Deployment Guide Deployment Guide SUSE Linux Enterprise Server 15 SP1

Total Page:16

File Type:pdf, Size:1020Kb

Deployment Guide Deployment Guide SUSE Linux Enterprise Server 15 SP1 SUSE Linux Enterprise Server 15 SP1 Deployment Guide Deployment Guide SUSE Linux Enterprise Server 15 SP1 This guide details how to install single or multiple systems, and how to exploit the product-inherent capabilities for a deployment infrastructure. Choose from various approaches: local installation from physical installation media, customizing the standard installation images, network installation server, mass deployment using a remote-controlled, highly-customized, automated installation process, and initial system conguration. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xiii 1 Available Documentation xiii 2 Giving Feedback xv 3 Documentation Conventions xvi 4 Product Life Cycle and Support xviii Support Statement for SUSE Linux Enterprise Server xviii • Technology Previews xix I INSTALLATION PREPARATION 1 1 Planning for SUSE Linux Enterprise Server 2 1.1 Considerations for Deployment of a SUSE Linux Enterprise Server 2 1.2 Deployment of SUSE Linux Enterprise Server 3 1.3 Running SUSE Linux Enterprise Server 3 1.4 Registering SUSE Linux Enterprise Server 4 1.5 Changes in Installation from SUSE Linux Enterprise Server Version 15 4 Unified Installer for SUSE Linux Enterprise-based Products 4 • Installing with Internet Access 5 • Offline Installation 5 • Quarterly Update Media 6 2 Installation on AMD64 and Intel 64 7 2.1 Hardware Requirements 7 2.2 Installation Considerations 8 Installation on Hardware or Virtual Machine 9 • Installation Target 9 2.3 Controlling the Installation 9 iii Deployment Guide 2.4 Booting the Installation System 10 2.5 Dealing with Boot and Installation Problems 12 Problems Booting 12 • Problems Installing 13 • Redirecting the Boot Source to the Boot DVD 13 3 Installation on Arm AArch64 14 3.1 Hardware Requirements 14 3.2 Installation Considerations 16 Installation on Hardware or Virtual Machine 16 • Installation Target 16 3.3 Controlling the Installation 16 3.4 Booting the Installation System 17 3.5 Dealing with Boot and Installation Problems 19 Problems Booting 19 • Problems Installing 20 • Redirecting the Boot Source to the Boot DVD 20 4 Installation on IBM POWER 21 4.1 Hardware Requirements 21 4.2 Preparation 22 Installation in a Partition Using IVM 23 • Installation on Servers with no Open Power Abstraction Layer 26 4.3 For More Information 27 5 Installation on IBM Z 29 5.1 System Requirements 29 Hardware 29 • MicroCode Level, APARs, and Fixes 32 • Software 32 5.2 General Information 33 System requirements 33 • Installation Types 37 • IPL Options 38 5.3 Preparing for Installation 39 Making the Installation Data Available 39 • Installation Types 46 • Preparing the IPL of the SUSE Linux Enterprise Server Installation System 48 • IPLing the SUSE Linux Enterprise Server Installation iv Deployment Guide System 51 • Network Configuration 56 • Connecting to the SUSE Linux Enterprise Server Installation System 60 • The SUSE Linux Enterprise Server Boot Procedure on IBM Z 62 5.4 The Parmfile—Automating the System Configuration 63 5.5 Example Parmfiles 64 5.6 Using the vt220 Terminal Emulator 65 5.7 Further In-Depth Information about IBM Z 66 General Documents about Linux on IBM Z 66 • Technical Issues of Linux on IBM Z 66 • Advanced Configurations for Linux on IBM Z 67 6 Installation on Hardware Not Supported at Release 68 6.1 Download Kernel Update 68 6.2 Boot Kernel Update 68 II INSTALLATION PROCEDURE 69 7 Boot Parameters 70 7.1 Using the Default Boot Parameters 70 7.2 PC (AMD64/Intel 64/Arm AArch64) 71 The Boot Screen on Machines Equipped with Traditional BIOS 71 • The Boot Screen on Machines Equipped with UEFI 73 7.3 List of Important Boot Parameters 76 General Boot Parameters 76 • Configuring the Network Interface 77 • Specifying the Installation Source 79 • Specifying Remote Access 80 7.4 Advanced Setups 81 Providing Data to Access an RMT Server 81 • Configuring an Alternative Data Server for supportconfig 82 • Using IPv6 for the Installation 82 • Using a Proxy for the Installation 83 • Enabling SELinux Support 83 • Enabling the Installer Self-Update 84 • Scale User Interface for High DPI 84 • Using CPU Mitigations 84 v Deployment Guide 7.5 IBM Z 85 7.6 More Information 87 8 Installation Steps 88 8.1 Overview 88 8.2 Installer Self-Update 89 Self-Update Process 90 • Custom Self-Update Repositories 92 8.3 Language, Keyboard, and Product Selection 93 8.4 License Agreement 95 8.5 IBM Z: Disk Activation 95 Configuring DASD Disks 96 • Configuring zFCP Disks 97 8.6 Network Settings 98 8.7 Registration 99 Registering Manually 100 • Loading Registration Codes from USB Storage 102 • Installing without Registration 103 8.8 Extension and Module Selection 105 Selecting Extensions and Modules with Registration 106 • Selecting Extensions and Modules without Registration 110 8.9 Add-On Product 114 8.10 System Role 116 8.11 Partitioning 118 Important Information 118 • Suggested Partitioning 120 8.12 Clock and Time Zone 122 8.13 Create New User 124 8.14 Authentication for the System Administrator “root” 127 8.15 Installation Settings 129 Software 129 • Booting 131 • Security 131 • Network Configuration 132 • Kdump 133 • IBM Z: Blacklist vi Deployment Guide Devices 133 • Default systemd Target 133 • Import SSH Host Keys and Configuration 133 • System 134 8.16 Performing the Installation 135 IBM Z: IPLing the Installed System 135 • IBM Z: Connecting to the Installed System 137 9 Registering SUSE Linux Enterprise and Managing Modules/Extensions 139 9.1 Registering During the Installation 140 9.2 Registering during Automated Deployment 140 9.3 Registering from the Installed System 140 Registering with YaST 140 • Registering with SUSEConnect 143 9.4 Managing Modules and Extensions in a Running System 144 Adding Modules and Extensions with YaST 144 • Deleting Modules and Extensions with YaST 145 • Adding/Deleting Modules and Extensions with SUSEConnect 146 10 Expert Partitioner 149 10.1 Using the Expert Partitioner 149 Partition Tables 151 • Partitions 152 • Editing a Partition 156 • Expert Options 158 • Advanced Options 158 • More Partitioning Tips 159 • Partitioning and LVM 161 10.2 LVM Configuration 162 Create Physical Volume 162 • Creating Volume Groups 162 • Configuring Logical Volumes 163 10.3 Soft RAID 165 Soft RAID Configuration 165 • Troubleshooting 167 • For More Information 167 11 Remote Installation 168 11.1 Overview 168 vii Deployment Guide 11.2 Scenarios for Remote Installation 169 Installation from DVD via VNC 169 • Installation from Network via VNC 170 • Installation from DVD via SSH 171 • Installation from Network via SSH 172 11.3 Monitoring Installation via VNC 173 Preparing for VNC Installation 173 • Connecting to the Installation Program 174 11.4 Monitoring Installation via SSH 175 Preparing for SSH Installation 175 • Connecting to the Installation Program 175 11.5 Monitoring Installation via Serial Console 176 12 Troubleshooting 177 12.1 Checking Media 177 12.2 No Bootable DVD Drive Available 177 12.3 Booting from Installation Media Fails 178 12.4 Boot Failure 179 12.5 Fails to Launch Graphical Installer 181 12.6 Only Minimalist Boot Screen Started 183 12.7 Log Files 183 III CUSTOMIZING INSTALLATION IMAGES 184 13 Cloning Disk Images 185 13.1 Overview 185 13.2 Cleaning Up Unique System Identifiers 185 14 Customizing Installation Images with mksusecd 187 14.1 Installing mksusecd 187 14.2 Creating a Minimal Boot Image 188 viii Deployment Guide 14.3 Set Default Kernel Boot Parameters 188 14.4 Customize Modules, Extensions, and Repositories 189 14.5 Creating a Minimal Netinstall ISO 190 14.6 Change Default Repository 190 15 Customizing Installation Images Manually 191 IV SETTING UP AN INSTALLATION SERVER 192 16 Setting Up a Network Installation Source 193 16.1 Setting Up an Installation Server Using YaST 193 16.2 Setting Up an NFS Repository Manually 195 16.3 Setting Up an FTP Repository Manually 198 16.4 Setting Up an HTTP Repository Manually 199 16.5 Managing an SMB Repository 200 16.6 Using ISO Images of the Installation Media on the Server 201 17 Preparing Network Boot Environment 203 17.1 Setting Up a DHCP Server 203 Dynamic Address Assignment 204 • Assigning Static IP Addresses 205 • PXE and AutoYaST Installation Failures 205 17.2 Setting Up a TFTP Server 206 Installing a TFTP Server 206 • Installing Files for Boot 207 • Configuring PXELINUX 208 • Preparing PXE Boot for EFI with GRUB2 208 17.3 PXELINUX Configuration Options 209 17.4 Preparing the Target System for PXE Boot 211 17.5 Using Wake-on-LAN for Remote Wakeups 212 Prerequisites 212 • Verifying Wired Ethernet
Recommended publications
  • Linux on a Stick Everyone Knows You Can Boot Linux from a Live CD, but Have You Thought About Putting Linux on a Compact and Highly Portable USB
    KNOW HOW Memory Stick Linux Booting Linux from a USB Memory Stick Linux on a Stick Everyone knows you can boot Linux from a live CD, but have you thought about putting Linux on a compact and highly portable USB memory stick? BY FABRIZIO CIACCHI bootable “live” CD like Knoppix much more common. Part of our pur- ent from DSL, but it includes more [1] or Kanotix [2] gives the user a pose is to create an inexpensive system, software (about 14 MB plus), and it Afully portable operating environ- so I will base this discussion on the stan- has already been refined and tested for ment. You can carry your system with dard and very common 128 MB size. USB devices. you and boot it from anywhere. However, the procedure I describe in this • Flonix [8]: Flonix is also based on Your tools, your files, and your work- article can also be used to put a larger DSL, but it uses some different pro- space will follow you wherever you go – Knoppix-based distribution on a larger grams (for instance, IceWM instead even to another PC with a different USB memory stick. of Fluxbox). The Flonix project also operating system. Live CDs are also used Assuming you want room to work and introduced a useful web install by system administrators for trouble- store documents, it is a good idea to only process. Ultimately, Flonix was so shooting computers that won’t boot use half of the available space (64 MB) successful that it become a commer- normally. for the Linux system and related tools.
    [Show full text]
  • Operating System Boot from Fully Encrypted Device
    Masaryk University Faculty of Informatics Operating system boot from fully encrypted device Bachelor’s Thesis Daniel Chromik Brno, Fall 2016 Replace this page with a copy of the official signed thesis assignment and the copy of the Statement of an Author. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Daniel Chromik Advisor: ing. Milan Brož i Acknowledgement I would like to thank my advisor, Ing. Milan Brož, for his guidance and his patience of a saint. Another round of thanks I would like to send towards my family and friends for their support. ii Abstract The goal of this work is description of existing solutions for boot- ing Linux and Windows from fully encrypted devices with Secure Boot. Before that, though, early boot process and bootloaders are de- scribed. A simple Linux distribution is then set up to boot from a fully encrypted device. And lastly, existing Windows encryption solutions are described. iii Keywords boot process, Linux, Windows, disk encryption, GRUB 2, LUKS iv Contents 1 Introduction ............................1 1.1 Thesis goals ..........................1 1.2 Thesis structure ........................2 2 Boot Process Description ....................3 2.1 Early Boot Process ......................3 2.2 Firmware interfaces ......................4 2.2.1 BIOS – Basic Input/Output System . .4 2.2.2 UEFI – Unified Extended Firmware Interface .5 2.3 Partitioning tables ......................5 2.3.1 MBR – Master Boot Record .
