7222 100644 --- a/main/html/SLES-virtualization-best-practices/index.html +++ b/main/html/SLES-virtualization-best-practices/index.html @@ -99,7 +99,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP7Virtualization Best Practices #
Publication Date: - January 07, 2025 + January 09, 20251 Virtualization scenarios #
Virtualization offers a lot of capabilities for your environment. It can diff --git a/main/html/SLES-virtualization/book-virtualization.html b/main/html/SLES-virtualization/book-virtualization.html index 3d16f67af3..84a709bbce 100644 --- a/main/html/SLES-virtualization/book-virtualization.html +++ b/main/html/SLES-virtualization/book-virtualization.html @@ -101,7 +101,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.