Jump To Close Expand all Collapse all Table of contents System Administrator’s Guide I. Basic System Configuration Expand section "I. Basic System Configuration" Collapse section "I. Basic System Configuration" 1. Getting Started Expand section "1. Getting Started" Collapse section "1. Getting Started" 1.1. Basic Configuration of the Environment Expand section "1.1. Basic Configuration of the Environment" Collapse section "1.1. Basic Configuration of the Environment" 1.1.1. Introduction to Configuring the Date and Time 1.1.2. Introduction to Configuring the System Locale 1.1.3. Introduction to Configuring the Keyboard Layout 1.2. Configuring and Inspecting Network Access Expand section "1.2. Configuring and Inspecting Network Access" Collapse section "1.2. Configuring and Inspecting Network Access" 1.2.1. Configuring Network Access During the Installation Process 1.2.2. Managing Network Connections After the Installation Process Using nmcli 1.2.3. Managing Network Connections After the Installation Process Using nmtui 1.2.4. Managing Networking in web console 1.3. The Basics of Registering the System and Managing Subscriptions Expand section "1.3. The Basics of Registering the System and Managing Subscriptions" Collapse section "1.3. The Basics of Registering the System and Managing Subscriptions" 1.3.1. What Red Hat Subscriptions Are and Which Tasks They Can Be Used For 1.3.2. Registering the System During the Installation 1.3.3. Registering the System after the Installation 1.3.4. Registering a System to EUS Content 1.3.5. Registering a System to E4S Content 1.4. Installing Software Expand section "1.4. Installing Software" Collapse section "1.4. Installing Software" 1.4.1. Prerequisites for Software Installation 1.4.2. Introduction to the System of Software Packaging and Software Repositories 1.4.3. Managing Basic Software Installation Tasks with Subscription Manager and Yum 1.5. Making systemd Services Start at Boot Time Expand section "1.5. Making systemd Services Start at Boot Time" Collapse section "1.5. Making systemd Services Start at Boot Time" 1.5.1. Enabling or Disabling the Services 1.5.2. Managing Services in web console 1.5.3. Additional Resources on systemd Services 1.6. Enhancing System Security with a Firewall, SELinux and SSH Logings Expand section "1.6. Enhancing System Security with a Firewall, SELinux and SSH Logings" Collapse section "1.6. Enhancing System Security with a Firewall, SELinux and SSH Logings" 1.6.1. Ensuring the Firewall Is Enabled and Running Expand section "1.6.1. Ensuring the Firewall Is Enabled and Running" Collapse section "1.6.1. Ensuring the Firewall Is Enabled and Running" 1.6.1.1. What a Firewall Is and How It Enhances System Security 1.6.1.2. Re-enabling the firewalld Service 1.6.2. Ensuring the Appropriate State of SELinux Expand section "1.6.2. Ensuring the Appropriate State of SELinux" Collapse section "1.6.2. Ensuring the Appropriate State of SELinux" 1.6.2.1. What SELinux Is and How It Enhances System Security 1.6.2.2. Ensuring the Required State of SELinux 1.6.2.3. Managing SELinux in web console 1.6.3. Using SSH-based Authentication Expand section "1.6.3. Using SSH-based Authentication" Collapse section "1.6.3. Using SSH-based Authentication" 1.6.3.1. What SSH-based Authentication Is and How It Enhances System Security 1.6.3.2. Establishing an SSH Connection 1.6.3.3. Disabling SSH Root Login 1.7. The Basics of Managing User Accounts Expand section "1.7. The Basics of Managing User Accounts" Collapse section "1.7. The Basics of Managing User Accounts" 1.7.1. The Most Basic Command-Line Tools to Manage User Accounts and Groups 1.7.2. Managing User Accounts in web console 1.8. Dumping the Crashed Kernel Using the kdump Mechanism Expand section "1.8. Dumping the Crashed Kernel Using the kdump Mechanism" Collapse section "1.8. Dumping the Crashed Kernel Using the kdump Mechanism" 1.8.1. What kdump Is and Which Tasks It Can Be Used For 1.8.2. Enabling and Activating kdump During the Installation Process 1.8.3. Ensuring That kdump Is Installed and Enabled after the Installation Process 1.8.4. Configuring kdump in web console 1.8.5. Additional Resources on kdump 1.9. Performing System Rescue and Creating System Backup with ReaR Expand section "1.9. Performing System Rescue and Creating System Backup with ReaR" Collapse section "1.9. Performing System Rescue and Creating System Backup with ReaR" 1.9.1. What ReaR Is and Which Tasks It Can Be Used For 1.9.2. Quickstart to Installation and Configuration of ReaR 1.9.3. Quickstart to Creation of the Rescue System with ReaR 1.9.4. Quickstart to Configuration of ReaR with the Backup Software 1.10. Using the Log Files to Troubleshoot Problems Expand section "1.10. Using the Log Files to Troubleshoot Problems" Collapse section "1.10. Using the Log Files to Troubleshoot Problems" 1.10.1. Services Handling the syslog Messages 1.10.2. Subdirectories Storing the syslog Messages 1.11. Accessing Red Hat Support Expand section "1.11. Accessing Red Hat Support" Collapse section "1.11. Accessing Red Hat Support" 1.11.1. Obtaining Red Hat Support Through Red Hat Customer Portal Expand section "1.11.1. Obtaining Red Hat Support Through Red Hat Customer Portal" Collapse section "1.11.1. Obtaining Red Hat Support Through Red Hat Customer Portal" 1.11.1.1. What the Red Hat Support Tool Is and Which Tasks It Can Be Used For 1.11.2. Using the SOS Report to Troubleshoot Problems 2. System Locale and Keyboard Configuration Expand section "2. System Locale and Keyboard Configuration" Collapse section "2. System Locale and Keyboard Configuration" 2.1. Setting the System Locale Expand section "2.1. Setting the System Locale" Collapse section "2.1. Setting the System Locale" 2.1.1. Displaying the Current Status 2.1.2. Listing Available Locales 2.1.3. Setting the Locale 2.1.4. Making System Locale Settings Permanent when Installing with Kickstart 2.2. Changing the Keyboard Layout Expand section "2.2. Changing the Keyboard Layout" Collapse section "2.2. Changing the Keyboard Layout" 2.2.1. Displaying the Current Settings 2.2.2. Listing Available Keymaps 2.2.3. Setting the Keymap 2.3. Additional Resources 3. Configuring the Date and Time Expand section "3. Configuring the Date and Time" Collapse section "3. Configuring the Date and Time" 3.1. Using the timedatectl Command Expand section "3.1. Using the timedatectl Command" Collapse section "3.1. Using the timedatectl Command" 3.1.1. Displaying the Current Date and Time 3.1.2. Changing the Current Time 3.1.3. Changing the Current Date 3.1.4. Changing the Time Zone 3.1.5. Synchronizing the System Clock with a Remote Server 3.2. Using the date Command Expand section "3.2. Using the date Command" Collapse section "3.2. Using the date Command" 3.2.1. Displaying the Current Date and Time 3.2.2. Changing the Current Time 3.2.3. Changing the Current Date 3.3. Using the hwclock Command Expand section "3.3. Using the hwclock Command" Collapse section "3.3. Using the hwclock Command" 3.3.1. Displaying the Current Date and Time 3.3.2. Setting the Date and Time 3.3.3. Synchronizing the Date and Time 3.4. Additional Resources 4. Managing Users and Groups Expand section "4. Managing Users and Groups" Collapse section "4. Managing Users and Groups" 4.1. Introduction to Users and Groups Expand section "4.1. Introduction to Users and Groups" Collapse section "4.1. Introduction to Users and Groups" 4.1.1. User Private Groups 4.1.2. Shadow Passwords 4.2. Managing Users in a Graphical Environment Expand section "4.2. Managing Users in a Graphical Environment" Collapse section "4.2. Managing Users in a Graphical Environment" 4.2.1. Using the Users Settings Tool 4.3. Using Command-Line Tools Expand section "4.3. Using Command-Line Tools" Collapse section "4.3. Using Command-Line Tools" 4.3.1. Adding a New User 4.3.2. Adding a New Group 4.3.3. Adding an Existing User to an Existing Group 4.3.4. Creating Group Directories 4.3.5. Setting Default Permissions for New Files Using umask Expand section "4.3.5. Setting Default Permissions for New Files Using umask" Collapse section "4.3.5. Setting Default Permissions for New Files Using umask" 4.3.5.1. Managing umask in Shells 4.4. Additional Resources 5. Access Control Lists Expand section "5. Access Control Lists" Collapse section "5. Access Control Lists" 5.1. Mounting File Systems Expand section "5.1. Mounting File Systems" Collapse section "5.1. Mounting File Systems" 5.1.1. NFS 5.2. Setting Access ACLs 5.3. Setting Default ACLs 5.4. Retrieving ACLs 5.5. Archiving File Systems With ACLs 5.6. Compatibility with Older Systems 5.7. ACL References 6. Gaining Privileges Expand section "6. Gaining Privileges" Collapse section "6. Gaining Privileges" 6.1. Configuring Administrative Access Using the su Utility 6.2. Configuring Administrative Access Using the sudo Utility 6.3. Additional Resources II. Subscription and Support Expand section "II. Subscription and Support" Collapse section "II. Subscription and Support" 7. Registering the System and Managing Subscriptions Expand section "7. Registering the System and Managing Subscriptions" Collapse section "7. Registering the System and Managing Subscriptions" 7.1. Registering the System and Attaching Subscriptions 7.2. Managing Software Repositories 7.3. Removing Subscriptions 7.4. Additional Resources 8. Accessing Support Using the Red Hat Support Tool Expand section "8. Accessing Support Using the Red Hat Support Tool" Collapse section "8. Accessing Support Using the Red Hat Support Tool" 8.1. Installing the Red Hat Support Tool 8.2. Registering the Red Hat Support Tool Using the Command Line 8.3. Using the Red Hat Support Tool in Interactive Shell Mode 8.4. Configuring the Red Hat Support Tool Expand section "8.4. Configuring the Red Hat Support Tool" Collapse section "8.4. Configuring the Red Hat Support Tool" 8.4.1. Saving Settings to the Configuration Files 8.5. Opening and Updating Support Cases Using Interactive Mode 8.6. Viewing Support Cases on the Command Line 8.7. Additional Resources III. Installing and Managing Software Expand section "III. Installing and Managing Software" Collapse section "III. Installing and Managing Software" 9. Yum Expand section "9. Yum" Collapse section "9. Yum" 9.1. Checking For and Updating Packages Expand section "9.1. Checking For and Updating Packages" Collapse section "9.1. Checking For and Updating Packages" 9.1.1. Checking For Updates 9.1.2. Updating Packages 9.1.3. Upgrading the System Off-line with ISO and Yum 9.2. Working with Packages Expand section "9.2. Working with Packages" Collapse section "9.2. Working with Packages" 9.2.1. Searching Packages 9.2.2. Listing Packages 9.2.3. Displaying Package Information 9.2.4. Installing Packages 9.2.5. Downloading Packages 9.2.6. Removing Packages 9.3. Working with Package Groups Expand section "9.3. Working with Package Groups" Collapse section "9.3. Working with Package Groups" 9.3.1. Listing Package Groups 9.3.2. Installing a Package Group 9.3.3. Removing a Package Group 9.4. Working with Transaction History Expand section "9.4. Working with Transaction History" Collapse section "9.4. Working with Transaction History" 9.4.1. Listing Transactions 9.4.2. Examining Transactions 9.4.3. Reverting and Repeating Transactions 9.4.4. Starting New Transaction History 9.5. Configuring Yum and Yum Repositories Expand section "9.5. Configuring Yum and Yum Repositories" Collapse section "9.5. Configuring Yum and Yum Repositories" 9.5.1. Setting [main] Options 9.5.2. Setting [repository] Options 9.5.3. Using Yum Variables 9.5.4. Viewing the Current Configuration 9.5.5. Adding, Enabling, and Disabling a Yum Repository 9.5.6. Creating a Yum Repository Expand section "9.5.6. Creating a Yum Repository" Collapse section "9.5.6. Creating a Yum Repository" 9.5.6.1. Adding packages to an already created yum repository 9.5.7. Adding the Optional and Supplementary Repositories 9.6. Yum Plug-ins Expand section "9.6. Yum Plug-ins" Collapse section "9.6. Yum Plug-ins" 9.6.1. Enabling, Configuring, and Disabling Yum Plug-ins 9.6.2. Installing Additional Yum Plug-ins 9.6.3. Working with Yum Plug-ins 9.7. Automatically Refreshing Package Database and Downloading Updates with Yum-cron Expand section "9.7. Automatically Refreshing Package Database and Downloading Updates with Yum-cron" Collapse section "9.7. Automatically Refreshing Package Database and Downloading Updates with Yum-cron" 9.7.1. Enabling Automatic Installation of Updates 9.7.2. Setting up Optional Email Notifications 9.7.3. Enabling or Disabling Specific Repositories 9.7.4. Testing Yum-cron Settings 9.7.5. Disabling Yum-cron messages 9.7.6. Automatically Cleaning Packages 9.8. Additional Resources IV. Infrastructure Services Expand section "IV. Infrastructure Services" Collapse section "IV. Infrastructure Services" 10. Managing Services with systemd Expand section "10. Managing Services with systemd" Collapse section "10. Managing Services with systemd" 10.1. Introduction to systemd Expand section "10.1. Introduction to systemd" Collapse section "10.1. Introduction to systemd" 10.1.1. Main Features 10.1.2. Compatibility Changes 10.2. Managing System Services Expand section "10.2. Managing System Services" Collapse section "10.2. Managing System Services" 10.2.1. Listing Services 10.2.2. Displaying Service Status 10.2.3. Starting a Service 10.2.4. Stopping a Service 10.2.5. Restarting a Service 10.2.6. Enabling a Service 10.2.7. Disabling a Service 10.2.8. Starting a Conflicting Service 10.3. Working with systemd Targets Expand section "10.3. Working with systemd Targets" Collapse section "10.3. Working with systemd Targets" 10.3.1. Viewing the Default Target 10.3.2. Viewing the Current Target 10.3.3. Changing the Default Target 10.3.4. Changing the Current Target 10.3.5. Changing to Rescue Mode 10.3.6. Changing to Emergency Mode 10.4. Shutting Down, Suspending, and Hibernating the System Expand section "10.4. Shutting Down, Suspending, and Hibernating the System" Collapse section "10.4. Shutting Down, Suspending, and Hibernating the System" 10.4.1. Shutting Down the System 10.4.2. Restarting the System 10.4.3. Suspending the System 10.4.4. Hibernating the System 10.5. Controlling systemd on a Remote Machine 10.6. Creating and Modifying systemd Unit Files Expand section "10.6. Creating and Modifying systemd Unit Files" Collapse section "10.6. Creating and Modifying systemd Unit Files" 10.6.1. Understanding the Unit File Structure 10.6.2. Creating Custom Unit Files 10.6.3. Converting SysV Init Scripts to Unit Files 10.6.4. Modifying Existing Unit Files 10.6.5. Working with Instantiated Units 10.7. Additional Considerations While Managing Services 10.8. Additional Resources 11. Configuring a System for Accessibility Expand section "11. Configuring a System for Accessibility" Collapse section "11. Configuring a System for Accessibility" 11.1. Configuring the brltty Service 11.2. Switch On Always Show Universal Access Menu 11.3. Enabling the Festival Speech Synthesis System 12. OpenSSH Expand section "12. OpenSSH" Collapse section "12. OpenSSH" 12.1. The SSH Protocol Expand section "12.1. The SSH Protocol" Collapse section "12.1. The SSH Protocol" 12.1.1. Why Use SSH? 12.1.2. Main Features 12.1.3. Protocol Versions 12.1.4. Event Sequence of an SSH Connection Expand section "12.1.4. Event Sequence of an SSH Connection" Collapse section "12.1.4. Event Sequence of an SSH Connection" 12.1.4.1. Transport Layer 12.1.4.2. Authentication 12.1.4.3. Channels 12.2. Configuring OpenSSH Expand section "12.2. Configuring OpenSSH" Collapse section "12.2. Configuring OpenSSH" 12.2.1. Configuration Files 12.2.2. Starting an OpenSSH Server 12.2.3. Requiring SSH for Remote Connections 12.2.4. Using Key-based Authentication Expand section "12.2.4. Using Key-based Authentication" Collapse section "12.2.4. Using Key-based Authentication" 12.2.4.1. Generating Key Pairs 12.2.4.2. Configuring ssh-agent 12.3. OpenSSH Clients Expand section "12.3. OpenSSH Clients" Collapse section "12.3. OpenSSH Clients" 12.3.1. Using the ssh Utility 12.3.2. Using the scp Utility 12.3.3. Using the sftp Utility 12.4. More Than a Secure Shell Expand section "12.4. More Than a Secure Shell" Collapse section "12.4. More Than a Secure Shell" 12.4.1. X11 Forwarding 12.4.2. Port Forwarding 12.5. Additional Resources 13. TigerVNC Expand section "13. TigerVNC" Collapse section "13. TigerVNC" 13.1. VNC Server Expand section "13.1. VNC Server" Collapse section "13.1. VNC Server" 13.1.1. Installing VNC Server 13.1.2. Configuring VNC Server Expand section "13.1.2. Configuring VNC Server" Collapse section "13.1.2. Configuring VNC Server" 13.1.2.1. Configuring VNC Server for Two Users 13.1.3. Starting VNC Server Expand section "13.1.3. Starting VNC Server" Collapse section "13.1.3. Starting VNC Server" 13.1.3.1. Configuring VNC Server for Two Users and Two Different Displays 13.1.4. VNC setup based on xinetd with XDMCP for GDM 13.1.5. Terminating a VNC Session 13.2. Sharing an Existing Desktop 13.3. VNC Viewer Expand section "13.3. VNC Viewer" Collapse section "13.3. VNC Viewer" 13.3.1. Installing VNC Viewer 13.3.2. Connecting to VNC Server Expand section "13.3.2. Connecting to VNC Server" Collapse section "13.3.2. Connecting to VNC Server" 13.3.2.1. Configuring the Firewall for VNC 13.3.3. Connecting to VNC Server Using SSH 13.4. Additional Resources V. Servers Expand section "V. Servers" Collapse section "V. Servers" 14. Web Servers Expand section "14. Web Servers" Collapse section "14. Web Servers" 14.1. The Apache HTTP Server Expand section "14.1. The Apache HTTP Server" Collapse section "14.1. The Apache HTTP Server" 14.1.1. Notable Changes 14.1.2. Updating the Configuration 14.1.3. Running the httpd Service Expand section "14.1.3. Running the httpd Service" Collapse section "14.1.3. Running the httpd Service" 14.1.3.1. Starting the Service 14.1.3.2. Stopping the Service 14.1.3.3. Restarting the Service 14.1.3.4. Verifying the Service Status 14.1.4. Editing the Configuration Files 14.1.5. Working with Modules Expand section "14.1.5. Working with Modules" Collapse section "14.1.5. Working with Modules" 14.1.5.1. Loading a Module 14.1.5.2. Writing a Module 14.1.6. Setting Up Virtual Hosts 14.1.7. Setting Up an SSL Server Expand section "14.1.7. Setting Up an SSL Server" Collapse section "14.1.7. Setting Up an SSL Server" 14.1.7.1. An Overview of Certificates and Security 14.1.8. Enabling the mod_ssl Module Expand section "14.1.8. Enabling the mod_ssl Module" Collapse