AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
AMD's Secure Encrypted Virtualization (SEV) allows the memory of virtual machines to be encrypted. This is a new feature for Linux's built-in diff --git a/SLE15SP1/html/SLES-amd-sev/index.html b/SLE15SP1/html/SLES-amd-sev/index.html index 86d8a1e95a4..ee16198668d 100644 --- a/SLE15SP1/html/SLES-amd-sev/index.html +++ b/SLE15SP1/html/SLES-amd-sev/index.html @@ -27,7 +27,7 @@ useBR: false }); -
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
AMD's Secure Encrypted Virtualization (SEV) allows the memory of virtual machines to be encrypted. This is a new feature for Linux's built-in diff --git a/SLE15SP1/html/SLES-autoyast/book-autoyast.html b/SLE15SP1/html/SLES-autoyast/book-autoyast.html index e252ae871a6..1fd0da9ad40 100644 --- a/SLE15SP1/html/SLES-autoyast/book-autoyast.html +++ b/SLE15SP1/html/SLES-autoyast/book-autoyast.html @@ -42,7 +42,7 @@ and configuration data. The manual guides you through the basic steps of auto-installation: preparation, installation, and configuration.
- 1 Introduction to AutoYaST
- I Understanding and Creating the AutoYaST Control File
- II AutoYaST Configuration Examples
- 4 Configuration and Installation Options
- 4.1 General Options
- 4.2 Reporting
- 4.3 System Registration and Extension Selection
- 4.4 The Boot Loader
- 4.5 Partitioning
- 4.6 iSCSI Initiator Overview
- 4.7 Fibre Channel over Ethernet Configuration (FCoE)
- 4.8 Country Settings
- 4.9 Software
- 4.10 Upgrade
- 4.11 Services and Targets
- 4.12 Network Configuration
- 4.13 NIS Client and Server
- 4.14 NIS Server
- 4.15 Hosts Definition
- 4.16 Windows Domain Membership
- 4.17 Samba Server
- 4.18 Authentication Client
- 4.19 NFS Client and Server
- 4.20 NTP Client
- 4.21 Mail Server Configuration
- 4.22 Apache HTTP Server Configuration
- 4.23 Squid Server
- 4.24 FTP Server
- 4.25 TFTP Server
- 4.26 Firstboot Workflow
- 4.27 Security Settings
- 4.28 Linux Audit Framework (LAF)
- 4.29 Users and Groups
- 4.30 Custom User Scripts
- 4.31 System Variables (Sysconfig)
- 4.32 Adding Complete Configurations
- 4.33 Ask the User for Values during Installation
- 4.34 Kernel Dumps
- 4.35 DNS Server
- 4.36 DHCP Server
- 4.37 Firewall Configuration
- 4.38 Miscellaneous Hardware and System Components
- 4.39 Importing SSH Keys and Configuration
- 4.40 Configuration Management
- 4 Configuration and Installation Options
- III Managing Mass Installations with Rules and Classes
- IV Understanding the Auto-Installation Process
- V Uses for AutoYaST on Installed Systems
- VI Appendices
- A Handling Rules
- B AutoYaST FAQ—Frequently Asked Questions
- C Advanced
linuxrc
Options - D Differences Between AutoYaST Profiles in SLE 12 and 15 diff --git a/SLE15SP1/html/SLES-autoyast/index.html b/SLE15SP1/html/SLES-autoyast/index.html index e252ae871a6..1fd0da9ad40 100644 --- a/SLE15SP1/html/SLES-autoyast/index.html +++ b/SLE15SP1/html/SLES-autoyast/index.html @@ -42,7 +42,7 @@ and configuration data. The manual guides you through the basic steps of auto-installation: preparation, installation, and configuration.
- 1 Introduction to AutoYaST
- I Understanding and Creating the AutoYaST Control File
- II AutoYaST Configuration Examples
- 4 Configuration and Installation Options
- 4.1 General Options
- 4.2 Reporting
- 4.3 System Registration and Extension Selection
- 4.4 The Boot Loader
- 4.5 Partitioning
- 4.6 iSCSI Initiator Overview
- 4.7 Fibre Channel over Ethernet Configuration (FCoE)
- 4.8 Country Settings
- 4.9 Software
- 4.10 Upgrade
- 4.11 Services and Targets
- 4.12 Network Configuration
- 4.13 NIS Client and Server
- 4.14 NIS Server
- 4.15 Hosts Definition
- 4.16 Windows Domain Membership
- 4.17 Samba Server
- 4.18 Authentication Client
- 4.19 NFS Client and Server
- 4.20 NTP Client
- 4.21 Mail Server Configuration
- 4.22 Apache HTTP Server Configuration
- 4.23 Squid Server
- 4.24 FTP Server
- 4.25 TFTP Server
- 4.26 Firstboot Workflow
- 4.27 Security Settings
- 4.28 Linux Audit Framework (LAF)
- 4.29 Users and Groups
- 4.30 Custom User Scripts
- 4.31 System Variables (Sysconfig)
- 4.32 Adding Complete Configurations
- 4.33 Ask the User for Values during Installation
- 4.34 Kernel Dumps
- 4.35 DNS Server
- 4.36 DHCP Server
- 4.37 Firewall Configuration
- 4.38 Miscellaneous Hardware and System Components
- 4.39 Importing SSH Keys and Configuration
- 4.40 Configuration Management
- 4 Configuration and Installation Options
- III Managing Mass Installations with Rules and Classes
- IV Understanding the Auto-Installation Process
- V Uses for AutoYaST on Installed Systems
- VI Appendices
- A Handling Rules
- B AutoYaST FAQ—Frequently Asked Questions
- C Advanced
linuxrc
Options - D Differences Between AutoYaST Profiles in SLE 12 and 15 diff --git a/SLE15SP1/html/SLES-deployment/book-sle-deployment.html b/SLE15SP1/html/SLES-deployment/book-sle-deployment.html index 2075307fe4d..d45e12930ed 100644 --- a/SLE15SP1/html/SLES-deployment/book-sle-deployment.html +++ b/SLE15SP1/html/SLES-deployment/book-sle-deployment.html @@ -43,7 +43,7 @@ a remote-controlled, highly-customized, automated installation process, and initial system configuration.
- About This Guide
- I Installation Preparation
- II Installation Procedure
- 7 Boot Parameters
- 8 Installation Steps
- 8.1 Overview
- 8.2 Installer Self-Update
- 8.3 Language, Keyboard, and Product Selection diff --git a/SLE15SP1/html/SLES-deployment/index.html b/SLE15SP1/html/SLES-deployment/index.html index 2075307fe4d..d45e12930ed 100644 --- a/SLE15SP1/html/SLES-deployment/index.html +++ b/SLE15SP1/html/SLES-deployment/index.html @@ -43,7 +43,7 @@ a remote-controlled, highly-customized, automated installation process, and initial system configuration.
- About This Guide
- I Installation Preparation
- II Installation Procedure
- 7 Boot Parameters
- 8 Installation Steps
- 8.1 Overview
- 8.2 Installer Self-Update
- 8.3
Language, Keyboard, and Product Selection
diff --git a/SLE15SP1/html/SLES-dockerquick/book-sles-docker.html b/SLE15SP1/html/SLES-dockerquick/book-sles-docker.html
index 26405383123..a87602772d3 100644
--- a/SLE15SP1/html/SLES-dockerquick/book-sles-docker.html
+++ b/SLE15SP1/html/SLES-dockerquick/book-sles-docker.html
@@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
List of FiguresList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-dockerquick/index.html b/SLE15SP1/html/SLES-dockerquick/index.html index 26405383123..a87602772d3 100644 --- a/SLE15SP1/html/SLES-dockerquick/index.html +++ b/SLE15SP1/html/SLES-dockerquick/index.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
List of FiguresList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-gnomeuser/book-gnomeuser.html b/SLE15SP1/html/SLES-gnomeuser/book-gnomeuser.html index 4a547882ce5..1517625a563 100644 --- a/SLE15SP1/html/SLES-gnomeuser/book-gnomeuser.html +++ b/SLE15SP1/html/SLES-gnomeuser/book-gnomeuser.html @@ -40,7 +40,7 @@ perform key tasks. It is intended mainly for end users who want to make efficient use of GNOME as their default desktop.
Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Introduction
- 1 Getting Started with the GNOME Desktop
- 2 Working with Your Desktop
- 2.1 Managing Files and Directories
- 2.2 Accessing Removable Media
- 2.3 Searching for Files
- 2.4 Copying Text Between Applications
- 2.5 Managing Internet Connections
- 2.6 Exploring the Internet
- 2.7 E-mail and Scheduling
- 2.8 Opening or Creating Documents with LibreOffice
- 2.9 Controlling Your Desktop’s Power Management
- 2.10 Creating, Displaying, and Decompressing Archives
- 2.11 Taking Screenshots
- 2.12 Viewing PDF Files
- 2.13 Obtaining Software Updates
- 2.14 For More Information
- 3 Customizing Your Settings
- 3.1 Changing the Desktop Background
- 3.2 Configuring Language Settings
- 3.3 Configuring the Keyboard
- 3.4 Using XCompose to Type Special Characters
- 3.5 Configuring Bluetooth Settings
- 3.6 Configuring Power Settings
- 3.7 Configuring the Mouse and Touchpad
- 3.8 Installing and Configuring Printers
- 3.9 Configuring Screens
- 3.10 Configuring Sound Settings
- 3.11 Setting Default Applications
- 3.12 Setting Session Sharing Preferences
- 4 Assistive Technologies
- II Connectivity, Files and Resources
- III LibreOffice
- IV Internet and Communication
- V Graphics and Multimedia
- A Help and Documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME Login Screen
- 1.2 Default GNOME Login Screen—Session Type
- 1.3 GNOME Desktop with Activities Overview
- 2.1 File Manager
- 2.2 Archive Manager
- 2.3 Document Viewer
- 3.1 Keyboard Dialog
- 3.2 Enabling the Compose Key in Tweaks
- 3.3 Mouse and Touchpad Settings Dialog
- 3.4 Single Monitor Settings Dialog
- 3.5 Single Monitor Settings Dialog
- 3.6 Configuring Sound Settings
- 3.7 Default Applications
- 5.1 Network File Browser
- 8.1 Password and Keys Main Window
- 9.1 Customization Dialog in Writer
- 9.2 The Options Window
- 10.1 A LibreOffice Wizard
- 10.2 Styles and Formatting Panel
- 10.3 Navigator Tool in Writer
- 12.1 Mathematical Formula in LibreOffice Math
- 13.1 The Browser Window of Firefox
- 13.2 Firefox—Manage Search Engines
- 13.3 The Firefox Bookmark Library
- 13.4 The Firefox Page Info Window
- 13.5 The Preferences Window
- 13.6 Installing Firefox Extensions
- 14.1 Evolution Window
- 16.1 Ekiga User Interface
- 17.1 The Toolbox
- 17.2 The Basic Color Selector Dialog
- 17.3 The Print Dialog
- 18.1 GNOME Videos Start-Up Window
- 18.2 GNOME Videos General Preferences
- 18.3 GNOME Videos Display Preferences
- 18.4 GNOME Videos Audio Preferences
- 19.1 Main View of Brasero
- A.1 Main Window of Help
List of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-gnomeuser/index.html b/SLE15SP1/html/SLES-gnomeuser/index.html index 4a547882ce5..1517625a563 100644 --- a/SLE15SP1/html/SLES-gnomeuser/index.html +++ b/SLE15SP1/html/SLES-gnomeuser/index.html @@ -40,7 +40,7 @@ perform key tasks. It is intended mainly for end users who want to make efficient use of GNOME as their default desktop.
Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Introduction
- 1 Getting Started with the GNOME Desktop
- 2 Working with Your Desktop
- 2.1 Managing Files and Directories
- 2.2 Accessing Removable Media
- 2.3 Searching for Files
- 2.4 Copying Text Between Applications
- 2.5 Managing Internet Connections
- 2.6 Exploring the Internet
- 2.7 E-mail and Scheduling
- 2.8 Opening or Creating Documents with LibreOffice
- 2.9 Controlling Your Desktop’s Power Management
- 2.10 Creating, Displaying, and Decompressing Archives
- 2.11 Taking Screenshots
- 2.12 Viewing PDF Files
- 2.13 Obtaining Software Updates
- 2.14 For More Information
- 3 Customizing Your Settings
- 3.1 Changing the Desktop Background
- 3.2 Configuring Language Settings
- 3.3 Configuring the Keyboard
- 3.4 Using XCompose to Type Special Characters
- 3.5 Configuring Bluetooth Settings
- 3.6 Configuring Power Settings
- 3.7 Configuring the Mouse and Touchpad
- 3.8 Installing and Configuring Printers
- 3.9 Configuring Screens
- 3.10 Configuring Sound Settings
- 3.11 Setting Default Applications
- 3.12 Setting Session Sharing Preferences
- 4 Assistive Technologies
- II Connectivity, Files and Resources
- III LibreOffice
- IV Internet and Communication
- V Graphics and Multimedia
- A Help and Documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME Login Screen
- 1.2 Default GNOME Login Screen—Session Type
- 1.3 GNOME Desktop with Activities Overview
- 2.1 File Manager
- 2.2 Archive Manager
- 2.3 Document Viewer
- 3.1 Keyboard Dialog
- 3.2 Enabling the Compose Key in Tweaks
- 3.3 Mouse and Touchpad Settings Dialog
- 3.4 Single Monitor Settings Dialog
- 3.5 Single Monitor Settings Dialog
- 3.6 Configuring Sound Settings
- 3.7 Default Applications
- 5.1 Network File Browser
- 8.1 Password and Keys Main Window
- 9.1 Customization Dialog in Writer
- 9.2 The Options Window
- 10.1 A LibreOffice Wizard
- 10.2 Styles and Formatting Panel
- 10.3 Navigator Tool in Writer
- 12.1 Mathematical Formula in LibreOffice Math
- 13.1 The Browser Window of Firefox
- 13.2 Firefox—Manage Search Engines
- 13.3 The Firefox Bookmark Library
- 13.4 The Firefox Page Info Window
- 13.5 The Preferences Window
- 13.6 Installing Firefox Extensions
- 14.1 Evolution Window
- 16.1 Ekiga User Interface
- 17.1 The Toolbox
- 17.2 The Basic Color Selector Dialog
- 17.3 The Print Dialog
- 18.1 GNOME Videos Start-Up Window
- 18.2 GNOME Videos General Preferences
- 18.3 GNOME Videos Display Preferences
- 18.4 GNOME Videos Audio Preferences
- 19.1 Main View of Brasero
- A.1 Main Window of Help
List of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-installquick/art-sle-installquick.html b/SLE15SP1/html/SLES-installquick/art-sle-installquick.html index 16b0ae9847f..68a421e721c 100644 --- a/SLE15SP1/html/SLES-installquick/art-sle-installquick.html +++ b/SLE15SP1/html/SLES-installquick/art-sle-installquick.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Installation Quick Start #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 2023This Quick Start guides you step-by-step diff --git a/SLE15SP1/html/SLES-installquick/index.html b/SLE15SP1/html/SLES-installquick/index.html index 16b0ae9847f..68a421e721c 100644 --- a/SLE15SP1/html/SLES-installquick/index.html +++ b/SLE15SP1/html/SLES-installquick/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Installation Quick Start #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 2023This Quick Start guides you step-by-step diff --git a/SLE15SP1/html/SLES-modulesquick/art-modules.html b/SLE15SP1/html/SLES-modulesquick/art-modules.html index ad1361cafaa..a48ccb93919 100644 --- a/SLE15SP1/html/SLES-modulesquick/art-modules.html +++ b/SLE15SP1/html/SLES-modulesquick/art-modules.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Modules and Extensions Quick Start #
Publication Date: - July 12, 2023 + July 27, 2023This Quick Start gives you an overview of the diff --git a/SLE15SP1/html/SLES-modulesquick/index.html b/SLE15SP1/html/SLES-modulesquick/index.html index ad1361cafaa..a48ccb93919 100644 --- a/SLE15SP1/html/SLES-modulesquick/index.html +++ b/SLE15SP1/html/SLES-modulesquick/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Modules and Extensions Quick Start #
Publication Date: - July 12, 2023 + July 27, 2023This Quick Start gives you an overview of the diff --git a/SLE15SP1/html/SLES-rmt/book-rmt.html b/SLE15SP1/html/SLES-rmt/book-rmt.html index 0fa3c3aa010..e90cfceda27 100644 --- a/SLE15SP1/html/SLES-rmt/book-rmt.html +++ b/SLE15SP1/html/SLES-rmt/book-rmt.html @@ -34,7 +34,7 @@ useBR: false }); -
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- About This Guide
- 1 RMT Installation and Configuration
- 2 Migrate from SMT to RMT
- 3 Mirroring Repositories on the RMT Server
- 4 Configuring Clients to Use RMT
- 4.1 Configuring Clients with Boot Parameters
- 4.2 Configuring Clients with AutoYaST Profile
- 4.3 Configuring Clients with
rmt-client-setup
- 4.4 Configuring Clients with YaST
- 4.5 Configuring Clients for Custom Stand-alone Repositories
- 4.6 Listing Accessible Repositories
- 4.7 Online Migration of SUSE Linux Enterprise Clients
- 5 RMT Tools and Configuration Files
- 6 Backing Up an RMT Server
- 7 Managing SSL/TLS Certificates
- A GNU licenses
List of FiguresList of TablesCopyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-rmt/index.html b/SLE15SP1/html/SLES-rmt/index.html index 0fa3c3aa010..e90cfceda27 100644 --- a/SLE15SP1/html/SLES-rmt/index.html +++ b/SLE15SP1/html/SLES-rmt/index.html @@ -34,7 +34,7 @@ useBR: false }); -
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- About This Guide
- 1 RMT Installation and Configuration
- 2 Migrate from SMT to RMT
- 3 Mirroring Repositories on the RMT Server
- 4 Configuring Clients to Use RMT
- 4.1 Configuring Clients with Boot Parameters
- 4.2 Configuring Clients with AutoYaST Profile
- 4.3 Configuring Clients with
rmt-client-setup
- 4.4 Configuring Clients with YaST
- 4.5 Configuring Clients for Custom Stand-alone Repositories
- 4.6 Listing Accessible Repositories
- 4.7 Online Migration of SUSE Linux Enterprise Clients
- 5 RMT Tools and Configuration Files
- 6 Backing Up an RMT Server
- 7 Managing SSL/TLS Certificates
- A GNU licenses
List of FiguresList of TablesCopyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-rpi-quick/art-rpiquick.html b/SLE15SP1/html/SLES-rpi-quick/art-rpiquick.html index 24db8a2f648..75b9d1f7d3c 100644 --- a/SLE15SP1/html/SLES-rpi-quick/art-rpiquick.html +++ b/SLE15SP1/html/SLES-rpi-quick/art-rpiquick.html @@ -28,7 +28,7 @@ useBR: false }); -
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP1Raspberry Pi Quick Start
Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP1Raspberry Pi Quick Start
Publication Date: July 27, 2023This guide contains an overview of SUSE Linux Enterprise Server for Arm on the Raspberry Pi* platform and will guide you through the setup procedure. diff --git a/SLE15SP1/html/SLES-rpi-quick/index.html b/SLE15SP1/html/SLES-rpi-quick/index.html index 24db8a2f648..75b9d1f7d3c 100644 --- a/SLE15SP1/html/SLES-rpi-quick/index.html +++ b/SLE15SP1/html/SLES-rpi-quick/index.html @@ -28,7 +28,7 @@ useBR: false }); -
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP1Raspberry Pi Quick Start
Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP1Raspberry Pi Quick Start
Publication Date: July 27, 2023This guide contains an overview of SUSE Linux Enterprise Server for Arm on the Raspberry Pi* platform and will guide you through the setup procedure. diff --git a/SLE15SP1/html/SLES-security/book-security.html b/SLE15SP1/html/SLES-security/book-security.html index ef192e68e5f..48041cecf4f 100644 --- a/SLE15SP1/html/SLES-security/book-security.html +++ b/SLE15SP1/html/SLES-security/book-security.html @@ -41,9 +41,9 @@ events. Supports the administrator with security-related choices and decisions in installing and setting up a secure SUSE Linux Enterprise Server and additional processes to further secure and harden that installation.
