Install kde using yast




















Create a file named regcodes. If both are present, the XML takes precedence. In that file, identify the product with the name returned by zypper search --type product and assign it a registration code as follows:. See Section 4. If you have successfully registered your system in the previous step, a list of available modules and extensions based on SUSE Linux Enterprise Server is shown. Otherwise this configuration step is skipped.

It is also possible to add modules and extensions from the installed system, see Chapter 15, Installing Modules, Extensions, and Third Party Add-On Products for details. Click an entry to see its description. Select a module or extension for installation by activating its check mark. This will add its repository from the SUSE Customer Center server to your installation—no additional installation sources are required. Furthermore the installation pattern for the module or extension is added to the default installation to ensure it gets installed automatically.

The amount of available extensions and modules depends on the registration server. A local registration server may only offer update repositories and no additional extensions. They have a clearly defined scope and are delivered via online channel only. Note that installing it requires a valid registration key. Proceed with Next to the Add-on Product dialog, where you can specify sources for additional add-on products not available on the registration server. If you do not want to install add-ons, proceed with Next.

Otherwise activate I would like to install an additional Add-on Product. Alternatively you may directly specify a URL. Check Download Repository Description Files to download the files describing the repository now. If deactivated, they will be downloaded after the installation starts.

Depending on the add-on's content, it may be necessary to accept additional license agreements. If you have chosen an add-on product requiring a registration key, you will be asked to enter it at the Extension and Module Registration Codes page.

If you have chosen a product in the Extension Selection dialog for which you do not have a valid registration key, choose Back until you see the Extension Selection dialog. Deselect the module or extension and proceed with Next. Modules or extensions can also be installed at any time later from the running system as described in Chapter 15, Installing Modules, Extensions, and Third Party Add-On Products.

To simplify the installation, YaST offers predefined use cases which adjust the system to be installed so it is tailored for the selected scenario. Currently this affects the package set and the suggested partitioning scheme. Select this scenario when installing on a machine that should serve as a KVM host that can run other virtual machines.

Select this scenario when installing on a machine that should serve as a Xen host that can run other virtual machines. Depending on the system role, the installer creates a proposal for one of the disks available. All proposals contain a root partition formatted with Btrfs with snapshots enabled and a swap partition. If you have chosen the system role Default System in the previous step, a home partition formatted with XFS will be created, too. On hard disks smaller than 20 GB the proposal does not include a separate home partition.

If one or more swap partitions have been detected on the available hard disks, these existing ones will be used rather than proposing a new swap partition.

You have several options to proceed:. To accept the proposal without any changes, click Next to proceed with the installation workflow. To adjust the proposal choose Edit Proposal Settings.

You may also adjust file systems for the proposed partitions, create a separate home partition, and enlarge the swap partition to enable suspend to disk, for example. If the root file system format is Btrfs, you can also disable Btrfs snapshots here.

Use this option to move the proposal described above to a different disk. Select a specific disk from the list. If the chosen hard disk does not contain any partitions yet, the whole hard disk will be used for the proposal.

Otherwise, you can choose which existing partition s to use. Edit Proposal Settings lets you fine-tune the proposal. To create a custom partition setup choose Expert Partitioner. The Expert Partitioner opens, displaying the current partition setup for all hard disks, including the proposal suggested by the installer.

You can Add , Edit , Resize , or Delete partitions. To fine-tune settings such as the subvolume and snapshot handling for each Btrfs partition, choose Btrfs. For more information about custom partitioning and configuring advanced features, refer to Section Note that for partitioning purposes, disk space is measured in binary units, rather than in decimal units.

This partition must be formatted with the FAT file system. Being able to create system snapshots that enable rollbacks requires most of the system directories to be mounted on a single partition. Refer to Section 7. Only directories that are excluded from snapshots see Section 7. If you do not plan to use Snapper for system rollbacks, the partitioning restrictions mentioned above do not apply. Otherwise the GRUB2 boot loader may not have enough space for the second stage loader.

So if two or more minidisks are on the same physical disk, they all have the same ID. To avoid problems when mounting minidisks, always mount them either by path or by UUID. The recommended size for such a partition is MB and the recommended file system is Ext4. IMSM is also known by the following names:. To use those devices, ensure correct synchronization of the respective services and devices. To avoid data loss it is strongly recommended to.

To adjust the proposed size of the Windows partition, use the Expert Partitioner. In case the PReP partition reused for the suggested partitioning is not the first partition placed at beginning of the disk, the partitioning setup will require to be manually adapted. Follow these steps in order to ensure the PReP partition is correctly created:.

Add a new partition to the disk. When entering the partition size, make sure the Start Cylinder field is prefilled with a 0. That indicates the partition is going to be created at the beginning of the disk.

In Custom Size enter 8MiB. It will complain because the partition is too small, but simply accept the minimum size it proposes. Note that the partition will be automatically resized later. In the next dialog, select PReP in the partition type selector. In this dialog, select your region and time zone. Both are preselected according to the installation language. To change the preselected values, either use the map or the drop-down boxes for Region and Time Zone. When using the map, point the cursor at the rough direction of your region and left-click to zoom.

Now choose your country or region by left-clicking. Right-click to return to the world map. If you run another operating system on your machine, such as Microsoft Windows, it is likely your system uses local time instead. If you run Linux on your machine, set the hardware clock to UTC and have the switch from standard time to daylight saving time performed automatically.

