Reference Opensuse Leap 15.1 Reference Opensuse Leap 15.1

Reference Opensuse Leap 15.1 Reference Opensuse Leap 15.1

Reference openSUSE Leap 15.1 Reference openSUSE Leap 15.1 Publication Date: April 21, 2020 SUSE LLC 10 Canal Park Drive Suite 200 Cambridge MA 02141 USA https://www.suse.com/documentation Copyright © 2006– 2020 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its affiliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xvii I ADVANCED ADMINISTRATION 1 1 YaST in Text Mode 2 1.1 Navigation in Modules 3 1.2 Advanced Key Combinations 5 1.3 Restriction of Key Combinations 5 1.4 YaST Command Line Options 6 Installing Packages from the Command Line 6 • Starting Individual Modules 6 • Command Line Parameters of YaST Modules 7 2 Managing Software with Command Line Tools 32 2.1 Using Zypper 32 General Usage 32 • Using Zypper Subcommands 34 • Installing and Removing Software with Zypper 34 • Updating Software with Zypper 39 • Identifying Processes and Services Using Deleted Files 42 • Managing Repositories with Zypper 44 • Querying Repositories and Packages with Zypper 46 • Configuring Zypper 48 • Troubleshooting 48 • Zypper Rollback Feature on Btrfs File System 48 • For More Information 49 2.2 RPM—the Package Manager 49 Verifying Package Authenticity 50 • Managing Packages: Install, Update, and Uninstall 50 • Delta RPM Packages 51 • RPM Queries 52 • Installing and Compiling Source Packages 54 • Compiling RPM Packages with build 56 • Tools for RPM Archives and the RPM Database 57 iii Reference 3 System Recovery and Snapshot Management with Snapper 58 3.1 Default Setup 59 Types of Snapshots 60 • Directories That Are Excluded from Snapshots 60 • Customizing the Setup 61 3.2 Using Snapper to Undo Changes 65 Undoing YaST and Zypper Changes 66 • Using Snapper to Restore Files 71 3.3 System Rollback by Booting from Snapshots 73 Snapshots after Rollback 75 • Accessing and Identifying Snapshot Boot Entries 76 • Limitations 77 3.4 Enabling Snapper in User Home Directories 78 Installing pam_snapper and Creating Users 79 • Removing Users 80 • Manually Enabling Snapshots in Home Directories 80 3.5 Creating and Modifying Snapper Configurations 80 Managing Existing Configurations 82 3.6 Manually Creating and Managing Snapshots 85 Snapshot Metadata 85 • Creating Snapshots 87 • Modifying Snapshot Metadata 88 • Deleting Snapshots 89 3.7 Automatic Snapshot Clean-Up 90 Cleaning Up Numbered Snapshots 90 • Cleaning Up Timeline Snapshots 92 • Cleaning Up Snapshot Pairs That Do Not Differ 94 • Cleaning Up Manually Created Snapshots 94 • Adding Disk Quota Support 94 3.8 Showing Exclusive Disk Space Used by Snapshots 96 3.9 Frequently Asked Questions 97 4 Remote Graphical Sessions with VNC 99 4.1 The vncviewer Client 99 Connecting Using the vncviewer CLI 99 • Connecting Using the vncviewer GUI 100 • Notification of Unencrypted Connections 100 iv Reference 4.2 Remmina: the Remote Desktop Client 101 Installation 101 • Main Window 101 • Adding Remote Sessions 101 • Starting Remote Sessions 103 • Editing, Copying, and Deleting Saved Sessions 104 • Running Remote Sessions from the Command Line 104 4.3 Configuring One-time Sessions on the VNC Server 105 Available Configurations 106 • Initiating a One-time VNC Session 107 • Configuring One-time VNC Sessions 107 4.4 Configuring Persistent VNC Server Sessions 108 VNC Session Initiated Using vncserver 109 • VNC Session Initiated Using vncmanager 110 4.5 Configuring Encryption on the VNC Server 113 5 Expert Partitioner 116 5.1 Using the Expert Partitioner 116 Partition Tables 118 • Partitions 119 • Editing a Partition 122 • Expert Options 124 • Advanced Options 125 • More Partitioning Tips 125 • Partitioning and LVM 128 5.2 LVM Configuration 128 Create Physical Volume 129 • Creating Volume Groups 129 • Configuring Logical Volumes 130 5.3 Soft RAID 132 Soft RAID Configuration 132 • Troubleshooting 134 • For More Information 134 6 Installing Multiple Kernel Versions 135 6.1 Enabling and Configuring Multiversion Support 135 Automatically Deleting Unused Kernels 136 • Use Case: Deleting an Old Kernel after Reboot Only 137 • Use Case: Keeping Older Kernels as Fallback 137 • Use Case: Keeping a Specific Kernel Version 138 6.2 Installing/Removing Multiple Kernel Versions with YaST 138 6.3 Installing/Removing Multiple Kernel Versions with Zypper 139 v Reference 6.4 Installing the Latest Kernel Version from the Repository Kernel:HEAD 140 7 Graphical User Interface 142 7.1 X Window System 142 7.2 Installing