    [Show full text]
  • Oracle® Linux Administrator's Solutions Guide for Release 6
    Oracle® Linux Administrator's Solutions Guide for Release 6 E37355-64 August 2017 Oracle Legal Notices Copyright © 2012, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S.
    [Show full text]
  • White Paper: Indestructible Firewall in a Box V1.0 Nick Mccubbins
    White Paper: Indestructible Firewall In A Box v1.0 Nick McCubbins 1.1 Credits • Nathan Yawn ([email protected]) 1.2 Acknowledgements • Firewall-HOWTO • Linux Router Project • LEM 1.3 Revision History • Version 1.0 First public release 1.4 Feedback • Send all information and/or criticisms to [email protected] 1.5 Distribution Policy 2 Abstract In this document, the procedure for creating an embedded firewall whose root filesystem is loaded from a flash disk and then executed from a RAMdisk will be illustrated. A machine such as this has uses in many environments, from corporate internet access to sharing of a cable modem or xDSL connection among many computers. It has the advantages of being very light and fast, being impervious to filesystem corruption due to power loss, and being largely impervious to malicious crackers. The type of firewall illustrated herein is a simple packet-filtering, masquerading setup. Facilities for this already exist in the Linux kernel, keeping the system's memory footprint small. As such the device lends itself to embedding very well. For a more detailed description of firewall particulars, see the Linux Firewall-HOWTO. 3 Equipment This project has minimal hardware requirements. An excellent configuration consists of: For a 100-baseT network: • SBC-554 Pentium SBC with PISA bus and on-board PCI NIC (http://www.emacinc.com/pc.htm#pentiumsbc), approx. $373 • PISA backplane, chassis, power supply (http://www.emacinc.com/sbcpc_addons/mbpc641.htm), approx. $305 • Second PCI NIC • 32 MB RAM • 4 MB M-Systems Flash Disk (minimum), approx. $45 For a 10-baseT network: • EMAC's Standard Server-in-a-Box product (http://www.emacinc.com/server_in_a_box.htm), approx.
    [Show full text]
  • IBM Power Systems Private Cloud Solution Is Enhanced to Support Selected SUSE Linux Enterprise Server Subscriptions As Shared Utility Capacity Resources
    IBM United States Hardware Announcement 121-045, dated April 20, 2021 IBM Power Systems Private Cloud Solution is enhanced to support selected SUSE Linux Enterprise Server subscriptions as Shared Utility Capacity resources Table of contents 1 Overview 1 Description 1 Key requirements 2 Order now 1 Effective date Overview The IBM(R) Power(R) Systems Private Cloud Solution with Shared Utility Capacity was initially launched with support to share Base processor and memory hardware resources, as well as AIX(R) and IBM i license entitlements, across a collection of similar Power servers in an enterprise. Now, selected SUSE Linux(R) Enterprise Server (SLES) subscription offerings will be supported as Base and Metered Capacity resources within an IBM Power Enterprise Pool (2.0) of IBM Power System E980 or E950 servers. Key requirements • For Linux metering, HMC 950 is required. Effective date April 30, 2021 Description SUSE Linux Enterprise Server subscription offerings will now be monitored, shared as Base Capacity, and made available as pay-per-use Metered Capacity resources when a Power Enterprise Pool (2.0) consisting of Power E980 or Power E950 systems is started: 5639-15S 5639-12S SUSE Linux Enterprise Server for Power with Base 1 - 2 Socket, Unlimited LPAR and Priority Subscription or Priority Subscription/Support features 5639-SAP SUSE Linux Enterprise Server for SAP Applications for Power with 1 - 2 Socket, Unlimited LPAR and Priority Subscription or Priority Subscription/Support features Base Capacity resources may be shared across systems within a pool. SLES Base subscription entitlement for each system will be set to the number of cores available in the quantity of sockets entitled by the current, valid subscription for that system IBM United States Hardware Announcement 121-045 IBM is a registered trademark of International Business Machines Corporation 1 (the number of cores per chip multiplied by the quantity of sockets acquired in the current subscription).
