- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 2.14 More information
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- 9 LibreOffice: the office suite
- 9.1 LibreOffice modules
- 9.2 Starting LibreOffice
- 9.3 The LibreOffice user interface
- 9.4 Compatibility with other office applications
- 9.5 Saving files with a password
- 9.6 Signing documents
- 9.7 Customizing LibreOffice
- 9.8 Changing the global settings
- 9.9 Using templates
- 9.10 Setting metadata and properties
- 9.11 More information
- 10 LibreOffice Writer
- 11 LibreOffice Calc
- 12 LibreOffice Impress, Base, Draw, and Math
- 9 LibreOffice: the office suite
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 Keyboard shortcut dialog
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Single monitor settings dialog
- 3.6 Configuring sound settings
- 3.7 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
- 13.1 The browser window of Firefox
- 13.2 Firefox—manage search engines
- 13.3 The Firefox bookmark library
- 13.4 The Firefox page info window
- 13.5 The preferences window
- 13.6 Installing Firefox extensions
- 14.1 Evolution window
- 16.1 Ekiga user interface
- 17.1 The toolbox
- 17.2 The basic color selector dialog
- 17.3 The print dialog
- 18.1 start-up window
- 18.2 general preferences
- 18.3 display preferences
- 18.4 audio preferences
- 19.1 Main view of Brasero
- A.1 Main window of Help
diff --git a/SLE15SP3/html/SLED-gnome-user/index.html b/SLE15SP3/html/SLED-gnome-user/index.html index d5392b38941..25e34f2be17 100644 --- a/SLE15SP3/html/SLED-gnome-user/index.html +++ b/SLE15SP3/html/SLED-gnome-user/index.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 2.14 More information
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- 9 LibreOffice: the office suite
- 9.1 LibreOffice modules
- 9.2 Starting LibreOffice
- 9.3 The LibreOffice user interface
- 9.4 Compatibility with other office applications
- 9.5 Saving files with a password
- 9.6 Signing documents
- 9.7 Customizing LibreOffice
- 9.8 Changing the global settings
- 9.9 Using templates
- 9.10 Setting metadata and properties
- 9.11 More information
- 10 LibreOffice Writer
- 11 LibreOffice Calc
- 12 LibreOffice Impress, Base, Draw, and Math
- 9 LibreOffice: the office suite
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 Keyboard shortcut dialog
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Single monitor settings dialog
- 3.6 Configuring sound settings
- 3.7 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
- 13.1 The browser window of Firefox
- 13.2 Firefox—manage search engines
- 13.3 The Firefox bookmark library
- 13.4 The Firefox page info window
- 13.5 The preferences window
- 13.6 Installing Firefox extensions
- 14.1 Evolution window
- 16.1 Ekiga user interface
- 17.1 The toolbox
- 17.2 The basic color selector dialog
- 17.3 The print dialog
- 18.1 start-up window
- 18.2 general preferences
- 18.3 display preferences
- 18.4 audio preferences
- 19.1 Main view of Brasero
- A.1 Main window of Help
diff --git a/SLE15SP3/html/SLED-installation/article-installation.html b/SLE15SP3/html/SLED-installation/article-installation.html index 14f43fe650e..e899cd9cecd 100644 --- a/SLE15SP3/html/SLED-installation/article-installation.html +++ b/SLE15SP3/html/SLED-installation/article-installation.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Installation Quick Start #
This Quick Start guides you step-by-step diff --git a/SLE15SP3/html/SLED-installation/index.html b/SLE15SP3/html/SLED-installation/index.html index 14f43fe650e..e899cd9cecd 100644 --- a/SLE15SP3/html/SLED-installation/index.html +++ b/SLE15SP3/html/SLED-installation/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Installation Quick Start #
This Quick Start guides you step-by-step diff --git a/SLE15SP3/html/SLED-modules/article-modules.html b/SLE15SP3/html/SLED-modules/article-modules.html index 69ba84c9429..eb6655d81cb 100644 --- a/SLE15SP3/html/SLED-modules/article-modules.html +++ b/SLE15SP3/html/SLED-modules/article-modules.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Modules and Extensions Quick Start #
This Quick Start gives you an overview of the diff --git a/SLE15SP3/html/SLED-modules/index.html b/SLE15SP3/html/SLED-modules/index.html index 69ba84c9429..eb6655d81cb 100644 --- a/SLE15SP3/html/SLED-modules/index.html +++ b/SLE15SP3/html/SLED-modules/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Modules and Extensions Quick Start #
This Quick Start gives you an overview of the diff --git a/SLE15SP3/html/SLED-security/book-security.html b/SLE15SP3/html/SLED-security/book-security.html index 8b3924bd0fc..03251a7f28a 100644 --- a/SLE15SP3/html/SLED-security/book-security.html +++ b/SLE15SP3/html/SLED-security/book-security.html @@ -38,7 +38,7 @@ security and describes the usage of security software included with the product, such as AppArmor, SELinux, or the auditing system. The guide also supports system administrators in hardening an installation.
- Preface
- 1 Security and confidentiality
- I Authentication
- 2 Authentication with PAM
- 3 Using NIS
- 4 Setting up authentication clients using YaST
- 5 LDAP with 389 Directory Server
- 5.1 Structure of an LDAP directory tree
- 5.2 Installing 389 Directory Server
- 5.3 Firewall configuration
- 5.4 Backing up and restoring 389 Directory Server
- 5.5 Managing LDAP users and groups
- 5.6 Using SSSD to manage LDAP authentication
- 5.7 Managing modules
- 5.8 Migrating to 389 Directory Server from OpenLDAP
- 5.9 Importing TLS server certificates and keys
- 5.10 Setting up replication
- 5.11 Synchronizing with Microsoft Active Directory
- 5.12 More information
- 6 Network authentication with Kerberos
- 7 Active Directory support
- 8 Setting up a freeRADIUS server
- II Local security
- 9 Physical security
- 10 Software management
- 11 File management
- 12 Encrypting partitions and files
- 13 Storage encryption for hosted applications with cryptctl
- 14 User management
- 14.1 Various account checks
- 14.2 Enabling password aging
- 14.3 Stronger password enforcement
- 14.4 Password and login management with PAM
- 14.5 Restricting
root
logins - 14.6 Restricting
sudo
users - 14.7 Setting an inactivity timeout for interactive shell sessions
- 14.8 Preventing accidental denial of service
- 14.9 Displaying login banners
- 14.10 Connection accounting utilities
- 15 Restricting
cron
andat
- 16 Spectre/Meltdown checker
- 17 Configuring security settings with YaST
- 18 The Polkit authentication framework
- 19 Access control lists in Linux
- 20 Intrusion detection with AIDE
- III Network security
- 21 X Window System and X authentication
- 22 Securing network operations with OpenSSH
- 22.1 OpenSSH overview
- 22.2 Server hardening
- 22.3 Password authentication
- 22.4 Managing user and host encryption keys
- 22.5 Rotating host keys
- 22.6 Public key authentication
- 22.7 Passphrase-less public key authentication
- 22.8 OpenSSH certificate authentication
- 22.9 Automated public key logins with gnome-keyring
- 22.10 Automated public key logins in the console with ssh-agent
- 22.11 Changing an SSH private key passphrase
- 22.12 Retrieving a key fingerprint
- 22.13 Starting X11 applications on a remote host
- 22.14 Agent forwarding
- 22.15
scp
—secure copy - 22.16
sftp
—secure file transfer - 22.17 Port forwarding (SSH tunneling)
- 22.18 More information
- 23 Masquerading and firewalls
- 24 Configuring a VPN server
- 25 Managing a PKI with XCA, X certificate and key manager
- 26 Improving network security with
sysctl
variables
- IV Regulations and Compliance
- V Confining privileges with AppArmor
- 29 Introducing AppArmor
- 30 Getting started
- 31 Immunizing programs
- 32 Profile components and syntax
- 32.1 Breaking an AppArmor profile into its parts
- 32.2 Profile types
- 32.3 Include statements
- 32.4 Capability entries (POSIX.1e)
- 32.5 Network access control
- 32.6 Profile names, flags, paths, and globbing
- 32.7 File permission access modes
- 32.8 Mount rules
- 32.9 Pivot root rules
- 32.10 PTrace rules
- 32.11 Signal rules
- 32.12 Execute modes
- 32.13 Resource limit control
- 32.14 Auditing rules
- 33 AppArmor profile repositories
- 34 Building and managing profiles with YaST
- 35 Building profiles from the command line
- 36 Profiling your Web applications using ChangeHat
- 37 Confining users with
pam_apparmor
- 38 Managing profiled applications
- 39 Support
- 40 AppArmor glossary
- VI The Linux Audit Framework
- 41 Understanding Linux audit
- 41.1 Introducing the components of Linux audit
- 41.2 Configuring the audit daemon
- 41.3 Controlling the audit system using
auditctl
- 41.4 Passing parameters to the audit system
- 41.5 Understanding the audit logs and generating reports
- 41.6 Querying the audit daemon logs with
ausearch
- 41.7 Analyzing processes with
autrace
- 41.8 Visualizing audit data
- 41.9 Relaying audit event notifications
- 42 Setting up the Linux audit framework
- 43 Introducing an audit rule set
- 43.1 Adding basic audit configuration parameters
- 43.2 Adding watches on audit log files and configuration files
- 43.3 Monitoring file system objects
- 43.4 Monitoring security configuration files and databases
- 43.5 Monitoring miscellaneous system calls
- 43.6 Filtering system call arguments
- 43.7 Managing audit event records using keys
- 44 Useful resources
- 41 Understanding Linux audit
- A GNU licenses
- 3.1 Setting domain and address of a NIS server
- 5.1 Structure of an LDAP directory
- 7.1 Schema of Winbind-based Active Directory authentication
- 7.2 Main window of
- 7.3 Enrolling into a domain
- 7.4 Configuration window of
- 7.5 Determining Windows domain membership
- 7.6 Providing administrator credentials
- 13.1 Key retrieval with
cryptctl
(model without connection to KMIP server) - 16.1 Output from spectre-meltdown-checker
- 17.1 YaST security center and hardening: security overview
- 19.1 Minimum ACL: ACL entries compared to permission bits
- 19.2 Extended ACL: ACL entries compared to permission bits
- 23.1 iptables: a packet's possible paths
- 24.1 Routed VPN
- 24.2 Bridged VPN - scenario 1
- 24.3 Bridged VPN - scenario 2
- 24.4 Bridged VPN - scenario 3
- 25.1 Create a new XCA database
- 35.1
aa-notify Message in GNOME
- 36.1 Adminer login page
- 41.1 Introducing the components of Linux audit
- 41.2 Flow graph—program versus system call relationship
- 41.3 Bar chart—common event types
- 5.1 Commonly used object classes and attributes
- 14.1 Sample rules/constraints for password enforcement
- 19.1 ACL entry types
- 19.2 Masking access permissions
- 20.1 Important AIDE check boxes
- 22.1
- 23.1 Important sysconfig variables for static port configuration
- 39.1 Man pages: sections and categories
- 41.1 Audit status flags
- 2.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default configuration for the
auth
section (common-auth
) - 2.3 Default configuration for the
account
section (common-account
) - 2.4 Default configuration for the
password
section (common-password
) - 2.5 Default configuration for the
session
section (common-session
) - 2.6 pam_env.conf
- 5.1 Excerpt from CN=schema
- 5.2 Minimal 389 Directory Server instance configuration file
- 5.3 A
.dsrc
file for local administration - 5.4 Two supplier replicas
- 5.5 Four supplier replicas
- 5.6 Six replicas
- 5.7 Six replicas with read-only consumers
- 22.1 Example sshd.conf
- 23.1 Callback port configuration for the
nfs
kernel module in/etc/modprobe.d/60-nfs.conf
- 23.2 Commands to define a new
firewalld
RPC service for NFS - 24.1 VPN server configuration file
- 24.2 VPN client configuration file
- 30.1 Output of
aa-unconfined
- 35.1 Learning mode exception: controlling access to specific resources
- 35.2 Learning mode exception: defining permissions for an entry
- 41.1 Example output of
auditctl
-s
- 41.2 Example audit rules—audit system parameters
- 41.3 Example audit rules—file system auditing
- 41.4 Example audit rules—system call auditing
- 41.5 Deleting audit rules and events
- 41.6 Listing rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An advanced audit event—login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLED-security/index.html b/SLE15SP3/html/SLED-security/index.html index 8b3924bd0fc..03251a7f28a 100644 --- a/SLE15SP3/html/SLED-security/index.html +++ b/SLE15SP3/html/SLED-security/index.html @@ -38,7 +38,7 @@ security and describes the usage of security software included with the product, such as AppArmor, SELinux, or the auditing system. The guide also supports system administrators in hardening an installation.
- Preface
- 1 Security and confidentiality
- I Authentication
- 2 Authentication with PAM
- 3 Using NIS
- 4 Setting up authentication clients using YaST
- 5 LDAP with 389 Directory Server
- 5.1 Structure of an LDAP directory tree
- 5.2 Installing 389 Directory Server
- 5.3 Firewall configuration
- 5.4 Backing up and restoring 389 Directory Server
- 5.5 Managing LDAP users and groups
- 5.6 Using SSSD to manage LDAP authentication
- 5.7 Managing modules
- 5.8 Migrating to 389 Directory Server from OpenLDAP
- 5.9 Importing TLS server certificates and keys
- 5.10 Setting up replication
- 5.11 Synchronizing with Microsoft Active Directory
- 5.12 More information
- 6 Network authentication with Kerberos
- 7 Active Directory support
- 8 Setting up a freeRADIUS server
- II Local security
- 9 Physical security
- 10 Software management
- 11 File management
- 12 Encrypting partitions and files
- 13 Storage encryption for hosted applications with cryptctl
- 14 User management
- 14.1 Various account checks
- 14.2 Enabling password aging
- 14.3 Stronger password enforcement
- 14.4 Password and login management with PAM
- 14.5 Restricting
root
logins - 14.6 Restricting
sudo
users - 14.7 Setting an inactivity timeout for interactive shell sessions
- 14.8 Preventing accidental denial of service
- 14.9 Displaying login banners
- 14.10 Connection accounting utilities
- 15 Restricting
cron
andat
- 16 Spectre/Meltdown checker
- 17 Configuring security settings with YaST
- 18 The Polkit authentication framework
- 19 Access control lists in Linux
- 20 Intrusion detection with AIDE
- III Network security
- 21 X Window System and X authentication
- 22 Securing network operations with OpenSSH
- 22.1 OpenSSH overview
- 22.2 Server hardening
- 22.3 Password authentication
- 22.4 Managing user and host encryption keys
- 22.5 Rotating host keys
- 22.6 Public key authentication
- 22.7 Passphrase-less public key authentication
- 22.8 OpenSSH certificate authentication
- 22.9 Automated public key logins with gnome-keyring
- 22.10 Automated public key logins in the console with ssh-agent
- 22.11 Changing an SSH private key passphrase
- 22.12 Retrieving a key fingerprint
- 22.13 Starting X11 applications on a remote host
- 22.14 Agent forwarding
- 22.15
scp
—secure copy - 22.16
sftp
—secure file transfer - 22.17 Port forwarding (SSH tunneling)
- 22.18 More information
- 23 Masquerading and firewalls
- 24 Configuring a VPN server
- 25 Managing a PKI with XCA, X certificate and key manager
- 26 Improving network security with
sysctl
variables
- IV Regulations and Compliance
- V Confining privileges with AppArmor
- 29 Introducing AppArmor
- 30 Getting started
- 31 Immunizing programs
- 32 Profile components and syntax
- 32.1 Breaking an AppArmor profile into its parts
- 32.2 Profile types
- 32.3 Include statements
- 32.4 Capability entries (POSIX.1e)
- 32.5 Network access control
- 32.6 Profile names, flags, paths, and globbing
- 32.7 File permission access modes
- 32.8 Mount rules
- 32.9 Pivot root rules
- 32.10 PTrace rules
- 32.11 Signal rules
- 32.12 Execute modes
- 32.13 Resource limit control
- 32.14 Auditing rules
- 33 AppArmor profile repositories
- 34 Building and managing profiles with YaST
- 35 Building profiles from the command line
- 36 Profiling your Web applications using ChangeHat
- 37 Confining users with
pam_apparmor
- 38 Managing profiled applications
- 39 Support
- 40 AppArmor glossary
- VI The Linux Audit Framework
- 41 Understanding Linux audit
- 41.1 Introducing the components of Linux audit
- 41.2 Configuring the audit daemon
- 41.3 Controlling the audit system using
auditctl
- 41.4 Passing parameters to the audit system
- 41.5 Understanding the audit logs and generating reports
- 41.6 Querying the audit daemon logs with
ausearch
- 41.7 Analyzing processes with
autrace
- 41.8 Visualizing audit data
- 41.9 Relaying audit event notifications
- 42 Setting up the Linux audit framework
- 43 Introducing an audit rule set
- 43.1 Adding basic audit configuration parameters
- 43.2 Adding watches on audit log files and configuration files
- 43.3 Monitoring file system objects
- 43.4 Monitoring security configuration files and databases
- 43.5 Monitoring miscellaneous system calls
- 43.6 Filtering system call arguments
- 43.7 Managing audit event records using keys
- 44 Useful resources
- 41 Understanding Linux audit
- A GNU licenses
- 3.1 Setting domain and address of a NIS server
- 5.1 Structure of an LDAP directory
- 7.1 Schema of Winbind-based Active Directory authentication
- 7.2 Main window of
- 7.3 Enrolling into a domain
- 7.4 Configuration window of
- 7.5 Determining Windows domain membership
- 7.6 Providing administrator credentials
- 13.1 Key retrieval with
cryptctl
(model without connection to KMIP server) - 16.1 Output from spectre-meltdown-checker
- 17.1 YaST security center and hardening: security overview
- 19.1 Minimum ACL: ACL entries compared to permission bits
- 19.2 Extended ACL: ACL entries compared to permission bits
- 23.1 iptables: a packet's possible paths
- 24.1 Routed VPN
- 24.2 Bridged VPN - scenario 1
- 24.3 Bridged VPN - scenario 2
- 24.4 Bridged VPN - scenario 3
- 25.1 Create a new XCA database
- 35.1
aa-notify Message in GNOME
- 36.1 Adminer login page
- 41.1 Introducing the components of Linux audit
- 41.2 Flow graph—program versus system call relationship
- 41.3 Bar chart—common event types
- 5.1 Commonly used object classes and attributes
- 14.1 Sample rules/constraints for password enforcement
- 19.1 ACL entry types
- 19.2 Masking access permissions
- 20.1 Important AIDE check boxes
- 22.1
- 23.1 Important sysconfig variables for static port configuration
- 39.1 Man pages: sections and categories
- 41.1 Audit status flags
- 2.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default configuration for the
auth
section (common-auth
) - 2.3 Default configuration for the
account
section (common-account
) - 2.4 Default configuration for the
password
section (common-password
) - 2.5 Default configuration for the
session
section (common-session
) - 2.6 pam_env.conf
- 5.1 Excerpt from CN=schema
- 5.2 Minimal 389 Directory Server instance configuration file
- 5.3 A
.dsrc
file for local administration - 5.4 Two supplier replicas
- 5.5 Four supplier replicas
- 5.6 Six replicas
- 5.7 Six replicas with read-only consumers
- 22.1 Example sshd.conf
- 23.1 Callback port configuration for the
nfs
kernel module in/etc/modprobe.d/60-nfs.conf
- 23.2 Commands to define a new
firewalld
RPC service for NFS - 24.1 VPN server configuration file
- 24.2 VPN client configuration file
- 30.1 Output of
aa-unconfined
- 35.1 Learning mode exception: controlling access to specific resources
- 35.2 Learning mode exception: defining permissions for an entry
- 41.1 Example output of
auditctl
-s
- 41.2 Example audit rules—audit system parameters
- 41.3 Example audit rules—file system auditing
- 41.4 Example audit rules—system call auditing
- 41.5 Deleting audit rules and events
- 41.6 Listing rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An advanced audit event—login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLED-tuning/book-tuning.html b/SLE15SP3/html/SLED-tuning/book-tuning.html index 33c4fba2d15..06ef5af110d 100644 --- a/SLE15SP3/html/SLED-tuning/book-tuning.html +++ b/SLE15SP3/html/SLED-tuning/book-tuning.html @@ -36,7 +36,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Basics
- II System monitoring
- III Kernel monitoring
- IV Resource management
- V Kernel tuning
- VI Handling system dumps
- VII Synchronized clocks with Precision Time Protocol
- A GNU licenses
- 2.1
vmstat
output on a lightly used machine - 2.2
vmstat
output on a heavily used machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap script
- 4.2 Probe with timer event
- 4.3
printf
Function with format specifiers - 4.4 Using global variables
- 4.5 Monitoring incoming TCP connections with
tcp_connections.stp
- 11.1 Example output of
cpupower frequency-info
- 11.2 Example output of
cpupower idle-info
- 11.3 Example
cpupower monitor
output - 16.1 Checking Parameters
- 18.1 Kdump: example configuration using a static IP setup
- 20.1 Slave clock using software time stamping
- 20.2 Slave clock using hardware time stamping
- 20.3 Master clock using hardware time stamping
- 20.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLED-tuning/index.html b/SLE15SP3/html/SLED-tuning/index.html index 33c4fba2d15..06ef5af110d 100644 --- a/SLE15SP3/html/SLED-tuning/index.html +++ b/SLE15SP3/html/SLED-tuning/index.html @@ -36,7 +36,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Basics
- II System monitoring
- III Kernel monitoring
- IV Resource management
- V Kernel tuning
- VI Handling system dumps
- VII Synchronized clocks with Precision Time Protocol
- A GNU licenses
- 2.1
vmstat
output on a lightly used machine - 2.2
vmstat
output on a heavily used machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap script
- 4.2 Probe with timer event
- 4.3
printf
Function with format specifiers - 4.4 Using global variables
- 4.5 Monitoring incoming TCP connections with
tcp_connections.stp
- 11.1 Example output of
cpupower frequency-info
- 11.2 Example output of
cpupower idle-info
- 11.3 Example
cpupower monitor
output - 16.1 Checking Parameters
- 18.1 Kdump: example configuration using a static IP setup
- 20.1 Slave clock using software time stamping
- 20.2 Slave clock using hardware time stamping
- 20.3 Master clock using hardware time stamping
- 20.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLED-upgrade/book-upgrade.html b/SLE15SP3/html/SLED-upgrade/book-upgrade.html index 62ddb1dda44..0f4f96fe66f 100644 --- a/SLE15SP3/html/SLED-upgrade/book-upgrade.html +++ b/SLE15SP3/html/SLED-upgrade/book-upgrade.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLED-upgrade/index.html b/SLE15SP3/html/SLED-upgrade/index.html index 62ddb1dda44..0f4f96fe66f 100644 --- a/SLE15SP3/html/SLED-upgrade/index.html +++ b/SLE15SP3/html/SLED-upgrade/index.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-administration/book-administration.html b/SLE15SP3/html/SLES-administration/book-administration.html index 0f13c7e7a78..73740b428fb 100644 --- a/SLE15SP3/html/SLES-administration/book-administration.html +++ b/SLE15SP3/html/SLES-administration/book-administration.html @@ -39,7 +39,7 @@ like maintaining, monitoring and customizing an initially installed system.