section "14.1.8. Enabling the mod_ssl Module" 14.1.8.1. Enabling and Disabling SSL and TLS in mod_ssl 14.1.9. Enabling the mod_nss Module Expand section "14.1.9. Enabling the mod_nss Module" Collapse section "14.1.9. Enabling the mod_nss Module" 14.1.9.1. Enabling and Disabling SSL and TLS in mod_nss 14.1.10. Using an Existing Key and Certificate 14.1.11. Generating a New Key and Certificate 14.1.12. Configure the Firewall for HTTP and HTTPS Using the Command Line Expand section "14.1.12. Configure the Firewall for HTTP and HTTPS Using the Command Line" Collapse section "14.1.12. Configure the Firewall for HTTP and HTTPS Using the Command Line" 14.1.12.1. Checking Network Access for Incoming HTTPS and HTTPS Using the Command Line 14.1.13. Additional Resources 15. Mail Servers Expand section "15. Mail Servers" Collapse section "15. Mail Servers" 15.1. Email Protocols Expand section "15.1. Email Protocols" Collapse section "15.1. Email Protocols" 15.1.1. Mail Transport Protocols Expand section "15.1.1. Mail Transport Protocols" Collapse section "15.1.1. Mail Transport Protocols" 15.1.1.1. SMTP 15.1.2. Mail Access Protocols Expand section "15.1.2. Mail Access Protocols" Collapse section "15.1.2. Mail Access Protocols" 15.1.2.1. POP 15.1.2.2. IMAP 15.1.2.3. Dovecot 15.2. Email Program Classifications Expand section "15.2. Email Program Classifications" Collapse section "15.2. Email Program Classifications" 15.2.1. Mail Transport Agent 15.2.2. Mail Delivery Agent 15.2.3. Mail User Agent 15.3. Mail Transport Agents Expand section "15.3. Mail Transport Agents" Collapse section "15.3. Mail Transport Agents" 15.3.1. Postfix Expand section "15.3.1. Postfix" Collapse section "15.3.1. Postfix" 15.3.1.1. The Default Postfix Installation 15.3.1.2. Upgrading From a Previous Release 15.3.1.3. Basic Postfix Configuration 15.3.1.4. Using Postfix with LDAP Expand section "15.3.1.4. Using Postfix with LDAP" Collapse section "15.3.1.4. Using Postfix with LDAP" 15.3.1.4.1. The /etc/aliases lookup example 15.3.2. Sendmail Expand section "15.3.2. Sendmail" Collapse section "15.3.2. Sendmail" 15.3.2.1. Purpose and Limitations 15.3.2.2. The Default Sendmail Installation 15.3.2.3. Common Sendmail Configuration Changes 15.3.2.4. Masquerading 15.3.2.5. Stopping Spam 15.3.2.6. Using Sendmail with LDAP 15.3.3. Fetchmail Expand section "15.3.3. Fetchmail" Collapse section "15.3.3. Fetchmail" 15.3.3.1. Fetchmail Configuration Options 15.3.3.2. Global Options 15.3.3.3. Server Options 15.3.3.4. User Options 15.3.3.5. Fetchmail Command Options 15.3.3.6. Informational or Debugging Options 15.3.3.7. Special Options 15.3.4. Mail Transport Agent (MTA) Configuration 15.4. Mail Delivery Agents Expand section "15.4. Mail Delivery Agents" Collapse section "15.4. Mail Delivery Agents" 15.4.1. Procmail Configuration 15.4.2. Procmail Recipes Expand section "15.4.2. Procmail Recipes" Collapse section "15.4.2. Procmail Recipes" 15.4.2.1. Delivering vs. Non-Delivering Recipes 15.4.2.2. Flags 15.4.2.3. Specifying a Local Lockfile 15.4.2.4. Special Conditions and Actions 15.4.2.5. Recipe Examples 15.4.2.6. Spam Filters 15.5. Mail User Agents Expand section "15.5. Mail User Agents" Collapse section "15.5. Mail User Agents" 15.5.1. Securing Communication Expand section "15.5.1. Securing Communication" Collapse section "15.5.1. Securing Communication" 15.5.1.1. Secure Email Clients 15.5.1.2. Securing Email Client Communications 15.6. Configuring Mail Server with Antispam and Antivirus Expand section "15.6. Configuring Mail Server with Antispam and Antivirus" Collapse section "15.6. Configuring Mail Server with Antispam and Antivirus" 15.6.1. Configuring Spam Filtering for Mail Transport Agent or Mail Delivery Agent Expand section "15.6.1. Configuring Spam Filtering for Mail Transport Agent or Mail Delivery Agent" Collapse section "15.6.1. Configuring Spam Filtering for Mail Transport Agent or Mail Delivery Agent" 15.6.1.1. Configuring Spam Filtering in a Mail Transport Agent 15.6.1.2. Configuring Spam Filtering in a Mail Delivery Agent 15.6.2. Configuring Antivirus Protection 15.6.3. Using the EPEL Repository to install Antispam and Antivirus Software 15.7. Additional Resources Expand section "15.7. Additional Resources" Collapse section "15.7. Additional Resources" 15.7.1. Installed Documentation 15.7.2. Online Documentation 15.7.3. Related Books 16. File and Print Servers Expand section "16. File and Print Servers" Collapse section "16. File and Print Servers" 16.1. Samba Expand section "16.1. Samba" Collapse section "16.1. Samba" 16.1.1. The Samba Services 16.1.2. Verifying the smb.conf File by Using the testparm Utility 16.1.3. Understanding the Samba Security Modes 16.1.4. Setting up Samba as a Standalone Server Expand section "16.1.4. Setting up Samba as a Standalone Server" Collapse section "16.1.4. Setting up Samba as a Standalone Server" 16.1.4.1. Setting up the Server Configuration for the Standalone Server 16.1.4.2. Creating and Enabling Local User Accounts 16.1.5. Setting up Samba as a Domain Member Expand section "16.1.5. Setting up Samba as a Domain Member" Collapse section "16.1.5. Setting up Samba as a Domain Member" 16.1.5.1. Joining a Domain 16.1.5.2. Verifying That Samba Was Correctly Joined As a Domain Member 16.1.5.3. Understanding ID Mapping Expand section "16.1.5.3. Understanding ID Mapping" Collapse section "16.1.5.3. Understanding ID Mapping" 16.1.5.3.1. Planning ID Ranges 16.1.5.3.2. The * Default Domain 16.1.5.4. The Different ID Mapping Back Ends Expand section "16.1.5.4. The Different ID Mapping Back Ends" Collapse section "16.1.5.4. The Different ID Mapping Back Ends" 16.1.5.4.1. Using the tdb ID Mapping Back End 16.1.5.4.2. Using the ad ID Mapping Back End 16.1.5.4.3. Using the rid ID Mapping Back End 16.1.5.4.4. Using the autorid ID Mapping Back End 16.1.6. Configuring File Shares on a Samba Server Expand section "16.1.6. Configuring File Shares on a Samba Server" Collapse section "16.1.6. Configuring File Shares on a Samba Server" 16.1.6.1. Setting up a Share That Uses POSIX ACLs Expand section "16.1.6.1. Setting up a Share That Uses POSIX ACLs" Collapse section "16.1.6.1. Setting up a