Red Hat Enterprise Linux 6

Deployment Guide

Deployment, Configuration and Administration of Red Hat Enterprise Linux 6

Barbora Ančincová

Red Hat Customer Content Services

Jaromír Hradílek

Red Hat Customer Content Services

Douglas Silas

Red Hat Customer Content Services

Martin Prpič

Red Hat Customer Content Services

Stephen Wadeley

Red Hat Customer Content Services

Eva Kopalová

Red Hat Customer Content Services

Peter Ondrejka

Red Hat Customer Content Services

Ella Deon Lackey

Red Hat Customer Content Services

Tomáš Čapek

Red Hat Customer Content Services

Petr Kovář

Red Hat Customer Content Services

Miroslav Svoboda

Red Hat Customer Content Services

Petr Bokoč

Red Hat Customer Content Services

Jiří Herrmann

Red Hat Customer Content Services

Jana Švárová

Red Hat Customer Content Services

Milan Navrátil

Red Hat Customer Content Services

Robert Krátký

Red Hat Customer Content Services

Florian Nadge

Red Hat Customer Content Services

John Ha

Red Hat Customer Content Services

David O'Brien

Red Hat Customer Content Services

Michael Hideo

Red Hat Customer Content Services

Don Domingo

Red Hat Customer Content Services

Legal Notice

Copyright © 2010–2015 Red Hat, Inc.
This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack Logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.