- Preface
- I Common tasks
- 1 Bash and Bash scripts
- 2
sudo
basics - 3 Using YaST
- 4 YaST in text mode
- 5 YaST online update
- 6 Managing software with command line tools
- 7 System recovery and snapshot management with Snapper
- 7.1 Default setup
- 7.2 Using Snapper to undo changes
- 7.3 System rollback by booting from snapshots
- 7.4 Enabling Snapper in user home directories
- 7.5 Creating and modifying Snapper configurations
- 7.6 Manually creating and managing snapshots
- 7.7 Automatic snapshot clean-up
- 7.8 Showing exclusive disk space used by snapshots
- 7.9 Frequently asked questions
- 8 Live kernel patching with KLP
- 9 Transactional updates
- 10 Remote graphical sessions with VNC
- 11 File copying with RSync
- II Booting a Linux system
- III System
- 16 32-bit and 64-bit applications in a 64-bit system environment
- 17
journalctl
: Query thesystemd
journal - 18
update-alternatives
: Managing multiple versions of commands and files - 19 Basic networking
- 19.1 IP addresses and routing
- 19.2 IPv6—the next generation Internet
- 19.3 Name resolution
- 19.4 Configuring a network connection with YaST
- 19.5 Configuring a network connection manually
- 19.6 Basic router setup
- 19.7 Setting up bonding devices
- 19.8 Setting up team devices for Network Teaming
- 19.9 Software-defined networking with Open vSwitch
- 20 Printer operation
- 21 Graphical user interface
- 22 Accessing file systems with FUSE
- 23 Managing kernel modules
- 24 Dynamic kernel device management with
udev
- 24.1 The
/dev
directory - 24.2 Kernel
uevents
andudev
- 24.3 Drivers, kernel modules and devices
- 24.4 Booting and initial device setup
- 24.5 Monitoring the running
udev
daemon - 24.6 Influencing kernel device event handling with
udev
rules - 24.7 Persistent device naming
- 24.8 Files used by
udev
- 24.9 More information
- 24.1 The
- 25 Special system features
- 26 Using NetworkManager
- 27 Power management
- 28 Persistent memory
- IV Services
- 29 Service management with YaST
- 30 Time synchronization with NTP
- 31 The domain name system
- 32 DHCP
- 33 SLP
- 34 The Apache HTTP server
- 34.1 Quick start
- 34.2 Configuring Apache
- 34.3 Starting and stopping Apache
- 34.4 Installing, activating, and configuring modules
- 34.5 Enabling CGI scripts
- 34.6 Setting up a secure Web server with SSL
- 34.7 Running multiple Apache instances on the same server
- 34.8 Avoiding security problems
- 34.9 Troubleshooting
- 34.10 More information
- 35 Setting up an FTP server with YaST
- 36 Squid caching proxy server
- 36.1 Some facts about proxy servers
- 36.2 System requirements
- 36.3 Basic usage of Squid
- 36.4 The YaST Squid module
- 36.5 The Squid configuration file
- 36.6 Configuring a transparent proxy
- 36.7 Using the Squid cache manager CGI interface (
cachemgr.cgi
) - 36.8 Cache report generation with Calamaris
- 36.9 More information
- 37 Web Based Enterprise Management using SFCB
- V Troubleshooting
- A An example network
- B GNU licenses
- 4.1 Main window of YaST in text mode
- 4.2 The software installation module
- 5.1 YaST online update
- 5.2 Viewing retracted patches and history
- 5.3 YaST online update configuration
- 7.1 Boot loader: snapshots
- 10.1 vncviewer
- 10.2 Remmina's main window
- 10.3 Remote desktop preference
- 10.4 Quick-starting
- 10.5 Remmina viewing remote session
- 10.6 Reading path to the profile file
- 10.7 Remote administration
- 10.8 VNC session settings
- 10.9 Joining a persistent VNC session
- 13.1 Secure boot support
- 13.2 UEFI: secure boot process
- 14.1 GRUB 2 boot editor
- 14.2 Boot code options
- 14.3 Code options
- 14.4 Boot loader options
- 14.5 Kernel parameters
- 15.1 Services Manager
- 17.1 YaST systemd journal
- 19.1 Simplified layer model for TCP/IP
- 19.2 TCP/IP ethernet packet
- 19.3 Configuring network settings
- 19.4
wicked
architecture - 26.1 GNOME Network Connections dialog
- 26.2
firewalld
zones in NetworkManager - 29.1 YaST service manager
- 30.1 NTP configuration window
- 30.2 Adding a time server
- 31.1 DNS server installation: forwarder settings
- 31.2 DNS server installation: DNS zones
- 31.3 DNS server installation: finish wizard
- 31.4 DNS server: logging
- 31.5 DNS server: Zone Editor (Basics)
- 31.6 DNS server: Zone Editor (NS Records)
- 31.7 DNS server: Zone Editor (MX Records)
- 31.8 DNS server: Zone Editor (SOA)
- 31.9 Adding a record for a master zone
- 31.10 Adding a reverse zone
- 31.11 Adding a reverse record
- 32.1 DHCP server: card selection
- 32.2 DHCP server: global settings
- 32.3 DHCP server: dynamic DHCP
- 32.4 DHCP server: start-up
- 32.5 DHCP server: host management
- 32.6 DHCP server: chroot jail and declarations
- 32.7 DHCP server: selecting a declaration type
- 32.8 DHCP server: configuring subnets
- 32.9 DHCP server: TSIG configuration
- 32.10 DHCP server: interface configuration for dynamic DNS
- 32.11 DHCP server: network interface and firewall
- 34.1 HTTP server wizard: default host
- 34.2 HTTP server wizard: summary
- 34.3 HTTP server configuration: listen ports and addresses
- 34.4 HTTP server configuration: server modules
- 35.1 FTP server configuration — start-up
- 39.1 HTML report generated by SCA tool
- 39.2 HTML report generated by SCA appliance
- 1.1 Bash configuration files for login shells
- 1.2 Bash configuration files for non-login shells
- 1.3 Special files for Bash
- 1.4 Overview of a standard directory tree
- 1.5 Useful environment variables
- 6.1 Essential RPM query options
- 6.2 RPM verify options
- 15.1 Service management commands
- 15.2 Commands for enabling and disabling services
- 15.3 System V runlevels and
systemd
target units - 19.1 Private IP address domains
- 19.2 Parameters for /etc/host.conf
- 19.3 Databases available via /etc/nsswitch.conf
- 19.4 Configuration options for NSS “databases”
- 19.5 Feature comparison between bonding and team
- 21.1 Generating PFL from fontconfig rules
- 21.2 Results from generating PFL from fontconfig rules with changed order
- 21.3 Results from generating PFL from fontconfig rules
- 25.1
ulimit
: Setting resources for the user - 37.1 Commands for managing sfcbd
- 38.1 Man pages—categories and descriptions
- 39.1 Comparison of features and file names in the TAR archive
- 40.1 Log files
- 40.2 System information with the
/proc
file system - 40.3 System information with the
/sys
file system
- 1.1 A shell script printing a text
- 6.1 Zypper—list of known repositories
- 6.2
rpm -q -i wget
- 6.3 Script to search for packages
- 7.1 Example timeline configuration
- 14.1 Usage of grub2-mkconfig
- 14.2 Usage of grub2-mkrescue
- 14.3 Usage of grub2-script-check
- 14.4 Usage of grub2-once
- 15.1 List active services
- 15.2 List failed services
- 15.3 List all processes belonging to a service
- 18.1 Alternatives System of the
java
command - 19.1 Writing IP addresses
- 19.2 Linking IP addresses to the netmask
- 19.3 Sample IPv6 address
- 19.4 IPv6 address specifying the prefix length
- 19.5 Common network interfaces and some static routes
- 19.6
/var/run/netconfig/resolv.conf
- 19.7
/etc/hosts
- 19.8
/etc/networks
- 19.9
/etc/host.conf
- 19.10
/etc/nsswitch.conf
- 19.11 Output of the command ping
- 19.12 Configuration for load balancing with Network Teaming
- 19.13 Configuration for DHCP Network Teaming device
- 20.1 Error message from
lpd
- 20.2 Broadcast from the CUPS network server
- 21.1 Specifying rendering algorithms
- 21.2 Aliases and family name substitutions
- 21.3 Aliases and family name substitutions
- 21.4 Aliases and family names substitutions
- 24.1 Example
udev
rules - 25.1 Entry in /etc/crontab
- 25.2 /etc/crontab: remove time stamp files
- 25.3
ulimit
: Settings in~/.bashrc
- 31.1 Forwarding options in named.conf
- 31.2 A basic /etc/named.conf
- 31.3 Entry to disable logging
- 31.4 Zone entry for example.com
- 31.5 Zone entry for example.net
- 31.6 The /var/lib/named/example.com.zone file
- 31.7 Reverse lookup
- 32.1 The configuration file /etc/dhcpd.conf
- 32.2 Additions to the configuration file
- 34.1 Basic examples of name-based
VirtualHost
entries - 34.2 Name-based
VirtualHost
directives - 34.3 IP-based
VirtualHost
directives - 34.4 Basic
VirtualHost
configuration - 34.5 VirtualHost CGI configuration
- 36.1 A request with
squidclient
- 36.2 Defining ACL rules
- 39.1 Output of
hostinfo
when logging in asroot
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-administration/index.html b/SLE15SP3/html/SLES-administration/index.html index 0f13c7e7a78..73740b428fb 100644 --- a/SLE15SP3/html/SLES-administration/index.html +++ b/SLE15SP3/html/SLES-administration/index.html @@ -39,7 +39,7 @@ like maintaining, monitoring and customizing an initially installed system.
- Preface
- I Common tasks
- 1 Bash and Bash scripts
- 2
sudo
basics - 3 Using YaST
- 4 YaST in text mode
- 5 YaST online update
- 6 Managing software with command line tools
- 7 System recovery and snapshot management with Snapper
- 7.1 Default setup
- 7.2 Using Snapper to undo changes
- 7.3 System rollback by booting from snapshots
- 7.4 Enabling Snapper in user home directories
- 7.5 Creating and modifying Snapper configurations
- 7.6 Manually creating and managing snapshots
- 7.7 Automatic snapshot clean-up
- 7.8 Showing exclusive disk space used by snapshots
- 7.9 Frequently asked questions
- 8 Live kernel patching with KLP
- 9 Transactional updates
- 10 Remote graphical sessions with VNC
- 11 File copying with RSync
- II Booting a Linux system
- III System
- 16 32-bit and 64-bit applications in a 64-bit system environment
- 17
journalctl
: Query thesystemd
journal - 18
update-alternatives
: Managing multiple versions of commands and files - 19 Basic networking
- 19.1 IP addresses and routing
- 19.2 IPv6—the next generation Internet
- 19.3 Name resolution
- 19.4 Configuring a network connection with YaST
- 19.5 Configuring a network connection manually
- 19.6 Basic router setup
- 19.7 Setting up bonding devices
- 19.8 Setting up team devices for Network Teaming
- 19.9 Software-defined networking with Open vSwitch
- 20 Printer operation
- 21 Graphical user interface
- 22 Accessing file systems with FUSE
- 23 Managing kernel modules
- 24 Dynamic kernel device management with
udev
- 24.1 The
/dev
directory - 24.2 Kernel
uevents
andudev
- 24.3 Drivers, kernel modules and devices
- 24.4 Booting and initial device setup
- 24.5 Monitoring the running
udev
daemon - 24.6 Influencing kernel device event handling with
udev
rules - 24.7 Persistent device naming
- 24.8 Files used by
udev
- 24.9 More information
- 24.1 The
- 25 Special system features
- 26 Using NetworkManager
- 27 Power management
- 28 Persistent memory
- IV Services
- 29 Service management with YaST
- 30 Time synchronization with NTP
- 31 The domain name system
- 32 DHCP
- 33 SLP
- 34 The Apache HTTP server
- 34.1 Quick start
- 34.2 Configuring Apache
- 34.3 Starting and stopping Apache
- 34.4 Installing, activating, and configuring modules
- 34.5 Enabling CGI scripts
- 34.6 Setting up a secure Web server with SSL
- 34.7 Running multiple Apache instances on the same server
- 34.8 Avoiding security problems
- 34.9 Troubleshooting
- 34.10 More information
- 35 Setting up an FTP server with YaST
- 36 Squid caching proxy server
- 36.1 Some facts about proxy servers
- 36.2 System requirements
- 36.3 Basic usage of Squid
- 36.4 The YaST Squid module
- 36.5 The Squid configuration file
- 36.6 Configuring a transparent proxy
- 36.7 Using the Squid cache manager CGI interface (
cachemgr.cgi
) - 36.8 Cache report generation with Calamaris
- 36.9 More information
- 37 Web Based Enterprise Management using SFCB
- V Troubleshooting
- A An example network
- B GNU licenses
- 4.1 Main window of YaST in text mode
- 4.2 The software installation module
- 5.1 YaST online update
- 5.2 Viewing retracted patches and history
- 5.3 YaST online update configuration
- 7.1 Boot loader: snapshots
- 10.1 vncviewer
- 10.2 Remmina's main window
- 10.3 Remote desktop preference
- 10.4 Quick-starting
- 10.5 Remmina viewing remote session
- 10.6 Reading path to the profile file
- 10.7 Remote administration
- 10.8 VNC session settings
- 10.9 Joining a persistent VNC session
- 13.1 Secure boot support
- 13.2 UEFI: secure boot process
- 14.1 GRUB 2 boot editor
- 14.2 Boot code options
- 14.3 Code options
- 14.4 Boot loader options
- 14.5 Kernel parameters
- 15.1 Services Manager
- 17.1 YaST systemd journal
- 19.1 Simplified layer model for TCP/IP
- 19.2 TCP/IP ethernet packet
- 19.3 Configuring network settings
- 19.4
wicked
architecture - 26.1 GNOME Network Connections dialog
- 26.2
firewalld
zones in NetworkManager - 29.1 YaST service manager
- 30.1 NTP configuration window
- 30.2 Adding a time server
- 31.1 DNS server installation: forwarder settings
- 31.2 DNS server installation: DNS zones
- 31.3 DNS server installation: finish wizard
- 31.4 DNS server: logging
- 31.5 DNS server: Zone Editor (Basics)
- 31.6 DNS server: Zone Editor (NS Records)
- 31.7 DNS server: Zone Editor (MX Records)
- 31.8 DNS server: Zone Editor (SOA)
- 31.9 Adding a record for a master zone
- 31.10 Adding a reverse zone
- 31.11 Adding a reverse record
- 32.1 DHCP server: card selection
- 32.2 DHCP server: global settings
- 32.3 DHCP server: dynamic DHCP
- 32.4 DHCP server: start-up
- 32.5 DHCP server: host management
- 32.6 DHCP server: chroot jail and declarations
- 32.7 DHCP server: selecting a declaration type
- 32.8 DHCP server: configuring subnets
- 32.9 DHCP server: TSIG configuration
- 32.10 DHCP server: interface configuration for dynamic DNS
- 32.11 DHCP server: network interface and firewall
- 34.1 HTTP server wizard: default host
- 34.2 HTTP server wizard: summary
- 34.3 HTTP server configuration: listen ports and addresses
- 34.4 HTTP server configuration: server modules
- 35.1 FTP server configuration — start-up
- 39.1 HTML report generated by SCA tool
- 39.2 HTML report generated by SCA appliance
- 1.1 Bash configuration files for login shells
- 1.2 Bash configuration files for non-login shells
- 1.3 Special files for Bash
- 1.4 Overview of a standard directory tree
- 1.5 Useful environment variables
- 6.1 Essential RPM query options
- 6.2 RPM verify options
- 15.1 Service management commands
- 15.2 Commands for enabling and disabling services
- 15.3 System V runlevels and
systemd
target units - 19.1 Private IP address domains
- 19.2 Parameters for /etc/host.conf
- 19.3 Databases available via /etc/nsswitch.conf
- 19.4 Configuration options for NSS “databases”
- 19.5 Feature comparison between bonding and team
- 21.1 Generating PFL from fontconfig rules
- 21.2 Results from generating PFL from fontconfig rules with changed order
- 21.3 Results from generating PFL from fontconfig rules
- 25.1
ulimit
: Setting resources for the user - 37.1 Commands for managing sfcbd
- 38.1 Man pages—categories and descriptions
- 39.1 Comparison of features and file names in the TAR archive
- 40.1 Log files
- 40.2 System information with the
/proc
file system - 40.3 System information with the
/sys
file system
- 1.1 A shell script printing a text
- 6.1 Zypper—list of known repositories
- 6.2
rpm -q -i wget
- 6.3 Script to search for packages
- 7.1 Example timeline configuration
- 14.1 Usage of grub2-mkconfig
- 14.2 Usage of grub2-mkrescue
- 14.3 Usage of grub2-script-check
- 14.4 Usage of grub2-once
- 15.1 List active services
- 15.2 List failed services
- 15.3 List all processes belonging to a service
- 18.1 Alternatives System of the
java
command - 19.1 Writing IP addresses
- 19.2 Linking IP addresses to the netmask
- 19.3 Sample IPv6 address
- 19.4 IPv6 address specifying the prefix length
- 19.5 Common network interfaces and some static routes
- 19.6
/var/run/netconfig/resolv.conf
- 19.7
/etc/hosts
- 19.8
/etc/networks
- 19.9
/etc/host.conf
- 19.10
/etc/nsswitch.conf
- 19.11 Output of the command ping
- 19.12 Configuration for load balancing with Network Teaming
- 19.13 Configuration for DHCP Network Teaming device
- 20.1 Error message from
lpd
- 20.2 Broadcast from the CUPS network server
- 21.1 Specifying rendering algorithms
- 21.2 Aliases and family name substitutions
- 21.3 Aliases and family name substitutions
- 21.4 Aliases and family names substitutions
- 24.1 Example
udev
rules - 25.1 Entry in /etc/crontab
- 25.2 /etc/crontab: remove time stamp files
- 25.3
ulimit
: Settings in~/.bashrc
- 31.1 Forwarding options in named.conf
- 31.2 A basic /etc/named.conf
- 31.3 Entry to disable logging
- 31.4 Zone entry for example.com
- 31.5 Zone entry for example.net
- 31.6 The /var/lib/named/example.com.zone file
- 31.7 Reverse lookup
- 32.1 The configuration file /etc/dhcpd.conf
- 32.2 Additions to the configuration file
- 34.1 Basic examples of name-based
VirtualHost
entries - 34.2 Name-based
VirtualHost
directives - 34.3 IP-based
VirtualHost
directives - 34.4 Basic
VirtualHost
configuration - 34.5 VirtualHost CGI configuration
- 36.1 A request with
squidclient
- 36.2 Defining ACL rules
- 39.1 Output of
hostinfo
when logging in asroot
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-amd-sev/article-amd-sev.html b/SLE15SP3/html/SLES-amd-sev/article-amd-sev.html index f3626fba372..c9461715453 100644 --- a/SLE15SP3/html/SLES-amd-sev/article-amd-sev.html +++ b/SLE15SP3/html/SLES-amd-sev/article-amd-sev.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
AMD's Secure Encrypted Virtualization (SEV) allows the memory of virtual diff --git a/SLE15SP3/html/SLES-amd-sev/index.html b/SLE15SP3/html/SLES-amd-sev/index.html index f3626fba372..c9461715453 100644 --- a/SLE15SP3/html/SLES-amd-sev/index.html +++ b/SLE15SP3/html/SLES-amd-sev/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
AMD's Secure Encrypted Virtualization (SEV) allows the memory of virtual diff --git a/SLE15SP3/html/SLES-autoyast/book-autoyast.html b/SLE15SP3/html/SLES-autoyast/book-autoyast.html index 26d6a194048..316843b1cab 100644 --- a/SLE15SP3/html/SLES-autoyast/book-autoyast.html +++ b/SLE15SP3/html/SLES-autoyast/book-autoyast.html @@ -40,7 +40,7 @@ and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration.
- Preface
- 1 Introduction to AutoYaST
- I Understanding and creating the AutoYaST control file
- II AutoYaST configuration examples
- 4 Configuration and installation options
- 4.1 General options
- 4.2 Reporting
- 4.3 System registration and extension selection
- 4.4 The boot loader
- 4.5 Partitioning
- 4.6 iSCSI initiator overview
- 4.7 Fibre channel over Ethernet configuration (FCoE)
- 4.8 Country settings
- 4.9 Software
- 4.10 Upgrade
- 4.11 Services and targets
- 4.12 Network configuration
- 4.13 Proxy
- 4.14 NIS client and server
- 4.15 NIS server
- 4.16 Hosts definition
- 4.17 Windows domain membership
- 4.18 Samba server
- 4.19 Authentication client
- 4.20 NFS client and server
- 4.21 NTP client
- 4.22 Mail server configuration
- 4.23 Apache HTTP server configuration
- 4.24 Squid server
- 4.25 FTP server
- 4.26 TFTP server
- 4.27 Firstboot workflow
- 4.28 Security settings
- 4.29 Linux audit framework (LAF)
- 4.30 Users and groups
- 4.31 Custom user scripts
- 4.32 System variables (sysconfig)
- 4.33 Adding complete configurations
- 4.34 Ask the user for values during installation
- 4.35 Kernel dumps
- 4.36 DNS server
- 4.37 DHCP server
- 4.38 Firewall configuration
- 4.39 Miscellaneous hardware and system components
- 4.40 Importing SSH keys and configuration
- 4.41 Configuration management
- 4 Configuration and installation options
- III Managing mass installations with dynamic profiles
- IV Understanding the auto-installation process
- V Uses for AutoYaST on installed systems
- VI Appendixes
- 2.1 AutoYaST control file (profile)
- 2.2 Control file container
- 2.3 Nested resources
- 3.1 Example file for replacing the host name/domain by script
- 4.1 General options
- 4.2 Reporting behavior
- 4.3 LVM-based guided partitioning
- 4.4 Creating
/
,/home
andswap
partitions - 4.5 Using a whole disk as a file system
- 4.6 Automated partitioning on selected drives
- 4.7 Installing on multiple drives
- 4.8 Mount options
- 4.9 Keeping partitions
- 4.10 Auto-detection of partitions to be kept.
- 4.11 Create LVM physical volume
- 4.12 LVM logical volumes
- 4.13 RAID10 configuration
- 4.14 RAID10 without partitions
- 4.15 Old style RAID10 configuration
- 4.16 Using multipath devices
- 4.17 Listing multipath devices
- 4.18 Using the WWID to identify a multipath device
- 4.19
bcache
definition - 4.20 Multi-device Btrfs configuration
- 4.21 NFS share definition
- 4.22
tmpfs
definition - 4.23 iSCSI client
- 4.24 FCoE configuration
- 4.25 Language
- 4.26 Time zone
- 4.27 Keyboard
- 4.28 Explicit product selection
- 4.29 Package selection in the control file with patterns and packages sections
- 4.30 Packages selection using a regular expression
- 4.31 Creating a package database with the additional package inst-source-utils.rpm
- 4.32
add_on_products.xml
- 4.33 Adding the SDK extension and a user defined repository
- 4.34 Kernel selection in the control file
- 4.35 Package selection in control file
- 4.36 Upgrade and backup
- 4.37 Configuring services and targets
- 4.38 Network configuration
- 4.39 Bonding interface configuration
- 4.40 Bridge interface configuration
- 4.41 Multiple IP Addresses
- 4.42 Assigning a persistent name using the MAC address
- 4.43 Network routing configuration
- 4.44 Network configuration: proxy
- 4.45 Network configuration: NIS
- 4.46 NIS server configuration
- 4.47 /etc/hosts
- 4.48 Samba client configuration
- 4.49 Samba server configuration
- 4.50 Network configuration: NFS client
- 4.51 Network configuration: NFS server
- 4.52 Network configuration: NTP client
- 4.53 Mail configuration
- 4.54 HTTP server configuration
- 4.55 Squid server configuration
- 4.56 FTP server configuration:
- 4.57 TFTP server configuration:
- 4.58 Enabling firstboot workflow
- 4.59 Security configuration
- 4.60 LAF configuration
- 4.61 Minimal user configuration
- 4.62 Complex user configuration
- 4.63 Group configuration
- 4.64 Enabling autologin and password-less login
- 4.65 Script configuration
- 4.66 Sysconfig configuration
- 4.67 Dumping files into the installed system
- 4.68 Dumping files into the installed system
- 4.69 Kdump configuration
- 4.70 Disabled Kdump configuration
- 4.71 Kdump memory reservation with multiple values
- 4.72 Basic DNS server settings
- 4.73 Configuring DNS server zones and advanced settings
- 4.74 Example dhcp-server section
- 4.75 Example firewall section
- 4.76 Printer configuration
- 4.77 Sound configuration
- 4.78 Importing SSH keys and configuration from /dev/sda2
- 4.79 Client/server with manual authentication
- 4.80 Client/server with preseed keys
- 4.81 Stand-alone mode
- 6.1 Simple rules file
- 6.2 Simple rules file
- 7.1 Including a file using ERB
- 7.2 Running commands with Ruby
- 7.3 Using Ruby structures
- 7.4 Configuring the boot loader
- 7.5 Using the largest disk
- 7.6 Configure the connected network cards
- 7.7 Reusing the same profile for different distributions
- 7.8 Filtering USB devices
- 7.9 Running helpers
- 7.10 Rendering profile
- 7.11 Preparing the debug environment
- 7.12 Adding a breakpoint
- 7.13 Rules and classes
- 7.14 ERB
- 8.1 Using the MAC address to get the profile
- 8.2 Accessing ERB helpers from a Ruby script
- 9.1 Determine HEX code for an IP address
- 9.2
linuxrc
Options in the AutoYaST control file - D.1 Adding modules and extensions (online)
- D.2 Adding modules and extensions (offline)
- D.3 Specifying the Btrfs default subvolume name
- D.4 Disabling Btrfs subvolumes
- D.5 Assigning zones: default configuration (deprecated syntax)
- D.6 Assigning zones: default configuration (SLE 15 syntax)
- D.7 Masquerading and protecting internal zones (deprecated syntax)
- D.8 Masquerading and protecting internal zones (SLE 15 syntax)
- D.9 Opening ports (deprecated syntax)
- D.10 Opening ports (SLE 15 syntax)
- D.11 Opening Services (Deprecated Syntax) diff --git a/SLE15SP3/html/SLES-autoyast/index.html b/SLE15SP3/html/SLES-autoyast/index.html index 26d6a194048..316843b1cab 100644 --- a/SLE15SP3/html/SLES-autoyast/index.html +++ b/SLE15SP3/html/SLES-autoyast/index.html @@ -40,7 +40,7 @@ and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration.
- Preface
- 1 Introduction to AutoYaST
- I Understanding and creating the AutoYaST control file
- II AutoYaST configuration examples
- 4 Configuration and installation options
- 4.1 General options
- 4.2 Reporting
- 4.3 System registration and extension selection
- 4.4 The boot loader
- 4.5 Partitioning
- 4.6 iSCSI initiator overview
- 4.7 Fibre channel over Ethernet configuration (FCoE)
- 4.8 Country settings
- 4.9 Software
- 4.10 Upgrade
- 4.11 Services and targets
- 4.12 Network configuration
- 4.13 Proxy
- 4.14 NIS client and server
- 4.15 NIS server
- 4.16 Hosts definition
- 4.17 Windows domain membership
- 4.18 Samba server
- 4.19 Authentication client
- 4.20 NFS client and server
- 4.21 NTP client
- 4.22 Mail server configuration
- 4.23 Apache HTTP server configuration
- 4.24 Squid server
- 4.25 FTP server
- 4.26 TFTP server
- 4.27 Firstboot workflow
- 4.28 Security settings
- 4.29 Linux audit framework (LAF)
- 4.30 Users and groups
- 4.31 Custom user scripts
- 4.32 System variables (sysconfig)
- 4.33 Adding complete configurations
- 4.34 Ask the user for values during installation
- 4.35 Kernel dumps
- 4.36 DNS server
- 4.37 DHCP server
- 4.38 Firewall configuration
- 4.39 Miscellaneous hardware and system components
- 4.40 Importing SSH keys and configuration
- 4.41 Configuration management
- 4 Configuration and installation options
- III Managing mass installations with dynamic profiles
- IV Understanding the auto-installation process
- V Uses for AutoYaST on installed systems
- VI Appendixes
- 2.1 AutoYaST control file (profile)
- 2.2 Control file container
- 2.3 Nested resources
- 3.1 Example file for replacing the host name/domain by script
- 4.1 General options
- 4.2 Reporting behavior
- 4.3 LVM-based guided partitioning
- 4.4 Creating
/
,/home
andswap
partitions - 4.5 Using a whole disk as a file system
- 4.6 Automated partitioning on selected drives
- 4.7 Installing on multiple drives
- 4.8 Mount options
- 4.9 Keeping partitions
- 4.10 Auto-detection of partitions to be kept.
- 4.11 Create LVM physical volume
- 4.12 LVM logical volumes
- 4.13 RAID10 configuration
- 4.14 RAID10 without partitions
- 4.15 Old style RAID10 configuration
- 4.16 Using multipath devices
- 4.17 Listing multipath devices
- 4.18 Using the WWID to identify a multipath device
- 4.19
bcache
definition - 4.20 Multi-device Btrfs configuration
- 4.21 NFS share definition
- 4.22
tmpfs
definition - 4.23 iSCSI client
- 4.24 FCoE configuration
- 4.25 Language
- 4.26 Time zone
- 4.27 Keyboard
- 4.28 Explicit product selection
- 4.29 Package selection in the control file with patterns and packages sections
- 4.30 Packages selection using a regular expression
- 4.31 Creating a package database with the additional package inst-source-utils.rpm
- 4.32
add_on_products.xml
- 4.33 Adding the SDK extension and a user defined repository
- 4.34 Kernel selection in the control file
- 4.35 Package selection in control file
- 4.36 Upgrade and backup
- 4.37 Configuring services and targets
- 4.38 Network configuration
- 4.39 Bonding interface configuration
- 4.40 Bridge interface configuration
- 4.41 Multiple IP Addresses
- 4.42 Assigning a persistent name using the MAC address
- 4.43 Network routing configuration
- 4.44 Network configuration: proxy
- 4.45 Network configuration: NIS
- 4.46 NIS server configuration
- 4.47 /etc/hosts
- 4.48 Samba client configuration
- 4.49 Samba server configuration
- 4.50 Network configuration: NFS client
- 4.51 Network configuration: NFS server
- 4.52 Network configuration: NTP client
- 4.53 Mail configuration
- 4.54 HTTP server configuration
- 4.55 Squid server configuration
- 4.56 FTP server configuration:
- 4.57 TFTP server configuration:
- 4.58 Enabling firstboot workflow
- 4.59 Security configuration
- 4.60 LAF configuration
- 4.61 Minimal user configuration
- 4.62 Complex user configuration
- 4.63 Group configuration
- 4.64 Enabling autologin and password-less login
- 4.65 Script configuration
- 4.66 Sysconfig configuration
- 4.67 Dumping files into the installed system
- 4.68 Dumping files into the installed system
- 4.69 Kdump configuration
- 4.70 Disabled Kdump configuration
- 4.71 Kdump memory reservation with multiple values
- 4.72 Basic DNS server settings
- 4.73 Configuring DNS server zones and advanced settings
- 4.74 Example dhcp-server section
- 4.75 Example firewall section
- 4.76 Printer configuration
- 4.77 Sound configuration
- 4.78 Importing SSH keys and configuration from /dev/sda2
- 4.79 Client/server with manual authentication
- 4.80 Client/server with preseed keys
- 4.81 Stand-alone mode
- 6.1 Simple rules file
- 6.2 Simple rules file
- 7.1 Including a file using ERB
- 7.2 Running commands with Ruby
- 7.3 Using Ruby structures
- 7.4 Configuring the boot loader
- 7.5 Using the largest disk
- 7.6 Configure the connected network cards
- 7.7 Reusing the same profile for different distributions
- 7.8 Filtering USB devices
- 7.9 Running helpers
- 7.10 Rendering profile
- 7.11 Preparing the debug environment
- 7.12 Adding a breakpoint
- 7.13 Rules and classes
- 7.14 ERB
- 8.1 Using the MAC address to get the profile
- 8.2 Accessing ERB helpers from a Ruby script
- 9.1 Determine HEX code for an IP address
- 9.2
linuxrc
Options in the AutoYaST control file - D.1 Adding modules and extensions (online)
- D.2 Adding modules and extensions (offline)
- D.3 Specifying the Btrfs default subvolume name
- D.4 Disabling Btrfs subvolumes
- D.5 Assigning zones: default configuration (deprecated syntax)
- D.6 Assigning zones: default configuration (SLE 15 syntax)
- D.7 Masquerading and protecting internal zones (deprecated syntax)
- D.8 Masquerading and protecting internal zones (SLE 15 syntax)
- D.9 Opening ports (deprecated syntax)
- D.10 Opening ports (SLE 15 syntax)
- D.11 Opening Services (Deprecated Syntax) diff --git a/SLE15SP3/html/SLES-deployment/book-deployment.html b/SLE15SP3/html/SLES-deployment/book-deployment.html index b2a8091bbb1..86fa3c578f8 100644 --- a/SLE15SP3/html/SLES-deployment/book-deployment.html +++ b/SLE15SP3/html/SLES-deployment/book-deployment.html @@ -39,7 +39,7 @@ systems, and how to exploit the product-inherent capabilities for a deployment infrastructure.
- Preface
- I Installation preparation
- II Installation procedure
- 7 Boot parameters
- 8 Installation steps
- 8.1 Overview
- 8.2 Installer self-update
- 8.3 Language, keyboard, and product selection diff --git a/SLE15SP3/html/SLES-deployment/index.html b/SLE15SP3/html/SLES-deployment/index.html index b2a8091bbb1..86fa3c578f8 100644 --- a/SLE15SP3/html/SLES-deployment/index.html +++ b/SLE15SP3/html/SLES-deployment/index.html @@ -39,7 +39,7 @@ systems, and how to exploit the product-inherent capabilities for a deployment infrastructure.
- Preface
- I Installation preparation
- II Installation procedure
- 7 Boot parameters
- 8 Installation steps
- 8.1 Overview
- 8.2 Installer self-update
- 8.3
Language, keyboard, and product selection
diff --git a/SLE15SP3/html/SLES-gnome-user/book-gnome-user.html b/SLE15SP3/html/SLES-gnome-user/book-gnome-user.html
index bb8a3c1b5e5..b8cb08e772f 100644
--- a/SLE15SP3/html/SLES-gnome-user/book-gnome-user.html
+++ b/SLE15SP3/html/SLES-gnome-user/book-gnome-user.html
@@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 2.14 More information
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 Keyboard shortcut dialog
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Single monitor settings dialog
- 3.6 Configuring sound settings
- 3.7 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
- 13.1 The browser window of Firefox
- 13.2 Firefox—manage search engines
- 13.3 The Firefox bookmark library
- 13.4 The Firefox page info window
- 13.5 The preferences window
- 13.6 Installing Firefox extensions
- 14.1 Evolution window
- 16.1 Ekiga user interface
- 17.1 The toolbox
- 17.2 The basic color selector dialog
- 17.3 The print dialog
- 18.1 start-up window
- 18.2 general preferences
- 18.3 display preferences
- 18.4 audio preferences
- 19.1 Main view of Brasero
- A.1 Main window of Help
List of TablesList of Examplesdiff --git a/SLE15SP3/html/SLES-gnome-user/index.html b/SLE15SP3/html/SLES-gnome-user/index.html index bb8a3c1b5e5..b8cb08e772f 100644 --- a/SLE15SP3/html/SLES-gnome-user/index.html +++ b/SLE15SP3/html/SLES-gnome-user/index.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 2.14 More information
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 Keyboard shortcut dialog
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Single monitor settings dialog
- 3.6 Configuring sound settings
- 3.7 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
- 13.1 The browser window of Firefox
- 13.2 Firefox—manage search engines
- 13.3 The Firefox bookmark library
- 13.4 The Firefox page info window
- 13.5 The preferences window
- 13.6 Installing Firefox extensions
- 14.1 Evolution window
- 16.1 Ekiga user interface
- 17.1 The toolbox
- 17.2 The basic color selector dialog
- 17.3 The print dialog
- 18.1 start-up window
- 18.2 general preferences
- 18.3 display preferences
- 18.4 audio preferences
- 19.1 Main view of Brasero
- A.1 Main window of Help
List of TablesList of Examplesdiff --git a/SLE15SP3/html/SLES-installation/article-installation.html b/SLE15SP3/html/SLES-installation/article-installation.html index a9a70001bb1..002911df443 100644 --- a/SLE15SP3/html/SLES-installation/article-installation.html +++ b/SLE15SP3/html/SLES-installation/article-installation.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3Installation Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start guides you step-by-step diff --git a/SLE15SP3/html/SLES-installation/index.html b/SLE15SP3/html/SLES-installation/index.html index a9a70001bb1..002911df443 100644 --- a/SLE15SP3/html/SLES-installation/index.html +++ b/SLE15SP3/html/SLES-installation/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3Installation Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start guides you step-by-step diff --git a/SLE15SP3/html/SLES-jeos/article-jeos.html b/SLE15SP3/html/SLES-jeos/article-jeos.html index a94bcaf9a0a..caece4f861f 100644 --- a/SLE15SP3/html/SLES-jeos/article-jeos.html +++ b/SLE15SP3/html/SLES-jeos/article-jeos.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server JeOS 15 SP3JeOS Quick Start
Publication Date: - July 12, 2023 + July 21, 2023The following document provides an overview of SUSE Linux Enterprise Server JeOS and describes @@ -126,7 +126,7 @@
The KIWI configuration files used to create the official JeOS images are available from the openSUSE Build Service at - https://build.opensuse.org/. + https://build.opensuse.org/.
Note: Specific host tools packagesEach SUSE Linux Enterprise Server JeOS flavor contains certain host tools packages. Refer to the specific flavors section in the documentation for further diff --git a/SLE15SP3/html/SLES-jeos/index.html b/SLE15SP3/html/SLES-jeos/index.html index a94bcaf9a0a..caece4f861f 100644 --- a/SLE15SP3/html/SLES-jeos/index.html +++ b/SLE15SP3/html/SLES-jeos/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server JeOS 15 SP3JeOS Quick Start
Publication Date: - July 12, 2023 + July 21, 2023The following document provides an overview of SUSE Linux Enterprise Server JeOS and describes @@ -126,7 +126,7 @@
The KIWI configuration files used to create the official JeOS images are available from the openSUSE Build Service at - https://build.opensuse.org/. + https://build.opensuse.org/.
Note: Specific host tools packagesEach SUSE Linux Enterprise Server JeOS flavor contains certain host tools packages. Refer to the specific flavors section in the documentation for further diff --git a/SLE15SP3/html/SLES-modules/article-modules.html b/SLE15SP3/html/SLES-modules/article-modules.html index 782b53d3874..d183b2a3bc4 100644 --- a/SLE15SP3/html/SLES-modules/article-modules.html +++ b/SLE15SP3/html/SLES-modules/article-modules.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3Modules and Extensions Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start gives you an overview of the diff --git a/SLE15SP3/html/SLES-modules/index.html b/SLE15SP3/html/SLES-modules/index.html index 782b53d3874..d183b2a3bc4 100644 --- a/SLE15SP3/html/SLES-modules/index.html +++ b/SLE15SP3/html/SLES-modules/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3Modules and Extensions Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start gives you an overview of the diff --git a/SLE15SP3/html/SLES-raspberry-pi/article-raspberry-pi.html b/SLE15SP3/html/SLES-raspberry-pi/article-raspberry-pi.html index 12a99ac26c5..f3ced9abc0b 100644 --- a/SLE15SP3/html/SLES-raspberry-pi/article-raspberry-pi.html +++ b/SLE15SP3/html/SLES-raspberry-pi/article-raspberry-pi.html @@ -33,7 +33,7 @@ useBR: false }); -
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP3Raspberry Pi Quick Start
Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP3Raspberry Pi Quick Start
Publication Date: July 21, 2023This guide contains an overview of SUSE Linux Enterprise Server for Arm on the Raspberry Pi* platform and will guide you through the setup procedure. diff --git a/SLE15SP3/html/SLES-raspberry-pi/index.html b/SLE15SP3/html/SLES-raspberry-pi/index.html index 12a99ac26c5..f3ced9abc0b 100644 --- a/SLE15SP3/html/SLES-raspberry-pi/index.html +++ b/SLE15SP3/html/SLES-raspberry-pi/index.html @@ -33,7 +33,7 @@ useBR: false }); -
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP3Raspberry Pi Quick Start
Publication Date: July 12, 2023 +This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server for Arm 15 SP3Raspberry Pi Quick Start
Publication Date: July 21, 2023This guide contains an overview of SUSE Linux Enterprise Server for Arm on the Raspberry Pi* platform and will guide you through the setup procedure. diff --git a/SLE15SP3/html/SLES-rmt/book-rmt.html b/SLE15SP3/html/SLES-rmt/book-rmt.html index 8ec088f921c..fe0a5f6f4bc 100644 --- a/SLE15SP3/html/SLES-rmt/book-rmt.html +++ b/SLE15SP3/html/SLES-rmt/book-rmt.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- 1 Overview
- 2 RMT installation and configuration
- 3 Migrate from SMT to RMT
- 4 Mirroring repositories on the RMT server
- 5 Configuring clients to use RMT
- 5.1 Configuring clients with boot parameters
- 5.2 Configuring clients with AutoYaST profile
- 5.3 Configuring clients with
rmt-client-setup
- 5.4 Configuring clients with YaST
- 5.5 Configuring clients for custom stand-alone repositories
- 5.6 Listing accessible repositories
- 5.7 Online migration of SUSE Linux Enterprise clients
- 6 RMT tools and configuration files
- 7 Backing up an RMT server
- 8 Managing TLS/SSL certificates
- A GNU licenses
List of FiguresList of TablesCopyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-rmt/index.html b/SLE15SP3/html/SLES-rmt/index.html index 8ec088f921c..fe0a5f6f4bc 100644 --- a/SLE15SP3/html/SLES-rmt/index.html +++ b/SLE15SP3/html/SLES-rmt/index.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- 1 Overview
- 2 RMT installation and configuration
- 3 Migrate from SMT to RMT
- 4 Mirroring repositories on the RMT server
- 5 Configuring clients to use RMT
- 5.1 Configuring clients with boot parameters
- 5.2 Configuring clients with AutoYaST profile
- 5.3 Configuring clients with
rmt-client-setup
- 5.4 Configuring clients with YaST
- 5.5 Configuring clients for custom stand-alone repositories
- 5.6 Listing accessible repositories
- 5.7 Online migration of SUSE Linux Enterprise clients
- 6 RMT tools and configuration files
- 7 Backing up an RMT server
- 8 Managing TLS/SSL certificates
- A GNU licenses
List of FiguresList of TablesCopyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-security/book-security.html b/SLE15SP3/html/SLES-security/book-security.html index 4da1e306f85..54aaf34af21 100644 --- a/SLE15SP3/html/SLES-security/book-security.html +++ b/SLE15SP3/html/SLES-security/book-security.html @@ -38,7 +38,7 @@ security and describes the usage of security software included with the product, such as AppArmor, SELinux, or the auditing system. The guide also supports system administrators in hardening an installation.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- 1 Security and confidentiality
- I Authentication
- 2 Authentication with PAM
- 3 Using NIS
- 4 Setting up authentication clients using YaST
- 5 LDAP with 389 Directory Server
- 5.1 Structure of an LDAP directory tree
- 5.2 Installing 389 Directory Server
- 5.3 Firewall configuration
- 5.4 Backing up and restoring 389 Directory Server
- 5.5 Managing LDAP users and groups
- 5.6 Using SSSD to manage LDAP authentication
- 5.7 Managing modules
- 5.8 Migrating to 389 Directory Server from OpenLDAP
- 5.9 Importing TLS server certificates and keys
- 5.10 Setting up replication
- 5.11 Synchronizing with Microsoft Active Directory
- 5.12 More information
- 6 Network authentication with Kerberos
- 7 Active Directory support
- 8 Setting up a freeRADIUS server
- II Local security
- 9 Physical security
- 10 Software management
- 11 File management
- 12 Encrypting partitions and files
- 13 Storage encryption for hosted applications with cryptctl
- 14 User management
- 14.1 Various account checks
- 14.2 Enabling password aging
- 14.3 Stronger password enforcement
- 14.4 Password and login management with PAM
- 14.5 Restricting
root
logins - 14.6 Restricting
sudo
users - 14.7 Setting an inactivity timeout for interactive shell sessions
- 14.8 Preventing accidental denial of service
- 14.9 Displaying login banners
- 14.10 Connection accounting utilities
- 15 Restricting
cron
andat
- 16 Spectre/Meltdown checker
- 17 Configuring security settings with YaST
- 18 The Polkit authentication framework
- 19 Access control lists in Linux
- 20 Intrusion detection with AIDE
- III Network security
- 21 X Window System and X authentication
- 22 Securing network operations with OpenSSH
- 22.1 OpenSSH overview
- 22.2 Server hardening
- 22.3 Password authentication
- 22.4 Managing user and host encryption keys
- 22.5 Rotating host keys
- 22.6 Public key authentication
- 22.7 Passphrase-less public key authentication
- 22.8 OpenSSH certificate authentication
- 22.9 Automated public key logins with gnome-keyring
- 22.10 Automated public key logins in the console with ssh-agent
- 22.11 Changing an SSH private key passphrase
- 22.12 Retrieving a key fingerprint
- 22.13 Starting X11 applications on a remote host
- 22.14 Agent forwarding
- 22.15
scp
—secure copy - 22.16
sftp
—secure file transfer - 22.17 Port forwarding (SSH tunneling)
- 22.18 More information
- 23 Masquerading and firewalls
- 24 Configuring a VPN server
- 25 Managing a PKI with XCA, X certificate and key manager
- 26 Improving network security with
sysctl
variables
- IV Regulations and Compliance
- V Confining privileges with AppArmor
- 31 Introducing AppArmor
- 32 Getting started
- 33 Immunizing programs
- 34 Profile components and syntax
- 34.1 Breaking an AppArmor profile into its parts
- 34.2 Profile types
- 34.3 Include statements
- 34.4 Capability entries (POSIX.1e)
- 34.5 Network access control
- 34.6 Profile names, flags, paths, and globbing
- 34.7 File permission access modes
- 34.8 Mount rules
- 34.9 Pivot root rules
- 34.10 PTrace rules
- 34.11 Signal rules
- 34.12 Execute modes
- 34.13 Resource limit control
- 34.14 Auditing rules
- 35 AppArmor profile repositories
- 36 Building and managing profiles with YaST
- 37 Building profiles from the command line
- 38 Profiling your Web applications using ChangeHat
- 39 Confining users with
pam_apparmor
- 40 Managing profiled applications
- 41 Support
- 42 AppArmor glossary
- VI SELinux
- VII The Linux Audit Framework
- 44 Understanding Linux audit
- 44.1 Introducing the components of Linux audit
- 44.2 Configuring the audit daemon
- 44.3 Controlling the audit system using
auditctl
- 44.4 Passing parameters to the audit system
- 44.5 Understanding the audit logs and generating reports
- 44.6 Querying the audit daemon logs with
ausearch
- 44.7 Analyzing processes with
autrace
- 44.8 Visualizing audit data
- 44.9 Relaying audit event notifications
- 45 Setting up the Linux audit framework
- 46 Introducing an audit rule set
- 46.1 Adding basic audit configuration parameters
- 46.2 Adding watches on audit log files and configuration files
- 46.3 Monitoring file system objects
- 46.4 Monitoring security configuration files and databases
- 46.5 Monitoring miscellaneous system calls
- 46.6 Filtering system call arguments
- 46.7 Managing audit event records using keys
- 47 Useful resources
- 44 Understanding Linux audit
- A GNU licenses
List of Figures- 3.1 NIS server setup
- 3.2 Master server setup
- 3.3 Changing the directory and synchronizing files for a NIS server
- 3.4 NIS server maps setup
- 3.5 Setting request permissions for a NIS server
- 3.6 Setting domain and address of a NIS server
- 5.1 Structure of an LDAP directory
- 6.1 Kerberos network topology
- 7.1 Schema of Winbind-based Active Directory authentication
- 7.2 Main window of
- 7.3 Enrolling into a domain
- 7.4 Configuration window of
- 7.5 Determining Windows domain membership
- 7.6 Providing administrator credentials
- 13.1 Key retrieval with
cryptctl
(model without connection to KMIP server) - 16.1 Output from spectre-meltdown-checker
- 17.1 YaST security center and hardening: security overview
- 19.1 Minimum ACL: ACL entries compared to permission bits
- 19.2 Extended ACL: ACL entries compared to permission bits
- 23.1 iptables: a packet's possible paths
- 24.1 Routed VPN
- 24.2 Bridged VPN - scenario 1
- 24.3 Bridged VPN - scenario 2
- 24.4 Bridged VPN - scenario 3
- 25.1 Create a new XCA database
- 37.1
aa-notify Message in GNOME
- 38.1 Adminer login page
- 44.1 Introducing the components of Linux audit
- 44.2 Flow graph—program versus system call relationship
- 44.3 Bar chart—common event types
List of Tables- 5.1 Commonly used object classes and attributes
- 14.1 Sample rules/constraints for password enforcement
- 19.1 ACL entry types
- 19.2 Masking access permissions
- 20.1 Important AIDE check boxes
- 22.1
- 23.1 Important sysconfig variables for static port configuration
- 41.1 Man pages: sections and categories
- 44.1 Audit status flags
List of Examples- 2.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default configuration for the
auth
section (common-auth
) - 2.3 Default configuration for the
account
section (common-account
) - 2.4 Default configuration for the
password
section (common-password
) - 2.5 Default configuration for the
session
section (common-session
) - 2.6 pam_env.conf
- 5.1 Excerpt from CN=schema
- 5.2 Minimal 389 Directory Server instance configuration file
- 5.3 A
.dsrc
file for local administration - 5.4 Two supplier replicas
- 5.5 Four supplier replicas
- 5.6 Six replicas
- 5.7 Six replicas with read-only consumers
- 6.1 Example KDC configuration,
/etc/krb5.conf
- 22.1 Example sshd.conf
- 23.1 Callback port configuration for the
nfs
kernel module in/etc/modprobe.d/60-nfs.conf
- 23.2 Commands to define a new
firewalld
RPC service for NFS - 24.1 VPN server configuration file
- 24.2 VPN client configuration file
- 32.1 Output of
aa-unconfined
- 37.1 Learning mode exception: controlling access to specific resources
- 37.2 Learning mode exception: defining permissions for an entry
- 43.1 Security context settings using
ls -Z
- 43.2 Verifying that SELinux is functional
- 43.3 Getting a list of booleans and verifying policy access
- 43.4 Getting file context information
- 43.5 The default context for directories in the root directory
- 43.6 Showing SELinux settings for processes with
ps Zaux
- 43.7 Viewing default file contexts
- 43.8 Example lines from
/etc/audit/audit.log
- 43.9 Analyzing audit messages
- 43.10 Viewing which lines deny access
- 43.11 Creating a policy module allowing an action previously denied
- 44.1 Example output of
auditctl
-s
- 44.2 Example audit rules—audit system parameters
- 44.3 Example audit rules—file system auditing
- 44.4 Example audit rules—system call auditing
- 44.5 Deleting audit rules and events
- 44.6 Listing rules with
auditctl
-l
- 44.7 A simple audit event—viewing the audit log
- 44.8 An advanced audit event—login via SSH
- 44.9 Example /etc/audisp/audispd.conf
- 44.10 Example /etc/audisp/plugins.d/syslog.conf
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-security/index.html b/SLE15SP3/html/SLES-security/index.html index 4da1e306f85..54aaf34af21 100644 --- a/SLE15SP3/html/SLES-security/index.html +++ b/SLE15SP3/html/SLES-security/index.html @@ -38,7 +38,7 @@ security and describes the usage of security software included with the product, such as AppArmor, SELinux, or the auditing system. The guide also supports system administrators in hardening an installation.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- 1 Security and confidentiality
- I Authentication
- 2 Authentication with PAM
- 3 Using NIS
- 4 Setting up authentication clients using YaST
- 5 LDAP with 389 Directory Server
- 5.1 Structure of an LDAP directory tree
- 5.2 Installing 389 Directory Server
- 5.3 Firewall configuration
- 5.4 Backing up and restoring 389 Directory Server
- 5.5 Managing LDAP users and groups
- 5.6 Using SSSD to manage LDAP authentication
- 5.7 Managing modules
- 5.8 Migrating to 389 Directory Server from OpenLDAP
- 5.9 Importing TLS server certificates and keys
- 5.10 Setting up replication
- 5.11 Synchronizing with Microsoft Active Directory
- 5.12 More information
- 6 Network authentication with Kerberos
- 7 Active Directory support
- 8 Setting up a freeRADIUS server
- II Local security
- 9 Physical security
- 10 Software management
- 11 File management
- 12 Encrypting partitions and files
- 13 Storage encryption for hosted applications with cryptctl
- 14 User management
- 14.1 Various account checks
- 14.2 Enabling password aging
- 14.3 Stronger password enforcement
- 14.4 Password and login management with PAM
- 14.5 Restricting
root
logins - 14.6 Restricting
sudo
users - 14.7 Setting an inactivity timeout for interactive shell sessions
- 14.8 Preventing accidental denial of service
- 14.9 Displaying login banners
- 14.10 Connection accounting utilities
- 15 Restricting
cron
andat
- 16 Spectre/Meltdown checker
- 17 Configuring security settings with YaST
- 18 The Polkit authentication framework
- 19 Access control lists in Linux
- 20 Intrusion detection with AIDE
- III Network security
- 21 X Window System and X authentication
- 22 Securing network operations with OpenSSH
- 22.1 OpenSSH overview
- 22.2 Server hardening
- 22.3 Password authentication
- 22.4 Managing user and host encryption keys
- 22.5 Rotating host keys
- 22.6 Public key authentication
- 22.7 Passphrase-less public key authentication
- 22.8 OpenSSH certificate authentication
- 22.9 Automated public key logins with gnome-keyring
- 22.10 Automated public key logins in the console with ssh-agent
- 22.11 Changing an SSH private key passphrase
- 22.12 Retrieving a key fingerprint
- 22.13 Starting X11 applications on a remote host
- 22.14 Agent forwarding
- 22.15
scp
—secure copy - 22.16
sftp
—secure file transfer - 22.17 Port forwarding (SSH tunneling)
- 22.18 More information
- 23 Masquerading and firewalls
- 24 Configuring a VPN server
- 25 Managing a PKI with XCA, X certificate and key manager
- 26 Improving network security with
sysctl
variables
- IV Regulations and Compliance
- V Confining privileges with AppArmor
- 31 Introducing AppArmor
- 32 Getting started
- 33 Immunizing programs
- 34 Profile components and syntax
- 34.1 Breaking an AppArmor profile into its parts
- 34.2 Profile types
- 34.3 Include statements
- 34.4 Capability entries (POSIX.1e)
- 34.5 Network access control
- 34.6 Profile names, flags, paths, and globbing
- 34.7 File permission access modes
- 34.8 Mount rules
- 34.9 Pivot root rules
- 34.10 PTrace rules
- 34.11 Signal rules
- 34.12 Execute modes
- 34.13 Resource limit control
- 34.14 Auditing rules
- 35 AppArmor profile repositories
- 36 Building and managing profiles with YaST
- 37 Building profiles from the command line
- 38 Profiling your Web applications using ChangeHat
- 39 Confining users with
pam_apparmor
- 40 Managing profiled applications
- 41 Support
- 42 AppArmor glossary
- VI SELinux
- VII The Linux Audit Framework
- 44 Understanding Linux audit
- 44.1 Introducing the components of Linux audit
- 44.2 Configuring the audit daemon
- 44.3 Controlling the audit system using
auditctl
- 44.4 Passing parameters to the audit system
- 44.5 Understanding the audit logs and generating reports
- 44.6 Querying the audit daemon logs with
ausearch
- 44.7 Analyzing processes with
autrace
- 44.8 Visualizing audit data
- 44.9 Relaying audit event notifications
- 45 Setting up the Linux audit framework
- 46 Introducing an audit rule set
- 46.1 Adding basic audit configuration parameters
- 46.2 Adding watches on audit log files and configuration files
- 46.3 Monitoring file system objects
- 46.4 Monitoring security configuration files and databases
- 46.5 Monitoring miscellaneous system calls
- 46.6 Filtering system call arguments
- 46.7 Managing audit event records using keys
- 47 Useful resources
- 44 Understanding Linux audit
- A GNU licenses
List of Figures- 3.1 NIS server setup
- 3.2 Master server setup
- 3.3 Changing the directory and synchronizing files for a NIS server
- 3.4 NIS server maps setup
- 3.5 Setting request permissions for a NIS server
- 3.6 Setting domain and address of a NIS server
- 5.1 Structure of an LDAP directory
- 6.1 Kerberos network topology
- 7.1 Schema of Winbind-based Active Directory authentication
- 7.2 Main window of
- 7.3 Enrolling into a domain
- 7.4 Configuration window of
- 7.5 Determining Windows domain membership
- 7.6 Providing administrator credentials
- 13.1 Key retrieval with
cryptctl
(model without connection to KMIP server) - 16.1 Output from spectre-meltdown-checker
- 17.1 YaST security center and hardening: security overview
- 19.1 Minimum ACL: ACL entries compared to permission bits
- 19.2 Extended ACL: ACL entries compared to permission bits
- 23.1 iptables: a packet's possible paths
- 24.1 Routed VPN
- 24.2 Bridged VPN - scenario 1
- 24.3 Bridged VPN - scenario 2
- 24.4 Bridged VPN - scenario 3
- 25.1 Create a new XCA database
- 37.1
aa-notify Message in GNOME
- 38.1 Adminer login page
- 44.1 Introducing the components of Linux audit
- 44.2 Flow graph—program versus system call relationship
- 44.3 Bar chart—common event types
List of Tables- 5.1 Commonly used object classes and attributes
- 14.1 Sample rules/constraints for password enforcement
- 19.1 ACL entry types
- 19.2 Masking access permissions
- 20.1 Important AIDE check boxes
- 22.1
- 23.1 Important sysconfig variables for static port configuration
- 41.1 Man pages: sections and categories
- 44.1 Audit status flags
List of Examples- 2.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default configuration for the
auth
section (common-auth
) - 2.3 Default configuration for the
account
section (common-account
) - 2.4 Default configuration for the
password
section (common-password
) - 2.5 Default configuration for the
session
section (common-session
) - 2.6 pam_env.conf
- 5.1 Excerpt from CN=schema
- 5.2 Minimal 389 Directory Server instance configuration file
- 5.3 A
.dsrc
file for local administration - 5.4 Two supplier replicas
- 5.5 Four supplier replicas
- 5.6 Six replicas
- 5.7 Six replicas with read-only consumers
- 6.1 Example KDC configuration,
/etc/krb5.conf
- 22.1 Example sshd.conf
- 23.1 Callback port configuration for the
nfs
kernel module in/etc/modprobe.d/60-nfs.conf
- 23.2 Commands to define a new
firewalld
RPC service for NFS - 24.1 VPN server configuration file
- 24.2 VPN client configuration file
- 32.1 Output of
aa-unconfined
- 37.1 Learning mode exception: controlling access to specific resources
- 37.2 Learning mode exception: defining permissions for an entry
- 43.1 Security context settings using
ls -Z
- 43.2 Verifying that SELinux is functional
- 43.3 Getting a list of booleans and verifying policy access
- 43.4 Getting file context information
- 43.5 The default context for directories in the root directory
- 43.6 Showing SELinux settings for processes with
ps Zaux
- 43.7 Viewing default file contexts
- 43.8 Example lines from
/etc/audit/audit.log
- 43.9 Analyzing audit messages
- 43.10 Viewing which lines deny access
- 43.11 Creating a policy module allowing an action previously denied
- 44.1 Example output of
auditctl
-s
- 44.2 Example audit rules—audit system parameters
- 44.3 Example audit rules—file system auditing
- 44.4 Example audit rules—system call auditing
- 44.5 Deleting audit rules and events
- 44.6 Listing rules with
auditctl
-l
- 44.7 A simple audit event—viewing the audit log
- 44.8 An advanced audit event—login via SSH
- 44.9 Example /etc/audisp/audispd.conf
- 44.10 Example /etc/audisp/plugins.d/syslog.conf
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-storage/book-storage.html b/SLE15SP3/html/SLES-storage/book-storage.html index b426669b0da..c450680b40d 100644 --- a/SLE15SP3/html/SLES-storage/book-storage.html +++ b/SLE15SP3/html/SLES-storage/book-storage.html @@ -38,7 +38,7 @@ This guide provides information about how to manage storage devices on a SUSE Linux Enterprise Server.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I File systems and mounting
- II Logical volumes (LVM)
- 5 LVM configuration
- 5.1 Understanding the logical volume manager
- 5.2 Creating volume groups
- 5.3 Creating logical volumes
- 5.4 Automatically activating non-root LVM volume groups
- 5.5 Resizing an existing volume group
- 5.6 Resizing a logical volume
- 5.7 Deleting a volume group or a logical volume
- 5.8 Disabling LVM on boot
- 5.9 Using LVM commands
- 5.10 Tagging LVM2 storage objects
- 6 LVM volume snapshots
- 5 LVM configuration
- III Software RAID
- 7 Software RAID configuration
- 8 Configuring software RAID for the root partition
- 8.1 Prerequisites for using a software RAID device for the root partition
- 8.2 diff --git a/SLE15SP3/html/SLES-storage/index.html b/SLE15SP3/html/SLES-storage/index.html index b426669b0da..c450680b40d 100644 --- a/SLE15SP3/html/SLES-storage/index.html +++ b/SLE15SP3/html/SLES-storage/index.html @@ -38,7 +38,7 @@ This guide provides information about how to manage storage devices on a SUSE Linux Enterprise Server.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I File systems and mounting
- II Logical volumes (LVM)
- 5 LVM configuration
- 5.1 Understanding the logical volume manager
- 5.2 Creating volume groups
- 5.3 Creating logical volumes
- 5.4 Automatically activating non-root LVM volume groups
- 5.5 Resizing an existing volume group
- 5.6 Resizing a logical volume
- 5.7 Deleting a volume group or a logical volume
- 5.8 Disabling LVM on boot
- 5.9 Using LVM commands
- 5.10 Tagging LVM2 storage objects
- 6 LVM volume snapshots
- 5 LVM configuration
- III Software RAID
- 7 Software RAID configuration
- 8 Configuring software RAID for the root partition
- 8.1 Prerequisites for using a software RAID device for the root partition
- 8.2
diff --git a/SLE15SP3/html/SLES-tuning/book-tuning.html b/SLE15SP3/html/SLES-tuning/book-tuning.html
index 745d3dcd6f6..a7696a266f5 100644
--- a/SLE15SP3/html/SLES-tuning/book-tuning.html
+++ b/SLE15SP3/html/SLES-tuning/book-tuning.html
@@ -36,7 +36,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Basics
- II System monitoring
- III Kernel monitoring
- IV Resource management
- V Kernel tuning
- VI Handling system dumps
- VII Synchronized clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
output on a lightly used machine - 2.2
vmstat
output on a heavily used machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap script
- 4.2 Probe with timer event
- 4.3
printf
Function with format specifiers - 4.4 Using global variables
- 4.5 Monitoring incoming TCP connections with
tcp_connections.stp
- 11.1 Example output of
cpupower frequency-info
- 11.2 Example output of
cpupower idle-info
- 11.3 Example
cpupower monitor
output - 16.1 Checking Parameters
- 18.1 Kdump: example configuration using a static IP setup
- 20.1 Slave clock using software time stamping
- 20.2 Slave clock using hardware time stamping
- 20.3 Master clock using hardware time stamping
- 20.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-tuning/index.html b/SLE15SP3/html/SLES-tuning/index.html index 745d3dcd6f6..a7696a266f5 100644 --- a/SLE15SP3/html/SLES-tuning/index.html +++ b/SLE15SP3/html/SLES-tuning/index.html @@ -36,7 +36,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Basics
- II System monitoring
- III Kernel monitoring
- IV Resource management
- V Kernel tuning
- VI Handling system dumps
- VII Synchronized clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
output on a lightly used machine - 2.2
vmstat
output on a heavily used machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap script
- 4.2 Probe with timer event
- 4.3
printf
Function with format specifiers - 4.4 Using global variables
- 4.5 Monitoring incoming TCP connections with
tcp_connections.stp
- 11.1 Example output of
cpupower frequency-info
- 11.2 Example output of
cpupower idle-info
- 11.3 Example
cpupower monitor
output - 16.1 Checking Parameters
- 18.1 Kdump: example configuration using a static IP setup
- 20.1 Slave clock using software time stamping
- 20.2 Slave clock using hardware time stamping
- 20.3 Master clock using hardware time stamping
- 20.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-upgrade/book-upgrade.html b/SLE15SP3/html/SLES-upgrade/book-upgrade.html index 652c56bcf40..381a247e7f6 100644 --- a/SLE15SP3/html/SLES-upgrade/book-upgrade.html +++ b/SLE15SP3/html/SLES-upgrade/book-upgrade.html @@ -39,7 +39,7 @@ of SUSE Linux Enterprise Server. If you use SUSE Linux Enterprise Server as base system for other SLE products or extensions, also see their product documentation for upgrade information specific to this product or extension. -
Publication Date: July 12, 2023 +Publication Date: July 21, 2023- Preface
- 1 Upgrade paths and methods
- 2 Life cycle and support
- 3 Preparing the upgrade
- 3.1 Make sure the current system is up-to-date
- 3.2 Read the release notes
- 3.3 Make a backup
- 3.4 Listing installed packages and repositories
- 3.5 Disable the LTSS extension
- 3.6 Upgrading from SUSE Linux Enterprise Server 11 SP4
- 3.7 Migrate your PostgreSQL database
- 3.8 Shut down virtual machine guests
- 3.9 Adjusting your SMT client setup
- 3.10 Disk space
- 3.11 Changes in AutoYaST profiles from SLE 12 to 15
- 3.12 Upgrading a Subscription Management Tool (SMT) server
- 3.13 Temporarily disabling kernel multiversion support
- 3.14 Adjust the
resume
boot parameter - 3.15 Upgrading on IBM Z
- 3.16 IBM POWER: Starting an X server
- 4 Upgrading offline
- 5 Upgrading online
- 5.1 Conceptual overview
- 5.2 Service pack migration workflow
- 5.3 Canceling service pack migration
- 5.4 Upgrading with the online migration tool (YaST)
- 5.5 Upgrading with Zypper
- 5.6 Upgrading with plain Zypper
- 5.7 Rolling back a service pack
- 5.8 Upgrading with SUSE Manager
- 5.9 Upgrading from openSUSE Leap to SUSE Linux Enterprise Server
- 6 Backports of source code
- A GNU licenses
List of FiguresList of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-upgrade/index.html b/SLE15SP3/html/SLES-upgrade/index.html index 652c56bcf40..381a247e7f6 100644 --- a/SLE15SP3/html/SLES-upgrade/index.html +++ b/SLE15SP3/html/SLES-upgrade/index.html @@ -39,7 +39,7 @@ of SUSE Linux Enterprise Server. If you use SUSE Linux Enterprise Server as base system for other SLE products or extensions, also see their product documentation for upgrade information specific to this product or extension. -
Publication Date: July 12, 2023 +Publication Date: July 21, 2023- Preface
- 1 Upgrade paths and methods
- 2 Life cycle and support
- 3 Preparing the upgrade
- 3.1 Make sure the current system is up-to-date
- 3.2 Read the release notes
- 3.3 Make a backup
- 3.4 Listing installed packages and repositories
- 3.5 Disable the LTSS extension
- 3.6 Upgrading from SUSE Linux Enterprise Server 11 SP4
- 3.7 Migrate your PostgreSQL database
- 3.8 Shut down virtual machine guests
- 3.9 Adjusting your SMT client setup
- 3.10 Disk space
- 3.11 Changes in AutoYaST profiles from SLE 12 to 15
- 3.12 Upgrading a Subscription Management Tool (SMT) server
- 3.13 Temporarily disabling kernel multiversion support
- 3.14 Adjust the
resume
boot parameter - 3.15 Upgrading on IBM Z
- 3.16 IBM POWER: Starting an X server
- 4 Upgrading offline
- 5 Upgrading online
- 5.1 Conceptual overview
- 5.2 Service pack migration workflow
- 5.3 Canceling service pack migration
- 5.4 Upgrading with the online migration tool (YaST)
- 5.5 Upgrading with Zypper
- 5.6 Upgrading with plain Zypper
- 5.7 Rolling back a service pack
- 5.8 Upgrading with SUSE Manager
- 5.9 Upgrading from openSUSE Leap to SUSE Linux Enterprise Server
- 6 Backports of source code
- A GNU licenses
List of FiguresList of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-virtualization-best-practices/article-virtualization-best-practices.html b/SLE15SP3/html/SLES-virtualization-best-practices/article-virtualization-best-practices.html index 8091fbbf7f4..ca035adf464 100644 --- a/SLE15SP3/html/SLES-virtualization-best-practices/article-virtualization-best-practices.html +++ b/SLE15SP3/html/SLES-virtualization-best-practices/article-virtualization-best-practices.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3Virtualization Best Practices #
Publication Date: - July 12, 2023 + July 21, 20231 Virtualization scenarios #
Virtualization offers a lot of capabilities to your environment. It can be diff --git a/SLE15SP3/html/SLES-virtualization-best-practices/index.html b/SLE15SP3/html/SLES-virtualization-best-practices/index.html index 8091fbbf7f4..ca035adf464 100644 --- a/SLE15SP3/html/SLES-virtualization-best-practices/index.html +++ b/SLE15SP3/html/SLES-virtualization-best-practices/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3Virtualization Best Practices #
Publication Date: - July 12, 2023 + July 21, 20231 Virtualization scenarios #
Virtualization offers a lot of capabilities to your environment. It can be diff --git a/SLE15SP3/html/SLES-virtualization/book-virtualization.html b/SLE15SP3/html/SLES-virtualization/book-virtualization.html index 8f2faea6d56..12949c762d2 100644 --- a/SLE15SP3/html/SLES-virtualization/book-virtualization.html +++ b/SLE15SP3/html/SLES-virtualization/book-virtualization.html @@ -38,7 +38,7 @@ general. It introduces libvirt—the unified interface to virtualization—and provides detailed information on specific hypervisors.