Share That Uses POSIX ACLs" 16.1.6.1.1. Adding a Share That Uses POSIX ACLs 16.1.6.1.2. Setting ACLs 16.1.6.1.3. Setting Permissions on a Share 16.1.6.2. Setting up a Share That Uses Windows ACLs Expand section "16.1.6.2. Setting up a Share That Uses Windows ACLs" Collapse section "16.1.6.2. Setting up a Share That Uses Windows ACLs" 16.1.6.2.1. Granting the SeDiskOperatorPrivilege Privilege 16.1.6.2.2. Enabling Windows ACL Support 16.1.6.2.3. Adding a Share That Uses Windows ACLs 16.1.6.2.4. Managing Share Permissions and File System ACLs of a Share That Uses Windows ACLs 16.1.6.3. Managing ACLs on an SMB Share Using smbcacls Expand section "16.1.6.3. Managing ACLs on an SMB Share Using smbcacls" Collapse section "16.1.6.3. Managing ACLs on an SMB Share Using smbcacls" 16.1.6.3.1. Understanding Access Control Entries 16.1.6.3.2. Displaying ACLs Using smbcacls 16.1.6.3.3. Calculating an ACE Mask 16.1.6.3.4. Adding, Updating, And Removing an ACL Using smbcacls 16.1.6.4. Enabling Users to Share Directories on a Samba Server Expand section "16.1.6.4. Enabling Users to Share Directories on a Samba Server" Collapse section "16.1.6.4. Enabling Users to Share Directories on a Samba Server" 16.1.6.4.1. Enabling the User Shares Feature 16.1.6.4.2. Adding a User Share 16.1.6.4.3. Updating Settings of a User Share 16.1.6.4.4. Displaying Information About Existing User Shares 16.1.6.4.5. Listing User Shares 16.1.6.4.6. Deleting a User Share 16.1.6.5. Enabling Guest Access to a Share 16.1.7. Setting up a Samba Print Server Expand section "16.1.7. Setting up a Samba Print Server" Collapse section "16.1.7. Setting up a Samba Print Server" 16.1.7.1. The Samba spoolssd Service 16.1.7.2. Enabling Print Server Support in Samba 16.1.7.3. Manually Sharing Specific Printers 16.1.7.4. Setting up Automatic Printer Driver Downloads for Windows Clients Expand section "16.1.7.4. Setting up Automatic Printer Driver Downloads for Windows Clients" Collapse section "16.1.7.4. Setting up Automatic Printer Driver Downloads for Windows Clients" 16.1.7.4.1. Basic Information about Printer Drivers 16.1.7.4.2. Enabling Users to Upload and Preconfigure Drivers 16.1.7.4.3. Setting up the print$ Share 16.1.7.4.4. Creating a GPO to Enable Clients to Trust the Samba Print Server 16.1.7.4.5. Uploading Drivers and Preconfiguring Printers 16.1.8. Tuning the Performance of a Samba Server Expand section "16.1.8. Tuning the Performance of a Samba Server" Collapse section "16.1.8. Tuning the Performance of a Samba Server" 16.1.8.1. Setting the SMB Protocol Version 16.1.8.2. Tuning Shares with Directories That Contain a Large Number of Files 16.1.8.3. Settings That Can Have a Negative Performance Impact 16.1.9. Frequently Used Samba Command-line Utilities Expand section "16.1.9. Frequently Used Samba Command-line Utilities" Collapse section "16.1.9. Frequently Used Samba Command-line Utilities" 16.1.9.1. Using the net Utility Expand section "16.1.9.1. Using the net Utility" Collapse section "16.1.9.1. Using the net Utility" 16.1.9.1.1. Using the net ads join and net rpc join Commands 16.1.9.1.2. Using the net rpc rights Command 16.1.9.1.3. Using the net rpc share Command 16.1.9.1.4. Using the net user Command 16.1.9.1.5. Using the net usershare Command 16.1.9.2. Using the rpcclient Utility 16.1.9.3. Using the samba-regedit Application 16.1.9.4. Using the smbcacls Utility 16.1.9.5. Using the smbclient Utility Expand section "16.1.9.5. Using the smbclient Utility" Collapse section "16.1.9.5. Using the smbclient Utility" 16.1.9.5.1. Using smbclient in Interactive Mode 16.1.9.5.2. Using smbclient in Scripting Mode 16.1.9.6. Using the smbcontrol Utility 16.1.9.7. Using the smbpasswd Utility 16.1.9.8. Using the smbstatus Utility 16.1.9.9. Using the smbtar Utility 16.1.9.10. Using the testparm Utility 16.1.9.11. Using the wbinfo Utility 16.1.10. Additional Resources 16.2. FTP Expand section "16.2. FTP" Collapse section "16.2. FTP" 16.2.1. The File Transfer Protocol 16.2.2. The vsftpd Server Expand section "16.2.2. The vsftpd Server" Collapse section "16.2.2. The vsftpd Server" 16.2.2.1. Starting and Stopping vsftpd 16.2.2.2. Starting Multiple Copies of vsftpd 16.2.2.3. Encrypting vsftpd Connections Using TLS 16.2.2.4. SELinux Policy for vsftpd 16.2.3. Additional Resources Expand section "16.2.3. Additional Resources" Collapse section "16.2.3. Additional Resources" 16.2.3.1. Installed Documentation 16.2.3.2. Online Documentation 16.3. Print Settings Expand section "16.3. Print Settings" Collapse section "16.3. Print Settings" 16.3.1. Starting the Print Settings Configuration Tool 16.3.2. Starting Printer Setup 16.3.3. Adding a Local Printer 16.3.4. Adding an AppSocket/HP JetDirect printer 16.3.5. Adding an IPP Printer 16.3.6. Adding an LPD/LPR Host or Printer 16.3.7. Adding a Samba (SMB) printer 16.3.8. Selecting the Printer Model and Finishing 16.3.9. Printing a Test Page 16.3.10. Modifying Existing Printers Expand section "16.3.10. Modifying Existing Printers" Collapse section "16.3.10. Modifying Existing Printers" 16.3.10.1. The Settings Page 16.3.10.2. The Policies Page Expand section "16.3.10.2. The Policies Page" Collapse section "16.3.10.2. The Policies Page" 16.3.10.2.1. Sharing Printers 16.3.10.2.2. The Access Control Page 16.3.10.2.3. The Printer Options Page 16.3.10.2.4. Job Options Page 16.3.10.2.5. Ink/Toner Levels Page 16.3.10.3. Managing Print Jobs 16.3.11. Additional Resources 17. Database Servers Expand section "17. Database Servers" Collapse section "17. Database Servers" 17.1. MariaDB Expand section "17.1. MariaDB" Collapse section "17.1. MariaDB" 17.1.1. Installing the MariaDB server Expand section "17.1.1. Installing the MariaDB server" Collapse section "17.1.1. Installing the MariaDB server" 17.1.1.1. Improving MariaDB installation security 17.1.2. Configuring the MariaDB server for networking 17.1.3. Backing up MariaDB data Expand section "17.1.3. Backing up MariaDB data" Collapse section "17.1.3. Backing up MariaDB data" 17.1.3.1. Logical back up 17.1.3.2. Physical back up 18. Configuring NTP Using the chrony Suite Expand section "18. Configuring NTP Using the chrony Suite" Collapse section "18. Configuring