Abstract

The Deployment Guide documents relevant information regarding the deployment, configuration and administration of Red Hat Enterprise Linux 6. It is oriented towards system administrators with a basic understanding of the system.
I. Basic System Configuration
1. Keyboard Configuration
1.1. Changing the Keyboard Layout
1.2. Adding the Keyboard Layout Indicator
1.3. Setting Up a Typing Break
2. Date and Time Configuration
2.1. Date/Time Properties Tool
2.1.1. Date and Time Properties
2.1.2. Network Time Protocol Properties
2.1.3. Time Zone Properties
2.2. Command Line Configuration
2.2.1. Date and Time Setup
2.2.2. Network Time Protocol Setup
3. Managing Users and Groups
3.1. What Users and Groups Are
3.2. Managing Users via the User Manager application
3.2.1. Viewing Users
3.2.2. Adding a New User
3.2.3. Modifying User Properties
3.3. Managing Groups via the User Manager Application
3.3.1. Viewing Groups
3.3.2. Adding a New Group
3.3.3. Modifying Group Properties
3.4. Managing Users via Command-Line Tools
3.4.1. Creating Users
3.4.2. Attaching New Users to Groups
3.4.3. Updating Users' Authentication
3.4.4. Modifying User Settings
3.4.5. Deleting Users
3.4.6. Displaying Comprehensive User Information
3.5. Managing Groups via Command-Line Tools
3.5.1. Creating Groups
3.5.2. Attaching Users to Groups
3.5.3. Updating Group Authentication
3.5.4. Modifying Group Settings
3.5.5. Deleting Groups
3.6. Additional Resources
3.6.1. Installed Documentation
4. Gaining Privileges
4.1. The su Command
4.2. The sudo Command
4.3. Additional Resources
II. Subscription and Support
5. Registering the System and Managing Subscriptions
5.1. Registering the System and Attaching Subscriptions
5.2. Managing Software Repositories
5.3. Removing Subscriptions
5.4. Additional Resources
6. Accessing Support Using the Red Hat Support Tool
6.1. Installing the Red Hat Support Tool
6.2. Registering the Red Hat Support Tool Using the Command Line
6.3. Using the Red Hat Support Tool in Interactive Shell Mode
6.4. Configuring the Red Hat Support Tool
6.4.1. Saving Settings to the Configuration Files
6.5. Opening and Updating Support Cases Using Interactive Mode
6.6. Viewing Support Cases on the Command Line
6.7. Additional Resources
III. Installing and Managing Software
7. Yum
7.1. Checking For and Updating Packages
7.1.1. Checking For Updates
7.1.2. Updating Packages
7.1.3. Preserving Configuration File Changes
7.1.4. Upgrading the System Off-line with ISO and Yum
7.2. Packages and Package Groups
7.2.1. Searching Packages
7.2.2. Listing Packages
7.2.3. Displaying Package Information
7.2.4. Installing Packages
7.2.5. Removing Packages
7.3. Working with Transaction History
7.3.1. Listing Transactions
7.3.2. Examining Transactions
7.3.3. Reverting and Repeating Transactions
7.3.4. Completing Transactions
7.3.5. Starting New Transaction History
7.4. Configuring Yum and Yum Repositories
7.4.1. Setting [main] Options
7.4.2. Setting [repository] Options
7.4.3. Using Yum Variables
7.4.4. Viewing the Current Configuration
7.4.5. Adding, Enabling, and Disabling a Yum Repository
7.4.6. Creating a Yum Repository
7.4.7. Working with Yum Cache
7.4.8. Adding the Optional and Supplementary Repositories
7.5. Yum Plug-ins
7.5.1. Enabling, Configuring, and Disabling Yum Plug-ins
7.5.2. Installing Additional Yum Plug-ins
7.5.3. Plug-in Descriptions
7.6. Additional Resources
8. PackageKit
8.1. Updating Packages with Software Update
8.2. Using Add/Remove Software
8.2.1. Refreshing Software Sources (Yum Repositories)
8.2.2. Finding Packages with Filters
8.2.3. Installing and Removing Packages (and Dependencies)
8.2.4. Installing and Removing Package Groups
8.2.5. Viewing the Transaction Log
8.3. PackageKit Architecture