Publication Date: - July 12, 2023 + July 27, 2023 -- About This Guide
- 1 Security and Confidentiality
- I Authentication
- II Local Security
- 9 Physical Security
- 10 Automatic Security Checks with seccheck
- 11 Software Management
- 12 File Management
- 13 Encrypting Partitions and Files
- 14 User Management
- 14.1 Various Account Checks
- 14.2 Enabling Password Aging
- 14.3 Stronger Password Enforcement
- 14.4 Password and Login Management with PAM
- 14.5 Restricting
root
Logins - 14.6 Setting an Inactivity Timeout for Interactive Shell Sessions
- 14.7 Preventing Accidental Denial of Service
- 14.8 Displaying Login Banners
- 14.9 Connection Accounting Utilities
- 15 Spectre/Meltdown Checker
- 16 Configuring Security Settings with YaST
- 17 The Polkit authentication framework
- 18 Access Control Lists in Linux
- 19 Intrusion Detection with AIDE
- III Network Security
- 20 X Window System and X Authentication
- 21 Securing network operations with OpenSSH
- 21.1 OpenSSH overview
- 21.2 Server hardening
- 21.3 Password authentication
- 21.4 Managing user and host encryption keys
- 21.5 Rotating host keys
- 21.6 Public key authentication
- 21.7 Passphrase-less public key authentication
- 21.8 OpenSSH certificate authentication
- 21.9 Automated public key logins with gnome-keyring
- 21.10 Automated public key logins in the console with ssh-agent
- 21.11 Changing an SSH private key passphrase
- 21.12 Retrieving a key fingerprint
- 21.13 Starting X11 applications on a remote host
- 21.14 Agent forwarding
- 21.15
scp
—secure copy - 21.16
sftp
—secure file transfer - 21.17 Port forwarding (SSH tunneling)
- 21.18 More information
- 22 Masquerading and Firewalls
- 23 Configuring a VPN Server
- IV Regulations and Compliance
- V Confining Privileges with AppArmor
- 28 Introducing AppArmor
- 29 Getting Started
- 30 Immunizing Programs
- 31 Profile Components and Syntax
- 31.1 Breaking an AppArmor Profile into Its Parts
- 31.2 Profile Types
- 31.3 Include Statements
- 31.4 Capability Entries (POSIX.1e)
- 31.5 Network Access Control
- 31.6 Profile Names, Flags, Paths, and Globbing
- 31.7 File Permission Access Modes
- 31.8 Mount Rules
- 31.9 Pivot Root Rules
- 31.10 PTrace Rules
- 31.11 Signal Rules
- 31.12 Execute Modes
- 31.13 Resource Limit Control
- 31.14 Auditing Rules
- 32 AppArmor Profile Repositories
- 33 Building and Managing Profiles with YaST
- 34 Building Profiles from the Command Line
- 35 Profiling Your Web Applications Using ChangeHat
- 36 Confining Users with
pam_apparmor
- 37 Managing Profiled Applications
- 38 Support
- 39 AppArmor Glossary
- VI SELinux
- VII The Linux Audit Framework
- 41 Understanding Linux Audit
- 41.1 Introducing the Components of Linux Audit
- 41.2 Configuring the Audit Daemon
- 41.3 Controlling the Audit System Using
auditctl
- 41.4 Passing Parameters to the Audit System
- 41.5 Understanding the Audit Logs and Generating Reports
- 41.6 Querying the Audit Daemon Logs with
ausearch
- 41.7 Analyzing Processes with
autrace
- 41.8 Visualizing Audit Data
- 41.9 Relaying Audit Event Notifications
- 42 Setting Up the Linux Audit Framework
- 43 Introducing an Audit Rule Set
- 43.1 Adding Basic Audit Configuration Parameters
- 43.2 Adding Watches on Audit Log Files and Configuration Files
- 43.3 Monitoring File System Objects
- 43.4 Monitoring Security Configuration Files and Databases
- 43.5 Monitoring Miscellaneous System Calls
- 43.6 Filtering System Call Arguments
- 43.7 Managing Audit Event Records Using Keys
- 44 Useful Resources
- 41 Understanding Linux Audit
- A GNU licenses
List of Figures- 3.1 NIS Server Setup
- 3.2 Master Server Setup
- 3.3 Changing the Directory and Synchronizing Files for a NIS Server
- 3.4 NIS Server Maps Setup
- 3.5 Setting Request Permissions for a NIS Server
- 3.6 Setting Domain and Address of a NIS Server
- 6.1 Kerberos Network Topology
- 6.2 Window
- 7.1 Schema of Winbind-based Active Directory Authentication
- 7.2 Main Window of
- 7.3 Enrolling into a Domain
- 7.4 Configuration Window of
- 7.5 Determining Windows Domain Membership
- 7.6 Providing Administrator Credentials
- 15.1 Output From spectre-meltdown-checker
- 16.1 YaST Security Center and Hardening: Security Overview
- 18.1 Minimum ACL: ACL Entries Compared to Permission Bits
- 18.2 Extended ACL: ACL Entries Compared to Permission Bits
- 22.1 iptables: A Packet's Possible Paths
- 23.1 Routed VPN
- 23.2 Bridged VPN - Scenario 1
- 23.3 Bridged VPN - Scenario 2
- 23.4 Bridged VPN - Scenario 3
- 34.1
aa-notify Message in GNOME
- 35.1 Adminer Login Page
- 41.1 Introducing the Components of Linux Audit
- 41.2 Flow Graph—Program versus System Call Relationship
- 41.3 Bar Chart—Common Event Types
List of TablesList of Examples- 2.1 PAM Configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default Configuration for the
auth
Section (common-auth
) - 2.3 Default Configuration for the
account
Section (common-account
) - 2.4 Default Configuration for the
password
Section (common-password
) - 2.5 Default Configuration for the
session
Section (common-session
) - 2.6 pam_env.conf
- 6.1 Example KDC Configuration,
/etc/krb5.conf
- 21.1 Example sshd.conf
- 22.1 Callback Port Configuration for the
nfs
Kernel Module in/etc/modprobe.d/60-nfs.conf
- 22.2 Commands to Define a new
firewalld
RPC Service for NFS - 23.1 VPN Server Configuration File
- 23.2 VPN Client Configuration File
- 29.1 Output of
aa-unconfined
- 34.1 Learning Mode Exception: Controlling Access to Specific Resources
- 34.2 Learning Mode Exception: Defining Permissions for an Entry
- 40.1 Security context settings using
ls -Z
- 40.2 Verifying that SELinux is functional
- 40.3 Getting a list of booleans and verifying policy access
- 40.4 Getting file context information
- 40.5 The default context for directories in the root directory
- 40.6 Showing SELinux settings for processes with
ps Zaux
- 40.7 Viewing default file contexts
- 40.8 Example lines from
/etc/audit/audit.log
- 40.9 Analyzing audit messages
- 40.10 Viewing which lines deny access
- 40.11 Creating a policy module allowing an action previously denied
- 41.1 Example output of
auditctl
-s
- 41.2 Example Audit Rules—Audit System Parameters
- 41.3 Example Audit Rules—File System Auditing
- 41.4 Example Audit Rules—System Call Auditing
- 41.5 Deleting Audit Rules and Events
- 41.6 Listing Rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An Advanced Audit Event—Login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
+
- About This Guide
- 1 Security and Confidentiality
- I Authentication
- II Local Security
- 9 Physical Security
- 10 Automatic Security Checks with seccheck
- 11 Software Management
- 12 File Management
- 13 Encrypting Partitions and Files
- 14 User Management
- 14.1 Various Account Checks
- 14.2 Enabling Password Aging
- 14.3 Stronger Password Enforcement
- 14.4 Password and Login Management with PAM
- 14.5 Restricting
root
Logins - 14.6 Setting an Inactivity Timeout for Interactive Shell Sessions
- 14.7 Preventing Accidental Denial of Service
- 14.8 Displaying Login Banners
- 14.9 Connection Accounting Utilities
- 15 Spectre/Meltdown Checker
- 16 Configuring Security Settings with YaST
- 17 The Polkit authentication framework
- 18 Access Control Lists in Linux
- 19 Intrusion Detection with AIDE
- III Network Security
- 20 X Window System and X Authentication
- 21 Securing network operations with OpenSSH
- 21.1 OpenSSH overview
- 21.2 Server hardening
- 21.3 Password authentication
- 21.4 Managing user and host encryption keys
- 21.5 Rotating host keys
- 21.6 Public key authentication
- 21.7 Passphrase-less public key authentication
- 21.8 OpenSSH certificate authentication
- 21.9 Automated public key logins with gnome-keyring
- 21.10 Automated public key logins in the console with ssh-agent
- 21.11 Changing an SSH private key passphrase
- 21.12 Retrieving a key fingerprint
- 21.13 Starting X11 applications on a remote host
- 21.14 Agent forwarding
- 21.15
scp
—secure copy - 21.16
sftp
—secure file transfer - 21.17 Port forwarding (SSH tunneling)
- 21.18 More information
- 22 Masquerading and Firewalls
- 23 Configuring a VPN Server
- IV Regulations and Compliance
- V Confining Privileges with AppArmor
- 28 Introducing AppArmor
- 29 Getting Started
- 30 Immunizing Programs
- 31 Profile Components and Syntax
- 31.1 Breaking an AppArmor Profile into Its Parts
- 31.2 Profile Types
- 31.3 Include Statements
- 31.4 Capability Entries (POSIX.1e)
- 31.5 Network Access Control
- 31.6 Profile Names, Flags, Paths, and Globbing
- 31.7 File Permission Access Modes
- 31.8 Mount Rules
- 31.9 Pivot Root Rules
- 31.10 PTrace Rules
- 31.11 Signal Rules
- 31.12 Execute Modes
- 31.13 Resource Limit Control
- 31.14 Auditing Rules
- 32 AppArmor Profile Repositories
- 33 Building and Managing Profiles with YaST
- 34 Building Profiles from the Command Line
- 35 Profiling Your Web Applications Using ChangeHat
- 36 Confining Users with
pam_apparmor
- 37 Managing Profiled Applications
- 38 Support
- 39 AppArmor Glossary
- VI SELinux
- VII The Linux Audit Framework
- 41 Understanding Linux Audit
- 41.1 Introducing the Components of Linux Audit
- 41.2 Configuring the Audit Daemon
- 41.3 Controlling the Audit System Using
auditctl
- 41.4 Passing Parameters to the Audit System
- 41.5 Understanding the Audit Logs and Generating Reports
- 41.6 Querying the Audit Daemon Logs with
ausearch
- 41.7 Analyzing Processes with
autrace
- 41.8 Visualizing Audit Data
- 41.9 Relaying Audit Event Notifications
- 42 Setting Up the Linux Audit Framework
- 43 Introducing an Audit Rule Set
- 43.1 Adding Basic Audit Configuration Parameters
- 43.2 Adding Watches on Audit Log Files and Configuration Files
- 43.3 Monitoring File System Objects
- 43.4 Monitoring Security Configuration Files and Databases
- 43.5 Monitoring Miscellaneous System Calls
- 43.6 Filtering System Call Arguments
- 43.7 Managing Audit Event Records Using Keys
- 44 Useful Resources
- 41 Understanding Linux Audit
- A GNU licenses
List of Figures- 3.1 NIS Server Setup
- 3.2 Master Server Setup
- 3.3 Changing the Directory and Synchronizing Files for a NIS Server
- 3.4 NIS Server Maps Setup
- 3.5 Setting Request Permissions for a NIS Server
- 3.6 Setting Domain and Address of a NIS Server
- 6.1 Kerberos Network Topology
- 6.2 Window
- 7.1 Schema of Winbind-based Active Directory Authentication
- 7.2 Main Window of
- 7.3 Enrolling into a Domain
- 7.4 Configuration Window of
- 7.5 Determining Windows Domain Membership
- 7.6 Providing Administrator Credentials
- 15.1 Output From spectre-meltdown-checker
- 16.1 YaST Security Center and Hardening: Security Overview
- 18.1 Minimum ACL: ACL Entries Compared to Permission Bits
- 18.2 Extended ACL: ACL Entries Compared to Permission Bits
- 22.1 iptables: A Packet's Possible Paths
- 23.1 Routed VPN
- 23.2 Bridged VPN - Scenario 1
- 23.3 Bridged VPN - Scenario 2
- 23.4 Bridged VPN - Scenario 3
- 34.1
aa-notify Message in GNOME
- 35.1 Adminer Login Page
- 41.1 Introducing the Components of Linux Audit
- 41.2 Flow Graph—Program versus System Call Relationship
- 41.3 Bar Chart—Common Event Types
List of TablesList of Examples- 2.1 PAM Configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default Configuration for the
auth
Section (common-auth
) - 2.3 Default Configuration for the
account
Section (common-account
) - 2.4 Default Configuration for the
password
Section (common-password
) - 2.5 Default Configuration for the
session
Section (common-session
) - 2.6 pam_env.conf
- 6.1 Example KDC Configuration,
/etc/krb5.conf
- 21.1 Example sshd.conf
- 22.1 Callback Port Configuration for the
nfs
Kernel Module in/etc/modprobe.d/60-nfs.conf
- 22.2 Commands to Define a new
firewalld
RPC Service for NFS - 23.1 VPN Server Configuration File
- 23.2 VPN Client Configuration File
- 29.1 Output of
aa-unconfined
- 34.1 Learning Mode Exception: Controlling Access to Specific Resources
- 34.2 Learning Mode Exception: Defining Permissions for an Entry
- 40.1 Security context settings using
ls -Z
- 40.2 Verifying that SELinux is functional
- 40.3 Getting a list of booleans and verifying policy access
- 40.4 Getting file context information
- 40.5 The default context for directories in the root directory
- 40.6 Showing SELinux settings for processes with
ps Zaux
- 40.7 Viewing default file contexts
- 40.8 Example lines from
/var/log/audit/audit.log
- 40.9 Analyzing audit messages
- 40.10 Viewing which lines deny access
- 40.11 Creating a policy module allowing an action previously denied
- 41.1 Example output of
auditctl
-s
- 41.2 Example Audit Rules—Audit System Parameters
- 41.3 Example Audit Rules—File System Auditing
- 41.4 Example Audit Rules—System Call Auditing
- 41.5 Deleting Audit Rules and Events
- 41.6 Listing Rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An Advanced Audit Event—Login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
Copyright © 2006–2023 SUSE LLC and contributors. All rights reserved. diff --git a/SLE15SP1/html/SLES-security/cha-selinux.html b/SLE15SP1/html/SLES-security/cha-selinux.html index c5721fd3981..e3cc72d588d 100644 --- a/SLE15SP1/html/SLES-security/cha-selinux.html +++ b/SLE15SP1/html/SLES-security/cha-selinux.html @@ -593,11 +593,9 @@
>
sudo
systemctl start auditd
and enable it in the targets of your system, using
>
sudo
systemctl enable auditd
- In - Example 40.8: “Example lines from
/etc/audit/audit.log
” - you can see a partial example of the contents of -/var/log/audit/audit.log
-Example 40.8: Example lines from/etc/audit/audit.log
#type=DAEMON_START msg=audit(1348173810.874:6248): auditd start, ver=1.7.7 format=raw kernel=3.0.13-0.27-default auid=0 pid=4235 subj=system_u:system_r:auditd_t res=success + You can see a partial example of the contents of +
/var/log/audit/audit.log
below: +Example 40.8: Example lines from/var/log/audit/audit.log
#type=DAEMON_START msg=audit(1348173810.874:6248): auditd start, ver=1.7.7 format=raw kernel=3.0.13-0.27-default auid=0 pid=4235 subj=system_u:system_r:auditd_t res=success type=AVC msg=audit(1348173901.081:292): avc: denied { write } for pid=3426 comm="smartd" name="smartmontools" dev=sda6 ino=581743 scontext=system_u:system_r:fsdaemon_t tcontext=system_u:object_r:var_lib_t tclass=dir type=AVC msg=audit(1348173901.081:293): avc: denied { remove_name } for pid=3426 comm="smartd" name="smartd.WDC_WD2500BEKT_75PVMT0-WD_WXC1A21E0454.ata.state~" dev=sda6 ino=582390 scontext=system_u:system_r:fsdaemon_t tcontext=system_u:object_r:var_lib_t tclass=dir type=AVC msg=audit(1348173901.081:294): avc: denied { unlink } for pid=3426 comm="smartd" name="smartd.WDC_WD2500BEKT_75PVMT0-WD_WXC1A21E0454.ata.state~" dev=sda6 ino=582390 scontext=system_u:system_r:fsdaemon_t tcontext=system_u:object_r:var_lib_t tclass=file diff --git a/SLE15SP1/html/SLES-security/index.html b/SLE15SP1/html/SLES-security/index.html index ef192e68e5f..48041cecf4f 100644 --- a/SLE15SP1/html/SLES-security/index.html +++ b/SLE15SP1/html/SLES-security/index.html @@ -41,9 +41,9 @@ events. Supports the administrator with security-related choices and decisions in installing and setting up a secure SUSE Linux Enterprise Server and additional processes to further secure and harden that installation.
Publication Date: - July 12, 2023 + July 27, 2023 -- About This Guide
- 1 Security and Confidentiality
- I Authentication
- II Local Security
- 9 Physical Security
- 10 Automatic Security Checks with seccheck
- 11 Software Management
- 12 File Management
- 13 Encrypting Partitions and Files
- 14 User Management
- 14.1 Various Account Checks
- 14.2 Enabling Password Aging
- 14.3 Stronger Password Enforcement
- 14.4 Password and Login Management with PAM
- 14.5 Restricting
root
Logins - 14.6 Setting an Inactivity Timeout for Interactive Shell Sessions
- 14.7 Preventing Accidental Denial of Service
- 14.8 Displaying Login Banners
- 14.9 Connection Accounting Utilities
- 15 Spectre/Meltdown Checker
- 16 Configuring Security Settings with YaST
- 17 The Polkit authentication framework
- 18 Access Control Lists in Linux
- 19 Intrusion Detection with AIDE
- III Network Security
- 20 X Window System and X Authentication
- 21 Securing network operations with OpenSSH
- 21.1 OpenSSH overview
- 21.2 Server hardening
- 21.3 Password authentication
- 21.4 Managing user and host encryption keys
- 21.5 Rotating host keys
- 21.6 Public key authentication
- 21.7 Passphrase-less public key authentication
- 21.8 OpenSSH certificate authentication
- 21.9 Automated public key logins with gnome-keyring
- 21.10 Automated public key logins in the console with ssh-agent
- 21.11 Changing an SSH private key passphrase
- 21.12 Retrieving a key fingerprint
- 21.13 Starting X11 applications on a remote host
- 21.14 Agent forwarding
- 21.15
scp
—secure copy - 21.16
sftp
—secure file transfer - 21.17 Port forwarding (SSH tunneling)
- 21.18 More information
- 22 Masquerading and Firewalls
- 23 Configuring a VPN Server
- IV Regulations and Compliance
- V Confining Privileges with AppArmor
- 28 Introducing AppArmor
- 29 Getting Started
- 30 Immunizing Programs
- 31 Profile Components and Syntax
- 31.1 Breaking an AppArmor Profile into Its Parts
- 31.2 Profile Types
- 31.3 Include Statements
- 31.4 Capability Entries (POSIX.1e)
- 31.5 Network Access Control
- 31.6 Profile Names, Flags, Paths, and Globbing
- 31.7 File Permission Access Modes
- 31.8 Mount Rules
- 31.9 Pivot Root Rules
- 31.10 PTrace Rules
- 31.11 Signal Rules
- 31.12 Execute Modes
- 31.13 Resource Limit Control
- 31.14 Auditing Rules
- 32 AppArmor Profile Repositories
- 33 Building and Managing Profiles with YaST
- 34 Building Profiles from the Command Line
- 35 Profiling Your Web Applications Using ChangeHat
- 36 Confining Users with
pam_apparmor
- 37 Managing Profiled Applications
- 38 Support
- 39 AppArmor Glossary
- VI SELinux
- VII The Linux Audit Framework
- 41 Understanding Linux Audit
- 41.1 Introducing the Components of Linux Audit
- 41.2 Configuring the Audit Daemon
- 41.3 Controlling the Audit System Using
auditctl
- 41.4 Passing Parameters to the Audit System
- 41.5 Understanding the Audit Logs and Generating Reports
- 41.6 Querying the Audit Daemon Logs with
ausearch
- 41.7 Analyzing Processes with
autrace
- 41.8 Visualizing Audit Data
- 41.9 Relaying Audit Event Notifications
- 42 Setting Up the Linux Audit Framework
- 43 Introducing an Audit Rule Set
- 43.1 Adding Basic Audit Configuration Parameters
- 43.2 Adding Watches on Audit Log Files and Configuration Files
- 43.3 Monitoring File System Objects
- 43.4 Monitoring Security Configuration Files and Databases
- 43.5 Monitoring Miscellaneous System Calls
- 43.6 Filtering System Call Arguments
- 43.7 Managing Audit Event Records Using Keys
- 44 Useful Resources
- 41 Understanding Linux Audit
- A GNU licenses
List of Figures- 3.1 NIS Server Setup
- 3.2 Master Server Setup
- 3.3 Changing the Directory and Synchronizing Files for a NIS Server
- 3.4 NIS Server Maps Setup
- 3.5 Setting Request Permissions for a NIS Server
- 3.6 Setting Domain and Address of a NIS Server
- 6.1 Kerberos Network Topology
- 6.2 Window
- 7.1 Schema of Winbind-based Active Directory Authentication
- 7.2 Main Window of
- 7.3 Enrolling into a Domain
- 7.4 Configuration Window of
- 7.5 Determining Windows Domain Membership
- 7.6 Providing Administrator Credentials
- 15.1 Output From spectre-meltdown-checker
- 16.1 YaST Security Center and Hardening: Security Overview
- 18.1 Minimum ACL: ACL Entries Compared to Permission Bits
- 18.2 Extended ACL: ACL Entries Compared to Permission Bits
- 22.1 iptables: A Packet's Possible Paths
- 23.1 Routed VPN
- 23.2 Bridged VPN - Scenario 1
- 23.3 Bridged VPN - Scenario 2
- 23.4 Bridged VPN - Scenario 3
- 34.1
aa-notify Message in GNOME
- 35.1 Adminer Login Page
- 41.1 Introducing the Components of Linux Audit
- 41.2 Flow Graph—Program versus System Call Relationship
- 41.3 Bar Chart—Common Event Types
List of TablesList of Examples- 2.1 PAM Configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default Configuration for the
auth
Section (common-auth
) - 2.3 Default Configuration for the
account
Section (common-account
) - 2.4 Default Configuration for the
password
Section (common-password
) - 2.5 Default Configuration for the
session
Section (common-session
) - 2.6 pam_env.conf
- 6.1 Example KDC Configuration,
/etc/krb5.conf
- 21.1 Example sshd.conf
- 22.1 Callback Port Configuration for the
nfs
Kernel Module in/etc/modprobe.d/60-nfs.conf
- 22.2 Commands to Define a new
firewalld
RPC Service for NFS - 23.1 VPN Server Configuration File
- 23.2 VPN Client Configuration File
- 29.1 Output of
aa-unconfined
- 34.1 Learning Mode Exception: Controlling Access to Specific Resources
- 34.2 Learning Mode Exception: Defining Permissions for an Entry
- 40.1 Security context settings using
ls -Z
- 40.2 Verifying that SELinux is functional
- 40.3 Getting a list of booleans and verifying policy access
- 40.4 Getting file context information
- 40.5 The default context for directories in the root directory
- 40.6 Showing SELinux settings for processes with
ps Zaux
- 40.7 Viewing default file contexts
- 40.8 Example lines from
/etc/audit/audit.log
- 40.9 Analyzing audit messages
- 40.10 Viewing which lines deny access
- 40.11 Creating a policy module allowing an action previously denied
- 41.1 Example output of
auditctl
-s
- 41.2 Example Audit Rules—Audit System Parameters
- 41.3 Example Audit Rules—File System Auditing
- 41.4 Example Audit Rules—System Call Auditing
- 41.5 Deleting Audit Rules and Events
- 41.6 Listing Rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An Advanced Audit Event—Login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
+
- About This Guide
- 1 Security and Confidentiality
- I Authentication
- II Local Security
- 9 Physical Security
- 10 Automatic Security Checks with seccheck
- 11 Software Management
- 12 File Management
- 13 Encrypting Partitions and Files
- 14 User Management
- 14.1 Various Account Checks
- 14.2 Enabling Password Aging
- 14.3 Stronger Password Enforcement
- 14.4 Password and Login Management with PAM
- 14.5 Restricting
root
Logins - 14.6 Setting an Inactivity Timeout for Interactive Shell Sessions
- 14.7 Preventing Accidental Denial of Service
- 14.8 Displaying Login Banners
- 14.9 Connection Accounting Utilities
- 15 Spectre/Meltdown Checker
- 16 Configuring Security Settings with YaST
- 17 The Polkit authentication framework
- 18 Access Control Lists in Linux
- 19 Intrusion Detection with AIDE
- III Network Security
- 20 X Window System and X Authentication
- 21 Securing network operations with OpenSSH
- 21.1 OpenSSH overview
- 21.2 Server hardening
- 21.3 Password authentication
- 21.4 Managing user and host encryption keys
- 21.5 Rotating host keys
- 21.6 Public key authentication
- 21.7 Passphrase-less public key authentication
- 21.8 OpenSSH certificate authentication
- 21.9 Automated public key logins with gnome-keyring
- 21.10 Automated public key logins in the console with ssh-agent
- 21.11 Changing an SSH private key passphrase
- 21.12 Retrieving a key fingerprint
- 21.13 Starting X11 applications on a remote host
- 21.14 Agent forwarding
- 21.15
scp
—secure copy - 21.16
sftp
—secure file transfer - 21.17 Port forwarding (SSH tunneling)
- 21.18 More information
- 22 Masquerading and Firewalls
- 23 Configuring a VPN Server
- IV Regulations and Compliance
- V Confining Privileges with AppArmor
- 28 Introducing AppArmor
- 29 Getting Started
- 30 Immunizing Programs
- 31 Profile Components and Syntax
- 31.1 Breaking an AppArmor Profile into Its Parts
- 31.2 Profile Types
- 31.3 Include Statements
- 31.4 Capability Entries (POSIX.1e)
- 31.5 Network Access Control
- 31.6 Profile Names, Flags, Paths, and Globbing
- 31.7 File Permission Access Modes
- 31.8 Mount Rules
- 31.9 Pivot Root Rules
- 31.10 PTrace Rules
- 31.11 Signal Rules
- 31.12 Execute Modes
- 31.13 Resource Limit Control
- 31.14 Auditing Rules
- 32 AppArmor Profile Repositories
- 33 Building and Managing Profiles with YaST
- 34 Building Profiles from the Command Line
- 35 Profiling Your Web Applications Using ChangeHat
- 36 Confining Users with
pam_apparmor
- 37 Managing Profiled Applications
- 38 Support
- 39 AppArmor Glossary
- VI SELinux
- VII The Linux Audit Framework
- 41 Understanding Linux Audit
- 41.1 Introducing the Components of Linux Audit
- 41.2 Configuring the Audit Daemon
- 41.3 Controlling the Audit System Using
auditctl
- 41.4 Passing Parameters to the Audit System
- 41.5 Understanding the Audit Logs and Generating Reports
- 41.6 Querying the Audit Daemon Logs with
ausearch
- 41.7 Analyzing Processes with
autrace
- 41.8 Visualizing Audit Data
- 41.9 Relaying Audit Event Notifications
- 42 Setting Up the Linux Audit Framework
- 43 Introducing an Audit Rule Set
- 43.1 Adding Basic Audit Configuration Parameters
- 43.2 Adding Watches on Audit Log Files and Configuration Files
- 43.3 Monitoring File System Objects
- 43.4 Monitoring Security Configuration Files and Databases
- 43.5 Monitoring Miscellaneous System Calls
- 43.6 Filtering System Call Arguments
- 43.7 Managing Audit Event Records Using Keys
- 44 Useful Resources
- 41 Understanding Linux Audit
- A GNU licenses
List of Figures- 3.1 NIS Server Setup
- 3.2 Master Server Setup
- 3.3 Changing the Directory and Synchronizing Files for a NIS Server
- 3.4 NIS Server Maps Setup
- 3.5 Setting Request Permissions for a NIS Server
- 3.6 Setting Domain and Address of a NIS Server
- 6.1 Kerberos Network Topology
- 6.2 Window
- 7.1 Schema of Winbind-based Active Directory Authentication
- 7.2 Main Window of
- 7.3 Enrolling into a Domain
- 7.4 Configuration Window of
- 7.5 Determining Windows Domain Membership
- 7.6 Providing Administrator Credentials
- 15.1 Output From spectre-meltdown-checker
- 16.1 YaST Security Center and Hardening: Security Overview
- 18.1 Minimum ACL: ACL Entries Compared to Permission Bits
- 18.2 Extended ACL: ACL Entries Compared to Permission Bits
- 22.1 iptables: A Packet's Possible Paths
- 23.1 Routed VPN
- 23.2 Bridged VPN - Scenario 1
- 23.3 Bridged VPN - Scenario 2
- 23.4 Bridged VPN - Scenario 3
- 34.1
aa-notify Message in GNOME
- 35.1 Adminer Login Page
- 41.1 Introducing the Components of Linux Audit
- 41.2 Flow Graph—Program versus System Call Relationship
- 41.3 Bar Chart—Common Event Types
List of TablesList of Examples- 2.1 PAM Configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default Configuration for the
auth
Section (common-auth
) - 2.3 Default Configuration for the
account
Section (common-account
) - 2.4 Default Configuration for the
password
Section (common-password
) - 2.5 Default Configuration for the
session
Section (common-session
) - 2.6 pam_env.conf
- 6.1 Example KDC Configuration,
/etc/krb5.conf
- 21.1 Example sshd.conf
- 22.1 Callback Port Configuration for the
nfs
Kernel Module in/etc/modprobe.d/60-nfs.conf
- 22.2 Commands to Define a new
firewalld
RPC Service for NFS - 23.1 VPN Server Configuration File
- 23.2 VPN Client Configuration File
- 29.1 Output of
aa-unconfined
- 34.1 Learning Mode Exception: Controlling Access to Specific Resources
- 34.2 Learning Mode Exception: Defining Permissions for an Entry
- 40.1 Security context settings using
ls -Z
- 40.2 Verifying that SELinux is functional
- 40.3 Getting a list of booleans and verifying policy access
- 40.4 Getting file context information
- 40.5 The default context for directories in the root directory
- 40.6 Showing SELinux settings for processes with
ps Zaux
- 40.7 Viewing default file contexts
- 40.8 Example lines from
/var/log/audit/audit.log
- 40.9 Analyzing audit messages
- 40.10 Viewing which lines deny access
- 40.11 Creating a policy module allowing an action previously denied
- 41.1 Example output of
auditctl
-s
- 41.2 Example Audit Rules—Audit System Parameters
- 41.3 Example Audit Rules—File System Auditing
- 41.4 Example Audit Rules—System Call Auditing
- 41.5 Deleting Audit Rules and Events
- 41.6 Listing Rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An Advanced Audit Event—Login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
Copyright © 2006–2023 SUSE LLC and contributors. All rights reserved. diff --git a/SLE15SP1/html/SLES-storage/book-storage.html b/SLE15SP1/html/SLES-storage/book-storage.html index bab29c33fee..4d027ae4fc0 100644 --- a/SLE15SP1/html/SLES-storage/book-storage.html +++ b/SLE15SP1/html/SLES-storage/book-storage.html @@ -38,7 +38,7 @@ Provides information about how to manage storage devices on a SUSE Linux Enterprise Server.
Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I File Systems and Mounting
- II Logical Volumes (LVM)
- 5 LVM Configuration
- 5.1 Understanding the Logical Volume Manager
- 5.2 Creating Volume Groups
- 5.3 Creating Logical Volumes
- 5.4 Automatically Activating Non-Root LVM Volume Groups
- 5.5 Resizing an Existing Volume Group
- 5.6 Resizing a Logical Volume
- 5.7 Deleting a Volume Group or a Logical Volume
- 5.8 Using LVM Commands
- 5.9 Tagging LVM2 Storage Objects
- 6 LVM Volume Snapshots
- 5 LVM Configuration
- III Software RAID
- 7 Software RAID Configuration
- 8 Configuring Software RAID for the Root Partition
- 8.1 Prerequisites for Using a Software RAID Device for the Root Partition
- 8.2 diff --git a/SLE15SP1/html/SLES-storage/index.html b/SLE15SP1/html/SLES-storage/index.html index bab29c33fee..4d027ae4fc0 100644 --- a/SLE15SP1/html/SLES-storage/index.html +++ b/SLE15SP1/html/SLES-storage/index.html @@ -38,7 +38,7 @@ Provides information about how to manage storage devices on a SUSE Linux Enterprise Server.
Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I File Systems and Mounting
- II Logical Volumes (LVM)
- 5 LVM Configuration
- 5.1 Understanding the Logical Volume Manager
- 5.2 Creating Volume Groups
- 5.3 Creating Logical Volumes
- 5.4 Automatically Activating Non-Root LVM Volume Groups
- 5.5 Resizing an Existing Volume Group
- 5.6 Resizing a Logical Volume
- 5.7 Deleting a Volume Group or a Logical Volume
- 5.8 Using LVM Commands
- 5.9 Tagging LVM2 Storage Objects
- 6 LVM Volume Snapshots
- 5 LVM Configuration
- III Software RAID
- 7 Software RAID Configuration
- 8 Configuring Software RAID for the Root Partition
- 8.1 Prerequisites for Using a Software RAID Device for the Root Partition
- 8.2 diff --git a/SLE15SP1/html/SLES-tuning/book-sle-tuning.html b/SLE15SP1/html/SLES-tuning/book-sle-tuning.html index 84984817ecb..246cc969efb 100644 --- a/SLE15SP1/html/SLES-tuning/book-sle-tuning.html +++ b/SLE15SP1/html/SLES-tuning/book-sle-tuning.html @@ -39,7 +39,7 @@ by means of monitoring tools and how to efficiently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources.
Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Basics
- II System Monitoring
- III Kernel Monitoring
- IV Resource Management
- V Kernel Tuning
- VI Handling System Dumps
- VII Synchronized Clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
Output on a Lightly Used Machine - 2.2
vmstat
Output on a Heavily Used Machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap Script
- 4.2 Probe with Timer Event
- 4.3
printf
Function with Format Specifiers - 4.4 Using Global Variables
- 4.5 Monitoring Incoming TCP Connections with
tcp_connections.stp
- 11.1 Example Output of
cpupower frequency-info
- 11.2 Example Output of
cpupower idle-info
- 11.3 Example
cpupower monitor
Output - 12.1 Increasing individual thread throughput using
CFQ
- 17.1 Kdump: Example Configuration Using a Static IP Setup
- 19.1 Slave clock using software time stamping
- 19.2 Slave clock using hardware time stamping
- 19.3 Master clock using hardware time stamping
- 19.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-tuning/index.html b/SLE15SP1/html/SLES-tuning/index.html index 84984817ecb..246cc969efb 100644 --- a/SLE15SP1/html/SLES-tuning/index.html +++ b/SLE15SP1/html/SLES-tuning/index.html @@ -39,7 +39,7 @@ by means of monitoring tools and how to efficiently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources.
Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Basics
- II System Monitoring
- III Kernel Monitoring
- IV Resource Management
- V Kernel Tuning
- VI Handling System Dumps
- VII Synchronized Clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
Output on a Lightly Used Machine - 2.2
vmstat
Output on a Heavily Used Machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap Script
- 4.2 Probe with Timer Event
- 4.3
printf
Function with Format Specifiers - 4.4 Using Global Variables
- 4.5 Monitoring Incoming TCP Connections with
tcp_connections.stp
- 11.1 Example Output of
cpupower frequency-info
- 11.2 Example Output of
cpupower idle-info
- 11.3 Example
cpupower monitor
Output - 12.1 Increasing individual thread throughput using
CFQ
- 17.1 Kdump: Example Configuration Using a Static IP Setup
- 19.1 Slave clock using software time stamping
- 19.2 Slave clock using hardware time stamping
- 19.3 Master clock using hardware time stamping
- 19.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-upgrade/book-sle-upgrade.html b/SLE15SP1/html/SLES-upgrade/book-sle-upgrade.html index fc8feed9488..d9fa433aeda 100644 --- a/SLE15SP1/html/SLES-upgrade/book-sle-upgrade.html +++ b/SLE15SP1/html/SLES-upgrade/book-sle-upgrade.html @@ -38,7 +38,7 @@ This book guides you through upgrades and updates of SUSE Linux Enterprise Server. Different approaches are described, for example upgrading from an installation DVD, via network boot, or a running system. -
Publication Date: July 12, 2023 +Publication Date: July 27, 2023- About This Guide
- 1 Upgrade Paths and Methods
- 2 Life Cycle and Support
- 3 Preparing the Upgrade
- 3.1 Make Sure the Current System Is Up-To-Date
- 3.2 Read the Release Notes
- 3.3 Make a Backup
- 3.4 Listing Installed Packages and Repositories
- 3.5 Disable the LTSS Extension
- 3.6 Upgrading from SUSE Linux Enterprise Server 11 SP4
- 3.7 Shut Down Virtual Machine Guests
- 3.8 Adjusting your SMT client setup
- 3.9 Disk Space
- 3.10 Changes in AutoYaST Profiles from SLE 12 to 15
- 3.11 Upgrading a Subscription Management Tool (SMT) Server
- 3.12 Temporarily Disabling Kernel Multiversion Support
- 3.13 Upgrading on IBM Z
- 3.14 IBM POWER: Starting an X Server
- 4 Upgrading Offline
- 5 Upgrading Online
- 5.1 Conceptual Overview
- 5.2 Service Pack Migration Workflow
- 5.3 Canceling Service Pack Migration
- 5.4 Upgrading with the Online Migration Tool (YaST)
- 5.5 Upgrading with Zypper
- 5.6 Upgrading with Plain Zypper
- 5.7 Rolling Back a Service Pack
- 5.8 Upgrading with SUSE Manager
- 5.9 Upgrading from openSUSE Leap to SUSE Linux Enterprise Server
- 6 Backports of Source Code
- A GNU licenses
List of FiguresList of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-upgrade/index.html b/SLE15SP1/html/SLES-upgrade/index.html index fc8feed9488..d9fa433aeda 100644 --- a/SLE15SP1/html/SLES-upgrade/index.html +++ b/SLE15SP1/html/SLES-upgrade/index.html @@ -38,7 +38,7 @@ This book guides you through upgrades and updates of SUSE Linux Enterprise Server. Different approaches are described, for example upgrading from an installation DVD, via network boot, or a running system. -
Publication Date: July 12, 2023 +Publication Date: July 27, 2023- About This Guide
- 1 Upgrade Paths and Methods
- 2 Life Cycle and Support
- 3 Preparing the Upgrade
- 3.1 Make Sure the Current System Is Up-To-Date
- 3.2 Read the Release Notes
- 3.3 Make a Backup
- 3.4 Listing Installed Packages and Repositories
- 3.5 Disable the LTSS Extension
- 3.6 Upgrading from SUSE Linux Enterprise Server 11 SP4
- 3.7 Shut Down Virtual Machine Guests
- 3.8 Adjusting your SMT client setup
- 3.9 Disk Space
- 3.10 Changes in AutoYaST Profiles from SLE 12 to 15
- 3.11 Upgrading a Subscription Management Tool (SMT) Server
- 3.12 Temporarily Disabling Kernel Multiversion Support
- 3.13 Upgrading on IBM Z
- 3.14 IBM POWER: Starting an X Server
- 4 Upgrading Offline
- 5 Upgrading Online
- 5.1 Conceptual Overview
- 5.2 Service Pack Migration Workflow
- 5.3 Canceling Service Pack Migration
- 5.4 Upgrading with the Online Migration Tool (YaST)
- 5.5 Upgrading with Zypper
- 5.6 Upgrading with Plain Zypper
- 5.7 Rolling Back a Service Pack
- 5.8 Upgrading with SUSE Manager
- 5.9 Upgrading from openSUSE Leap to SUSE Linux Enterprise Server
- 6 Backports of Source Code
- A GNU licenses
List of FiguresList of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-virtualization/book-virt.html b/SLE15SP1/html/SLES-virtualization/book-virt.html index 21d1bc07e37..0ed3c56cd5b 100644 --- a/SLE15SP1/html/SLES-virtualization/book-virt.html +++ b/SLE15SP1/html/SLES-virtualization/book-virt.html @@ -38,7 +38,7 @@ general, and introduces libvirt—the unified interface to virtualization—and detailed information on specific hypervisors.
Publication Date: - July 12, 2023 + July 27, 2023- About This Manual
- I Introduction
- II Managing Virtual Machines with
libvirt
- 8 Starting and Stopping
libvirtd
- 9 Guest Installation
- 10 Basic VM Guest Management
- 11 Connecting and Authorizing
- 12 Managing Storage
- 13 Managing Networks
- 14 Configuring Virtual Machines with Virtual Machine Manager
- 14.1 Machine Setup
- 14.2 Storage
- 14.3 Controllers
- 14.4 Networking
- 14.5 Input Devices
- 14.6 Video
- 14.7 USB Redirectors
- 14.8 Miscellaneous
- 14.9 Adding a CD/DVD-ROM Device with Virtual Machine Manager
- 14.10 Adding a Floppy Device with Virtual Machine Manager
- 14.11 Ejecting and Changing Floppy or CD/DVD-ROM Media with Virtual Machine Manager
- 14.12 Assigning a Host PCI Device to a VM Guest
- 14.13 Assigning a Host USB Device to a VM Guest
- 15 Configuring Virtual Machines with
virsh
- 15.1 Editing the VM Configuration
- 15.2 Managing Guest Memory Allocation (Xen only)
- 15.3 Changing the Machine Type
- 15.4 Configuring CPU Allocation
- 15.5 Changing Boot Options
- 15.6 Configuring Memory Allocation
- 15.7 Adding a PCI Device
- 15.8 Adding a USB Device
- 15.9 Adding SR-IOV Devices
- 15.10 Listing Attached Devices
- 15.11 Configuring Storage Devices
- 15.12 Configuring Controller Devices
- 15.13 Configuring Video Devices
- 15.14 Configuring Network Devices
- 15.15 Using Macvtap to Share VM Host Server Network Interfaces
- 15.16 Disabling a Memory Balloon Device
- 15.17 Configuring Multiple Monitors (Dual Head)
- 15.18 Crypto adapter pass-through to KVM guests on IBM Z
- 8 Starting and Stopping
- III Hypervisor-Independent Features
- IV Managing Virtual Machines with Xen
- 21 Setting Up a Virtual Machine Host
- 22 Virtual Networking
- 23 Managing a Virtualization Environment
- 24 Block Devices in Xen
- 25 Virtualization: Configuration Options and Settings
- 26 Administrative Tasks
- 27 XenStore: Configuration Database Shared between Domains
- 28 Xen as a High-Availability Virtualization Host
- V Managing Virtual Machines with QEMU
- 29 QEMU Overview
- 30 Setting Up a KVM VM Host Server
- 31 Guest Installation
- 32 Running Virtual Machines with qemu-system-ARCH
- 33 Virtual Machine Administration Using QEMU Monitor
- 33.1 Accessing Monitor Console
- 33.2 Getting Information about the Guest System
- 33.3 Changing VNC Password
- 33.4 Managing Devices
- 33.5 Controlling Keyboard and Mouse
- 33.6 Changing Available Memory
- 33.7 Dumping Virtual Machine Memory
- 33.8 Managing Virtual Machine Snapshots
- 33.9 Suspending and Resuming Virtual Machine Execution
- 33.10 Live Migration
- 33.11 QMP - QEMU Machine Protocol
- VI Managing Virtual Machines with LXC
- Glossary
- A Virtual Machine Drivers
- B Appendix
- C XM, XL Toolstacks and Libvirt framework
- D GNU licenses
List of Figures- 2.1 Xen Virtualization Architecture
- 3.1 KVM Virtualization Architecture
- 13.1 Connection Details
- 13.2 Create virtual network
- 13.3 Create virtual network
- 13.4 Create virtual network
- 14.1 View of a VM Guest
- 14.2 Overview details
- 14.3 VM Guest Title and Description
- 14.4 Performance
- 14.5 Statistics Charts
- 14.6 Processor View
- 14.7 Memory View
- 14.8 Boot Options
- 14.9 Add a New Storage
- 14.10 Add a New Controller
- 14.11 Add a New Controller
- 14.12 Add a New Input Device
- 14.13 Add a New Video Device
- 14.14 Add a New USB Redirector
- 14.15 Adding a PCI Device
- 14.16 Adding a USB Device
- 26.1 Boot Loader Settings
- 30.1 Installing the KVM Hypervisor and Tools
- 30.2 Network Bridge
- 31.1 New 2 GB Partition in Guest YaST Partitioner
- 32.1 QEMU Window with SLES as VM Guest
- 32.2 QEMU VNC Session
- 32.3 Authentication Dialog in Remmina
List of Tables- 7.1 Feature Support—Host (
Dom0
) - 7.2 Feature Support—Paravirtualized Guest
- 7.3 Feature Support—Fully Virtualized Guest
- 28.1 Xen Remote Storage
- C.1 Notation Conventions
- C.2 New Global Options
- C.3 Common Options
- C.4 Domain Management Removed Options
- C.5 USB Devices Management Removed Options
- C.6 CPU Management Removed options
- C.7 Other Options
- C.8
xl
create
Changed Options - C.9
xm
create
Removed Options - C.10
xl
create
Added Options - C.11
xl
console
Added Options - C.12
xm
info
Removed Options - C.13
xm
dump-core
Removed Options - C.14
xm
list
Removed Options - C.15
xl
list
Added Options - C.16
xl
mem-*
Changed Options - C.17
xm
migrate
Removed Options - C.18
xl
migrate
Added Options - C.19
xm
reboot
Removed Options - C.20
xl
reboot
Added Options - C.21
xl
save
Added Options - C.22
xl
restore
Added Options - C.23
xm
shutdown
Removed Options - C.24
xl
shutdown
Added Options - C.25
xl
trigger
Changed Options - C.26
xm
sched-credit
Removed Options - C.27
xl
sched-credit
Added Options - C.28
xm
sched-credit2
Removed Options - C.29
xl
sched-credit2
Added Options - C.30
xm
sched-sedf
Removed Options - C.31
xl
sched-sedf
Added Options - C.32
xm
cpupool-list
Removed Options - C.33
xm
cpupool-create
Removed Options - C.34
xl
pci-detach
Added Options - C.35
xm
block-list
Removed Options - C.36 Other Options
- C.37 Network Options
- C.38
xl
network-attach
Removed Options - C.39 New Options
List of Examples- 9.1 Loading Kernel and Initrd from HTTP Server
- 9.2 Example of a
virt-install
command line - 10.1 Typical Output of
kvm_stat
- 13.1 NAT Based Network
- 13.2 Routed Network
- 13.3 Isolated Network
- 13.4 Using an Existing Bridge on VM Host Server
- 15.1 Example XML Configuration File
- 23.1 Guest Domain Configuration File for SLED 12:
/etc/xen/sled12.cfg
- 30.1 Exporting Host's File System with VirtFS
- 32.1 Restricted User-mode Networking
- 32.2 User-mode Networking with Custom IP Range
- 32.3 User-mode Networking with Network-boot and TFTP
- 32.4 User-mode Networking with Host Port Forwarding
- 32.5 Password Authentication
- 32.6 x509 Certificate Authentication
- 32.7 x509 Certificate and Password Authentication
- 32.8 SASL Authentication
- C.1 Converting Xen Domain Configuration to
libvirt
Copyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-virtualization/index.html b/SLE15SP1/html/SLES-virtualization/index.html index 21d1bc07e37..0ed3c56cd5b 100644 --- a/SLE15SP1/html/SLES-virtualization/index.html +++ b/SLE15SP1/html/SLES-virtualization/index.html @@ -38,7 +38,7 @@ general, and introduces libvirt—the unified interface to virtualization—and detailed information on specific hypervisors.
