780
Jaromír Hradílek Douglas Silas Martin Prpič Stephen Wadeley Eva Kopalová Peter Ondrejka Ella Lackey Tomáš Čapek Petr Kovář Miroslav Svoboda Petr Bokoč Florian Nadge John Ha David O'Brien Michael Hideo Don Domingo Red Hat Enterprise Linux 6 Deployment Guide Deployment, Configuration and Administration of Red Hat Enterprise Linux 6 Edition 5

Red Hat Enterprise Linux 6 Deployment Guide en US

Embed Size (px)

Citation preview

  • Jaromr Hradlek Douglas Silas Martin PrpiStephen Wadeley Eva Kopalov Peter OndrejkaElla Lackey Tom apek Petr KovMiroslav Svoboda Petr Boko Florian NadgeJohn Ha David O'Brien Michael HideoDon Domingo

    Red Hat Enterprise Linux 6Deployment Guide

    Deployment, Configuration and Administration of Red Hat EnterpriseLinux 6Edition 5

  • Red Hat Enterprise Linux 6 Deployment Guide

    Deployment, Configuration and Administration of Red Hat EnterpriseLinux 6Edition 5

    Jaromr HradlekRed Hat Engineering Content [email protected] SilasRed Hat Engineering Content [email protected] PrpiRed Hat Engineering Content [email protected] WadeleyRed Hat Engineering Content [email protected] KopalovRed Hat Engineering Content [email protected] OndrejkaRed Hat Engineering Content [email protected] LackeyRed Hat Engineering Content [email protected] apekRed Hat Engineering Content [email protected] KovRed Hat Engineering Content [email protected] SvobodaRed Hat Engineering Content [email protected] BokoRed Hat Engineering Content [email protected] NadgeRed Hat Engineering Content [email protected] HaRed Hat Engineering Content Services

  • Red Hat Engineering Content ServicesDavid O'BrienRed Hat Engineering Content ServicesMichael HideoRed Hat Engineering Content ServicesDon DomingoRed Hat Engineering Content Services

    Legal NoticeCopyright 20102013 Red Hat, Inc.This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 UnportedLicense. If you distribute this document, or a modified version of it, you must provide attribution to RedHat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must beremoved.Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section4d of CC-BY-SA to the fullest extent permitted by applicable law.Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo,and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.Linux is the registered trademark of Linus Torvalds in the United States and other countries.Java is a registered trademark of Oracle and/or its affiliates.XFS is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United Statesand/or other countries.MySQL is a registered trademark of MySQL AB in the United States, the European Union and othercountries.Node.js is an official trademark of Joyent. Red Hat Software Collections is not formally related to orendorsed by the official Joyent Node.js open source or commercial project.The OpenStack Word Mark and OpenStack Logo are either registered trademarks/service marks ortrademarks/service marks of the OpenStack Foundation, in the United States and other countries andare used with the OpenStack Foundation's permission. We are not affiliated with, endorsed orsponsored by the OpenStack Foundation, or the OpenStack community.All other trademarks are the property of their respective owners.AbstractThe Deployment Guide documents relevant information regarding the deployment, configuration andadministration of Red Hat Enterprise Linux 6. It is oriented towards system administrators with a basicunderstanding of the system.

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Table of ContentsPreface

    1. Target Audience2. How to Read this Book3. Document Conventions

    3.1. Typographic Conventions3.2. Pull-quote Conventions3.3. Notes and Warnings

    4. Feedback5. Acknowledgments

    Part I. Basic System ConfigurationChapter 1. Keyboard Configuration

    1.1. Changing the Keyboard Layout1.2. Adding the Keyboard Layout Indicator1.3. Setting Up a Typing Break

    Chapter 2. Date and Time Configuration2.1. Date/T ime Properties Tool

    2.1.1. Date and Time Properties2.1.2. Network T ime Protocol Properties2.1.3. T ime Zone Properties

    2.2. Command Line Configuration2.2.1. Date and Time Setup2.2.2. Network T ime Protocol Setup

    Chapter 3. Managing Users and Groups3.1. Introduction to Users and Groups

    3.1.1. User Private Groups3.1.2. Shadow Passwords

    3.2. Using the User Manager Tool3.2.1. Viewing Users and Groups3.2.2. Adding a New User3.2.3. Adding a New Group3.2.4. Modifying User Properties3.2.5. Modifying Group Properties

    3.3. Using Command Line Tools3.3.1. Adding a New User

    Explaining the Process3.3.2. Adding a New Group3.3.3. Creating Group Directories

    3.4. Additional Resources3.4.1. Installed Documentation

    Chapter 4 . Gaining Privileges4.1. The su Command4.2. The sudo Command4.3. Additional Resources

    Installed DocumentationOnline Documentation

    Part II. Package Management

    212121242526272728293030323336363637383939404 34343434444454646474848495151525254545556565658

    Table of Contents

    1

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Chapter 5. Registering a System and Managing Subscriptions5.1. Using Red Hat Subscription Manager Tools

    5.1.1. Launching the Red Hat Subscription Manager GUI5.1.2. Running the subscription-manager Command-Line Tool

    5.2. Registering and Unregistering a System5.2.1. Registering from the GUI5.2.2. Registering from the Command Line5.2.3. Unregistering

    5.3. Attaching and Removing Subscriptions5.3.1. Attaching and Removing Subscriptions through the GUI

    5.3.1.1. Attaching a Subscription5.3.1.2. Removing Subscriptions

    5.3.2. Attaching and Removing Subscriptions through the Command Line5.3.2.1. Attaching Subscriptions5.3.2.2. Removing Subscriptions from the Command Line

    5.4. Redeeming Vendor Subscriptions5.4.1. Redeeming Subscriptions through the GUI5.4.2. Redeeming Subscriptions through the Command Line

    5.5. Attaching Subscriptions from a Subscription Asset Manager Activation Key5.6. Setting Preferences for Systems

    5.6.1. Setting Preferences in the UI5.6.2. Setting Service Levels Through the Command Line5.6.3. Setting a Preferred Operating System Release Version in the Command Line

    5.7. Managing Subscription Expiration and NotificationsChapter 6. Yum

    6.1. Checking For and Updating Packages6.1.1. Checking For Updates6.1.2. Updating Packages

    Updating a Single PackageUpdating All Packages and Their DependenciesUpdating Security-Related Packages

    6.1.3. Preserving Configuration File Changes6.1.4. Upgrading the System Off-line with ISO and Yum

    6.2. Packages and Package Groups6.2.1. Searching Packages6.2.2. Listing Packages6.2.3. Displaying Package Information

    Listing Files Contained in a Package6.2.4. Installing Packages

    Installing Individual PackagesInstalling a Package Group

    6.2.5. Removing PackagesRemoving Individual PackagesRemoving a Package Group

    6.3. Working with Transaction History6.3.1. Listing Transactions6.3.2. Examining Transactions6.3.3. Reverting and Repeating Transactions6.3.4. Completing Transactions6.3.5. Starting New Transaction History

    6.4. Configuring Yum and Yum Repositories6.4.1. Setting [main] Options6.4.2. Setting [repository] Options6.4.3. Using Yum Variables6.4.4. Viewing the Current Configuration

    595959606060646869696970717172737374747575767778828282838385858585878788909192929394949495959899

    100100100101104106107

    Red Hat Enterprise Linux 6 Deployment Guide

    2

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    6.4.5. Adding, Enabling, and Disabling a Yum RepositoryAdding a Yum RepositoryEnabling a Yum RepositoryDisabling a Yum Repository

    6.4.6. Creating a Yum Repository6.4.7. Working with Yum Cache

    Enabling the CachesUsing yum in Cache-only ModeClearing the yum Caches

    6.5. Yum Plug-ins6.5.1. Enabling, Configuring, and Disabling Yum Plug-ins6.5.2. Installing Additional Yum Plug-ins6.5.3. Plug-in Descriptions

    6.6. Additional ResourcesChapter 7. PackageKit

    7.1. Updating Packages with Software UpdateSetting the Update-Checking Interval

    7.2. Using Add/Remove Software7.2.1. Refreshing Software Sources (Yum Repositories)7.2.2. Finding Packages with Filters7.2.3. Installing and Removing Packages (and Dependencies)7.2.4. Installing and Removing Package Groups7.2.5. Viewing the Transaction Log