8.4. Additional Resources
IV. Networking
9. NetworkManager
9.1. The NetworkManager Daemon
9.2. Interacting with NetworkManager
9.2.1. Connecting to a Network
9.2.2. Configuring New and Editing Existing Connections
9.2.3. Connecting to a Network Automatically
9.2.4. User and System Connections
9.3. Establishing Connections
9.3.1. Establishing a Wired (Ethernet) Connection
9.3.2. Establishing a Wireless Connection
9.3.3. Establishing a Mobile Broadband Connection
9.3.4. Establishing a VPN Connection
9.3.5. Establishing a DSL Connection
9.3.6. Establishing a Bond Connection
9.3.7. Establishing a VLAN Connection
9.3.8. Establishing an IP-over-InfiniBand (IPoIB) Connection
9.3.9. Configuring Connection Settings
10. Network Interfaces
10.1. Network Configuration Files
10.2. Interface Configuration Files
10.2.1. Ethernet Interfaces
10.2.2. Specific ifcfg Options for Linux on System z
10.2.3. Required ifcfg Options for Linux on System z
10.2.4. Channel Bonding Interfaces
10.2.5. Configuring a VLAN over a Bond
10.2.6. Network Bridge
10.2.7. Setting Up 802.1Q VLAN Tagging
10.2.8. Alias and Clone Files
10.2.9. Dialup Interfaces
10.2.10. Other Interfaces
10.3. Interface Control Scripts
10.4. Static Routes and the Default Gateway
10.5. Configuring Static Routes in ifcfg files
10.5.1. Static Routes Using the IP Command Arguments Format
10.5.2. Network/Netmask Directives Format
10.6. Configuring IPv6 Tokenized Interface Identifiers
10.7. Network Function Files
10.8. Ethtool
10.9. Additional Resources
V. Infrastructure Services
11. Services and Daemons
11.1. Configuring the Default Runlevel
11.2. Configuring the Services
11.2.1. Using the Service Configuration Utility
11.2.2. Using the ntsysv Utility
11.2.3. Using the chkconfig Utility
11.3. Running Services
11.3.1. Determining the Service Status
11.3.2. Starting a Service
11.3.3. Stopping a Service
11.3.4. Restarting a Service
11.4. Additional Resources
11.4.1. Installed Documentation
11.4.2. Related Books
12. Configuring Authentication
12.1. Configuring System Authentication
12.1.1. Launching the Authentication Configuration Tool UI
12.1.2. Selecting the Identity Store for Authentication
12.1.3. Configuring Alternative Authentication Features
12.1.4. Configuring Authentication from the Command Line
12.1.5. Using Custom Home Directories
12.2. Using and Caching Credentials with SSSD
12.2.1. About SSSD
12.2.2. Setting up the sssd.conf File
12.2.3. Starting and Stopping SSSD
12.2.4. SSSD and System Services
12.2.5. Configuring Services: NSS
12.2.6. Configuring Services: PAM
12.2.7. Configuring Services: autofs
12.2.8. Configuring Services: sudo
12.2.9. Configuring Services: OpenSSH and Cached Keys
12.2.10. SSSD and Identity Providers (Domains)
12.2.11. Creating Domains: LDAP
12.2.12. Creating Domains: Identity Management (IdM)
12.2.13. Creating Domains: Active Directory
12.2.14. Configuring Domains: Active Directory as an LDAP Provider (Alternative)
12.2.15. Domain Options: Setting Username Formats
12.2.16. Domain Options: Enabling Offline Authentication
12.2.17. Domain Options: Setting Password Expirations
12.2.18. Domain Options: Using DNS Service Discovery
12.2.19. Domain Options: Using IP Addresses in Certificate Subject Names (LDAP Only)
12.2.20. Creating Domains: Proxy
12.2.21. Creating Domains: Kerberos Authentication
12.2.22. Creating Domains: Access Control
12.2.23. Creating Domains: Primary Server and Backup Servers
12.2.24. Installing SSSD Utilities
12.2.25. SSSD and UID and GID Numbers
12.2.26. Creating Local System Users
12.2.27. Seeding Users into the SSSD Cache During Kickstart
12.2.28. Managing the SSSD Cache
12.2.29. Downgrading SSSD
12.2.30. Using NSCD with SSSD
12.2.31. Troubleshooting SSSD
13. OpenSSH
13.1. The SSH Protocol
13.1.1. Why Use SSH?
13.1.2. Main Features
13.1.3. Protocol Versions
13.1.4. Event Sequence of an SSH Connection
13.2. Configuring OpenSSH
13.2.1. Configuration Files
13.2.2. Starting an OpenSSH Server
13.2.3. Requiring SSH for Remote Connections
13.2.4. Using a Key-Based Authentication
13.3. OpenSSH Clients
13.3.1. Using the ssh Utility
13.3.2. Using the scp Utility
13.3.3. Using the sftp Utility
13.4. More Than a Secure Shell
13.4.1. X11 Forwarding
13.4.2. Port Forwarding
13.5. Additional Resources
13.5.1. Installed Documentation
13.5.2. Useful Websites
14. TigerVNC
14.1. VNC Server
14.1.1. Installing VNC Server
14.1.2. Configuring VNC Server
14.1.3. Starting VNC Server
14.1.4. Terminating a VNC Session
14.2. Sharing an Existing Desktop
14.3. Using a VNC Viewer
14.3.1. Installing the VNC Viewer
14.3.2. Connecting to a VNC Server
14.3.3. Connecting to VNC Server Using SSH
14.4. Additional Resources
VI. Servers
15. DHCP Servers
15.1. Why Use DHCP?
15.2. Configuring a DHCP Server
15.2.1. Configuration File
15.2.2. Lease Database
15.2.3. Starting and Stopping the Server
15.2.4. DHCP Relay Agent
15.3. Configuring a DHCP Client
15.4. Configuring a Multihomed DHCP Server
15.4.1. Host Configuration
15.5. DHCP for IPv6 (DHCPv6)
15.6. Additional Resources
15.6.1. Installed Documentation
16. DNS Servers
16.1. Introduction to DNS
16.1.1. Nameserver Zones
16.1.2. Nameserver Types
16.1.3. BIND as a Nameserver
16.2. BIND
16.2.1. Configuring the named Service
16.2.2. Editing Zone Files
16.2.3. Using the rndc Utility
16.2.4. Using the dig Utility
16.2.5. Advanced Features of BIND
16.2.6. Common Mistakes to Avoid
16.2.7. Additional Resources
17. Web Servers
17.1. The Apache HTTP Server
17.1.1. New Features
17.1.2. Notable Changes
17.1.3. Updating the Configuration
17.1.4. Running the httpd Service
17.1.5. Editing the Configuration Files
17.1.6. Working with Modules
17.1.7. Setting Up Virtual Hosts
17.1.8. Setting Up an SSL Server
17.1.9. Enabling the mod_ssl Module
17.1.10. Enabling the mod_nss Module
17.1.11. Using an Existing Key and Certificate
17.1.12. Generating a New Key and Certificate
17.1.13. Configure the Firewall for HTTP and HTTPS Using the Command Line
17.1.14. Additional Resources
18. Mail Servers
18.1. Email Protocols
18.1.1. Mail Transport Protocols
18.1.2. Mail Access Protocols
18.2. Email Program Classifications
18.2.1. Mail Transport Agent
18.2.2. Mail Delivery Agent
18.2.3. Mail User Agent
18.3. Mail Transport Agents
18.3.1. Postfix
18.3.2. Sendmail
18.3.3. Fetchmail
18.3.4. Mail Transport Agent (MTA) Configuration
18.4. Mail Delivery Agents
18.4.1. Procmail Configuration
18.4.2. Procmail Recipes
18.5. Mail User Agents
18.5.1. Securing Communication
18.6. Additional Resources
18.6.1. Installed Documentation
18.6.2. Useful Websites
18.6.3. Related Books
19. Directory Servers
19.1. OpenLDAP
19.1.1. Introduction to LDAP
19.1.2. Installing the OpenLDAP Suite
19.1.3. Configuring an OpenLDAP Server
19.1.4. Running an OpenLDAP Server
19.1.5. Configuring a System to Authenticate Using OpenLDAP
19.1.6. Additional Resources
20. File and Print Servers
20.1. Samba
20.1.1. Introduction to Samba
20.1.2. Samba Daemons and Related Services
20.1.3. Connecting to a Samba Share
20.1.4. Configuring a Samba Server
20.1.5. Starting and Stopping Samba
20.1.6. Samba Server Types and the smb.conf File
20.1.7. Samba Security Modes
20.1.8. Samba Account Information Databases
20.1.9. Samba Network Browsing
20.1.10. Samba with CUPS Printing Support
20.1.11. Samba Distribution Programs
20.1.12. Additional Resources
20.2. FTP
20.2.1. The File Transfer Protocol
20.2.2. The vsftpd Server
20.2.3. Additional Resources
20.3. Printer Configuration
20.3.1. Starting the Printer Configuration Tool
20.3.2. Starting Printer Setup
20.3.3. Adding a Local Printer
20.3.4. Adding an AppSocket/HP JetDirect printer
20.3.5. Adding an IPP Printer
20.3.6. Adding an LPD/LPR Host or Printer
20.3.7. Adding a Samba (SMB) printer
20.3.8. Selecting the Printer Model and Finishing
20.3.9. Printing a Test Page
20.3.10. Modifying Existing Printers
20.3.11. Additional Resources
21. Configuring NTP Using ntpd
21.1. Introduction to NTP
21.2. NTP Strata
21.3. Understanding NTP
21.4. Understanding the Drift File
21.5. UTC, Timezones, and DST
21.6. Authentication Options for NTP
21.7. Managing the Time on Virtual Machines
21.8. Understanding Leap Seconds
21.9. Understanding the ntpd Configuration File
21.10. Understanding the ntpd Sysconfig File
21.11. Checking if the NTP Daemon is Installed
21.12. Installing the NTP Daemon (ntpd)
21.13. Checking the Status of NTP
21.14. Configure the Firewall to Allow Incoming NTP Packets
21.14.1. Configure the Firewall Using the Graphical Tool
21.14.2. Configure the Firewall Using the Command Line
21.15. Configure ntpdate Servers
21.16. Configure NTP
21.16.1. Configure Access Control to an NTP Service
21.16.2. Configure Rate Limiting Access to an NTP Service
21.16.3. Adding a Peer Address
21.16.4. Adding a Server Address
21.16.5. Adding a Broadcast or Multicast Server Address
21.16.6. Adding a Manycast Client Address
21.16.7. Adding a Broadcast Client Address
21.16.8. Adding a Manycast Server Address
21.16.9. Adding a Multicast Client Address
21.16.10. Configuring the Burst Option
21.16.11. Configuring the iburst Option
21.16.12. Configuring Symmetric Authentication Using a Key
21.16.13. Configuring the Poll Interval
21.16.14. Configuring Server Preference
21.16.15. Configuring the Time-to-Live for NTP Packets
21.16.16. Configuring the NTP Version to Use
21.17. Configuring the Hardware Clock Update
21.18. Configuring Clock Sources
21.19. Additional Resources
21.19.1. Installed Documentation
21.19.2. Useful Websites
22. Configuring PTP Using ptp4l
22.1. Introduction to PTP
22.1.1. Understanding PTP
22.1.2. Advantages of PTP
22.2. Using PTP
22.2.1. Checking for Driver and Hardware Support
22.2.2. Installing PTP
22.2.3. Starting ptp4l
22.3. Specifying a Configuration File
22.4. Using the PTP Management Client
22.5. Synchronizing the Clocks
22.6. Verifying Time Synchronization
22.7. Serving PTP Time With NTP
22.8. Serving NTP Time With PTP
22.9. Improving Accuracy
22.10. Additional Resources
22.10.1. Installed Documentation
22.10.2. Useful Websites
VII. Monitoring and Automation
23. System Monitoring Tools
23.1. Viewing System Processes
23.1.1. Using the ps Command
23.1.2. Using the top Command
23.1.3. Using the System Monitor Tool
23.2. Viewing Memory Usage
23.2.1. Using the free Command
23.2.2. Using the System Monitor Tool
23.3. Viewing CPU Usage
23.3.1. Using the System Monitor Tool
23.4. Viewing Block Devices and File Systems
23.4.1. Using the lsblk Command
23.4.2. Using the blkid Command
23.4.3. Using the findmnt Command
23.4.4. Using the df Command
23.4.5. Using the du Command
23.4.6. Using the System Monitor Tool
23.5. Viewing Hardware Information
23.5.1. Using the lspci Command
23.5.2. Using the lsusb Command
23.5.3. Using the lspcmcia Command
23.5.4. Using the lscpu Command
23.6. Monitoring Performance with Net-SNMP
23.6.1. Installing Net-SNMP
23.6.2. Running the Net-SNMP Daemon
23.6.3. Configuring Net-SNMP
23.6.4. Retrieving Performance Data over SNMP
23.6.5. Extending Net-SNMP
23.7. Additional Resources
23.7.1. Installed Documentation
24. Viewing and Managing Log Files
24.1. Installing rsyslog
24.1.1. Upgrading to rsyslog version 7
24.2. Locating Log Files
24.3. Basic Configuration of Rsyslog
24.3.1. Filters
24.3.2. Actions
24.3.3. Templates
24.3.4. Global Directives
24.3.5. Log Rotation
24.3.6. Using the New Configuration Format
24.3.7. Rulesets
24.3.8. Compatibility with sysklogd
24.4. Working with Queues in Rsyslog
24.4.1. Defining Queues
24.4.2. Managing Queues
24.5. Configuring rsyslog on a Logging Server
24.6. Using Rsyslog Modules
24.6.1. Importing Text Files
24.6.2. Exporting Messages to a Database
24.6.3. Enabling Encrypted Transport
24.6.4. Using RELP
24.7. Debugging Rsyslog
24.8. Managing Log Files in a Graphical Environment
24.8.1. Viewing Log Files
24.8.2. Adding a Log File
24.8.3. Monitoring Log Files
24.9. Additional Resources
25. Automating System Tasks
25.1. Cron and Anacron
25.1.1. Installing Cron and Anacron
25.1.2. Running the Crond Service
25.1.3. Configuring Anacron Jobs
25.1.4. Configuring Cron Jobs
25.1.5. Controlling Access to Cron
25.1.6. Black and White Listing of Cron Jobs
25.2. At and Batch
25.2.1. Installing At and Batch
25.2.2. Running the At Service
25.2.3. Configuring an At Job
25.2.4. Configuring a Batch Job
25.2.5. Viewing Pending Jobs
25.2.6. Additional Command-Line Options
25.2.7. Controlling Access to At and Batch
25.3. Additional Resources
26. Automatic Bug Reporting Tool (ABRT)
26.1. Installing ABRT and Starting its Services
26.2. Using the Graphical User Interface
26.3. Using the Command-Line Interface
26.3.1. Viewing Problems
26.3.2. Reporting Problems
26.3.3. Deleting Problems
26.4. Configuring ABRT
26.4.1. ABRT Events
26.4.2. Standard ABRT Installation Supported Events
26.4.3. Event Configuration in ABRT GUI
26.4.4. ABRT Specific Configuration
26.4.5. Configuring ABRT to Detect a Kernel Panic
26.4.6. Automatic Downloads and Installation of Debuginfo Packages
26.4.7. Configuring Automatic Reporting
26.4.8. Uploading and Reporting Using a Proxy Server
26.5. Configuring Centralized Crash Collection
26.5.1. Configuration Steps Required on a Dedicated System
26.5.2. Configuration Steps Required on a Client System
26.5.3. Saving Package Information
26.5.4. Testing ABRT's Crash Detection
27. OProfile
27.1. Overview of Tools
27.2. Configuring OProfile
27.2.1. Specifying the Kernel
27.2.2. Setting Events to Monitor
27.2.3. Separating Kernel and User-space Profiles
27.3. Starting and Stopping OProfile
27.4. Saving Data
27.5. Analyzing the Data
27.5.1. Using opreport
27.5.2. Using opreport on a Single Executable
27.5.3. Getting more detailed output on the modules
27.5.4. Using opannotate
27.6. Understanding /dev/oprofile/
27.7. Example Usage
27.8. OProfile Support for Java
27.8.1. Profiling Java Code
27.9. Graphical Interface
27.10. OProfile and SystemTap
27.11. Additional Resources
27.11.1. Installed Docs
27.11.2. Useful Websites
VIII. Kernel, Module and Driver Configuration
28. Manually Upgrading the Kernel
28.1. Overview of Kernel Packages
28.2. Preparing to Upgrade
28.3. Downloading the Upgraded Kernel
28.4. Performing the Upgrade
28.5. Verifying the Initial RAM Disk Image
28.6. Verifying the Boot Loader
28.6.1. Configuring the GRUB Boot Loader
28.6.2. Configuring the Loopback Device Limit
28.6.3. Configuring the OS/400 Boot Loader
28.6.4. Configuring the YABOOT Boot Loader
29. Working with Kernel Modules
29.1. Listing Currently-Loaded Modules
29.2. Displaying Information About a Module
29.3. Loading a Module
29.4. Unloading a Module
29.5. Blacklisting a Module
29.6. Setting Module Parameters
29.6.1. Loading a Customized Module - Temporary Changes
29.6.2. Loading a Customized Module - Persistent Changes
29.7. Persistent Module Loading
29.8. Specific Kernel Module Capabilities
29.8.1. Using Channel Bonding
29.9. Additional Resources
30. The kdump Crash Recovery Service
30.1. Installing the kdump Service
30.2. Configuring the kdump Service
30.2.1. Configuring the kdump at First Boot
30.2.2. Using the Kernel Dump Configuration Utility