Publication Date: - July 12, 2023 + July 27, 2023- About This Manual
- I Introduction
- II Managing Virtual Machines with
libvirt
- 8 Starting and Stopping
libvirtd
- 9 Guest Installation
- 10 Basic VM Guest Management
- 11 Connecting and Authorizing
- 12 Managing Storage
- 13 Managing Networks
- 14 Configuring Virtual Machines with Virtual Machine Manager
- 14.1 Machine Setup
- 14.2 Storage
- 14.3 Controllers
- 14.4 Networking
- 14.5 Input Devices
- 14.6 Video
- 14.7 USB Redirectors
- 14.8 Miscellaneous
- 14.9 Adding a CD/DVD-ROM Device with Virtual Machine Manager
- 14.10 Adding a Floppy Device with Virtual Machine Manager
- 14.11 Ejecting and Changing Floppy or CD/DVD-ROM Media with Virtual Machine Manager
- 14.12 Assigning a Host PCI Device to a VM Guest
- 14.13 Assigning a Host USB Device to a VM Guest
- 15 Configuring Virtual Machines with
virsh
- 15.1 Editing the VM Configuration
- 15.2 Managing Guest Memory Allocation (Xen only)
- 15.3 Changing the Machine Type
- 15.4 Configuring CPU Allocation
- 15.5 Changing Boot Options
- 15.6 Configuring Memory Allocation
- 15.7 Adding a PCI Device
- 15.8 Adding a USB Device
- 15.9 Adding SR-IOV Devices
- 15.10 Listing Attached Devices
- 15.11 Configuring Storage Devices
- 15.12 Configuring Controller Devices
- 15.13 Configuring Video Devices
- 15.14 Configuring Network Devices
- 15.15 Using Macvtap to Share VM Host Server Network Interfaces
- 15.16 Disabling a Memory Balloon Device
- 15.17 Configuring Multiple Monitors (Dual Head)
- 15.18 Crypto adapter pass-through to KVM guests on IBM Z
- 8 Starting and Stopping
- III Hypervisor-Independent Features
- IV Managing Virtual Machines with Xen
- 21 Setting Up a Virtual Machine Host
- 22 Virtual Networking
- 23 Managing a Virtualization Environment
- 24 Block Devices in Xen
- 25 Virtualization: Configuration Options and Settings
- 26 Administrative Tasks
- 27 XenStore: Configuration Database Shared between Domains
- 28 Xen as a High-Availability Virtualization Host
- V Managing Virtual Machines with QEMU
- 29 QEMU Overview
- 30 Setting Up a KVM VM Host Server
- 31 Guest Installation
- 32 Running Virtual Machines with qemu-system-ARCH
- 33 Virtual Machine Administration Using QEMU Monitor
- 33.1 Accessing Monitor Console
- 33.2 Getting Information about the Guest System
- 33.3 Changing VNC Password
- 33.4 Managing Devices
- 33.5 Controlling Keyboard and Mouse
- 33.6 Changing Available Memory
- 33.7 Dumping Virtual Machine Memory
- 33.8 Managing Virtual Machine Snapshots
- 33.9 Suspending and Resuming Virtual Machine Execution
- 33.10 Live Migration
- 33.11 QMP - QEMU Machine Protocol
- VI Managing Virtual Machines with LXC
- Glossary
- A Virtual Machine Drivers
- B Appendix
- C XM, XL Toolstacks and Libvirt framework
- D GNU licenses
List of Figures- 2.1 Xen Virtualization Architecture
- 3.1 KVM Virtualization Architecture
- 13.1 Connection Details
- 13.2 Create virtual network
- 13.3 Create virtual network
- 13.4 Create virtual network
- 14.1 View of a VM Guest
- 14.2 Overview details
- 14.3 VM Guest Title and Description
- 14.4 Performance
- 14.5 Statistics Charts
- 14.6 Processor View
- 14.7 Memory View
- 14.8 Boot Options
- 14.9 Add a New Storage
- 14.10 Add a New Controller
- 14.11 Add a New Controller
- 14.12 Add a New Input Device
- 14.13 Add a New Video Device
- 14.14 Add a New USB Redirector
- 14.15 Adding a PCI Device
- 14.16 Adding a USB Device
- 26.1 Boot Loader Settings
- 30.1 Installing the KVM Hypervisor and Tools
- 30.2 Network Bridge
- 31.1 New 2 GB Partition in Guest YaST Partitioner
- 32.1 QEMU Window with SLES as VM Guest
- 32.2 QEMU VNC Session
- 32.3 Authentication Dialog in Remmina
List of Tables- 7.1 Feature Support—Host (
Dom0
) - 7.2 Feature Support—Paravirtualized Guest
- 7.3 Feature Support—Fully Virtualized Guest
- 28.1 Xen Remote Storage
- C.1 Notation Conventions
- C.2 New Global Options
- C.3 Common Options
- C.4 Domain Management Removed Options
- C.5 USB Devices Management Removed Options
- C.6 CPU Management Removed options
- C.7 Other Options
- C.8
xl
create
Changed Options - C.9
xm
create
Removed Options - C.10
xl
create
Added Options - C.11
xl
console
Added Options - C.12
xm
info
Removed Options - C.13
xm
dump-core
Removed Options - C.14
xm
list
Removed Options - C.15
xl
list
Added Options - C.16
xl
mem-*
Changed Options - C.17
xm
migrate
Removed Options - C.18
xl
migrate
Added Options - C.19
xm
reboot
Removed Options - C.20
xl
reboot
Added Options - C.21
xl
save
Added Options - C.22
xl
restore
Added Options - C.23
xm
shutdown
Removed Options - C.24
xl
shutdown
Added Options - C.25
xl
trigger
Changed Options - C.26
xm
sched-credit
Removed Options - C.27
xl
sched-credit
Added Options - C.28
xm
sched-credit2
Removed Options - C.29
xl
sched-credit2
Added Options - C.30
xm
sched-sedf
Removed Options - C.31
xl
sched-sedf
Added Options - C.32
xm
cpupool-list
Removed Options - C.33
xm
cpupool-create
Removed Options - C.34
xl
pci-detach
Added Options - C.35
xm
block-list
Removed Options - C.36 Other Options
- C.37 Network Options
- C.38
xl
network-attach
Removed Options - C.39 New Options
List of Examples- 9.1 Loading Kernel and Initrd from HTTP Server
- 9.2 Example of a
virt-install
command line - 10.1 Typical Output of
kvm_stat
- 13.1 NAT Based Network
- 13.2 Routed Network
- 13.3 Isolated Network
- 13.4 Using an Existing Bridge on VM Host Server
- 15.1 Example XML Configuration File
- 23.1 Guest Domain Configuration File for SLED 12:
/etc/xen/sled12.cfg
- 30.1 Exporting Host's File System with VirtFS
- 32.1 Restricted User-mode Networking
- 32.2 User-mode Networking with Custom IP Range
- 32.3 User-mode Networking with Network-boot and TFTP
- 32.4 User-mode Networking with Host Port Forwarding
- 32.5 Password Authentication
- 32.6 x509 Certificate Authentication
- 32.7 x509 Certificate and Password Authentication
- 32.8 SASL Authentication
- C.1 Converting Xen Domain Configuration to
libvirt
Copyright © 2006–2023 diff --git a/SLE15SP1/html/SLES-vt-best-practices/article-vt-best-practices.html b/SLE15SP1/html/SLES-vt-best-practices/article-vt-best-practices.html index c7c1ca83fd6..34e90675ece 100644 --- a/SLE15SP1/html/SLES-vt-best-practices/article-vt-best-practices.html +++ b/SLE15SP1/html/SLES-vt-best-practices/article-vt-best-practices.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Virtualization Best Practices #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 20231 Virtualization Scenarios #
Virtualization offers a lot of capabilities to your environment. It can be diff --git a/SLE15SP1/html/SLES-vt-best-practices/index.html b/SLE15SP1/html/SLES-vt-best-practices/index.html index c7c1ca83fd6..34e90675ece 100644 --- a/SLE15SP1/html/SLES-vt-best-practices/index.html +++ b/SLE15SP1/html/SLES-vt-best-practices/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Virtualization Best Practices #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 20231 Virtualization Scenarios #
Virtualization offers a lot of capabilities to your environment. It can be diff --git a/SLE15SP1/html/SLES-xen2kvmquick/art-sles-xen2kvmquick.html b/SLE15SP1/html/SLES-xen2kvmquick/art-sles-xen2kvmquick.html index 7502361e5d7..bb48e320980 100644 --- a/SLE15SP1/html/SLES-xen2kvmquick/art-sles-xen2kvmquick.html +++ b/SLE15SP1/html/SLES-xen2kvmquick/art-sles-xen2kvmquick.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Xen to KVM Migration Guide #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 2023As the KVM virtualization solution is becoming more and more diff --git a/SLE15SP1/html/SLES-xen2kvmquick/index.html b/SLE15SP1/html/SLES-xen2kvmquick/index.html index 7502361e5d7..bb48e320980 100644 --- a/SLE15SP1/html/SLES-xen2kvmquick/index.html +++ b/SLE15SP1/html/SLES-xen2kvmquick/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Xen to KVM Migration Guide #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 2023As the KVM virtualization solution is becoming more and more diff --git a/SLE15SP1/single-html/SLES-admin/book-sle-admin_draft.html b/SLE15SP1/single-html/SLES-admin/book-sle-admin_draft.html index 79e31d9502d..44b9373a962 100644 --- a/SLE15SP1/single-html/SLES-admin/book-sle-admin_draft.html +++ b/SLE15SP1/single-html/SLES-admin/book-sle-admin_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Administration Guide +SLES 15 SP1 | Administration Guide @@ -38,7 +38,7 @@ Covers system administration tasks like maintaining, monitoring and customizing an initially installed system.Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Common Tasks
- 1 Bash and Bash Scripts
- 2 sudo
- 3 YaST Online Update
- 4 YaST
- 5 YaST in Text Mode
- 6 Managing Software with Command Line Tools
- 7 System Recovery and Snapshot Management with Snapper
- 7.1 Default Setup
- 7.2 Using Snapper to Undo Changes
- 7.3 System Rollback by Booting from Snapshots
- 7.4 Enabling Snapper in User Home Directories
- 7.5 Creating and Modifying Snapper Configurations
- 7.6 Manually Creating and Managing Snapshots
- 7.7 Automatic Snapshot Clean-Up
- 7.8 Showing Exclusive Disk Space Used by Snapshots
- 7.9 Frequently Asked Questions
- 8 Live kernel patching with KLP
- 9 Transactional Updates
- 10 Remote Graphical Sessions with VNC
- 11 File Copying with RSync
- II Booting a Linux System
- III System
- 16 32-Bit and 64-Bit Applications in a 64-Bit System Environment
- 17
journalctl
: Query thesystemd
Journal - 18
update-alternatives
: Managing Multiple Versions of Commands and Files - 19 Basic Networking
- 19.1 IP Addresses and Routing
- 19.2 IPv6—The Next Generation Internet
- 19.3 Name Resolution
- 19.4 Configuring a Network Connection with YaST
- 19.5 Configuring a Network Connection Manually
- 19.6 Basic Router Setup
- 19.7 Setting Up Bonding Devices
- 19.8 Setting Up Team Devices for Network Teaming
- 19.9 Software-Defined Networking with Open vSwitch
- 20 Printer Operation
- 21 Graphical User Interface
- 22 Accessing File Systems with FUSE
- 23 Managing Kernel Modules
- 24 Dynamic Kernel Device Management with
udev
- 24.1 The
/dev
Directory - 24.2 Kernel
uevents
andudev
- 24.3 Drivers, Kernel Modules and Devices
- 24.4 Booting and Initial Device Setup
- 24.5 Monitoring the Running
udev
Daemon - 24.6 Influencing Kernel Device Event Handling with
udev
Rules - 24.7 Persistent Device Naming
- 24.8 Files used by
udev
- 24.9 For More Information
- 24.1 The
- 25 Special System Features
- 26 Using NetworkManager
- 27 Power Management
- 28 VM Guest
- 29 Persistent Memory
- IV Services
- 30 Service Management with YaST
- 31 Time Synchronization with NTP
- 32 The Domain Name System
- 33 DHCP
- 34 Sharing File Systems with NFS
- 35 Samba
- 36 On-Demand Mounting with Autofs
- 37 SLP
- 38 The Apache HTTP Server
- 38.1 Quick Start
- 38.2 Configuring Apache
- 38.3 Starting and Stopping Apache
- 38.4 Installing, Activating, and Configuring Modules
- 38.5 Enabling CGI Scripts
- 38.6 Setting Up a Secure Web Server with SSL
- 38.7 Running Multiple Apache Instances on the Same Server
- 38.8 Avoiding Security Problems
- 38.9 Troubleshooting
- 38.10 For More Information
- 39 Setting Up an FTP Server with YaST
- 40 Squid Caching Proxy Server
- 40.1 Some Facts about Proxy Servers
- 40.2 System Requirements
- 40.3 Basic Usage of Squid
- 40.4 The YaST Squid Module
- 40.5 The Squid Configuration File
- 40.6 Configuring a Transparent Proxy
- 40.7 Using the Squid Cache Manager CGI Interface (
cachemgr.cgi
) - 40.8 Cache Report Generation with Calamaris
- 40.9 For More Information
- 41 Web Based Enterprise Management Using SFCB
- V Troubleshooting
- A An Example Network
- B GNU licenses
List of Figures- 3.1 YaST Online Update
- 3.2 Viewing retracted patches and history
- 3.3 YaST Online Update Configuration
- 5.1 Main Window of YaST in Text Mode
- 5.2 The Software Installation Module
- 7.1 Boot Loader: Snapshots
- 10.1 vncviewer
- 10.2 Remmina's Main Window
- 10.3 Remote Desktop Preference
- 10.4 Quick-starting
- 10.5 Remmina Viewing Remote Session
- 10.6 Reading Path to the Profile File
- 10.7 Remote Administration
- 10.8 VNC Session Settings
- 10.9 Joining a Persistent VNC Session
- 13.1 Secure Boot Support
- 13.2 UEFI: Secure Boot Process
- 14.1 GRUB 2 Boot Editor
- 14.2 Boot Code Options
- 14.3 Code Options
- 14.4 Boot Loader Options
- 14.5 Kernel Parameters
- 15.1 Services Manager
- 17.1 YaST systemd Journal
- 19.1 Simplified Layer Model for TCP/IP
- 19.2 TCP/IP Ethernet Packet
- 19.3 Configuring Network Settings
- 19.4
wicked
architecture - 26.1 GNOME Network Connections Dialog
- 26.2
firewalld
Zones in NetworkManager - 30.1 YaST Service Manager
- 31.1 NTP Configuration Window
- 31.2 Adding a Time Server
- 32.1 DNS Server Installation: Forwarder Settings
- 32.2 DNS Server Installation: DNS Zones
- 32.3 DNS Server Installation: Finish Wizard
- 32.4 DNS Server: Logging
- 32.5 DNS Server: Zone Editor (Basics)
- 32.6 DNS Server: Zone Editor (NS Records)
- 32.7 DNS Server: Zone Editor (MX Records)
- 32.8 DNS Server: Zone Editor (SOA)
- 32.9 Adding a Record for a Master Zone
- 32.10 Adding a Reverse Zone
- 32.11 Adding a Reverse Record
- 33.1 DHCP Server: Card Selection
- 33.2 DHCP Server: Global Settings
- 33.3 DHCP Server: Dynamic DHCP
- 33.4 DHCP Server: Start-Up
- 33.5 DHCP Server: Host Management
- 33.6 DHCP Server: Chroot Jail and Declarations
- 33.7 DHCP Server: Selecting a Declaration Type
- 33.8 DHCP Server: Configuring Subnets
- 33.9 DHCP Server: TSIG Configuration
- 33.10 DHCP Server: Interface Configuration for Dynamic DNS
- 33.11 DHCP Server: Network Interface and Firewall
- 34.1 NFS Server Configuration Tool
- 35.1 Determining Windows Domain Membership
- 35.2 Windows Explorer Dialog
- 35.3 Windows Explorer Directory Listing with Compressed Files
- 35.4 Adding a New Samba Share with Snapshotting Enabled
- 35.5 The tab in Windows Explorer
- 38.1 HTTP Server Wizard: Default Host
- 38.2 HTTP Server Wizard: Summary
- 38.3 HTTP Server Configuration: Listen Ports and Addresses
- 38.4 HTTP Server Configuration: Server Modules
- 39.1 FTP Server Configuration — Start-Up
- 43.1 HTML Report Generated by SCA Tool
- 43.2 HTML Report Generated by SCA Appliance
List of Tables- 1.1 Bash Configuration Files for Login Shells
- 1.2 Bash Configuration Files for Non-Login Shells
- 1.3 Special Files for Bash
- 1.4 Overview of a Standard Directory Tree
- 1.5 Useful Environment Variables
- 2.1 Useful Flags and Options
- 6.1 The Most Important RPM Query Options
- 6.2 RPM Verify Options
- 15.1 Service Management Commands
- 15.2 Commands for Enabling and Disabling Services
- 15.3 System V Runlevels and
systemd
Target Units - 19.1 Private IP Address Domains
- 19.2 Parameters for /etc/host.conf
- 19.3 Databases Available via /etc/nsswitch.conf
- 19.4 Configuration Options for NSS “Databases”
- 19.5 Feature Comparison between Bonding and Team
- 21.1 Generating PFL from Fontconfig rules
- 21.2 Results from Generating PFL from Fontconfig Rules with Changed Order
- 21.3 Results from Generating PFL from Fontconfig Rules
- 25.1
ulimit
: Setting Resources for the User - 41.1 Commands for Managing sfcbd
- 42.1 Man Pages—Categories and Descriptions
- 43.1 Comparison of Features and File Names in the TAR Archive
- 44.1 Log Files
- 44.2 System Information With the
/proc
File System - 44.3 System Information With the
/sys
File System
List of Examples- 1.1 A Shell Script Printing a Text
- 6.1 Zypper—List of Known Repositories
- 6.2
rpm -q -i wget
- 6.3 Script to Search for Packages
- 7.1 Example timeline configuration
- 14.1 Usage of grub2-mkconfig
- 14.2 Usage of grub2-mkrescue
- 14.3 Usage of grub2-script-check
- 14.4 Usage of grub2-once
- 15.1 List Active Services
- 15.2 List Failed Services
- 15.3 List all Processes Belonging to a Service
- 18.1 Alternatives System of the
java
Command - 19.1 Writing IP Addresses
- 19.2 Linking IP Addresses to the Netmask
- 19.3 Sample IPv6 Address
- 19.4 IPv6 Address Specifying the Prefix Length
- 19.5 Common Network Interfaces and Some Static Routes
- 19.6
/var/run/netconfig/resolv.conf
- 19.7
/etc/hosts
- 19.8
/etc/networks
- 19.9
/etc/host.conf
- 19.10
/etc/nsswitch.conf
- 19.11 Output of the Command ping
- 19.12 Configuration for Load Balancing with Network Teaming
- 19.13 Configuration for DHCP Network Teaming Device
- 20.1 Error Message from
lpd
- 20.2 Broadcast from the CUPS Network Server
- 21.1 Specifying Rendering Algorithms
- 21.2 Aliases and Family Name Substitutions
- 21.3 Aliases and Family Name Substitutions
- 21.4 Aliases and Family Names Substitutions
- 24.1 Example
udev
Rules - 25.1 Entry in /etc/crontab
- 25.2 /etc/crontab: Remove Time Stamp Files
- 25.3
ulimit
: Settings in~/.bashrc
- 32.1 Forwarding Options in named.conf
- 32.2 A Basic /etc/named.conf
- 32.3 Entry to Disable Logging
- 32.4 Zone Entry for example.com
- 32.5 Zone Entry for example.net
- 32.6 The /var/lib/named/example.com.zone File
- 32.7 Reverse Lookup
- 33.1 The Configuration File /etc/dhcpd.conf
- 33.2 Additions to the Configuration File
- 35.1 A CD-ROM Share
- 35.2 [homes] Share
- 35.3 Global Section in smb.conf
- 35.4 Using
rpcclient
to Request a Windows Server 2012 Share Snapshot - 38.1 Basic Examples of Name-Based
VirtualHost
Entries - 38.2 Name-Based
VirtualHost
Directives - 38.3 IP-Based
VirtualHost
Directives - 38.4 Basic
VirtualHost
Configuration - 38.5 VirtualHost CGI Configuration
- 40.1 A Request With
squidclient
- 40.2 Defining ACL Rules
- 43.1 Output of
hostinfo
When Logging In asroot
Copyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-admin/index.html b/SLE15SP1/single-html/SLES-admin/index.html index 79e31d9502d..44b9373a962 100644 --- a/SLE15SP1/single-html/SLES-admin/index.html +++ b/SLE15SP1/single-html/SLES-admin/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Administration Guide +SLES 15 SP1 | Administration Guide @@ -38,7 +38,7 @@ Covers system administration tasks like maintaining, monitoring and customizing an initially installed system.Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Common Tasks
- 1 Bash and Bash Scripts
- 2 sudo
- 3 YaST Online Update
- 4 YaST
- 5 YaST in Text Mode
- 6 Managing Software with Command Line Tools
- 7 System Recovery and Snapshot Management with Snapper
- 7.1 Default Setup
- 7.2 Using Snapper to Undo Changes
- 7.3 System Rollback by Booting from Snapshots
- 7.4 Enabling Snapper in User Home Directories
- 7.5 Creating and Modifying Snapper Configurations
- 7.6 Manually Creating and Managing Snapshots
- 7.7 Automatic Snapshot Clean-Up
- 7.8 Showing Exclusive Disk Space Used by Snapshots
- 7.9 Frequently Asked Questions
- 8 Live kernel patching with KLP
- 9 Transactional Updates
- 10 Remote Graphical Sessions with VNC
- 11 File Copying with RSync
- II Booting a Linux System
- III System
- 16 32-Bit and 64-Bit Applications in a 64-Bit System Environment
- 17
journalctl
: Query thesystemd
Journal - 18
update-alternatives
: Managing Multiple Versions of Commands and Files - 19 Basic Networking
- 19.1 IP Addresses and Routing
- 19.2 IPv6—The Next Generation Internet
- 19.3 Name Resolution
- 19.4 Configuring a Network Connection with YaST
- 19.5 Configuring a Network Connection Manually
- 19.6 Basic Router Setup
- 19.7 Setting Up Bonding Devices
- 19.8 Setting Up Team Devices for Network Teaming
- 19.9 Software-Defined Networking with Open vSwitch
- 20 Printer Operation
- 21 Graphical User Interface
- 22 Accessing File Systems with FUSE
- 23 Managing Kernel Modules
- 24 Dynamic Kernel Device Management with
udev
- 24.1 The
/dev
Directory - 24.2 Kernel
uevents
andudev
- 24.3 Drivers, Kernel Modules and Devices
- 24.4 Booting and Initial Device Setup
- 24.5 Monitoring the Running
udev
Daemon - 24.6 Influencing Kernel Device Event Handling with
udev
Rules - 24.7 Persistent Device Naming
- 24.8 Files used by
udev
- 24.9 For More Information
- 24.1 The
- 25 Special System Features
- 26 Using NetworkManager
- 27 Power Management
- 28 VM Guest
- 29 Persistent Memory
- IV Services
- 30 Service Management with YaST
- 31 Time Synchronization with NTP
- 32 The Domain Name System
- 33 DHCP
- 34 Sharing File Systems with NFS
- 35 Samba
- 36 On-Demand Mounting with Autofs
- 37 SLP
- 38 The Apache HTTP Server
- 38.1 Quick Start
- 38.2 Configuring Apache
- 38.3 Starting and Stopping Apache
- 38.4 Installing, Activating, and Configuring Modules
