Cari di RHE Linux 
    Red Hat Linux Manual & Tutorial
Daftar Isi
 1 : Installation Guide (Berikutnya)

Red Hat Enterprise Linux Manual

Daftar Isi

  1. Installation Guide
  2. Fence Configuration Guide
  3. Identity Management Guide
  4. Resource Management Guide
  5. Global File System 2
  6. Security Guide
  7. Power Management Guide
  8. Security-Enhanced Linux
  9. Load Balancer Administration
10. Logical Volume Manager Administration
11. Performance Tuning Guide
12. Cluster Administration
13. Deployment Guide
14. Hypervisor Deployment Guide
15. DM Multipath
16. Managing Confined Services
17. Managing Single Sign-On and Smart Cards
18. Migration Planning Guide
19. Package Manifest
20. Storage Administration Guide
21. SystemTap Beginners Guide
22. SystemTap Tapset Reference
23. V2V Guide
24. Virtualization Administration Guide
25. Virtualization Getting Started Guide
26. Virtualization Host Configuration and Guest Installation Guid
27. Virtualization Security Guide
28. Virtualization Tuning and Optimization Guide
29. High Availability Add-On Overview
30. Developer Guide
31. Technical Notes
32. Red Hat Enterprise Linux 6.4 Release Notes
33. Red Hat Enterprise Linux 6.4 Technical Notes
34. Red Hat Enterprise Linux 6.3 Release Notes
35. Red Hat Enterprise Linux 6.3 Technical Notes
36. Red Hat Enterprise Linux 6.2 Release Notes
37. Red Hat Enterprise Linux 6.2 Technical Notes
38. Red Hat Enterprise Linux 6.1 Release Notes
39. Red Hat Enterprise Linux 6.1 Technical Notes
40. Red Hat Enterprise Linux 6.0 Release Notes

    Preface
    Introduction
    1. Obtaining Red Hat Enterprise Linux
    2. Making Media
        2.1. Making an installation DVD
        2.2. Making Minimal Boot Media
    Part I. x86, AMD64, and Intel 64 - Installation and Booting
    3. Planning for Installation on the x86 Architecture
        3.1. Upgrade or Install?
        3.2. Is Your Hardware Compatible?
        3.3. Supported Installation Hardware
        3.4. RAID and Other Disk Devices
        3.5. Do You Have Enough Disk Space?
        3.6. Selecting an Installation Method
        3.7. Choose a boot method
    4. Preparing for Installation
        4.1. Preparing for a Network Installation
        4.2. Preparing for a Hard Drive Installation
    5. System Specifications List
    6. Updating drivers during installation on Intel and AMD systems
        6.1. Limitations of driver updates during installation
        6.2. Preparing for a driver update during installation
        6.3. Performing a driver update during installation
        6.4. Specifying the location of a driver update image file or driver update disk
    7. Booting the Installer
        7.1. Starting the Installation Program
        7.2. Installing from a Different Source
        7.3. Booting from the Network using PXE
    8. Configuring Language and Installation Source
        8.1. The Text Mode Installation Program User Interface
        8.2. Language Selection
        8.3. Installation Method
        8.4. Verifying Media
    9. Installing using anaconda
        9.1. The Text Mode Installation Program User Interface
        9.2. The Graphical Installation Program User Interface
        9.3. Welcome to Red Hat Enterprise Linux
        9.4. Language Selection
        9.5. Keyboard Configuration
        9.6. Storage Devices
        9.7. Setting the Hostname
        9.8. Time Zone Configuration
        9.9. Set the Root Password
        9.10. Assign Storage Devices
        9.11. Initializing the Hard Disk
        9.12. Upgrading an Existing System
        9.13. Disk Partitioning Setup
        9.14. Encrypt Partitions
        9.15. Creating a Custom Layout or Modifying the Default Layout
        9.16. Write changes to disk
        9.17. x86, AMD64, and Intel 64 Boot Loader Configuration
        9.18. Package Group Selection
        9.19. Installing Packages
        9.20. Installation Complete
    10. Troubleshooting Installation on an Intel or AMD System
        10.1. You are unable to boot Red Hat Enterprise Linux
        10.2. Trouble Beginning the Installation
        10.3. Trouble During the Installation
        10.4. Problems After Installation
    Part II. IBM Power Systems - Installation and Booting
    11. Planning for installation on Power Systems servers
        11.1. Upgrade or Install?
        11.2. Supported Installation Hardware
        11.3. Installation Tools
        11.4. Preparation for IBM Power Systems servers
        11.5. RAID and Other Disk Devices
        11.6. Do You Have Enough Disk Space?
        11.7. Choose a boot method
    12. Preparing for Installation
        12.1. Preparing for a Network Installation
        12.2. Preparing for a Hard Drive Installation
    13. Updating drivers during installation on IBM Power Systems servers
        13.1. Limitations of driver updates during installation
        13.2. Preparing for a driver update during installation
        13.3. Performing a driver update during installation
        13.4. Specifying the location of a driver update image file or driver update disk
    14. Booting the Installer
        14.1. The Boot Menu
        14.2. Installing from a Different Source
        14.3. Booting from the network using a yaboot installation server
    15. Configuring Language and Installation Source
        15.1. The Text Mode Installation Program User Interface
        15.2. Language Selection
        15.3. Installation Method
        15.4. Verifying Media
    16. Installing using anaconda
        16.1. The Text Mode Installation Program User Interface
        16.2. The Graphical Installation Program User Interface
        16.3. A Note about Linux Virtual Consoles
        16.4. Using the HMC vterm
        16.5. Welcome to Red Hat Enterprise Linux
        16.6. Language Selection
        16.7. Keyboard Configuration
        16.8. Storage Devices
        16.9. Setting the Hostname
        16.10. Time Zone Configuration
        16.11. Set the Root Password
        16.12. Assign Storage Devices
        16.13. Initializing the Hard Disk
        16.14. Upgrading an Existing System
        16.15. Disk Partitioning Setup
        16.16. Encrypt Partitions
        16.17. Creating a Custom Layout or Modifying the Default Layout
        16.18. Write changes to disk
        16.19. Package Group Selection
        16.20. Installing Packages
        16.21. Installation Complete
    17. Troubleshooting Installation on an IBM Power Systems server
        17.1. You are unable to boot Red Hat Enterprise Linux
        17.2. Trouble Beginning the Installation
        17.3. Trouble During the Installation
        17.4. Problems After Installation
        III. IBM System z Architecture - Installation and Booting
    18. Planning for Installation on System z
        18.1. Pre-Installation
        18.2. Overview of the System z Installation Procedure
        18.3. Graphical User Interface with X11 or VNC
    19. Preparing for Installation
        19.1. Preparing for a Network Installation
        19.2. Preparing for a Hard Drive Installation
    20. Booting (IPL) the Installer
        20.1. Installing under z/VM
        20.2. Installing in an LPAR
    21. Installation Phase 1: Configuring a Network Device
        21.1. A Note on Terminals
    22. Installation Phase 2: Configuring Language and Installation Source
        22.1. Non-interactive Line-Mode Installation
        22.2. The Text Mode Installation Program User Interface
        22.3. Language Selection
        22.4. Installation Method
        22.5. Verifying Media
        22.6. Retrieving Phase 3 of the Installation Program
    23. Installation Phase 3: Installing using anaconda
        23.1. The Non-interactive Line-Mode Text Installation Program Output
        23.2. The Text Mode Installation Program User Interface
        23.3. The Graphical Installation Program User Interface
        23.4. Configure the Install Terminal
        23.5. Welcome to Red Hat Enterprise Linux
        23.6. Storage Devices
        23.7. Setting the Hostname
        23.8. Time Zone Configuration
        23.9. Set the Root Password
        23.10. Assign Storage Devices
        23.11. Initializing the Hard Disk
        23.12. Upgrading an Existing System
        23.13. Disk Partitioning Setup
        23.14. Encrypt Partitions
        23.15. Creating a Custom Layout or Modifying the Default Layout
        23.16. Write changes to disk
        23.17. Package Group Selection
        23.18. Installing Packages
        23.19. Installation Complete
    24. Troubleshooting Installation on IBM System z
        24.1. You are unable to boot Red Hat Enterprise Linux
        24.2. Trouble During the Installation
        24.3. Problems After Installation
    25. Configuring an Installed Linux on System z Instance
        25.1. Adding DASDs
        25.2. Adding FCP-Attached Logical Units (LUNs)
        25.3. Adding a Network Device
    26. Parameter and Configuration Files
        26.1. Required parameters
        26.2. The z/VM configuration file
        26.3. Installation network parameters
        26.4. VNC and X11 parameters
        26.5. Loader parameters
        26.6. Parameters for kickstart installations
        26.7. Miscellaneous parameters
        26.8. Sample parameter file and CMS configuration file
    27. IBM System z References
        27.1. IBM System z Publications
        27.2. IBM Redbooks publications for System z
        27.3. Online resources
    Part IV. Advanced installation options
    28. Boot Options
        28.1. Configuring the Installation System at the Boot Menu
        28.2. Enabling Remote Access to the Installation System
        28.3. Logging to a Remote System During the Installation
        28.4. Automating the Installation with Kickstart
        28.5. Enhancing Hardware Support
        28.6. Using the Maintenance Boot Modes
    29. Installing Without Media
        29.1. Retrieving Boot Files
        29.2. Editing the GRUB Configuration
        29.3. Booting to Installation
    30. Setting Up an Installation Server
        30.1. Setting up the Network Server
        30.2. Network Boot Configuration
        30.3. Starting the tftp Server
        30.4. Adding a Custom Boot Message
        30.5. Performing the Installation
    31. Installing Through VNC
        31.1. VNC Viewer
        31.2. VNC Modes in Anaconda
        31.3. Installation Using VNC
        31.4. References
    32. Kickstart Installations
        32.1. What are Kickstart Installations?
        32.2. How Do You Perform a Kickstart Installation?
        32.3. Creating the Kickstart File
        32.4. Kickstart Options
        32.5. Package Selection
        32.6. Pre-installation Script
        32.7. Post-installation Script
        32.8. Making the Kickstart File Available
        32.9. Making the Installation Tree Available
        32.10. Starting a Kickstart Installation
    33. Kickstart Configurator
        33.1. Basic Configuration
        33.2. Installation Method
        33.3. Boot Loader Options
        33.4. Partition Information
        33.5. Network Configuration
        33.6. Authentication
        33.7. Firewall Configuration
        33.8. Display Configuration
        33.9. Package Selection
        33.10. Pre-Installation Script
        33.11. Post-Installation Script
        33.12. Saving the File
    Part V. After installation
    34. Firstboot
        34.1. License Information
        34.2. Configuring the Subscription Service
        34.3. Create User
        34.4. Date and Time
        34.5. Kdump
    35. Your Next Steps
        35.1. Updating Your System
        35.2. Finishing an Upgrade
        35.3. Switching to a Graphical Login
    36. Basic System Recovery
        36.1. Rescue Mode
        36.2. Rescue Mode on Power Systems servers
        36.3. Using rescue mode to fix or work around driver problems
    37. Upgrading Your Current System
    38. Unregistering from Red Hat Subscription Management Services
        38.1. Systems Registered with Red Hat Subscription Management
        38.2. Systems Registered with RHN Classic
        38.3. Systems Registered with Satellite
    39. Removing Red Hat Enterprise Linux from x86-based systems
        39.1. Red Hat Enterprise Linux is the only operating system on the computer
        39.2. Your computer dual-boots Red Hat Enterprise Linux and another operating system
        39.3. Replacing Red Hat Enterprise Linux with MS-DOS or legacy versions of Microsoft Windows
    40. Removing Red Hat Enterprise Linux from IBM System z
        40.1. Running a Different Operating System on your z/VM Guest or LPAR
    Part VI. Technical appendixes
    A. An Introduction to Disk Partitions
    B. ISCSI disks
    C. Disk Encryption
    D. Understanding LVM
    E. The GRUB Boot Loader
    F. Boot Process, Init, and Shutdown
    G. Alternatives to busybox commands
    H. Other Technical Documentation
    Part I. Revision History
    Index

