Language Selection

English French German Italian Portuguese Spanish

YaST (Yet another SUSE 10.1 RC2 Trial), Part 1

Filed under
Reviews

Even though I swore I'd keep Fedora Core around for a while, it only took 3 months before I replaced it with Suse (again). It's all Xgl's fault. The Kororaa Live CD is very cool. Since Xgl was created by a Novell engineer, and there are Xgl binaries for Suse, and since Suse is coming out with a new version, and (fintally!) since Xgl hasn't made it into Debian Sid yet, it made sense to install Suse to use as an Xgl testbed.

I downloaded the Suse 10.1 RC1 ISOs via bittorrent using my favorite version of Linux, Kanotix (it's a live CD that installs Debian Sid, with some great enhancements). Then I grabbed the RC1 > RC2 deltas, figuring I'd try applying them with xdelta in Debian, and if that didn't work... That didn't work. Next thing to try was downloading the deltarpm rpm, using alien to convert it to a deb package, install it, and try again. It installed fine, but the applydeltaiso command ended up giving me a CRC error at the end of the conversion process (even though the MD5 sums of the ISOs and deltas were fine).

There's more than one way to skin a cat, and more than one way to install Suse. I grabbed the diminutive (35 MB) 'net install CD, followed the directions, and, in about an hour, was looking at a familiar green lizard. (The installer even recognized the native 1280x1024 resolution of my LCD monitor!)

The only glitches were as follows:

During installation, you come to a spot where it asks you if you want to go online to look for updates, and it complains it can't get online -- odd, since it just finished downloading 4 GB of packages. Then again, that part didn't work the last two times I installed Suse, either.

The second, more serious glitch came post-installation. I told it to put GRUB on the partition I installed Suse to (hda2), not my MBR, because I still boot Windows (OK, so I only waddle the waddle sometimes....) and I use a version of GRUB that runs after Windows' NTLDR runs. After rebooting, I got a "missing operating system" error, which was easily fixed by booting using a Smart Boot Manager floppy and running chkdsk in Windows. Suse, why'd you mess with my MBR when I specifically told you not to?

And the two most annoying glitches I've encountered in Suse proper are: 1) YaST won't seem to let me set my hostname manually. I want to leave the domain name blank, but it won't let me; then, when I put in a domain name, it complains about my search domain, which I'm not changing -- so I'm going to have to find out which files to edit manually. For now, I'm stuck with the annoying "dhcppc1". 2) I can't seem to add any repos without getting error messages about /etc/init.d/novell-zmd not starting. Then it tells me the server isn't accessible.

I really like the new openSuse Wiki. It makes doing things like installing nVidia drivers much easier when the instructions are easy to find.

In Part 2: On to Xgl.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

re: Delta iso.

173aae658e4dd903074ab545d28b1db0 SUSE-Linux-10.1-RC2-i386-CD1.iso
d2650dcaf7a5fb127f6e1446fc842779 SUSE-Linux-10.1-RC2-i386-CD2.iso
9fed5a68b70572a52958a47efb016a99 SUSE-Linux-10.1-RC2-i386-CD3.iso
84355796d41e81f7ceb19899718b7944 SUSE-Linux-10.1-RC2-i386-CD4.iso
19285e1d6ba62e50e89093660275fcc0 SUSE-Linux-10.1-RC2-i386-CD5.iso

47f3cf67680c0cafdf64911c0eabfc53 SUSE-Linux-10.1-RC2-x86_64-CD1.iso
6c7b9e2b23a91cc204f88795c2092112 SUSE-Linux-10.1-RC2-x86_64-CD2.iso
5b322328215b1886b9a584da6eae0a1e SUSE-Linux-10.1-RC2-x86_64-CD3.iso
071d1eeef1ce2398c6cbf7d5e9b99fa2 SUSE-Linux-10.1-RC2-x86_64-CD4.iso
e5b6920e80a5f31e3936726c62950fd7 SUSE-Linux-10.1-RC2-x86_64-CD5.iso

----
You talk the talk, but do you waddle the waddle?

More in Tux Machines

Audiocasts/Shows: Linux in the Ham Shack and Linux Headlines

  • LHS Episode #302: The End of Kenwood

    Welcome to Episode 302 of Linux in the Ham Shack. In this short topic episode, the hosts discuss the potential end of Kenwood in the amateur radio market, emcom in Montucky, Storm Area 51, HF on satellites, a huge update for PulseAudio, the Linux 5.3 kernel and much more. Thank you for listening and have a fantastic week.

  • 09/19/2019 | Linux Headlines

    Fresh init system controversy at the Debian project, a more scalable Samba, and a big release for LLVM. Plus GitHub's latest security steps and a new version of OBS Studio.

Android Leftovers

When Diverse Network ASICs Meet A Unifying Operating System

And it has also been a decade since switch upstart Arista Networks launched its Extensible Operating System, or EOS, which is derived from Linux. [...] The cross-platform nature of ArcOS, coupled with its ability to run in any function on the network, could turn out to be the key differentiator. A lot of these other NOSes were point solutions that could only be deployed in certain parts of the network, and that just creates animosity with the incumbent vendors that dominate the rest of the networking stack. Given the mission-critical nature of networking in the modern datacenter, it costs a great deal to qualify a new network operating system, and it can take a lot of time. If ArcOS can run across more platforms, qualify faster, and do more jobs in the network, then, says Garg, it has a good chance of shaking up switching and routing. “That totally changes the business conversation and the TCO advantages that we can bring to a customer across the entirety of their network.” Read more

Server: Kubernetes/OpenShift, OpenStack, and Red Hat's Ansible

  • 9 steps to awesome with Kubernetes/OpenShift presented by Burr Sutter

    Burr Sutter gave a terrific talk in India in July, where he laid out the terms, systems and processes needed to setup Kubernetes for developers. This is an introductory presentation, which may be useful for your larger community of Kubernetes users once you’ve already setup User Provisioned Infrastructure (UPI) in Red Hat OpenShift for them, though it does go into the deeper details of actually running the a cluster. To follow along, Burr created an accompanying GitHub repository, so you too can learn how to setup an awesome Kubernetes cluster in just 9 steps.

  • Weaveworks Named a Top Kubernetes Contributor

    But anyone who knows the history of Weaveworks might not be too surprised by this. Weaveworks has been a major champion of Kubernetes since the very beginning. It might not be too much of a coincidence that Weaveworks was incorporated only a few weeks after Kubernetes was open sourced, five years ago. In addition to this, the very first elected chair of the CNCF’s Technical Oversight Committee, responsible for technical leadership to the Cloud Native Foundation was also headed up by our CEO, Alexis Richardson(@monadic) (soon to be replaced by the awesome Liz Rice (@lizrice) of Aqua Security).

  • Improving trust in the cloud with OpenStack and AMD SEV

    This post contains an exciting announcement, but first I need to provide some context! Ever heard that joke “the cloud is just someone else’s computer”? Of course it’s a gross over-simplification, but there’s more than a grain of truth in it. And that raises the question: if your applications are running in someone else’s data-centre, how can you trust that they’re not being snooped upon, or worse, invasively tampered with?

  • Red Hat OpenStack Platform 15 Enhances Infrastructure Security and Cloud-Native Integration Across the Open Hybrid Cloud

    Red Hat, Inc., the world's leading provider of open source solutions, today announced the general availability of Red Hat OpenStack Platform 15, the latest version of its highly scalable and agile cloud Infrastructure-as-a-Service (IaaS) solution. Based on the OpenStack community’s "Stein" release, Red Hat OpenStack Platform 15 adds performance and cloud security enhancements and expands the platform’s ecosystem of supported hardware, helping IT organizations to more quickly and more securely support demanding production workloads. Given the role of Linux as the foundation for hybrid cloud, customers can also benefit from a more secure, flexible and intelligent Linux operating system underpinning their private cloud deployments with Red Hat Enterprise Linux 8.

  • Red Hat Ansible Automation Accelerates Past Major Adoption Milestone, Now Manages More Than Four Million Customer Systems Worldwide

    Red Hat, Inc., the world's leading provider of open source solutions, today announced that more than four million customer systems worldwide are now automated by Red Hat Ansible Automation. Customers, including Energy Market Company, Microsoft, Reserve Bank of New Zealand and Surescripts all use Red Hat Ansible Automation to automate and orchestrate their IT operations, helping to expand automation across IT stacks. According to a blog post by Chris Gardner with Forrester Research, who was the author of The Forrester Wave™: Infrastructure Automation Platforms, Q3 2019, "Infrastructure automation isn’t just on-premises or the cloud. It’s at the edge and everywhere in between."1 Since its launch in 2013, Red Hat Ansible Automation has provided a single tool to help organizations automate across IT operations and development, including infrastructure, networks, cloud, security and beyond.