    7.3. PackageKit Architecture7.4. Additional Resources

    Part III. NetworkingChapter 8. NetworkManager

    8.1. The NetworkManager Daemon8.2. Interacting with NetworkManager

    8.2.1. Connecting to a Network8.2.2. Configuring New and Editing Existing Connections8.2.3. Connecting to a Network Automatically8.2.4. User and System Connections

    8.3. Establishing Connections8.3.1. Establishing a Wired (Ethernet) Connection

    Configuring the Connection Name, Auto-Connect Behavior, and Availability SettingsConfiguring the Wired TabSaving Your New (or Modified) Connection and Making Further Configurations

    8.3.2. Establishing a Wireless ConnectionQuickly Connecting to an Available Access PointConnecting to a Hidden Wireless NetworkEditing a Connection, or Creating a Completely New OneConfiguring the Connection Name, Auto-Connect Behavior, and Availability SettingsConfiguring the Wireless TabSaving Your New (or Modified) Connection and Making Further Configurations

    8.3.3. Establishing a Mobile Broadband ConnectionSaving Your New (or Modified) Connection and Making Further ConfigurationsConfiguring the Mobile Broadband Tab

    8.3.4. Establishing a VPN ConnectionConfiguring the Connection Name, Auto-Connect Behavior, and Availability SettingsConfiguring the VPN TabSaving Your New (or Modified) Connection and Making Further Configurations

    8.3.5. Establishing a DSL Connection

    108108109109109110110111111112112113113121122122123123124124126128129129130132133133133134135136136138138140140141141142143143144144146146148148149151151152153

    Table of Contents

    3

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Configuring the Connection Name, Auto-Connect Behavior, and Availability SettingsConfiguring the DSL TabSaving Your New (or Modified) Connection and Making Further Configurations

    8.3.6. Establishing a Bond ConnectionSaving Your New (or Modified) Connection and Making Further ConfigurationsConfiguring the Bond Tab

    8.3.7. Establishing a VLAN ConnectionSaving Your New (or Modified) Connection and Making Further ConfigurationsConfiguring the VLAN Tab

    8.3.8. Establishing an IP-over-InfiniBand (IPoIB) ConnectionSaving Your New (or Modified) Connection and Making Further ConfigurationsConfiguring the InfiniBand Tab

    8.3.9. Configuring Connection Settings8.3.9.1. Configuring 802.1x Security

    8.3.9.1.1. Configuring TLS (Transport Layer Security) Settings8.3.9.1.2. Configuring Tunneled TLS Settings8.3.9.1.3. Configuring Protected EAP (PEAP) Settings

    8.3.9.2. Configuring Wireless Security8.3.9.3. Configuring PPP (Point-to-Point) Settings8.3.9.4. Configuring IPv4 Settings

    Setting the MethodPPPoE Specific Configuration Steps

    8.3.9.5. Configuring IPv6 Settings8.3.9.6. Configuring Routes

    8.4. NetworkManager ArchitectureChapter 9. Network Interfaces

    9.1. Network Configuration Files9.2. Interface Configuration Files

    9.2.1. Ethernet Interfaces9.2.2. Specific ifcfg Options for Linux on System z9.2.3. Required ifcfg Options for Linux on System z9.2.4. Channel Bonding Interfaces9.2.5. Network Bridge9.2.6. Setting Up 802.1q VLAN Tagging9.2.7. Alias and Clone Files9.2.8. Dialup Interfaces9.2.9. Other Interfaces

    9.3. Interface Control Scripts9.4. Static Routes and the Default Gateway

    Static RoutesThe Default GatewayIP Command Arguments FormatNetwork/Netmask Directives Format

    9.5. Configuring IPv6 Tokenized Interface Identifiers9.6. Network Function Files9.7. Ethtool9.8. Additional Resources

    9.8.1. Installed Documentation9.8.2. Useful Websites

    Chapter 10. Configure SCTP10.1. Introduction to Streaming Control Transport Protocol (SCTP)

    10.1.1. Comparison of TCP and SCTP Handshaking10.2. Understanding SCTP

    10.2.1. Bundled Streams

    153153153154156156158159159159161161161161162163163164165166166167168168169170170171171177177177179182183184186187188189189189190191192193199199199200200200201202

    Red Hat Enterprise Linux 6 Deployment Guide

    4

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    10.2.2. Partial Reliability10.2.3. Message Boundary Preservation10.2.4. Protocol Event Notifications

    10.3. When To Use SCTP10.4. When Not To Use SCTP10.5. Compare SCTP to Bonding and Network Teaming10.6. Using SCTP

    10.6.1. Check if SCTP is installed10.6.2. Install SCTP10.6.3. Configuring SCTP10.6.4. Tune SCTP10.6.5. Troubleshooting SCTP

    10.7. Additional Resources10.7.1. Installed Documentation10.7.2. Useful Websites

    Part IV. Infrastructure ServicesChapter 11. Services and Daemons

    11.1. Configuring the Default Runlevel11.2. Configuring the Services

    11.2.1. Using the Service Configuration Utility11.2.1.1. Enabling and Disabling a Service11.2.1.2. Starting, Restarting, and Stopping a Service11.2.1.3. Selecting Runlevels

    11.2.2. Using the ntsysv Utility11.2.2.1. Enabling and Disabling a Service11.2.2.2. Selecting Runlevels

    11.2.3. Using the chkconfig Utility11.2.3.1. Listing the Services11.2.3.2. Enabling a Service11.2.3.3. Disabling a Service

    11.3. Running Services11.3.1. Determining the Service Status11.3.2. Starting a Service11.3.3. Stopping a Service11.3.4. Restarting a Service

    11.4. Additional Resources11.4.1. Installed Documentation11.4.2. Related Books

    Chapter 12. Configuring Authentication12.1. Configuring System Authentication

    12.1.1. Launching the Authentication Configuration Tool UI12.1.2. Selecting the Identity Store for Authentication

    12.1.2.1. Configuring LDAP Authentication12.1.2.2. Configuring NIS Authentication12.1.2.3. Configuring Winbind Authentication12.1.2.4. Using Kerberos with LDAP or NIS Authentication

    12.1.3. Configuring Alternative Authentication Features12.1.3.1. Using Fingerprint Authentication12.1.3.2. Setting Local Authentication Parameters12.1.3.3. Enabling Smart Card Authentication12.1.3.4. Creating User Home Directories

    12.1.4. Configuring Authentication from the Command Line12.1.4.1. T ips for Using authconfig

    202202202203203203204204204204204205205205205207208208209209210210210210211211212212212213214214214214215215215215216216216217218220221222223224224224225225225

    Table of Contents

    5

  • 12.1.4.2. Configuring LDAP User Stores12.1.4.3. Configuring NIS User Stores12.1.4.4. Configuring Winbind User Stores12.1.4.5. Configuring Kerberos Authentication12.1.4.6. Configuring Local Authentication Settings12.1.4.7. Configuring Fingerprint Authentication12.1.4.8. Configuring Smart Card Authentication12.1.4.9. Managing Kickstart and Configuration Files

    12.1.5. Using Custom Home Directories12.2. Using and Caching Credentials with SSSD

    12.2.1. About SSSD12.2.2. Setting up the sssd.conf File

    12.2.2.1. Creating the sssd.conf File12.2.2.2. Using a Custom Configuration File

    12.2.3. Starting and Stopping SSSD12.2.4. SSSD and System Services12.2.5. Configuring Services: NSS

    12.2.5.1. About NSS Service Maps and SSSD12.2.5.2. Configuring NSS Services to Use SSSD12.2.5.3. Configuring SSSD to Work with NSS

    12.2.6. Configuring Services: PAM12.2.7. Configuring Services: autofs

    12.2.7.1. About Automount, LDAP, and SSSD12.2.7.2. Configuring autofs Services in SSSD

    12.2.8. Configuring Services: sudo12.2.8.1. About sudo, LDAP, and SSSD12.2.8.2. Configuring sudo with SSSD

    12.2.9. Configuring Services: OpenSSH and Cached Keys12.2.9.1. Configuring OpenSSH to Use SSSD for Host Keys12.2.9.2. Configuring OpenSSH to Use SSSD for User Keys