NTP Using the chrony Suite" 18.1. Introduction to the chrony Suite Expand section "18.1. Introduction to the chrony Suite" Collapse section "18.1. Introduction to the chrony Suite" 18.1.1. Differences Between ntpd and chronyd 18.1.2. Choosing Between NTP Daemons 18.2. Understanding chrony and Its Configuration Expand section "18.2. Understanding chrony and Its Configuration" Collapse section "18.2. Understanding chrony and Its Configuration" 18.2.1. Understanding chronyd and chronyc 18.2.2. Understanding the chrony Configuration Commands 18.2.3. Security with chronyc 18.3. Using chrony Expand section "18.3. Using chrony" Collapse section "18.3. Using chrony" 18.3.1. Installing chrony 18.3.2. Checking the Status of chronyd 18.3.3. Starting chronyd 18.3.4. Stopping chronyd 18.3.5. Checking if chrony is Synchronized Expand section "18.3.5. Checking if chrony is Synchronized" Collapse section "18.3.5. Checking if chrony is Synchronized" 18.3.5.1. Checking chrony Tracking 18.3.5.2. Checking chrony Sources 18.3.5.3. Checking chrony Source Statistics 18.3.6. Manually Adjusting the System Clock 18.4. Setting Up chrony for Different Environments Expand section "18.4. Setting Up chrony for Different Environments" Collapse section "18.4. Setting Up chrony for Different Environments" 18.4.1. Setting Up chrony for a System in an Isolated Network 18.5. Using chronyc Expand section "18.5. Using chronyc" Collapse section "18.5. Using chronyc" 18.5.1. Using chronyc to Control chronyd 18.6. Chrony with HW timestamping Expand section "18.6. Chrony with HW timestamping" Collapse section "18.6. Chrony with HW timestamping" 18.6.1. Understanding Hardware Timestamping 18.6.2. Verifying Support for Hardware Timestamping 18.6.3. Enabling Hardware Timestamping 18.6.4. Configuring Client Polling Interval 18.6.5. Enabling Interleaved Mode 18.6.6. Configuring Server for Large Number of Clients 18.6.7. Verifying Hardware Timestamping 18.6.8. Configuring PTP-NTP bridge 18.7. Additional Resources Expand section "18.7. Additional Resources" Collapse section "18.7. Additional Resources" 18.7.1. Installed Documentation 18.7.2. Online Documentation 19. Configuring NTP Using ntpd Expand section "19. Configuring NTP Using ntpd" Collapse section "19. Configuring NTP Using ntpd" 19.1. Introduction to NTP 19.2. NTP Strata 19.3. Understanding NTP 19.4. Understanding the Drift File 19.5. UTC, Timezones, and DST 19.6. Authentication Options for NTP 19.7. Managing the Time on Virtual Machines 19.8. Understanding Leap Seconds 19.9. Understanding the ntpd Configuration File 19.10. Understanding the ntpd Sysconfig File 19.11. Disabling chrony 19.12. Checking if the NTP Daemon is Installed 19.13. Installing the NTP Daemon (ntpd) 19.14. Checking the Status of NTP 19.15. Configure the Firewall to Allow Incoming NTP Packets Expand section "19.15. Configure the Firewall to Allow Incoming NTP Packets" Collapse section "19.15. Configure the Firewall to Allow Incoming NTP Packets" 19.15.1. Change the Firewall Settings 19.15.2. Open Ports in the Firewall for NTP Packets 19.16. Configure ntpdate Servers 19.17. Configure NTP Expand section "19.17. Configure NTP" Collapse section "19.17. Configure NTP" 19.17.1. Configure Access Control to an NTP Service 19.17.2. Configure Rate Limiting Access to an NTP Service 19.17.3. Adding a Peer Address 19.17.4. Adding a Server Address 19.17.5. Adding a Broadcast or Multicast Server Address 19.17.6. Adding a Manycast Client Address 19.17.7. Adding a Broadcast Client Address 19.17.8. Adding a Manycast Server Address 19.17.9. Adding a Multicast Client Address 19.17.10. Configuring the Burst Option 19.17.11. Configuring the iburst Option 19.17.12. Configuring Symmetric Authentication Using a Key 19.17.13. Configuring the Poll Interval 19.17.14. Configuring Server Preference 19.17.15. Configuring the Time-to-Live for NTP Packets 19.17.16. Configuring the NTP Version to Use 19.18. Configuring the Hardware Clock Update 19.19. Configuring Clock Sources 19.20. Additional Resources Expand section "19.20. Additional Resources" Collapse section "19.20. Additional Resources" 19.20.1. Installed Documentation 19.20.2. Useful Websites 20. Configuring PTP Using ptp4l Expand section "20. Configuring PTP Using ptp4l" Collapse section "20. Configuring PTP Using ptp4l" 20.1. Introduction to PTP Expand section "20.1. Introduction to PTP" Collapse section "20.1. Introduction to PTP" 20.1.1. Understanding PTP 20.1.2. Advantages of PTP 20.2. Using PTP Expand section "20.2. Using PTP" Collapse section "20.2. Using PTP" 20.2.1. Checking for Driver and Hardware Support 20.2.2. Installing PTP 20.2.3. Starting ptp4l Expand section "20.2.3. Starting ptp4l" Collapse section "20.2.3. Starting ptp4l" 20.2.3.1. Selecting a Delay Measurement Mechanism 20.3. Using PTP with Multiple Interfaces 20.4. Specifying a Configuration File 20.5. Using the PTP Management Client 20.6. Synchronizing the Clocks 20.7. Verifying Time Synchronization 20.8. Serving PTP Time with NTP 20.9. Serving NTP Time with PTP 20.10. Synchronize to PTP or NTP Time Using timemaster Expand section "20.10. Synchronize to PTP or NTP Time Using timemaster" Collapse section "20.10. Synchronize to PTP or NTP Time Using timemaster" 20.10.1. Starting timemaster as a Service 20.10.2. Understanding the timemaster Configuration File 20.10.3. Configuring timemaster Options 20.11. Improving Accuracy 20.12. Additional Resources Expand section "20.12. Additional Resources" Collapse section "20.12. Additional Resources" 20.12.1. Installed Documentation 20.12.2. Useful Websites VI. Monitoring and Automation Expand section "VI. Monitoring and Automation" Collapse section "VI. Monitoring and Automation" 21. System Monitoring Tools Expand section "21. System Monitoring Tools" Collapse section "21. System Monitoring Tools" 21.1. Viewing System Processes Expand section "21.1. Viewing System Processes" Collapse section "21.1. Viewing System Processes" 21.1.1. Using the ps Command 21.1.2. Using the top Command 21.1.3. Using the System Monitor Tool 21.2. Viewing Memory Usage Expand section "21.2. Viewing Memory Usage" Collapse section "21.2. Viewing Memory Usage" 21.2.1. Using