![]() ![]() If you do not want to create partitions in the software RAID, set theĪ regular disk. You cannot set two logical volumes in one volume ![]() Of course, you can only use maxįor one(!) logical volume. Theįollowing scenario is for a system with a non-Linux OS with a designatedįor the logical volumes. Hardware environment with different hard disk types and configurations. In someĬases however, such data may not be available, especially in a mixed The last example requires exact knowledge of the existing partition tableĪnd the partition numbers of those partitions that should be kept. Necessary YaST modules are not available in the system, importantĬonfiguration steps will be skipped. YaST will install packages required in the second phase of the installationĪnd before the post-installation phase of AutoYaST has started. Need to be added to the individual package selection. If youĬhoose to install a minimal system then some packages might be missing and Note that for some configuration options to work, additional packages need toīe installed, depending on the software selection you have configured. To learn about other available options, use the configuration This chapter introduces important parts of a control file for standard ![]() 4.1 General options 4.2 Reporting 4.3 The boot loader 4.4 Partitioning 4.5 iSCSI initiator overview 4.6 Fibre channel over Ethernet configuration (FCoE) 4.7 Country settings 4.8 Software 4.9 Upgrade 4.10 Services and targets 4.11 Network configuration 4.12 Proxy 4.13 NIS client and server 4.14 NIS server 4.15 Hosts definition 4.16 Windows domain membership 4.17 Samba server 4.18 Authentication client 4.19 NFS client and server 4.20 NTP client 4.21 Mail server configuration 4.22 Apache HTTP server configuration 4.23 Squid server 4.24 FTP server 4.25 TFTP server 4.26 Firstboot workflow 4.27 Security settings 4.28 Linux audit framework (LAF) 4.29 Users and groups 4.30 Custom user scripts 4.31 System variables (sysconfig) 4.32 Adding complete configurations 4.33 Ask the user for values during installation 4.34 Kernel dumps 4.35 DNS server 4.36 DHCP server 4.37 Firewall configuration 4.38 Miscellaneous hardware and system components 4.39 Importing SSH keys and configuration 4.40 Configuration management ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |