For example Red Hat Enterprise Linux or SUSE Enterprise Linux.
I’m considering switching to RHEL, to get a “professional” Linux, since it’s free if you register an account, but is it worth it?
Is the experience very different from Fedora?
So Technically No. Our proprietary CAD was only supported and certified to work on RHEL or SUSE. I wanted to test before commiting to a distro. So I went with OpenSUSE leap since it shares SUSE binaries and has same release and service cycle. It installed and functions well on OoenSUSE While not identical to SUSE, I can say all the complaints I saw online of things not working in Linux were working for me. They sort of have to on a paid distro with support, so it seems to carry to OpenSUSE with the same binaries
- nVidia hosts a repo specifically for SUSE and OpenSUSE ( probably RHEL too) it meany adding that nvdia url and updating in Yast2 GUI. Everything works, no tearing, no glitches, nVidia app for thermal settings or tweaking.
2)btrfs works. I saw lots of complaints of people saying btrfs filled their drive, etc. SUSE / OpenSUSE as jobs establishes to monitor number and age of snapshots and remove automatically as needed as well as cleaning tools. It all runs behind the scenes.
- patches, people complain they don’t know if a CVE affects them, if they have applied a patch or not, what package etc. On SUSE/OoenSUSE you have several patch, patches, lp commands that show you what has been released, what level and whether your system has it installed, not required, critical etc. Keeping up with CVE and patches is easy.
I assume RHEL will also have these types of perks to make some aspects easier
RHEL will also have these types of [perquisites]
Yeah. Yum upgrade
. The work that goes into a reliably safe, brain-dead, boring update process with a rollback and by-the-checksum validation of installed product is the most unsung part of the distro.
And people really should value the ability to answer
- are we safe from CVE-xxxx-yyyyy? (it’s in the changelog and often an upgrade command like
yum update --cve <CVE-ID>
will settle it) - how do we know we installed all of that and it’s valid? (
rpm -V some-RPM
)
And ‘how do we know’ is an amazingly powerful question that’s easy to answer on EL and hard as heck to answer on debs or anything with flatpak/snap/pyp/npm nonsense.