Jump to contentJump to page navigation: previous page [access key p]/next page [access key n]
openSUSE Leap 15.2

AutoYaST Guide

AutoYaST is a system for unattended mass deployment of openSUSE Leap systems. AutoYaST installations are performed using an AutoYaST control file (also called a profile) with your customized installation and configuration data.

Publication Date: December 16, 2020
1 Introduction to AutoYaST
1.1 Motivation
1.2 Overview and Concept
I Understanding and Creating the AutoYaST Control File
2 The AutoYaST Control File
2.1 Introduction
2.2 Format
2.3 Structure
3 Creating an AutoYaST Control File
3.1 Collecting Information
3.2 Using the Configuration Management System (CMS)
3.3 Creating/Editing a Control File Manually
3.4 Creating a Control File via Script with XSLT
II AutoYaST Configuration Examples
4 Configuration and Installation Options
4.1 General Options
4.2 Reporting
4.3 The Boot Loader
4.4 Partitioning
4.5 iSCSI Initiator Overview
4.6 Fibre Channel over Ethernet Configuration (FCoE)
4.7 Country Settings
4.8 Software
4.9 Upgrade
4.10 Services and Targets
4.11 Network Configuration
4.12 NIS Client and Server
4.13 NIS Server
4.14 Hosts Definition
4.15 Windows Domain Membership
4.16 Samba Server
4.17 Authentication Client
4.18 NFS Client and Server
4.19 NTP Client
4.20 Mail Server Configuration
4.21 Apache HTTP Server Configuration
4.22 Squid Server
4.23 FTP Server
4.24 TFTP Server
4.25 Firstboot Workflow
4.26 Security Settings
4.27 Linux Audit Framework (LAF)
4.28 Users and Groups
4.29 Custom User Scripts
4.30 System Variables (Sysconfig)
4.31 Adding Complete Configurations
4.32 Ask the User for Values during Installation
4.33 Kernel Dumps
4.34 DNS Server
4.35 DHCP Server
4.36 Firewall Configuration
4.37 Miscellaneous Hardware and System Components
4.38 Importing SSH Keys and Configuration
4.39 Configuration Management
III Managing Mass Installations with Rules and Classes
5 Rules and Classes
5.1 Rule-based Automatic Installation
5.2 Classes
5.3 Mixing Rules and Classes
5.4 Merging of Rules and Classes
IV Understanding the Auto-Installation Process
6 The Auto-Installation Process
6.1 Introduction
6.2 Choosing the Right Boot Medium
6.3 Invoking the Auto-Installation Process
6.4 System Configuration
V Uses for AutoYaST on Installed Systems
7 Running AutoYaST in an Installed System
VI Appendices
A Handling Rules
B AutoYaST FAQ—Frequently Asked Questions
C Advanced linuxrc Options
C.1 Passing Parameters to linuxrc
C.2 info File Format
C.3 Advanced Network Setup
D Differences Between AutoYaST Profiles in SLE 42.3 and 15
D.1 Partitioning
D.2 Firewall Configuration
D.3 NTP Configuration
D.4 AutoYaST Packages Are Needed for the Second Stage
D.5 The CA Management Module Has Been Dropped
D.6 Upgrade
List of Examples
2.1 AutoYaST Control File (Profile)
2.2 Control file container
2.3 Nested Resources
3.1 Example File for Replacing the Host Name/Domain by Script
4.1 General Options
4.2 Reporting Behavior
4.3 LVM-based Guided Partitioning
4.4 Creating /, /home and swap partitions
4.5 Using a Whole Disk as a File System
4.6 Automated Partitioning on Selected Drives
4.7 Installing on Multiple Drives
4.8 Mount Options
4.9 Keeping partitions
4.10 Auto-detection of partitions to be kept.
4.11 Create LVM Physical Volume
4.12 LVM Logical Volumes
4.13 RAID1 Configuration
4.14 RAID1 Without Partitions
4.15 Old Style RAID1 Configuration
4.16 Using Multipath Devices
4.17 Listing multipath devices
4.18 Using the WWID to Identify a Multipath Device
4.19 bcache Definition
4.20 Multi-device Btrfs configuration
4.21 NFS Share Definition
4.22 iSCSI client
4.23 FCoE configuration
4.24 Language
4.25 Timezone
4.26 Keyboard
4.27 Package Selection in the Control File with Patterns and Packages Sections
4.28 Activating Image Deployment
4.29 Creating a Package Database With the Additional Package inst-source-utils.rpm
4.30 add_on_products.xml
4.31 Adding the SDK Extension and a User Defined Repository
4.32 Kernel Selection in the Control File
4.33 Package Selection in Control File
4.34 Upgrade and Backup
4.35 Configuring Services and Targets
4.36 Network Configuration
4.37 Bridge Interface Configuration
4.38 Assigning a Persistent Name Using the MAC Address
4.39 Network configuration: Proxy
4.40 Network configuration: NIS
4.41 NIS Server Configuration
4.42 /etc/hosts
4.43 Samba Client configuration
4.44 Samba Server configuration
4.45 Network Configuration: NFS Client
4.46 Network Configuration: NFS Server
4.47 Network Configuration: NTP Client
4.48 Mail Configuration
4.49 HTTP Server Configuration
4.50 Squid Server Configuration
4.51 FTP server configuration:
4.52 TFTP server configuration:
4.53 Enabling Firstboot Workflow
4.54 Security configuration
4.55 LAF configuration
4.56 Minimal User Configuration
4.57 Complex User Configuration
4.58 Group Configuration
4.59 Enabling autologin and password-less login
4.60 Script Configuration
4.61 Sysconfig Configuration
4.62 Dumping files into the installed system
4.63 Dumping files into the installed system
4.64 Kdump configuration
4.65 Kdump memory reservation with multiple values
4.66 Basic DNS server settings
4.67 Configuring DNS server zones and advanced settings
4.68 Example dhcp-server section
4.69 Example firewall section
4.70 Printer configuration
4.71 Sound configuration
4.72 Importing SSH Keys and Configuration from /dev/sda2
4.73 Client/Server with Manual Authentication
4.74 Client/Server with Preseed Keys
4.75 Standalone Mode
5.1 Simple Rules File
5.2 Simple Rules File
6.1 Determine HEX code for an IP address
6.2 linuxrc Options in the AutoYaST Control File
D.1 Specifying the Btrfs Default Subvolume Name
D.2 Disabling Btrfs Subvolumes
D.3 Assigning Zones: Default Configuration (Deprecated Syntax)
D.4 Assigning Zones: Default Configuration (Leap 15 Syntax)
D.5 Masquerading and Protecting Internal Zones (Deprecated Syntax)
D.6 Masquerading and Protecting Internal Zones (Leap 15 Syntax)
D.7 Opening Ports (Deprecated Syntax)
D.8 Opening Ports (Leap 15 Syntax)
D.9 Opening Services (Deprecated Syntax)
D.10 Opening Services (Leap 15 Syntax)
D.11 NTP configuration (Leap 15 Syntax)

Copyright © 2006– 2020 SUSE LLC and contributors. All rights reserved.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled GNU Free Documentation License.

For SUSE trademarks, see https://www.suse.com/company/legal/. All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its affiliates. Asterisks (*) denote third-party trademarks.

All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof.

Print this page