Jump to contentJump to page navigation: previous page [access key p]/next page [access key n]
openSUSE Leap 15.6

AutoYaST Guide


AutoYaST is a system for unattended mass deployment of openSUSE Leap systems. It uses an AutoYaST profile that contains installation and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration.

Publication Date: June 10, 2024
Available documentation
Improving the documentation
Documentation conventions
1 Introduction to AutoYaST
1.1 Motivation
1.2 Overview and concept
I Understanding and creating the AutoYaST control file
2 The AutoYaST control file
2.1 Introduction
2.2 Format
2.3 Structure
3 Creating an AutoYaST control file
3.1 Collecting information
3.2 Using the configuration management system (CMS)
3.3 Creating/editing a control file manually
3.4 Creating a control file via script with XSLT
3.5 Checking a control file
II AutoYaST configuration examples
4 Configuration and installation options
4.1 General options
4.2 Reporting
4.3 The GRUB 2 boot loader
4.4 The Systemd boot loader
4.5 Partitioning
4.6 iSCSI initiator overview
4.7 Fibre channel over Ethernet configuration (FCoE)
4.8 Country settings
4.9 Software
4.10 Upgrade
4.11 Services and targets
4.12 Network configuration
4.13 Proxy
4.14 NIS client and server
4.15 NIS server
4.16 Hosts definition
4.17 Windows domain membership
4.18 Samba server
4.19 Authentication client
4.20 NFS client and server
4.21 NTP client
4.22 Mail server configuration
4.23 Apache HTTP server configuration
4.24 Squid server
4.25 FTP server
4.26 TFTP server
4.27 Firstboot workflow
4.28 Security settings
4.29 Linux audit framework (LAF)
4.30 Users and groups
4.31 Custom user scripts
4.32 System variables (sysconfig)
4.33 Adding complete configurations
4.34 Ask the user for values during installation
4.35 Kernel dumps
4.36 DNS server
4.37 DHCP server
4.38 Firewall configuration
4.39 Miscellaneous hardware and system components
4.40 Importing SSH keys and configuration
4.41 Configuration management
III Managing mass installations with dynamic profiles
5 Supported approaches to dynamic profiles
6 Rules and classes
6.1 Rule-based automatic installation
6.2 Classes
6.3 Mixing rules and classes
6.4 Merging of rules and classes
7 ERB templates
7.1 What is ERB?
7.2 Template helpers
7.3 Running ERB helpers
7.4 Rendering ERB profiles
7.5 Debugging ERB profiles
7.6 ERB compared to rules and classes
8 Combining ERB templates and scripts
8.1 Embedding ERB in your scripts
8.2 Accessing ERB helpers from Ruby scripts
IV Understanding the auto-installation process
9 The auto-installation process
9.1 Introduction
9.2 Choosing the right boot medium
9.3 Invoking the auto-installation process
9.4 System configuration
V Uses for AutoYaST on installed systems
10 Running AutoYaST in an installed system
VI Appendixes
A Handling rules
B AutoYaST FAQ—frequently asked questions
C Advanced linuxrc options
C.1 Passing parameters to linuxrc
C.2 info file format
C.3 Advanced network setup
D GNU licenses
D.1 GNU Free Documentation License
List of Examples
2.1 AutoYaST control file (profile)
2.2 Control file container
2.3 Nested resources
2.4 An empty map
3.1 Example file for replacing the host name/domain by script
4.1 General options
4.2 Reporting behavior
4.3 LVM-based guided partitioning
4.4 Creating /, /home and swap partitions
4.5 Using a whole disk as a file system
4.6 Automated partitioning on selected drives
4.7 Installing on multiple drives
4.8 Mount options
4.9 Keeping partitions
4.10 Auto-detection of partitions to be kept.
4.11 Create LVM physical volume
4.12 LVM logical volumes
4.13 RAID10 configuration
4.14 RAID10 without partitions
4.15 Old style RAID10 configuration
4.16 Using multipath devices
4.17 Listing multipath devices
4.18 Using the WWID to identify a multipath device
4.19 bcache definition
4.20 Multi-device Btrfs configuration
4.21 NFS share definition
4.22 tmpfs definition
4.23 iSCSI client
4.24 FCoE configuration
4.25 Language
4.26 Time zone
4.27 Keyboard
4.28 Package selection in the control file with patterns and packages sections
4.29 Packages selection using a regular expression
4.30 Activating image deployment
4.31 Creating a package database with the additional package inst-source-utils.rpm
4.32 add_on_products.xml
4.33 Adding the SDK extension and a user defined repository
4.34 Kernel selection in the control file
4.35 Package selection in control file
4.36 Upgrade and backup
4.37 Configuring services and targets
4.38 Network configuration
4.39 Bonding interface configuration
4.40 Bridge interface configuration
4.41 Multiple IP Addresses
4.42 Assigning a persistent name using the MAC address
4.43 Network routing configuration
4.44 Network configuration: proxy
4.45 Network configuration: NIS
4.46 NIS server configuration
4.47 /etc/hosts
4.48 Samba client configuration
4.49 Samba server configuration
4.50 Network configuration: NFS client
4.51 Network configuration: NFS server
4.52 Network configuration: NTP client
4.53 Mail configuration
4.54 HTTP server configuration
4.55 Squid server configuration
4.56 FTP server configuration:
4.57 TFTP server configuration:
4.58 Enabling firstboot workflow
4.59 Security configuration
4.60 Select the Defense Information Systems Agency Security Technical Implementation Guide
4.61 LAF configuration
4.62 Minimal user configuration
4.63 Complex user configuration
4.64 Group configuration
4.65 Enabling autologin and password-less login
4.66 Script configuration
4.67 Sysconfig configuration
4.68 Dumping files into the installed system
4.69 Dumping files into the installed system
4.70 Kdump configuration
4.71 Disabled Kdump configuration
4.72 Kdump memory reservation with multiple values
4.73 Basic DNS server settings
4.74 Configuring DNS server zones and advanced settings
4.75 Example dhcp-server section
4.76 Example firewall section
4.77 Printer configuration
4.78 Sound configuration
4.79 Importing SSH keys and configuration from /dev/sda2
4.80 Client/server with manual authentication
4.81 Client/server with preseed keys
4.82 Stand-alone mode
6.1 Simple rules file
6.2 Simple rules file
7.1 Including a file using ERB
7.2 Running commands with Ruby
7.3 Using Ruby structures
7.4 Configuring the boot loader
7.5 Using the largest disk
7.6 Configure the connected network cards
7.7 Reusing the same profile for different distributions
7.8 Filtering USB devices
7.9 Running helpers
7.10 Rendering profile
7.11 Preparing the debug environment
7.12 Adding a breakpoint
7.13 Rules and classes
7.14 ERB
8.1 Using the MAC address to get the profile
8.2 Accessing ERB helpers from a Ruby script
9.1 Determine HEX code for an IP address
9.2 linuxrc Options in the AutoYaST control file

Copyright © 2006–2024 SUSE LLC and contributors. All rights reserved.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled GNU Free Documentation License.

For SUSE trademarks, see https://www.suse.com/company/legal/. All third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its affiliates. Asterisks (*) denote third-party trademarks.

All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof.

Print this page