    Preface
    1. Fencing
    2. Fencing Pre-Configuration
        2.1. Configuring ACPI For Use with Integrated Fence Devices
    3. Configuring Fencing with the ccs Command
        3.1. Configuring Fence Devices
        3.2. Listing Fence Devices and Fence Device Options
        3.3. Configuring Fencing for Cluster Members
    4. Configuring Fencing with Conga
        4.1. Configuring Fence Daemon Properties
        4.2. Configuring Fence Devices
        4.3. Configuring Fencing for Cluster Members
    5. Fence Devices
        5.1. APC Power Switch over SNMP
        5.2. APC Power Switch over Telnet and SSH
        5.3. Brocade Fabric Switch
        5.4. Cisco MDS
        5.5. Cisco UCS
        5.6. Dell Drac 5
        5.7. Eaton Network Power Switch
        5.8. Egenera BladeFrame
        5.9. ePowerSwitch
        5.10. Fence Virt
        5.11. Fujitsu-Siemens RemoteView Service Board (RSB)
        5.12. Hewlett-Packard BladeSystem
        5.13. Hewlett-Packard iLO
        5.14. Hewlett-Packard iLO MP
        5.15. IBM BladeCenter
        5.16. IBM BladeCenter over SNMP
        5.17. IBM iPDU
        5.18. IF-MIB
        5.19. Intel Modular
        5.20. IPMI over LAN
        5.21. RHEV-M REST API
        5.22. SCSI Persistent Reservations
        5.23. VMWare over SOAP API
        5.24. WTI Power Switch
    A. Revision History
    Index