    12.2.10. SSSD and Identity Providers (Domains)12.2.11. Creating Domains: LDAP

    12.2.11.1. Parameters for Configuring an LDAP Domain12.2.11.2. LDAP Domain Example

    12.2.12. Creating Domains: Identity Management (IdM)12.2.13. Creating Domains: Active Directory

    12.2.13.1. Mapping Active Directory Securiy IDs and Linux User IDs12.2.13.1.1. The Mechanism of ID Mapping12.2.13.1.2. ID Mapping Parameters12.2.13.1.3. Mapping Users

    12.2.13.2. Active Directory Users and Range Retrieval Searches12.2.13.3. Performance and LDAP Referrals12.2.13.4. Active Directory as Other Provider Types12.2.13.5. Configuring an Active Directory Identity Provider

    12.2.14. Configuring Domains: Active Directory as an LDAP Provider (Alternative)12.2.15. Domain Options: Setting Username Formats12.2.16. Domain Options: Enabling Offline Authentication12.2.17. Domain Options: Setting Password Expirations12.2.18. Domain Options: Using DNS Service Discovery12.2.19. Domain Options: Using IP Addresses in Certificate Subject Names (LDAP Only)12.2.20. Creating Domains: Proxy12.2.21. Creating Domains: Kerberos Authentication12.2.22. Creating Domains: Access Control

    12.2.22.1. Using the Simple Access Provider12.2.22.2. Using the LDAP Access Filter

    225226226226227227227227228228229230230231231232232233233233235237237240241241242244245246247251251253254257258258259259259260260260264267269270271273274276280280281

    Red Hat Enterprise Linux 6 Deployment Guide

    6

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    12.2.23. Creating Domains: Primary Server and Backup Servers12.2.24. Installing SSSD Utilities12.2.25. SSSD and UID and GID Numbers12.2.26. Creating Local System Users12.2.27. Seeding Users into the SSSD Cache During Kickstart12.2.28. Managing the SSSD Cache

    12.2.28.1. Purging the SSSD Cache12.2.28.2. Deleting Domain Cache Files

    12.2.29. Downgrading SSSD12.2.30. Using NSCD with SSSD12.2.31. Troubleshooting SSSD

    12.2.31.1. Setting Debug Logs for SSSD Domains12.2.31.2. Checking SSSD Log Files12.2.31.3. Problems with SSSD Configuration

    Chapter 13. OpenSSH13.1. The SSH Protocol

    13.1.1. Why Use SSH?13.1.2. Main Features13.1.3. Protocol Versions13.1.4. Event Sequence of an SSH Connection

    13.1.4.1. Transport Layer13.1.4.2. Authentication13.1.4.3. Channels

    13.2. Configuring OpenSSH13.2.1. Configuration Files13.2.2. Starting an OpenSSH Server13.2.3. Requiring SSH for Remote Connections13.2.4. Using a Key-Based Authentication

    13.2.4.1. Generating Key Pairs13.2.4.2. Configuring ssh-agent

    13.3. OpenSSH Clients13.3.1. Using the ssh Utility13.3.2. Using the scp Utility13.3.3. Using the sftp Utility

    13.4. More Than a Secure Shell13.4.1. X11 Forwarding13.4.2. Port Forwarding

    13.5. Additional Resources13.5.1. Installed Documentation13.5.2. Useful Websites

    Part V. ServersChapter 14 . DHCP Servers

    14.1. Why Use DHCP?14.2. Configuring a DHCP Server

    14.2.1. Configuration File14.2.2. Lease Database14.2.3. Starting and Stopping the Server14.2.4. DHCP Relay Agent

    14.3. Configuring a DHCP Client14.4. Configuring a Multihomed DHCP Server

    14.4.1. Host Configuration14.5. DHCP for IPv6 (DHCPv6)14.6. Additional Resources

    281282282283283284285286286287287287288288

    294294294295295296296297297297297299299299300302304305306306307307308309309309310311311311311314315316316316318320320

    Table of Contents

    7

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    14.6.1. Installed DocumentationChapter 15. DNS Servers

    15.1. Introduction to DNS15.1.1. Nameserver Zones15.1.2. Nameserver Types15.1.3. BIND as a Nameserver

    15.2. BIND15.2.1. Configuring the named Service

    15.2.1.1. Common Statement Types15.2.1.2. Other Statement Types15.2.1.3. Comment Tags

    15.2.2. Editing Zone Files15.2.2.1. Common Directives15.2.2.2. Common Resource Records15.2.2.3. Comment Tags15.2.2.4. Example Usage

    15.2.2.4.1. A Simple Zone File15.2.2.4.2. A Reverse Name Resolution Zone File

    15.2.3. Using the rndc Utility15.2.3.1. Configuring the Utility15.2.3.2. Checking the Service Status15.2.3.3. Reloading the Configuration and Zones15.2.3.4. Updating Zone Keys15.2.3.5. Enabling the DNSSEC Validation15.2.3.6. Enabling the Query Logging

    15.2.4. Using the dig Utility15.2.4.1. Looking Up a Nameserver15.2.4.2. Looking Up an IP Address15.2.4.3. Looking Up a Hostname

    15.2.5. Advanced Features of BIND15.2.5.1. Multiple Views15.2.5.2. Incremental Zone Transfers (IXFR)15.2.5.3. Transaction SIGnatures (TSIG)15.2.5.4. DNS Security Extensions (DNSSEC)15.2.5.5. Internet Protocol version 6 (IPv6)

    15.2.6. Common Mistakes to Avoid15.2.7. Additional Resources

    15.2.7.1. Installed Documentation15.2.7.2. Useful Websites15.2.7.3. Related Books

    Chapter 16. Web Servers16.1. The Apache HTTP Server

    16.1.1. New Features16.1.2. Notable Changes16.1.3. Updating the Configuration16.1.4. Running the httpd Service

    16.1.4.1. Starting the Service16.1.4.2. Stopping the Service16.1.4.3. Restarting the Service16.1.4.4. Checking the Service Status

    16.1.5. Editing the Configuration Files16.1.5.1. Common httpd.conf Directives16.1.5.2. Common ssl.conf Directives16.1.5.3. Common Multi-Processing Module Directives

    320321321321321322322322323330332332333334337337337339339340340341341342342342342343344345345346346346346346347347348348350350350350350351351351351352352353383384

    Red Hat Enterprise Linux 6 Deployment Guide

    8

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    16.1.6. Working with Modules16.1.6.1. Loading a Module16.1.6.2. Writing a Module

    16.1.7. Setting Up Virtual Hosts16.1.8. Setting Up an SSL Server

    16.1.8.1. An Overview of Certificates and Security16.1.8.2. Enabling the mod_ssl Module16.1.8.3. Using an Existing Key and Certificate16.1.8.4. Generating a New Key and Certificate

    16.1.9. Additional Resources16.1.9.1. Installed Documentation16.1.9.2. Useful Websites

    Chapter 17. Mail Servers17.1. Email Protocols

    17.1.1. Mail Transport Protocols17.1.1.1. SMTP

    17.1.2. Mail Access Protocols17.1.2.1. POP17.1.2.2. IMAP17.1.2.3. Dovecot

    17.2. Email Program Classifications17.2.1. Mail Transport Agent17.2.2. Mail Delivery Agent17.2.3. Mail User Agent

    17.3. Mail Transport Agents17.3.1. Postfix

    17.3.1.1. The Default Postfix Installation17.3.1.2. Basic Postfix Configuration17.3.1.3. Using Postfix with LDAP

    17.3.1.3.1. The /etc/aliases lookup example17.3.2. Sendmail

    17.3.2.1. Purpose and Limitations17.3.2.2. The Default Sendmail Installation17.3.2.3. Common Sendmail Configuration Changes17.3.2.4. Masquerading17.3.2.5. Stopping Spam17.3.2.6. Using Sendmail with LDAP

    17.3.3. Fetchmail17.3.3.1. Fetchmail Configuration Options17.3.3.2. Global Options17.3.3.3. Server Options17.3.3.4. User Options17.3.3.5. Fetchmail Command Options17.3.3.6. Informational or Debugging Options17.3.3.7. Special Options

