Onthis screen, select the preferred language to be used during the installation process. You can further select a specific locale, if any, for your selected language. Then click Continue to proceed.
The screen provides four categories of options: Localization, Software, System, and User Settings. Clicking an option under any of these categories opens additional screens to configure the selected option.
After defining directives in a specific screen, click Done to return to the Installation Summary screen. Then you can configure other options. As you visit each configuration screen, pay attention to any warning messages that are displayed at the bottom of the screen.
You can change the installation configuration options as much as you like. The installation does not begin until you click Begin Installation at the bottom of the screen. In turn, the Begin Installation button remains disabled until all the configuration warning flags have been cleared.
At the top right of the screen is the Keyboard switch. This switch appears in all of the option screens to enable you to change to a different available keyboard layout at any time during configuration. See Keyboard Layout for more details about keyboard layouts.
Under Localization, you configure the keyboard layouts, languages that would be supported, and the date, time, and time zone of the system. After configuring any of these options, click Done to return to the Installation Summary screen.
On the left pane, you can add other keyboard layouts to the preselected default layout. Additionally, you can revise the order of the listed layouts. The layout at the top of the list becomes the default layout.
Configuring language support consists of specifying additional locales of the selected language that you want the system to support. This option is similar to the configuration of the keyboard layout at the beginning of the installation.
To select the system's time zone, click an area on the map that approximates the site that you want the system to be located. Alternatively, you can select from the Region and City drop down lists to specify that location.
To enable NTP, toggle the Network Time switch at the upper right corner of the screen to ON. Click Settings to display a dialog box, where you can configure the NTP servers that the system would use. As an alternative, you can skip configuring NTP until later by using the Chrony suite. See Oracle Linux 8: Setting Up Networking. See also Configure Chrony on Oracle Linux.
If you use the full ISO image as the source, the install program detects that image. By default, the Auto-detected installation media button is selected and Appstream is listed as an additional installation repository, as shown in the following figure:
To install additional packages from other sources, use the Additional repositories box to add those sources, and then provide the necessary information about those sources in the text fields next to the box.
If you use the boot ISO image as the source, the install program detects that image and selects the On the network button as the installation mode. Further, Closest mirror is selected as the repository source, as shown in the following figure:
The configuration in the image is sufficient to proceed with the installation. Optionally, you can specify a local mirror as a repository source, in which case you would need to provide the mirror's path.
Each profile represents a set of functionalities and the required packages and software to fulfill those functionalities. By default, the Server with GUI profile is used. Choose the profile or base environment that best fits the purpose of the system on which you are installing Oracle Linux. From the upper-right pane, you can add profiles to the base profile you selected on the left pane.
The set of options under System enables you to specify where the operation system is installed, configure Kdump, the network, and the security profile. After configuring any of these options, click Done to return to the Installation Summary screen.
Even if you accept the default settings, you must still open the Installation Destination screen to clear the option's warning icon. Other disk configurations for the installation can be completed in this screen, such as enabling disk encryption, configuring storage, creating partitions, adding disks, and so on.
In the event of a system crash, Kdump captures information that assists in determining the cause. By default, Kdump is enabled and the amount of memory reserved for Kdump is calculated automatically. Select the Manual option if you want to set the amount of reserved memory yourself.
By default, network configuration uses DHCP for IPv4 addresses. IPv6 addresses are configured automatically. The default settings are generally sufficient for the system to provide basic network functionality. However, you can customize the network configuration, for example, by providing a custom host name, including a fully qualified domain name (FQDN). You can further opt to use static addresses instead of using DHCP, configure proxy settings, network bonds, and so on. To do these advanced types of configuration, click Configure and go through additional configuration screens.
Because security policy is not required on all systems, use the Security Policy screen only if you need to enforce a specific security policy as defined by your organization or by government regulations.
Available policies are listed in the profile window. These security policies follow the recommendations and guidelines that are defined by the Security Content Automation Protocol (SCAP) standard. Select the security profile you want to enforce and ensure that the Apply security policy is switched to On.
The Oracle Linux installation program can also run in text mode. Text mode is used automatically under certain circumstances, for example, if the system has insufficient memory or the video card is not supported. You can manually switch to the text mode by specifying inst.text as a boot option on the boot command line or by adding that option in a kickstart file.
To configure an option, type the option's number. The screen displays numbered values that are available for that option. Choose the value by typing the value's number. Then type c to continue. Continuing either returns you to the main menu screen, or displays additional related but non-obligatory options for you to configure. Type c also to skip screens.
If you selected System with GUI as the OS profile to install and configured root passwords without creating users, then at the initial login as root, you are prompted to create an initial user. Setting up the first user can be completed in two ways:
After you install Oracle Linux on a system, you have the option to register the system with the Unbreakable Linux Network (ULN), provided that you have an account. Registering enables the system to obtain additional packages, updates, and fixes. To register the system, choose one of the following methods:
If you have an Oracle Linux Premier Support account, you can opt to use Ksplice, which enables you to keep your systems secure and highly available by automatically updating them with the latest kernel security errata and other critical updates. For more information, see Oracle Linux: Ksplice User's Guide.
After a basic Oracle Linux installation, you might want to further configure the system for optimization and customization purposes, such as setting system date and time, scheduling tasks, obtaining updates, and so on. For reference, go to the Oracle Linux tutorial page at -systems/oracle-linux/8/tutorials.html which lists tutorials for different administrative tasks. Tutorials are available for tasks that you run at the command line or through the Cockpit web console.
You can verify Oracle Linux ISO files to establish their integrity and ensure that they were downloaded without any corruption or external interference.
This page describes the steps to verify both of these things regardless of the original download source.
The checksum file contains a list of files that are part of a download package with the corresponding checksums as well as a GPG signature. The GPG signature enables anyone to verify that checksum file was published by Oracle. The steps below describe how to verify the checksum file itself and then verify the contents of the Oracle Linux ISO you downloaded by checking it against the checksum file.
Download the appropriate checksum file and place it in the same directory as the Oracle Linux download.
Use the "gpg --verify" command to establish the integrity of the checksum file. For example, to verify the checksum file for Oracle Linux 8, use the following command:
Use the "sha256sum -c" command to verify the ISO checksum for the corresponding entry in the release checksum file.
For example, to verify Oracle Linux 8 ISO file integrity, use the following command:
Packages from "Developer" or "Technology Preview" repository channels are signed with Oracle Linux Development Keys.
To install packages from those channels, when package verification is enabled on the system, the system administrator must download and import the corresponding Development GPG key by using the "rpm --import " command.
You can verify the oracle Linux RPM package signature using the "rpm" command line tool.
For example, to verify the package file signature against the imported GPG key, use command:
The following keys are currently in use by the Oracle Linux project.
To verify the GPG key fingerprint matches the Oracle Linux key, use the "gpg" command.
For example, to review the downloaded GPG key fingerprint, use the following commands:
Oracle Development GPG signing keys are not locally available on the installed Oracle Linux systems.
In order to validate package signatures generated with development keys, the system administrator must download and import the development keys manually by using the command:# sudo rpm --import -GPG-KEY-oracle-developmentPackage management dnf or yum systems may also use *.repo configuration file for importing GPG key from URL.
A custom configuration file can be created for the development repository with "gpgkey=URI" parameter where URI references to the downloaded local public key file or to the remote GPG key file web link, for example:[ol_developer_repository]name=Oracle Linux Developer Repositorybaseurl=gpgkey= -GPG-KEY-oracle-development...When installing a package from this repository, GPG key from gpgkey URI will be proposed for importing in the system rpm keys database.
3a8082e126