    Preface
    1. Introduction to Identity Management
        1.1. IdM V. LDAP: A More Focused Type of Service
        1.2. Bringing Linux Services Together
        1.3. Relationships Between Servers and Clients
    2. Installing an IdM Server
        2.1. Supported Server Platforms
        2.2. Preparing to Install the IdM Server
        2.3. Installing the IdM Server Packages
        2.4. Creating an IdM Server Instance
        2.5. Setting up IdM Replicas
        2.6. Uninstalling IdM Servers and Replicas
        2.7. Upgrading Identity Management to Red Hat Enterprise Linux 6.4
    3. Setting up Systems as IdM Clients
        3.1. What Happens in Client Setup
        3.2. System Ports
        3.3. Configuring a Red Hat Enterprise Linux System as an IdM Client
        3.4. Manually Configuring a Linux Client
        3.5. Setting up a Linux Client Through Kickstart
        3.6. Configuring a Microsoft Windows System to Join the IdM Realm
        3.7. Troubleshooting Client Installations
        3.8. Uninstalling an IdM Client
    4. Basic Usage
        4.1. About the IdM Client Tools
        4.2. Logging into IdM
        4.3. Using the IdM Web UI
        4.4. Understanding Search Limits and Settings
    5. Identity: Managing Users and User Groups
        5.1. Setting up User Home Directories
        5.2. Managing User Entries
        5.3. Managing Public SSH Keys for Users
        5.4. Changing Passwords
        5.5. Unlocking User Accounts After Password Failures
        5.6. Managing User Private Groups
        5.7. Managing Unique UID and GID Number Assignments
        5.8. Managing User and Group Schema
        5.9. Managing User Groups
        5.10. Searching for Users and Groups
        5.11. Specifying Default User and Group Settings
    6. Identity: Managing Hosts and Services
        6.1. About Hosts, Services, and Machine Identity and Authentication
        6.2. Adding Host Entries
        6.3. Enrolling Clients Manually
        6.4. Manually Unconfiguring Client Machines
        6.5. Managing Services
        6.6. Disabling and Re-enabling Host and Service Entries
        6.7. Extending Access Permissions over Other Hosts and Services
        6.8. Managing Public SSH Keys for Hosts
        6.9. Renaming Machines and Reconfiguring IdM Client Configuration
        6.10. Managing Host Groups
        6.11. Troubleshooting Host Problems
    7. Identity: Integrating with NIS Domains and Netgroups
        7.1. About NIS and Identity Management
        7.2. Setting the NIS Port for Identity Management
        7.3. Creating Netgroups
        7.4. Exposing Automount Maps to NIS Clients
        7.5. Migrating from NIS to IdM
    8. Identity: Integrating with Active Directory Through Cross-Realm Kerberos Trusts
        8.1. The Meaning of "Trust"
        8.2. Environment and Machine Requirements to Set Up Trusts
        8.3. Setting up Trust with IdM as a DNS Subdomain of Active Directory
        8.4. Setting up Trust with IdM and Active Directory in Different DNS Domains
        8.5. Creating IdM Groups for Active Directory Users
        8.6. Using SSH from Active Directory Machines for IdM Resources
        8.7. Using Trust with Kerberized Web Applications
    9. Identity: Integrating with Microsoft Active Directory Through Synchronization
        9.1. About Active Directory and Identity Management
        9.2. About Synchronized Attributes
        9.3. Setting up Active Directory for Synchronization
        9.4. Managing Synchronization Agreements
        9.5. Managing Password Synchronization
    10. Identity: Managing DNS
        10.1. About DNS in IdM
        10.2. The IdM-Generated DNS File
        10.3. Setting up DNS After IdM Server Installation
        10.4. Managing DNS Zone Entries
        10.5. Managing DNS Record Entries
        10.6. Configuring the bind-dyndb-ldap Plug-in
        10.7. Changing Recursive Queries Against Forwarders
        10.8. Enabling Dynamic DNS Updates
        10.9. Configuring Forwarders and Forward Policy
        10.10. Enabling Zone Transfers
        10.11. Defining DNS Queries
        10.12. Synchronizing Forward and Reverse Zone Entries
        10.13. Setting DNS Access Policies
        10.14. Resolving Hostnames in the IdM Domain
        10.15. Changing Load Balancing for IdM Servers and Replicas
    11. Policy: Using Automount
        11.1. About Automount and IdM
        11.2. Configuring Automount
        11.3. Setting up a Kerberized NFS Server
        11.4. Configuring Kerberized CIFS
        11.5. Configuring Locations
        11.6. Configuring Maps
    12. Policy: Defining Password Policies
        12.1. About Password Policies and Policy Attributes
        12.2. Viewing Password Policies
        12.3. Creating and Editing Password Policies
        12.4. Managing Password Expiration Limits
        12.5. Changing the Priority of Group Password Policies
        12.6. Setting Account Lockout Policies
        12.7. Enabling a Password Change Dialog
    13. Policy: Managing the Kerberos Domain
        13.1. About Kerberos
        13.2. Setting Kerberos Ticket Policies
        13.3. Refreshing Kerberos Tickets
        13.4. Caching Kerberos Passwords
        13.5. Removing Keytabs
        13.6. Troubleshooting Kerberos Errors
    14. Policy: Using sudo
        14.1. About sudo and IPA
        14.2. Setting up sudo Commands and Command Groups
        14.3. Defining sudo Rules
        14.4. Applying the Configured sudo Policies to Hosts
    15. Policy: Configuring Host-Based Access Control
        15.1. About Host-Based Access Control
        15.2. Creating Host-Based Access Control Entries for Services and Service Groups
        15.3. Defining Host-Based Access Control Rules
        15.4. Testing Host-Based Access Control Rules
    16. Policy: Defining SELinux User Maps
        16.1. About Identity Management, SELinux, and Mapping Users
        16.2. Configuring SELinux Users in IdM
        16.3. Mapping SELinux Users and IdM Users
        16.4. Troubleshooting SELinux Login Problems
    17. Policy: Defining Automatic Group Membership for Users and Hosts
        17.1. About Automembership
        17.2. Defining Automembership Rules (Basic Procedure)
        17.3. Examples of Using Automember Groups
    18. Configuration: Defining Access Control within IdM
        18.1. About Access Controls for IdM Entries
        18.2. Defining Self-Service Settings
        18.3. Delegating Permissions over Users
        18.4. Defining Role-Based Access Controls
    19. Configuration: Configuring the IdM Server
        19.1. Identity Management Files and Logs
        19.2. Disabling Anonymous Binds
        19.3. Configuring Alternate Certificate Authorities
        19.4. Configuring CRLs and OCSP Responders
        19.5. Setting DNS Entries for Multi-Homed Servers
        19.6. Managing Replication Agreements Between IdM Servers
        19.7. Removing a Replica
        19.8. Troubleshooting
    20. Migrating from an LDAP Directory to IdM
        20.1. An Overview of LDAP to IdM Migration
        20.2. Examples for Using migrate-ds
        20.3. Scenario 1: Using SSSD as Part of Migration
        20.4. Scenario 2: Migrating an LDAP Server Directly to Identity Management
    A. Frequently Asked Questions
    B. Working with certmonger
        B.1. Requesting a Certificate with certmonger
        B.2. Storing Certificates in NSS Databases
        B.3. Tracking Certificates with certmonger
    Glossary
    Index

    Preface
    1. Introduction to Control Groups (Cgroups)
        1.1. How Control Groups Are Organized
        1.2. Relationships Between Subsystems, Hierarchies, Control Groups and Tasks
        1.3. Implications for Resource Management
    2. Using Control Groups
        2.1. The cgconfig Service
        2.2. Creating a Hierarchy and Attaching Subsystems
        2.3. Attaching Subsystems to, and Detaching Them From, an Existing Hierarchy
        2.4. Unmounting a Hierarchy
        2.5. Creating Control Groups
        2.6. Removing Control Groups
        2.7. Setting Parameters
        2.8. Moving a Process to a Control Group
        2.9. Starting a Process in a Control Group
        2.10. Generating the /etc/cgconfig.conf File
        2.11. Obtaining Information About Control Groups
        2.12. Unloading Control Groups
        2.13. Using the Notification API
        2.14. Additional Resources
    3. Subsystems and Tunable Parameters
        3.1. blkio
        3.2. cpu
        3.3. cpuacct
        3.4. cpuset
        3.5. devices
        3.6. freezer
        3.7. memory
        3.8. net_cls
        3.9. net_prio
        3.10. ns
        3.11. perf_event
        3.12. Common Tunable Parameters
        3.13. Additional Resources
    4. Use Case Scenarios
        4.1. Prioritizing Database I/O
        4.2. Prioritizing Network Traffic
        4.3. Per-group Division of CPU and Memory Resources
    A. Revision History

    Introduction
    1. GFS2 Overview
        1.1. New and Changed Features
        1.2. Before Setting Up GFS2
        1.3. Differences between GFS and GFS2
    2. GFS2 Configuration and Operational Considerations
        2.1. Formatting Considerations
        2.2. File System Fragmentation
        2.3. Block Allocation Issues
        2.4. Cluster Considerations
        2.5. Usage Considerations
        2.6. File System Backups
        2.7. Hardware Considerations
        2.8. Performance Issues: Check the Red Hat Customer Portal
        2.9. GFS2 Node Locking
    3. Getting Started
        3.1. Prerequisite Tasks
        3.2. Initial Setup Tasks
    4. Managing GFS2
        4.1. Making a File System
        4.2. Mounting a File System
        4.3. Unmounting a File System
        4.4. Special Considerations when Mounting GFS2 File Systems
        4.5. GFS2 Quota Management
        4.6. Growing a File System
        4.7. Adding Journals to a File System
        4.8. Data Journaling
        4.9. Configuring atime Updates
        4.10. Suspending Activity on a File System
        4.11. Repairing a File System
        4.12. Bind Mounts and Context-Dependent Path Names
        4.13. Bind Mounts and File System Mount Order
        4.14. The GFS2 Withdraw Function
    5. Diagnosing and Correcting Problems with GFS2 File Systems
        5.1. GFS2 File System Shows Slow Performance
        5.2. GFS2 File System Hangs and Requires Reboot of One Node
        5.3. GFS2 File System Hangs and Requires Reboot of All Nodes
        5.4. GFS2 File System Does Not Mount on Newly-Added Cluster Node
        5.5. Space Indicated as Used in Empty File System
    A. GFS2 Quota Management with the gfs2_quota Command
    B. Converting a File System from GFS to GFS2
    C. GFS2 tracepoints and the debugfs glocks File
    D. Revision History
    Index

    Preface
    1. Security Overview
        1.1. Introduction to Security
        1.2. Vulnerability Assessment
        1.3. Attackers and Vulnerabilities
        1.4. Common Exploits and Attacks
        1.5. Security Updates
    2. Securing Your Network
        2.1. Workstation Security
        2.2. Server Security
        2.3. Single Sign-on (SSO)
        2.4. Pluggable Authentication Modules (PAM)
        2.5. Kerberos
        2.6. TCP Wrappers and xinetd
        2.7. Virtual Private Networks (VPNs)
        2.8. Firewalls
    3. Encryption
        3.1. Data at Rest
        3.2. Data in Motion
    4. General Principles of Information Security
        4.1. Tips, Guides, and Tools
    5. Secure Installation
        5.1. Disk Partitions
        5.2. Utilize LUKS Partition Encryption
    6. Software Maintenance
        6.1. Install Minimal Software
        6.2. Plan and Configure Security Updates
        6.3. Adjusting Automatic Updates
        6.4. Install Signed Packages from Well Known Repositories
    7. Federal Standards and Regulations
        7.1. Introduction
        7.2. Federal Information Processing Standard (FIPS)
        7.3. National Industrial Security Program Operating Manual (NISPOM)
        7.4. Payment Card Industry Data Security Standard (PCI DSS)
        7.5. Security Technical Implementation Guide
    8. References
    A. Encryption Standards
    B. Revision History

    Preface
    1. Overview
        1.1. Importance of Power Management
        1.2. Power Management Basics
    2. Power management auditing and analysis
        2.1. Audit and analysis overview
        2.2. PowerTOP
        2.3. Diskdevstat and netdevstat
        2.4. Battery Life Tool Kit
        2.5. Tuned and ktune
        2.6. DeviceKit-power and devkit-power
        2.7. GNOME Power Manager
        2.8. Other means for auditing
    3. Core Infrastructure and Mechanics
        3.1. CPU Idle States
        3.2. Using CPUfreq Governors
        3.3. CPU Monitors
        3.4. CPU Power Saving Policies
        3.5. Suspend and Resume
        3.6. Tickless Kernel
        3.7. Active-State Power Management
        3.8. Aggressive Link Power Management
        3.9. Relatime Drive Access Optimization
        3.10. Power Capping
        3.11. Enhanced Graphics Power Management
        3.12. RFKill
        3.13. Optimizations in User Space
    4. Use Cases
        4.1. Example - Server
        4.2. Example - Laptop
    A. Tips for Developers
    B. Revision History

    Preface
    1. Trademark Information
    2. Introduction
        2.1. Benefits of running SELinux
        2.2. Examples
        2.3. SELinux Architecture
        2.4. SELinux on Other Operating Systems
    3. SELinux Contexts
        3.1. Domain Transitions
        3.2. SELinux Contexts for Processes
        3.3. SELinux Contexts for Users
    4. Targeted Policy
        4.1. Confined Processes
        4.2. Unconfined Processes
        4.3. Confined and Unconfined Users
    5. Working with SELinux
        5.1. SELinux Packages
        5.2. Which Log File is Used
        5.3. Main Configuration File
        5.4. Enabling and Disabling SELinux
        5.5. SELinux Modes
        5.6. Booleans
        5.7. SELinux Contexts - Labeling Files
        5.8. The file_t and default_t Types
        5.9. Mounting File Systems
        5.10. Maintaining SELinux Labels
        5.11. Information Gathering Tools
        5.12. Multi-Level Security (MLS)
    6. Confining Users
        6.1. Linux and SELinux User Mappings
        6.2. Confining New Linux Users: useradd
        6.3. Confining Existing Linux Users: semanage login
        6.4. Changing the Default Mapping
        6.5. xguest: Kiosk Mode
        6.6. Booleans for Users Executing Applications
    7. sVirt
        7.1. Security and Virtualization
        7.2. sVirt Labeling
    8. Troubleshooting
        8.1. What Happens when Access is Denied
        8.2. Top Three Causes of Problems
        8.3. Fixing Problems
    9. Further Information
        9.1. Contributors
        9.2. Other Resources
    A. Revision History

    Introduction
    1. Load Balancer Add-On Overview
        1.1. A Basic Load Balancer Add-On Configuration
        1.2. A Three-Tier Load Balancer Add-On Configuration
        1.3. Load Balancer Add-On Scheduling Overview
        1.4. Routing Methods
        1.5. Persistence and Firewall Marks
        1.6. Load Balancer Add-On - A Block Diagram
    2. Initial Load Balancer Add-On Configuration
        2.1. Configuring Services on the LVS Router
        2.2. Setting a Password for the Piranha Configuration Tool
        2.3. Starting the Piranha Configuration Tool Service
        2.4. Limiting Access To the Piranha Configuration Tool
        2.5. Turning on Packet Forwarding
        2.6. Configuring Services on the Real Servers
    3. Setting Up Load Balancer Add-On
        3.1. The NAT Load Balancer Add-On Network
        3.2. Load Balancer Add-On via Direct Routing
        3.3. Putting the Configuration Together
        3.4. Multi-port Services and Load Balancer Add-On
        3.5. Configuring FTP
        3.6. Saving Network Packet Filter Settings
    4. Configuring the Load Balancer Add-On with Piranha Configuration Tool
        4.1. Necessary Software
        4.2. Logging Into the Piranha Configuration Tool
        4.3. CONTROL/MONITORING
        4.4. GLOBAL SETTINGS
        4.5. REDUNDANCY
        4.6. VIRTUAL SERVERS
        4.7. Synchronizing Configuration Files
        4.8. Starting the Load Balancer Add-On
    A. Using the Load Balancer Add-On with the High Availability Add-On
    B. Revision History
    Index