the free Command 21.2.2. Using the System Monitor Tool 21.3. Viewing CPU Usage Expand section "21.3. Viewing CPU Usage" Collapse section "21.3. Viewing CPU Usage" 21.3.1. Using the System Monitor Tool 21.4. Viewing Block Devices and File Systems Expand section "21.4. Viewing Block Devices and File Systems" Collapse section "21.4. Viewing Block Devices and File Systems" 21.4.1. Using the lsblk Command 21.4.2. Using the blkid Command 21.4.3. Using the findmnt Command 21.4.4. Using the df Command 21.4.5. Using the du Command 21.4.6. Using the System Monitor Tool 21.5. Viewing Hardware Information Expand section "21.5. Viewing Hardware Information" Collapse section "21.5. Viewing Hardware Information" 21.5.1. Using the lspci Command 21.5.2. Using the lsusb Command 21.5.3. Using the lscpu Command 21.6. Checking for Hardware Errors 21.7. Monitoring Performance with Net-SNMP Expand section "21.7. Monitoring Performance with Net-SNMP" Collapse section "21.7. Monitoring Performance with Net-SNMP" 21.7.1. Installing Net-SNMP 21.7.2. Running the Net-SNMP Daemon Expand section "21.7.2. Running the Net-SNMP Daemon" Collapse section "21.7.2. Running the Net-SNMP Daemon" 21.7.2.1. Starting the Service 21.7.2.2. Stopping the Service 21.7.2.3. Restarting the Service 21.7.3. Configuring Net-SNMP Expand section "21.7.3. Configuring Net-SNMP" Collapse section "21.7.3. Configuring Net-SNMP" 21.7.3.1. Setting System Information 21.7.3.2. Configuring Authentication 21.7.4. Retrieving Performance Data over SNMP Expand section "21.7.4. Retrieving Performance Data over SNMP" Collapse section "21.7.4. Retrieving Performance Data over SNMP" 21.7.4.1. Hardware Configuration 21.7.4.2. CPU and Memory Information 21.7.4.3. File System and Disk Information 21.7.4.4. Network Information 21.7.5. Extending Net-SNMP Expand section "21.7.5. Extending Net-SNMP" Collapse section "21.7.5. Extending Net-SNMP" 21.7.5.1. Extending Net-SNMP with Shell Scripts 21.7.5.2. Extending Net-SNMP with Perl 21.8. Additional Resources Expand section "21.8. Additional Resources" Collapse section "21.8. Additional Resources" 21.8.1. Installed Documentation 22. OpenLMI Expand section "22. OpenLMI" Collapse section "22. OpenLMI" 22.1. About OpenLMI Expand section "22.1. About OpenLMI" Collapse section "22.1. About OpenLMI" 22.1.1. Main Features 22.1.2. Management Capabilities 22.2. Installing OpenLMI Expand section "22.2. Installing OpenLMI" Collapse section "22.2. Installing OpenLMI" 22.2.1. Installing OpenLMI on a Managed System 22.2.2. Installing OpenLMI on a Client System 22.3. Configuring SSL Certificates for OpenPegasus Expand section "22.3. Configuring SSL Certificates for OpenPegasus" Collapse section "22.3. Configuring SSL Certificates for OpenPegasus" 22.3.1. Managing Self-signed Certificates 22.3.2. Managing Authority-signed Certificates with Identity Management (Recommended) 22.3.3. Managing Authority-signed Certificates Manually 22.4. Using LMIShell Expand section "22.4. Using LMIShell" Collapse section "22.4. Using LMIShell" 22.4.1. Starting, Using, and Exiting LMIShell 22.4.2. Connecting to a CIMOM 22.4.3. Working with Namespaces 22.4.4. Working with Classes 22.4.5. Working with Instances 22.4.6. Working with Instance Names 22.4.7. Working with Associated Objects 22.4.8. Working with Association Objects 22.4.9. Working with Indications 22.4.10. Example Usage 22.5. Using OpenLMI Scripts 22.6. Additional Resources 23. Viewing and Managing Log Files Expand section "23. Viewing and Managing Log Files" Collapse section "23. Viewing and Managing Log Files" 23.1. Locating Log Files 23.2. Basic Configuration of Rsyslog Expand section "23.2. Basic Configuration of Rsyslog" Collapse section "23.2. Basic Configuration of Rsyslog" 23.2.1. Filters 23.2.2. Actions 23.2.3. Templates 23.2.4. Global Directives 23.2.5. Log Rotation 23.2.6. Increasing the Limit of Open Files 23.3. Using the New Configuration Format Expand section "23.3. Using the New Configuration Format" Collapse section "23.3. Using the New Configuration Format" 23.3.1. Rulesets 23.3.2. Compatibility with sysklogd 23.4. Working with Queues in Rsyslog Expand section "23.4. Working with Queues in Rsyslog" Collapse section "23.4. Working with Queues in Rsyslog" 23.4.1. Defining Queues 23.4.2. Creating a New Directory for rsyslog Log Files 23.4.3. Managing Queues 23.4.4. Using the New Syntax for rsyslog queues 23.5. Configuring rsyslog on a Logging Server Expand section "23.5. Configuring rsyslog on a Logging Server" Collapse section "23.5. Configuring rsyslog on a Logging Server" 23.5.1. Using The New Template Syntax on a Logging Server 23.6. Using Rsyslog Modules Expand section "23.6. Using Rsyslog Modules" Collapse section "23.6. Using Rsyslog Modules" 23.6.1. Importing Text Files 23.6.2. Exporting Messages to a Database 23.6.3. Enabling Encrypted Transport 23.6.4. Using RELP 23.7. Interaction of Rsyslog and Journal 23.8. Structured Logging with Rsyslog Expand section "23.8. Structured Logging with Rsyslog" Collapse section "23.8. Structured Logging with Rsyslog" 23.8.1. Importing Data from Journal 23.8.2. Filtering Structured Messages 23.8.3. Parsing JSON 23.8.4. Storing Messages in the MongoDB 23.9. Debugging Rsyslog 23.10. Using the Journal Expand section "23.10. Using the Journal" Collapse section "23.10. Using the Journal" 23.10.1. Viewing Log Files 23.10.2. Access Control 23.10.3. Using The Live View 23.10.4. Filtering Messages 23.10.5. Enabling Persistent Storage 23.11. Managing Log Files in a Graphical Environment Expand section "23.11. Managing Log Files in a Graphical Environment" Collapse section "23.11. Managing Log Files in a Graphical Environment" 23.11.1. Viewing Log Files 23.11.2. Adding a Log File 23.11.3. Monitoring Log Files 23.12. Additional Resources 24. Automating System Tasks Expand section "24. Automating System Tasks" Collapse section "24. Automating System Tasks" 24.1. Scheduling a Recurring Job Using Cron Expand section "24.1. Scheduling a Recurring Job Using Cron" Collapse section "24.1. Scheduling a Recurring Job Using Cron" 24.1.1. Prerequisites for Cron Jobs 24.1.2. Scheduling a Cron Job 24.2. Scheduling a Recurring Asynchronous Job Using