30.2.3. Configuring kdump on the Command Line
30.2.4. Testing the Configuration
30.3. Analyzing the Core Dump
30.3.1. Running the crash Utility
30.3.2. Displaying the Message Buffer
30.3.3. Displaying a Backtrace
30.3.4. Displaying a Process Status
30.3.5. Displaying Virtual Memory Information
30.3.6. Displaying Open Files
30.3.7. Exiting the Utility
30.4. Additional Resources
30.4.1. Installed Documentation
30.4.2. Useful Websites
IX. System Recovery
31. System Recovery
31.1. Rescue Mode
31.2. Single-User Mode
31.3. Emergency Mode
31.4. Resolving Problems in System Recovery Modes
A. Consistent Network Device Naming
A.1. Affected Systems
A.2. System Requirements
A.3. Enabling and Disabling the Feature
A.4. Notes for Administrators
B. RPM
B.1. RPM Design Goals
B.2. Using RPM
B.2.1. Finding RPM Packages
B.2.2. Installing and Upgrading
B.2.3. Configuration File Changes
B.2.4. Uninstalling
B.2.5. Freshening
B.2.6. Querying
B.2.7. Verifying
B.3. Checking a Package's Signature
B.3.1. Importing Keys
B.3.2. Verifying Signature of Packages
B.4. Practical and Common Examples of RPM Usage
B.5. Additional Resources
B.5.1. Installed Documentation
B.5.2. Useful Websites
B.5.3. Related Books
C. The X Window System
C.1. The X Server
C.2. Desktop Environments and Window Managers
C.2.1. Desktop Environments
C.2.2. Window Managers
C.3. X Server Configuration Files
C.3.1. The Structure of the Configuration
C.3.2. The xorg.conf.d Directory
C.3.3. The xorg.conf File
C.4. Fonts
C.4.1. Adding Fonts to Fontconfig
C.5. Runlevels and X
C.5.1. Runlevel 3
C.5.2. Runlevel 5
C.6. Additional Resources
C.6.1. Installed Documentation
C.6.2. Useful Websites
D. The sysconfig Directory
D.1. Files in the /etc/sysconfig/ Directory
D.1.1. /etc/sysconfig/arpwatch
D.1.2. /etc/sysconfig/authconfig
D.1.3. /etc/sysconfig/autofs
D.1.4. /etc/sysconfig/clock
D.1.5. /etc/sysconfig/dhcpd
D.1.6. /etc/sysconfig/firstboot
D.1.7. /etc/sysconfig/i18n
D.1.8. /etc/sysconfig/init
D.1.9. /etc/sysconfig/ip6tables-config
D.1.10. /etc/sysconfig/keyboard
D.1.11. /etc/sysconfig/ldap
D.1.12. /etc/sysconfig/named
D.1.13. /etc/sysconfig/network
D.1.14. /etc/sysconfig/ntpd
D.1.15. /etc/sysconfig/quagga
D.1.16. /etc/sysconfig/radvd
D.1.17. /etc/sysconfig/samba
D.1.18. /etc/sysconfig/saslauthd
D.1.19. /etc/sysconfig/selinux
D.1.20. /etc/sysconfig/sendmail
D.1.21. /etc/sysconfig/spamassassin
D.1.22. /etc/sysconfig/squid
D.1.23. /etc/sysconfig/system-config-users
D.1.24. /etc/sysconfig/vncservers
D.1.25. /etc/sysconfig/xinetd
D.2. Directories in the /etc/sysconfig/ Directory
D.3. Additional Resources
D.3.1. Installed Documentation
E. The proc File System
E.1. A Virtual File System
E.1.1. Viewing Virtual Files
E.1.2. Changing Virtual Files
E.2. Top-level Files within the proc File System
E.2.1. /proc/buddyinfo
E.2.2. /proc/cmdline
E.2.3. /proc/cpuinfo
E.2.4. /proc/crypto
E.2.5. /proc/devices
E.2.6. /proc/dma
E.2.7. /proc/execdomains
E.2.8. /proc/fb
E.2.9. /proc/filesystems
E.2.10. /proc/interrupts
E.2.11. /proc/iomem
E.2.12. /proc/ioports
E.2.13. /proc/kcore
E.2.14. /proc/kmsg
E.2.15. /proc/loadavg
E.2.16. /proc/locks
E.2.17. /proc/mdstat
E.2.18. /proc/meminfo
E.2.19. /proc/misc
E.2.20. /proc/modules
E.2.21. /proc/mounts
E.2.22. /proc/mtrr
E.2.23. /proc/partitions
E.2.24. /proc/slabinfo
E.2.25. /proc/stat
E.2.26. /proc/swaps
E.2.27. /proc/sysrq-trigger
E.2.28. /proc/uptime
E.2.29. /proc/version
E.3. Directories within /proc/
E.3.1. Process Directories
E.3.2. /proc/bus/
E.3.3. /proc/bus/pci
E.3.4. /proc/driver/
E.3.5. /proc/fs
E.3.6. /proc/irq/
E.3.7. /proc/net/
E.3.8. /proc/scsi/
E.3.9. /proc/sys/
E.3.10. /proc/sysvipc/
E.3.11. /proc/tty/
E.3.12. /proc/PID/
E.4. Using the sysctl Command
E.5. Additional Resources
F. Revision History
Index