    [Show full text]
  • Current Status of OFED in SUSE Linux Enterprise Server
    Current Status of OFED in SUSE Linux Enterprise Server John Jolly Senior Software Engineer SUSE Agenda 2 λAbout SUSE λAbout SUSE Linux Enterprise Server λOFED Integration into SLES λFuture Direction of OFED in SLES SUSE and the Attachmate Group λSUSE , headquartered in Nürnberg / Germany, λis an independently operating business unit of λThe Attachmate Group, Inc. λThe Attachmate Group is a privately held λ1 billion+ $ revenue software company λwith four brands: •Cloud Infrastructure •Enterprise Computing •Integrated Systems SUSE® Linux Enterprise How We Build It Online Repository Source Package Image OBS OBS user submits source to OBS and gets a product SUSE® Linux Enterprise Server 12 Lifecyle Model •13-year lifecycle (10 years general support, 3 years extended support) •5-year lifecycle per Service Pack (2 years general + 3 years extended support) •Long Term Service Pack Support (LTSS) available for all versions, including GA http://www.suse.com/lifecycle/ Unique Tools Included λAppArmor Security Framework -Application confinement λFree High Availability Extension -Cluster Framework, Cluster FS, DRBD, GEO-cluster* λYaST2 systems management -Install, deploy, and configure every aspect of the server λSubscription Management Tool -Subscription and patch management, proxy/mirroring/staging λStarter System for System z -A pre-built installation server, deployable with z/VM tools Features of SLES 12 λLinux Kernel 3.12 λOnly 64-bit kernel -Support of 32-bit application through execution environment λYaST modules written in Ruby λOFED 3.12 -Significant
    [Show full text]
  • Chapter 3. Booting Operating Systems
    Chapter 3. Booting Operating Systems Abstract: Chapter 3 provides a complete coverage on operating systems booting. It explains the booting principle and the booting sequence of various kinds of bootable devices. These include booting from floppy disk, hard disk, CDROM and USB drives. Instead of writing a customized booter to boot up only MTX, it shows how to develop booter programs to boot up real operating systems, such as Linux, from a variety of bootable devices. In particular, it shows how to boot up generic Linux bzImage kernels with initial ramdisk support. It is shown that the hard disk and CDROM booters developed in this book are comparable to GRUB and isolinux in performance. In addition, it demonstrates the booter programs by sample systems. 3.1. Booting Booting, which is short for bootstrap, refers to the process of loading an operating system image into computer memory and starting up the operating system. As such, it is the first step to run an operating system. Despite its importance and widespread interests among computer users, the subject of booting is rarely discussed in operating system books. Information on booting are usually scattered and, in most cases, incomplete. A systematic treatment of the booting process has been lacking. The purpose of this chapter is to try to fill this void. In this chapter, we shall discuss the booting principle and show how to write booter programs to boot up real operating systems. As one might expect, the booting process is highly machine dependent. To be more specific, we shall only consider the booting process of Intel x86 based PCs.