Anacron Expand section "24.2. Scheduling a Recurring Asynchronous Job Using Anacron" Collapse section "24.2. Scheduling a Recurring Asynchronous Job Using Anacron" 24.2.1. Prerequisites for Anacrob Jobs 24.2.2. Scheduling an Anacron Job 24.3. Scheduling a Job to Run at a Specific Time Using at Expand section "24.3. Scheduling a Job to Run at a Specific Time Using at" Collapse section "24.3. Scheduling a Job to Run at a Specific Time Using at" 24.3.1. Prerequisites for At Jobs 24.3.2. Scheduling an At Job Expand section "24.3.2. Scheduling an At Job" Collapse section "24.3.2. Scheduling an At Job" 24.3.2.1. Controlling Access to At and Batch 24.4. Scheduling a Job to Run on System Load Drop Using batch Expand section "24.4. Scheduling a Job to Run on System Load Drop Using batch" Collapse section "24.4. Scheduling a Job to Run on System Load Drop Using batch" 24.4.1. Prerequisites for Batch Jobs 24.4.2. Scheduling a Batch Job 24.5. Scheduling a Job to Run on Next Boot Using a systemd Unit File 24.6. Additional Resources 25. Automatic Bug Reporting Tool (ABRT) Expand section "25. Automatic Bug Reporting Tool (ABRT)" Collapse section "25. Automatic Bug Reporting Tool (ABRT)" 25.1. Introduction to ABRT 25.2. Installing ABRT and Starting its Services Expand section "25.2. Installing ABRT and Starting its Services" Collapse section "25.2. Installing ABRT and Starting its Services" 25.2.1. Installing the ABRT GUI 25.2.2. Installing ABRT for the Command Line 25.2.3. Installing Supplementary ABRT Tools 25.2.4. Starting the ABRT Services 25.2.5. Testing ABRT Crash Detection 25.3. Configuring ABRT Expand section "25.3. Configuring ABRT" Collapse section "25.3. Configuring ABRT" 25.3.1. Configuring Events 25.3.2. Creating Custom Events 25.3.3. Setting Up Automatic Reporting 25.4. Detecting Software Problems Expand section "25.4. Detecting Software Problems" Collapse section "25.4. Detecting Software Problems" 25.4.1. Detecting C and C++ Crashes 25.4.2. Detecting Python Exceptions 25.4.3. Detecting Ruby Exceptions 25.4.4. Detecting Java Exceptions 25.4.5. Detecting X.Org Crashes 25.4.6. Detecting Kernel Oopses and Panics 25.5. Handling Detected Problems Expand section "25.5. Handling Detected Problems" Collapse section "25.5. Handling Detected Problems" 25.5.1. Using the Command Line Tool 25.5.2. Using the GUI 25.6. Additional Resources VII. Kernel Customization with Bootloader Expand section "VII. Kernel Customization with Bootloader" Collapse section "VII. Kernel Customization with Bootloader" 26. Working with GRUB 2 Expand section "26. Working with GRUB 2" Collapse section "26. Working with GRUB 2" 26.1. Introduction to GRUB 2 26.2. Configuring GRUB 2 26.3. Making Temporary Changes to a GRUB 2 Menu 26.4. Making Persistent Changes to a GRUB 2 Menu Using the grubby Tool 26.5. Customizing the GRUB 2 Configuration File Expand section "26.5. Customizing the GRUB 2 Configuration File" Collapse section "26.5. Customizing the GRUB 2 Configuration File" 26.5.1. Changing the Default Boot Entry 26.5.2. Editing a Menu Entry 26.5.3. Adding a new Entry 26.5.4. Creating a Custom Menu 26.6. Protecting GRUB 2 with a Password 26.7. Reinstalling GRUB 2 Expand section "26.7. Reinstalling GRUB 2" Collapse section "26.7. Reinstalling GRUB 2" 26.7.1. Reinstalling GRUB 2 on BIOS-Based Machines 26.7.2. Reinstalling GRUB 2 on UEFI-Based Machines 26.7.3. Resetting and Reinstalling GRUB 2 26.8. Upgrading from GRUB Legacy to GRUB 2 26.9. GRUB 2 over a Serial Console Expand section "26.9. GRUB 2 over a Serial Console" Collapse section "26.9. GRUB 2 over a Serial Console" 26.9.1. Configuring GRUB 2 for a single boot 26.9.2. Configuring GRUB 2 for a persistent change 26.9.3. Configuring a new GRUB 2 file 26.9.4. Using screen to Connect to the Serial Console 26.10. Terminal Menu Editing During Boot Expand section "26.10. Terminal Menu Editing During Boot" Collapse section "26.10. Terminal Menu Editing During Boot" 26.10.1. Booting to Rescue Mode 26.10.2. Booting to Emergency Mode 26.10.3. Booting to the Debug Shell 26.10.4. Changing and Resetting the Root Password 26.11. Unified Extensible Firmware Interface (UEFI) Secure Boot Expand section "26.11. Unified Extensible Firmware Interface (UEFI) Secure Boot" Collapse section "26.11. Unified Extensible Firmware Interface (UEFI) Secure Boot" 26.11.1. UEFI Secure Boot Support in Red Hat Enterprise Linux 7 26.12. Additional Resources VIII. System Backup and Recovery Expand section "VIII. System Backup and Recovery" Collapse section "VIII. System Backup and Recovery" 27. Relax-and-Recover (ReaR) Expand section "27. Relax-and-Recover (ReaR)" Collapse section "27. Relax-and-Recover (ReaR)" 27.1. Basic ReaR Usage Expand section "27.1. Basic ReaR Usage" Collapse section "27.1. Basic ReaR Usage" 27.1.1. Installing ReaR 27.1.2. Configuring ReaR 27.1.3. Creating a Rescue System 27.1.4. Scheduling ReaR 27.1.5. Performing a System Rescue 27.2. Integrating ReaR with Backup Software Expand section "27.2. Integrating ReaR with Backup Software" Collapse section "27.2. Integrating ReaR with Backup Software" 27.2.1. The Built-in Backup Method Expand section "27.2.1. The Built-in Backup Method" Collapse section "27.2.1. The Built-in Backup Method" 27.2.1.1. Configuring the Internal Backup Method 27.2.1.2. Creating a Backup Using the Internal Backup Method 27.2.2. Supported Backup Methods 27.2.3. Unsupported Backup Methods 27.2.4. Creating Multiple Backups 28. Choosing Suitable Red Hat Product 29. Red Hat Customer Portal Labs Relevant to System Administration 30. Revision History Expand section "30. Revision History" Collapse section "30. Revision History" 30.1. Acknowledgments Settings Close Language: 日本語 简体中文 한국어 English Français Language: 日本語 简体中文 한국어 English Français Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 简体中文 한국어 English Français Language: 日本語 简体中文 한국어 English Français Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Red Hat Training A Red Hat training course is available for Red Hat Enterprise Linux Part VII. Kernel Customization with Bootloader This part describes how to use the GRUB 2 bootloader to assist administrators with kernel customization. Previous Next