and Configuring Fonts 142 Showing Installed Fonts 144 • Viewing Fonts 144 • Querying Fonts 144 • Installing Fonts 145 • Configuring the Appearance of Fonts 146 7.3 GNOME Configuration for Administrators 155 The dconf System 155 • System-wide Configuration 155 • More Information 156 7.4 Switching Between Intel and NVIDIA Optimus GPUs with SUSE Prime 156 Prerequisites 157 • NVIDIA Power Off Setup 157 • Installing and Using SUSE Prime 158 • Installing NVIDIA Drivers 158 II SYSTEM 160 8 32-Bit and 64-Bit Applications in a 64-Bit System Environment 161 8.1 Runtime Support 161 8.2 Kernel Specifications 162 9 Introduction to the Boot Process 163 9.1 Terminology 163 9.2 The Linux Boot Process 164 The Initialization and Boot Loader Phase 164 • The Kernel Phase 165 • The init on initramfs Phase 168 • The systemd Phase 170 10 The systemd Daemon 171 10.1 The systemd Concept 171 What Is systemd 171 • Unit File 172 vi Reference 10.2 Basic Usage 173 Managing Services in a Running System 173 • Permanently Enabling/ Disabling Services 175 10.3 System Start and Target Management 177 Targets Compared to Runlevels 177 • Debugging System Start- Up 180 • System V Compatibility 183 10.4 Managing Services with YaST 184 10.5 Customization of systemd 185 Customizing Unit Files 185 • Creating “Drop-in” Files 187 • Creating Custom Targets 187 10.6 Advanced Usage 188 Cleaning Temporary Directories 188 • System Log 189 • Snapshots 189 • Loading Kernel Modules 189 • Performing Actions before Loading a Service 190 • Kernel Control Groups (cgroups) 191 • Terminating Services (Sending Signals) 192 • Important Notes on the D-Bus Service 192 • Debugging Services 193 10.7 More Information 194 11 journalctl: Query the systemd Journal 195 11.1 Making the Journal Persistent 195 11.2 journalctl Useful Switches 196 11.3 Filtering the Journal Output 197 Filtering Based on a Boot Number 197 • Filtering Based on Time Interval 197 • Filtering Based on Fields 198 11.4 Investigating systemd Errors 199 11.5 Journald Configuration 200 Changing the Journal Size Limit 200 • Forwarding the Journal to /dev/ ttyX 200 • Forwarding the Journal to Syslog Facility 201 11.6 Using YaST to Filter the systemd Journal 201 11.7 Viewing Logs in GNOME 202 vii Reference 12 The Boot Loader GRUB 2 203 12.1 Main Differences between GRUB Legacy and GRUB 2 203 12.2 Configuration File Structure 203 The File /boot/grub2/grub.cfg 204 • The File /etc/default/ grub 205 • Scripts in /etc/grub.d 208 • Mapping between BIOS Drives and Linux Devices 209 • Editing Menu Entries during the Boot Procedure 210 • Setting a Boot Password 211 12.3 Configuring the Boot Loader with YaST 212 Boot Loader Location and Boot Code Options 213 • Adjusting the Disk Order 215 • Configuring Advanced Options 215 12.4 Helpful GRUB 2 Commands 218 12.5 More Information 219 13 Basic Networking 220 13.1 IP Addresses and Routing 223 IP Addresses 223 • Netmasks and Routing 223 13.2 IPv6—The Next Generation Internet 225 Advantages 226 • Address Types and Structure 227 • Coexistence of IPv4 and IPv6 231 • Configuring IPv6 232 • For More Information 233 13.3 Name Resolution 233 13.4 Configuring a Network Connection with YaST 235 Configuring the Network Card with YaST 235 13.5 NetworkManager 246 NetworkManager and wicked 246 • NetworkManager Functionality and Configuration Files 247 • Controlling and Locking Down NetworkManager Features 248 13.6 Configuring a Network Connection Manually 248 The wicked Network Configuration 248 • Configuration Files 255 • Testing the Configuration 266 • Unit Files and Start-Up Scripts 270 13.7 Basic Router Setup 271 viii Reference 13.8 Setting Up Bonding Devices 273 Hotplugging of Bonding Slaves 276 13.9 Setting Up Team Devices for Network Teaming 277 Use Case: Load Balancing with Network Teaming 280 • Use Case: Failover with Network Teaming 281 • Use Case: VLAN over Team Device 282 13.10 Software-Defined Networking with Open vSwitch 284 Advantages of Open vSwitch 285 • Installing Open vSwitch 285 • Overview of Open vSwitch Daemons and Utilities 286 • Creating a Bridge with Open vSwitch 287 • Using Open vSwitch Directly with KVM 288 • Using Open vSwitch with libvirt 289 • For More Information 290 14 UEFI (Unified Extensible Firmware Interface) 291 14.1 Secure Boot 291 Implementation on openSUSE Leap 292 • MOK (Machine Owner Key) 294 • Booting a Custom Kernel 295 • Using Non-Inbox

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    536 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us