    17.3.4. Mail Transport Agent (MTA) Configuration17.4. Mail Delivery Agents

    17.4.1. Procmail Configuration17.4.2. Procmail Recipes

    17.4.2.1. Delivering vs. Non-Delivering Recipes17.4.2.2. Flags17.4.2.3. Specifying a Local Lockfile17.4.2.4. Special Conditions and Actions17.4.2.5. Recipe Examples17.4.2.6. Spam Filters

    386386387387388388389389390394394394396396396396396397397398399399399399400400400401401401402402402404404405406406407408408409409409410410410411412412413413413414415

    Table of Contents

    9

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    17.5. Mail User Agents17.5.1. Securing Communication

    17.5.1.1. Secure Email Clients17.5.1.2. Securing Email Client Communications

    17.6. Additional Resources17.6.1. Installed Documentation17.6.2. Useful Websites17.6.3. Related Books

    Chapter 18. Directory Servers18.1. OpenLDAP

    18.1.1. Introduction to LDAP18.1.1.1. LDAP Terminology18.1.1.2. OpenLDAP Features18.1.1.3. OpenLDAP Server Setup

    18.1.2. Installing the OpenLDAP Suite18.1.2.1. Overview of OpenLDAP Server Utilities18.1.2.2. Overview of OpenLDAP Client Utilities18.1.2.3. Overview of Common LDAP Client Applications

    18.1.3. Configuring an OpenLDAP Server18.1.3.1. Changing the Global Configuration18.1.3.2. Changing the Database-Specific Configuration18.1.3.3. Extending Schema

    18.1.4. Running an OpenLDAP Server18.1.4.1. Starting the Service18.1.4.2. Stopping the Service18.1.4.3. Restarting the Service18.1.4.4. Checking the Service Status

    18.1.5. Configuring a System to Authenticate Using OpenLDAP18.1.5.1. Migrating Old Authentication Information to LDAP Format

    18.1.6. Additional Resources18.1.6.1. Installed Documentation18.1.6.2. Useful Websites18.1.6.3. Related Books

    Chapter 19. File and Print Servers19.1. Samba

    19.1.1. Introduction to Samba19.1.1.1. Samba Features

    19.1.2. Samba Daemons and Related Services19.1.2.1. Samba Daemons

    19.1.3. Connecting to a Samba Share19.1.3.1. Command Line19.1.3.2. Mounting the Share

    19.1.4. Configuring a Samba Server19.1.4.1. Graphical Configuration19.1.4.2. Command Line Configuration19.1.4.3. Encrypted Passwords

    19.1.5. Starting and Stopping Samba19.1.6. Samba Server Types and the smb.conf File

    19.1.6.1. Stand-alone Server19.1.6.1.1. Anonymous Read-Only19.1.6.1.2. Anonymous Read/Write19.1.6.1.3. Anonymous Print Server19.1.6.1.4. Secure Read/Write File and Print Server

    19.1.6.2. Domain Member Server

    4164164164174184184194194 204204204204214214224234244244244254284294294294294304304304304314314324324 34434434434435435436437437438438438439439440440440440441441442

    Red Hat Enterprise Linux 6 Deployment Guide

    10

  • 19.1.6.2.1. Active Directory Domain Member Server19.1.6.2.2. Windows NT4-based Domain Member Server

    19.1.6.3. Domain Controller19.1.6.3.1. Primary Domain Controller (PDC) using tdbsam19.1.6.3.2. Primary Domain Controller (PDC) with Active Directory

    19.1.7. Samba Security Modes19.1.7.1. User-Level Security

    19.1.7.1.1. Domain Security Mode (User-Level Security)19.1.7.1.2. Active Directory Security Mode (User-Level Security)19.1.7.1.3. Server Security Mode (User-Level Security)

    19.1.7.2. Share-Level Security19.1.8. Samba Account Information Databases19.1.9. Samba Network Browsing

    19.1.9.1. Domain Browsing19.1.9.2. WINS (Windows Internet Name Server)

    19.1.10. Samba with CUPS Printing Support19.1.10.1. Simple smb.conf Settings

    19.1.11. Samba Distribution Programs19.1.12. Additional Resources

    19.1.12.1. Installed Documentation19.1.12.2. Related Books19.1.12.3. Useful Websites

    19.2. FTP19.2.1. The File Transfer Protocol19.2.2. The vsftpd Server19.2.3. Files Installed with vsftpd19.2.4. Starting and Stopping vsftpd

    19.2.4.1. Starting Multiple Copies of vsftpd19.2.5. vsftpd Configuration Options

    19.2.5.1. Daemon Options19.2.5.2. Log In Options and Access Controls19.2.5.3. Anonymous User Options19.2.5.4. Local User Options19.2.5.5. Directory Options19.2.5.6. File Transfer Options19.2.5.7. Logging Options19.2.5.8. Network Options

    19.2.6. Additional Resources19.2.6.1. Installed Documentation19.2.6.2. Useful Websites

    19.3. Printer Configuration19.3.1. Starting the Printer Configuration Tool19.3.2. Starting Printer Setup19.3.3. Adding a Local Printer19.3.4. Adding an AppSocket/HP JetDirect printer19.3.5. Adding an IPP Printer19.3.6. Adding an LPD/LPR Host or Printer19.3.7. Adding a Samba (SMB) printer19.3.8. Selecting the Printer Model and Finishing19.3.9. Printing a Test Page19.3.10. Modifying Existing Printers

    19.3.10.1. The Settings Page19.3.10.2. The Policies Page

    19.3.10.2.1. Sharing Printers19.3.10.2.2. The Access Control Page

    442443444445447447447448448448448449450450450451451452456457457457457458458459460460460461461463463464465465466468468468469469469470471472473474476478478479479479480

    Table of Contents

    11

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    19.3.10.2.3. The Printer Options Page19.3.10.2.4. Job Options Page19.3.10.2.5. Ink/Toner Levels Page

    19.3.10.3. Managing Print Jobs19.3.11. Additional Resources

    19.3.11.1. Installed Documentation19.3.11.2. Useful Websites

    Chapter 20. Configuring NTP Using ntpd20.1. Introduction to NTP20.2. NTP Strata20.3. Understanding NTP20.4. Understanding the Drift File20.5. UTC, T imezones, and DST20.6. Authentication Options for NTP20.7. Managing the T ime on Virtual Machines20.8. Understanding Leap Seconds20.9. Understanding the ntpd Configuration File20.10. Understanding the ntpd Sysconfig File20.11. Checking if the NTP Daemon is Installed20.12. Installing the NTP Daemon (ntpd)20.13. Checking the Status of NTP20.14. Configure the Firewall to Allow Incoming NTP Packets

    20.14.1. Configure the Firewall Using the Graphical Tool20.14.2. Configure the Firewall Using the Command Line

    20.14.2.1. Checking Network Access for Incoming NTP Using the Command Line20.15. Configure ntpdate Servers20.16. Configure NTP

    20.16.1. Configure Access Control to an NTP Service20.16.2. Configure Rate Limiting Access to an NTP Service20.16.3. Adding a Peer Address20.16.4. Adding a Server Address20.16.5. Adding a Broadcast or Multicast Server Address20.16.6. Adding a Manycast Client Address20.16.7. Adding a Broadcast Client Address20.16.8. Adding a Manycast Server Address20.16.9. Adding a Multicast Client Address20.16.10. Configuring the Burst Option20.16.11. Configuring the iburst Option20.16.12. Configuring Symmetric Authentication Using a Key20.16.13. Configuring the Poll Interval20.16.14. Configuring Server Preference20.16.15. Configuring the T ime-to-Live for NTP Packets20.16.16. Configuring the NTP Version to Use

    20.17. Configuring the Hardware Clock Update20.18. Configuring Clock Sources20.19. Additional Resources

    20.19.1. Installed Documentation20.19.2. Useful Websites

    Chapter 21. Configuring PTP Using ptp4 l21.1. Introduction to PTP

    21.1.1. Understanding PTP21.1.2. Advantages of PTP

    21.2. Using PTP21.2.1. Checking for Driver and Hardware Support

    4814814824834844844854 86486486487488488489489489490491492492492493493493494494495495495496496496497497497498498498498499499499499500500500500500502502502503504504

    Red Hat Enterprise Linux 6 Deployment Guide

    12

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    21.2.2. Installing PTP21.2.3. Starting ptp4l

    21.2.3.1. Selecting a Delay Measurement Mechanism21.3. Specifying a Configuration File21.4. Using the PTP Management Client21.5. Synchronizing the Clocks21.6. Verifying T ime Synchronization21.7. Serving PTP Time With NTP21.8. Serving NTP Time With PTP21.9. Improving Accuracy21.10. Additional Resources

    21.10.1. Installed Documentation21.10.2. Useful Websites

    Part VI. Monitoring and AutomationChapter 22. System Monitoring Tools

    22.1. Viewing System Processes22.1.1. Using the ps Command22.1.2. Using the top Command22.1.3. Using the System Monitor Tool

    22.2. Viewing Memory Usage22.2.1. Using the free Command22.2.2. Using the System Monitor Tool

    22.3. Viewing CPU Usage22.3.1. Using the System Monitor Tool

    22.4. Viewing Block Devices and File Systems22.4.1. Using the lsblk Command22.4.2. Using the blkid Command22.4.3. Using the findmnt Command22.4.4. Using the df Command22.4.5. Using the du Command22.4.6. Using the System Monitor Tool

    22.5. Viewing Hardware Information22.5.1. Using the lspci Command22.5.2. Using the lsusb Command22.5.3. Using the lspcmcia Command22.5.4. Using the lscpu Command

    22.6. Monitoring Performance with Net-SNMP22.6.1. Installing Net-SNMP22.6.2. Running the Net-SNMP Daemon

    22.6.2.1. Starting the Service22.6.2.2. Stopping the Service22.6.2.3. Restarting the Service

    22.6.3. Configuring Net-SNMP22.6.3.1. Setting System Information22.6.3.2. Configuring Authentication

    Configuring SNMP Version 2c CommunityConfiguring SNMP Version 3 User

    22.6.4. Retrieving Performance Data over SNMP22.6.4.1. Hardware Configuration22.6.4.2. CPU and Memory Information22.6.4.3. File System and Disk Information22.6.4.4. Network Information

    22.6.5. Extending Net-SNMP22.6.5.1. Extending Net-SNMP with Shell Scripts

    504505506506507507508510510511511511511512513513513514515516516517518518519519520521522523524524524525526526527527528528528529529529530530531532532533534535535536

    Table of Contents

    13

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    22.6.5.2. Extending Net-SNMP with Perl22.7. Additional Resources

    22.7.1. Installed DocumentationChapter 23. Viewing and Managing Log Files

    23.1. Configuring rsyslog23.1.1. Global Directives23.1.2. Modules23.1.3. Rules

    23.1.3.1. Filter Conditions23.1.3.2. Actions23.1.3.3. Templates

    23.1.3.3.1. Generating dynamic file names23.1.3.3.2. Properties23.1.3.3.3. Template Examples

    23.1.4. rsyslog Command Line Configuration23.2. Locating Log Files

    23.2.1. Configuring logrotate23.3. Viewing Log Files23.4. Adding a Log File23.5. Monitoring Log Files23.6. Additional Resources

    23.6.1. Installed Documentation23.6.2. Useful Websites

    Chapter 24 . Automating System Tasks24.1. Cron and Anacron

    24.1.1. Installing Cron and Anacron24.1.2. Running the Crond Service

    24.1.2.1. Starting and Stopping the Cron Service24.1.2.2. Stopping the Cron Service24.1.2.3. Restarting the Cron Service

    24.1.3. Configuring Anacron Jobs24.1.3.1. Examples of Anacron Jobs

    24.1.4. Configuring Cron Jobs24.1.5. Controlling Access to Cron24.1.6. Black and White Listing of Cron Jobs

    24.2. At and Batch24.2.1. Installing At and Batch24.2.2. Running the At Service

    24.2.2.1. Starting and Stopping the At Service24.2.2.2. Stopping the At Service24.2.2.3. Restarting the At Service

    24.2.3. Configuring an At Job24.2.4. Configuring a Batch Job24.2.5. Viewing Pending Jobs24.2.6. Additional Command Line Options24.2.7. Controlling Access to At and Batch

    24.3. Additional ResourcesChapter 25. Automatic Bug Reporting Tool (ABRT)

    25.1. Installing ABRT and Starting its Services25.2. Using the Graphical User Interface25.3. Using the Command Line Interface

    25.3.1. Viewing Problems25.3.2. Reporting Problems

    53854154154 2542542542543543546550551551552553554554555558558559559559560560560560561561561561562563565565565566566566566567567568568568568569570571573580580582

    Red Hat Enterprise Linux 6 Deployment Guide

    14

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    25.3.3. Deleting Problems25.4. Configuring ABRT

    25.4.1. ABRT Events25.4.2. Standard ABRT Installation Supported Events25.4.3. Event Configuration in ABRT GUI25.4.4. ABRT Specific Configuration25.4.5. Configuring ABRT to Detect a Kernel Panic25.4.6. Automatic Downloads and Installation of Debuginfo Packages25.4.7. Configuring Automatic Reporting25.4.8. Uploading and Reporting Using a Proxy Server

    25.5. Configuring Centralized Crash Collection25.5.1. Configuration Steps Required on a Dedicated System25.5.2. Configuration Steps Required on a Client System25.5.3. Saving Package Information25.5.4. Testing ABRT's Crash Detection

    Chapter 26. OProfile26.1. Overview of Tools26.2. Configuring OProfile

    26.2.1. Specifying the Kernel26.2.2. Setting Events to Monitor

    26.2.2.1. Sampling Rate26.2.2.2. Unit Masks

    26.2.3. Separating Kernel and User-space Profiles26.3. Starting and Stopping OProfile26.4. Saving Data26.5. Analyzing the Data

    26.5.1. Using opreport26.5.2. Using opreport on a Single Executable26.5.3. Getting more detailed output on the modules26.5.4. Using opannotate

    26.6. Understanding /dev/oprofile/26.7. Example Usage26.8. OProfile Support for Java

    26.8.1. Profiling Java Code26.9. Graphical Interface26.10. OProfile and SystemTap26.11. Additional Resources

    26.11.1. Installed Docs26.11.2. Useful Websites

    Part VII. Kernel, Module and Driver ConfigurationChapter 27. Manually Upgrading the Kernel

    27.1. Overview of Kernel Packages27.2. Preparing to Upgrade27.3. Downloading the Upgraded Kernel27.4. Performing the Upgrade27.5. Verifying the Initial RAM Disk Image

    Verifying the Initial RAM Disk Image and Kernel on IBM eServer System i27.6. Verifying the Boot Loader

    27.6.1. Configuring the GRUB Boot Loader27.6.2. Configuring the OS/400 Boot Loader27.6.3. Configuring the YABOOT Boot Loader

    Chapter 28. Working with Kernel Modules

    583583584586587589591591592592593593594594596597597598598599601601601602603603604605606607608608608608609612612612612613614614615616616617618618619621621623

    Table of Contents

    15

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    28.1. Listing Currently-Loaded Modules28.2. Displaying Information About a Module28.3. Loading a Module28.4. Unloading a Module28.5. Setting Module Parameters28.6. Persistent Module Loading28.7. Specific Kernel Module Capabilities

    28.7.1. Using Multiple Ethernet Cards28.7.2. Using Channel Bonding

    28.7.2.1. Bonding Module Directives28.8. Additional Resources

    Manual Page DocumentationInstallable and External Documentation

    Chapter 29. The kdump Crash Recovery Service29.1. Installing the kdump Service29.2. Configuring the kdump Service

    29.2.1. Configuring the kdump at First Boot29.2.1.1. Enabling the Service29.2.1.2. Configuring the Memory Usage

    29.2.2. Using the Kernel Dump Configuration Utility29.2.2.1. Enabling the Service29.2.2.2. The Basic Settings Tab29.2.2.3. The Target Settings Tab29.2.2.4. The Filtering Settings Tab29.2.2.5. The Expert Settings Tab

    29.2.3. Configuring kdump on the Command Line29.2.3.1. Configuring the Memory Usage29.2.3.2. Configuring the Target Type29.2.3.3. Configuring the Core Collector29.2.3.4. Changing the Default Action29.2.3.5. Enabling the Service