Publication Date: - July 12, 2023 + July 21, 2023
- Preface
- I Introduction
- II Managing virtual machines with
libvirt
- 8 Starting and stopping
libvirtd
- 9 Preparing the VM Host Server
- 10 Guest installation
- 11 Basic VM Guest management
- 12 Connecting and authorizing
- 13 Advanced storage topics
- 14 Configuring virtual machines with Virtual Machine Manager
- 14.1 Machine setup
- 14.2 Storage
- 14.3 Controllers
- 14.4 Networking
- 14.5 Input devices
- 14.6 Video
- 14.7 USB redirectors
- 14.8 Miscellaneous
- 14.9 Adding a CD/DVD-ROM device with Virtual Machine Manager
- 14.10 Adding a floppy device with Virtual Machine Manager
- 14.11 Ejecting and changing floppy or CD/DVD-ROM media with Virtual Machine Manager
- 14.12 Assigning a host PCI device to a VM Guest
- 14.13 Assigning a host USB device to a VM Guest
- 15 Configuring virtual machines with
virsh
- 15.1 Editing the VM configuration
- 15.2 Changing the machine type
- 15.3 Configuring hypervisor features
- 15.4 Configuring CPU
- 15.5 Changing boot options
- 15.6 Configuring memory allocation
- 15.7 Adding a PCI device
- 15.8 Adding a USB device
- 15.9 Adding SR-IOV devices
- 15.10 Listing attached devices
- 15.11 Configuring storage devices
- 15.12 Configuring controller devices
- 15.13 Configuring video devices
- 15.14 Configuring network devices
- 15.15 Using macvtap to share VM Host Server network interfaces
- 15.16 Disabling a memory balloon device
- 15.17 Configuring multiple monitors (dual head)
- 15.18 Crypto adapter pass-through to KVM guests on IBM Z
- 16 Managing virtual machines with Vagrant
- 17 Xen to KVM migration guide
- 8 Starting and stopping
- III Hypervisor-independent features
- IV Managing virtual machines with Xen
- 23 Setting up a virtual machine host
- 24 Virtual networking
- 25 Managing a virtualization environment
- 26 Block devices in Xen
- 27 Virtualization: configuration options and settings
- 28 Administrative tasks
- 29 XenStore: configuration database shared between domains
- 30 Xen as a high-availability virtualization host
- 31 Xen: converting a paravirtual (PV) guest into a fully virtual (FV/HVM) guest
- V Managing virtual machines with QEMU
- 32 QEMU overview
- 33 Setting up a KVM VM Host Server
- 34 Guest installation
- 35 Running virtual machines with qemu-system-ARCH
- 36 Virtual machine administration using QEMU monitor
- 36.1 Accessing monitor console
- 36.2 Getting information about the guest system
- 36.3 Changing VNC password
- 36.4 Managing devices
- 36.5 Controlling keyboard and mouse
- 36.6 Changing available memory
- 36.7 Dumping virtual machine memory
- 36.8 Managing virtual machine snapshots
- 36.9 Suspending and resuming virtual machine execution
- 36.10 Live migration
- 36.11 QMP - QEMU machine protocol
- VI Troubleshooting
- Glossary
- A Virtual machine drivers
- B Configuring GPU Pass-Through for NVIDIA cards
- C XM, XL toolstacks, and the
libvirt
framework - D GNU licenses
List of Figures- 3.1 Xen virtualization architecture
- 4.1 KVM virtualization architecture
- 6.1 System Role screen
- 9.1 Connection details
- 9.2 Create virtual network
- 14.1 view of a VM Guest
- 14.2 Overview details
- 14.3 VM Guest title and description
- 14.4 Performance
- 14.5 Statistics charts
- 14.6 Processor view
- 14.7 Memory view
- 14.8 Boot options
- 14.9 Add a new storage
- 14.10 Add a new controller
- 14.11 Add a new network interface
- 14.12 Add a new input device
- 14.13 Add a new video device
- 14.14 Add a new USB redirector
- 14.15 Adding a PCI device
- 14.16 Adding a USB device
- 18.1 Caching mechanism
- 28.1 Boot loader settings
- 33.1 Installing the KVM hypervisor and tools
- 33.2 Network bridge
- 35.1 QEMU window with SLES as VM Guest
- 35.2 QEMU VNC session
- 35.3 Authentication dialog in Remmina
List of Tables- 7.1 KVM VM limits
- 7.2 Xen VM limits
- 7.3 Xen host limits
- 7.4 The following SUSE host environments are supported
- 7.5 Offline supported migrating guests from SUSE Linux Enterprise Server 12 SP3
- 7.6 Offline supported migrating guests from SUSE Linux Enterprise Server 12 SP4
- 7.7 Offline supported migrating guests from SUSE Linux Enterprise Server 12 SP5
- 7.8 Offline supported migrating guests from SUSE Linux Enterprise Server 15 GA
- 7.9 Offline supported migrating guests from SUSE Linux Enterprise Server 15 SP1
- 7.10 Offline supported migrating guests from SUSE Linux Enterprise Server 15 SP2
- 7.11 Supported live-migrating guests from SLES 12 SP3
- 7.12 supported live-migrating guests from SLES 12 SP4
- 7.13 Supported live-migrating guests from SLES 12 SP5
- 7.14 Supported live-migrating guests from SLES 15
- 7.15 Supported live-migrating guests from SLES 15 SP1
- 7.16 Supported live-migrating guests from SLES 15 SP2
- 7.17 Supported live-migrating guests from SLES 15 SP3
- 7.18 Feature support—host (
Dom0
) - 7.19 Feature support—paravirtualized guest
- 7.20 Feature support—fully virtualized guest
- 30.1 Xen remote storage
- C.1 Notation conventions
- C.2 New global options
- C.3 Common options
- C.4 Domain management removed options
- C.5 USB devices management removed options
- C.6 CPU management removed options
- C.7 Other options
- C.8
xl
create
Changed options - C.9
xm
create
Removed options - C.10
xl
create
Added options - C.11
xl
console
Added options - C.12
xm
info
Removed options - C.13
xm
dump-core
Removed options - C.14
xm
list
Removed options - C.15
xl
list
Added options - C.16
xl
mem-*
Changed options - C.17
xm
migrate
Removed options - C.18
xl
migrate
Added options - C.19
xm
reboot
Removed options - C.20
xl
reboot
Added options - C.21
xl
save
Added options - C.22
xl
restore
Added options - C.23
xm
shutdown
Removed options - C.24
xl
shutdown
Added options - C.25
xl
trigger
Changed options - C.26
xm
sched-credit
Removed options - C.27
xl
sched-credit
Added options - C.28
xm
sched-credit2
Removed options - C.29
xl
sched-credit2
Added options - C.30
xm
sched-sedf
removed options - C.31
xl
sched-sedf
added options - C.32
xm
cpupool-list
removed options - C.33
xm
cpupool-create
removed options - C.34
xl
pci-detach
added options - C.35
xm
block-list
removed options - C.36 Other options
- C.37 Network options
- C.38
xl
network-attach
removed options - C.39 New options
List of Examples- 9.1 NAT-based network
- 9.2 Routed network
- 9.3 Isolated network
- 9.4 Using an existing bridge on VM Host Server
- 10.1 Loading kernel and initrd from HTTP server
- 10.2 Example of a
virt-install
command line - 11.1 Typical output of
kvm_stat
- 15.1 Example XML configuration file
- 25.1 Guest domain configuration file for SLED 12:
/etc/xen/sled12.cfg
- 33.1 Exporting host's file system with VirtFS
- 35.1 Restricted user-mode networking
- 35.2 User-mode networking with custom IP range
- 35.3 User-mode networking with network-boot and TFTP
- 35.4 User-mode networking with host port forwarding
- 35.5 Password authentication
- 35.6 x509 certificate authentication
- 35.7 x509 certificate and password authentication
- 35.8 SASL authentication
- C.1 Converting Xen domain configuration to
libvirt
Copyright © 2006–2023 diff --git a/SLE15SP3/html/SLES-virtualization/index.html b/SLE15SP3/html/SLES-virtualization/index.html index 8f2faea6d56..12949c762d2 100644 --- a/SLE15SP3/html/SLES-virtualization/index.html +++ b/SLE15SP3/html/SLES-virtualization/index.html @@ -38,7 +38,7 @@ general. It introduces libvirt—the unified interface to virtualization—and provides detailed information on specific hypervisors.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I Introduction
- II Managing virtual machines with
libvirt
- 8 Starting and stopping
libvirtd
- 9 Preparing the VM Host Server
- 10 Guest installation
- 11 Basic VM Guest management
- 12 Connecting and authorizing
- 13 Advanced storage topics
- 14 Configuring virtual machines with Virtual Machine Manager
- 14.1 Machine setup
- 14.2 Storage
- 14.3 Controllers
- 14.4 Networking
- 14.5 Input devices
- 14.6 Video
- 14.7 USB redirectors
- 14.8 Miscellaneous
- 14.9 Adding a CD/DVD-ROM device with Virtual Machine Manager
- 14.10 Adding a floppy device with Virtual Machine Manager
- 14.11 Ejecting and changing floppy or CD/DVD-ROM media with Virtual Machine Manager
- 14.12 Assigning a host PCI device to a VM Guest
- 14.13 Assigning a host USB device to a VM Guest
- 15 Configuring virtual machines with
virsh
- 15.1 Editing the VM configuration
- 15.2 Changing the machine type
- 15.3 Configuring hypervisor features
- 15.4 Configuring CPU
- 15.5 Changing boot options
- 15.6 Configuring memory allocation
- 15.7 Adding a PCI device
- 15.8 Adding a USB device
- 15.9 Adding SR-IOV devices
- 15.10 Listing attached devices
- 15.11 Configuring storage devices
- 15.12 Configuring controller devices
- 15.13 Configuring video devices
- 15.14 Configuring network devices
- 15.15 Using macvtap to share VM Host Server network interfaces
- 15.16 Disabling a memory balloon device
- 15.17 Configuring multiple monitors (dual head)
- 15.18 Crypto adapter pass-through to KVM guests on IBM Z
- 16 Managing virtual machines with Vagrant
- 17 Xen to KVM migration guide
- 8 Starting and stopping
- III Hypervisor-independent features
- IV Managing virtual machines with Xen
- 23 Setting up a virtual machine host
- 24 Virtual networking
- 25 Managing a virtualization environment
- 26 Block devices in Xen
- 27 Virtualization: configuration options and settings
- 28 Administrative tasks
- 29 XenStore: configuration database shared between domains
- 30 Xen as a high-availability virtualization host
- 31 Xen: converting a paravirtual (PV) guest into a fully virtual (FV/HVM) guest
- V Managing virtual machines with QEMU
- 32 QEMU overview
- 33 Setting up a KVM VM Host Server
- 34 Guest installation
- 35 Running virtual machines with qemu-system-ARCH
- 36 Virtual machine administration using QEMU monitor
- 36.1 Accessing monitor console
- 36.2 Getting information about the guest system
- 36.3 Changing VNC password
- 36.4 Managing devices
- 36.5 Controlling keyboard and mouse
- 36.6 Changing available memory
- 36.7 Dumping virtual machine memory
- 36.8 Managing virtual machine snapshots
- 36.9 Suspending and resuming virtual machine execution
- 36.10 Live migration
- 36.11 QMP - QEMU machine protocol
- VI Troubleshooting
- Glossary
- A Virtual machine drivers
- B Configuring GPU Pass-Through for NVIDIA cards
- C XM, XL toolstacks, and the
libvirt
framework - D GNU licenses
List of Figures- 3.1 Xen virtualization architecture
- 4.1 KVM virtualization architecture
- 6.1 System Role screen
- 9.1 Connection details
- 9.2 Create virtual network
- 14.1 view of a VM Guest
- 14.2 Overview details
- 14.3 VM Guest title and description
- 14.4 Performance
- 14.5 Statistics charts
- 14.6 Processor view
- 14.7 Memory view
- 14.8 Boot options
- 14.9 Add a new storage
- 14.10 Add a new controller
- 14.11 Add a new network interface
- 14.12 Add a new input device
- 14.13 Add a new video device
- 14.14 Add a new USB redirector
- 14.15 Adding a PCI device
- 14.16 Adding a USB device
- 18.1 Caching mechanism
- 28.1 Boot loader settings
- 33.1 Installing the KVM hypervisor and tools
- 33.2 Network bridge
- 35.1 QEMU window with SLES as VM Guest
- 35.2 QEMU VNC session
- 35.3 Authentication dialog in Remmina
List of Tables- 7.1 KVM VM limits
- 7.2 Xen VM limits
- 7.3 Xen host limits
- 7.4 The following SUSE host environments are supported
- 7.5 Offline supported migrating guests from SUSE Linux Enterprise Server 12 SP3
- 7.6 Offline supported migrating guests from SUSE Linux Enterprise Server 12 SP4
- 7.7 Offline supported migrating guests from SUSE Linux Enterprise Server 12 SP5
- 7.8 Offline supported migrating guests from SUSE Linux Enterprise Server 15 GA
- 7.9 Offline supported migrating guests from SUSE Linux Enterprise Server 15 SP1
- 7.10 Offline supported migrating guests from SUSE Linux Enterprise Server 15 SP2
- 7.11 Supported live-migrating guests from SLES 12 SP3
- 7.12 supported live-migrating guests from SLES 12 SP4
- 7.13 Supported live-migrating guests from SLES 12 SP5
- 7.14 Supported live-migrating guests from SLES 15
- 7.15 Supported live-migrating guests from SLES 15 SP1
- 7.16 Supported live-migrating guests from SLES 15 SP2
- 7.17 Supported live-migrating guests from SLES 15 SP3
- 7.18 Feature support—host (
Dom0
) - 7.19 Feature support—paravirtualized guest
- 7.20 Feature support—fully virtualized guest
- 30.1 Xen remote storage
- C.1 Notation conventions
- C.2 New global options
- C.3 Common options
- C.4 Domain management removed options
- C.5 USB devices management removed options
- C.6 CPU management removed options
- C.7 Other options
- C.8
xl
create
Changed options - C.9
xm
create
Removed options - C.10
xl
create
Added options - C.11
xl
console
Added options - C.12
xm
info
Removed options - C.13
xm
dump-core
Removed options - C.14
xm
list
Removed options - C.15
xl
list
Added options - C.16
xl
mem-*
Changed options - C.17
xm
migrate
Removed options - C.18
xl
migrate
Added options - C.19
xm
reboot
Removed options - C.20
xl
reboot
Added options - C.21
xl
save
Added options - C.22
xl
restore
Added options - C.23
xm
shutdown
Removed options - C.24
xl
shutdown
Added options - C.25
xl
trigger
Changed options - C.26
xm
sched-credit
Removed options - C.27
xl
sched-credit
Added options - C.28
xm
sched-credit2
Removed options - C.29
xl
sched-credit2
Added options - C.30
xm
sched-sedf
removed options - C.31
xl
sched-sedf
added options - C.32
xm
cpupool-list
removed options - C.33
xm
cpupool-create
removed options - C.34
xl
pci-detach
added options - C.35
xm
block-list
removed options - C.36 Other options
- C.37 Network options
- C.38
xl
network-attach
removed options - C.39 New options
List of Examples- 9.1 NAT-based network
- 9.2 Routed network
- 9.3 Isolated network
- 9.4 Using an existing bridge on VM Host Server
- 10.1 Loading kernel and initrd from HTTP server
- 10.2 Example of a
virt-install
command line - 11.1 Typical output of
kvm_stat
- 15.1 Example XML configuration file
- 25.1 Guest domain configuration file for SLED 12:
/etc/xen/sled12.cfg
- 33.1 Exporting host's file system with VirtFS
- 35.1 Restricted user-mode networking
- 35.2 User-mode networking with custom IP range
- 35.3 User-mode networking with network-boot and TFTP
- 35.4 User-mode networking with host port forwarding
- 35.5 Password authentication
- 35.6 x509 certificate authentication
- 35.7 x509 certificate and password authentication
- 35.8 SASL authentication
- C.1 Converting Xen domain configuration to
libvirt
Copyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLED-administration/book-administration_draft.html b/SLE15SP3/single-html/SLED-administration/book-administration_draft.html index 3737622ae2c..4db7f6122f1 100644 --- a/SLE15SP3/single-html/SLED-administration/book-administration_draft.html +++ b/SLE15SP3/single-html/SLED-administration/book-administration_draft.html @@ -39,7 +39,7 @@ like maintaining, monitoring and customizing an initially installed system.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I Common tasks
- 1 Bash and Bash scripts
- 2
sudo
basics - 3 Using YaST
- 4 YaST in text mode
- 5 YaST online update
- 6 Managing software with command line tools
- 7 System recovery and snapshot management with Snapper
- 7.1 Default setup
- 7.2 Using Snapper to undo changes
- 7.3 System rollback by booting from snapshots
- 7.4 Enabling Snapper in user home directories
- 7.5 Creating and modifying Snapper configurations
- 7.6 Manually creating and managing snapshots
- 7.7 Automatic snapshot clean-up
- 7.8 Showing exclusive disk space used by snapshots
- 7.9 Frequently asked questions
- 8 Live kernel patching with KLP
- 9 Transactional updates
- 10 Remote graphical sessions with VNC
- 11 File copying with RSync
- II Booting a Linux system
- III System
- 16 32-bit and 64-bit applications in a 64-bit system environment
- 17
journalctl
: Query thesystemd
journal - 18
update-alternatives
: Managing multiple versions of commands and files - 19 Basic networking
- 20 Printer operation
- 21 Graphical user interface
- 22 Accessing file systems with FUSE
- 23 Managing kernel modules
- 24 Dynamic kernel device management with
udev
- 24.1 The
/dev
directory - 24.2 Kernel
uevents
andudev
- 24.3 Drivers, kernel modules and devices
- 24.4 Booting and initial device setup
- 24.5 Monitoring the running
udev
daemon - 24.6 Influencing kernel device event handling with
udev
rules - 24.7 Persistent device naming
- 24.8 Files used by
udev
- 24.9 More information
- 24.1 The
- 25 Special system features
- 26 Using NetworkManager
- 27 Power management
- 28 Persistent memory
- IV Services
- V Troubleshooting
- A An example network
- B GNU licenses
List of Figures- 4.1 Main window of YaST in text mode
- 4.2 The software installation module
- 5.1 YaST online update
- 5.2 Viewing retracted patches and history
- 5.3 YaST online update configuration
- 7.1 Boot loader: snapshots
- 10.1 vncviewer
- 10.2 Remmina's main window
- 10.3 Remote desktop preference
- 10.4 Quick-starting
- 10.5 Remmina viewing remote session
- 10.6 Reading path to the profile file
- 10.7 Remote administration
- 10.8 VNC session settings
- 10.9 Joining a persistent VNC session
- 13.1 Secure boot support
- 13.2 UEFI: secure boot process
- 14.1 GRUB 2 boot editor
- 14.2 Boot code options
- 14.3 Code options
- 14.4 Boot loader options
- 14.5 Kernel parameters
- 15.1 Services Manager
- 17.1 YaST systemd journal
- 19.1 Simplified layer model for TCP/IP
- 19.2 TCP/IP ethernet packet
- 19.3 Configuring network settings
- 19.4
wicked
architecture - 21.1 Warning about a missing GNOME Shell extension
- 21.2 GNOME gTile extension activated
- 21.3 gTile tray icon
- 26.1 GNOME Network Connections dialog
- 26.2
firewalld
zones in NetworkManager - 29.1 YaST service manager
- 30.1 NTP configuration window
- 30.2 Adding a time server
- 32.1 HTML report generated by SCA tool
- 32.2 HTML report generated by SCA appliance
List of Tables- 1.1 Bash configuration files for login shells
- 1.2 Bash configuration files for non-login shells
- 1.3 Special files for Bash
- 1.4 Overview of a standard directory tree
- 1.5 Useful environment variables
- 6.1 Essential RPM query options
- 6.2 RPM verify options
- 15.1 Service management commands
- 15.2 Commands for enabling and disabling services
- 15.3 System V runlevels and
systemd
target units - 19.1 Private IP address domains
- 19.2 Parameters for /etc/host.conf
- 19.3 Databases available via /etc/nsswitch.conf
- 19.4 Configuration options for NSS “databases”
- 19.5 Feature comparison between bonding and team
- 21.1 Generating PFL from fontconfig rules
- 21.2 Results from generating PFL from fontconfig rules with changed order
- 21.3 Results from generating PFL from fontconfig rules
- 25.1
ulimit
: Setting resources for the user - 31.1 Man pages—categories and descriptions
- 32.1 Comparison of features and file names in the TAR archive
- 33.1 Log files
- 33.2 System information with the
/proc
file system - 33.3 System information with the
/sys
file system
List of Examples- 1.1 A shell script printing a text
- 6.1 Zypper—list of known repositories
- 6.2
rpm -q -i wget
- 6.3 Script to search for packages
- 7.1 Example timeline configuration
- 14.1 Usage of grub2-mkconfig
- 14.2 Usage of grub2-mkrescue
- 14.3 Usage of grub2-script-check
- 14.4 Usage of grub2-once
- 15.1 List active services
- 15.2 List failed services
- 15.3 List all processes belonging to a service
- 18.1 Alternatives System of the
java
command - 19.1 Writing IP addresses
- 19.2 Linking IP addresses to the netmask
- 19.3 Sample IPv6 address
- 19.4 IPv6 address specifying the prefix length
- 19.5 Common network interfaces and some static routes
- 19.6
/var/run/netconfig/resolv.conf
- 19.7
/etc/hosts
- 19.8
/etc/networks
- 19.9
/etc/host.conf
- 19.10
/etc/nsswitch.conf
- 19.11 Output of the command ping
- 19.12 Configuration for load balancing with Network Teaming
- 19.13 Configuration for DHCP Network Teaming device
- 20.1 Error message from
lpd
- 20.2 Broadcast from the CUPS network server
- 21.1 Specifying rendering algorithms
- 21.2 Aliases and family name substitutions
- 21.3 Aliases and family name substitutions
- 21.4 Aliases and family names substitutions
- 24.1 Example
udev
rules - 25.1 Entry in /etc/crontab
- 25.2 /etc/crontab: remove time stamp files
- 25.3
ulimit
: Settings in~/.bashrc
- 32.1 Output of
hostinfo
when logging in asroot
Copyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLED-administration/index.html b/SLE15SP3/single-html/SLED-administration/index.html index 3737622ae2c..4db7f6122f1 100644 --- a/SLE15SP3/single-html/SLED-administration/index.html +++ b/SLE15SP3/single-html/SLED-administration/index.html @@ -39,7 +39,7 @@ like maintaining, monitoring and customizing an initially installed system.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I Common tasks
- 1 Bash and Bash scripts
- 2
sudo
basics - 3 Using YaST
- 4 YaST in text mode
- 5 YaST online update
- 6 Managing software with command line tools
- 7 System recovery and snapshot management with Snapper
- 7.1 Default setup
- 7.2 Using Snapper to undo changes
- 7.3 System rollback by booting from snapshots
- 7.4 Enabling Snapper in user home directories
- 7.5 Creating and modifying Snapper configurations
- 7.6 Manually creating and managing snapshots
- 7.7 Automatic snapshot clean-up
- 7.8 Showing exclusive disk space used by snapshots
- 7.9 Frequently asked questions
- 8 Live kernel patching with KLP
- 9 Transactional updates
- 10 Remote graphical sessions with VNC
- 11 File copying with RSync
- II Booting a Linux system
- III System
- 16 32-bit and 64-bit applications in a 64-bit system environment
- 17
journalctl
: Query thesystemd
journal - 18
update-alternatives
: Managing multiple versions of commands and files - 19 Basic networking
- 20 Printer operation
- 21 Graphical user interface
- 22 Accessing file systems with FUSE
- 23 Managing kernel modules
- 24 Dynamic kernel device management with
udev
- 24.1 The
/dev
directory - 24.2 Kernel
uevents
andudev
- 24.3 Drivers, kernel modules and devices
- 24.4 Booting and initial device setup
- 24.5 Monitoring the running
udev
daemon - 24.6 Influencing kernel device event handling with
udev
rules - 24.7 Persistent device naming
- 24.8 Files used by
udev
- 24.9 More information
- 24.1 The
- 25 Special system features
- 26 Using NetworkManager
- 27 Power management
- 28 Persistent memory
- IV Services
- V Troubleshooting
- A An example network
- B GNU licenses
List of Figures- 4.1 Main window of YaST in text mode
- 4.2 The software installation module
- 5.1 YaST online update
- 5.2 Viewing retracted patches and history
- 5.3 YaST online update configuration
- 7.1 Boot loader: snapshots
- 10.1 vncviewer
- 10.2 Remmina's main window
- 10.3 Remote desktop preference
- 10.4 Quick-starting
- 10.5 Remmina viewing remote session
- 10.6 Reading path to the profile file
- 10.7 Remote administration
- 10.8 VNC session settings
- 10.9 Joining a persistent VNC session
- 13.1 Secure boot support
- 13.2 UEFI: secure boot process
- 14.1 GRUB 2 boot editor
- 14.2 Boot code options
- 14.3 Code options
- 14.4 Boot loader options
- 14.5 Kernel parameters
- 15.1 Services Manager
- 17.1 YaST systemd journal
- 19.1 Simplified layer model for TCP/IP
- 19.2 TCP/IP ethernet packet
- 19.3 Configuring network settings
- 19.4
wicked
architecture - 21.1 Warning about a missing GNOME Shell extension
- 21.2 GNOME gTile extension activated
- 21.3 gTile tray icon
- 26.1 GNOME Network Connections dialog
- 26.2
firewalld
zones in NetworkManager - 29.1 YaST service manager
- 30.1 NTP configuration window
- 30.2 Adding a time server
- 32.1 HTML report generated by SCA tool
- 32.2 HTML report generated by SCA appliance
List of Tables- 1.1 Bash configuration files for login shells
- 1.2 Bash configuration files for non-login shells
- 1.3 Special files for Bash
- 1.4 Overview of a standard directory tree
- 1.5 Useful environment variables
- 6.1 Essential RPM query options
- 6.2 RPM verify options
- 15.1 Service management commands
- 15.2 Commands for enabling and disabling services
- 15.3 System V runlevels and
systemd
target units - 19.1 Private IP address domains
- 19.2 Parameters for /etc/host.conf
- 19.3 Databases available via /etc/nsswitch.conf
- 19.4 Configuration options for NSS “databases”
- 19.5 Feature comparison between bonding and team
- 21.1 Generating PFL from fontconfig rules
- 21.2 Results from generating PFL from fontconfig rules with changed order
- 21.3 Results from generating PFL from fontconfig rules
- 25.1
ulimit
: Setting resources for the user - 31.1 Man pages—categories and descriptions
- 32.1 Comparison of features and file names in the TAR archive
- 33.1 Log files
- 33.2 System information with the
/proc
file system - 33.3 System information with the
/sys
file system
List of Examples- 1.1 A shell script printing a text
- 6.1 Zypper—list of known repositories
- 6.2
rpm -q -i wget
- 6.3 Script to search for packages
- 7.1 Example timeline configuration
- 14.1 Usage of grub2-mkconfig
- 14.2 Usage of grub2-mkrescue
- 14.3 Usage of grub2-script-check
- 14.4 Usage of grub2-once
- 15.1 List active services
- 15.2 List failed services
- 15.3 List all processes belonging to a service
- 18.1 Alternatives System of the
java
command - 19.1 Writing IP addresses
- 19.2 Linking IP addresses to the netmask
- 19.3 Sample IPv6 address
- 19.4 IPv6 address specifying the prefix length
- 19.5 Common network interfaces and some static routes
- 19.6
/var/run/netconfig/resolv.conf
- 19.7
/etc/hosts
- 19.8
/etc/networks
- 19.9
/etc/host.conf
- 19.10
/etc/nsswitch.conf
- 19.11 Output of the command ping
- 19.12 Configuration for load balancing with Network Teaming
- 19.13 Configuration for DHCP Network Teaming device
- 20.1 Error message from
lpd
- 20.2 Broadcast from the CUPS network server
- 21.1 Specifying rendering algorithms
- 21.2 Aliases and family name substitutions
- 21.3 Aliases and family name substitutions
- 21.4 Aliases and family names substitutions
- 24.1 Example
udev
rules - 25.1 Entry in /etc/crontab
- 25.2 /etc/crontab: remove time stamp files
- 25.3
ulimit
: Settings in~/.bashrc
- 32.1 Output of
hostinfo
when logging in asroot
Copyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLED-deployment/book-deployment_draft.html b/SLE15SP3/single-html/SLED-deployment/book-deployment_draft.html index 43ec0cb461e..2bff95265ef 100644 --- a/SLE15SP3/single-html/SLED-deployment/book-deployment_draft.html +++ b/SLE15SP3/single-html/SLED-deployment/book-deployment_draft.html @@ -39,7 +39,7 @@ systems, and how to exploit the product-inherent capabilities for a deployment infrastructure.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I Installation preparation
- II Installation procedure
- 3 Boot parameters
- 4 Installation steps
- 4.1 Overview
- 4.2 Installer self-update
- 4.3 Language, keyboard, and product selection diff --git a/SLE15SP3/single-html/SLED-deployment/index.html b/SLE15SP3/single-html/SLED-deployment/index.html index 43ec0cb461e..2bff95265ef 100644 --- a/SLE15SP3/single-html/SLED-deployment/index.html +++ b/SLE15SP3/single-html/SLED-deployment/index.html @@ -39,7 +39,7 @@ systems, and how to exploit the product-inherent capabilities for a deployment infrastructure.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I Installation preparation
- II Installation procedure
- 3 Boot parameters
- 4 Installation steps
- 4.1 Overview
- 4.2 Installer self-update
- 4.3
Language, keyboard, and product selection
diff --git a/SLE15SP3/single-html/SLED-gnome-user/book-gnome-user_draft.html b/SLE15SP3/single-html/SLED-gnome-user/book-gnome-user_draft.html
index aa80deccd96..fa31e77461a 100644
--- a/SLE15SP3/single-html/SLED-gnome-user/book-gnome-user_draft.html
+++ b/SLE15SP3/single-html/SLED-gnome-user/book-gnome-user_draft.html
@@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 2.14 More information
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- 9 LibreOffice: the office suite
- 9.1 LibreOffice modules
- 9.2 Starting LibreOffice
- 9.3 The LibreOffice user interface
- 9.4 Compatibility with other office applications
- 9.5 Saving files with a password
- 9.6 Signing documents
- 9.7 Customizing LibreOffice
- 9.8 Changing the global settings
- 9.9 Using templates
- 9.10 Setting metadata and properties
- 9.11 More information
- 10 LibreOffice Writer
- 11 LibreOffice Calc
- 12 LibreOffice Impress, Base, Draw, and Math
- 9 LibreOffice: the office suite
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 Keyboard shortcut dialog
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Single monitor settings dialog
- 3.6 Configuring sound settings
- 3.7 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
- 13.1 The browser window of Firefox
- 13.2 Firefox—manage search engines
- 13.3 The Firefox bookmark library
- 13.4 The Firefox page info window
- 13.5 The preferences window
- 13.6 Installing Firefox extensions
- 14.1 Evolution window
- 16.1 Ekiga user interface
- 17.1 The toolbox
- 17.2 The basic color selector dialog
- 17.3 The print dialog
- 18.1 start-up window
- 18.2 general preferences
- 18.3 display preferences
- 18.4 audio preferences
- 19.1 Main view of Brasero
- A.1 Main window of Help
List of TablesList of Examplesdiff --git a/SLE15SP3/single-html/SLED-gnome-user/index.html b/SLE15SP3/single-html/SLED-gnome-user/index.html index aa80deccd96..fa31e77461a 100644 --- a/SLE15SP3/single-html/SLED-gnome-user/index.html +++ b/SLE15SP3/single-html/SLED-gnome-user/index.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 2.14 More information
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- 9 LibreOffice: the office suite
- 9.1 LibreOffice modules
- 9.2 Starting LibreOffice
- 9.3 The LibreOffice user interface
- 9.4 Compatibility with other office applications
- 9.5 Saving files with a password
- 9.6 Signing documents
- 9.7 Customizing LibreOffice
- 9.8 Changing the global settings
- 9.9 Using templates
- 9.10 Setting metadata and properties
- 9.11 More information
- 10 LibreOffice Writer
- 11 LibreOffice Calc
- 12 LibreOffice Impress, Base, Draw, and Math
- 9 LibreOffice: the office suite
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 Keyboard shortcut dialog
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Single monitor settings dialog
- 3.6 Configuring sound settings
- 3.7 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
- 13.1 The browser window of Firefox
- 13.2 Firefox—manage search engines
- 13.3 The Firefox bookmark library
- 13.4 The Firefox page info window
- 13.5 The preferences window
- 13.6 Installing Firefox extensions
- 14.1 Evolution window
- 16.1 Ekiga user interface
- 17.1 The toolbox
- 17.2 The basic color selector dialog
- 17.3 The print dialog
- 18.1 start-up window
- 18.2 general preferences
- 18.3 display preferences
- 18.4 audio preferences
- 19.1 Main view of Brasero
- A.1 Main window of Help
List of TablesList of Examplesdiff --git a/SLE15SP3/single-html/SLED-installation/article-installation_draft.html b/SLE15SP3/single-html/SLED-installation/article-installation_draft.html index 3723f82970c..f7ff1a7aa64 100644 --- a/SLE15SP3/single-html/SLED-installation/article-installation_draft.html +++ b/SLE15SP3/single-html/SLED-installation/article-installation_draft.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP3Installation Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start guides you step-by-step diff --git a/SLE15SP3/single-html/SLED-installation/index.html b/SLE15SP3/single-html/SLED-installation/index.html index 3723f82970c..f7ff1a7aa64 100644 --- a/SLE15SP3/single-html/SLED-installation/index.html +++ b/SLE15SP3/single-html/SLED-installation/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP3Installation Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start guides you step-by-step diff --git a/SLE15SP3/single-html/SLED-modules/article-modules_draft.html b/SLE15SP3/single-html/SLED-modules/article-modules_draft.html index d0762df4d17..39889a0a1c1 100644 --- a/SLE15SP3/single-html/SLED-modules/article-modules_draft.html +++ b/SLE15SP3/single-html/SLED-modules/article-modules_draft.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP3Modules and Extensions Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start gives you an overview of the diff --git a/SLE15SP3/single-html/SLED-modules/index.html b/SLE15SP3/single-html/SLED-modules/index.html index d0762df4d17..39889a0a1c1 100644 --- a/SLE15SP3/single-html/SLED-modules/index.html +++ b/SLE15SP3/single-html/SLED-modules/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Desktop 15 SP3Modules and Extensions Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start gives you an overview of the diff --git a/SLE15SP3/single-html/SLED-security/book-security_draft.html b/SLE15SP3/single-html/SLED-security/book-security_draft.html index 3dd77368ae1..fa0ff1085b9 100644 --- a/SLE15SP3/single-html/SLED-security/book-security_draft.html +++ b/SLE15SP3/single-html/SLED-security/book-security_draft.html @@ -38,7 +38,7 @@ security and describes the usage of security software included with the product, such as AppArmor, SELinux, or the auditing system. The guide also supports system administrators in hardening an installation.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- 1 Security and confidentiality
- I Authentication
- 2 Authentication with PAM
- 3 Using NIS
- 4 Setting up authentication clients using YaST
- 5 LDAP with 389 Directory Server
- 5.1 Structure of an LDAP directory tree
- 5.2 Installing 389 Directory Server
- 5.3 Firewall configuration
- 5.4 Backing up and restoring 389 Directory Server
- 5.5 Managing LDAP users and groups
- 5.6 Using SSSD to manage LDAP authentication
- 5.7 Managing modules
- 5.8 Migrating to 389 Directory Server from OpenLDAP
- 5.9 Importing TLS server certificates and keys
- 5.10 Setting up replication
- 5.11 Synchronizing with Microsoft Active Directory
- 5.12 More information
- 6 Network authentication with Kerberos
- 7 Active Directory support
- 8 Setting up a freeRADIUS server
- II Local security
- 9 Physical security
- 10 Software management
- 11 File management
- 12 Encrypting partitions and files
- 13 Storage encryption for hosted applications with cryptctl
- 14 User management
- 14.1 Various account checks
- 14.2 Enabling password aging
- 14.3 Stronger password enforcement
- 14.4 Password and login management with PAM
- 14.5 Restricting
root
logins - 14.6 Restricting
sudo
users - 14.7 Setting an inactivity timeout for interactive shell sessions
- 14.8 Preventing accidental denial of service
- 14.9 Displaying login banners
- 14.10 Connection accounting utilities
- 15 Restricting
cron
andat
- 16 Spectre/Meltdown checker
- 17 Configuring security settings with YaST
- 18 The Polkit authentication framework
- 19 Access control lists in Linux
- 20 Intrusion detection with AIDE
- III Network security
- 21 X Window System and X authentication
- 22 Securing network operations with OpenSSH
- 22.1 OpenSSH overview
- 22.2 Server hardening
- 22.3 Password authentication
- 22.4 Managing user and host encryption keys
- 22.5 Rotating host keys
- 22.6 Public key authentication
- 22.7 Passphrase-less public key authentication
- 22.8 OpenSSH certificate authentication
- 22.9 Automated public key logins with gnome-keyring
- 22.10 Automated public key logins in the console with ssh-agent
- 22.11 Changing an SSH private key passphrase
- 22.12 Retrieving a key fingerprint
- 22.13 Starting X11 applications on a remote host
- 22.14 Agent forwarding
- 22.15
scp
—secure copy - 22.16
sftp
—secure file transfer - 22.17 Port forwarding (SSH tunneling)
- 22.18 More information
- 23 Masquerading and firewalls
- 24 Configuring a VPN server
- 25 Managing a PKI with XCA, X certificate and key manager
- 26 Improving network security with
sysctl
variables
- IV Regulations and Compliance
- V Confining privileges with AppArmor
- 29 Introducing AppArmor
- 30 Getting started
- 31 Immunizing programs
- 32 Profile components and syntax
- 32.1 Breaking an AppArmor profile into its parts
- 32.2 Profile types
- 32.3 Include statements
- 32.4 Capability entries (POSIX.1e)
- 32.5 Network access control
- 32.6 Profile names, flags, paths, and globbing
- 32.7 File permission access modes
- 32.8 Mount rules
- 32.9 Pivot root rules
- 32.10 PTrace rules
- 32.11 Signal rules
- 32.12 Execute modes
- 32.13 Resource limit control
- 32.14 Auditing rules
- 33 AppArmor profile repositories
- 34 Building and managing profiles with YaST
- 35 Building profiles from the command line
- 36 Profiling your Web applications using ChangeHat
- 37 Confining users with
pam_apparmor
- 38 Managing profiled applications
- 39 Support
- 40 AppArmor glossary
- VI The Linux Audit Framework
- 41 Understanding Linux audit
- 41.1 Introducing the components of Linux audit
- 41.2 Configuring the audit daemon
- 41.3 Controlling the audit system using
auditctl
- 41.4 Passing parameters to the audit system
- 41.5 Understanding the audit logs and generating reports
- 41.6 Querying the audit daemon logs with
ausearch
- 41.7 Analyzing processes with
autrace
- 41.8 Visualizing audit data
- 41.9 Relaying audit event notifications
- 42 Setting up the Linux audit framework
- 43 Introducing an audit rule set
- 43.1 Adding basic audit configuration parameters
- 43.2 Adding watches on audit log files and configuration files
- 43.3 Monitoring file system objects
- 43.4 Monitoring security configuration files and databases
- 43.5 Monitoring miscellaneous system calls
- 43.6 Filtering system call arguments
- 43.7 Managing audit event records using keys
- 44 Useful resources
- 41 Understanding Linux audit
- A GNU licenses
List of Figures- 3.1 Setting domain and address of a NIS server
- 5.1 Structure of an LDAP directory
- 7.1 Schema of Winbind-based Active Directory authentication
- 7.2 Main window of
- 7.3 Enrolling into a domain
- 7.4 Configuration window of
- 7.5 Determining Windows domain membership
- 7.6 Providing administrator credentials
- 13.1 Key retrieval with
cryptctl
(model without connection to KMIP server) - 16.1 Output from spectre-meltdown-checker
- 17.1 YaST security center and hardening: security overview
- 19.1 Minimum ACL: ACL entries compared to permission bits
- 19.2 Extended ACL: ACL entries compared to permission bits
- 23.1 iptables: a packet's possible paths
- 24.1 Routed VPN
- 24.2 Bridged VPN - scenario 1
- 24.3 Bridged VPN - scenario 2
- 24.4 Bridged VPN - scenario 3
- 25.1 Create a new XCA database
- 35.1
aa-notify Message in GNOME
- 36.1 Adminer login page
- 41.1 Introducing the components of Linux audit
- 41.2 Flow graph—program versus system call relationship
- 41.3 Bar chart—common event types
List of Tables- 5.1 Commonly used object classes and attributes
- 14.1 Sample rules/constraints for password enforcement
- 19.1 ACL entry types
- 19.2 Masking access permissions
- 20.1 Important AIDE check boxes
- 22.1
- 23.1 Important sysconfig variables for static port configuration
- 39.1 Man pages: sections and categories
- 41.1 Audit status flags
List of Examples- 2.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default configuration for the
auth
section (common-auth
) - 2.3 Default configuration for the
account
section (common-account
) - 2.4 Default configuration for the
password
section (common-password
) - 2.5 Default configuration for the
session
section (common-session
) - 2.6 pam_env.conf
- 5.1 Excerpt from CN=schema
- 5.2 Minimal 389 Directory Server instance configuration file
- 5.3 A
.dsrc
file for local administration - 5.4 Two supplier replicas
- 5.5 Four supplier replicas
- 5.6 Six replicas
- 5.7 Six replicas with read-only consumers
- 22.1 Example sshd.conf
- 23.1 Callback port configuration for the
nfs
kernel module in/etc/modprobe.d/60-nfs.conf
- 23.2 Commands to define a new
firewalld
RPC service for NFS - 24.1 VPN server configuration file
- 24.2 VPN client configuration file
- 30.1 Output of
aa-unconfined
- 35.1 Learning mode exception: controlling access to specific resources
- 35.2 Learning mode exception: defining permissions for an entry
- 41.1 Example output of
auditctl
-s
- 41.2 Example audit rules—audit system parameters
- 41.3 Example audit rules—file system auditing
- 41.4 Example audit rules—system call auditing
- 41.5 Deleting audit rules and events
- 41.6 Listing rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An advanced audit event—login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
Copyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLED-security/index.html b/SLE15SP3/single-html/SLED-security/index.html index 3dd77368ae1..fa0ff1085b9 100644 --- a/SLE15SP3/single-html/SLED-security/index.html +++ b/SLE15SP3/single-html/SLED-security/index.html @@ -38,7 +38,7 @@ security and describes the usage of security software included with the product, such as AppArmor, SELinux, or the auditing system. The guide also supports system administrators in hardening an installation.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- 1 Security and confidentiality
- I Authentication
- 2 Authentication with PAM
- 3 Using NIS
- 4 Setting up authentication clients using YaST
- 5 LDAP with 389 Directory Server
- 5.1 Structure of an LDAP directory tree
- 5.2 Installing 389 Directory Server
- 5.3 Firewall configuration
- 5.4 Backing up and restoring 389 Directory Server
- 5.5 Managing LDAP users and groups
- 5.6 Using SSSD to manage LDAP authentication
- 5.7 Managing modules
- 5.8 Migrating to 389 Directory Server from OpenLDAP
- 5.9 Importing TLS server certificates and keys
- 5.10 Setting up replication
- 5.11 Synchronizing with Microsoft Active Directory
- 5.12 More information
- 6 Network authentication with Kerberos
- 7 Active Directory support
- 8 Setting up a freeRADIUS server
- II Local security
- 9 Physical security
- 10 Software management
- 11 File management
- 12 Encrypting partitions and files
- 13 Storage encryption for hosted applications with cryptctl
- 14 User management
- 14.1 Various account checks
- 14.2 Enabling password aging
- 14.3 Stronger password enforcement
- 14.4 Password and login management with PAM
- 14.5 Restricting
root
logins - 14.6 Restricting
sudo
users - 14.7 Setting an inactivity timeout for interactive shell sessions
- 14.8 Preventing accidental denial of service
- 14.9 Displaying login banners
- 14.10 Connection accounting utilities
- 15 Restricting
cron
andat
- 16 Spectre/Meltdown checker
- 17 Configuring security settings with YaST
- 18 The Polkit authentication framework
- 19 Access control lists in Linux
- 20 Intrusion detection with AIDE
- III Network security
- 21 X Window System and X authentication
- 22 Securing network operations with OpenSSH
- 22.1 OpenSSH overview
- 22.2 Server hardening
- 22.3 Password authentication
- 22.4 Managing user and host encryption keys
- 22.5 Rotating host keys
- 22.6 Public key authentication
- 22.7 Passphrase-less public key authentication
- 22.8 OpenSSH certificate authentication
- 22.9 Automated public key logins with gnome-keyring
- 22.10 Automated public key logins in the console with ssh-agent
- 22.11 Changing an SSH private key passphrase
- 22.12 Retrieving a key fingerprint
- 22.13 Starting X11 applications on a remote host
- 22.14 Agent forwarding
- 22.15
scp
—secure copy - 22.16
sftp
—secure file transfer - 22.17 Port forwarding (SSH tunneling)
- 22.18 More information
- 23 Masquerading and firewalls
- 24 Configuring a VPN server
- 25 Managing a PKI with XCA, X certificate and key manager
- 26 Improving network security with
sysctl
variables
- IV Regulations and Compliance
- V Confining privileges with AppArmor
- 29 Introducing AppArmor
- 30 Getting started
- 31 Immunizing programs
- 32 Profile components and syntax
- 32.1 Breaking an AppArmor profile into its parts
- 32.2 Profile types
- 32.3 Include statements
- 32.4 Capability entries (POSIX.1e)
- 32.5 Network access control
- 32.6 Profile names, flags, paths, and globbing
- 32.7 File permission access modes
- 32.8 Mount rules
- 32.9 Pivot root rules
- 32.10 PTrace rules
- 32.11 Signal rules
- 32.12 Execute modes
- 32.13 Resource limit control
- 32.14 Auditing rules
- 33 AppArmor profile repositories
- 34 Building and managing profiles with YaST
- 35 Building profiles from the command line
- 36 Profiling your Web applications using ChangeHat
- 37 Confining users with
pam_apparmor
- 38 Managing profiled applications
- 39 Support
- 40 AppArmor glossary
- VI The Linux Audit Framework
- 41 Understanding Linux audit
- 41.1 Introducing the components of Linux audit
- 41.2 Configuring the audit daemon
- 41.3 Controlling the audit system using
auditctl
- 41.4 Passing parameters to the audit system
- 41.5 Understanding the audit logs and generating reports
- 41.6 Querying the audit daemon logs with
ausearch
- 41.7 Analyzing processes with
autrace
- 41.8 Visualizing audit data
- 41.9 Relaying audit event notifications
- 42 Setting up the Linux audit framework
- 43 Introducing an audit rule set
- 43.1 Adding basic audit configuration parameters
- 43.2 Adding watches on audit log files and configuration files
- 43.3 Monitoring file system objects
- 43.4 Monitoring security configuration files and databases
- 43.5 Monitoring miscellaneous system calls
- 43.6 Filtering system call arguments
- 43.7 Managing audit event records using keys
- 44 Useful resources
- 41 Understanding Linux audit
- A GNU licenses
List of Figures- 3.1 Setting domain and address of a NIS server
- 5.1 Structure of an LDAP directory
- 7.1 Schema of Winbind-based Active Directory authentication
- 7.2 Main window of
- 7.3 Enrolling into a domain
- 7.4 Configuration window of
- 7.5 Determining Windows domain membership
- 7.6 Providing administrator credentials
- 13.1 Key retrieval with
cryptctl
(model without connection to KMIP server) - 16.1 Output from spectre-meltdown-checker
- 17.1 YaST security center and hardening: security overview
- 19.1 Minimum ACL: ACL entries compared to permission bits
- 19.2 Extended ACL: ACL entries compared to permission bits
- 23.1 iptables: a packet's possible paths
- 24.1 Routed VPN
- 24.2 Bridged VPN - scenario 1
- 24.3 Bridged VPN - scenario 2
- 24.4 Bridged VPN - scenario 3
- 25.1 Create a new XCA database
- 35.1
aa-notify Message in GNOME
- 36.1 Adminer login page
- 41.1 Introducing the components of Linux audit
- 41.2 Flow graph—program versus system call relationship
- 41.3 Bar chart—common event types
List of Tables- 5.1 Commonly used object classes and attributes
- 14.1 Sample rules/constraints for password enforcement
- 19.1 ACL entry types
- 19.2 Masking access permissions
- 20.1 Important AIDE check boxes
- 22.1
- 23.1 Important sysconfig variables for static port configuration
- 39.1 Man pages: sections and categories
- 41.1 Audit status flags
List of Examples- 2.1 PAM configuration for sshd (
/etc/pam.d/sshd
) - 2.2 Default configuration for the
auth
section (common-auth
) - 2.3 Default configuration for the
account
section (common-account
) - 2.4 Default configuration for the
password
section (common-password