    [Show full text]
  • Mysql and Linux/Unix Abstract
    MySQL and Linux/Unix Abstract This is the MySQL Linux extract from the MySQL 5.6 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit the MySQL Forums, where you can discuss your issues with other MySQL users. Document generated on: 2021-09-23 (revision: 70881) Table of Contents Preface and Legal Notices ............................................................................................................ v 1 Installing MySQL on Unix/Linux Using Generic Binaries ............................................................... 1 2 Installing MySQL on Linux ......................................................................................................... 5 2.1 Installing MySQL on Linux Using the MySQL Yum Repository ........................................... 6 2.2 Replacing a Third-Party Distribution of MySQL Using the MySQL Yum Repository .............. 9 2.3 Installing MySQL on Linux Using the MySQL APT Repository ......................................... 11 2.4 Installing MySQL on Linux Using the MySQL SLES Repository ....................................... 11 2.5 Installing MySQL on Linux Using RPM Packages from Oracle ......................................... 12 2.6 Installing MySQL on Linux Using Debian Packages from Oracle ...................................... 15 2.7 Installing MySQL on Linux from the Native Software Repositories .................................... 16 2.8 Deploying MySQL on Linux with Docker .......................................................................
    [Show full text]
  • Linux Boot Loaders Compared
    Linux Boot Loaders Compared L.C. Benschop May 29, 2003 Copyright c 2002, 2003, L.C. Benschop, Eindhoven, The Netherlands. Per- mission is granted to make verbatim copies of this document. This is version 1.1 which has some minor corrections. Contents 1 introduction 2 2 How Boot Loaders Work 3 2.1 What BIOS does for us . 3 2.2 Parts of a boot loader . 6 2.2.1 boot sector program . 6 2.2.2 second stage of boot loader . 7 2.2.3 Boot loader installer . 8 2.3 Loading the operating system . 8 2.3.1 Loading the Linux kernel . 8 2.3.2 Chain loading . 10 2.4 Configuring the boot loader . 10 3 Example Installations 11 3.1 Example root file system and kernel . 11 3.2 Linux Boot Sector . 11 3.3 LILO . 14 3.4 GNU GRUB . 15 3.5 SYSLINUX . 18 3.6 LOADLIN . 19 3.7 Where Can Boot Loaders Live . 21 1 4 RAM Disks 22 4.1 Living without a RAM disk . 22 4.2 RAM disk devices . 23 4.3 Loading a RAM disk at boot time . 24 4.4 The initial RAM disk . 24 5 Making Diskette Images without Diskettes 25 6 Hard Disk Installation 26 7 CD-ROM Installation 29 8 Conclusions 31 1 introduction If you use Linux on a production system, you will only see it a few times a year. If you are a hobbyist who compiles many kernels or who uses many operating systems, you may see it several times per day.
    [Show full text]
  • CIS 191 Linux Lab Exercise
    CIS 191 Linux Lab Exercise Lab 9: Backup and Restore Fall 2008 Lab 9: Backup and Restore The purpose of this lab is to explore the different types of backups and methods of restoring them. We will look at three utilities often used for backups and learn the advantages and disadvantages of each. Supplies • VMWare Server 1.05 or higher • Benji VM Preconfiguration • Labs 6 and Labs 7 completed on a pristine Benji VM [root@benji /]# fdisk -l Disk /dev/sda: 5368 MB, 5368709120 bytes 255 heads, 63 sectors/track, 652 cylinders Units = cylinders of 16065 * 512 = 8225280 bytes Device Boot Start End Blocks Id System /dev/sda1 * 1 382 3068383+ 83 Linux /dev/sda2 383 447 522112+ 82 Linux swap / Solaris /dev/sda3 448 511 514080 83 Linux /dev/sda4 512 652 1132582+ 5 Extended /dev/sda5 512 549 305203+ 83 Linux /dev/sda6 550 556 56196 83 Linux /dev/sda7 557 581 200781 83 Linux [root@benji /]# [root@benji /]# mount /dev/sda1 on / type ext3 (rw) proc on /proc type proc (rw) sysfs on /sys type sysfs (rw) devpts on /dev/pts type devpts (rw,gid=5,mode=620) tmpfs on /dev/shm type tmpfs (rw) /dev/sda5 on /opt type ext3 (rw) /dev/sda3 on /var type ext3 (rw) none on /proc/sys/fs/binfmt_misc type binfmt_misc (rw) sunrpc on /var/lib/nfs/rpc_pipefs type rpc_pipefs (rw) /dev/sda7 on /home type ext3 (rw,usrquota) [root@benji /]# cat /etc/fstab LABEL=/1 / ext3 defaults 1 1 devpts /dev/pts devpts gid=5,mode=620 0 0 tmpfs /dev/shm tmpfs defaults 0 0 LABEL=/opt /opt ext3 defaults 1 2 proc /proc proc defaults 0 0 sysfs /sys sysfs defaults 0 0 LABEL=/var /var ext3 defaults 1 2 LABEL=SWAP-sda2 swap swap defaults 0 0 LABEL=/home /home ext3 usrquota,defaults 1 2 [root@benji /]# Forum If you get stuck on one of the steps below don’t beat your head against the wall.