    29.2.4. Testing the Configuration29.3. Analyzing the Core Dump

    29.3.1. Running the crash Utility29.3.2. Displaying the Message Buffer29.3.3. Displaying a Backtrace29.3.4. Displaying a Process Status29.3.5. Displaying Virtual Memory Information29.3.6. Displaying Open Files29.3.7. Exiting the Utility

    29.4. Additional Resources29.4.1. Installed Documentation29.4.2. Useful Websites

    Consistent Network Device NamingA.1. Affected SystemsA.2. System RequirementsA.3. Enabling and Disabling the FeatureA.4. Notes for Administrators

    RPMB.1. RPM Design GoalsB.2. Using RPM

    B.2.1. Finding RPM PackagesB.2.2. Installing and Upgrading

    623624627627628629630630630631636636637638638638638638639639639639640641642643643644645645646646647647648649650650651651652652652653653654654654655656656656657

    Red Hat Enterprise Linux 6 Deployment Guide

    16

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    B.2.2.1. Package Already InstalledB.2.2.2. Conflicting FilesB.2.2.3. Unresolved Dependency

    B.2.3. Configuration File ChangesB.2.4. UninstallingB.2.5. FresheningB.2.6. QueryingB.2.7. Verifying

    B.3. Checking a Package's SignatureB.3.1. Importing KeysB.3.2. Verifying Signature of Packages

    B.4. Practical and Common Examples of RPM UsageB.5. Additional Resources

    B.5.1. Installed DocumentationB.5.2. Useful WebsitesB.5.3. Related Books

    The X Window SystemC.1. The X ServerC.2. Desktop Environments and Window Managers

    C.2.1. Desktop EnvironmentsC.2.2. Window Managers

    C.3. X Server Configuration FilesC.3.1. The Structure of the ConfigurationC.3.2. The xorg.conf.d DirectoryC.3.3. The xorg.conf File

    C.3.3.1. The InputClass sectionC.3.3.2. The InputDevice sectionC.3.3.3. The ServerFlags sectionC.3.3.4. The ServerLayout SectionC.3.3.5. The Files sectionC.3.3.6. The Monitor sectionC.3.3.7. The Device sectionC.3.3.8. The Screen sectionC.3.3.9. The DRI section

    C.4. FontsC.4.1. Adding Fonts to Fontconfig

    C.5. Runlevels and XC.5.1. Runlevel 3C.5.2. Runlevel 5

    C.6. Additional ResourcesC.6.1. Installed DocumentationC.6.2. Useful Websites

    The sysconfig DirectoryD.1. Files in the /etc/sysconfig/ Directory

    D.1.1. /etc/sysconfig/arpwatchD.1.2. /etc/sysconfig/authconfigD.1.3. /etc/sysconfig/autofsD.1.4. /etc/sysconfig/clockD.1.5. /etc/sysconfig/dhcpdD.1.6. /etc/sysconfig/firstbootD.1.7. /etc/sysconfig/i18nD.1.8. /etc/sysconfig/initD.1.9. /etc/sysconfig/ip6tables-configD.1.10. /etc/sysconfig/keyboard

    658658659660660661662662663664664664666666666667668668668669669670670671671671672673674675675676677677678678679679679680680681682682682682685687687688688689690692

    Table of Contents

    17

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    D.1.11. /etc/sysconfig/ldapD.1.12. /etc/sysconfig/namedD.1.13. /etc/sysconfig/networkD.1.14. /etc/sysconfig/ntpdD.1.15. /etc/sysconfig/quaggaD.1.16. /etc/sysconfig/radvdD.1.17. /etc/sysconfig/sambaD.1.18. /etc/sysconfig/saslauthdD.1.19. /etc/sysconfig/selinuxD.1.20. /etc/sysconfig/sendmailD.1.21. /etc/sysconfig/spamassassinD.1.22. /etc/sysconfig/squidD.1.23. /etc/sysconfig/system-config-usersD.1.24. /etc/sysconfig/vncserversD.1.25. /etc/sysconfig/xinetd

    D.2. Directories in the /etc/sysconfig/ DirectoryD.3. Additional Resources

    D.3.1. Installed DocumentationThe proc File System

    E.1. A Virtual File SystemE.1.1. Viewing Virtual FilesE.1.2. Changing Virtual Files

    E.2. Top-level Files within the proc File SystemE.2.1. /proc/buddyinfoE.2.2. /proc/cmdlineE.2.3. /proc/cpuinfoE.2.4. /proc/cryptoE.2.5. /proc/devicesE.2.6. /proc/dmaE.2.7. /proc/execdomainsE.2.8. /proc/fbE.2.9. /proc/filesystemsE.2.10. /proc/interruptsE.2.11. /proc/iomemE.2.12. /proc/ioportsE.2.13. /proc/kcoreE.2.14. /proc/kmsgE.2.15. /proc/loadavgE.2.16. /proc/locksE.2.17. /proc/mdstatE.2.18. /proc/meminfoE.2.19. /proc/miscE.2.20. /proc/modulesE.2.21. /proc/mountsE.2.22. /proc/mtrrE.2.23. /proc/partitionsE.2.24. /proc/slabinfoE.2.25. /proc/statE.2.26. /proc/swapsE.2.27. /proc/sysrq-triggerE.2.28. /proc/uptimeE.2.29. /proc/version

    E.3. Directories within /proc/E.3.1. Process Directories

    E.3.1.1. /proc/self/

    692693694695695697697697698698699699699700701701702702703703703704705705705705706707707707708708708709710710711711711712712713714714715715716717717718718718718718720

    Red Hat Enterprise Linux 6 Deployment Guide

    18

  • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    E.3.2. /proc/bus/E.3.3. /proc/bus/pciE.3.4. /proc/driver/E.3.5. /proc/fsE.3.6. /proc/irq/E.3.7. /proc/net/E.3.8. /proc/scsi/E.3.9. /proc/sys/

    E.3.9.1. /proc/sys/dev/E.3.9.2. /proc/sys/fs/E.3.9.3. /proc/sys/kernel/E.3.9.4. /proc/sys/net/E.3.9.5. /proc/sys/vm/

    E.3.10. /proc/sysvipc/E.3.11. /proc/tty/E.3.12. /proc/PID/

    E.4. Using the sysctl CommandE.5. Additional Resources

    E.5.1. Installed DocumentationE.5.2. Useful Websites

    Revision HistoryIndex

    SymbolsABCDEFGHIKLMNOPRSTUVWXY

    720721722723723723724725726727728730732734734734735736736736738738738739742744745747748749750750751753754755756758763765772772773774774776

    Table of Contents

    19

  • Red Hat Enterprise Linux 6 Deployment Guide

    20

  • PrefaceThe Deployment Guide contains information on how to customize the Red Hat Enterprise Linux 6 systemto fit your needs. If you are looking for a comprehensive, task-oriented guide for configuring andcustomizing your system, this is the manual for you.

    This manual discusses many intermediate topics such as the following:

    Installing and managing packages using the graphical PackageKit and command line Yum packagemanagersSetting up a networkfrom establishing an Ethernet connection using NetworkManager toconfiguring channel bonding interfaces to increase server bandwidthConfiguring DHCP, BIND, Apache HTTP Server, Postfix, Sendmail and other enterprise-classservers and softwareGathering information about your system, including obtaining user-space crash data with theAutomatic Bug Reporting Tool, and kernel-space crash data with kdumpEasily working with kernel modules and upgrading the kernel

    1. Target AudienceThe Deployment Guide assumes you have a basic understanding of the Red Hat Enterprise Linuxoperating system. If you need help with the installation of this system, refer to the Red Hat EnterpriseLinux 6 Installation Guide.

    2. How to Read this BookThis manual is divided into the following main categories:

    Part I, Basic System ConfigurationThis part covers basic system administration tasks such as keyboard configuration, date andtime configuration, managing users and groups, and gaining privileges.

    Chapter 1, Keyboard Configuration covers basic keyboard setup. Read this chapter if you needto change the keyboard layout, add the Keyboard Indicator applet to the panel, or enforce aperiodic typing brake.

    Chapter 2, Date and Time Configuration covers the configuration of the system date and time.Read this chapter if you need to change the date and time.

    Chapter 3, Managing Users and Groups covers the management of users and groups in agraphical user interface and on the command line. Read this chapter if you need to manageusers and groups on your system, or enable password aging.

