Skip to main content

openSUSE Tumbleweed - Why I Switched After Years on Fedora

For over a month now, I've been using openSUSE Tumbleweed as my daily driver, and it's been an enlightening experience. As a long-time Fedora user, I was curious about what Tumbleweed had to offer, especially since it often seems to fly under the radar in the wider Linux community. I think it’s a seriously underestimated distribution, so I wanted to share my thoughts on making the switch.

The Lure of the Roll: Why I Left Fedora

I've been a dedicated Fedora user since 2018, with only a brief hiatus on a MacBook. While I love Fedora's stability, the concept of a rolling release distribution that was thoroughly tested and polished always intrigued me. I pictured openSUSE Tumbleweed as something like a 'rolling release Fedora.'

While Tumbleweed is famous for its seamless Btrfs integration, I stick to a traditional LVM with EXT4 partitioning scheme on my laptop. For me, the biggest draw was the option of an officially supported LTS kernel. This is a fantastic feature for users like me who prioritize stability over needing support for the absolute latest hardware.


Package Availability: No Compromises

In today's Linux world, package availability isn't the huge concern it once was, thanks to universal formats like Flatpak. I already use the Flatpak versions of Steam and Virt-Manager because it’s incredibly convenient to keep their dependencies sandboxed.

That said, Tumbleweed's official repositories had everything I needed. The pleasant surprise was finding the LTS kernel right there in the main repo—no third-party solutions needed. This made it incredibly easy to install and test it against the default mainline kernel. For my needs, openSUSE left nothing to be desired.


Security: A Level Playing Field

This is one area where both distributions truly excel. Both Tumbleweed and Fedora ship with SELinux and Firewalld enabled by default, providing a very secure foundation. While Fedora's default firewall rules are slightly more permissive out of the box, the difference is trivial for a desktop user and easily changed. Both teams are also exceptionally quick to patch vulnerabilities. When it comes to security, I consider them to be on equal footing --- you're in good hands with either.


First Impressions: Power vs. Polish

This is where the differences between the two distros become most apparent.

Fedora's Anaconda installer is streamlined and practically foolproof. It's designed to get you up and running with a sensible, working system as quickly as possible.

OpenSUSE’s installer, on the other hand, is a tinkerer's dream. While not as fully customizable as an Arch Linux installation, it gives you an incredible amount of control, allowing you to fine-tune many aspects of your installation, from your partitioning scheme to your exact software selection. This power is fantastic if you know what you're doing, but it also presents opportunities to create a broken system if you're not careful. (I’m looking at you, 'acpid.service' and missing 'xdg-desktop-portal-gnome'!)

This philosophy extends to the post-install experience. With GNOME, Fedora feels more "batteries-included" and takes care of many configurations for you. OpenSUSE expects the user to take the reins, which is perfect if you, like me, enjoy customizing your setup. If you're looking for an OS that "just works" with zero fuss, Fedora probably has the edge.


A Quick Note on Automation

As a heavy user of Ansible for automating my system setup, I did notice a difference. It feels like Fedora has a tighter integration with Ansible, which makes sense given both are under the Red Hat umbrella. This wasn't a deal-breaker, but it's something for fellow automation fans to consider.


Conclusion: Tumbleweed is a Diamond in the Rough

After a month, I've concluded that openSUSE Tumbleweed is far more than just a "rolling Fedora." It’s a powerful, stable, and highly customizable distribution that rewards a user who's willing to put in a little effort upfront.

I see it as the perfect middle ground between the DIY nature of Arch Linux and the polished stability of Fedora. It requires a bit more initial setup to get it just right, but once you do, you're left with an incredibly robust and up-to-date system.

If you feel like Tumbleweed doesn't get enough credit online, you're right. It’s a true gem, and I hope my experience encourages you to give it a try.


Thanks for attending my TED talk ;)

Comments

Popular posts from this blog

Dynamic DNS with BIND and ISC-DHCP

I personally prefer to work with hostnames instead of ip-addresses. If you have anything like freeipa or active directory, it will do that for you by registering the client you added to your realm to the managed dns and edit the records dynamically. We can achieve the same goal with just bind and isc-dhcp. I'll use a raspberry pi with raspbian 9 for this setup. So here is a quick tutorial on how to configure the isc-dhcp-server to dynamically update bind. First set a static ip to your server. [archy@ddns ~]$ sudo vim /etc/network/interfaces # interfaces(5) file used by ifup(8) and ifdown(8) # Please note that this file is written to be used with dhcpcd # For static IP, consult /etc/dhcpcd.conf and 'man dhcpcd.conf' # Include files from /etc/network/interfaces.d: source-directory /etc/network/interfaces.d auto eth0 iface eth0 inet static address 172.31.30.5 network 172.31.30.0 broadcast 172.31.30.255 netmask 255.255.255.0 ...

Push logs and data into elasticsearch - Part 2 Mikrotik Logs

This is only about the setup of different logging, one being done with Filebeat and the other being done with sending logging to a dedicated port opened in Logstash using the TCP / UDP Inputs. Prerequesites: You'll need a working Elasticsearch Cluster with Logstash and Kibana. Start by getting the Log Data you want to structure parsed correctly. Mikrotik Logs are a bit difficult since they show you Data in the interface which is already enriched with Time / Date. That means a message that the remote logging will send to Logstash will look like this: firewall,info forward: in:lan out:wan, src-mac aa:bb:cc:dd:ee:ff, proto UDP, 172.31.100.154:57061->109.164.113.231:443, len 76 You can check them in the grok debugger and create your own filters and mapping. The following is my example which might not fit your needs. Here are some custom patterns I wrote for my pattern matching: MIKROTIK_DATE \b(?:jan(?:uary)?|feb(?:ruary)?|mar(?:ch)?|apr(?:il)?|may|jun(?:e)?|jul(?...

LACP-Teaming on CentOS 7 / RHEL 7

What is teaming? Teaming or LACP (802.3ad) is a technique used to bond together multiple interfaces to achieve higher combined bandwith. NOTE: every clients speed can only be as high as the single link speed of one of the members. That means, if the interfaces I use in the bond have 1 Gigabit, every client will only have a maximum speed of 1 Gigabit. The advantage of teaming is, that it can handle multiple connections with 1 Gigabit. How many connections depends on the amount of your network cards. I'm using 2 network cards for this team on my server. That means I can handle 2 Gigabit connections at full rate on my server provided the rest of the hardware can deliver that speed. There also exists 'Bonding' in the Linux world. They both do the same in theory but  for a detailed comparison check out this  article about teaming in RHEL7 . To create a teaming-interface, we will first have to remove all the interface configurations we've done on the (soon to be) sla...

FreeIPA - Integrating your DHCPD dynamic Updates into IPA

I recently went over my network configuration and noticed that the dhcp-leases were not pushed into the IPA-DNS yet. So I thought, why not do it now. The setup is very similar to setting it up on a single bind instance not managed by IPA (I've already written a guide about this here ). My setup is done with the following hosts: ipa01.archyslife.lan - 172.31.0.1 inf01.archyslife.lan - 172.31.0.5 First of all, create a rndc-key: [archy@ipa01 ~]$ sudo rndc-confgen -a -b 512 This will create the following file '/etc/rndc-key' [archy@ipa01 ~]$ sudo cat /etc/rndc.key key "rndc-key" { algorithm hmac-md5; secret "secret_key_here=="; }; We also need to make named aware of the rndc-key and allow our remote dhcp server to write dns entries: [archy@ipa01 ~]$ sudo vim /etc/named.conf ... include "/etc/rndc-key"; controls { inet 172.31.0.1 port 953 allow { 172.31.0.5; } keys ...

Creating a pgpool-II based PostgreSQL Cluster

This time I'm going to do a small and quick walkthrough for a postgresql cluster install. I assume you have a clean install of CentOS 7.3 with all updates. The configuration itself is surprisingly simple. The enviroment I'm working with is: Node1: Hostname: pgsql01.archyslife.lan IP: 172.31.10.31 Member of IPA-Domain Selinux: enforcing Node2: Hostname: pgsql02.archyslife.lan IP: 172.31.10.32 Member of IPA-Domain Selinux: enforcing Cluster: Main Node: pgsql01.archyslife.lan Replica: pgsql02.archyslife.lan Virtual IP: 172.31.10.33 for the sake completeness I'll be adding a A-Record entry in the IPA-DNS. Let's start with the configuration of each node. First I will completely setup the Master without restarting the services, afterwards the replica will follow. Steps necessary for both nodes. Add the pgsql-repo to yum. [archy@pgsql01 ~]$ sudo yum -y install https://download.postgresql.org/pub/repos/yum/9.6/redhat/rhel-7-x86_64/pgdg-centos96-9.6...