) - 2.5 Default configuration for the
session
section (common-session
) - 2.6 pam_env.conf
- 5.1 Excerpt from CN=schema
- 5.2 Minimal 389 Directory Server instance configuration file
- 5.3 A
.dsrc
file for local administration - 5.4 Two supplier replicas
- 5.5 Four supplier replicas
- 5.6 Six replicas
- 5.7 Six replicas with read-only consumers
- 22.1 Example sshd.conf
- 23.1 Callback port configuration for the
nfs
kernel module in/etc/modprobe.d/60-nfs.conf
- 23.2 Commands to define a new
firewalld
RPC service for NFS - 24.1 VPN server configuration file
- 24.2 VPN client configuration file
- 30.1 Output of
aa-unconfined
- 35.1 Learning mode exception: controlling access to specific resources
- 35.2 Learning mode exception: defining permissions for an entry
- 41.1 Example output of
auditctl
-s
- 41.2 Example audit rules—audit system parameters
- 41.3 Example audit rules—file system auditing
- 41.4 Example audit rules—system call auditing
- 41.5 Deleting audit rules and events
- 41.6 Listing rules with
auditctl
-l
- 41.7 A simple audit event—viewing the audit log
- 41.8 An advanced audit event—login via SSH
- 41.9 Example /etc/audisp/audispd.conf
- 41.10 Example /etc/audisp/plugins.d/syslog.conf
Copyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLED-tuning/book-tuning_draft.html b/SLE15SP3/single-html/SLED-tuning/book-tuning_draft.html index 263ece40de0..ae66de9e95b 100644 --- a/SLE15SP3/single-html/SLED-tuning/book-tuning_draft.html +++ b/SLE15SP3/single-html/SLED-tuning/book-tuning_draft.html @@ -36,7 +36,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Basics
- II System monitoring
- III Kernel monitoring
- IV Resource management
- V Kernel tuning
- VI Handling system dumps
- VII Synchronized clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
output on a lightly used machine - 2.2
vmstat
output on a heavily used machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap script
- 4.2 Probe with timer event
- 4.3
printf
Function with format specifiers - 4.4 Using global variables
- 4.5 Monitoring incoming TCP connections with
tcp_connections.stp
- 11.1 Example output of
cpupower frequency-info
- 11.2 Example output of
cpupower idle-info
- 11.3 Example
cpupower monitor
output - 16.1 Checking Parameters
- 18.1 Kdump: example configuration using a static IP setup
- 20.1 Slave clock using software time stamping
- 20.2 Slave clock using hardware time stamping
- 20.3 Master clock using hardware time stamping
- 20.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLED-tuning/index.html b/SLE15SP3/single-html/SLED-tuning/index.html index 263ece40de0..ae66de9e95b 100644 --- a/SLE15SP3/single-html/SLED-tuning/index.html +++ b/SLE15SP3/single-html/SLED-tuning/index.html @@ -36,7 +36,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Basics
- II System monitoring
- III Kernel monitoring
- IV Resource management
- V Kernel tuning
- VI Handling system dumps
- VII Synchronized clocks with Precision Time Protocol
- A GNU licenses
List of FiguresList of TablesList of Examples- 2.1
vmstat
output on a lightly used machine - 2.2
vmstat
output on a heavily used machine (CPU bound) - 3.1 Example for
/etc/logrotate.conf
- 4.1 Simple SystemTap script
- 4.2 Probe with timer event
- 4.3
printf
Function with format specifiers - 4.4 Using global variables
- 4.5 Monitoring incoming TCP connections with
tcp_connections.stp
- 11.1 Example output of
cpupower frequency-info
- 11.2 Example output of
cpupower idle-info
- 11.3 Example
cpupower monitor
output - 16.1 Checking Parameters
- 18.1 Kdump: example configuration using a static IP setup
- 20.1 Slave clock using software time stamping
- 20.2 Slave clock using hardware time stamping
- 20.3 Master clock using hardware time stamping
- 20.4 Master clock using software time stamping (not generally recommended)
Copyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLED-upgrade/book-upgrade_draft.html b/SLE15SP3/single-html/SLED-upgrade/book-upgrade_draft.html index 71d5bbb834f..1ea785979c4 100644 --- a/SLE15SP3/single-html/SLED-upgrade/book-upgrade_draft.html +++ b/SLE15SP3/single-html/SLED-upgrade/book-upgrade_draft.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
List of FiguresList of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLED-upgrade/index.html b/SLE15SP3/single-html/SLED-upgrade/index.html index 71d5bbb834f..1ea785979c4 100644 --- a/SLE15SP3/single-html/SLED-upgrade/index.html +++ b/SLE15SP3/single-html/SLED-upgrade/index.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
List of FiguresList of TablesList of ExamplesCopyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLES-administration/book-administration_draft.html b/SLE15SP3/single-html/SLES-administration/book-administration_draft.html index 6d7cb54fdf9..fa39e3d98c2 100644 --- a/SLE15SP3/single-html/SLES-administration/book-administration_draft.html +++ b/SLE15SP3/single-html/SLES-administration/book-administration_draft.html @@ -39,7 +39,7 @@ like maintaining, monitoring and customizing an initially installed system.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I Common tasks
- 1 Bash and Bash scripts
- 2
sudo
basics - 3 Using YaST
- 4 YaST in text mode
- 5 YaST online update
- 6 Managing software with command line tools
- 7 System recovery and snapshot management with Snapper
- 7.1 Default setup
- 7.2 Using Snapper to undo changes
- 7.3 System rollback by booting from snapshots
- 7.4 Enabling Snapper in user home directories
- 7.5 Creating and modifying Snapper configurations
- 7.6 Manually creating and managing snapshots
- 7.7 Automatic snapshot clean-up
- 7.8 Showing exclusive disk space used by snapshots
- 7.9 Frequently asked questions
- 8 Live kernel patching with KLP
- 9 Transactional updates
- 10 Remote graphical sessions with VNC
- 11 File copying with RSync
- II Booting a Linux system
- III System
- 16 32-bit and 64-bit applications in a 64-bit system environment
- 17
journalctl
: Query thesystemd
journal - 18
update-alternatives
: Managing multiple versions of commands and files - 19 Basic networking
- 19.1 IP addresses and routing
- 19.2 IPv6—the next generation Internet
- 19.3 Name resolution
- 19.4 Configuring a network connection with YaST
- 19.5 Configuring a network connection manually
- 19.6 Basic router setup
- 19.7 Setting up bonding devices
- 19.8 Setting up team devices for Network Teaming
- 19.9 Software-defined networking with Open vSwitch
- 20 Printer operation
- 21 Graphical user interface
- 22 Accessing file systems with FUSE
- 23 Managing kernel modules
- 24 Dynamic kernel device management with
udev
- 24.1 The
/dev
directory - 24.2 Kernel
uevents
andudev
- 24.3 Drivers, kernel modules and devices
- 24.4 Booting and initial device setup
- 24.5 Monitoring the running
udev
daemon - 24.6 Influencing kernel device event handling with
udev
rules - 24.7 Persistent device naming
- 24.8 Files used by
udev
- 24.9 More information
- 24.1 The
- 25 Special system features
- 26 Using NetworkManager
- 27 Power management
- 28 Persistent memory
- IV Services
- 29 Service management with YaST
- 30 Time synchronization with NTP
- 31 The domain name system
- 32 DHCP
- 33 SLP
- 34 The Apache HTTP server
- 34.1 Quick start
- 34.2 Configuring Apache
- 34.3 Starting and stopping Apache
- 34.4 Installing, activating, and configuring modules
- 34.5 Enabling CGI scripts
- 34.6 Setting up a secure Web server with SSL
- 34.7 Running multiple Apache instances on the same server
- 34.8 Avoiding security problems
- 34.9 Troubleshooting
- 34.10 More information
- 35 Setting up an FTP server with YaST
- 36 Squid caching proxy server
- 36.1 Some facts about proxy servers
- 36.2 System requirements
- 36.3 Basic usage of Squid
- 36.4 The YaST Squid module
- 36.5 The Squid configuration file
- 36.6 Configuring a transparent proxy
- 36.7 Using the Squid cache manager CGI interface (
cachemgr.cgi
) - 36.8 Cache report generation with Calamaris
- 36.9 More information
- 37 Web Based Enterprise Management using SFCB
- V Troubleshooting
- A An example network
- B GNU licenses
List of Figures- 4.1 Main window of YaST in text mode
- 4.2 The software installation module
- 5.1 YaST online update
- 5.2 Viewing retracted patches and history
- 5.3 YaST online update configuration
- 7.1 Boot loader: snapshots
- 10.1 vncviewer
- 10.2 Remmina's main window
- 10.3 Remote desktop preference
- 10.4 Quick-starting
- 10.5 Remmina viewing remote session
- 10.6 Reading path to the profile file
- 10.7 Remote administration
- 10.8 VNC session settings
- 10.9 Joining a persistent VNC session
- 13.1 Secure boot support
- 13.2 UEFI: secure boot process
- 14.1 GRUB 2 boot editor
- 14.2 Boot code options
- 14.3 Code options
- 14.4 Boot loader options
- 14.5 Kernel parameters
- 15.1 Services Manager
- 17.1 YaST systemd journal
- 19.1 Simplified layer model for TCP/IP
- 19.2 TCP/IP ethernet packet
- 19.3 Configuring network settings
- 19.4
wicked
architecture - 26.1 GNOME Network Connections dialog
- 26.2
firewalld
zones in NetworkManager - 29.1 YaST service manager
- 30.1 NTP configuration window
- 30.2 Adding a time server
- 31.1 DNS server installation: forwarder settings
- 31.2 DNS server installation: DNS zones
- 31.3 DNS server installation: finish wizard
- 31.4 DNS server: logging
- 31.5 DNS server: Zone Editor (Basics)
- 31.6 DNS server: Zone Editor (NS Records)
- 31.7 DNS server: Zone Editor (MX Records)
- 31.8 DNS server: Zone Editor (SOA)
- 31.9 Adding a record for a master zone
- 31.10 Adding a reverse zone
- 31.11 Adding a reverse record
- 32.1 DHCP server: card selection
- 32.2 DHCP server: global settings
- 32.3 DHCP server: dynamic DHCP
- 32.4 DHCP server: start-up
- 32.5 DHCP server: host management
- 32.6 DHCP server: chroot jail and declarations
- 32.7 DHCP server: selecting a declaration type
- 32.8 DHCP server: configuring subnets
- 32.9 DHCP server: TSIG configuration
- 32.10 DHCP server: interface configuration for dynamic DNS
- 32.11 DHCP server: network interface and firewall
- 34.1 HTTP server wizard: default host
- 34.2 HTTP server wizard: summary
- 34.3 HTTP server configuration: listen ports and addresses
- 34.4 HTTP server configuration: server modules
- 35.1 FTP server configuration — start-up
- 39.1 HTML report generated by SCA tool
- 39.2 HTML report generated by SCA appliance
List of Tables- 1.1 Bash configuration files for login shells
- 1.2 Bash configuration files for non-login shells
- 1.3 Special files for Bash
- 1.4 Overview of a standard directory tree
- 1.5 Useful environment variables
- 6.1 Essential RPM query options
- 6.2 RPM verify options
- 15.1 Service management commands
- 15.2 Commands for enabling and disabling services
- 15.3 System V runlevels and
systemd
target units - 19.1 Private IP address domains
- 19.2 Parameters for /etc/host.conf
- 19.3 Databases available via /etc/nsswitch.conf
- 19.4 Configuration options for NSS “databases”
- 19.5 Feature comparison between bonding and team
- 21.1 Generating PFL from fontconfig rules
- 21.2 Results from generating PFL from fontconfig rules with changed order
- 21.3 Results from generating PFL from fontconfig rules
- 25.1
ulimit
: Setting resources for the user - 37.1 Commands for managing sfcbd
- 38.1 Man pages—categories and descriptions
- 39.1 Comparison of features and file names in the TAR archive
- 40.1 Log files
- 40.2 System information with the
/proc
file system - 40.3 System information with the
/sys
file system
List of Examples- 1.1 A shell script printing a text
- 6.1 Zypper—list of known repositories
- 6.2
rpm -q -i wget
- 6.3 Script to search for packages
- 7.1 Example timeline configuration
- 14.1 Usage of grub2-mkconfig
- 14.2 Usage of grub2-mkrescue
- 14.3 Usage of grub2-script-check
- 14.4 Usage of grub2-once
- 15.1 List active services
- 15.2 List failed services
- 15.3 List all processes belonging to a service
- 18.1 Alternatives System of the
java
command - 19.1 Writing IP addresses
- 19.2 Linking IP addresses to the netmask
- 19.3 Sample IPv6 address
- 19.4 IPv6 address specifying the prefix length
- 19.5 Common network interfaces and some static routes
- 19.6
/var/run/netconfig/resolv.conf
- 19.7
/etc/hosts
- 19.8
/etc/networks
- 19.9
/etc/host.conf
- 19.10
/etc/nsswitch.conf
- 19.11 Output of the command ping
- 19.12 Configuration for load balancing with Network Teaming
- 19.13 Configuration for DHCP Network Teaming device
- 20.1 Error message from
lpd
- 20.2 Broadcast from the CUPS network server
- 21.1 Specifying rendering algorithms
- 21.2 Aliases and family name substitutions
- 21.3 Aliases and family name substitutions
- 21.4 Aliases and family names substitutions
- 24.1 Example
udev
rules - 25.1 Entry in /etc/crontab
- 25.2 /etc/crontab: remove time stamp files
- 25.3
ulimit
: Settings in~/.bashrc
- 31.1 Forwarding options in named.conf
- 31.2 A basic /etc/named.conf
- 31.3 Entry to disable logging
- 31.4 Zone entry for example.com
- 31.5 Zone entry for example.net
- 31.6 The /var/lib/named/example.com.zone file
- 31.7 Reverse lookup
- 32.1 The configuration file /etc/dhcpd.conf
- 32.2 Additions to the configuration file
- 34.1 Basic examples of name-based
VirtualHost
entries - 34.2 Name-based
VirtualHost
directives - 34.3 IP-based
VirtualHost
directives - 34.4 Basic
VirtualHost
configuration - 34.5 VirtualHost CGI configuration
- 36.1 A request with
squidclient
- 36.2 Defining ACL rules
- 39.1 Output of
hostinfo
when logging in asroot
Copyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLES-administration/index.html b/SLE15SP3/single-html/SLES-administration/index.html index 6d7cb54fdf9..fa39e3d98c2 100644 --- a/SLE15SP3/single-html/SLES-administration/index.html +++ b/SLE15SP3/single-html/SLES-administration/index.html @@ -39,7 +39,7 @@ like maintaining, monitoring and customizing an initially installed system.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I Common tasks
- 1 Bash and Bash scripts
- 2
sudo
basics - 3 Using YaST
- 4 YaST in text mode
- 5 YaST online update
- 6 Managing software with command line tools
- 7 System recovery and snapshot management with Snapper
- 7.1 Default setup
- 7.2 Using Snapper to undo changes
- 7.3 System rollback by booting from snapshots
- 7.4 Enabling Snapper in user home directories
- 7.5 Creating and modifying Snapper configurations
- 7.6 Manually creating and managing snapshots
- 7.7 Automatic snapshot clean-up
- 7.8 Showing exclusive disk space used by snapshots
- 7.9 Frequently asked questions
- 8 Live kernel patching with KLP
- 9 Transactional updates
- 10 Remote graphical sessions with VNC
- 11 File copying with RSync
- II Booting a Linux system
- III System
- 16 32-bit and 64-bit applications in a 64-bit system environment
- 17
journalctl
: Query thesystemd
journal - 18
update-alternatives
: Managing multiple versions of commands and files - 19 Basic networking
- 19.1 IP addresses and routing
- 19.2 IPv6—the next generation Internet
- 19.3 Name resolution
- 19.4 Configuring a network connection with YaST
- 19.5 Configuring a network connection manually
- 19.6 Basic router setup
- 19.7 Setting up bonding devices
- 19.8 Setting up team devices for Network Teaming
- 19.9 Software-defined networking with Open vSwitch
- 20 Printer operation
- 21 Graphical user interface
- 22 Accessing file systems with FUSE
- 23 Managing kernel modules
- 24 Dynamic kernel device management with
udev
- 24.1 The
/dev
directory - 24.2 Kernel
uevents
andudev
- 24.3 Drivers, kernel modules and devices
- 24.4 Booting and initial device setup
- 24.5 Monitoring the running
udev
daemon - 24.6 Influencing kernel device event handling with
udev
rules - 24.7 Persistent device naming
- 24.8 Files used by
udev
- 24.9 More information
- 24.1 The
- 25 Special system features
- 26 Using NetworkManager
- 27 Power management
- 28 Persistent memory
- IV Services
- 29 Service management with YaST
- 30 Time synchronization with NTP
- 31 The domain name system
- 32 DHCP
- 33 SLP
- 34 The Apache HTTP server
- 34.1 Quick start
- 34.2 Configuring Apache
- 34.3 Starting and stopping Apache
- 34.4 Installing, activating, and configuring modules
- 34.5 Enabling CGI scripts
- 34.6 Setting up a secure Web server with SSL
- 34.7 Running multiple Apache instances on the same server
- 34.8 Avoiding security problems
- 34.9 Troubleshooting
- 34.10 More information
- 35 Setting up an FTP server with YaST
- 36 Squid caching proxy server
- 36.1 Some facts about proxy servers
- 36.2 System requirements
- 36.3 Basic usage of Squid
- 36.4 The YaST Squid module
- 36.5 The Squid configuration file
- 36.6 Configuring a transparent proxy
- 36.7 Using the Squid cache manager CGI interface (
cachemgr.cgi
) - 36.8 Cache report generation with Calamaris
- 36.9 More information
- 37 Web Based Enterprise Management using SFCB
- V Troubleshooting
- A An example network
- B GNU licenses
List of Figures- 4.1 Main window of YaST in text mode
- 4.2 The software installation module
- 5.1 YaST online update
- 5.2 Viewing retracted patches and history
- 5.3 YaST online update configuration
- 7.1 Boot loader: snapshots
- 10.1 vncviewer
- 10.2 Remmina's main window
- 10.3 Remote desktop preference
- 10.4 Quick-starting
- 10.5 Remmina viewing remote session
- 10.6 Reading path to the profile file
- 10.7 Remote administration
- 10.8 VNC session settings
- 10.9 Joining a persistent VNC session
- 13.1 Secure boot support
- 13.2 UEFI: secure boot process
- 14.1 GRUB 2 boot editor
- 14.2 Boot code options
- 14.3 Code options
- 14.4 Boot loader options
- 14.5 Kernel parameters
- 15.1 Services Manager
- 17.1 YaST systemd journal
- 19.1 Simplified layer model for TCP/IP
- 19.2 TCP/IP ethernet packet
- 19.3 Configuring network settings
- 19.4
wicked
architecture - 26.1 GNOME Network Connections dialog
- 26.2
firewalld
zones in NetworkManager - 29.1 YaST service manager
- 30.1 NTP configuration window
- 30.2 Adding a time server
- 31.1 DNS server installation: forwarder settings
- 31.2 DNS server installation: DNS zones
- 31.3 DNS server installation: finish wizard
- 31.4 DNS server: logging
- 31.5 DNS server: Zone Editor (Basics)
- 31.6 DNS server: Zone Editor (NS Records)
- 31.7 DNS server: Zone Editor (MX Records)
- 31.8 DNS server: Zone Editor (SOA)
- 31.9 Adding a record for a master zone
- 31.10 Adding a reverse zone
- 31.11 Adding a reverse record
- 32.1 DHCP server: card selection
- 32.2 DHCP server: global settings
- 32.3 DHCP server: dynamic DHCP
- 32.4 DHCP server: start-up
- 32.5 DHCP server: host management
- 32.6 DHCP server: chroot jail and declarations
- 32.7 DHCP server: selecting a declaration type
- 32.8 DHCP server: configuring subnets
- 32.9 DHCP server: TSIG configuration
- 32.10 DHCP server: interface configuration for dynamic DNS
- 32.11 DHCP server: network interface and firewall
- 34.1 HTTP server wizard: default host
- 34.2 HTTP server wizard: summary
- 34.3 HTTP server configuration: listen ports and addresses
- 34.4 HTTP server configuration: server modules
- 35.1 FTP server configuration — start-up
- 39.1 HTML report generated by SCA tool
- 39.2 HTML report generated by SCA appliance
List of Tables- 1.1 Bash configuration files for login shells
- 1.2 Bash configuration files for non-login shells
- 1.3 Special files for Bash
- 1.4 Overview of a standard directory tree
- 1.5 Useful environment variables
- 6.1 Essential RPM query options
- 6.2 RPM verify options
- 15.1 Service management commands
- 15.2 Commands for enabling and disabling services
- 15.3 System V runlevels and
systemd
target units - 19.1 Private IP address domains
- 19.2 Parameters for /etc/host.conf
- 19.3 Databases available via /etc/nsswitch.conf
- 19.4 Configuration options for NSS “databases”
- 19.5 Feature comparison between bonding and team
- 21.1 Generating PFL from fontconfig rules
- 21.2 Results from generating PFL from fontconfig rules with changed order
- 21.3 Results from generating PFL from fontconfig rules
- 25.1
ulimit
: Setting resources for the user - 37.1 Commands for managing sfcbd
- 38.1 Man pages—categories and descriptions
- 39.1 Comparison of features and file names in the TAR archive
- 40.1 Log files
- 40.2 System information with the
/proc
file system - 40.3 System information with the
/sys
file system
List of Examples- 1.1 A shell script printing a text
- 6.1 Zypper—list of known repositories
- 6.2
rpm -q -i wget
- 6.3 Script to search for packages
- 7.1 Example timeline configuration
- 14.1 Usage of grub2-mkconfig
- 14.2 Usage of grub2-mkrescue
- 14.3 Usage of grub2-script-check
- 14.4 Usage of grub2-once
- 15.1 List active services
- 15.2 List failed services
- 15.3 List all processes belonging to a service
- 18.1 Alternatives System of the
java
command - 19.1 Writing IP addresses
- 19.2 Linking IP addresses to the netmask
- 19.3 Sample IPv6 address
- 19.4 IPv6 address specifying the prefix length
- 19.5 Common network interfaces and some static routes
- 19.6
/var/run/netconfig/resolv.conf
- 19.7
/etc/hosts
- 19.8
/etc/networks
- 19.9
/etc/host.conf
- 19.10
/etc/nsswitch.conf
- 19.11 Output of the command ping
- 19.12 Configuration for load balancing with Network Teaming
- 19.13 Configuration for DHCP Network Teaming device
- 20.1 Error message from
lpd
- 20.2 Broadcast from the CUPS network server
- 21.1 Specifying rendering algorithms
- 21.2 Aliases and family name substitutions
- 21.3 Aliases and family name substitutions
- 21.4 Aliases and family names substitutions
- 24.1 Example
udev
rules - 25.1 Entry in /etc/crontab
- 25.2 /etc/crontab: remove time stamp files
- 25.3
ulimit
: Settings in~/.bashrc
- 31.1 Forwarding options in named.conf
- 31.2 A basic /etc/named.conf
- 31.3 Entry to disable logging
- 31.4 Zone entry for example.com
- 31.5 Zone entry for example.net
- 31.6 The /var/lib/named/example.com.zone file
- 31.7 Reverse lookup
- 32.1 The configuration file /etc/dhcpd.conf
- 32.2 Additions to the configuration file
- 34.1 Basic examples of name-based
VirtualHost
entries - 34.2 Name-based
VirtualHost
directives - 34.3 IP-based
VirtualHost
directives - 34.4 Basic
VirtualHost
configuration - 34.5 VirtualHost CGI configuration
- 36.1 A request with
squidclient
- 36.2 Defining ACL rules
- 39.1 Output of
hostinfo
when logging in asroot
Copyright © 2006–2023 diff --git a/SLE15SP3/single-html/SLES-amd-sev/article-amd-sev_draft.html b/SLE15SP3/single-html/SLES-amd-sev/article-amd-sev_draft.html index dd51029d9ad..effa70ac96d 100644 --- a/SLE15SP3/single-html/SLES-amd-sev/article-amd-sev_draft.html +++ b/SLE15SP3/single-html/SLES-amd-sev/article-amd-sev_draft.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
Publication Date: - July 12, 2023 + July 21, 2023AMD's Secure Encrypted Virtualization (SEV) allows the memory of virtual diff --git a/SLE15SP3/single-html/SLES-amd-sev/index.html b/SLE15SP3/single-html/SLES-amd-sev/index.html index dd51029d9ad..effa70ac96d 100644 --- a/SLE15SP3/single-html/SLES-amd-sev/index.html +++ b/SLE15SP3/single-html/SLES-amd-sev/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3AMD Secure Encrypted Virtualization (AMD-SEV) Guide #
Publication Date: - July 12, 2023 + July 21, 2023AMD's Secure Encrypted Virtualization (SEV) allows the memory of virtual diff --git a/SLE15SP3/single-html/SLES-autoyast/book-autoyast_draft.html b/SLE15SP3/single-html/SLES-autoyast/book-autoyast_draft.html index 1b1bed33d33..6ec7ef413a1 100644 --- a/SLE15SP3/single-html/SLES-autoyast/book-autoyast_draft.html +++ b/SLE15SP3/single-html/SLES-autoyast/book-autoyast_draft.html @@ -40,7 +40,7 @@ and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration.
