The Sun N1 Service Provisioning System User's Guide for OS Provisioning Plug-In 3.0 explains how to provision operating systems through the N1 Service Provisioning System (N1 SPS) product.
The main audience for the Sun N1 Service Provisioning System User's Guide for OS Provisioning Plug-In 3.0 includes system administrators and operators of N1 SPS software who want to be able to maintain the operating systems throughout their enterprise. These users are expected to be familiar with the following:
The N1 SPS product
Standard UNIXTM and Windows commands and utilities
The general concepts and management features available for the operating systems to be provisioned
If you are not already familiar with using the N1 SPS software, read the following books:
Sun N1 Service Provisioning System 5.2 System Administration Guide
Sun N1 Service Provisioning System 5.2 Operation and Provisioning Guide
Chapter 1, Introduction to OS Provisioning provides an overview of the OS provisioning feature.
Chapter 2, Release Notes for OS Provisioning Plug-In includes known issues and late-breaking news about OS provisioning features.
Chapter 3, OS Provisioning Deployment Environment describes how to set up the environment to more easily support OS provisioning.
Chapter 4, Installing and Configuring the OS Provisioning Plug-In explains how to install and configure the OS provisioning plug-in.
Chapter 5, Provisioning the Solaris Operating System provides step-by-step instructions on how to provision Solaris systems.
Chapter 6, Provisioning the RedHat Linux Operating Environment provides step-by-step instructions on how to provision RedHat Linux systems.
Chapter 7, Provisioning the SuSe Linux Operating Environment provides step-by-step instructions on how to provision SuSe Linux systems.
Chapter 8, Provisioning the Windows Operating Environment provides step-by-step instructions on how to provision Windows systems.
Chapter 9, Target Hosts for OS Provisioning describes appropriate target hosts for OS provisioning.
Appendix A, Target Host Variables describes the specific variables that apply to each target host type.
Appendix B, Solaris Profile Component Variables describes the specific variables that apply to the Solaris provisioning profiles.
Appendix C, RedHat Linux Profile Component Variables describes the specific variables that apply to the RedHat Linux provisioning profiles.
Appendix D, SuSE Linux Profile Component Variables describes the specific variables that apply to the SuSe Linux provisioning profiles.
Appendix E, Microsoft Windows Profile Component Variables describes the specific variables that apply to the Windows provisioning profiles.
Appendix F, Creating Additional JET Modules explains how to extend the Solaris provisioning functionality by creating user-specific custom modules.
Appendix G, Advanced Configuration Properties describes how to configure advanced properties for your provisioning plans.
Third-party URLs are referenced in this document and provide additional, related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |