Red Hat Enterprise Linux-6

809
Barbora Ančincová Jaromír Hradílek Douglas Silas Mart in Prpič Stephen Wadeley Eva Kopalová Peter Ondrejka Ella Lackey Tomáš Čapek Petr Kovář Miroslav Svoboda Petr Bokoč Jiří Herrmann Jana Švárová Milan Navrátil Robert Krátký Florian Nadge John Ha David O'Brien Michael Hideo Don Domingo Red Hat Enterprise Linux 6 Deployment Guide Deployment, Configuration and Administration of Red Hat Enterprise Linux 6 Edition 6

description

Red Hat Enterprise Linux-6

Transcript of Red Hat Enterprise Linux-6

  • Barbora Anincov Jaromr Hrad lek Douglas SilasMart in Prpi Stephen Wadeley Eva KopalovPeter Ondrejka Ella Lackey Tom apekPetr Kov Miroslav Svoboda Petr BokoJi Herrmann Jana vrov Milan Navrt ilRobert Krtk Florian Nadge John HaDavid O'Brien Michael Hideo Don Domingo

    Red Hat Enterprise Linux 6Deployment Guide

    Deployment, Configurat ion and Administrat ion of Red Hat Enterprise Linux6Edit ion 6

  • Red Hat Enterprise Linux 6 Deployment Guide

    Deployment, Configurat ion and Administrat ion of Red Hat Enterprise Linux6Edit ion 6

    Barbora AnincovRed Hat Customer Content [email protected] HradlekRed Hat Customer Content [email protected] SilasRed Hat Customer Content [email protected] PrpiRed Hat Customer Content [email protected] WadeleyRed Hat Customer Content [email protected] KopalovRed Hat Customer Content [email protected] OndrejkaRed Hat Customer Content [email protected] LackeyRed Hat Customer Content [email protected] apekRed Hat Customer Content [email protected] KovRed Hat Customer Content [email protected] SvobodaRed Hat Customer Content [email protected] BokoRed Hat Customer Content [email protected]

  • Ji HerrmannRed Hat Customer Content [email protected] vrovRed Hat Customer Content [email protected] NavrtilRed Hat Customer Content [email protected] KrtkRed Hat Customer Content [email protected] NadgeRed Hat Customer Content ServicesJohn HaRed Hat Customer Content ServicesDavid O'BrienRed Hat Customer Content ServicesMichael HideoRed Hat Customer Content ServicesDon DomingoRed Hat Customer Content Services

  • Legal NoticeCopyright 20102013 Red Hat, Inc.This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0Unported License. If you distribute this document, o r a modified version o f it, you must provideattribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all RedHat trademarks must be removed.Red Hat, as the licensor o f this document, waives the right to enforce, and agrees not to assert,Section 4d o f CC-BY-SA to the fullest extent permitted by applicable law.Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the InfinityLogo, and RHCE are trademarks o f Red Hat, Inc., registered in the United States and o thercountries.Linux is the registered trademark o f Linus Torvalds in the United States and o ther countries.Java is a registered trademark o f Oracle and/or its affiliates.XFS is a trademark o f Silicon Graphics International Corp. or its subsidiaries in the UnitedStates and/or o ther countries.MySQL is a registered trademark o f MySQL AB in the United States, the European Union andother countries.Node.js is an o fficial trademark o f Joyent. Red Hat Software Collections is not fo rmallyrelated to or endorsed by the o fficial Joyent Node.js open source or commercial pro ject.The OpenStack Word Mark and OpenStack Logo are either registered trademarks/servicemarks or trademarks/service marks o f the OpenStack Foundation, in the United States and o thercountries and are used with the OpenStack Foundation's permission. We are not affiliated with,endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.All o ther trademarks are the property o f their respective owners.

    AbstractThe Deployment Guide documents relevant information regarding the deployment,configuration and administration o f Red Hat Enterprise Linux 6 . It is oriented towards systemadministrators with a basic understanding o f the system.

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Table of ContentsPreface

    1. Targ et Aud ience2. Ho w to Read this Bo o k3. Do cument Co nventio ns

    3.1. Typ o g rap hic Co nventio ns3.2. Pull-q uo te Co nventio ns3.3. No tes and Warning s

    4. Feed b ack5. Ackno wled g ments

    Part I. Basic Syst em Configurat ion

    Chapt er 1 . Keyboard Configurat ion1.1. Chang ing the Keyb o ard Layo ut1.2. Ad d ing the Keyb o ard Layo ut Ind icato r1.3. Setting Up a Typ ing Break

    Chapt er 2 . Dat e and T ime Configurat ion2.1. Date/Time Pro p erties To o l

    2.1.1. Date and Time Pro p erties2.1.2. Netwo rk Time Pro to co l Pro p erties2.1.3. Time Zo ne Pro p erties

    2.2. Co mmand Line Co nfig uratio n2.2.1. Date and Time Setup2.2.2. Netwo rk Time Pro to co l Setup

    Chapt er 3. Managing Users and Groups3.1. What Users and Gro up s Are3.2. Manag ing Users via the User Manag er ap p licatio n

    3.2.1. Viewing Users3.2.2. Ad d ing a New User3.2.3. Mo d ifying User Pro p erties

    3.3. Manag ing Gro up s via the User Manag er Ap p licatio n3.3.1. Viewing Gro up s3.3.2. Ad d ing a New Gro up3.3.3. Mo d ifying Gro up Pro p erties

    3.4. Manag ing Users via Co mmand -Line To o ls3.4.1. Creating Users3.4.2. Attaching New Users to Gro up s3.4.3. Up d ating Users ' Authenticatio n3.4.4. Mo d ifying User Setting s3.4.5. Deleting Users3.4.6 . Disp laying Co mp rehensive User Info rmatio n

    3.5. Manag ing Gro up s via Co mmand -Line To o ls3.5.1. Creating Gro up s3.5.2. Attaching Users to Gro up s3.5.3. Up d ating Gro up Authenticatio n3.5.4. Mo d ifying Gro up Setting s3.5.5. Deleting Gro up s

    3.6 . Ad d itio nal Reso urces3.6 .1. Installed Do cumentatio n

    Chapt er 4 . Gaining Privileges

    1 51515181820202121

    2 2

    2 3232527

    2 929293031323333

    36363737383940404142424245464748485151525353545454

    56

    T able of Cont ent s

    1

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    4.1. The su Co mmand4.2. The sud o Co mmand4.3. Ad d itio nal Reso urces

    Installed Do cumentatio nOnline Do cumentatio n

    Part II. Package Management

    Chapt er 5. Regist ering a Syst em and Managing Subscript ions5.1. Using Red Hat Sub scrip tio n Manag er To o ls

    5.1.1. Launching the Red Hat Sub scrip tio n Manag er GUI5.1.2. Running the sub scrip tio n-manag er Co mmand -Line To o l

    5.2. Reg istering and Unreg istering a System5.2.1. Reg istering fro m the GUI5.2.2. Reg istering fro m the Co mmand Line5.2.3. Unreg istering

    5.3. Attaching and Remo ving Sub scrip tio ns5.3.1. Attaching and Remo ving Sub scrip tio ns thro ug h the GUI5.3.2. Attaching and Remo ving Sub scrip tio ns thro ug h the Co mmand Line

    5.4. Red eeming Vend o r Sub scrip tio ns5.4.1. Red eeming Sub scrip tio ns thro ug h the GUI5.4.2. Red eeming Sub scrip tio ns thro ug h the Co mmand Line

    5.5. Attaching Sub scrip tio ns fro m a Sub scrip tio n Asset Manag er Activatio n Key5.6 . Setting Preferences fo r Systems

    5.6 .1. Setting Preferences in the UI5.6 .2. Setting Service Levels Thro ug h the Co mmand Line5.6 .3. Setting a Preferred Op erating System Release Vers io n in the Co mmand Line

    5.7. Manag ing Sub scrip tio n Exp iratio n and No tificatio ns

    Chapt er 6 . Yum6 .1. Checking Fo r and Up d ating Packag es

    6 .1.1. Checking Fo r Up d ates6 .1.2. Up d ating Packag es6 .1.3. Preserving Co nfig uratio n File Chang es6 .1.4. Up g rad ing the System Off-l ine with ISO and Yum

    6 .2. Packag es and Packag e Gro up s6 .2.1. Searching Packag es6 .2.2. Lis ting Packag es6 .2.3. Disp laying Packag e Info rmatio n6 .2.4. Install ing Packag es6 .2.5. Remo ving Packag es

    6 .3. Wo rking with Transactio n Histo ry6 .3.1. Lis ting Transactio ns6 .3.2. Examining Transactio ns6 .3.3. Reverting and Rep eating Transactio ns6 .3.4. Co mp leting Transactio ns6 .3.5. Starting New Transactio n Histo ry

    6 .4. Co nfig uring Yum and Yum Rep o sito ries6 .4.1. Setting [main] Op tio ns6 .4.2. Setting [rep o sito ry] Op tio ns6 .4.3. Using Yum Variab les6 .4.4. Viewing the Current Co nfig uratio n6 .4.5. Ad d ing , Enab ling , and Disab ling a Yum Rep o sito ry6 .4.6 . Creating a Yum Rep o sito ry

    5657585859

    6 0

    6 16 16 16 26 26 26 76 970707375757677777778798 0

    8 58 58 58 68 88 99 09 09 19 39 49 69 79 8

    10 010 210 310 310 310 310 710 9110110112

    Red Hat Ent erprise Linux 6 Deployment Guide

    2

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    6 .4.6 . Creating a Yum Rep o sito ry6 .4.7. Wo rking with Yum Cache6 .4.8 . Ad d ing the Op tio nal and Sup p lementary Rep o sito ries

    6 .5. Yum Plug -ins6 .5.1. Enab ling , Co nfig uring , and Disab ling Yum Plug -ins6 .5.2. Install ing Ad d itio nal Yum Plug -ins6 .5.3. Plug -in Descrip tio ns

    6 .6 . Ad d itio nal Reso urcesInstalled Do cumentatio nOnline Do cumentatio nSee Also

    Chapt er 7 . PackageKit7.1. Up d ating Packag es with So ftware Up d ate

    Setting the Up d ate-Checking Interval7.2. Using Ad d /Remo ve So ftware

    7.2.1. Refreshing So ftware So urces (Yum Rep o sito ries)7.2.2. Find ing Packag es with Filters7.2.3. Install ing and Remo ving Packag es (and Dep end encies)7.2.4. Install ing and Remo ving Packag e Gro up s7.2.5. Viewing the Transactio n Lo g

    7.3. Packag eKit Architecture7.4. Ad d itio nal Reso urces

    Installed Do cumentatio nOnline Do cumentatio nSee Also

    Part III. Net working

    Chapt er 8 . Net workManager8 .1. The Netwo rkManag er Daemo n8 .2. Interacting with Netwo rkManag er

    8 .2.1. Co nnecting to a Netwo rk8 .2.2. Co nfig uring New and Ed iting Existing Co nnectio ns8 .2.3. Co nnecting to a Netwo rk Auto matically8 .2.4. User and System Co nnectio ns

    8 .3. Estab lishing Co nnectio ns8 .3.1. Estab lishing a Wired (Ethernet) Co nnectio n8 .3.2. Estab lishing a Wireless Co nnectio n8 .3.3. Estab lishing a Mo b ile Bro ad b and Co nnectio n8 .3.4. Estab lishing a VPN Co nnectio n8 .3.5. Estab lishing a DSL Co nnectio n8 .3.6 . Estab lishing a Bo nd Co nnectio n8 .3.7. Estab lishing a VLAN Co nnectio n8 .3.8 . Estab lishing an IP-o ver-InfiniBand (IPo IB) Co nnectio n8 .3.9 . Co nfig uring Co nnectio n Setting s

    Chapt er 9 . Net work Int erfaces9 .1. Netwo rk Co nfig uratio n Files9 .2. Interface Co nfig uratio n Files

    9 .2.1. Ethernet Interfaces9 .2.2. Sp ecific ifc fg Op tio ns fo r Linux o n System z9 .2.3. Req uired ifc fg Op tio ns fo r Linux o n System z9 .2.4. Channel Bo nd ing Interfaces9 .2.5. Netwo rk Brid g e9 .2.6 . Setting Up 8 0 2.1Q VLAN Tag g ing

    112113114115115116116120120120120

    1 2 1121122123123124126127128129130130131131

    1 32

    1 3313313313413513613713813814214715015415516 016 216 4

    1 7 317317417417918 018 018 418 7

    T able of Cont ent s

    3

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    9 .2.6 . Setting Up 8 0 2.1Q VLAN Tag g ing9 .2.7. Alias and Clo ne Files9 .2.8 . Dialup Interfaces9 .2.9 . O ther Interfaces

    9 .3. Interface Co ntro l Scrip ts9 .4. Static Ro utes and the Default Gateway

    Co nfig uring Static Ro utes Using the Co mmand Line Co nfig uring The Default Gateway

    9 .5. Co nfig uring Static Ro utes in ifc fg fi les9 .5.1. Static Ro utes Using the IP Co mmand Arg uments Fo rmat9 .5.2. Netwo rk/Netmask Directives Fo rmat

    9 .6 . Co nfig uring IPv6 To kenized Interface Id entifiers9 .7. Netwo rk Functio n Files9 .8 . Ethto o l9 .9 . Ad d itio nal Reso urces

    Installed Do cumentatio nOnline Do cumentatio nSee Also

    Part IV. Infrast ruct ure Services

    Chapt er 1 0 . Services and Daemons10 .1. Co nfig uring the Default Runlevel10 .2. Co nfig uring the Services

    10 .2.1. Using the Service Co nfig uratio n Util i ty10 .2.2. Using the ntsysv Util i ty10 .2.3. Using the chkco nfig Uti l i ty

    10 .3. Running Services10 .3.1. Determining the Service Status10 .3.2. Starting a Service10 .3.3. Sto p p ing a Service10 .3.4. Restarting a Service

    10 .4. Ad d itio nal Reso urces10 .4.1. Installed Do cumentatio n10 .4.2. Related Bo o ks

    Chapt er 1 1 . Configuring Aut hent icat ion11.1. Co nfig uring System Authenticatio n

    11.1.1. Launching the Authenticatio n Co nfig uratio n To o l UI11.1.2. Selecting the Id entity Sto re fo r Authenticatio n11.1.3. Co nfig uring Alternative Authenticatio n Features11.1.4. Co nfig uring Authenticatio n fro m the Co mmand Line11.1.5. Using Custo m Ho me Directo ries

    11.2. Using and Caching Cred entials with SSSD11.2.1. Ab o ut SSSD11.2.2. Setting up the sssd .co nf File11.2.3. Starting and Sto p p ing SSSD11.2.4. SSSD and System Services11.2.5. Co nfig uring Services: NSS11.2.6 . Co nfig uring Services: PAM11.2.7. Co nfig uring Services: auto fs11.2.8 . Co nfig uring Services: sud o11.2.9 . Co nfig uring Services: Op enSSH and Cached Keys11.2.10 . SSSD and Id entity Pro vid ers (Do mains)

    18 718 818 919 119 219 419 419 519 519 519 619 719 819 820 420 420 520 5

    2 0 6

    2 0 720 720 820 8210211213213214214214215215215

    2 1 6216216217224226229230230231232233234236238242245248

    Red Hat Ent erprise Linux 6 Deployment Guide

    4

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    11.2.11. Creating Do mains: LDAP11.2.12. Creating Do mains: Id entity Manag ement (Id M)11.2.13. Creating Do mains: Active Directo ry11.2.14. Co nfig uring Do mains: Active Directo ry as an LDAP Pro vid er (Alternative)11.2.15. Do main Op tio ns: Setting Username Fo rmats11.2.16 . Do main Op tio ns: Enab ling O ffl ine Authenticatio n11.2.17. Do main Op tio ns: Setting Passwo rd Exp iratio ns11.2.18 . Do main Op tio ns: Using DNS Service Disco very11.2.19 . Do main Op tio ns: Using IP Ad d resses in Certificate Sub ject Names (LDAP Only)11.2.20 . Creating Do mains: Pro xy11.2.21. Creating Do mains: Kerb ero s Authenticatio n11.2.22. Creating Do mains: Access Co ntro l11.2.23. Creating Do mains: Primary Server and Backup Servers11.2.24. Install ing SSSD Util i ties11.2.25. SSSD and UID and GID Numb ers11.2.26 . Creating Lo cal System Users11.2.27. Seed ing Users into the SSSD Cache During Kickstart11.2.28 . Manag ing the SSSD Cache11.2.29 . Do wng rad ing SSSD11.2.30 . Using NSCD with SSSD11.2.31. Tro ub lesho o ting SSSD

    Chapt er 1 2 . OpenSSH12.1. The SSH Pro to co l

    12.1.1. Why Use SSH?12.1.2. Main Features12.1.3. Pro to co l Vers io ns12.1.4. Event Seq uence o f an SSH Co nnectio n

    12.2. Co nfig uring Op enSSH12.2.1. Co nfig uratio n Files12.2.2. Starting an Op enSSH Server12.2.3. Req uiring SSH fo r Remo te Co nnectio ns12.2.4. Using a Key-Based Authenticatio n

    12.3. Op enSSH Clients12.3.1. Using the ssh Util i ty12.3.2. Using the scp Util i ty12.3.3. Using the sftp Uti l i ty

    12.4. Mo re Than a Secure Shell12.4.1. X11 Fo rward ing12.4.2. Po rt Fo rward ing

    12.5. Ad d itio nal Reso urces12.5.1. Installed Do cumentatio n12.5.2. Useful Web sites

    Chapt er 1 3. T igerVNC13.1. VNC Server

    13.1.1. Install ing VNC Server13.1.2. Co nfig uring the firs t VNC co nnectio n13.1.3. Starting VNC Server13.1.4. Terminating VNC sessio n

    13.2. VNC Viewer13.2.1. Install ing VNC viewer13.2.2. Co nnecting to VNC Viewer13.2.3. Co nnecting to VNC Server us ing SSH

    25125625826 426 827027127227427427627928 128 228 228 228 328 428 628 628 7

    2 9 429 429 429 429 529 529 729 729 829 929 930 530 530 730 730 830 830 9310310310

    31 1311311311312313313313314314

    T able of Cont ent s

    5

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    13.2.3. Co nnecting to VNC Server us ing SSH13.3. Ad d itio nal Reso urces

    Part V. Servers

    Chapt er 1 4 . DHCP Servers14.1. Why Use DHCP?14.2. Co nfig uring a DHCP Server

    14.2.1. Co nfig uratio n File14.2.2. Lease Datab ase14.2.3. Starting and Sto p p ing the Server14.2.4. DHCP Relay Ag ent

    14.3. Co nfig uring a DHCP Client14.4. Co nfig uring a Multiho med DHCP Server

    14.4.1. Ho st Co nfig uratio n14.5. DHCP fo r IPv6 (DHCPv6 )14.6 . Ad d itio nal Reso urces

    14.6 .1. Installed Do cumentatio n

    Chapt er 1 5. DNS Servers15.1. Intro d uctio n to DNS

    15.1.1. Nameserver Zo nes15.1.2. Nameserver Typ es15.1.3. BIND as a Nameserver

    15.2. BIND15.2.1. Co nfig uring the named Service15.2.2. Ed iting Zo ne Files15.2.3. Using the rnd c Util i ty15.2.4. Using the d ig Util i ty15.2.5. Ad vanced Features o f BIND15.2.6 . Co mmo n Mistakes to Avo id15.2.7. Ad d itio nal Reso urces

    Chapt er 1 6 . Web Servers16 .1. The Ap ache HTTP Server

    16 .1.1. New Features16 .1.2. No tab le Chang es16 .1.3. Up d ating the Co nfig uratio n16 .1.4. Running the http d Service16 .1.5. Ed iting the Co nfig uratio n Files16 .1.6 . Wo rking with Mo d ules16 .1.7. Setting Up Virtual Ho sts16 .1.8 . Setting Up an SSL Server16 .1.9 . Ad d itio nal Reso urces

    Chapt er 1 7 . Mail Servers17.1. Email Pro to co ls

    17.1.1. Mail Transp o rt Pro to co ls17.1.2. Mail Access Pro to co ls

    17.2. Email Pro g ram Classificatio ns17.2.1. Mail Transp o rt Ag ent17.2.2. Mail Delivery Ag ent17.2.3. Mail User Ag ent

    17.3. Mail Transp o rt Ag ents17.3.1. Po stfix17.3.2. Send mail

    314315

    31 6

    31 7317317317320321322322323324326326326

    32 8328328328329329329337344347349350351

    35335335335335335435538 638 738 839 5

    39 739 739 739 740 040 040 040 040 140 140 3

    Red Hat Ent erprise Linux 6 Deployment Guide

    6

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    17.3.2. Send mail17.3.3. Fetchmail17.3.4. Mail Transp o rt Ag ent (MTA) Co nfig uratio n

    17.4. Mail Delivery Ag ents17.4.1. Pro cmail Co nfig uratio n17.4.2. Pro cmail Recip es

    17.5. Mail User Ag ents17.5.1. Securing Co mmunicatio n

    17.6 . Ad d itio nal Reso urces17.6 .1. Installed Do cumentatio n17.6 .2. Useful Web sites17.6 .3. Related Bo o ks

    Chapt er 1 8 . Direct ory Servers18 .1. Op enLDAP

    18 .1.1. Intro d uctio n to LDAP18 .1.2. Install ing the Op enLDAP Suite18 .1.3. Co nfig uring an Op enLDAP Server18 .1.4. Running an Op enLDAP Server18 .1.5. Co nfig uring a System to Authenticate Using Op enLDAP18 .1.6 . Ad d itio nal Reso urces

    Chapt er 1 9 . File and Print Servers19 .1. Samb a

    19 .1.1. Intro d uctio n to Samb a19 .1.2. Samb a Daemo ns and Related Services19 .1.3. Co nnecting to a Samb a Share19 .1.4. Co nfig uring a Samb a Server19 .1.5. Starting and Sto p p ing Samb a19 .1.6 . Samb a Server Typ es and the smb .co nf File19 .1.7. Samb a Security Mo d es19 .1.8 . Samb a Acco unt Info rmatio n Datab ases19 .1.9 . Samb a Netwo rk Bro wsing19 .1.10 . Samb a with CUPS Printing Sup p o rt19 .1.11. Samb a Distrib utio n Pro g rams19 .1.12. Ad d itio nal Reso urces

    19 .2. FTP19 .2.1. The File Transfer Pro to co l19 .2.2. The vsftp d Server19 .2.3. Ad d itio nal Reso urces

    19 .3. Printer Co nfig uratio n19 .3.1. Starting the Printer Co nfig uratio n To o l19 .3.2. Starting Printer Setup19 .3.3. Ad d ing a Lo cal Printer19 .3.4. Ad d ing an Ap p So cket/HP JetDirect p rinter19 .3.5. Ad d ing an IPP Printer19 .3.6 . Ad d ing an LPD/LPR Ho st o r Printer19 .3.7. Ad d ing a Samb a (SMB) p rinter19 .3.8 . Selecting the Printer Mo d el and Finishing19 .3.9 . Printing a Test Pag e19 .3.10 . Mo d ifying Existing Printers19 .3.11. Ad d itio nal Reso urces

    Chapt er 2 0 . Configuring NT P Using nt pd20 .1. Intro d uctio n to NTP

    40 340 8411412412413418418420420421421

    4 2 3423423425427432433434

    4 3743743743843944144244345145245445445546 046 146 146 247447647647747747847948 048 148 348 648 649 2

    4 9 449 4

    T able of Cont ent s

    7

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    20 .1. Intro d uctio n to NTP20 .2. NTP Strata20 .3. Und erstand ing NTP20 .4. Und erstand ing the Drift File20 .5. UTC, Timezo nes, and DST20 .6 . Authenticatio n Op tio ns fo r NTP20 .7. Manag ing the Time o n Virtual Machines20 .8 . Und erstand ing Leap Seco nd s20 .9 . Und erstand ing the ntp d Co nfig uratio n File20 .10 . Und erstand ing the ntp d Sysco nfig File20 .11. Checking if the NTP Daemo n is Installed20 .12. Install ing the NTP Daemo n (ntp d )20 .13. Checking the Status o f NTP20 .14. Co nfig ure the Firewall to Allo w Inco ming NTP Packets

    20 .14.1. Co nfig ure the Firewall Using the Grap hical To o l20 .14.2. Co nfig ure the Firewall Using the Co mmand Line

    20 .15. Co nfig ure ntp d ate Servers20 .16 . Co nfig ure NTP

    20 .16 .1. Co nfig ure Access Co ntro l to an NTP Service20 .16 .2. Co nfig ure Rate Limiting Access to an NTP Service20 .16 .3. Ad d ing a Peer Ad d ress20 .16 .4. Ad d ing a Server Ad d ress20 .16 .5. Ad d ing a Bro ad cast o r Multicast Server Ad d ress20 .16 .6 . Ad d ing a Manycast Client Ad d ress20 .16 .7. Ad d ing a Bro ad cast Client Ad d ress20 .16 .8 . Ad d ing a Manycast Server Ad d ress20 .16 .9 . Ad d ing a Multicast Client Ad d ress20 .16 .10 . Co nfig uring the Burst Op tio n20 .16 .11. Co nfig uring the ib urst Op tio n20 .16 .12. Co nfig uring Symmetric Authenticatio n Using a Key20 .16 .13. Co nfig uring the Po ll Interval20 .16 .14. Co nfig uring Server Preference20 .16 .15. Co nfig uring the Time-to -Live fo r NTP Packets20 .16 .16 . Co nfig uring the NTP Vers io n to Use

    20 .17. Co nfig uring the Hard ware Clo ck Up d ate20 .18 . Co nfig uring Clo ck So urces20 .19 . Ad d itio nal Reso urces

    20 .19 .1. Installed Do cumentatio n20 .19 .2. Useful Web sites

    Chapt er 2 1 . Configuring PT P Using pt p4 l21.1. Intro d uctio n to PTP

    21.1.1. Und erstand ing PTP21.1.2. Ad vantag es o f PTP

    21.2. Using PTP21.2.1. Checking fo r Driver and Hard ware Sup p o rt21.2.2. Install ing PTP21.2.3. Starting p tp 4l

    21.3. Sp ecifying a Co nfig uratio n File21.4. Using the PTP Manag ement Client21.5. Synchro niz ing the Clo cks21.6 . Verifying Time Synchro nizatio n21.7. Serving PTP Time With NTP21.8 . Serving NTP Time With PTP

    49 449 449 549 649 649 649 749 749 749 949 949 950 050 150 150 150 250 350 350 450 450 450 450 550 550 550 650 650 650 650 750 750 750 750 850 850 850 850 9

    51 0510510511512512512513514515515516518518

    Red Hat Ent erprise Linux 6 Deployment Guide

    8

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    21.8 . Serving NTP Time With PTP21.9 . Imp ro ving Accuracy21.10 . Ad d itio nal Reso urces

    21.10 .1. Installed Do cumentatio n21.10 .2. Useful Web sites

    Part VI. Monit oring and Aut omat ion

    Chapt er 2 2 . Syst em Monit oring T ools22.1. Viewing System Pro cesses

    22.1.1. Using the p s Co mmand22.1.2. Using the to p Co mmand22.1.3. Using the System Mo nito r To o l

    22.2. Viewing Memo ry Usag e22.2.1. Using the free Co mmand22.2.2. Using the System Mo nito r To o l

    22.3. Viewing CPU Usag e22.3.1. Using the System Mo nito r To o l

    22.4. Viewing Blo ck Devices and File Systems22.4.1. Using the lsb lk Co mmand22.4.2. Using the b lkid Co mmand22.4.3. Using the find mnt Co mmand22.4.4. Using the d f Co mmand22.4.5. Using the d u Co mmand22.4.6 . Using the System Mo nito r To o l

    22.5. Viewing Hard ware Info rmatio n22.5.1. Using the lsp ci Co mmand22.5.2. Using the lsusb Co mmand22.5.3. Using the lsp cmcia Co mmand22.5.4. Using the lscp u Co mmand

    22.6 . Mo nito ring Perfo rmance with Net-SNMP22.6 .1. Install ing Net-SNMP22.6 .2. Running the Net-SNMP Daemo n22.6 .3. Co nfig uring Net-SNMP22.6 .4. Retrieving Perfo rmance Data o ver SNMP22.6 .5. Extend ing Net-SNMP

    22.7. Ad d itio nal Reso urces22.7.1. Installed Do cumentatio n

    Chapt er 2 3. Viewing and Managing Log Files23.1. Lo cating Lo g Files23.2. Basic Co nfig uratio n o f Rsyslo g

    23.2.1. Filters23.2.2. Actio ns23.2.3. Temp lates23.2.4. G lo b al Directives23.2.5. Lo g Ro tatio n23.2.6 . Using the New Co nfig uratio n Fo rmat23.2.7. Rulesets23.2.8 . Co mp atib il i ty with syslo g d

    23.3. Wo rking with Queues in Rsyslo g23.3.1. Defining Queues23.3.2. Manag ing Queues

    23.4. Using Rsyslo g Mo d ules23.4.1. Imp o rting Text Files

    518519519519519

    52 0

    52 1521521522523525525525526526527527528529531531532533533534534535536536536537540544549549

    55055055055055355856 256 256 456 456 556 556 656 8571572

    T able of Cont ent s

    9

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    23.4.1. Imp o rting Text Files23.4.2. Exp o rting Messag es to a Datab ase23.4.3. Enab ling Encryp ted Transp o rt23.4.4. Using RELP

    23.5. Deb ug g ing Rsyslo g23.6 . Manag ing Lo g Files in a Grap hical Enviro nment

    23.6 .1. Viewing Lo g Files23.6 .2. Ad d ing a Lo g File23.6 .3. Mo nito ring Lo g Files

    23.7. Ad d itio nal Reso urcesInstalled Do cumentatio nOnline Do cumentatio nSee Also

    Chapt er 2 4 . Aut omat ing Syst em T asks24.1. Cro n and Anacro n

    24.1.1. Install ing Cro n and Anacro n24.1.2. Running the Cro nd Service24.1.3. Co nfig uring Anacro n Jo b s24.1.4. Co nfig uring Cro n Jo b s24.1.5. Co ntro ll ing Access to Cro n24.1.6 . Black and White Lis ting o f Cro n Jo b s

    24.2. At and Batch24.2.1. Install ing At and Batch24.2.2. Running the At Service24.2.3. Co nfig uring an At Jo b24.2.4. Co nfig uring a Batch Jo b24.2.5. Viewing Pend ing Jo b s24.2.6 . Ad d itio nal Co mmand -Line Op tio ns24.2.7. Co ntro ll ing Access to At and Batch

    24.3. Ad d itio nal Reso urces

    Chapt er 2 5. Aut omat ic Bug Report ing T ool (ABRT )25.1. Install ing ABRT and Starting its Services25.2. Using the Grap hical User Interface25.3. Using the Co mmand -Line Interface

    25.3.1. Viewing Pro b lems25.3.2. Rep o rting Pro b lems25.3.3. Deleting Pro b lems

    25.4. Co nfig uring ABRT25.4.1. ABRT Events25.4.2. Stand ard ABRT Installatio n Sup p o rted Events25.4.3. Event Co nfig uratio n in ABRT GUI25.4.4. ABRT Sp ecific Co nfig uratio n25.4.5. Co nfig uring ABRT to Detect a Kernel Panic25.4.6 . Auto matic Do wnlo ad s and Installatio n o f Deb ug info Packag es25.4.7. Co nfig uring Auto matic Rep o rting25.4.8 . Up lo ad ing and Rep o rting Using a Pro xy Server

    25.5. Co nfig uring Centralized Crash Co llectio n25.5.1. Co nfig uratio n Step s Req uired o n a Ded icated System25.5.2. Co nfig uratio n Step s Req uired o n a Client System25.5.3. Saving Packag e Info rmatio n25.5.4. Testing ABRT's Crash Detectio n

    Chapt er 2 6 . OProfile

    572573573573574574574577578579579579579

    58 158 158 158 158 258 458 658 658 758 758 758 858 958 958 959 059 0

    59 159 259 46 0 16 0 16 0 36 0 46 0 46 0 56 0 76 0 86 106 126 126 136 136 136 146 156 156 17

    6 1 8

    Red Hat Ent erprise Linux 6 Deployment Guide

    10

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Chapt er 2 6 . OProfile26 .1. Overview o f To o ls26 .2. Co nfig uring OPro fi le

    26 .2.1. Sp ecifying the Kernel26 .2.2. Setting Events to Mo nito r26 .2.3. Sep arating Kernel and User-sp ace Pro fi les

    26 .3. Starting and Sto p p ing OPro fi le26 .4. Saving Data26 .5. Analyz ing the Data

    26 .5.1. Using o p rep o rt26 .5.2. Using o p rep o rt o n a Sing le Executab le26 .5.3. Getting mo re d etailed o utp ut o n the mo d ules26 .5.4. Using o p anno tate

    26 .6 . Und erstand ing /d ev/o p ro fi le/26 .7. Examp le Usag e26 .8 . OPro fi le Sup p o rt fo r Java

    26 .8 .1. Pro fi l ing Java Co d e26 .9 . Grap hical Interface26 .10 . OPro fi le and SystemTap26 .11. Ad d itio nal Reso urces

    26 .11.1. Installed Do cs26 .11.2. Useful Web sites

    Part VII. Kernel, Module and Driver Configurat ion

    Chapt er 2 7 . Manually Upgrading t he Kernel27.1. Overview o f Kernel Packag es27.2. Prep aring to Up g rad e27.3. Do wnlo ad ing the Up g rad ed Kernel27.4. Perfo rming the Up g rad e27.5. Verifying the Initial RAM Disk Imag e

    Verifying the Initial RAM Disk Imag e and Kernel o n IBM eServer System i27.6 . Verifying the Bo o t Lo ad er

    27.6 .1. Co nfig uring the GRUB Bo o t Lo ad er27.6 .2. Co nfig uring the Lo o p b ack Device Limit27.6 .3. Co nfig uring the OS/40 0 Bo o t Lo ad er27.6 .4. Co nfig uring the YABOOT Bo o t Lo ad er

    Chapt er 2 8 . Working wit h Kernel Modules28 .1. Lis ting Currently-Lo ad ed Mo d ules28 .2. Disp laying Info rmatio n Ab o ut a Mo d ule28 .3. Lo ad ing a Mo d ule28 .4. Unlo ad ing a Mo d ule28 .5. Blacklis ting a Mo d ule28 .6 . Setting Mo d ule Parameters

    28 .6 .1. Lo ad ing a Custo mized Mo d ule - Temp o rary Chang es28 .6 .2. Lo ad ing a Custo mized Mo d ule - Pers istent Chang es

    28 .7. Pers istent Mo d ule Lo ad ing28 .8 . Sp ecific Kernel Mo d ule Cap ab il ities

    28 .8 .1. Using Channel Bo nd ing28 .9 . Ad d itio nal Reso urces

    Installed Do cumentatio nInstallab le Do cumentatio nOnline Do cumentatio n

    6 1 86 186 196 196 196 226 236 246 246 256 266 276 286 296 296 306 306 306 336 336 336 33

    6 34

    6 356 356 366 376 376 386 406 406 416 426 436 43

    6 4 56 456 466 496 506 516 536 536 546 556 566 566 6 26 6 26 6 26 6 2

    T able of Cont ent s

    11

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Chapt er 2 9 . T he kdump Crash Recovery Service29 .1. Install ing the kd ump Service29 .2. Co nfig uring the kd ump Service

    29 .2.1. Co nfig uring the kd ump at Firs t Bo o t29 .2.2. Using the Kernel Dump Co nfig uratio n Util i ty29 .2.3. Co nfig uring kd ump o n the Co mmand Line29 .2.4. Testing the Co nfig uratio n

    29 .3. Analyz ing the Co re Dump29 .3.1. Running the crash Util i ty29 .3.2. Disp laying the Messag e Buffer29 .3.3. Disp laying a Backtrace29 .3.4. Disp laying a Pro cess Status29 .3.5. Disp laying Virtual Memo ry Info rmatio n29 .3.6 . Disp laying Op en Files29 .3.7. Exiting the Util i ty

    29 .4. Ad d itio nal Reso urces29 .4.1. Installed Do cumentatio n29 .4.2. Useful Web sites

    Part VIII. Syst em Recovery

    Chapt er 30 . Syst em Recovery30 .1. Rescue Mo d e30 .2. Sing le-User Mo d e30 .3. Emerg ency Mo d e30 .4. Reso lving Pro b lems in System Reco very Mo d es

    Consist ent Net work Device NamingA.1. Affected SystemsA.2. System Req uirementsA.3. Enab ling and Disab ling the FeatureA.4. No tes fo r Ad ministrato rs

    RPMB.1. RPM Desig n Go alsB.2. Using RPM

    B.2.1. Find ing RPM Packag esB.2.2. Install ing and Up g rad ingB.2.3. Co nfig uratio n File Chang esB.2.4. Uninstall ingB.2.5. FresheningB.2.6 . QueryingB.2.7. Verifying

    B.3. Checking a Packag e's Sig natureB.3.1. Imp o rting KeysB.3.2. Verifying Sig nature o f Packag es

    B.4. Practical and Co mmo n Examp les o f RPM Usag eB.5. Ad d itio nal Reso urces

    B.5.1. Installed Do cumentatio nB.5.2. Useful Web sitesB.5.3. Related Bo o ks

    T he X Window Syst emC.1. The X ServerC.2. Deskto p Enviro nments and Wind o w Manag ers

    6 6 46 6 46 6 46 6 46 6 56 6 96 736 736 746 756 766 766 776 786 786 786 786 79

    6 8 0

    6 8 16 8 16 8 36 8 36 8 4

    6 8 76 8 76 8 86 8 86 8 8

    6 8 96 9 06 9 06 9 16 9 16 9 46 9 46 9 56 9 66 9 76 9 76 9 86 9 86 9 970 170 170 170 1

    7 0 270 270 2

    Red Hat Ent erprise Linux 6 Deployment Guide

    12

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    C.2. Deskto p Enviro nments and Wind o w Manag ersC.2.1. Deskto p Enviro nmentsC.2.2. Wind o w Manag ers

    C.3. X Server Co nfig uratio n FilesC.3.1. The Structure o f the Co nfig uratio nC.3.2. The xo rg .co nf.d Directo ryC.3.3. The xo rg .co nf File

    C.4. Fo ntsC.4.1. Ad d ing Fo nts to Fo ntco nfig

    C.5. Runlevels and XC.5.1. Runlevel 3C.5.2. Runlevel 5

    C.6 . Ad d itio nal Reso urcesC.6 .1. Installed Do cumentatio nC.6 .2. Useful Web sites

    T he sysconfig Direct oryD.1. Files in the /etc/sysco nfig / Directo ry

    D.1.1. /etc/sysco nfig /arp watchD.1.2. /etc/sysco nfig /authco nfigD.1.3. /etc/sysco nfig /auto fsD.1.4. /etc/sysco nfig /c lo ckD.1.5. /etc/sysco nfig /d hcp dD.1.6 . /etc/sysco nfig /firs tb o o tD.1.7. /etc/sysco nfig /i18 nD.1.8 . /etc/sysco nfig /initD.1.9 . /etc/sysco nfig /ip 6 tab les-co nfigD.1.10 . /etc/sysco nfig /keyb o ardD.1.11. /etc/sysco nfig /ld apD.1.12. /etc/sysco nfig /namedD.1.13. /etc/sysco nfig /netwo rkD.1.14. /etc/sysco nfig /ntp dD.1.15. /etc/sysco nfig /q uag g aD.1.16 . /etc/sysco nfig /rad vdD.1.17. /etc/sysco nfig /samb aD.1.18 . /etc/sysco nfig /saslauthdD.1.19 . /etc/sysco nfig /selinuxD.1.20 . /etc/sysco nfig /send mailD.1.21. /etc/sysco nfig /sp amassassinD.1.22. /etc/sysco nfig /sq uidD.1.23. /etc/sysco nfig /system-co nfig -usersD.1.24. /etc/sysco nfig /vncserversD.1.25. /etc/sysco nfig /xinetd

    D.2. Directo ries in the /etc/sysco nfig / Directo ryD.3. Ad d itio nal Reso urces

    D.3.1. Installed Do cumentatio n

    T he proc File Syst emE.1. A Virtual File System

    E.1.1. Viewing Virtual FilesE.1.2. Chang ing Virtual Files

    E.2. To p -level Files within the p ro c File SystemE.2.1. /p ro c/b ud d yinfoE.2.2. /p ro c/cmd line

    70 270 370 370 470 470 570 5712713713713714715715715

    7 1 6716716716719721721721722722724725726727727728729730730731731732732732733733734734735735

    7 36736736737737738738

    T able of Cont ent s

    13

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    E.2.2. /p ro c/cmd lineE.2.3. /p ro c/cp uinfoE.2.4. /p ro c/cryp toE.2.5. /p ro c/d evicesE.2.6 . /p ro c/d maE.2.7. /p ro c/execd o mainsE.2.8 . /p ro c/fbE.2.9 . /p ro c/fi lesystemsE.2.10 . /p ro c/interrup tsE.2.11. /p ro c/io memE.2.12. /p ro c/io p o rtsE.2.13. /p ro c/kco reE.2.14. /p ro c/kmsgE.2.15. /p ro c/lo ad avgE.2.16 . /p ro c/lo cksE.2.17. /p ro c/md statE.2.18 . /p ro c/meminfoE.2.19 . /p ro c/miscE.2.20 . /p ro c/mo d ulesE.2.21. /p ro c/mo untsE.2.22. /p ro c/mtrrE.2.23. /p ro c/p artitio nsE.2.24. /p ro c/s lab infoE.2.25. /p ro c/statE.2.26 . /p ro c/swap sE.2.27. /p ro c/sysrq -trig g erE.2.28 . /p ro c/up timeE.2.29 . /p ro c/vers io n

    E.3. Directo ries within /p ro c/E.3.1. Pro cess Directo riesE.3.2. /p ro c/b us/E.3.3. /p ro c/b us/p ciE.3.4. /p ro c/d river/E.3.5. /p ro c/fsE.3.6 . /p ro c/irq /E.3.7. /p ro c/net/E.3.8 . /p ro c/scsi/E.3.9 . /p ro c/sys/E.3.10 . /p ro c/sysvip c/E.3.11. /p ro c/tty/E.3.12. /p ro c/PID/

    E.4. Using the sysctl Co mmandE.5. Ad d itio nal Reso urces

    Installab le Do cumentatio n

    Revision Hist ory

    Index

    73873873974074074074174174174274374374474474474574574774774874874974975075175175175275275275475575675675675775875976 876 976 9770771771

    7 7 2

    7 7 2

    Red Hat Ent erprise Linux 6 Deployment Guide

    14

  • PrefaceThe Deployment Guide contains information on how to customize the Red Hat Enterprise Linux 6system to fit your needs. If you are looking for a comprehensive, task-oriented guide for configuringand customizing your system, this is the manual for you.

    This manual discusses many intermediate topics such as the following:

    Installing and managing packages using the graphical PackageKit and command line Yumpackage managers

    Setting up a networkfrom establishing an Ethernet connection using NetworkManager toconfiguring channel bonding interfaces to increase server bandwidth

    Configuring DHCP , BIND , Apache HTTP Server, Post f ix, Sendmail and other enterprise-classservers and software

    Gathering information about your system, including obtaining user-space crash data with theAutomat ic Bug Report ing Tool , and kernel-space crash data with kdump

    Easily working with kernel modules and upgrading the kernel

    1. Target AudienceThe Deployment Guide assumes you have a basic understanding of the Red Hat Enterprise Linuxoperating system. If you need help with the installation of this system, refer to the Red HatEnterprise Linux 6 Installation Guide.

    2. How to Read this BookThis manual is divided into the following main categories:

    Part I, Basic System Conf igurat ion

    This part covers basic system administration tasks such as keyboard configuration, dateand time configuration, managing users and groups, and gaining privileges.

    Chapter 1, Keyboard Configuration covers basic keyboard setup. Read this chapter if youneed to change the keyboard layout, add the Keyboard Indicator applet to the panel, orenforce a periodic typing brake.

    Chapter 2, Date and Time Configuration covers the configuration of the system date and time.Read this chapter if you need to change the date and time.

    Chapter 3, Managing Users and Groups covers the management of users and groups in agraphical user interface and on the command line. Read this chapter if you need to manageusers and groups on your system, or enable password aging.

    Chapter 4, Gaining Privileges documents how to gain administrative privileges. Read thischapter to learn how to use the su and sudo commands.

    Part II , Package Management

    This part focuses on product subscriptions and entitlements, and describes how to managesoftware packages on Red Hat Enterprise Linux using both Yum and the PackageKit suiteof graphical package management tools.

    Preface

    15

  • Chapter 5, Registering a System and Managing Subscriptions provides an overview ofsubscription management in Red Hat Enterprise Linux and the Red Hat SubscriptionManager tools which are available. Read this chapter to learn how to register or unregistera system, activate a machine, and handle product subscriptions and entitlements.

    Chapter 6, Yum describes the Yum package manager. Read this chapter for information onhow to search, install, update, and uninstall packages on the command line.

    Chapter 7, PackageKit describes the PackageKit suite of graphical package managementtools. Read this chapter for information on how to search, install, update, and uninstallpackages using a graphical user interface.

    Part II I , Networking

    This part describes how to configure the network on Red Hat Enterprise Linux.

    Chapter 8, NetworkManager focuses on NetworkManager, a dynamic network control andconfiguration system that attempts to keep network devices and connections up and activewhen they are available. Read this chapter for information on how to run the NetworkManager daemon, and how to interact with it using the corresponding applet forthe notification area.

    Chapter 9, Network Interfaces explores various interface configuration files, interface controlscripts, and network function files located in the /etc/sysconfig/network-scripts/directory. Read this chapter for information on how to use these files to configure networkinterfaces.

    Part IV, In f rast ructure Services

    This part provides information on how to configure services and daemons, configureauthentication, and enable remote logins.

    Chapter 10, Services and Daemons explains the concept of runlevels, and describes how toset the default one. It also covers the configuration of the services to be run in each of theserunlevels, and provides information on how to start, stop, and restart a service. Read thischapter to learn how to manage services on your system.

    Chapter 11, Configuring Authentication describes how to configure user information retrievalfrom Lightweight Directory Access Protocol (LDAP), Network Information Service (NIS), andWinbind user account databases, and provides an introduction to the System SecurityServices Daemon (SSSD). Read this chapter if you need to configure authentication onyour system.

    Chapter 12, OpenSSH describes how to enable a remote login via the SSH protocol. Itcovers the configuration of the sshd service, as well as a basic usage of the ssh, scp, sftp client utilities. Read this chapter if you need a remote access to a machine.

    Chapter 13, TigerVNC documents how to control a remote machine by using Virtual NetworkComputing (VNC). It covers the installation and configuration of a VNC server and explainshow to use a VNC client to connect to this server. Read this chapter if you need a remoteaccess to a graphical desktop.

    Part V, Servers

    This part discusses various topics related to servers such as how to set up a web server orshare files and directories over the network.

    Chapter 14, DHCP Servers guides you through the installation of a Dynamic HostConfiguration Protocol (DHCP) server and client. Read this chapter if you need to configureDHCP on your system.

    Red Hat Ent erprise Linux 6 Deployment Guide

    16

  • Chapter 15, DNS Servers introduces you to Domain Name System (DNS), explains how toinstall, configure, run, and administer the BIND DNS server. Read this chapter if you needto configure a DNS server on your system.

    Chapter 16, Web Servers focuses on the Apache HTTP Server 2.2 , a robust, full-featuredopen source web server developed by the Apache Software Foundation. Read this chapterif you need to configure a web server on your system.

    Chapter 17, Mail Servers reviews modern email protocols in use today, and some of theprograms designed to send and receive email, including Post f ix, Sendmail , Fetchmail ,and Procmail . Read this chapter if you need to configure a mail server on your system.

    Chapter 18, Directory Servers covers the installation and configuration of OpenLDAP 2.4 ,an open source implementation of the LDAPv2 and LDAPv3 protocols. Read this chapter ifyou need to configure a directory server on your system.

    Chapter 19, File and Print Servers guides you through the installation and configuration ofSamba , an open source implementation of the Server Message Block (SMB) protocol, andvsf tpd , the primary FTP server shipped with Red Hat Enterprise Linux. Additionally, itexplains how to use the Printer Conf igurat ion tool to configure printers. Read thischapter if you need to configure a file or print server on your system.

    Chapter 20, Configuring NTP Using ntpd covers the configuration of the Network Time Protocol(NTP) daemon (ntpd ) for updating the system clock. Read this chapter if you need toconfigure the system to synchronize the clock with a remote Network Time Protocol (NTP)server.

    Chapter 21, Configuring PTP Using ptp4l covers the configuration of the Precision Time Protocol(PTP) for updating the system clock. Read this chapter if you need to configure the systemto synchronize the clock with a Precision Time Protocol (PTP) server.

    Part VI, Monitoring and Automat ion

    This part describes various tools that allow system administrators to monitor systemperformance, automate system tasks, and report bugs.

    Chapter 22, System Monitoring Tools discusses applications and commands that can beused to retrieve important information about the system. Read this chapter to learn how togather essential system information.

    Chapter 23, Viewing and Managing Log Files describes the configuration of the rsyslogdaemon, and explains how to locate, view, and monitor log files. Read this chapter to learnhow to work with log files.

    Chapter 24, Automating System Tasks provides an overview of the cron, at, and batchutilities. Read this chapter to learn how to use these utilities to perform automated tasks.

    Chapter 25, Automatic Bug Reporting Tool (ABRT) concentrates on ABRT , a system serviceand a set of tools to collect crash data and send a report to the relevant issue tracker. Readthis chapter to learn how to use ABRT on your system.

    Chapter 26, OProfile covers OProf ile , a low overhead, system-wide performancemonitoring tool. Read this chapter for information on how to use OProf ile on your system.

    Part VII, Kernel, Module and Driver Conf igurat ion

    This part covers various tools that assist administrators with kernel customization.

    Preface

    17

  • Chapter 27, Manually Upgrading the Kernel provides important information on how tomanually update a kernel package using the rpm command instead of yum. Read thischapter if you cannot update a kernel package with the Yum package manager.

    Chapter 28, Working with Kernel Modules explains how to display, query, load, and unloadkernel modules and their dependencies, and how to set module parameters. Additionally, itcovers specific kernel module capabilities such as using multiple Ethernet cards and usingchannel bonding. Read this chapter if you need to work with kernel modules.

    Chapter 29, The kdump Crash Recovery Service explains how to configure, test, and use the kdump service in Red Hat Enterprise Linux, and provides a brief overview of how to analyzethe resulting core dump using the crash debugging utility. Read this chapter to learn howto enable kdump on your system.

    Appendix A, Consistent Network Device Naming

    This appendix covers consistent network device naming for network interfaces, a featurethat changes the name of network interfaces on a system in order to make locating anddifferentiating the interfaces easier. Read this appendix to learn more about this feature andhow to enable or disable it.

    Appendix B, RPM

    This appendix concentrates on the RPM Package Manager (RPM), an open packagingsystem used by Red Hat Enterprise Linux, and the use of the rpm utility. Read this appendixif you need to use rpm instead of yum.

    Appendix C, The X Window System

    This appendix covers the configuration of the X Window System, the graphical environmentused by Red Hat Enterprise Linux. Read this appendix if you need to adjust theconfiguration of your X Window System.

    Appendix D, The sysconfig Directory

    This appendix outlines some of the files and directories located in the /etc/sysconfig/directory. Read this appendix if you want to learn more about these files and directories,their function, and their contents.

    Appendix E, The proc File System

    This appendix explains the concept of a virtual file system, and describes some of the top-level files and directories within the proc file system (that is, the /proc/ directory). Readthis appendix if you want to learn more about this file system.

    3. Document Convent ionsThis manual uses several conventions to highlight certain words and phrases and draw attention tospecific pieces of information.

    3.1. T ypographic Convent ionsFour typographic conventions are used to call attention to specific words and phrases. Theseconventions, and the circumstances they apply to, are as follows.

    Mono-spaced Bold

    Red Hat Ent erprise Linux 6 Deployment Guide

    18

  • Used to highlight system input, including shell commands, file names and paths. Also used tohighlight keys and key combinations. For example:

    To see the contents of the file my_next_bestselling_novel in your currentworking directory, enter the cat my_next_bestselling_novel command at theshell prompt and press Enter to execute the command.

    The above includes a file name, a shell command and a key, all presented in mono-spaced bold andall distinguishable thanks to context.

    Key combinations can be distinguished from an individual key by the plus sign that connects eachpart of a key combination. For example:

    Press Enter to execute the command.

    Press Ctrl+Alt+F2 to switch to a virtual terminal.

    The first example highlights a particular key to press. The second example highlights a keycombination: a set of three keys pressed simultaneously.

    If source code is discussed, class names, methods, functions, variable names and returned valuesmentioned within a paragraph will be presented as above, in mono-spaced bold . For example:

    File-related classes include filesystem for file systems, file for files, and dir fordirectories. Each class has its own associated set of permissions.

    Proport ional Bold

    This denotes words or phrases encountered on a system, including application names; dialog-boxtext; labeled buttons; check-box and radio-button labels; menu titles and submenu titles. Forexample:

    Choose System Preferences Mouse from the main menu bar to launchMouse Preferences . In the Buttons tab, select the Left-handed mouse checkbox and click Close to switch the primary mouse button from the left to the right(making the mouse suitable for use in the left hand).

    To insert a special character into a gedit file, choose Applicat ions Accessories Character Map from the main menu bar. Next, choose Search Find from the Character Map menu bar, type the name of the character in the Search field and click Next. The character you sought will be highlighted in the Character Table. Double-click this highlighted character to place it in the Text to copy field and then click the Copy button. Now switch back to your documentand choose Edit Paste from the gedit menu bar.

    The above text includes application names; system-wide menu names and items; application-specificmenu names; and buttons and text found within a GUI interface, all presented in proportional boldand all distinguishable by context.

    Mono-spaced Bold Italic or Proportional Bold Italic

    Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable orvariable text. Italics denotes text you do not input literally or displayed text that changes dependingon circumstance. For example:

    To connect to a remote machine using ssh, type ssh [email protected] at ashell prompt. If the remote machine is example.com and your username on thatmachine is john, type ssh [email protected].

    Preface

    19

  • The mount -o remount file-system command remounts the named file system.For example, to remount the /home file system, the command is mount -o remount /home.

    To see the version of a currently installed package, use the rpm -q packagecommand. It will return a result as follows: package-version-release.

    Note the words in bold italics above: username, domain.name, file-system, package, version andrelease. Each word is a placeholder, either for text you enter when issuing a command or for textdisplayed by the system.

    Aside from standard usage for presenting the title of a work, italics denotes the first use of a new andimportant term. For example:

    Publican is a DocBook publishing system.

    3.2. Pull-quote Convent ionsTerminal output and source code listings are set off visually from the surrounding text.

    Output sent to a terminal is set in mono-spaced roman and presented thus:

    books Desktop documentation drafts mss photos stuff svnbooks_tests Desktop1 downloads images notes scripts svgs

    Source-code listings are also set in mono-spaced roman but add syntax highlighting as follows:

    static int kvm_vm_ioctl_deassign_device(struct kvm *kvm, struct kvm_assigned_pci_dev *assigned_dev){ int r = 0; struct kvm_assigned_dev_kernel *match;

    mutex_lock(&kvm->lock);

    match = kvm_find_assigned_dev(&kvm->arch.assigned_dev_head, assigned_dev->assigned_dev_id); if (!match) { printk(KERN_INFO "%s: device hasn't been assigned before, " "so cannot be deassigned\n", __func__); r = -EINVAL; goto out; }

    kvm_deassign_device(kvm, match);

    kvm_free_assigned_device(kvm, match);

    out: mutex_unlock(&kvm->lock); return r;}

    3.3. Notes and Warnings

    Red Hat Ent erprise Linux 6 Deployment Guide

    20

  • Finally, we use three visual styles to draw attention to information that might otherwise be overlooked.

    NoteNotes are tips, shortcuts or alternative approaches to the task at hand. Ignoring a note shouldhave no negative consequences, but you might miss out on a trick that makes your life easier.

    ImportantImportant boxes detail things that are easily missed: configuration changes that only apply tothe current session, or services that need restarting before an update will apply. Ignoring abox labeled Important will not cause data loss but may cause irritation and frustration.

    WarningWarnings should not be ignored. Ignoring warnings will most likely cause data loss.

    4. FeedbackIf you find a typographical error in this manual, or if you have thought of a way to make this manualbetter, we would love to hear from you! Please submit a report in Bugzilla against the productRed Hat Enterprise Linux 6 .

    When submitting a bug report, be sure to provide the following information:

    Manual's identifier: doc-Deployment_Guide

    Version number: 6

    If you have a suggestion for improving the documentation, try to be as specific as possible whendescribing it. If you have found an error, please include the section number and some of thesurrounding text so we can find it easily.

    5. AcknowledgmentsCertain portions of this text first appeared in the Deployment Guide, copyright 2007 Red Hat, Inc.,available at https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/index.html.

    Section 22.6, Monitoring Performance with Net-SNMP is based on an article written by MichaelSolberg.

    The authors of this book would like to thank the following people for their valuable contributions:Adam Tk, Andrew Fitzsimon, Andrius Benokraitis, Brian Cleary Edward Bailey, Garrett LeSage,Jeffrey Fearn, Joe Orton, Joshua Wulf, Karsten Wade, Lucy Ringland, Marcela Malov, MarkJohnson, Michael Behm, Miroslav Lichvr, Radek Vokl, Rahul Kavalapara, Rahul Sundaram,Sandra Moore, Zbyek Mrz, Jan Velk, Peter Hutterer and James Antill, among many others.

    Preface

    21

  • Part I. Basic System ConfigurationThis part covers basic system administration tasks such as keyboard configuration, date and timeconfiguration, managing users and groups, and gaining privileges.

    Red Hat Ent erprise Linux 6 Deployment Guide

    22

  • Chapter 1. Keyboard ConfigurationThis chapter describes how to change the keyboard layout, as well as how to add the KeyboardIndicator applet to the panel. It also covers the option to enforce a typing break, and explains bothadvantages and disadvantages of doing so.

    1.1. Changing the Keyboard LayoutThe installation program has allowed you to configure a keyboard layout for your system. However,the default settings may not always suit your current needs. To configure a different keyboard layoutafter the installation, use the Keyboard Preferences tool.

    To open Keyboard Layout Preferences , select System Preferences Keyboard from thepanel, and click the Layouts tab.

    Figure 1.1. Keyboard Layout Preferences

    You will be presented with a list of available layouts. To add a new one, click the Add button belowthe list, and you will be prompted to choose which layout you want to add.

    Chapt er 1 . Keyboard Configurat ion

    23

  • Figure 1.2. Choosing a layout

    Currently, there are two ways how to choose the keyboard layout: you can either find it by the countryit is associated with (the By country tab), or you can select it by language (the By language tab).In either case, first select the desired country or language from the Country or Language pulldownmenu, then specify the variant from the Variants menu. The preview of the layout changesimmediately. To confirm the selection, click Add .

    Figure 1.3. Select ing the default layout

    The layout should appear in the list. To make it the default, select the radio button next to its name.The changes take effect immediately. Note that there is a text-entry field at the bottom of the windowwhere you can safely test your settings. Once you are satisfied, click Close to close the window.

    Red Hat Ent erprise Linux 6 Deployment Guide

    24

  • Figure 1.4 . Test ing the layout

    Disable separate layout for each windowBy default, changing the keyboard layout affects the active window only. This means that ifyou change the layout and switch to another window, this window will use the old one, whichmight be confusing. To turn this behavior off, clear the Separate layout for each window checkbox.

    Doing this has its drawbacks though, as you will no longer be able to choose the defaultlayout by selecting the radio button as shown in Figure 1.3, Selecting the default layout . Tomake the layout the default, drag it to the beginning of the list.

    1.2. Adding the Keyboard Layout IndicatorIf you want to see what keyboard layout you are currently using, or you would like to switch betweendifferent layouts with a single mouse click, add the Keyboard Indicator applet to the panel. To doso, right-click the empty space on the main panel, and select the Add to Panel option from thepulldown menu.

    Chapt er 1 . Keyboard Configurat ion

    25

  • Figure 1.5. Adding a new applet

    You will be presented with a list of available applets. Scroll through the list (or start typingkeyboard into the search field at the top of the window), select Keyboard Indicator, and click the Add button.

    Figure 1.6 . Select ing the Keyboard Indicator

    The applet appears immediately, displaying the shortened name of the country the current layout isassociated with. To display the actual variant, hover the pointer over the applet icon.

    Red Hat Ent erprise Linux 6 Deployment Guide

    26

  • Figure 1.7. The Keyboard Indicator applet

    1.3. Set t ing Up a Typing BreakTyping for a long period of time can be not only tiring, but it can also increase the risk of serioushealth problems, such as carpal tunnel syndrome. One way of preventing this is to configure thesystem to enforce typing breaks. To do so, select System Preferences Keyboard from thepanel, click the Typing Break tab, and select the Lock screen to enforce typing breakcheckbox.

    Figure 1.8. Typing Break Propert ies

    Chapt er 1 . Keyboard Configurat ion

    27

  • To increase or decrease the allowed typing time before the break is enforced, click the up or downbutton next to the Work interval lasts label respectively. You can do the same with the Break interval lasts setting to alter the length of the break itself. Finally, select the Allow postponing of breaks checkbox if you want to be able to delay the break in case you need tofinish the work. The changes take effect immediately.

    Figure 1.9 . Taking a break

    Next time you reach the time limit, you will be presented with a screen advising you to take a break,and a clock displaying the remaining time. If you have enabled it, the Postpone Break button willbe located at the bottom right corner of the screen.

    Red Hat Ent erprise Linux 6 Deployment Guide

    28

  • Chapter 2. Date and Time ConfigurationThis chapter covers setting the system date and time in Red Hat Enterprise Linux, both manually andusing the Network Time Protocol (NTP), as well as setting the adequate time zone. Two methods arecovered: setting the date and time using the Date/T ime Propert ies tool, and doing so on thecommand line.

    2.1. Date/T ime Propert ies ToolThe Date/T ime Propert ies tool allows the user to change the system date and time, to configure thetime zone used by the system, and to set up the Network Time Protocol daemon to synchronize thesystem clock with a time server. Note that to use this application, you must be running the X WindowSystem (see Appendix C, The X Window System for more information on this topic).

    To start the tool, select System Administ rat ion Date & T ime from the panel, or type the system-config-date command at a shell prompt (e.g., xterm or GNOME Terminal). Unless you arealready authenticated, you will be prompted to enter the superuser password.

    Figure 2.1. Authent icat ion Query

    2.1.1. Date and T ime Propert iesAs shown in Figure 2.2, Date and Time Properties , the Date/T ime Propert ies tool is divided intotwo separate tabs. The tab containing the configuration of the current date and time is shown bydefault.

    Chapt er 2 . Dat e and T ime Configurat ion

    29

  • Figure 2.2. Date and T ime Propert ies

    To set up your system manually, follow these steps:

    1. Change the current date. Use the arrows to the left and right of the month and year to changethe month and year respectively. Then click inside the calendar to select the day of the month.

    2. Change the current time. Use the up and down arrow buttons beside the Hour, Minute, and Second , or replace the values directly.

    Click the OK button to apply the changes and exit the application.

    2.1.2. Network T ime Protocol Propert iesIf you prefer an automatic setup, select the checkbox labeled Synchronize date and time over the network instead. This will display the list of available NTP servers as shown inFigure 2.3, Network Time Protocol Properties .

    Red Hat Ent erprise Linux 6 Deployment Guide

    30

  • Figure 2.3. Network T ime Protocol Propert ies

    Here you can choose one of the predefined servers, edit a predefined server by clicking the Editbutton, or add a new server name by clicking Add . In the Advanced Options, you can also selectwhether you want to speed up the initial synchronization of the system clock, or if you wish to use alocal time source.

    NoteYour system does not start synchronizing with the NTP server until you click the OK button atthe bottom of the window to confirm your changes.

    Click the OK button to apply any changes made to the date and time settings and exit the application.

    2.1.3. T ime Zone Propert iesTo configure the system time zone, click the Time Zone tab as shown in Figure 2.4, Time ZoneProperties .

    Chapt er 2 . Dat e and T ime Configurat ion

    31

  • Figure 2.4 . T ime Zone Propert ies

    There are two common approaches to the time zone selection:

    1. Using the interactive map. Click zoom in and zoom out buttons next to the map, or click onthe map itself to zoom into the selected region. Then choose the city specific to your timezone. A red X appears and the time zone selection changes in the list below the map.

    2. Use the list below the map. To make the selection easier, cities and countries are groupedwithin their specific continents. Note that non-geographic time zones have also been addedto address needs in the scientific community.

    If your system clock is set to use UTC, select the System clock uses UTC option. UTC stands forthe Universal Time, Coordinated, also known as Greenwich Mean Time (GMT). Other time zones aredetermined by adding or subtracting from the UTC time.

    Click OK to apply the changes and exit the program.

    2.2. Command Line Configurat ionIn case your system does not have the Date/T ime Propert ies tool installed, or the X Window Serveris not running, you will have to change the system date and time on the command line. Note that inorder to perform actions described in this section, you have to be logged in as a superuser:

    Red Hat Ent erprise Linux 6 Deployment Guide

    32

  • ~]$ su -Password:

    2.2.1. Date and T i