On the last step before the real installation takes place, you can alter installation settings suggested by the installer. To modify the suggestions, click the respective headline. After having made changes to a particular setting, you are always returned to the Installation Settings window, which is updated accordingly.
Figure 6-15 Installation Settings
SUSE Linux Enterprise Server contains several software patterns for various application purposes. Clickto open the screen where you can modify the pattern selection according to your needs. Select a pattern from the list and see a description in the right-hand part of the window. Each pattern contains several software packages needed for specific functions (for example Web and LAMP server or a print server). For a more detailed selection based on software packages to install, select to switch to the YaST Software Manager.
You can also install additional software packages or remove software packages from your system at any later time with the YaST Software Manager. For more information, refer to Section 13.0, Installing or Removing Software.
Figure 6-16 Software Selection and System Tasks
NOTE: Graphical Desktop
By default SUSE Linux Enterprise Server is installed with X Window and the GNOME desktop environment. If you do not need X Window, deselect the two respective patterns in the icewm.screen. As an alternative to GNOME, the light-weight window manager IceWM can be installed. Select from the screen and search for
HINT: IBM z Systems: Hardware Cryptography Support
The hardware cryptography stack is not installed by default. To install it, selectin the screen.
HINT: Adding Secondary Languages
The language you selected with the first step of the installation will be used as the primary (default) language for the system. You can add secondary languages from within thedialog by choosing .
The installer proposes a boot configuration for your system. Other
operating systems found on your computer, such as Microsoft Windows or
other Linux installations, will automatically be detected and added to the
boot loader. However, SUSE Linux Enterprise Server will be booted by default. Normally,
you can leave these settings unchanged. If you need a custom setup, modify
the proposal according to your needs. For information, see
Configuring the Boot Loader with YaST, (↑Administration Guide).
IMPORTANT: Software RAID 1
Booting a configuration where /boot resides on a
software RAID 1 device is supported, but it requires to install the boot
loader into the MBR ( ). Having
/boot on software RAID devices with a level other
than RAID 1 is not supported. Also see
Configuring Software RAID for the Root Partition, (↑Storage Administration Guide).
By default SuSEFirewall2 is enabled on all configured network interfaces. To globally disable the firewall for this computer, click(not recommended).
NOTE: Firewall Settings
If the firewall is activated, all interfaces are configured to be in the
External Zone, where all ports are closed by default,
ensuring maximum security. The only port you can open during the
installation is port 22 (SSH), to allow remote access. All other services
requiring network access (such as FTP, Samba, Web server, etc.) will only
work after having adjusted the firewall settings. Refer to
Masquerading and Firewalls, (↑Security Guide) for more information.
To enable remote access via the secure shell (SSH), make sure the SSH service is enabled and the SSH port is open.
HINT: Existing SSH Host Keys
If you install SUSE Linux Enterprise Server on a machine with one or more existing Linux installations, the installation routine imports the SSH host key with the most recent access time from an existing installation by default. See also Section 6.15.7, Import SSH Host Keys and Configuration.
If you are performing a remote administration over VNC, you can also specify whether the machine should be accessible via VNC after the installation. Note that enabling VNC also requires you to set theto .
Using Kdump, you can save a dump of the kernel (in case of a crash) to
analyze what went wrong. Use this dialog to enable and configure Kdump.
Find detailed information at Section 17.0,
Kexec and Kdump, (↑System Analysis and Tuning Guide).
To save memory, all channels for devices currently not in use are blacklisted by default (each channel that is not blacklisted occupies approximately 50 KB of memory). To configure additional hardware in the installed system using channels that are currently blacklisted, run the respective YaST module to enable the respective channels first.
To disable blacklisting, click.
SUSE Linux Enterprise Server can boot into two different targets (formerly known as
runlevels). The target starts a
display manager, whereas the target starts
the command line interface.
The default target is. In case you have not installed the patterns, you need to change it to . If the system should be accessible via VNC, you need to choose .
If an existing Linux installation on your computer was detected, YaST will import the most recent SSH host key found in /etc/ssh by default, optionally including other files in the directory as well. This makes it possible to reuse the SSH identity of the existing installation, avoiding the REMOTE HOST IDENTIFICATION HAS CHANGED warning on the first connection. Note that this item is not shown in the installation summary if YaST has not discovered any other installations.
Figure 6-17 Import SSH Host Keys and Configuration
Select this option if you want to import the SSH host key and optionally the configuration of an installed system. You can select the installation to import from in the option list below.
Enable this to copy other files in /etc/ssh to the installed system in addition to the host keys.
This screen lists all the hardware information the installer could obtain about your computer. When opened for the first time, the hardware detection is started. Depending on your system, this may take some time. Select any item in the list and clickto see detailed information about the selected item. Use to save a detailed list to either the local file system or a removable device.
Advanced users can also change theand kernel settings by choosing . A screen with two tabs opens:
Each kernel driver contains a list of device IDs of all devices it supports. If a new device is not in any driver's database, the device is treated as unsupported, even if it can be used with an existing driver. You can add PCI IDs to a device driver here. Only advanced users should attempt to do so.
To add an ID, click /sys/bus/pci/drivers—if empty, the name is used as the directory name. Existing entries can be managed with and .and select whether to enter the data, or whether to choose from a list. Enter the required data. The is the directory name from
Change the Section 12.0,
Tuning I/O Performance, (↑System Analysis and Tuning Guide) for details on I/O tuning.
Also activate the https://www.kernel.org/doc/html/latest/admin-guide/sysrq.html for details.here. These keys will let you issue basic commands (such as rebooting the system or writing kernel dumps) in case the system crashes. Enabling these keys is recommended when doing kernel development. Refer to