    Introduction
    1. The LVM Logical Volume Manager
        1.1. New and Changed Features
        1.2. Logical Volumes
        1.3. LVM Architecture Overview
        1.4. The Clustered Logical Volume Manager (CLVM)
        1.5. Document Overview
    2. LVM Components
        2.1. Physical Volumes
        2.2. Volume Groups
        2.3. LVM Logical Volumes
    3. LVM Administration Overview
        3.1. Creating LVM Volumes in a Cluster
        3.2. Logical Volume Creation Overview
        3.3. Growing a File System on a Logical Volume
        3.4. Logical Volume Backup
        3.5. Logging
        3.6. The Metadata Daemon (lvmetad)
    4. LVM Administration with CLI Commands
        4.1. Using CLI Commands
        4.2. Physical Volume Administration
        4.3. Volume Group Administration
        4.4. Logical Volume Administration
        4.5. Controlling LVM Device Scans with Filters
        4.6. Online Data Relocation
        4.7. Activating Logical Volumes on Individual Nodes in a Cluster
        4.8. Customized Reporting for LVM
    5. LVM Configuration Examples
        5.1. Creating an LVM Logical Volume on Three Disks
        5.2. Creating a Striped Logical Volume
        5.3. Splitting a Volume Group
        5.4. Removing a Disk from a Logical Volume
        5.5. Creating a Mirrored LVM Logical Volume in a Cluster
    6. LVM Troubleshooting
        6.1. Troubleshooting Diagnostics
        6.2. Displaying Information on Failed Devices
        6.3. Recovering from LVM Mirror Failure
        6.4. Recovering Physical Volume Metadata
        6.5. Replacing a Missing Physical Volume
        6.6. Removing Lost Physical Volumes from a Volume Group
        6.7. Insufficient Free Extents for a Logical Volume
    7. LVM Administration with the LVM GUI
    A. The Device Mapper
    B. The LVM Configuration Files
    C. LVM Object Tags
    D. LVM Volume Group Metadata
    E. Revision History
    Index

    Preface
    1. Overview
        1.1. Audience
        1.2. Horizontal Scalability
        1.3. Distributed Systems
    2. Red Hat Enterprise Linux 6 Performance Features
        2.1. 64-Bit Support
        2.2. Ticket Spinlocks
        2.3. Dynamic List Structure
        2.4. Tickless Kernel
        2.5. Control Groups
        2.6. Storage and File System Improvements
    3. Monitoring and Analyzing System Performance
        3.1. The proc File System
        3.2. GNOME and KDE System Monitors
        3.3. Built-in Command-line Monitoring Tools
        3.4. Tuned and ktune
        3.5. Application Profilers
        3.6. Red Hat Enterprise MRG
    4. CPU
        4.1. CPU Topology
        4.2. CPU Scheduling
        4.3. Interrupts and IRQ Tuning
        4.4. Enhancements to NUMA in Red Hat Enterprise Linux 6
    5. Memory
        5.1. Huge Translation Lookaside Buffer (HugeTLB)
        5.2. Huge Pages and Transparent Huge Pages
        5.3. Using Valgrind to Profile Memory Usage
        5.4. Capacity Tuning
        5.5. Tuning Virtual Memory
    6. Input/Output
        6.1. Features
        6.2. Analysis
        6.3. Tools
        6.4. Configuration
    7. File Systems
        7.1. Tuning Considerations for File Systems
        7.2. Profiles for file system performance
        7.3. File Systems
        7.4. Clustering
    8. Networking
        8.1. Network Performance Enhancements
        8.2. Optimized Network Settings
        8.3. Overview of Packet Reception
        8.4. Resolving Common Queuing/Frame Loss Issues
        8.5. Multicast Considerations
    A. Revision History

    Introduction
    1. Red Hat High Availability Add-On Configuration and Management Overview
        1.1. New and Changed Features
        1.2. Configuration Basics
        1.3. Setting Up Hardware
        1.4. Installing Red Hat High Availability Add-On software
        1.5. Configuring Red Hat High Availability Add-On Software
    2. Before Configuring the Red Hat High Availability Add-On
        2.1. General Configuration Considerations
        2.2. Compatible Hardware
        2.3. Enabling IP Ports
        2.4. Configuring luci with /etc/sysconfig/luci
        2.5. Configuring ACPI For Use with Integrated Fence Devices
        2.6. Considerations for Configuring HA Services
        2.7. Configuration Validation
        2.8. Considerations for NetworkManager
        2.9. Considerations for Using Quorum Disk
        2.10. Red Hat High Availability Add-On and SELinux
        2.11. Multicast Addresses
        2.12. UDP Unicast Traffic
        2.13. Considerations for ricci
        2.14. Configuring Virtual Machines in a Clustered Environment
    3. Configuring Red Hat High Availability Add-On With Conga
        3.1. Configuration Tasks
        3.2. Starting luci
        3.3. Controlling Access to luci
        3.4. Creating a Cluster
        3.5. Global Cluster Properties
        3.6. Configuring Fence Devices
        3.7. Configuring Fencing for Cluster Members
        3.8. Configuring a Failover Domain
        3.9. Configuring Global Cluster Resources
        3.10. Adding a Cluster Service to the Cluster
    4. Managing Red Hat High Availability Add-On With Conga
        4.1. Adding an Existing Cluster to the luci Interface
        4.2. Removing a Cluster from the luci Interface
        4.3. Managing Cluster Nodes
        4.4. Starting, Stopping, Restarting, and Deleting Clusters
        4.5. Managing High-Availability Services
        4.6. Backing Up and Restoring the luci Configuration
    5. Configuring Red Hat High Availability Add-On With the ccs Command
        5.1. Operational Overview
        5.2. Configuration Tasks
        5.3. Starting ricci
        5.4. Creating A Cluster
        5.5. Configuring Fence Devices
        5.6. Listing Fence Devices and Fence Device Options
        5.7. Configuring Fencing for Cluster Members
        5.8. Configuring a Failover Domain
        5.9. Configuring Global Cluster Resources
        5.10. Adding a Cluster Service to the Cluster
        5.11. Listing Available Cluster Services
        5.12. Virtual Machine Resources
        5.13. Configuring a Quorum Disk
        5.14. Miscellaneous Cluster Configuration
        5.15. Propagating the Configuration File to the Cluster Nodes
    6. Managing Red Hat High Availability Add-On With ccs
        6.1. Managing Cluster Nodes
        6.2. Starting and Stopping a Cluster
        6.3. Diagnosing and Correcting Problems in a Cluster
    7. Configuring Red Hat High Availability Add-On With Command Line Tools
        7.1. Configuration Tasks
        7.2. Creating a Basic Cluster Configuration File
        7.3. Configuring Fencing
        7.4. Configuring Failover Domains
        7.5. Configuring HA Services
        7.6. Configuring Redundant Ring Protocol
        7.7. Configuring Debug Options
        7.8. Verifying a Configuration
    8. Managing Red Hat High Availability Add-On With Command Line Tools
        8.1. Starting and Stopping the Cluster Software
        8.2. Deleting or Adding a Node
        8.3. Managing High-Availability Services
        8.4. Updating a Configuration
    9. Diagnosing and Correcting Problems in a Cluster
        9.1. Configuration Changes Do Not Take Effect
        9.2. Cluster Does Not Form
        9.3. Nodes Unable to Rejoin Cluster after Fence or Reboot
        9.4. Cluster Daemon crashes
        9.5. Cluster Services Hang
        9.6. Cluster Service Will Not Start
        9.7. Cluster-Controlled Services Fails to Migrate
        9.8. Each Node in a Two-Node Cluster Reports Second Node Down
        9.9. Nodes are Fenced on LUN Path Failure
        9.10. Quorum Disk Does Not Appear as Cluster Member
        9.11. Unusual Failover Behavior
        9.12. Fencing Occurs at Random
        9.13. Debug Logging for Distributed Lock Manager (DLM) Needs to be Enabled
    10. SNMP Configuration with the Red Hat High Availability Add-On
        10.1. SNMP and the Red Hat High Availability Add-On
        10.2. Configuring SNMP with the Red Hat High Availability Add-On
        10.3. Forwarding SNMP traps
        10.4. SNMP Traps Produced by Red Hat High Availability Add-On
    11. Clustered Samba Configuration
        11.1. CTDB Overview
        11.2. Required Packages
        11.3. GFS2 Configuration
        11.4. CTDB Configuration
        11.5. Samba Configuration
        11.6. Starting CTDB and Samba Services
        11.7. Using the Clustered Samba Server
    A. Fence Device Parameters
    B. HA Resource Parameters
    C. HA Resource Behavior
    D. Cluster Service Resource Check and Failover Timeout
    E. Command Line Tools Summary
    F. High Availability LVM (HA-LVM)
    G. Revision History
    Index

    Preface
    Part I. Basic System Configuration
    1. Keyboard Configuration
        1.1. Changing the Keyboard Layout
        1.2. Adding the Keyboard Layout Indicator
        1.3. Setting Up a Typing Break
    2. Date and Time Configuration
        2.1. Date/Time Properties Tool
        2.2. Command Line Configuration
    3. Managing Users and Groups
        3.1. Introduction to Users and Groups
        3.2. Using the User Manager Tool
        3.3. Using Command Line Tools
        3.4. Additional Resources
    4. Gaining Privileges
        4.1. The su Command
        4.2. The sudo Command
        4.3. Additional Resources
    Part II. Package Management
    5. Registering a System and Managing Subscriptions
        5.1. Using Red Hat Subscription Manager Tools
        5.2. Registering and Unregistering a System
        5.3. Attaching and Removing Subscriptions
        5.4. Redeeming Vendor Subscriptions
        5.5. Attaching Subscriptions from a Subscription Asset Manager Activation Key
        5.6. Setting Preferences for Systems
        5.7. Managing Subscription Expiration and Notifications
    6. Yum
        6.1. Checking For and Updating Packages
        6.2. Packages and Package Groups
        6.3. Configuring Yum and Yum Repositories
        6.4. Yum Plug-ins
        6.5. Additional Resources
    7. PackageKit
        7.1. Updating Packages with Software Update
        7.2. Using Add/Remove Software
        7.3. PackageKit Architecture
        7.4. Additional Resources
        III. Networking
    8. NetworkManager
        8.1. The NetworkManager Daemon
        8.2. Interacting with NetworkManager
        8.3. Establishing Connections
        8.4. NetworkManager Architecture
    9. Network Interfaces
        9.1. Network Configuration Files
        9.2. Interface Configuration Files
        9.3. Interface Control Scripts
        9.4. Static Routes and the Default Gateway
        9.5. Network Function Files
        9.6. Additional Resources
    Part IV. Infrastructure Services
    10. Services and Daemons
        10.1. Configuring the Default Runlevel
        10.2. Configuring the Services
        10.3. Running Services
        10.4. Additional Resources
    11. Configuring Authentication
        11.1. Configuring System Authentication
        11.2. Using and Caching Credentials with SSSD
    12. OpenSSH
        12.1. The SSH Protocol
        12.2. Configuring OpenSSH
        12.3. OpenSSH Clients
        12.4. More Than a Secure Shell
        12.5. Additional Resources
    Part V. Servers
    13. DHCP Servers
        13.1. Why Use DHCP?
        13.2. Configuring a DHCP Server
        13.3. Configuring a DHCP Client
        13.4. Configuring a Multihomed DHCP Server
        13.5. DHCP for IPv6 (DHCPv6)
        13.6. Additional Resources
    14. DNS Servers
        14.1. Introduction to DNS
        14.2. BIND
    15. Web Servers
        15.1. The Apache HTTP Server
    16. Mail Servers
        16.1. Email Protocols
        16.2. Email Program Classifications
        16.3. Mail Transport Agents
        16.4. Mail Delivery Agents
        16.5. Mail User Agents
        16.6. Additional Resources
    17. Directory Servers
        17.1. OpenLDAP
    18. File and Print Servers
        18.1. Samba
        18.2. FTP
        18.3. Printer Configuration
    Part VI. Monitoring and Automation
    19. System Monitoring Tools
        19.1. Viewing System Processes
        19.2. Viewing Memory Usage
        19.3. Viewing CPU Usage
        19.4. Viewing Block Devices and File Systems
        19.5. Viewing Hardware Information
        19.6. Monitoring Performance with Net-SNMP
        19.7. Additional Resources
    20. Viewing and Managing Log Files
        20.1. Configuring rsyslog
        20.2. Locating Log Files
        20.3. Viewing Log Files
        20.4. Adding a Log File
        20.5. Monitoring Log Files
        20.6. Additional Resources
    21. Automating System Tasks
        21.1. Cron and Anacron
        21.2. At and Batch
        21.3. Additional Resources
    22. Automatic Bug Reporting Tool (ABRT)
        22.1. Installing ABRT and Starting its Services
        22.2. Using the Graphical User Interface
        22.3. Using the Command Line Interface
        22.4. Configuring ABRT
        22.5. Configuring Centralized Crash Collection
    23. OProfile
        23.1. Overview of Tools
        23.2. Configuring OProfile
        23.3. Starting and Stopping OProfile
        23.4. Saving Data
        23.5. Analyzing the Data
        23.6. Understanding /dev/oprofile/
        23.7. Example Usage
        23.8. OProfile Support for Java
        23.9. Graphical Interface
        VII. Kernel, Module and Driver Configuration
    24. Manually Upgrading the Kernel
        24.1. Overview of Kernel Packages
        24.2. Preparing to Upgrade
        24.3. Downloading the Upgraded Kernel
        24.4. Performing the Upgrade
        24.5. Verifying the Initial RAM Disk Image
        24.6. Verifying the Boot Loader
    25. Working with Kernel Modules
        25.1. Listing Currently-Loaded Modules
        25.2. Displaying Information About a Module
        25.3. Loading a Module
        25.4. Unloading a Module
        25.5. Setting Module Parameters
        25.6. Persistent Module Loading
        25.7. Specific Kernel Module Capabilities
        25.8. Additional Resources
    26. The kdump Crash Recovery Service
        26.1. Installing the kdump Service
        26.2. Configuring the kdump Service
        26.3. Analyzing the Core Dump
        26.4. Additional Resources
    A. Consistent Network Device Naming
    B. RPM
    C. The X Window System
    D. The sysconfig Directory
    E. The proc File System
    F. Revision History
    Index

    Preface
    1. Introduction
    2. Requirements
        2.1. Hypervisor Requirements
        2.2. Guest requirements and support limits
        2.3. Supported Virtual Machine Operating Systems
    3. Preparing Red Hat Enterprise Virtualization Hypervisor Installation Media
        3.1. Preparation Instructions
        3.2. Modifying the Hypervisor ISO
        3.3. Deploying Hypervisors with PXE and tftp
        3.4. Preparing a Hypervisor USB Storage Device
        3.5. Preparing a Hypervisor from a CD-ROM or DVD
    4. Installation
        4.1. Interactive Installation
        4.2. Automated Installation
    5. Configuration
        5.1. Logging In
        5.2. Status
        5.3. Network
        5.4. Security
        5.5. Keyboard
        5.6. SNMP (Simple Network Management Protocol)
        5.7. Logging
        5.8. Kernel Dump
        5.9. Remote Storage
        5.10. CIM (Common Information Model)
        5.11. RHEV-M
        5.12. Plugins
        5.13. Red Hat Network
    6. Upgrading Red Hat Enterprise Virtualization Hypervisors
        6.1. Upgrading a Hypervisor with the Manager
        6.2. Upgrading a Red Hat Enterprise Virtualization Hypervisor with local media
        6.3. Re-installing Hypervisors with the Manager
    A. Security topics
    B. Filesystem layout
    C. Uninstallation
    D. Revision History

    Preface
    1. Device Mapper Multipathing
        1.1. New and Changed Features
        1.2. Overview of DM-Multipath
        1.3. Storage Array Support
        1.4. DM-Multipath Components
        1.5. DM-Multipath Setup Overview
    2. Multipath Devices
        2.1. Multipath Device Identifiers
        2.2. Consistent Multipath Device Names in a Cluster
        2.3. Multipath Device Attributes
        2.4. Multipath Devices in Logical Volumes
    3. Setting Up DM-Multipath
        3.1. Setting Up DM-Multipath
        3.2. Ignoring Local Disks when Generating Multipath Devices
        3.3. Configuring Storage Devices
        3.4. Setting Up Multipathing in the initramfs File System
    4. The DM-Multipath Configuration File
        4.1. Configuration File Overview
        4.2. Configuration File Blacklist
        4.3. Configuration File Defaults
        4.4. Multipaths Device Configuration Attributes
        4.5. Configuration File Devices
    5. DM-Multipath Administration and Troubleshooting
        5.1. Resizing an Online Multipath Device
        5.2. Moving root File Systems from a Single Path Device to a Multipath Device
        5.3. Moving swap File Systems from a Single Path Device to a Multipath Device
        5.4. The Multipath Daemon
        5.5. Issues with Large Number of LUNs
        5.6. Issues with queue_if_no_path feature
        5.7. Multipath Command Output
        5.8. Multipath Queries with multipath Command
        5.9. Multipath Command Options
        5.10. Determining Device Mapper Entries with the dmsetup Command
        5.11. Troubleshooting with the multipathd Interactive Console
    A. Revision History
    Index

    Preface
    1. Introduction
    2. Targeted policy
        2.1. Type Enforcement
        2.2. Confined processes
        2.3. Unconfined processes
    3. The Apache HTTP Server
        3.1. The Apache HTTP Server and SELinux
        3.2. Types
        3.3. Booleans
        3.4. Configuration examples
    4. Samba
        4.1. Samba and SELinux
        4.2. Types
        4.3. Booleans
        4.4. Configuration examples
    5. File Transfer Protocol
        5.1. FTP and SELinux
        5.2. Types
        5.3. Booleans
        5.4. Configuration Examples
    6. Network File System
        6.1. NFS and SELinux
        6.2. Types
        6.3. Booleans
        6.4. Configuration Examples
    7. Berkeley Internet Name Domain
        7.1. BIND and SELinux
        7.2. Types
        7.3. Booleans
        7.4. Configuration Examples
    8. Concurrent Versioning System
        8.1. CVS and SELinux
        8.2. Types
        8.3. Booleans
        8.4. Configuration Examples
    9. Squid Caching Proxy
        9.1. Squid Caching Proxy and SELinux
        9.2. Types
        9.3. Booleans
        9.4. Configuration Examples
    10. MySQL
        10.1. MySQL and SELinux
        10.2. Types
        10.3. Booleans
        10.4. Configuration Examples
    11. PostgreSQL
        11.1. PostgreSQL and SELinux
        11.2. Types
        11.3. Booleans
        11.4. Configuration Examples
    12. rsync
        12.1. rsync and SELinux
        12.2. Types
        12.3. Booleans
        12.4. Configuration Examples
    13. Postfix
        13.1. Postfix and SELinux
        13.2. Types
        13.3. Booleans
        13.4. Configuration Examples
    14. DHCP
        14.1. DHCP and SELinux
        14.2. Types
    15. References
    A. Revision History

    About This Guide
    1. Introduction to the Enterprise Security Client
        1.1. Red Hat Enterprise Linux, Single Sign-On, and Authentication
        1.2. Red Hat Certificate System and the Enterprise Security Client
    2. Using Pluggable Authentication Modules (PAM)
        2.1. About PAM
        2.2. PAM Configuration Files
        2.3. Creating PAM Modules
        2.4. PAM and Administrative Credential Caching
    3. Using Kerberos
        3.1. About Kerberos
        3.2. Installing Kerberos
        3.3. Configuring a Kerberos 5 Server
        3.4. Configuring a Kerberos 5 Client
        3.5. Domain-to-Realm Mapping
        3.6. Setting up Cross Realm Authentication
    4. Setting up Enterprise Security Client
        4.1. Installing the Smart Card Package Group
        4.2. Launching the Smart Card Manager UI
        4.3. Overview of Enterprise Security Client Configuration
        4.4. Configuring Phone Home
        4.5. Using Security Officer Mode
        4.6. Configuring SSL Connections with the TPS
        4.7. Customizing the Smart Card Enrollment User Interface
        4.8. Disabling LDAP Authentication for Token Operations
    5. Using Smart Cards with the Enterprise Security Client
        5.1. Supported Smart Cards
        5.2. Setting up Users to Be Enrolled
        5.3. Enrolling a Smart Card Automatically
        5.4. Managing Smart Cards
        5.5. Diagnosing Problems
    6. Configuring Applications for Single Sign-On
        6.1. Configuring Firefox to Use Kerberos for Single Sign-On
        6.2. Enabling Smart Card Login
        6.3. Setting up Browsers to Support SSL for Tokens
        6.4. Using the Certificates on Tokens for Mail Clients
    Glossary

    Preface
    1. Introduction
        1.1. Red Hat Enterprise Linux 6
        1.2. Application Compatibility
    2. Installation
        2.1. Kernel and Boot Options
        2.2. Graphical Installer
        2.3. Text-Based Installer
    3. Storage and File Systems
        3.1. RAID
        3.2. ext4
        3.3. blockdev
        3.4. Tape devices
    4. Networking and Services
        4.1. Interfaces and Configuration
        4.2. Service Initialization
        4.3. IPTables/Firewalls
        4.4. Apache HTTP Server
        4.5. Samba
        4.6. PHP
        4.7. BIND
        4.8. NTP
        4.9. Kerberos
        4.10. Mail
        4.11. MySQL�
        4.12. PostgreSQL
        4.13. Squid
        4.14. Bluetooth
        4.15. Cron
        4.16. Logging
    5. Command Line Tools
        5.1. Grep
        5.2. Sed
        5.3. Pcre
        5.4. Shells
        5.5. Nautilus
    6. Desktop
    7. Security and Authentication
        7.1. SELinux
        7.2. SSSD
        7.3. LDAP
        7.4. Checksums
        7.5. Pluggable Authentication Modules (PAM)
        7.6. System Users
    8. Kernel
        8.1. dracut
        8.2. Joystick support
    9. Package And Driver Changes
        9.1. System Configuration Tools Changes
        9.2. Bash (Bourne-Again Shell)
        9.3. Other Package Changes
        9.4. Driver Changes
        9.5. Library Changes
    A. Revision History

    1. Package Lists
        1.1. Variants
        1.2. Add-Ons
    A. Recommendations and Supported Limits
    B. Package and Driver Changes
    C. Software Licenses
    D. Revision History