    Chapter 4, Gaining Privileges documents how to gain administrative privileges. Read thischapter to learn how to use the su and sudo commands.

    Part II, Package ManagementThis part focuses on product subscriptions and entitlements, and describes how to managesoftware packages on Red Hat Enterprise Linux using both Yum and the PackageKit suite ofgraphical package management tools.

    Chapter 5, Registering a System and Managing Subscriptions provides an overview of

    Preface

    21

  • subscription management in Red Hat Enterprise Linux and the Red Hat Subscription Managertools which are available. Read this chapter to learn how to register or unregister a system,activate a machine, and handle product subscriptions and entitlements.

    Chapter 6, Yum describes the Yum package manager. Read this chapter for information on howto search, install, update, and uninstall packages on the command line.

    Chapter 7, PackageKit describes the PackageKit suite of graphical package managementtools. Read this chapter for information on how to search, install, update, and uninstallpackages using a graphical user interface.

    Part III, NetworkingThis part describes how to configure the network on Red Hat Enterprise Linux.

    Chapter 8, NetworkManager focuses on NetworkManager, a dynamic network control andconfiguration system that attempts to keep network devices and connections up and activewhen they are available. Read this chapter for information on how to run the NetworkManagerdaemon, and how to interact with it using the corresponding applet for the notification area.

    Chapter 9, Network Interfaces explores various interface configuration files, interface controlscripts, and network function files located in the /etc/sysconfig/network-scripts/directory. Read this chapter for information on how to use these files to configure networkinterfaces.

    Chapter 10, Configure SCTP describes the Streaming Control Transport Protocol (SCTP), amessage oriented, reliable transport protocol with direct support for multihoming. Read thischapter for information on when and how to make use of SCTP.

    Part IV, Infrastructure ServicesThis part provides information on how to configure services and daemons, configureauthentication, and enable remote logins.

    Chapter 11, Services and Daemons explains the concept of runlevels, and describes how to setthe default one. It also covers the configuration of the services to be run in each of theserunlevels, and provides information on how to start, stop, and restart a service. Read thischapter to learn how to manage services on your system.

    Chapter 12, Configuring Authentication describes how to configure user information retrievalfrom Lightweight Directory Access Protocol (LDAP), Network Information Service (NIS), andWinbind user account databases, and provides an introduction to the System Security ServicesDaemon (SSSD). Read this chapter if you need to configure authentication on your system.

    Chapter 13, OpenSSH describes how to enable a remote login via the SSH protocol. It coversthe configuration of the sshd service, as well as a basic usage of the ssh, scp, sftp clientutilities. Read this chapter if you need a remote access to a machine.

    Part V, ServersThis part discusses various topics related to servers such as how to set up a web server orshare files and directories over the network.

    Chapter 14, DHCP Servers guides you through the installation of a Dynamic Host ConfigurationProtocol (DHCP) server and client. Read this chapter if you need to configure DHCP on yoursystem.

    Red Hat Enterprise Linux 6 Deployment Guide

    22

  • Chapter 15, DNS Servers introduces you to Domain Name System (DNS), explains how toinstall, configure, run, and administer the BIND DNS server. Read this chapter if you need toconfigure a DNS server on your system.

    Chapter 16, Web Servers focuses on the Apache HTTP Server 2.2 , a robust, full-featuredopen source web server developed by the Apache Software Foundation. Read this chapter ifyou need to configure a web server on your system.

    Chapter 17, Mail Servers reviews modern email protocols in use today, and some of theprograms designed to send and receive email, including Postfix, Sendmail, Fetchmail, andProcmail. Read this chapter if you need to configure a mail server on your system.

    Chapter 18, Directory Servers covers the installation and configuration of OpenLDAP 2.4 , anopen source implementation of the LDAPv2 and LDAPv3 protocols. Read this chapter if youneed to configure a directory server on your system.

    Chapter 19, File and Print Servers guides you through the installation and configuration ofSamba , an open source implementation of the Server Message Block (SMB) protocol, andvsftpd, the primary FTP server shipped with Red Hat Enterprise Linux. Additionally, it explainshow to use the Printer Configuration tool to configure printers. Read this chapter if you needto configure a file or print server on your system.

    Chapter 20, Configuring NTP Using ntpd covers the configuration of the Network Time Protocol(NTP) daemon (ntpd) for updating the system clock. Read this chapter if you need to configurethe system to synchronize the clock with a remote Network T ime Protocol (NTP) server.

    Chapter 21, Configuring PTP Using ptp4l covers the configuration of the Precision Time Protocol(PTP) for updating the system clock. Read this chapter if you need to configure the system tosynchronize the clock with a Precision T ime Protocol (PTP) server.

    Part VI, Monitoring and AutomationThis part describes various tools that allow system administrators to monitor systemperformance, automate system tasks, and report bugs.

    Chapter 22, System Monitoring Tools discusses applications and commands that can be usedto retrieve important information about the system. Read this chapter to learn how to gatheressential system information.

    Chapter 23, Viewing and Managing Log Files describes the configuration of the rsyslogdaemon, and explains how to locate, view, and monitor log files. Read this chapter to learn howto work with log files.

    Chapter 24, Automating System Tasks provides an overview of the cron, at, and batchutilities. Read this chapter to learn how to use these utilities to perform automated tasks.

    Chapter 25, Automatic Bug Reporting Tool (ABRT) concentrates on ABRT , a system serviceand a set of tools to collect crash data and send a report to the relevant issue tracker. Readthis chapter to learn how to use ABRT on your system.

    Chapter 26, OProfile covers OProfile , a low overhead, system-wide performance monitoringtool. Read this chapter for information on how to use OProfile on your system.

    Part VII, Kernel, Module and Driver ConfigurationThis part covers various tools that assist administrators with kernel customization.

    Preface

    23

  • Chapter 27, Manually Upgrading the Kernel provides important information on how to manuallyupdate a kernel package using the rpm command instead of yum . Read this chapter if youcannot update a kernel package with the Yum package manager.

    Chapter 28, Working with Kernel Modules explains how to display, query, load, and unloadkernel modules and their dependencies, and how to set module parameters. Additionally, itcovers specific kernel module capabilities such as using multiple Ethernet cards and usingchannel bonding. Read this chapter if you need to work with kernel modules.

    Chapter 29, The kdump Crash Recovery Service explains how to configure, test, and use the kdump service in Red Hat Enterprise Linux, and provides a brief overview of how to analyze theresulting core dump using the crash debugging utility. Read this chapter to learn how to enablekdump on your system.

    Appendix A, Consistent Network Device NamingThis appendix covers consistent network device naming for network interfaces, a feature thatchanges the name of network interfaces on a system in order to make locating anddifferentiating the interfaces easier. Read this appendix to learn more about this feature andhow to enable or disable it.

    Appendix B, RPMThis appendix concentrates on the RPM Package Manager (RPM), an open packaging systemused by Red Hat Enterprise Linux, and the use of the rpm utility. Read this appendix if youneed to use rpm instead of yum .

    Appendix C, The X Window SystemThis appendix covers the configuration of the X Window System, the graphical environmentused by Red Hat Enterprise Linux. Read this appendix if you need to adjust the configuration ofyour X Window System.

    Appendix D, The sysconfig DirectoryThis appendix outlines some of the files and directories located in the /etc/sysconfig/directory. Read this appendix if you want to learn more about these files and directories, theirfunction, and their contents.

    Appendix E, The proc File SystemThis appendix explains the concept of a virtual file system, and describes some of the top-levelfiles and directories within the proc file system (that is, the /proc/ directory). Read thisappendix if you want to learn more about this file system.

    3. Document ConventionsThis manual uses several conventions to highlight certain words and phrases and draw attention tospecific pieces of information.

    In PDF and paper editions, this manual uses typefaces drawn from the Liberation Fonts set. TheLiberation Fonts set is also used in HTML editions if the set is installed on your system. If not, alternative

    Red Hat Enterprise Linux 6 Deployment Guide

    24

  • but equivalent typefaces are displayed. Note: Red Hat Enterprise Linux 5 and later include the LiberationFonts set by default.

    3.1. Typographic ConventionsFour typographic conventions are used to call attention to specific words and phrases. Theseconventions, and the circumstances they apply to, are as follows.