Publication Date: -July 12, 2023 +July 21, 2023- Preface
- 1 Introduction to AutoYaST
- I Understanding and creating the AutoYaST control file
- II AutoYaST configuration examples
- 4 Configuration and installation options
- 4.1 General options
- 4.2 Reporting
- 4.3 System registration and extension selection
- 4.4 The boot loader
- 4.5 Partitioning
- 4.6 iSCSI initiator overview
- 4.7 Fibre channel over Ethernet configuration (FCoE)
- 4.8 Country settings
- 4.9 Software
- 4.10 Upgrade
- 4.11 Services and targets
- 4.12 Network configuration
- 4.13 Proxy
- 4.14 NIS client and server
- 4.15 NIS server
- 4.16 Hosts definition
- 4.17 Windows domain membership
- 4.18 Samba server
- 4.19 Authentication client
- 4.20 NFS client and server
- 4.21 NTP client
- 4.22 Mail server configuration
- 4.23 Apache HTTP server configuration
- 4.24 Squid server
- 4.25 FTP server
- 4.26 TFTP server
- 4.27 Firstboot workflow
- 4.28 Security settings
- 4.29 Linux audit framework (LAF)
- 4.30 Users and groups
- 4.31 Custom user scripts
- 4.32 System variables (sysconfig)
- 4.33 Adding complete configurations
- 4.34 Ask the user for values during installation
- 4.35 Kernel dumps
- 4.36 DNS server
- 4.37 DHCP server
- 4.38 Firewall configuration
- 4.39 Miscellaneous hardware and system components
- 4.40 Importing SSH keys and configuration
- 4.41 Configuration management
- 4 Configuration and installation options
- III Managing mass installations with dynamic profiles
- IV Understanding the auto-installation process
- V Uses for AutoYaST on installed systems
- VI Appendixes
List of FiguresList of TablesList of Examples- 2.1 AutoYaST control file (profile)
- 2.2 Control file container
- 2.3 Nested resources
- 3.1 Example file for replacing the host name/domain by script
- 4.1 General options
- 4.2 Reporting behavior
- 4.3 LVM-based guided partitioning
- 4.4 Creating
/
,/home
andswap
partitions - 4.5 Using a whole disk as a file system
- 4.6 Automated partitioning on selected drives
- 4.7 Installing on multiple drives
- 4.8 Mount options
- 4.9 Keeping partitions
- 4.10 Auto-detection of partitions to be kept.
- 4.11 Create LVM physical volume
- 4.12 LVM logical volumes
- 4.13 RAID10 configuration
- 4.14 RAID10 without partitions
- 4.15 Old style RAID10 configuration
- 4.16 Using multipath devices
- 4.17 Listing multipath devices
- 4.18 Using the WWID to identify a multipath device
- 4.19
bcache
definition - 4.20 Multi-device Btrfs configuration
- 4.21 NFS share definition
- 4.22
tmpfs
definition - 4.23 iSCSI client
- 4.24 FCoE configuration
- 4.25 Language
- 4.26 Time zone
- 4.27 Keyboard
- 4.28 Explicit product selection
- 4.29 Package selection in the control file with patterns and packages sections
- 4.30 Packages selection using a regular expression
- 4.31 Creating a package database with the additional package inst-source-utils.rpm
- 4.32
add_on_products.xml
- 4.33 Adding the SDK extension and a user defined repository
- 4.34 Kernel selection in the control file
- 4.35 Package selection in control file
- 4.36 Upgrade and backup
- 4.37 Configuring services and targets
- 4.38 Network configuration
- 4.39 Bonding interface configuration
- 4.40 Bridge interface configuration
- 4.41 Multiple IP Addresses
- 4.42 Assigning a persistent name using the MAC address
- 4.43 Network routing configuration
- 4.44 Network configuration: proxy
- 4.45 Network configuration: NIS
- 4.46 NIS server configuration
- 4.47 /etc/hosts
- 4.48 Samba client configuration
- 4.49 Samba server configuration
- 4.50 Network configuration: NFS client
- 4.51 Network configuration: NFS server
- 4.52 Network configuration: NTP client
- 4.53 Mail configuration
- 4.54 HTTP server configuration
- 4.55 Squid server configuration
- 4.56 FTP server configuration:
- 4.57 TFTP server configuration:
- 4.58 Enabling firstboot workflow
- 4.59 Security configuration
- 4.60 LAF configuration
- 4.61 Minimal user configuration
- 4.62 Complex user configuration
- 4.63 Group configuration
- 4.64 Enabling autologin and password-less login
- 4.65 Script configuration
- 4.66 Sysconfig configuration
- 4.67 Dumping files into the installed system
- 4.68 Dumping files into the installed system
- 4.69 Kdump configuration
- 4.70 Disabled Kdump configuration
- 4.71 Kdump memory reservation with multiple values
- 4.72 Basic DNS server settings
- 4.73 Configuring DNS server zones and advanced settings
- 4.74 Example dhcp-server section
- 4.75 Example firewall section
- 4.76 Printer configuration
- 4.77 Sound configuration
- 4.78 Importing SSH keys and configuration from /dev/sda2
- 4.79 Client/server with manual authentication
- 4.80 Client/server with preseed keys
- 4.81 Stand-alone mode
- 6.1 Simple rules file
- 6.2 Simple rules file
- 7.1 Including a file using ERB
- 7.2 Running commands with Ruby
- 7.3 Using Ruby structures
- 7.4 Configuring the boot loader
- 7.5 Using the largest disk
- 7.6 Configure the connected network cards
- 7.7 Reusing the same profile for different distributions
- 7.8 Filtering USB devices
- 7.9 Running helpers
- 7.10 Rendering profile
- 7.11 Preparing the debug environment
- 7.12 Adding a breakpoint
- 7.13 Rules and classes
- 7.14 ERB
- 8.1 Using the MAC address to get the profile
- 8.2 Accessing ERB helpers from a Ruby script
- 9.1 Determine HEX code for an IP address
- 9.2
linuxrc
Options in the AutoYaST control file - D.1 Adding modules and extensions (online)
- D.2 Adding modules and extensions (offline)
- D.3 Specifying the Btrfs default subvolume name
- D.4 Disabling Btrfs subvolumes
- D.5 Assigning zones: default configuration (deprecated syntax)
- D.6 Assigning zones: default configuration (SLE 15 syntax)
- D.7 Masquerading and protecting internal zones (deprecated syntax)
- D.8 Masquerading and protecting internal zones (SLE 15 syntax)
- D.9 Opening ports (deprecated syntax)
- D.10 Opening ports (SLE 15 syntax)
- D.11 Opening Services (Deprecated Syntax) diff --git a/SLE15SP3/single-html/SLES-autoyast/index.html b/SLE15SP3/single-html/SLES-autoyast/index.html index 1b1bed33d33..6ec7ef413a1 100644 --- a/SLE15SP3/single-html/SLES-autoyast/index.html +++ b/SLE15SP3/single-html/SLES-autoyast/index.html @@ -40,7 +40,7 @@ and configuration data. The book guides you through the basic steps of auto-installation: preparation, installation, and configuration.
Publication Date: -July 12, 2023 +July 21, 2023- Preface
- 1 Introduction to AutoYaST
- I Understanding and creating the AutoYaST control file
- II AutoYaST configuration examples
- 4 Configuration and installation options
- 4.1 General options
- 4.2 Reporting
- 4.3 System registration and extension selection
- 4.4 The boot loader
- 4.5 Partitioning
- 4.6 iSCSI initiator overview
- 4.7 Fibre channel over Ethernet configuration (FCoE)
- 4.8 Country settings
- 4.9 Software
- 4.10 Upgrade
- 4.11 Services and targets
- 4.12 Network configuration
- 4.13 Proxy
- 4.14 NIS client and server
- 4.15 NIS server
- 4.16 Hosts definition
- 4.17 Windows domain membership
- 4.18 Samba server
- 4.19 Authentication client
- 4.20 NFS client and server
- 4.21 NTP client
- 4.22 Mail server configuration
- 4.23 Apache HTTP server configuration
- 4.24 Squid server
- 4.25 FTP server
- 4.26 TFTP server
- 4.27 Firstboot workflow
- 4.28 Security settings
- 4.29 Linux audit framework (LAF)
- 4.30 Users and groups
- 4.31 Custom user scripts
- 4.32 System variables (sysconfig)
- 4.33 Adding complete configurations
- 4.34 Ask the user for values during installation
- 4.35 Kernel dumps
- 4.36 DNS server
- 4.37 DHCP server
- 4.38 Firewall configuration
- 4.39 Miscellaneous hardware and system components
- 4.40 Importing SSH keys and configuration
- 4.41 Configuration management
- 4 Configuration and installation options
- III Managing mass installations with dynamic profiles
- IV Understanding the auto-installation process
- V Uses for AutoYaST on installed systems
- VI Appendixes
List of FiguresList of TablesList of Examples- 2.1 AutoYaST control file (profile)
- 2.2 Control file container
- 2.3 Nested resources
- 3.1 Example file for replacing the host name/domain by script
- 4.1 General options
- 4.2 Reporting behavior
- 4.3 LVM-based guided partitioning
- 4.4 Creating
/
,/home
andswap
partitions - 4.5 Using a whole disk as a file system
- 4.6 Automated partitioning on selected drives
- 4.7 Installing on multiple drives
- 4.8 Mount options
- 4.9 Keeping partitions
- 4.10 Auto-detection of partitions to be kept.
- 4.11 Create LVM physical volume
- 4.12 LVM logical volumes
- 4.13 RAID10 configuration
- 4.14 RAID10 without partitions
- 4.15 Old style RAID10 configuration
- 4.16 Using multipath devices
- 4.17 Listing multipath devices
- 4.18 Using the WWID to identify a multipath device
- 4.19
bcache
definition - 4.20 Multi-device Btrfs configuration
- 4.21 NFS share definition
- 4.22
tmpfs
definition - 4.23 iSCSI client
- 4.24 FCoE configuration
- 4.25 Language
- 4.26 Time zone
- 4.27 Keyboard
- 4.28 Explicit product selection
- 4.29 Package selection in the control file with patterns and packages sections
- 4.30 Packages selection using a regular expression
- 4.31 Creating a package database with the additional package inst-source-utils.rpm
- 4.32
add_on_products.xml
- 4.33 Adding the SDK extension and a user defined repository
- 4.34 Kernel selection in the control file
- 4.35 Package selection in control file
- 4.36 Upgrade and backup
- 4.37 Configuring services and targets
- 4.38 Network configuration
- 4.39 Bonding interface configuration
- 4.40 Bridge interface configuration
- 4.41 Multiple IP Addresses
- 4.42 Assigning a persistent name using the MAC address
- 4.43 Network routing configuration
- 4.44 Network configuration: proxy
- 4.45 Network configuration: NIS
- 4.46 NIS server configuration
- 4.47 /etc/hosts
- 4.48 Samba client configuration
- 4.49 Samba server configuration
- 4.50 Network configuration: NFS client
- 4.51 Network configuration: NFS server
- 4.52 Network configuration: NTP client
- 4.53 Mail configuration
- 4.54 HTTP server configuration
- 4.55 Squid server configuration
- 4.56 FTP server configuration:
- 4.57 TFTP server configuration:
- 4.58 Enabling firstboot workflow
- 4.59 Security configuration
- 4.60 LAF configuration
- 4.61 Minimal user configuration
- 4.62 Complex user configuration
- 4.63 Group configuration
- 4.64 Enabling autologin and password-less login
- 4.65 Script configuration
- 4.66 Sysconfig configuration
- 4.67 Dumping files into the installed system
- 4.68 Dumping files into the installed system
- 4.69 Kdump configuration
- 4.70 Disabled Kdump configuration
- 4.71 Kdump memory reservation with multiple values
- 4.72 Basic DNS server settings
- 4.73 Configuring DNS server zones and advanced settings
- 4.74 Example dhcp-server section
- 4.75 Example firewall section
- 4.76 Printer configuration
- 4.77 Sound configuration
- 4.78 Importing SSH keys and configuration from /dev/sda2
- 4.79 Client/server with manual authentication
- 4.80 Client/server with preseed keys
- 4.81 Stand-alone mode
- 6.1 Simple rules file
- 6.2 Simple rules file
- 7.1 Including a file using ERB
- 7.2 Running commands with Ruby
- 7.3 Using Ruby structures
- 7.4 Configuring the boot loader
- 7.5 Using the largest disk
- 7.6 Configure the connected network cards
- 7.7 Reusing the same profile for different distributions
- 7.8 Filtering USB devices
- 7.9 Running helpers
- 7.10 Rendering profile
- 7.11 Preparing the debug environment
- 7.12 Adding a breakpoint
- 7.13 Rules and classes
- 7.14 ERB
- 8.1 Using the MAC address to get the profile
- 8.2 Accessing ERB helpers from a Ruby script
- 9.1 Determine HEX code for an IP address
- 9.2
linuxrc
Options in the AutoYaST control file - D.1 Adding modules and extensions (online)
- D.2 Adding modules and extensions (offline)
- D.3 Specifying the Btrfs default subvolume name
- D.4 Disabling Btrfs subvolumes
- D.5 Assigning zones: default configuration (deprecated syntax)
- D.6 Assigning zones: default configuration (SLE 15 syntax)
- D.7 Masquerading and protecting internal zones (deprecated syntax)
- D.8 Masquerading and protecting internal zones (SLE 15 syntax)
- D.9 Opening ports (deprecated syntax)
- D.10 Opening ports (SLE 15 syntax)
- D.11 Opening Services (Deprecated Syntax) diff --git a/SLE15SP3/single-html/SLES-deployment/book-deployment_draft.html b/SLE15SP3/single-html/SLES-deployment/book-deployment_draft.html index e73987f30a8..fdfb9597e0a 100644 --- a/SLE15SP3/single-html/SLES-deployment/book-deployment_draft.html +++ b/SLE15SP3/single-html/SLES-deployment/book-deployment_draft.html @@ -39,7 +39,7 @@ systems, and how to exploit the product-inherent capabilities for a deployment infrastructure.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I Installation preparation
- II Installation procedure
- 7 Boot parameters
- 8 Installation steps
- 8.1 Overview
- 8.2 Installer self-update
- 8.3 Language, keyboard, and product selection diff --git a/SLE15SP3/single-html/SLES-deployment/index.html b/SLE15SP3/single-html/SLES-deployment/index.html index e73987f30a8..fdfb9597e0a 100644 --- a/SLE15SP3/single-html/SLES-deployment/index.html +++ b/SLE15SP3/single-html/SLES-deployment/index.html @@ -39,7 +39,7 @@ systems, and how to exploit the product-inherent capabilities for a deployment infrastructure.
Publication Date: - July 12, 2023 + July 21, 2023- Preface
- I Installation preparation
- II Installation procedure
- 7 Boot parameters
- 8 Installation steps
- 8.1 Overview
- 8.2 Installer self-update
- 8.3
Language, keyboard, and product selection
diff --git a/SLE15SP3/single-html/SLES-gnome-user/book-gnome-user_draft.html b/SLE15SP3/single-html/SLES-gnome-user/book-gnome-user_draft.html
index e94476bdaab..8fd9f64eb67 100644
--- a/SLE15SP3/single-html/SLES-gnome-user/book-gnome-user_draft.html
+++ b/SLE15SP3/single-html/SLES-gnome-user/book-gnome-user_draft.html
@@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 2.14 More information
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 Keyboard shortcut dialog
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Single monitor settings dialog
- 3.6 Configuring sound settings
- 3.7 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
- 13.1 The browser window of Firefox
- 13.2 Firefox—manage search engines
- 13.3 The Firefox bookmark library
- 13.4 The Firefox page info window
- 13.5 The preferences window
- 13.6 Installing Firefox extensions
- 14.1 Evolution window
- 16.1 Ekiga user interface
- 17.1 The toolbox
- 17.2 The basic color selector dialog
- 17.3 The print dialog
- 18.1 start-up window
- 18.2 general preferences
- 18.3 display preferences
- 18.4 audio preferences
- 19.1 Main view of Brasero
- A.1 Main window of Help
List of TablesList of Examplesdiff --git a/SLE15SP3/single-html/SLES-gnome-user/index.html b/SLE15SP3/single-html/SLES-gnome-user/index.html index e94476bdaab..8fd9f64eb67 100644 --- a/SLE15SP3/single-html/SLES-gnome-user/index.html +++ b/SLE15SP3/single-html/SLES-gnome-user/index.html @@ -37,7 +37,7 @@
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
- Preface
- I Introduction
- 1 Getting started with the GNOME desktop
- 2 Working with your desktop
- 2.1 Managing files and directories
- 2.2 Accessing removable media
- 2.3 Searching for files
- 2.4 Copying text between applications
- 2.5 Managing Internet connections
- 2.6 Exploring the Internet
- 2.7 E-mail and scheduling
- 2.8 Opening or creating documents with LibreOffice
- 2.9 Controlling your desktop’s power management
- 2.10 Creating, displaying, and decompressing archives
- 2.11 Taking screenshots
- 2.12 Viewing PDF files
- 2.13 Obtaining software updates
- 2.14 More information
- 3 Customizing your settings
- 3.1 Changing the desktop background
- 3.2 Configuring language settings
- 3.3 Configuring the keyboard
- 3.4 Using XCompose to type special characters
- 3.5 Configuring Bluetooth settings
- 3.6 Configuring power settings
- 3.7 Configuring the mouse and touchpad
- 3.8 Installing and configuring printers
- 3.9 Configuring screens
- 3.10 Configuring sound settings
- 3.11 Setting default applications
- 3.12 Setting session sharing preferences
- 4 Assistive technologies
- II Connectivity, files and resources
- III LibreOffice
- IV Internet and communication
- V Graphics and multimedia
- A Help and documentation
- B GNU licenses
List of Figures- 1.1 Default GNOME login screen
- 1.2 Default GNOME login screen—session type
- 1.3 GNOME desktop with activities overview
- 2.1 File manager
- 2.2 Archive manager
- 2.3 Document viewer
- 3.1 Keyboard shortcut dialog
- 3.2 Enabling the compose key in tweaks
- 3.3 settings dialog
- 3.4 Single monitor settings dialog
- 3.5 Single monitor settings dialog
- 3.6 Configuring sound settings
- 3.7 Default applications
- 5.1 Network file browser
- 8.1 main window
- 9.1 Customization dialog in
- 9.2 The options window
- 10.1 A LibreOffice wizard
- 10.2 Styles panel
- 10.3 Navigator tool in
- 12.1 Mathematical formula in LibreOffice Math
- 13.1 The browser window of Firefox
- 13.2 Firefox—manage search engines
- 13.3 The Firefox bookmark library
- 13.4 The Firefox page info window
- 13.5 The preferences window
- 13.6 Installing Firefox extensions
- 14.1 Evolution window
- 16.1 Ekiga user interface
- 17.1 The toolbox
- 17.2 The basic color selector dialog
- 17.3 The print dialog
- 18.1 start-up window
- 18.2 general preferences
- 18.3 display preferences
- 18.4 audio preferences
- 19.1 Main view of Brasero
- A.1 Main window of Help
List of TablesList of Examplesdiff --git a/SLE15SP3/single-html/SLES-installation/article-installation_draft.html b/SLE15SP3/single-html/SLES-installation/article-installation_draft.html index a1e467a2850..89ecb68a97e 100644 --- a/SLE15SP3/single-html/SLES-installation/article-installation_draft.html +++ b/SLE15SP3/single-html/SLES-installation/article-installation_draft.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3Installation Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start guides you step-by-step diff --git a/SLE15SP3/single-html/SLES-installation/index.html b/SLE15SP3/single-html/SLES-installation/index.html index a1e467a2850..89ecb68a97e 100644 --- a/SLE15SP3/single-html/SLES-installation/index.html +++ b/SLE15SP3/single-html/SLES-installation/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3Installation Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start guides you step-by-step diff --git a/SLE15SP3/single-html/SLES-jeos/article-jeos_draft.html b/SLE15SP3/single-html/SLES-jeos/article-jeos_draft.html index 73849936eb7..fae54f1b8a1 100644 --- a/SLE15SP3/single-html/SLES-jeos/article-jeos_draft.html +++ b/SLE15SP3/single-html/SLES-jeos/article-jeos_draft.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server JeOS 15 SP3JeOS Quick Start
Publication Date: - July 12, 2023 + July 21, 2023The following document provides an overview of SUSE Linux Enterprise Server JeOS and describes @@ -126,7 +126,7 @@
The KIWI configuration files used to create the official JeOS images are available from the openSUSE Build Service at - https://build.opensuse.org/. + https://build.opensuse.org/.
Note: Specific host tools packagesEach SUSE Linux Enterprise Server JeOS flavor contains certain host tools packages. Refer to the specific flavors section in the documentation for further diff --git a/SLE15SP3/single-html/SLES-jeos/index.html b/SLE15SP3/single-html/SLES-jeos/index.html index 73849936eb7..fae54f1b8a1 100644 --- a/SLE15SP3/single-html/SLES-jeos/index.html +++ b/SLE15SP3/single-html/SLES-jeos/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server JeOS 15 SP3JeOS Quick Start
Publication Date: - July 12, 2023 + July 21, 2023The following document provides an overview of SUSE Linux Enterprise Server JeOS and describes @@ -126,7 +126,7 @@
The KIWI configuration files used to create the official JeOS images are available from the openSUSE Build Service at - https://build.opensuse.org/. + https://build.opensuse.org/.
Note: Specific host tools packagesEach SUSE Linux Enterprise Server JeOS flavor contains certain host tools packages. Refer to the specific flavors section in the documentation for further diff --git a/SLE15SP3/single-html/SLES-modules/article-modules_draft.html b/SLE15SP3/single-html/SLES-modules/article-modules_draft.html index dbff614a406..beba2b02ce5 100644 --- a/SLE15SP3/single-html/SLES-modules/article-modules_draft.html +++ b/SLE15SP3/single-html/SLES-modules/article-modules_draft.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.
SUSE Linux Enterprise Server 15 SP3Modules and Extensions Quick Start #
Publication Date: - July 12, 2023 + July 21, 2023This Quick Start gives you an overview of the diff --git a/SLE15SP3/single-html/SLES-modules/index.html b/SLE15SP3/single-html/SLES-modules/index.html index dbff614a406..beba2b02ce5 100644 --- a/SLE15SP3/single-html/SLES-modules/index.html +++ b/SLE15SP3/single-html/SLES-modules/index.html @@ -35,7 +35,7 @@ });
This is a draft document that was built and uploaded automatically. It may document beta software and be incomplete or even incorrect. Use this document at your own risk.