The switch from standard time to daylight saving time and vice versa can only be performed automatically when the hardware clock CMOS clock is set to UTC.

This also applies if you use automatic time synchronization with NTP, because automatic synchronization will only be performed if the time difference between the hardware and system clock is less than 15 minutes. Since a wrong system time can cause serious problems missed backups, dropped mail messages, mount failures on remote file systems, etc. When finished, click Accept to continue the installation.

Since the operating system is not allowed to change time and date directly, the Other Settings option is not available on IBM Z. Create a local user in this step. After entering the first name and last name, either accept the proposal or specify a new User name that will be used to log in. Only use lowercase letters a-z , digits and the characters. Special characters, umlauts and accented characters are not allowed. Finally, enter a password for the user. Re-enter it for confirmation to ensure that you did not type something else by mistake.

To provide effective security, a password should be at least six characters long and consist of uppercase and lowercase letters, number and special characters 7-bit ASCII.

Umlauts or accented characters are not allowed. Passwords you enter are checked for weakness. When entering a password that is easy to guess such as a dictionary word or a name you will see a warning. It is a good security practice to use strong passwords. Remember both your user name and the password because they are needed each time you log in to the system. If you do not want to configure any local users for example when setting up a client on a network with centralized user authentication , skip this step by choosing Next and confirming the warning.

Network user authentication can be configured at any time later in the installed system; refer to Chapter 17, Managing Users with YaST for instructions. If checked, the same password you have entered for the user will be used for the system administrator root. This option is suitable for stand-alone workstations or machines in a home network that are administrated by a single user.

When not checked, you are prompted for a system administrator password in the next step of the installation workflow see Section 6.

This option automatically logs the current user in to the system when it starts. This is mainly useful if the computer is operated by only one user. For automatic login to work, the option must be explicitly enabled. Click Change in the Create User dialog to import users from a previous installation if present. Also change the password encryption type in this dialog. In the next dialog, select the users to import and finish with OK. By default the passwords are encrypted with the SHA hash function.

Changing this method is not recommended unless needed for compatibility reasons. If you have not chosen Use this Password for System Administrator in the previous step, you will be prompted to enter a password for the System Administrator root. Unlike regular users, root has unlimited rights to change the system configuration, install programs, and set up new hardware. If users forget their passwords or have other problems with the system, root can help.

The root account should only be used for system administration, maintenance, and repair. Logging in as root for daily work is rather risky: a single mistake could lead to irretrievable loss of system files.

For verification purposes, the password for root must be entered twice. Do not forget the root password. After having been entered, this password cannot be retrieved. In case of a system error or when you need to start your system in rescue mode, the keyboard may not be localized.

The root password can be changed any time later in the installed system. The user root has all the permissions needed to make changes to the system. To carry out such tasks, the root password is required. You cannot carry out any administrative tasks without this password. On the last step before the real installation takes place, you can alter installation settings suggested by the installer. To modify the suggestions, click the respective headline.

After having made changes to a particular setting, you are always returned to the Installation Settings window, which is updated accordingly. Click Software to open the Software Selection and System Tasks screen where you can modify the pattern selection according to your needs. Select a pattern from the list and see a description in the right-hand part of the window. Each pattern contains several software packages needed for specific functions for example Web and LAMP server or a print server.

For a more detailed selection based on software packages to install, select Details to switch to the YaST Software Manager. You can also install additional software packages or remove software packages from your system at any later time with the YaST Software Manager. For more information, refer to Chapter 14, Installing or Removing Software. The hardware cryptography stack is not installed by default. The language you selected with the first step of the installation will be used as the primary default language for the system.

The installer proposes a boot configuration for your system. Other operating systems found on your computer, such as Microsoft Windows or other Linux installations, will automatically be detected and added to the boot loader.

Normally, you can leave these settings unchanged. If you need a custom setup, modify the proposal according to your needs. For information, see Section The CPU Mitigations refer to kernel boot command line parameters for software mitigations that have been deployed to prevent CPU side-channel attacks. Click the highlighted entry to choose a different option.

For details, see CPU Mitigations. By default SuSEFirewall2 is enabled on all configured network interfaces. To globally disable the firewall for this computer, click Disable not recommended. The only port you can open during the installation is port 22 SSH , to allow remote access. Refer to Chapter 16, Masquerading and Firewalls for more information. It chooses the host key with the most recent access time by default.

See also Section 6. If you are performing a remote administration over VNC, you can also specify whether the machine should be accessible via VNC after the installation. Note: If you didn't migrate your openSUSE account in June , you will need to create a new account with a different email! Page 1 of 2 1 2 Last Jump to page: Results 1 to 10 of Join Date Jan Posts Go into Yast.

Select "software management". Then select "Patterns" -- I'm not quite sure where to find that in the Gnome interface to Yast, but it will be there.

Then follow your nose to complete the installation. When you login at the display login screen, there is actually a menu where you can select between gnome, KDE and some other choices.

From installation to fine tuning YaST is both an extremely flexible installer and a powerful control center. Two full-featured interfaces YaST offers a Qt-based graphical interface and a terminal-based interface that is perfect for remote administration.

Tweak everything YaST includes modules to configure almost every aspect of a Linux system and provides a solid framework for further development.



0コメント

  • 1000 / 1000