- 38.5 Enabling CGI Scripts
- 38.6 Setting Up a Secure Web Server with SSL
- 38.7 Running Multiple Apache Instances on the Same Server
- 38.8 Avoiding Security Problems
- 38.9 Troubleshooting
- 38.10 For More Information
- 39 Setting Up an FTP Server with YaST
- 40 Squid Caching Proxy Server
- 40.1 Some Facts about Proxy Servers
- 40.2 System Requirements
- 40.3 Basic Usage of Squid
- 40.4 The YaST Squid Module
- 40.5 The Squid Configuration File
- 40.6 Configuring a Transparent Proxy
- 40.7 Using the Squid Cache Manager CGI Interface (
cachemgr.cgi
) - 40.8 Cache Report Generation with Calamaris
- 40.9 For More Information
- 41 Web Based Enterprise Management Using SFCB
- V Troubleshooting
- A An Example Network
- B GNU licenses
List of Figures- 3.1 YaST Online Update
- 3.2 Viewing retracted patches and history
- 3.3 YaST Online Update Configuration
- 5.1 Main Window of YaST in Text Mode
- 5.2 The Software Installation Module
- 7.1 Boot Loader: Snapshots
- 10.1 vncviewer
- 10.2 Remmina's Main Window
- 10.3 Remote Desktop Preference
- 10.4 Quick-starting
- 10.5 Remmina Viewing Remote Session
- 10.6 Reading Path to the Profile File
- 10.7 Remote Administration
- 10.8 VNC Session Settings
- 10.9 Joining a Persistent VNC Session
- 13.1 Secure Boot Support
- 13.2 UEFI: Secure Boot Process
- 14.1 GRUB 2 Boot Editor
- 14.2 Boot Code Options
- 14.3 Code Options
- 14.4 Boot Loader Options
- 14.5 Kernel Parameters
- 15.1 Services Manager
- 17.1 YaST systemd Journal
- 19.1 Simplified Layer Model for TCP/IP
- 19.2 TCP/IP Ethernet Packet
- 19.3 Configuring Network Settings
- 19.4
wicked
architecture - 26.1 GNOME Network Connections Dialog
- 26.2
firewalld
Zones in NetworkManager - 30.1 YaST Service Manager
- 31.1 NTP Configuration Window
- 31.2 Adding a Time Server
- 32.1 DNS Server Installation: Forwarder Settings
- 32.2 DNS Server Installation: DNS Zones
- 32.3 DNS Server Installation: Finish Wizard
- 32.4 DNS Server: Logging
- 32.5 DNS Server: Zone Editor (Basics)
- 32.6 DNS Server: Zone Editor (NS Records)
- 32.7 DNS Server: Zone Editor (MX Records)
- 32.8 DNS Server: Zone Editor (SOA)
- 32.9 Adding a Record for a Master Zone
- 32.10 Adding a Reverse Zone
- 32.11 Adding a Reverse Record
- 33.1 DHCP Server: Card Selection
- 33.2 DHCP Server: Global Settings
- 33.3 DHCP Server: Dynamic DHCP
- 33.4 DHCP Server: Start-Up
- 33.5 DHCP Server: Host Management
- 33.6 DHCP Server: Chroot Jail and Declarations
- 33.7 DHCP Server: Selecting a Declaration Type
- 33.8 DHCP Server: Configuring Subnets
- 33.9 DHCP Server: TSIG Configuration
- 33.10 DHCP Server: Interface Configuration for Dynamic DNS
- 33.11 DHCP Server: Network Interface and Firewall
- 34.1 NFS Server Configuration Tool
- 35.1 Determining Windows Domain Membership
- 35.2 Windows Explorer Dialog
- 35.3 Windows Explorer Directory Listing with Compressed Files
- 35.4 Adding a New Samba Share with Snapshotting Enabled
- 35.5 The tab in Windows Explorer
- 38.1 HTTP Server Wizard: Default Host
- 38.2 HTTP Server Wizard: Summary
- 38.3 HTTP Server Configuration: Listen Ports and Addresses
- 38.4 HTTP Server Configuration: Server Modules
- 39.1 FTP Server Configuration — Start-Up
- 43.1 HTML Report Generated by SCA Tool
- 43.2 HTML Report Generated by SCA Appliance
List of Tables- 1.1 Bash Configuration Files for Login Shells
- 1.2 Bash Configuration Files for Non-Login Shells
- 1.3 Special Files for Bash
- 1.4 Overview of a Standard Directory Tree
- 1.5 Useful Environment Variables
- 2.1 Useful Flags and Options
- 6.1 The Most Important RPM Query Options
- 6.2 RPM Verify Options
- 15.1 Service Management Commands
- 15.2 Commands for Enabling and Disabling Services
- 15.3 System V Runlevels and
systemd
Target Units - 19.1 Private IP Address Domains
- 19.2 Parameters for /etc/host.conf
- 19.3 Databases Available via /etc/nsswitch.conf
- 19.4 Configuration Options for NSS “Databases”
- 19.5 Feature Comparison between Bonding and Team
- 21.1 Generating PFL from Fontconfig rules
- 21.2 Results from Generating PFL from Fontconfig Rules with Changed Order
- 21.3 Results from Generating PFL from Fontconfig Rules
- 25.1
ulimit
: Setting Resources for the User - 41.1 Commands for Managing sfcbd
- 42.1 Man Pages—Categories and Descriptions
- 43.1 Comparison of Features and File Names in the TAR Archive
- 44.1 Log Files
- 44.2 System Information With the
/proc
File System - 44.3 System Information With the
/sys
File System
List of Examples- 1.1 A Shell Script Printing a Text
- 6.1 Zypper—List of Known Repositories
- 6.2
rpm -q -i wget
- 6.3 Script to Search for Packages
- 7.1 Example timeline configuration
- 14.1 Usage of grub2-mkconfig
- 14.2 Usage of grub2-mkrescue
- 14.3 Usage of grub2-script-check
- 14.4 Usage of grub2-once
- 15.1 List Active Services
- 15.2 List Failed Services
- 15.3 List all Processes Belonging to a Service
- 18.1 Alternatives System of the
java
Command - 19.1 Writing IP Addresses
- 19.2 Linking IP Addresses to the Netmask
- 19.3 Sample IPv6 Address
- 19.4 IPv6 Address Specifying the Prefix Length
- 19.5 Common Network Interfaces and Some Static Routes
- 19.6
/var/run/netconfig/resolv.conf
- 19.7
/etc/hosts
- 19.8
/etc/networks
- 19.9
/etc/host.conf
- 19.10
/etc/nsswitch.conf
- 19.11 Output of the Command ping
- 19.12 Configuration for Load Balancing with Network Teaming
- 19.13 Configuration for DHCP Network Teaming Device
- 20.1 Error Message from
lpd
- 20.2 Broadcast from the CUPS Network Server
- 21.1 Specifying Rendering Algorithms
- 21.2 Aliases and Family Name Substitutions
- 21.3 Aliases and Family Name Substitutions
- 21.4 Aliases and Family Names Substitutions
- 24.1 Example
udev
Rules - 25.1 Entry in /etc/crontab
- 25.2 /etc/crontab: Remove Time Stamp Files
- 25.3
ulimit
: Settings in~/.bashrc
- 32.1 Forwarding Options in named.conf
- 32.2 A Basic /etc/named.conf
- 32.3 Entry to Disable Logging
- 32.4 Zone Entry for example.com
- 32.5 Zone Entry for example.net
- 32.6 The /var/lib/named/example.com.zone File
- 32.7 Reverse Lookup
- 33.1 The Configuration File /etc/dhcpd.conf
- 33.2 Additions to the Configuration File
- 35.1 A CD-ROM Share
- 35.2 [homes] Share
- 35.3 Global Section in smb.conf
- 35.4 Using
rpcclient
to Request a Windows Server 2012 Share Snapshot - 38.1 Basic Examples of Name-Based
VirtualHost
Entries - 38.2 Name-Based
VirtualHost
Directives - 38.3 IP-Based
VirtualHost
Directives - 38.4 Basic
VirtualHost
Configuration - 38.5 VirtualHost CGI Configuration
- 40.1 A Request With
squidclient
- 40.2 Defining ACL Rules
- 43.1 Output of
hostinfo
When Logging In asroot
Copyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-amd-sev/art-amd-sev_draft.html b/SLE15SP1/single-html/SLES-amd-sev/art-amd-sev_draft.html index 421720d334b..265db5d6c37 100644 --- a/SLE15SP1/single-html/SLES-amd-sev/art-amd-sev_draft.html +++ b/SLE15SP1/single-html/SLES-amd-sev/art-amd-sev_draft.html @@ -1,5 +1,5 @@ -en
AMD Secure Encrypted Virtualization (AMD-SEV) Guide +AMD Secure Encrypted Virtualization (AMD-SEV) Guide @@ -27,7 +27,7 @@ useBR: false }); -This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
Publication Date: July 27, 2023AMD's Secure Encrypted Virtualization (SEV) allows the memory of virtual machines to be encrypted. This is a new feature for Linux's built-in diff --git a/SLE15SP1/single-html/SLES-amd-sev/index.html b/SLE15SP1/single-html/SLES-amd-sev/index.html index 421720d334b..265db5d6c37 100644 --- a/SLE15SP1/single-html/SLES-amd-sev/index.html +++ b/SLE15SP1/single-html/SLES-amd-sev/index.html @@ -1,5 +1,5 @@ -en
AMD Secure Encrypted Virtualization (AMD-SEV) Guide +AMD Secure Encrypted Virtualization (AMD-SEV) Guide @@ -27,7 +27,7 @@ useBR: false }); -This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
Publication Date: July 27, 2023AMD's Secure Encrypted Virtualization (SEV) allows the memory of virtual machines to be encrypted. This is a new feature for Linux's built-in diff --git a/SLE15SP1/single-html/SLES-autoyast/book-autoyast_draft.html b/SLE15SP1/single-html/SLES-autoyast/book-autoyast_draft.html index 7f5727970d2..878183999c2 100644 --- a/SLE15SP1/single-html/SLES-autoyast/book-autoyast_draft.html +++ b/SLE15SP1/single-html/SLES-autoyast/book-autoyast_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | AutoYaST Guide +SLES 15 SP1 | AutoYaST Guide @@ -40,7 +40,7 @@ and configuration data. The manual guides you through the basic steps of auto-installation: preparation, installation, and configuration.Publication Date: - July 12, 2023 + July 27, 2023- 1 Introduction to AutoYaST
- I Understanding and Creating the AutoYaST Control File
- II AutoYaST Configuration Examples
- 4 Configuration and Installation Options
- 4.1 General Options
- 4.2 Reporting
- 4.3 System Registration and Extension Selection
- 4.4 The Boot Loader
- 4.5 Partitioning
- 4.6 iSCSI Initiator Overview
- 4.7 Fibre Channel over Ethernet Configuration (FCoE)
- 4.8 Country Settings
- 4.9 Software
- 4.10 Upgrade
- 4.11 Services and Targets
- 4.12 Network Configuration
- 4.13 NIS Client and Server
- 4.14 NIS Server
- 4.15 Hosts Definition
- 4.16 Windows Domain Membership
- 4.17 Samba Server
- 4.18 Authentication Client
- 4.19 NFS Client and Server
- 4.20 NTP Client
- 4.21 Mail Server Configuration
- 4.22 Apache HTTP Server Configuration
- 4.23 Squid Server
- 4.24 FTP Server
- 4.25 TFTP Server
- 4.26 Firstboot Workflow
- 4.27 Security Settings
- 4.28 Linux Audit Framework (LAF)
- 4.29 Users and Groups
- 4.30 Custom User Scripts
- 4.31 System Variables (Sysconfig)
- 4.32 Adding Complete Configurations
- 4.33 Ask the User for Values during Installation
- 4.34 Kernel Dumps
- 4.35 DNS Server
- 4.36 DHCP Server
- 4.37 Firewall Configuration
- 4.38 Miscellaneous Hardware and System Components
- 4.39 Importing SSH Keys and Configuration
- 4.40 Configuration Management
- 4 Configuration and Installation Options
- III Managing Mass Installations with Rules and Classes
- IV Understanding the Auto-Installation Process
- V Uses for AutoYaST on Installed Systems
- VI Appendices
- A Handling Rules
- B AutoYaST FAQ—Frequently Asked Questions
- C Advanced
linuxrc
Options - D
Differences Between AutoYaST Profiles in SLE 12 and 15
diff --git a/SLE15SP1/single-html/SLES-autoyast/index.html b/SLE15SP1/single-html/SLES-autoyast/index.html
index 7f5727970d2..878183999c2 100644
--- a/SLE15SP1/single-html/SLES-autoyast/index.html
+++ b/SLE15SP1/single-html/SLES-autoyast/index.html
@@ -1,5 +1,5 @@
-en
SLES 15 SP1 | AutoYaST Guide +SLES 15 SP1 | AutoYaST Guide @@ -40,7 +40,7 @@ and configuration data. The manual guides you through the basic steps of auto-installation: preparation, installation, and configuration.
Publication Date: - July 12, 2023 + July 27, 2023- 1 Introduction to AutoYaST
- I Understanding and Creating the AutoYaST Control File
- II AutoYaST Configuration Examples
- 4 Configuration and Installation Options
- 4.1 General Options
- 4.2 Reporting
- 4.3 System Registration and Extension Selection
- 4.4 The Boot Loader
- 4.5 Partitioning
- 4.6 iSCSI Initiator Overview
- 4.7 Fibre Channel over Ethernet Configuration (FCoE)
- 4.8 Country Settings
- 4.9 Software
- 4.10 Upgrade
- 4.11 Services and Targets
- 4.12 Network Configuration
- 4.13 NIS Client and Server
- 4.14 NIS Server
- 4.15 Hosts Definition
- 4.16 Windows Domain Membership
- 4.17 Samba Server
- 4.18 Authentication Client
- 4.19 NFS Client and Server
- 4.20 NTP Client
- 4.21 Mail Server Configuration
- 4.22 Apache HTTP Server Configuration
- 4.23 Squid Server
- 4.24 FTP Server
- 4.25 TFTP Server
- 4.26 Firstboot Workflow
- 4.27 Security Settings
- 4.28 Linux Audit Framework (LAF)
- 4.29 Users and Groups
- 4.30 Custom User Scripts
- 4.31 System Variables (Sysconfig)
- 4.32 Adding Complete Configurations
- 4.33 Ask the User for Values during Installation
- 4.34 Kernel Dumps
- 4.35 DNS Server
- 4.36 DHCP Server
- 4.37 Firewall Configuration
- 4.38 Miscellaneous Hardware and System Components
- 4.39 Importing SSH Keys and Configuration
- 4.40 Configuration Management
- 4 Configuration and Installation Options
- III Managing Mass Installations with Rules and Classes
- IV Understanding the Auto-Installation Process
- V Uses for AutoYaST on Installed Systems
- VI Appendices
- A Handling Rules
- B AutoYaST FAQ—Frequently Asked Questions
- C Advanced
linuxrc
Options - D
Differences Between AutoYaST Profiles in SLE 12 and 15
diff --git a/SLE15SP1/single-html/SLES-deployment/book-sle-deployment_draft.html b/SLE15SP1/single-html/SLES-deployment/book-sle-deployment_draft.html
index 27e4d0c74b2..2c55cdd0ee2 100644
--- a/SLE15SP1/single-html/SLES-deployment/book-sle-deployment_draft.html
+++ b/SLE15SP1/single-html/SLES-deployment/book-sle-deployment_draft.html
@@ -1,5 +1,5 @@
-en
SLES 15 SP1 | Deployment Guide +SLES 15 SP1 | Deployment Guide @@ -43,7 +43,7 @@ a remote-controlled, highly-customized, automated installation process, and initial system configuration.
Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Installation Preparation
- II Installation Procedure
- 7 Boot Parameters
- 8 Installation Steps
- 8.1 Overview
- 8.2 Installer Self-Update
- 8.3
Language, Keyboard, and Product Selection
diff --git a/SLE15SP1/single-html/SLES-deployment/index.html b/SLE15SP1/single-html/SLES-deployment/index.html
index 27e4d0c74b2..2c55cdd0ee2 100644
--- a/SLE15SP1/single-html/SLES-deployment/index.html
+++ b/SLE15SP1/single-html/SLES-deployment/index.html
@@ -1,5 +1,5 @@
-en
SLES 15 SP1 | Deployment Guide +SLES 15 SP1 | Deployment Guide @@ -43,7 +43,7 @@ a remote-controlled, highly-customized, automated installation process, and initial system configuration.
Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Installation Preparation
- II Installation Procedure
- 7 Boot Parameters
- 8 Installation Steps
- 8.1 Overview
- 8.2 Installer Self-Update
- 8.3
Language, Keyboard, and Product Selection
diff --git a/SLE15SP1/single-html/SLES-dockerquick/book-sles-docker_draft.html b/SLE15SP1/single-html/SLES-dockerquick/book-sles-docker_draft.html
index 4b1a7cbdd76..bcb69483b34 100644
--- a/SLE15SP1/single-html/SLES-dockerquick/book-sles-docker_draft.html
+++ b/SLE15SP1/single-html/SLES-dockerquick/book-sles-docker_draft.html
@@ -1,5 +1,5 @@
-en
SLES 15 SP1 | Docker Open Source Engine Guide +SLES 15 SP1 | Docker Open Source Engine Guide @@ -37,7 +37,7 @@This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
List of FiguresList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-dockerquick/index.html b/SLE15SP1/single-html/SLES-dockerquick/index.html index 4b1a7cbdd76..bcb69483b34 100644 --- a/SLE15SP1/single-html/SLES-dockerquick/index.html +++ b/SLE15SP1/single-html/SLES-dockerquick/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Docker Open Source Engine Guide +SLES 15 SP1 | Docker Open Source Engine Guide @@ -37,7 +37,7 @@This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
List of FiguresList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-gnomeuser/book-gnomeuser_draft.html b/SLE15SP1/single-html/SLES-gnomeuser/book-gnomeuser_draft.html index 8bde7df05bf..2c57d3f65ff 100644 --- a/SLE15SP1/single-html/SLES-gnomeuser/book-gnomeuser_draft.html +++ b/SLE15SP1/single-html/SLES-gnomeuser/book-gnomeuser_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | GNOME User Guide +SLES 15 SP1 | GNOME User Guide @@ -40,7 +40,7 @@ perform key tasks. It is intended mainly for end users who want to make efficient use of GNOME as their default desktop.Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Introduction
- 1 Getting Started with the GNOME Desktop
- 2 Working with Your Desktop
- 2.1 Managing Files and Directories
- 2.2 Accessing Removable Media
- 2.3 Searching for Files
- 2.4 Copying Text Between Applications
- 2.5 Managing Internet Connections
- 2.6 Exploring the Internet
- 2.7 E-mail and Scheduling
- 2.8 Opening or Creating Documents with LibreOffice
- 2.9 Controlling Your Desktop’s Power Management
- 2.10 Creating, Displaying, and Decompressing Archives
- 2.11 Taking Screenshots
- 2.12 Viewing PDF Files
- 2.13 Obtaining Software Updates
- 2.14 For More Information
- 3 Customizing Your Settings
- 3.1 Changing the Desktop Background
- 3.2 Configuring Language Settings
- 3.3 Configuring the Keyboard
- 3.4 Using XCompose to Type Special Characters
- 3.5 Configuring Bluetooth Settings
- 3.6 Configuring Power Settings
- 3.7 Configuring the Mouse and Touchpad
- 3.8 Installing and Configuring Printers
- 3.9 Configuring Screens
- 3.10 Configuring Sound Settings
- 3.11 Setting Default Applications
- 3.12 Setting Session Sharing Preferences
- 4 Assistive Technologies
- II Connectivity, Files and Resources
- III LibreOffice
- IV Internet and Communication
- V Graphics and Multimedia
- A Help and Documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME Login Screen
- 1.2 Default GNOME Login Screen—Session Type
- 1.3 GNOME Desktop with Activities Overview
- 2.1 File Manager
- 2.2 Archive Manager
- 2.3 Document Viewer
- 3.1 Keyboard Dialog
- 3.2 Enabling the Compose Key in Tweaks
- 3.3 Mouse and Touchpad Settings Dialog
- 3.4 Single Monitor Settings Dialog
- 3.5 Single Monitor Settings Dialog
- 3.6 Configuring Sound Settings
- 3.7 Default Applications
- 5.1 Network File Browser
- 8.1 Password and Keys Main Window
- 9.1 Customization Dialog in Writer
- 9.2 The Options Window
- 10.1 A LibreOffice Wizard
- 10.2 Styles and Formatting Panel
- 10.3 Navigator Tool in Writer
- 12.1 Mathematical Formula in LibreOffice Math
- 13.1 The Browser Window of Firefox
- 13.2 Firefox—Manage Search Engines
- 13.3 The Firefox Bookmark Library
- 13.4 The Firefox Page Info Window
- 13.5 The Preferences Window
- 13.6 Installing Firefox Extensions
- 14.1 Evolution Window
- 16.1 Ekiga User Interface
- 17.1 The Toolbox
- 17.2 The Basic Color Selector Dialog
- 17.3 The Print Dialog
- 18.1 GNOME Videos Start-Up Window
- 18.2 GNOME Videos General Preferences
- 18.3 GNOME Videos Display Preferences
- 18.4 GNOME Videos Audio Preferences
- 19.1 Main View of Brasero
- A.1 Main Window of Help
List of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-gnomeuser/index.html b/SLE15SP1/single-html/SLES-gnomeuser/index.html index 8bde7df05bf..2c57d3f65ff 100644 --- a/SLE15SP1/single-html/SLES-gnomeuser/index.html +++ b/SLE15SP1/single-html/SLES-gnomeuser/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | GNOME User Guide +SLES 15 SP1 | GNOME User Guide @@ -40,7 +40,7 @@ perform key tasks. It is intended mainly for end users who want to make efficient use of GNOME as their default desktop.Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Introduction
- 1 Getting Started with the GNOME Desktop
- 2 Working with Your Desktop
- 2.1 Managing Files and Directories
- 2.2 Accessing Removable Media
- 2.3 Searching for Files
- 2.4 Copying Text Between Applications
- 2.5 Managing Internet Connections
- 2.6 Exploring the Internet
- 2.7 E-mail and Scheduling
- 2.8 Opening or Creating Documents with LibreOffice
- 2.9 Controlling Your Desktop’s Power Management
- 2.10 Creating, Displaying, and Decompressing Archives
- 2.11 Taking Screenshots
- 2.12 Viewing PDF Files
- 2.13 Obtaining Software Updates
- 2.14 For More Information
- 3 Customizing Your Settings
- 3.1 Changing the Desktop Background
- 3.2 Configuring Language Settings
- 3.3 Configuring the Keyboard
- 3.4 Using XCompose to Type Special Characters
- 3.5 Configuring Bluetooth Settings
- 3.6 Configuring Power Settings
- 3.7 Configuring the Mouse and Touchpad
- 3.8 Installing and Configuring Printers
- 3.9 Configuring Screens
- 3.10 Configuring Sound Settings
- 3.11 Setting Default Applications
- 3.12 Setting Session Sharing Preferences
- 4 Assistive Technologies
- II Connectivity, Files and Resources
- III LibreOffice
- IV Internet and Communication
- V Graphics and Multimedia
- A Help and Documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME Login Screen
- 1.2 Default GNOME Login Screen—Session Type
- 1.3 GNOME Desktop with Activities Overview
- 2.1 File Manager
- 2.2 Archive Manager
- 2.3 Document Viewer
- 3.1 Keyboard Dialog
- 3.2 Enabling the Compose Key in Tweaks
- 3.3 Mouse and Touchpad Settings Dialog
- 3.4 Single Monitor Settings Dialog
- 3.5 Single Monitor Settings Dialog
- 3.6 Configuring Sound Settings
- 3.7 Default Applications