    Mono-spaced Bold

    Used to highlight system input, including shell commands, file names and paths. Also used to highlightkeys and key combinations. For example:

    To see the contents of the file my_next_bestselling_novel in your current workingdirectory, enter the cat my_next_bestselling_novel command at the shell promptand press Enter to execute the command.

    The above includes a file name, a shell command and a key, all presented in mono-spaced bold and alldistinguishable thanks to context.

    Key combinations can be distinguished from an individual key by the plus sign that connects each part ofa key combination. For example:

    Press Enter to execute the command.

    Press Ctrl+Alt+F2 to switch to a virtual terminal.

    The first example highlights a particular key to press. The second example highlights a key combination:a set of three keys pressed simultaneously.

    If source code is discussed, class names, methods, functions, variable names and returned valuesmentioned within a paragraph will be presented as above, in mono-spaced bold. For example:

    File-related classes include filesystem for file systems, file for files, and dir fordirectories. Each class has its own associated set of permissions.

    Proportional Bold

    This denotes words or phrases encountered on a system, including application names; dialog-box text;labeled buttons; check-box and radio-button labels; menu titles and submenu titles. For example:

    Choose System Preferences Mouse from the main menu bar to launch MousePreferences. In the Buttons tab, select the Left-handed mouse check box and clickClose to switch the primary mouse button from the left to the right (making the mousesuitable for use in the left hand).

    To insert a special character into a gedit file, choose Applications Accessories Character Map from the main menu bar. Next, choose Search Find from theCharacter Map menu bar, type the name of the character in the Search field and clickNext. The character you sought will be highlighted in the Character Table. Double-clickthis highlighted character to place it in the Text to copy field and then click the Copybutton. Now switch back to your document and choose Edit Paste from the gedit menubar.

    The above text includes application names; system-wide menu names and items; application-specificmenu names; and buttons and text found within a GUI interface, all presented in proportional bold and alldistinguishable by context.

    Preface

    25

  • Mono-spaced Bold Italic or Proportional Bold Italic

    Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable or variabletext. Italics denotes text you do not input literally or displayed text that changes depending oncircumstance. For example:

    To connect to a remote machine using ssh, type ssh [email protected] at a shellprompt. If the remote machine is example.com and your username on that machine isjohn, type ssh [email protected] .

    The mount -o remount file-system command remounts the named file system. Forexample, to remount the /home file system, the command is mount -o remount /home.

    To see the version of a currently installed package, use the rpm -q package command. Itwill return a result as follows: package-version-release.

    Note the words in bold italics above: username, domain.name, file-system, package, version and release.Each word is a placeholder, either for text you enter when issuing a command or for text displayed bythe system.

    Aside from standard usage for presenting the title of a work, italics denotes the first use of a new andimportant term. For example:

    Publican is a DocBook publishing system.

    3.2. Pull-quote ConventionsTerminal output and source code listings are set off visually from the surrounding text.

    Output sent to a terminal is set in mono-spaced roman and presented thus:

    books Desktop documentation drafts mss photos stuff svnbooks_tests Desktop1 downloads images notes scripts svgs

    Source-code listings are also set in mono-spaced roman but add syntax highlighting as follows:

    Red Hat Enterprise Linux 6 Deployment Guide

    26

  • static int kvm_vm_ioctl_deassign_device(struct kvm *kvm, struct kvm_assigned_pci_dev *assigned_dev){ int r = 0; struct kvm_assigned_dev_kernel *match;

    mutex_lock(&kvm->lock);

    match = kvm_find_assigned_dev(&kvm->arch.assigned_dev_head, assigned_dev->assigned_dev_id); if (!match) { printk(KERN_INFO "%s: device hasn't been assigned before, " "so cannot be deassigned\n", __func__); r = -EINVAL; goto out; }

    kvm_deassign_device(kvm, match);

    kvm_free_assigned_device(kvm, match);

    out: mutex_unlock(&kvm->lock); return r;}

    3.3. Notes and WarningsFinally, we use three visual styles to draw attention to information that might otherwise be overlooked.

    Note

    Notes are tips, shortcuts or alternative approaches to the task at hand. Ignoring a note shouldhave no negative consequences, but you might miss out on a trick that makes your life easier.

    Important

    Important boxes detail things that are easily missed: configuration changes that only apply to thecurrent session, or services that need restarting before an update will apply. Ignoring a boxlabeled Important will not cause data loss but may cause irritation and frustration.

    Warning

    Warnings should not be ignored. Ignoring warnings will most likely cause data loss.

    4. FeedbackIf you find a typographical error in this manual, or if you have thought of a way to make this manualbetter, we would love to hear from you! Please submit a report in Bugzilla against the product Red HatEnterprise Linux 6 .

    Preface

    27

  • When submitting a bug report, be sure to provide the following information:

    Manual's identifier: doc-Deployment_GuideVersion number: 6

    If you have a suggestion for improving the documentation, try to be as specific as possible whendescribing it. If you have found an error, please include the section number and some of the surroundingtext so we can find it easily.

    5. AcknowledgmentsCertain portions of this text first appeared in the Deployment Guide, copyright 2007 Red Hat, Inc.,available at https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/index.html.

    Section 22.6, Monitoring Performance with Net-SNMP is based on an article written by Michael Solberg.

    The authors of this book would like to thank the following people for their valuable contributions: AdamTk, Andrew Fitzsimon, Andrius Benokraitis, Brian Cleary Edward Bailey, Garrett LeSage, Jeffrey Fearn,Joe Orton, Joshua Wulf, Karsten Wade, Lucy Ringland, Marcela Malov, Mark Johnson, MichaelBehm, Miroslav Lichvr, Radek Vokl, Rahul Kavalapara, Rahul Sundaram, Sandra Moore, Zbyek Mrz,Jan Velk, Peter Hutterer and James Antill, among many others.

    Red Hat Enterprise Linux 6 Deployment Guide

    28

  • Part I. Basic System ConfigurationThis part covers basic system administration tasks such as keyboard configuration, date and timeconfiguration, managing users and groups, and gaining privileges.

    Part I. Basic System Configuration

    29

  • Chapter 1. Keyboard ConfigurationThis chapter describes how to change the keyboard layout, as well as how to add the KeyboardIndicator applet to the panel. It also covers the option to enforce a typing break, and explains bothadvantages and disadvantages of doing so.

    1.1. Changing the Keyboard LayoutThe installation program has allowed you to configure a keyboard layout for your system. However, thedefault settings may not always suit your current needs. To configure a different keyboard layout afterthe installation, use the Keyboard Preferences tool.

    To open Keyboard Layout Preferences, select System Preferences Keyboard from thepanel, and click the Layouts tab.

    Figure 1.1. Keyboard Layout Preferences

    You will be presented with a list of available layouts. To add a new one, click the Add... button belowthe list, and you will be prompted to choose which layout you want to add.

    Red Hat Enterprise Linux 6 Deployment Guide

    30

  • Figure 1.2. Choosing a layout

    Currently, there are two ways how to choose the keyboard layout: you can either find it by the country itis associated with (the By country tab), or you can select it by language (the By language tab). Ineither case, first select the desired country or language from the Country or Language pulldown menu,then specify the variant from the Variants menu. The preview of the layout changes immediately. Toconfirm the selection, click Add.

    Figure 1.3. Selecting the default layout

    The layout should appear in the list. To make it the default, select the radio button next to its name. Thechanges take effect immediately. Note that there is a text-entry field at the bottom of the window whereyou can safely test your settings. Once you are satisfied, click Close to close the window.

    Figure 1.4 . Testing the layout

    Chapter 1. Keyboard Configuration

    31

  • Disable separate layout for each window

    By default, changing the keyboard layout affects the active window only. This means that if youchange the layout and switch to another window, this window will use the old one, which might beconfusing. To turn this behavior off, clear the Separate layout for each window checkbox.

    Doing this has its drawbacks though, as you will no longer be able to choose the default layout byselecting the radio button as shown in Figure 1.3, Selecting the default layout. To make thelayout the default, simply drag it to the beginning of the list.

    1.2. Adding the Keyboard Layout IndicatorIf you want to see what keyboard layout you are currently using, or you would like to switch betweendifferent layouts with a single mouse click, add the Keyboard Indicator applet to the panel. To do so,right-click the empty space on the main panel, and s