    [Show full text]
  • Kdump, a Kexec-Based Kernel Crash Dumping Mechanism
    Kdump, A Kexec-based Kernel Crash Dumping Mechanism Vivek Goyal Eric W. Biederman Hariprasad Nellitheertha IBM Linux NetworkX IBM [email protected] [email protected] [email protected] Abstract important consideration for the success of a so- lution has been the reliability and ease of use. Kdump is a crash dumping solution that pro- Kdump is a kexec based kernel crash dump- vides a very reliable dump generation and cap- ing mechanism, which is being perceived as turing mechanism [01]. It is simple, easy to a reliable crash dumping solution for Linux R . configure and provides a great deal of flexibility This paper begins with brief description of what in terms of dump device selection, dump saving kexec is and what it can do in general case, and mechanism, and plugging-in filtering mecha- then details how kexec has been modified to nism. boot a new kernel even in a system crash event. The idea of kdump has been around for Kexec enables booting into a new kernel while quite some time now, and initial patches for preserving the memory contents in a crash sce- kdump implementation were posted to the nario, and kdump uses this feature to capture Linux kernel mailing list last year [03]. Since the kernel crash dump. Physical memory lay- then, kdump has undergone significant design out and processor state are encoded in ELF core changes to ensure improved reliability, en- format, and these headers are stored in a re- hanced ease of use and cleaner interfaces. This served section of memory. Upon a crash, new paper starts with an overview of the kdump de- kernel boots up from reserved memory and pro- sign and development history.
    [Show full text]
  • SUSE® Linux Enterprise Server ("SLES ™")11 SP1 Novell® Software License Agreement
    SUSE® Linux Enterprise Server ("SLES ™")11 SP1 Novell® Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING OR OTHERWISE USING THE SOFTWARE (INCLUDING ITS COMPONENTS), YOU AGREE TO THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE WITH THESE TERMS, DO NOT DOWNLOAD, INSTALL OR USE THE SOFTWARE. RIGHTS AND LICENSES This Novell Software License Agreement (“Agreement”) is a legal agreement between You (an entity or a person) and Novell, Inc. (“Novell”). The software product identified in the title of this Agreement, any media and accompanying documentation (collectively the “Software”) is protected by the copyright laws and treaties of the United States (“U.S.”) and other countries and is subject to the terms of this Agreement. Any update or support release to the Software that You may download or receive that is not accompanied by a license agreement expressly superseding this Agreement is Software and governed by this Agreement. If the Software is an update or support release, then You must have validly licensed the version and quantity of the Software being updated or supported in order to install or use the update or support release. The Software is a modular operating system comprised of numerous components that may be accompanied by separate license terms. The Software is a collective work of Novell; although Novell does not own the copyright to every component of the Software, Novell owns the collective work copyright for the Software. Most of the components are open source packages, developed independently, and accompanied by separate license terms. Your license rights with respect to individual components accompanied by separate license terms are defined by those terms; nothing in this agreement shall restrict, limit, or otherwise affect any rights or obligations You may have, or conditions to which You may be subject, under such license terms; however, if You distribute copies of any component independent of the Software, You must remove all Novell trademarks, trade dress, and logos from each copy.
    [Show full text]