- 5.1 Network File Browser
- 8.1 Password and Keys Main Window
- 9.1 Customization Dialog in Writer
- 9.2 The Options Window
- 10.1 A LibreOffice Wizard
- 10.2 Styles and Formatting Panel
- 10.3 Navigator Tool in Writer
- 12.1 Mathematical Formula in LibreOffice Math
- 13.1 The Browser Window of Firefox
- 13.2 Firefox—Manage Search Engines
- 13.3 The Firefox Bookmark Library
- 13.4 The Firefox Page Info Window
- 13.5 The Preferences Window
- 13.6 Installing Firefox Extensions
- 14.1 Evolution Window
- 16.1 Ekiga User Interface
- 17.1 The Toolbox
- 17.2 The Basic Color Selector Dialog
- 17.3 The Print Dialog
- 18.1 GNOME Videos Start-Up Window
- 18.2 GNOME Videos General Preferences
- 18.3 GNOME Videos Display Preferences
- 18.4 GNOME Videos Audio Preferences
- 19.1 Main View of Brasero
- A.1 Main Window of Help
List of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-installquick/art-sle-installquick_draft.html b/SLE15SP1/single-html/SLES-installquick/art-sle-installquick_draft.html index 5df5e708acd..4bd5479f791 100644 --- a/SLE15SP1/single-html/SLES-installquick/art-sle-installquick_draft.html +++ b/SLE15SP1/single-html/SLES-installquick/art-sle-installquick_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Installation Quick Start +SLES 15 SP1 | Installation Quick Start @@ -35,7 +35,7 @@ });This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Installation Quick Start #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 2023This Quick Start guides you step-by-step diff --git a/SLE15SP1/single-html/SLES-installquick/index.html b/SLE15SP1/single-html/SLES-installquick/index.html index 5df5e708acd..4bd5479f791 100644 --- a/SLE15SP1/single-html/SLES-installquick/index.html +++ b/SLE15SP1/single-html/SLES-installquick/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Installation Quick Start +SLES 15 SP1 | Installation Quick Start @@ -35,7 +35,7 @@ });This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Installation Quick Start #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 2023This Quick Start guides you step-by-step diff --git a/SLE15SP1/single-html/SLES-modulesquick/art-modules_draft.html b/SLE15SP1/single-html/SLES-modulesquick/art-modules_draft.html index 3cf7876a677..d6d69cda32c 100644 --- a/SLE15SP1/single-html/SLES-modulesquick/art-modules_draft.html +++ b/SLE15SP1/single-html/SLES-modulesquick/art-modules_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Modules and Extensions Quick Start +SLES 15 SP1 | Modules and Extensions Quick Start @@ -35,7 +35,7 @@ });This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Modules and Extensions Quick Start #
Publication Date: - July 12, 2023 + July 27, 2023This Quick Start gives you an overview of the diff --git a/SLE15SP1/single-html/SLES-modulesquick/index.html b/SLE15SP1/single-html/SLES-modulesquick/index.html index 3cf7876a677..d6d69cda32c 100644 --- a/SLE15SP1/single-html/SLES-modulesquick/index.html +++ b/SLE15SP1/single-html/SLES-modulesquick/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Modules and Extensions Quick Start +SLES 15 SP1 | Modules and Extensions Quick Start @@ -35,7 +35,7 @@ });This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Modules and Extensions Quick Start #
Publication Date: - July 12, 2023 + July 27, 2023This Quick Start gives you an overview of the diff --git a/SLE15SP1/single-html/SLES-rmt/book-rmt_draft.html b/SLE15SP1/single-html/SLES-rmt/book-rmt_draft.html index 233e33bb916..a90943f883e 100644 --- a/SLE15SP1/single-html/SLES-rmt/book-rmt_draft.html +++ b/SLE15SP1/single-html/SLES-rmt/book-rmt_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Repository Mirroring Tool Guide +SLES 15 SP1 | Repository Mirroring Tool Guide @@ -34,7 +34,7 @@ useBR: false }); -This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- About This Guide
- 1 RMT Installation and Configuration
- 2 Migrate from SMT to RMT
- 3 Mirroring Repositories on the RMT Server
- 4 Configuring Clients to Use RMT
- 4.1 Configuring Clients with Boot Parameters
- 4.2 Configuring Clients with AutoYaST Profile
- 4.3 Configuring Clients with
rmt-client-setup
- 4.4 Configuring Clients with YaST
- 4.5 Configuring Clients for Custom Stand-alone Repositories
- 4.6 Listing Accessible Repositories
- 4.7 Online Migration of SUSE Linux Enterprise Clients
- 5 RMT Tools and Configuration Files
- 6 Backing Up an RMT Server
- 7 Managing SSL/TLS Certificates
- A GNU licenses
List of FiguresList of TablesCopyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-rmt/index.html b/SLE15SP1/single-html/SLES-rmt/index.html index 233e33bb916..a90943f883e 100644 --- a/SLE15SP1/single-html/SLES-rmt/index.html +++ b/SLE15SP1/single-html/SLES-rmt/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Repository Mirroring Tool Guide +SLES 15 SP1 | Repository Mirroring Tool Guide @@ -34,7 +34,7 @@ useBR: false }); -This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- About This Guide
- 1 RMT Installation and Configuration
- 2 Migrate from SMT to RMT
- 3 Mirroring Repositories on the RMT Server
- 4 Configuring Clients to Use RMT
- 4.1 Configuring Clients with Boot Parameters
- 4.2 Configuring Clients with AutoYaST Profile
- 4.3 Configuring Clients with
rmt-client-setup
- 4.4 Configuring Clients with YaST
- 4.5 Configuring Clients for Custom Stand-alone Repositories
- 4.6 Listing Accessible Repositories
- 4.7 Online Migration of SUSE Linux Enterprise Clients
- 5 RMT Tools and Configuration Files
- 6 Backing Up an RMT Server
- 7 Managing SSL/TLS Certificates
- A GNU licenses
List of FiguresList of TablesCopyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-rpi-quick/art-rpiquick_draft.html b/SLE15SP1/single-html/SLES-rpi-quick/art-rpiquick_draft.html index 2dbb81aaa46..13dc79c629d 100644 --- a/SLE15SP1/single-html/SLES-rpi-quick/art-rpiquick_draft.html +++ b/SLE15SP1/single-html/SLES-rpi-quick/art-rpiquick_draft.html @@ -1,5 +1,5 @@ -en
SUSE Linux Enterprise Server for Arm 15 SP1 | Raspberry Pi Quick Start +SUSE Linux Enterprise Server for Arm 15 SP1 | Raspberry Pi Quick Start @@ -28,7 +28,7 @@ useBR: false }); -This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP1Raspberry Pi Quick Start
Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP1Raspberry Pi Quick Start
Publication Date: July 27, 2023This guide contains an overview of SUSE Linux Enterprise Server for Arm on the Raspberry Pi* platform and will guide you through the setup procedure. diff --git a/SLE15SP1/single-html/SLES-rpi-quick/index.html b/SLE15SP1/single-html/SLES-rpi-quick/index.html index 2dbb81aaa46..13dc79c629d 100644 --- a/SLE15SP1/single-html/SLES-rpi-quick/index.html +++ b/SLE15SP1/single-html/SLES-rpi-quick/index.html @@ -1,5 +1,5 @@ -en
SUSE Linux Enterprise Server for Arm 15 SP1 | Raspberry Pi Quick Start +SUSE Linux Enterprise Server for Arm 15 SP1 | Raspberry Pi Quick Start @@ -28,7 +28,7 @@ useBR: false }); -This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP1Raspberry Pi Quick Start
Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP1Raspberry Pi Quick Start
Publication Date: July 27, 2023This guide contains an overview of SUSE Linux Enterprise Server for Arm on the Raspberry Pi* platform and will guide you through the setup procedure. diff --git a/SLE15SP1/single-html/SLES-security/book-security_draft.html b/SLE15SP1/single-html/SLES-security/book-security_draft.html index 14c041734f0..7d363394b94 100644 --- a/SLE15SP1/single-html/SLES-security/book-security_draft.html +++ b/SLE15SP1/single-html/SLES-security/book-security_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Security and Hardening Guide +SLES 15 SP1 | Security and Hardening Guide @@ -41,9 +41,9 @@ events. Supports the administrator with security-related choices and decisions in installing and setting up a secure SUSE Linux Enterprise Server and additional processes to further secure and harden that installation.Publication Date: - July 12, 2023 + July 27, 2023 -- About This Guide
- 1 Security and Confidentiality
- I Authentication
- II Local Security
- 9 Physical Security
- 10 Automatic Security Checks with seccheck
- 11 Software Management
- 12 File Management
- 13 Encrypting Partitions and Files
- 14 User Management
- 14.1 Various Account Checks
- 14.2 Enabling Password Aging
- 14.3 Stronger Password Enforcement
- 14.4 Password and Login Management with PAM
- 14.5 Restricting
root
Logins - 14.6 Setting an Inactivity Timeout for Interactive Shell Sessions
- 14.7 Preventing Accidental Denial of Service
- 14.8 Displaying Login Banners
- 14.9 Connection Accounting Utilities
- 15 Spectre/Meltdown Checker
- 16 Configuring Security Settings with YaST
- 17 The Polkit authentication framework
- 18 Access Control Lists in Linux
- 19 Intrusion Detection with AIDE
- III Network Security
- 20 X Window System and X Authentication
- 21 Securing network operations with OpenSSH
- 21.1 OpenSSH overview
- 21.2 Server hardening
- 21.3 Password authentication
- 21.4 Managing user and host encryption keys
- 21.5 Rotating host keys
- 21.6 Public key authentication
- 21.7 Passphrase-less public key authentication
- 21.8 OpenSSH certificate authentication
- 21.9 Automated public key logins with gnome-keyring
- 21.10 Automated public key logins in the console with ssh-agent
- 21.11 Changing an SSH private key passphrase
- 21.12 Retrieving a key fingerprint
- 21.13 Starting X11 applications on a remote host
- 21.14 Agent forwarding
- 21.15
scp
—secure copy - 21.16
sftp
—secure file transfer - 21.17 Port forwarding (SSH tunneling)
- 21.18 More information
- 22 Masquerading and Firewalls
- 23 Configuring a VPN Server
- IV Regulations and Compliance
- V Confining Privileges with AppArmor
- 28 Introducing AppArmor
- 29 Getting Started
- 30 Immunizing Programs
- 31 Profile Components and Syntax
- 31.1 Breaking an AppArmor Profile into Its Parts
- 31.2 Profile Types
- 31.3 Include Statements
- 31.4 Capability Entries (POSIX.1e)
- 31.5 Network Access Control
- 31.6 Profile Names, Flags, Paths, and Globbing
- 31.7 File Permission Access Modes
- 31.8 Mount Rules
- 31.9 Pivot Root Rules
- 31.10 PTrace Rules
- 31.11 Signal Rules
- 31.12 Execute Modes
- 31.13 Resource Limit Control
- 31.14 Auditing Rules
- 32 AppArmor Profile Repositories
- 33 Building and Managing Profiles with YaST
- 34 Building Profiles from the Command Line
- 35 Profiling Your Web Applications Using ChangeHat
- 36 Confining Users with
pam_apparmor
- 37 Managing Profiled Applications
- 38 Support
- 39 AppArmor Glossary
- VI SELinux
- VII The Linux Audit Framework
- 41 Understanding Linux Audit
- 41.1 Introducing the Components of Linux Audit
- 41.2 Configuring the Audit Daemon
- 41.3 Controlling the Audit System Using
auditctl
- 41.4 Passing Parameters to the Audit System
- 41.5 Understanding the Audit Logs and Generating Reports
- 41.6 Querying the Audit Daemon Logs with
ausearch
- 41.7 Analyzing Processes with
autrace
- 41.8 Visualizing Audit Data
- 41.9 Relaying Audit Event Notifications
- 42 Setting Up the Linux Audit Framework
- 43 Introducing an Audit Rule Set
- 43.1 Adding Basic Audit Configuration Parameters
- 43.2 Adding Watches on Audit Log Files and Configuration Files
- 43.3 Monitoring File System Objects
- 43.4 Monitoring Security Configuration Files and Databases
- 43.5 Monitoring Miscellaneous System Calls
- 43.6 Filtering System Call Arguments
- 43.7 Managing Audit Event Records Using Keys
- 44 Useful Resources
- 41 Understanding Linux Audit
- A GNU licenses
List of Figures- 3.1 NIS Server Setup
- 3.2 Master Server Setup
- 3.3 Changing the Directory and Synchronizing Files for a NIS Server
- 3.4 NIS Server Maps Setup
- 3.5 Setting Request Permissions for a NIS Server
- 3.6 Setting Domain and Address of a NIS Server
- 6.1 Kerberos Network Topology
- 6.2 Window
- 7.1 Schema of Winbind-based Active Directory Authentication
- 7.2 Main Window of
- 7.3 Enrolling into a Domain
- 7.4 Configuration Window of
- 7.5 Determining Windows Domain Membership
- 7.6 Providing Administrator Credentials
- 15.1 Output From spectre-meltdown-checker
- 16.1 YaST Security Center and Hardening: Security Overview
- 18.1 Minimum ACL: ACL Entries Compared to Permission Bits
- 18.2 Extended ACL: ACL Entries Compared to Permission Bits
- 22.1 iptables: A Packet's Possible Paths
- 23.1 Routed VPN
- 23.2 Bridged VPN - Scenario 1
- 23.3 Bridged VPN - Scenario 2
- 23.4 Bridged VPN - Scenario 3
- 34.1
aa-notify Message in GNOME
- 35.1 Adminer Login Page
- 41.1 Introducing the Components of Linux Audit
- 41.2 Flow Graph—Program versus System Call Relationship
- 41.3 Bar Chart—Common Event Types
List of TablesList of Examples- 2.1 PAM Configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default Configuration for the
auth
Section (common-auth
) - 2.3 Default Configuration for the
account
Section (common-account
) - 2.4 Default Configuration for the
password
Section (common-password
) - 2.5 Default Configuration for the
session
Section (common-session
) - 2.6 pam_env.conf
- 6.1 Example KDC Configuration,
/etc/krb5.conf
- 21.1 Example sshd.conf
- 22.1 Callback Port Configuration for the
nfs
Kernel Module in/etc/modprobe.d/60-nfs.conf
- 22.2 Commands to Define a new
firewalld
RPC Service for NFS - 23.1 VPN Server Configuration File
- 23.2 VPN Client Configuration File
- 29.1 Output of
aa-unconfined
- 34.1 Learning Mode Exception: Controlling Access to Specific Resources
- 34.2 Learning Mode Exception: Defining Permissions for an Entry
- 40.1 Security context settings using
ls -Z
- 40.2 Verifying that SELinux is functional
- 40.3 Getting a list of booleans and verifying policy access
- 40.4 Getting file context information
- 40.5 The default context for directories in the root directory
- 40.6 Showing SELinux settings for processes with
ps Zaux
- 40.7 Viewing default file contexts
- 40.8 Example lines from
/etc/audit/audit.log
- 40.9 Analyzing audit messages
- 40.10 Viewing which lines deny access
- 40.11 Creating a policy module allowing an action previously denied
- 41.1 Example output of
auditctl
-s
- 41.2 Example Audit Rules—Audit System Parameters
- 41.3 Example Audit Rules—File System Auditing
- 41.4 Example Audit Rules—System Call Auditing
- 41.5 Deleting Audit Rules and Events
- 41.6 Listing Rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An Advanced Audit Event—Login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
+
- About This Guide
- 1 Security and Confidentiality
- I Authentication
- II Local Security
- 9 Physical Security
- 10 Automatic Security Checks with seccheck
- 11 Software Management
- 12 File Management
- 13 Encrypting Partitions and Files
- 14 User Management
- 14.1 Various Account Checks
- 14.2 Enabling Password Aging
- 14.3 Stronger Password Enforcement
- 14.4 Password and Login Management with PAM
- 14.5 Restricting
root
Logins - 14.6 Setting an Inactivity Timeout for Interactive Shell Sessions
- 14.7 Preventing Accidental Denial of Service
- 14.8 Displaying Login Banners
- 14.9 Connection Accounting Utilities
- 15 Spectre/Meltdown Checker
- 16 Configuring Security Settings with YaST
- 17 The Polkit authentication framework
- 18 Access Control Lists in Linux
- 19 Intrusion Detection with AIDE
- III Network Security
- 20 X Window System and X Authentication
- 21 Securing network operations with OpenSSH
- 21.1 OpenSSH overview
- 21.2 Server hardening
- 21.3 Password authentication
- 21.4 Managing user and host encryption keys
- 21.5 Rotating host keys
- 21.6 Public key authentication
- 21.7 Passphrase-less public key authentication
- 21.8 OpenSSH certificate authentication
- 21.9 Automated public key logins with gnome-keyring
- 21.10 Automated public key logins in the console with ssh-agent
- 21.11 Changing an SSH private key passphrase
- 21.12 Retrieving a key fingerprint
- 21.13 Starting X11 applications on a remote host
- 21.14 Agent forwarding
- 21.15
scp
—secure copy - 21.16
sftp
—secure file transfer - 21.17 Port forwarding (SSH tunneling)
- 21.18 More information
- 22 Masquerading and Firewalls
- 23 Configuring a VPN Server
- IV Regulations and Compliance
- V Confining Privileges with AppArmor
- 28 Introducing AppArmor
- 29 Getting Started
- 30 Immunizing Programs
- 31 Profile Components and Syntax
- 31.1 Breaking an AppArmor Profile into Its Parts
- 31.2 Profile Types
- 31.3 Include Statements
- 31.4 Capability Entries (POSIX.1e)
- 31.5 Network Access Control
- 31.6 Profile Names, Flags, Paths, and Globbing
- 31.7 File Permission Access Modes
- 31.8 Mount Rules
- 31.9 Pivot Root Rules
- 31.10 PTrace Rules
- 31.11 Signal Rules
- 31.12 Execute Modes
- 31.13 Resource Limit Control
- 31.14 Auditing Rules
- 32 AppArmor Profile Repositories
- 33 Building and Managing Profiles with YaST
- 34 Building Profiles from the Command Line
- 35 Profiling Your Web Applications Using ChangeHat
- 36 Confining Users with
pam_apparmor
- 37 Managing Profiled Applications
- 38 Support
- 39 AppArmor Glossary
- VI SELinux
- VII The Linux Audit Framework
- 41 Understanding Linux Audit
- 41.1 Introducing the Components of Linux Audit
- 41.2 Configuring the Audit Daemon
- 41.3 Controlling the Audit System Using
auditctl
- 41.4 Passing Parameters to the Audit System
- 41.5 Understanding the Audit Logs and Generating Reports
- 41.6 Querying the Audit Daemon Logs with
ausearch
- 41.7 Analyzing Processes with
autrace
- 41.8 Visualizing Audit Data
- 41.9 Relaying Audit Event Notifications
- 42 Setting Up the Linux Audit Framework
- 43 Introducing an Audit Rule Set
- 43.1 Adding Basic Audit Configuration Parameters
- 43.2 Adding Watches on Audit Log Files and Configuration Files
- 43.3 Monitoring File System Objects
- 43.4 Monitoring Security Configuration Files and Databases
- 43.5 Monitoring Miscellaneous System Calls
- 43.6 Filtering System Call Arguments
- 43.7 Managing Audit Event Records Using Keys
- 44 Useful Resources
- 41 Understanding Linux Audit
- A GNU licenses
List of Figures- 3.1 NIS Server Setup
- 3.2 Master Server Setup
- 3.3 Changing the Directory and Synchronizing Files for a NIS Server
- 3.4 NIS Server Maps Setup
- 3.5 Setting Request Permissions for a NIS Server
- 3.6 Setting Domain and Address of a NIS Server
- 6.1 Kerberos Network Topology
- 6.2 Window
- 7.1 Schema of Winbind-based Active Directory Authentication
- 7.2 Main Window of
- 7.3 Enrolling into a Domain
- 7.4 Configuration Window of
- 7.5 Determining Windows Domain Membership
- 7.6 Providing Administrator Credentials
- 15.1 Output From spectre-meltdown-checker
- 16.1 YaST Security Center and Hardening: Security Overview
- 18.1 Minimum ACL: ACL Entries Compared to Permission Bits
- 18.2 Extended ACL: ACL Entries Compared to Permission Bits
- 22.1 iptables: A Packet's Possible Paths
- 23.1 Routed VPN
- 23.2 Bridged VPN - Scenario 1
- 23.3 Bridged VPN - Scenario 2
- 23.4 Bridged VPN - Scenario 3
- 34.1
aa-notify Message in GNOME
- 35.1 Adminer Login Page
- 41.1 Introducing the Components of Linux Audit
- 41.2 Flow Graph—Program versus System Call Relationship
- 41.3 Bar Chart—Common Event Types
List of TablesList of Examples- 2.1 PAM Configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default Configuration for the
auth
Section (common-auth
) - 2.3 Default Configuration for the
account
Section (common-account
) - 2.4 Default Configuration for the
password
Section (common-password
) - 2.5 Default Configuration for the
session
Section (common-session
) - 2.6 pam_env.conf
- 6.1 Example KDC Configuration,
/etc/krb5.conf
- 21.1 Example sshd.conf
- 22.1 Callback Port Configuration for the
nfs
Kernel Module in/etc/modprobe.d/60-nfs.conf
- 22.2 Commands to Define a new
firewalld
RPC Service for NFS - 23.1 VPN Server Configuration File
- 23.2 VPN Client Configuration File
- 29.1 Output of
aa-unconfined
- 34.1 Learning Mode Exception: Controlling Access to Specific Resources
- 34.2 Learning Mode Exception: Defining Permissions for an Entry
- 40.1 Security context settings using
ls -Z
- 40.2 Verifying that SELinux is functional
- 40.3 Getting a list of booleans and verifying policy access
- 40.4 Getting file context information
- 40.5 The default context for directories in the root directory
- 40.6 Showing SELinux settings for processes with
ps Zaux
- 40.7 Viewing default file contexts
- 40.8 Example lines from
/var/log/audit/audit.log
- 40.9 Analyzing audit messages
- 40.10 Viewing which lines deny access
- 40.11 Creating a policy module allowing an action previously denied
- 41.1 Example output of
auditctl
-s
- 41.2 Example Audit Rules—Audit System Parameters
- 41.3 Example Audit Rules—File System Auditing
- 41.4 Example Audit Rules—System Call Auditing
- 41.5 Deleting Audit Rules and Events
- 41.6 Listing Rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An Advanced Audit Event—Login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
Copyright © 2006–2023 SUSE LLC and contributors. All rights reserved. @@ -13928,11 +13928,9 @@
>
sudo
systemctl start auditd
and enable it in the targets of your system, using
>
sudo
systemctl enable auditd
- In - Example 40.8: “Example lines from
/etc/audit/audit.log
” - you can see a partial example of the contents of -/var/log/audit/audit.log
-Example 40.8: Example lines from/etc/audit/audit.log
#type=DAEMON_START msg=audit(1348173810.874:6248): auditd start, ver=1.7.7 format=raw kernel=3.0.13-0.27-default auid=0 pid=4235 subj=system_u:system_r:auditd_t res=success + You can see a partial example of the contents of +
/var/log/audit/audit.log
below: +Example 40.8: Example lines from/var/log/audit/audit.log
#type=DAEMON_START msg=audit(1348173810.874:6248): auditd start, ver=1.7.7 format=raw kernel=3.0.13-0.27-default auid=0 pid=4235 subj=system_u:system_r:auditd_t res=success type=AVC msg=audit(1348173901.081:292): avc: denied { write } for pid=3426 comm="smartd" name="smartmontools" dev=sda6 ino=581743 scontext=system_u:system_r:fsdaemon_t tcontext=system_u:object_r:var_lib_t tclass=dir type=AVC msg=audit(1348173901.081:293): avc: denied { remove_name } for pid=3426 comm="smartd" name="smartd.WDC_WD2500BEKT_75PVMT0-WD_WXC1A21E0454.ata.state~" dev=sda6 ino=582390 scontext=system_u:system_r:fsdaemon_t tcontext=system_u:object_r:var_lib_t tclass=dir type=AVC msg=audit(1348173901.081:294): avc: denied { unlink } for pid=3426 comm="smartd" name="smartd.WDC_WD2500BEKT_75PVMT0-WD_WXC1A21E0454.ata.state~" dev=sda6 ino=582390 scontext=system_u:system_r:fsdaemon_t tcontext=system_u:object_r:var_lib_t tclass=file diff --git a/SLE15SP1/single-html/SLES-security/index.html b/SLE15SP1/single-html/SLES-security/index.html index 14c041734f0..7d363394b94 100644 --- a/SLE15SP1/single-html/SLES-security/index.html +++ b/SLE15SP1/single-html/SLES-security/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Security and Hardening Guide +SLES 15 SP1 | Security and Hardening Guide @@ -41,9 +41,9 @@ events. Supports the administrator with security-related choices and decisions in installing and setting up a secure SUSE Linux Enterprise Server and additional processes to further secure and harden that installation.Publication Date: - July 12, 2023 + July 27, 2023 -- About This Guide
- 1 Security and Confidentiality
- I Authentication
- II Local Security
- 9 Physical Security
- 10 Automatic Security Checks with seccheck
- 11 Software Management
- 12 File Management
- 13 Encrypting Partitions and Files
- 14 User Management
- 14.1 Various Account Checks
- 14.2 Enabling Password Aging
- 14.3 Stronger Password Enforcement
- 14.4 Password and Login Management with PAM
- 14.5 Restricting
root
Logins - 14.6 Setting an Inactivity Timeout for Interactive Shell Sessions
- 14.7 Preventing Accidental Denial of Service
- 14.8 Displaying Login Banners
- 14.9 Connection Accounting Utilities
- 15 Spectre/Meltdown Checker
- 16 Configuring Security Settings with YaST
- 17 The Polkit authentication framework
- 18 Access Control Lists in Linux
- 19 Intrusion Detection with AIDE
- III Network Security
- 20 X Window System and X Authentication
- 21 Securing network operations with OpenSSH
- 21.1 OpenSSH overview
- 21.2 Server hardening
- 21.3 Password authentication
- 21.4 Managing user and host encryption keys
- 21.5 Rotating host keys
- 21.6 Public key authentication
- 21.7 Passphrase-less public key authentication
- 21.8 OpenSSH certificate authentication
- 21.9 Automated public key logins with gnome-keyring
- 21.10 Automated public key logins in the console with ssh-agent
- 21.11 Changing an SSH private key passphrase
- 21.12 Retrieving a key fingerprint
- 21.13 Starting X11 applications on a remote host
- 21.14 Agent forwarding
- 21.15
scp
—secure copy - 21.16
sftp
—secure file transfer - 21.17 Port forwarding (SSH tunneling)
- 21.18 More information
- 22 Masquerading and Firewalls
- 23 Configuring a VPN Server
- IV Regulations and Compliance
- V Confining Privileges with AppArmor
- 28 Introducing AppArmor
- 29 Getting Started
- 30 Immunizing Programs
- 31 Profile Components and Syntax
- 31.1 Breaking an AppArmor Profile into Its Parts
- 31.2 Profile Types
- 31.3 Include Statements
- 31.4 Capability Entries (POSIX.1e)
- 31.5 Network Access Control
- 31.6 Profile Names, Flags, Paths, and Globbing
- 31.7 File Permission Access Modes
- 31.8 Mount Rules
- 31.9 Pivot Root Rules
- 31.10 PTrace Rules
- 31.11 Signal Rules
- 31.12 Execute Modes
- 31.13 Resource Limit Control
- 31.14 Auditing Rules
- 32 AppArmor Profile Repositories
- 33 Building and Managing Profiles with YaST
- 34 Building Profiles from the Command Line
- 35 Profiling Your Web Applications Using ChangeHat
- 36 Confining Users with
pam_apparmor
- 37 Managing Profiled Applications
- 38 Support
- 39 AppArmor Glossary
- VI SELinux
- VII The Linux Audit Framework
- 41 Understanding Linux Audit
- 41.1 Introducing the Components of Linux Audit
- 41.2 Configuring the Audit Daemon
- 41.3 Controlling the Audit System Using
auditctl
- 41.4 Passing Parameters to the Audit System
- 41.5 Understanding the Audit Logs and Generating Reports
- 41.6 Querying the Audit Daemon Logs with
ausearch
- 41.7 Analyzing Processes with
autrace
- 41.8 Visualizing Audit Data
- 41.9 Relaying Audit Event Notifications
- 42 Setting Up the Linux Audit Framework
- 43 Introducing an Audit Rule Set
- 43.1 Adding Basic Audit Configuration Parameters
- 43.2 Adding Watches on Audit Log Files and Configuration Files
- 43.3 Monitoring File System Objects
- 43.4 Monitoring Security Configuration Files and Databases
- 43.5 Monitoring Miscellaneous System Calls
- 43.6 Filtering System Call Arguments
- 43.7 Managing Audit Event Records Using Keys
- 44 Useful Resources
- 41 Understanding Linux Audit
- A GNU licenses
List of Figures- 3.1 NIS Server Setup
- 3.2 Master Server Setup
- 3.3 Changing the Directory and Synchronizing Files for a NIS Server
- 3.4 NIS Server Maps Setup
- 3.5 Setting Request Permissions for a NIS Server
- 3.6 Setting Domain and Address of a NIS Server
- 6.1 Kerberos Network Topology
- 6.2 Window
- 7.1 Schema of Winbind-based Active Directory Authentication
- 7.2 Main Window of
- 7.3 Enrolling into a Domain
- 7.4 Configuration Window of
- 7.5 Determining Windows Domain Membership
- 7.6 Providing Administrator Credentials
- 15.1 Output From spectre-meltdown-checker
- 16.1 YaST Security Center and Hardening: Security Overview
- 18.1 Minimum ACL: ACL Entries Compared to Permission Bits
- 18.2 Extended ACL: ACL Entries Compared to Permission Bits
- 22.1 iptables: A Packet's Possible Paths
- 23.1 Routed VPN
- 23.2 Bridged VPN - Scenario 1
- 23.3 Bridged VPN - Scenario 2
- 23.4 Bridged VPN - Scenario 3
- 34.1
aa-notify Message in GNOME
- 35.1 Adminer Login Page
- 41.1 Introducing the Components of Linux Audit
- 41.2 Flow Graph—Program versus System Call Relationship
- 41.3 Bar Chart—Common Event Types
List of TablesList of Examples- 2.1 PAM Configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default Configuration for the
auth
Section (common-auth
) - 2.3 Default Configuration for the
account
Section (common-account
) - 2.4 Default Configuration for the
password
Section (common-password
) - 2.5 Default Configuration for the
session
Section (common-session
) - 2.6 pam_env.conf
- 6.1 Example KDC Configuration,
/etc/krb5.conf
- 21.1 Example sshd.conf
- 22.1 Callback Port Configuration for the
nfs
Kernel Module in/etc/modprobe.d/60-nfs.conf
- 22.2 Commands to Define a new
firewalld
RPC Service for NFS - 23.1 VPN Server Configuration File
- 23.2 VPN Client Configuration File
- 29.1 Output of
aa-unconfined
- 34.1 Learning Mode Exception: Controlling Access to Specific Resources
- 34.2 Learning Mode Exception: Defining Permissions for an Entry
- 40.1 Security context settings using
ls -Z
- 40.2 Verifying that SELinux is functional
- 40.3 Getting a list of booleans and verifying policy access
- 40.4 Getting file context information
- 40.5 The default context for directories in the root directory
- 40.6 Showing SELinux settings for processes with
ps Zaux
- 40.7 Viewing default file contexts
- 40.8 Example lines from
/etc/audit/audit.log
- 40.9 Analyzing audit messages
- 40.10 Viewing which lines deny access
- 40.11 Creating a policy module allowing an action previously denied
- 41.1 Example output of
auditctl
-s
- 41.2 Example Audit Rules—Audit System Parameters
- 41.3 Example Audit Rules—File System Auditing
- 41.4 Example Audit Rules—System Call Auditing
- 41.5 Deleting Audit Rules and Events
- 41.6 Listing Rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An Advanced Audit Event—Login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
+
- About This Guide
- 1 Security and Confidentiality
- I Authentication
- II Local Security
- 9 Physical Security
- 10 Automatic Security Checks with seccheck
- 11 Software Management
- 12 File Management
- 13 Encrypting Partitions and Files
- 14 User Management
- 14.1 Various Account Checks
- 14.2 Enabling Password Aging
- 14.3 Stronger Password Enforcement
- 14.4 Password and Login Management with PAM
- 14.5 Restricting
root
Logins - 14.6 Setting an Inactivity Timeout for Interactive Shell Sessions
- 14.7 Preventing Accidental Denial of Service
- 14.8 Displaying Login Banners
- 14.9 Connection Accounting Utilities
- 15 Spectre/Meltdown Checker
- 16 Configuring Security Settings with YaST
- 17 The Polkit authentication framework
- 18 Access Control Lists in Linux
- 19 Intrusion Detection with AIDE
- III Network Security
- 20 X Window System and X Authentication
- 21 Securing network operations with OpenSSH
- 21.1 OpenSSH overview
- 21.2 Server hardening
- 21.3 Password authentication
- 21.4 Managing user and host encryption keys
- 21.5 Rotating host keys
- 21.6 Public key authentication
- 21.7 Passphrase-less public key authentication
- 21.8 OpenSSH certificate authentication
- 21.9 Automated public key logins with gnome-keyring
- 21.10 Automated public key logins in the console with ssh-agent
- 21.11 Changing an SSH private key passphrase
- 21.12 Retrieving a key fingerprint
- 21.13 Starting X11 applications on a remote host
- 21.14 Agent forwarding
- 21.15
scp
—secure copy - 21.16
sftp
—secure file transfer - 21.17 Port forwarding (SSH tunneling)
- 21.18 More information
- 22 Masquerading and Firewalls
- 23 Configuring a VPN Server
- IV Regulations and Compliance
- V Confining Privileges with AppArmor
- 28 Introducing AppArmor
- 29 Getting Started
- 30 Immunizing Programs
- 31 Profile Components and Syntax
- 31.1 Breaking an AppArmor Profile into Its Parts
- 31.2 Profile Types
- 31.3 Include Statements
- 31.4 Capability Entries (POSIX.1e)
- 31.5 Network Access Control
- 31.6 Profile Names, Flags, Paths, and Globbing
- 31.7 File Permission Access Modes
- 31.8 Mount Rules
- 31.9 Pivot Root Rules
- 31.10 PTrace Rules
- 31.11 Signal Rules
- 31.12 Execute Modes
- 31.13 Resource Limit Control
- 31.14 Auditing Rules
- 32 AppArmor Profile Repositories
- 33 Building and Managing Profiles with YaST
- 34 Building Profiles from the Command Line
- 35 Profiling Your Web Applications Using ChangeHat
- 36 Confining Users with
pam_apparmor
- 37 Managing Profiled Applications
- 38 Support
- 39 AppArmor Glossary
- VI SELinux
- VII The Linux Audit Framework
- 41 Understanding Linux Audit
- 41.1 Introducing the Components of Linux Audit
- 41.2 Configuring the Audit Daemon
- 41.3 Controlling the Audit System Using
auditctl
- 41.4 Passing Parameters to the Audit System
- 41.5 Understanding the Audit Logs and Generating Reports
- 41.6 Querying the Audit Daemon Logs with
ausearch
- 41.7 Analyzing Processes with
autrace
- 41.8 Visualizing Audit Data
- 41.9 Relaying Audit Event Notifications
- 42 Setting Up the Linux Audit Framework
- 43 Introducing an Audit Rule Set
- 43.1 Adding Basic Audit Configuration Parameters
- 43.2 Adding Watches on Audit Log Files and Configuration Files
- 43.3 Monitoring File System Objects
- 43.4 Monitoring Security Configuration Files and Databases
- 43.5 Monitoring Miscellaneous System Calls
- 43.6 Filtering System Call Arguments
- 43.7 Managing Audit Event Records Using Keys
- 44 Useful Resources
- 41 Understanding Linux Audit
- A GNU licenses
List of Figures- 3.1 NIS Server Setup
- 3.2 Master Server Setup
- 3.3 Changing the Directory and Synchronizing Files for a NIS Server
- 3.4 NIS Server Maps Setup
- 3.5 Setting Request Permissions for a NIS Server
- 3.6 Setting Domain and Address of a NIS Server
- 6.1 Kerberos Network Topology
- 6.2 Window
- 7.1 Schema of Winbind-based Active Directory Authentication
- 7.2 Main Window of
- 7.3 Enrolling into a Domain
- 7.4 Configuration Window of
- 7.5 Determining Windows Domain Membership
- 7.6 Providing Administrator Credentials
- 15.1 Output From spectre-meltdown-checker
- 16.1 YaST Security Center and Hardening: Security Overview
- 18.1 Minimum ACL: ACL Entries Compared to Permission Bits
- 18.2 Extended ACL: ACL Entries Compared to Permission Bits
- 22.1 iptables: A Packet's Possible Paths
- 23.1 Routed VPN
- 23.2 Bridged VPN - Scenario 1
- 23.3 Bridged VPN - Scenario 2
- 23.4 Bridged VPN - Scenario 3
- 34.1
aa-notify Message in GNOME
- 35.1 Adminer Login Page
- 41.1 Introducing the Components of Linux Audit
- 41.2 Flow Graph—Program versus System Call Relationship
- 41.3 Bar Chart—Common Event Types
List of TablesList of Examples- 2.1 PAM Configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default Configuration for the
auth
Section (common-auth
) - 2.3 Default Configuration for the
account
Section (common-account
) - 2.4 Default Configuration for the
password
Section (common-password
) - 2.5 Default Configuration for the
session
Section (common-session
) - 2.6 pam_env.conf
- 6.1 Example KDC Configuration,
/etc/krb5.conf
- 21.1 Example sshd.conf
- 22.1 Callback Port Configuration for the
nfs
Kernel Module in/etc/modprobe.d/60-nfs.conf
- 22.2 Commands to Define a new
firewalld
RPC Service for NFS - 23.1 VPN Server Configuration File
- 23.2 VPN Client Configuration File
- 29.1 Output of
aa-unconfined
- 34.1 Learning Mode Exception: Controlling Access to Specific Resources
- 34.2 Learning Mode Exception: Defining Permissions for an Entry
- 40.1 Security context settings using
ls -Z
- 40.2 Verifying that SELinux is functional
- 40.3 Getting a list of booleans and verifying policy access
- 40.4 Getting file context information
- 40.5 The default context for directories in the root directory
- 40.6 Showing SELinux settings for processes with
ps Zaux
- 40.7 Viewing default file contexts
- 40.8 Example lines from
/var/log/audit/audit.log
- 40.9 Analyzing audit messages
- 40.10 Viewing which lines deny access
- 40.11 Creating a policy module allowing an action previously denied
- 41.1 Example output of
auditctl
-s
- 41.2 Example Audit Rules—Audit System Parameters
- 41.3 Example Audit Rules—File System Auditing
- 41.4 Example Audit Rules—System Call Auditing
- 41.5 Deleting Audit Rules and Events
- 41.6 Listing Rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An Advanced Audit Event—Login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
Copyright © 2006–2023 SUSE LLC and contributors. All rights reserved. @@ -13928,11 +13928,9 @@
>
sudo
systemctl start auditd
and enable it in the targets of your system, using
>
sudo
systemctl enable auditd
- In - Example 40.8: “Example lines from
/etc/audit/audit.log
” - you can see a partial example of the contents of -/var/log/audit/audit.log
-Example 40.8: Example lines from/etc/audit/audit.log
#type=DAEMON_START msg=audit(1348173810.874:6248): auditd start, ver=1.7.7 format=raw kernel=3.0.13-0.27-default auid=0 pid=4235 subj=system_u:system_r:auditd_t res=success + You can see a partial example of the contents of +
/var/log/audit/audit.log
below: +Example 40.8: Example lines from/var/log/audit/audit.log
#type=DAEMON_START msg=audit(1348173810.874:6248): auditd start, ver=1.7.7 format=raw kernel=3.0.13-0.27-default auid=0 pid=4235 subj=system_u:system_r:auditd_t res=success type=AVC msg=audit(1348173901.081:292): avc: denied { write } for pid=3426 comm="smartd" name="smartmontools" dev=sda6 ino=581743 scontext=system_u:system_r:fsdaemon_t tcontext=system_u:object_r:var_lib_t tclass=dir type=AVC msg=audit(1348173901.081:293): avc: denied { remove_name } for pid=3426 comm="smartd" name="smartd.WDC_WD2500BEKT_75PVMT0-WD_WXC1A21E0454.ata.state~" dev=sda6 ino=582390 scontext=system_u:system_r:fsdaemon_t tcontext=system_u:object_r:var_lib_t tclass=dir type=AVC msg=audit(1348173901.081:294): avc: denied { unlink } for pid=3426 comm="smartd" name="smartd.WDC_WD2500BEKT_75PVMT0-WD_WXC1A21E0454.ata.state~" dev=sda6 ino=582390 scontext=system_u:system_r:fsdaemon_t tcontext=system_u:object_r:var_lib_t tclass=file diff --git a/SLE15SP1/single-html/SLES-storage/book-storage_draft.html b/SLE15SP1/single-html/SLES-storage/book-storage_draft.html index 13a43931f8b..9c10e1fd14f 100644 --- a/SLE15SP1/single-html/SLES-storage/book-storage_draft.html +++ b/SLE15SP1/single-html/SLES-storage/book-storage_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Storage Administration Guide +SLES 15 SP1 | Storage Administration Guide @@ -38,7 +38,7 @@ Provides information about how to manage storage devices on a SUSE Linux Enterprise Server.Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I File Systems and Mounting
- II Logical Volumes (LVM)
- 5 LVM Configuration
- 5.1 Understanding the Logical Volume Manager
- 5.2 Creating Volume Groups
- 5.3 Creating Logical Volumes
- 5.4 Automatically Activating Non-Root LVM Volume Groups
- 5.5 Resizing an Existing Volume Group
- 5.6 Resizing a Logical Volume
- 5.7 Deleting a Volume Group or a Logical Volume
- 5.8 Using LVM Commands
- 5.9 Tagging LVM2 Storage Objects
- 6 LVM Volume Snapshots
- 5 LVM Configuration
- III Software RAID
- 7 Software RAID Configuration
- 8 Configuring Software RAID for the Root Partition
- 8.1 Prerequisites for Using a Software RAID Device for the Root Partition
- 8.2
diff --git a/SLE15SP1/single-html/SLES-storage/index.html b/SLE15SP1/single-html/SLES-storage/index.html
index 13a43931f8b..9c10e1fd14f 100644
--- a/SLE15SP1/single-html/SLES-storage/index.html
+++ b/SLE15SP1/single-html/SLES-storage/index.html
@@ -1,5 +1,5 @@
-en
SLES 15 SP1 | Storage Administration Guide +SLES 15 SP1 | Storage Administration Guide @@ -38,7 +38,7 @@ Provides information about how to manage storage devices on a SUSE Linux Enterprise Server.
Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I File Systems and Mounting
- II Logical Volumes (LVM)
- 5 LVM Configuration
- 5.1 Understanding the Logical Volume Manager
- 5.2 Creating Volume Groups
- 5.3 Creating Logical Volumes
- 5.4 Automatically Activating Non-Root LVM Volume Groups
- 5.5 Resizing an Existing Volume Group
- 5.6 Resizing a Logical Volume
- 5.7 Deleting a Volume Group or a Logical Volume
- 5.8 Using LVM Commands
- 5.9 Tagging LVM2 Storage Objects
- 6 LVM Volume Snapshots
- 5 LVM Configuration
- III Software RAID
- 7 Software RAID Configuration
- 8 Configuring Software RAID for the Root Partition
- 8.1 Prerequisites for Using a Software RAID Device for the Root Partition
- 8.2
diff --git a/SLE15SP1/single-html/SLES-tuning/book-sle-tuning_draft.html b/SLE15SP1/single-html/SLES-tuning/book-sle-tuning_draft.html
index 6a2d7ade0e7..a9a2d41ef06 100644
--- a/SLE15SP1/single-html/SLES-tuning/book-sle-tuning_draft.html
+++ b/SLE15SP1/single-html/SLES-tuning/book-sle-tuning_draft.html
@@ -1,5 +1,5 @@
-en
SLES 15 SP1 | System Analysis and Tuning Guide +SLES 15 SP1 | System Analysis and Tuning Guide @@ -39,7 +39,7 @@ by means of monitoring tools and how to efficiently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources.
Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Basics
- II System Monitoring
- III Kernel Monitoring
- IV Resource Management
- V Kernel Tuning
- VI Handling System Dumps
- VII Synchronized Clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
Output on a Lightly Used Machine - 2.2
vmstat
Output on a Heavily Used Machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap Script
- 4.2 Probe with Timer Event
- 4.3
printf
Function with Format Specifiers - 4.4 Using Global Variables
- 4.5 Monitoring Incoming TCP Connections with
tcp_connections.stp
- 11.1 Example Output of
cpupower frequency-info
- 11.2 Example Output of
cpupower idle-info
- 11.3 Example
cpupower monitor
Output - 12.1 Increasing individual thread throughput using
CFQ
- 17.1 Kdump: Example Configuration Using a Static IP Setup
- 19.1 Slave clock using software time stamping
- 19.2 Slave clock using hardware time stamping
- 19.3 Master clock using hardware time stamping
- 19.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-tuning/index.html b/SLE15SP1/single-html/SLES-tuning/index.html index 6a2d7ade0e7..a9a2d41ef06 100644 --- a/SLE15SP1/single-html/SLES-tuning/index.html +++ b/SLE15SP1/single-html/SLES-tuning/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | System Analysis and Tuning Guide +SLES 15 SP1 | System Analysis and Tuning Guide @@ -39,7 +39,7 @@ by means of monitoring tools and how to efficiently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources.Publication Date: - July 12, 2023 + July 27, 2023- About This Guide
- I Basics
- II System Monitoring
- III Kernel Monitoring
- IV Resource Management
- V Kernel Tuning
- VI Handling System Dumps
- VII Synchronized Clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
Output on a Lightly Used Machine - 2.2
vmstat
Output on a Heavily Used Machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap Script
- 4.2 Probe with Timer Event
- 4.3
printf
Function with Format Specifiers - 4.4 Using Global Variables
- 4.5 Monitoring Incoming TCP Connections with
tcp_connections.stp
- 11.1 Example Output of
cpupower frequency-info
- 11.2 Example Output of
cpupower idle-info
- 11.3 Example
cpupower monitor
Output - 12.1 Increasing individual thread throughput using
CFQ
- 17.1 Kdump: Example Configuration Using a Static IP Setup
- 19.1 Slave clock using software time stamping
- 19.2 Slave clock using hardware time stamping
- 19.3 Master clock using hardware time stamping
- 19.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-upgrade/book-sle-upgrade_draft.html b/SLE15SP1/single-html/SLES-upgrade/book-sle-upgrade_draft.html index 0c207967188..661840a611f 100644 --- a/SLE15SP1/single-html/SLES-upgrade/book-sle-upgrade_draft.html +++ b/SLE15SP1/single-html/SLES-upgrade/book-sle-upgrade_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Upgrade Guide +SLES 15 SP1 | Upgrade Guide @@ -38,7 +38,7 @@ This book guides you through upgrades and updates of SUSE Linux Enterprise Server. Different approaches are described, for example upgrading from an installation DVD, via network boot, or a running system. -Publication Date: July 12, 2023 +Publication Date: July 27, 2023- About This Guide
- 1 Upgrade Paths and Methods
- 2 Life Cycle and Support
- 3 Preparing the Upgrade
- 3.1 Make Sure the Current System Is Up-To-Date
- 3.2 Read the Release Notes
- 3.3 Make a Backup
- 3.4 Listing Installed Packages and Repositories
- 3.5 Disable the LTSS Extension
- 3.6 Upgrading from SUSE Linux Enterprise Server 11 SP4
- 3.7 Shut Down Virtual Machine Guests
- 3.8 Adjusting your SMT client setup
- 3.9 Disk Space
- 3.10 Changes in AutoYaST Profiles from SLE 12 to 15
- 3.11 Upgrading a Subscription Management Tool (SMT) Server
- 3.12 Temporarily Disabling Kernel Multiversion Support
- 3.13 Upgrading on IBM Z
- 3.14 IBM POWER: Starting an X Server
- 4 Upgrading Offline
- 5 Upgrading Online
- 5.1 Conceptual Overview
- 5.2 Service Pack Migration Workflow
- 5.3 Canceling Service Pack Migration
- 5.4 Upgrading with the Online Migration Tool (YaST)
- 5.5 Upgrading with Zypper
- 5.6 Upgrading with Plain Zypper
- 5.7 Rolling Back a Service Pack
- 5.8 Upgrading with SUSE Manager
- 5.9 Upgrading from openSUSE Leap to SUSE Linux Enterprise Server
- 6 Backports of Source Code
- A GNU licenses
List of FiguresList of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-upgrade/index.html b/SLE15SP1/single-html/SLES-upgrade/index.html index 0c207967188..661840a611f 100644 --- a/SLE15SP1/single-html/SLES-upgrade/index.html +++ b/SLE15SP1/single-html/SLES-upgrade/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Upgrade Guide +SLES 15 SP1 | Upgrade Guide @@ -38,7 +38,7 @@ This book guides you through upgrades and updates of SUSE Linux Enterprise Server. Different approaches are described, for example upgrading from an installation DVD, via network boot, or a running system. -Publication Date: July 12, 2023 +Publication Date: July 27, 2023- About This Guide
- 1 Upgrade Paths and Methods
- 2 Life Cycle and Support
- 3 Preparing the Upgrade
- 3.1 Make Sure the Current System Is Up-To-Date
- 3.2 Read the Release Notes
- 3.3 Make a Backup
- 3.4 Listing Installed Packages and Repositories
- 3.5 Disable the LTSS Extension
- 3.6 Upgrading from SUSE Linux Enterprise Server 11 SP4
- 3.7 Shut Down Virtual Machine Guests
- 3.8 Adjusting your SMT client setup
- 3.9 Disk Space
- 3.10 Changes in AutoYaST Profiles from SLE 12 to 15
- 3.11 Upgrading a Subscription Management Tool (SMT) Server
- 3.12 Temporarily Disabling Kernel Multiversion Support
- 3.13 Upgrading on IBM Z
- 3.14 IBM POWER: Starting an X Server
- 4 Upgrading Offline
- 5 Upgrading Online
- 5.1 Conceptual Overview
- 5.2 Service Pack Migration Workflow
- 5.3 Canceling Service Pack Migration
- 5.4 Upgrading with the Online Migration Tool (YaST)
- 5.5 Upgrading with Zypper
- 5.6 Upgrading with Plain Zypper
- 5.7 Rolling Back a Service Pack
- 5.8 Upgrading with SUSE Manager
- 5.9 Upgrading from openSUSE Leap to SUSE Linux Enterprise Server
- 6 Backports of Source Code
- A GNU licenses
List of FiguresList of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-virtualization/book-virt_draft.html b/SLE15SP1/single-html/SLES-virtualization/book-virt_draft.html index a7281a38add..32b409fae5b 100644 --- a/SLE15SP1/single-html/SLES-virtualization/book-virt_draft.html +++ b/SLE15SP1/single-html/SLES-virtualization/book-virt_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Virtualization Guide +SLES 15 SP1 | Virtualization Guide @@ -38,7 +38,7 @@ general, and introduces libvirt—the unified interface to virtualization—and detailed information on specific hypervisors.Publication Date: - July 12, 2023 + July 27, 2023- About This Manual
- I Introduction
- II Managing Virtual Machines with
libvirt
- 8 Starting and Stopping
libvirtd
- 9 Guest Installation
- 10 Basic VM Guest Management
- 11 Connecting and Authorizing
- 12 Managing Storage
- 13 Managing Networks
- 14 Configuring Virtual Machines with Virtual Machine Manager
- 14.1 Machine Setup
- 14.2 Storage
- 14.3 Controllers
- 14.4 Networking
- 14.5 Input Devices
- 14.6 Video
- 14.7 USB Redirectors
- 14.8 Miscellaneous
- 14.9 Adding a CD/DVD-ROM Device with Virtual Machine Manager
- 14.10 Adding a Floppy Device with Virtual Machine Manager
- 14.11 Ejecting and Changing Floppy or CD/DVD-ROM Media with Virtual Machine Manager
- 14.12 Assigning a Host PCI Device to a VM Guest
- 14.13 Assigning a Host USB Device to a VM Guest
- 15 Configuring Virtual Machines with
virsh
- 15.1 Editing the VM Configuration
- 15.2 Managing Guest Memory Allocation (Xen only)
- 15.3 Changing the Machine Type
- 15.4 Configuring CPU Allocation
- 15.5 Changing Boot Options
- 15.6 Configuring Memory Allocation
- 15.7 Adding a PCI Device
- 15.8 Adding a USB Device
- 15.9 Adding SR-IOV Devices
- 15.10 Listing Attached Devices
- 15.11 Configuring Storage Devices
- 15.12 Configuring Controller Devices
- 15.13 Configuring Video Devices
- 15.14 Configuring Network Devices
- 15.15 Using Macvtap to Share VM Host Server Network Interfaces
- 15.16 Disabling a Memory Balloon Device
- 15.17 Configuring Multiple Monitors (Dual Head)
- 15.18 Crypto adapter pass-through to KVM guests on IBM Z
- 8 Starting and Stopping
- III Hypervisor-Independent Features
- IV Managing Virtual Machines with Xen
- 21 Setting Up a Virtual Machine Host
- 22 Virtual Networking
- 23 Managing a Virtualization Environment
- 24 Block Devices in Xen
- 25 Virtualization: Configuration Options and Settings
- 26 Administrative Tasks
- 27 XenStore: Configuration Database Shared between Domains
- 28 Xen as a High-Availability Virtualization Host
- V Managing Virtual Machines with QEMU
- 29 QEMU Overview
- 30 Setting Up a KVM VM Host Server
- 31 Guest Installation
- 32 Running Virtual Machines with qemu-system-ARCH
- 33 Virtual Machine Administration Using QEMU Monitor
- 33.1 Accessing Monitor Console
- 33.2 Getting Information about the Guest System
- 33.3 Changing VNC Password
- 33.4 Managing Devices
- 33.5 Controlling Keyboard and Mouse
- 33.6 Changing Available Memory
- 33.7 Dumping Virtual Machine Memory
- 33.8 Managing Virtual Machine Snapshots
- 33.9 Suspending and Resuming Virtual Machine Execution
- 33.10 Live Migration
- 33.11 QMP - QEMU Machine Protocol
- VI Managing Virtual Machines with LXC
- Glossary
- A Virtual Machine Drivers
- B Appendix
- C XM, XL Toolstacks and Libvirt framework
- D GNU licenses
List of Figures- 2.1 Xen Virtualization Architecture
- 3.1 KVM Virtualization Architecture
- 13.1 Connection Details
- 13.2 Create virtual network
- 13.3 Create virtual network
- 13.4 Create virtual network
- 14.1 View of a VM Guest
- 14.2 Overview details
- 14.3 VM Guest Title and Description
- 14.4 Performance
- 14.5 Statistics Charts
- 14.6 Processor View
- 14.7 Memory View
- 14.8 Boot Options
- 14.9 Add a New Storage
- 14.10 Add a New Controller
- 14.11 Add a New Controller
- 14.12 Add a New Input Device
- 14.13 Add a New Video Device
- 14.14 Add a New USB Redirector
- 14.15 Adding a PCI Device
- 14.16 Adding a USB Device
- 26.1 Boot Loader Settings
- 30.1 Installing the KVM Hypervisor and Tools
- 30.2 Network Bridge
- 31.1 New 2 GB Partition in Guest YaST Partitioner
- 32.1 QEMU Window with SLES as VM Guest
- 32.2 QEMU VNC Session
- 32.3 Authentication Dialog in Remmina
List of Tables- 7.1 Feature Support—Host (
Dom0
) - 7.2 Feature Support—Paravirtualized Guest
- 7.3 Feature Support—Fully Virtualized Guest
- 28.1 Xen Remote Storage
- C.1 Notation Conventions
- C.2 New Global Options
- C.3 Common Options
- C.4 Domain Management Removed Options
- C.5 USB Devices Management Removed Options
- C.6 CPU Management Removed options
- C.7 Other Options
- C.8
xl
create
Changed Options - C.9
xm
create
Removed Options - C.10
xl
create
Added Options - C.11
xl
console
Added Options - C.12
xm
info
Removed Options - C.13
xm
dump-core
Removed Options - C.14
xm
list
Removed Options - C.15
xl
list
Added Options - C.16
xl
mem-*
Changed Options - C.17
xm
migrate
Removed Options - C.18
xl
migrate
Added Options - C.19
xm
reboot
Removed Options - C.20
xl
reboot
Added Options - C.21
xl
save
Added Options - C.22
xl
restore
Added Options - C.23
xm
shutdown
Removed Options - C.24
xl
shutdown
Added Options - C.25
xl
trigger
Changed Options - C.26
xm
sched-credit
Removed Options - C.27
xl
sched-credit
Added Options - C.28
xm
sched-credit2
Removed Options - C.29
xl
sched-credit2
Added Options - C.30
xm
sched-sedf
Removed Options - C.31
xl
sched-sedf
Added Options - C.32
xm
cpupool-list
Removed Options - C.33
xm
cpupool-create
Removed Options - C.34
xl
pci-detach
Added Options - C.35
xm
block-list
Removed Options - C.36 Other Options
- C.37 Network Options
- C.38
xl
network-attach
Removed Options - C.39 New Options
List of Examples- 9.1 Loading Kernel and Initrd from HTTP Server
- 9.2 Example of a
virt-install
command line - 10.1 Typical Output of
kvm_stat
- 13.1 NAT Based Network
- 13.2 Routed Network
- 13.3 Isolated Network
- 13.4 Using an Existing Bridge on VM Host Server
- 15.1 Example XML Configuration File
- 23.1 Guest Domain Configuration File for SLED 12:
/etc/xen/sled12.cfg
- 30.1 Exporting Host's File System with VirtFS
- 32.1 Restricted User-mode Networking
- 32.2 User-mode Networking with Custom IP Range
- 32.3 User-mode Networking with Network-boot and TFTP
- 32.4 User-mode Networking with Host Port Forwarding
- 32.5 Password Authentication
- 32.6 x509 Certificate Authentication
- 32.7 x509 Certificate and Password Authentication
- 32.8 SASL Authentication
- C.1 Converting Xen Domain Configuration to
libvirt
Copyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-virtualization/index.html b/SLE15SP1/single-html/SLES-virtualization/index.html index a7281a38add..32b409fae5b 100644 --- a/SLE15SP1/single-html/SLES-virtualization/index.html +++ b/SLE15SP1/single-html/SLES-virtualization/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Virtualization Guide +SLES 15 SP1 | Virtualization Guide @@ -38,7 +38,7 @@ general, and introduces libvirt—the unified interface to virtualization—and detailed information on specific hypervisors.Publication Date: - July 12, 2023 + July 27, 2023- About This Manual
- I Introduction
- II Managing Virtual Machines with
libvirt
- 8 Starting and Stopping
libvirtd
- 9 Guest Installation
- 10 Basic VM Guest Management
- 11 Connecting and Authorizing
- 12 Managing Storage
- 13 Managing Networks
- 14 Configuring Virtual Machines with Virtual Machine Manager
- 14.1 Machine Setup
- 14.2 Storage
- 14.3 Controllers
- 14.4 Networking
- 14.5 Input Devices
- 14.6 Video
- 14.7 USB Redirectors
- 14.8 Miscellaneous
- 14.9 Adding a CD/DVD-ROM Device with Virtual Machine Manager
- 14.10 Adding a Floppy Device with Virtual Machine Manager
- 14.11 Ejecting and Changing Floppy or CD/DVD-ROM Media with Virtual Machine Manager
- 14.12 Assigning a Host PCI Device to a VM Guest
- 14.13 Assigning a Host USB Device to a VM Guest
- 15 Configuring Virtual Machines with
virsh
- 15.1 Editing the VM Configuration
- 15.2 Managing Guest Memory Allocation (Xen only)
- 15.3 Changing the Machine Type
- 15.4 Configuring CPU Allocation
- 15.5 Changing Boot Options
- 15.6 Configuring Memory Allocation
- 15.7 Adding a PCI Device
- 15.8 Adding a USB Device
- 15.9 Adding SR-IOV Devices
- 15.10 Listing Attached Devices
- 15.11 Configuring Storage Devices
- 15.12 Configuring Controller Devices
- 15.13 Configuring Video Devices
- 15.14 Configuring Network Devices
- 15.15 Using Macvtap to Share VM Host Server Network Interfaces
- 15.16 Disabling a Memory Balloon Device
- 15.17 Configuring Multiple Monitors (Dual Head)
- 15.18 Crypto adapter pass-through to KVM guests on IBM Z
- 8 Starting and Stopping
- III Hypervisor-Independent Features
- IV Managing Virtual Machines with Xen
- 21 Setting Up a Virtual Machine Host
- 22 Virtual Networking
- 23 Managing a Virtualization Environment
- 24 Block Devices in Xen
- 25 Virtualization: Configuration Options and Settings
- 26 Administrative Tasks
- 27 XenStore: Configuration Database Shared between Domains
- 28 Xen as a High-Availability Virtualization Host
- V Managing Virtual Machines with QEMU
- 29 QEMU Overview
- 30 Setting Up a KVM VM Host Server
- 31 Guest Installation
- 32 Running Virtual Machines with qemu-system-ARCH
- 33 Virtual Machine Administration Using QEMU Monitor
- 33.1 Accessing Monitor Console
- 33.2 Getting Information about the Guest System
- 33.3 Changing VNC Password
- 33.4 Managing Devices
- 33.5 Controlling Keyboard and Mouse
- 33.6 Changing Available Memory
- 33.7 Dumping Virtual Machine Memory
- 33.8 Managing Virtual Machine Snapshots
- 33.9 Suspending and Resuming Virtual Machine Execution
- 33.10 Live Migration
- 33.11 QMP - QEMU Machine Protocol
- VI Managing Virtual Machines with LXC
- Glossary
- A Virtual Machine Drivers
- B Appendix
- C XM, XL Toolstacks and Libvirt framework
- D GNU licenses
List of Figures- 2.1 Xen Virtualization Architecture
- 3.1 KVM Virtualization Architecture
- 13.1 Connection Details
- 13.2 Create virtual network
- 13.3 Create virtual network
- 13.4 Create virtual network
- 14.1 View of a VM Guest
- 14.2 Overview details
- 14.3 VM Guest Title and Description
- 14.4 Performance
- 14.5 Statistics Charts
- 14.6 Processor View
- 14.7 Memory View
- 14.8 Boot Options
- 14.9 Add a New Storage
- 14.10 Add a New Controller
- 14.11 Add a New Controller
- 14.12 Add a New Input Device
- 14.13 Add a New Video Device
- 14.14 Add a New USB Redirector
- 14.15 Adding a PCI Device
- 14.16 Adding a USB Device
- 26.1 Boot Loader Settings
- 30.1 Installing the KVM Hypervisor and Tools
- 30.2 Network Bridge
- 31.1 New 2 GB Partition in Guest YaST Partitioner
- 32.1 QEMU Window with SLES as VM Guest
- 32.2 QEMU VNC Session
- 32.3 Authentication Dialog in Remmina
List of Tables- 7.1 Feature Support—Host (
Dom0
) - 7.2 Feature Support—Paravirtualized Guest
- 7.3 Feature Support—Fully Virtualized Guest
- 28.1 Xen Remote Storage
- C.1 Notation Conventions
- C.2 New Global Options
- C.3 Common Options
- C.4 Domain Management Removed Options
- C.5 USB Devices Management Removed Options
- C.6 CPU Management Removed options
- C.7 Other Options
- C.8
xl
create
Changed Options - C.9
xm
create
Removed Options - C.10
xl
create
Added Options - C.11
xl
console
Added Options - C.12
xm
info
Removed Options - C.13
xm
dump-core
Removed Options - C.14
xm
list
Removed Options - C.15
xl
list
Added Options - C.16
xl
mem-*
Changed Options - C.17
xm
migrate
Removed Options - C.18
xl
migrate
Added Options - C.19
xm
reboot
Removed Options - C.20
xl
reboot
Added Options - C.21
xl
save
Added Options - C.22
xl
restore
Added Options - C.23
xm
shutdown
Removed Options - C.24
xl
shutdown
Added Options - C.25
xl
trigger
Changed Options - C.26
xm
sched-credit
Removed Options - C.27
xl
sched-credit
Added Options - C.28
xm
sched-credit2
Removed Options - C.29
xl
sched-credit2
Added Options - C.30
xm
sched-sedf
Removed Options - C.31
xl
sched-sedf
Added Options - C.32
xm
cpupool-list
Removed Options - C.33
xm
cpupool-create
Removed Options - C.34
xl
pci-detach
Added Options - C.35
xm
block-list
Removed Options - C.36 Other Options
- C.37 Network Options
- C.38
xl
network-attach
Removed Options - C.39 New Options
List of Examples- 9.1 Loading Kernel and Initrd from HTTP Server
- 9.2 Example of a
virt-install
command line - 10.1 Typical Output of
kvm_stat
- 13.1 NAT Based Network
- 13.2 Routed Network
- 13.3 Isolated Network
- 13.4 Using an Existing Bridge on VM Host Server
- 15.1 Example XML Configuration File
- 23.1 Guest Domain Configuration File for SLED 12:
/etc/xen/sled12.cfg
- 30.1 Exporting Host's File System with VirtFS
- 32.1 Restricted User-mode Networking
- 32.2 User-mode Networking with Custom IP Range
- 32.3 User-mode Networking with Network-boot and TFTP
- 32.4 User-mode Networking with Host Port Forwarding
- 32.5 Password Authentication
- 32.6 x509 Certificate Authentication
- 32.7 x509 Certificate and Password Authentication
- 32.8 SASL Authentication
- C.1 Converting Xen Domain Configuration to
libvirt
Copyright © 2006–2023 diff --git a/SLE15SP1/single-html/SLES-vt-best-practices/article-vt-best-practices_draft.html b/SLE15SP1/single-html/SLES-vt-best-practices/article-vt-best-practices_draft.html index 12fbddf7b8d..96705311a12 100644 --- a/SLE15SP1/single-html/SLES-vt-best-practices/article-vt-best-practices_draft.html +++ b/SLE15SP1/single-html/SLES-vt-best-practices/article-vt-best-practices_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Virtualization Best Practices +SLES 15 SP1 | Virtualization Best Practices @@ -35,7 +35,7 @@ });This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Virtualization Best Practices #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 20231 Virtualization Scenarios #
Virtualization offers a lot of capabilities to your environment. It can be diff --git a/SLE15SP1/single-html/SLES-vt-best-practices/index.html b/SLE15SP1/single-html/SLES-vt-best-practices/index.html index 12fbddf7b8d..96705311a12 100644 --- a/SLE15SP1/single-html/SLES-vt-best-practices/index.html +++ b/SLE15SP1/single-html/SLES-vt-best-practices/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Virtualization Best Practices +SLES 15 SP1 | Virtualization Best Practices @@ -35,7 +35,7 @@ });This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Virtualization Best Practices #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 20231 Virtualization Scenarios #
Virtualization offers a lot of capabilities to your environment. It can be diff --git a/SLE15SP1/single-html/SLES-xen2kvmquick/art-sles-xen2kvmquick_draft.html b/SLE15SP1/single-html/SLES-xen2kvmquick/art-sles-xen2kvmquick_draft.html index 75258fae5e7..40fdf27300d 100644 --- a/SLE15SP1/single-html/SLES-xen2kvmquick/art-sles-xen2kvmquick_draft.html +++ b/SLE15SP1/single-html/SLES-xen2kvmquick/art-sles-xen2kvmquick_draft.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Xen to KVM Migration Guide +SLES 15 SP1 | Xen to KVM Migration Guide @@ -35,7 +35,7 @@ });This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Xen to KVM Migration Guide #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 2023As the KVM virtualization solution is becoming more and more diff --git a/SLE15SP1/single-html/SLES-xen2kvmquick/index.html b/SLE15SP1/single-html/SLES-xen2kvmquick/index.html index 75258fae5e7..40fdf27300d 100644 --- a/SLE15SP1/single-html/SLES-xen2kvmquick/index.html +++ b/SLE15SP1/single-html/SLES-xen2kvmquick/index.html @@ -1,5 +1,5 @@ -en
SLES 15 SP1 | Xen to KVM Migration Guide +SLES 15 SP1 | Xen to KVM Migration Guide @@ -35,7 +35,7 @@ });This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP1Xen to KVM Migration Guide #
SUSE Linux Enterprise Server 15 SP1
Publication Date: - July 12, 2023 + July 27, 2023As the KVM virtualization solution is becoming more and more