    Preface
    1. Overview
        1.1. What's New in Red Hat Enterprise Linux 6
    Part I. File Systems
    2. File System Structure and Maintenance
        2.1. Why Share a Common Structure?
        2.2. Overview of File System Hierarchy Standard (FHS)
        2.3. Special Red Hat Enterprise Linux File Locations
        2.4. The /proc Virtual File System
        2.5. Discard unused blocks
    3. Encrypted File System
        3.1. Mounting a File System as Encrypted
        3.2. Additional Information
    4. Btrfs
        4.1. Btrfs Features
    5. The Ext3 File System
        5.1. Creating an Ext3 File System
        5.2. Converting to an Ext3 File System
        5.3. Reverting to an Ext2 File System
    6. The Ext4 File System
        6.1. Creating an Ext4 File System
        6.2. Mounting an Ext4 File System
        6.3. Resizing an Ext4 File System
        6.4. Other Ext4 File System Utilities
    7. Global File System 2
    8. The XFS File System
        8.1. Creating an XFS File System
        8.2. Mounting an XFS File System
        8.3. XFS Quota Management
        8.4. Increasing the Size of an XFS File System
        8.5. Repairing an XFS File System
        8.6. Suspending an XFS File System
        8.7. Backup and Restoration of XFS File Systems
        8.8. Other XFS File System Utilities
    9. Network File System (NFS)
        9.1. How It Works
        9.2. pNFS
        9.3. NFS Client Configuration
        9.4. autofs
        9.5. Common NFS Mount Options
        9.6. Starting and Stopping NFS
        9.7. NFS Server Configuration
        9.8. Securing NFS
        9.9. NFS and rpcbind
        9.10. NFS Support for SELinux
        9.11. pNFS Support (Block, Object and File)
        9.12. NFSv4
        9.13. References
    10. FS-Cache
        10.1. Performance Guarantee
        10.2. Setting Up a Cache
        10.3. Using the Cache With NFS
        10.4. Setting Cache Cull Limits
        10.5. Statistical Information
        10.6. References
    Part II. Storage Administration
    11. Storage Considerations During Installation
        11.1. Updates to Storage Configuration During Installation
        11.2. Overview of Supported File Systems
        11.3. Special Considerations
    12. Partitions
        12.1. Viewing the Partition Table
        12.2. Creating a Partition
        12.3. Removing a Partition
        12.4. Resizing a Partition
    13. LVM (Logical Volume Manager)
        13.1. What is LVM2?
        13.2. Using system-config-lvm
        13.3. References
    14. Swap Space
        14.1. What is Swap Space?
        14.2. Adding Swap Space
        14.3. Removing Swap Space
        14.4. Moving Swap Space
    15. Disk Quotas
        15.1. Configuring Disk Quotas
        15.2. Managing Disk Quotas
        15.3. References
    16. Redundant Array of Independent Disks (RAID)
        16.1. What is RAID?
        16.2. Who Should Use RAID?
        16.3. RAID Types
        16.4. RAID Levels and Linear Support
        16.5. Linux RAID Subsystems
        16.6. RAID Support in the Installer
        16.7. Configuring RAID Sets
        16.8. Advanced RAID Device Creation
    17. Using the mount Command
        17.1. Listing Currently Mounted File Systems
        17.2. Mounting a File System
        17.3. Unmounting a File System
        17.4. Documentation
    18. The volume_key function
        18.1. Commands
        18.2. Using volume_key as an individual user
        18.3. Using volume_key in a larger organization
        18.4. Documentation
    19. Access Control Lists
        19.1. Mounting File Systems
        19.2. Setting Access ACLs
        19.3. Setting Default ACLs
        19.4. Retrieving ACLs
        19.5. Archiving File Systems With ACLs
        19.6. Compatibility with Older Systems
        19.7. References
    20. Solid-State Disk Deployment Guidelines
        20.1. Deployment Considerations
        20.2. Tuning Considerations
    21. Write Barriers
        21.1. Importance of Write Barriers
        21.2. Enabling/Disabling Write Barriers
        21.3. Write Barrier Considerations
    22. Storage I/O Alignment and Size
        22.1. Parameters for Storage Access
        22.2. Userspace Access
        22.3. Standards
        22.4. Stacking I/O Parameters
        22.5. Logical Volume Manager
        22.6. Partition and File System Tools
    23. Setting Up A Remote Diskless System
        23.1. Configuring a tftp Service for Diskless Clients
        23.2. Configuring DHCP for Diskless Clients
        23.3. Configuring an Exported File System for Diskless Clients
    24. Online Storage Management
        24.1. Fibre Channel
        24.2. iSCSI
        24.3. Persistent Naming
        24.4. Removing a Storage Device
        24.5. Removing a Path to a Storage Device
        24.6. Adding a Storage Device or Path
        24.7. Configuring a Fibre-Channel Over Ethernet Interface
        24.8. Configuring an FCoE Interface to Automatically Mount at Boot
        24.9. Scanning Storage Interconnects
        24.10. iSCSI Discovery Configuration
        24.11. Configuring iSCSI Offload and Interface Binding
        24.12. Scanning iSCSI Interconnects
        24.13. Logging In to an iSCSI Target
        24.14. Resizing an Online Logical Unit
        24.15. Adding/Removing a Logical Unit Through rescan-scsi-bus.sh
        24.16. Modifying Link Loss Behavior
        24.17. Controlling the SCSI Command Timer and Device Status
        24.18. Troubleshooting
    25. Device Mapper Multipathing and Virtual Storage
        25.1. Virtual Storage
        25.2. DM-Multipath
    A. Revision History
    Glossary
    Index

    Preface
    1. Introduction
        1.1. Documentation Goals
        1.2. SystemTap Capabilities
    2. Using SystemTap
        2.1. Installation and Setup
        2.2. Generating Instrumentation for Other Computers
        2.3. Running SystemTap Scripts
    3. Understanding How SystemTap Works
        3.1. Architecture
        3.2. SystemTap Scripts
        3.3. Basic SystemTap Handler Constructs
        3.4. Associative Arrays
        3.5. Array Operations in SystemTap
        3.6. Tapsets
    4. Useful SystemTap Scripts
        4.1. Network
        4.2. Disk
        4.3. Profiling
        4.4. Identifying Contended User-Space Locks
    5. Understanding SystemTap Errors
        5.1. Parse and Semantic Errors
        5.2. Run Time Errors and Warnings
    6. References
    A. Revision History
    Index

    Preface
    1. Introduction
        1.1. Documentation Goals
    2. Tapset Development Guidelines
        2.1. Writing Good Tapsets
        2.2. Elements of a Tapset
    3. Context Functions
    4. Timestamp Functions
    5. Time string utility function
    6. Memory Tapset
    7. Task Time Tapset
    8. IO Scheduler and block IO Tapset
    9. SCSI Tapset
    10. TTY Tapset
    11. Networking Tapset
    12. Socket Tapset
    13. Kernel Process Tapset
    14. Signal Tapset
    15. Directory-entry (dentry) Tapset
    16. Logging Tapset
    17. Random functions Tapset
    18. String and data retrieving functions Tapset
    19. A collection of standard string functions
    20. Utility functions for using ansi control chars in logs

    Preface
    1. Introducing V2V
        1.1. Installing virt-v2v
    2. Converting virtual machines to run on KVM managed by libvirt
        2.1. Preparing to convert a virtual machine
        2.2. Converting virtual machines
    3. Converting virtual machines to run on Red Hat Enterprise Virtualization
        3.1. Acceptable converted storage output formats
        3.2. Attaching an export storage domain
        3.3. Converting a virtual machine
    4. Converting from other hypervisors using virt-v2v to KVM
        4.1. Introduction
        4.2. Preparing to convert a virtual machine
        4.3. Converting guest virtual machines
        4.4. Running converted virtual machines
        4.5. Configuration changes
        4.6. Configuration changes for Windows virtual machines
    5. Converting physical machines to virtual machines
        5.1. Prerequisites
        5.2. Preparing to convert a physical machine
        5.3. Converting physical machines to virtual machines
        5.4. Importing and running converted virtual machines on target hypervisors
    6. Debugging and troubleshooting
        6.1. Debugging V2V conversions
        6.2. Known issue with iscsi/mpath/scsi storage volumes
    7. References
        7.1. virt-v2v Parameters
        7.2. Configuration changes
    A. Additional procedures
    B. Revision History

    Preface
    1. Server best practices
    2. Security for virtualization
        2.1. Storage security issues
        2.2. SELinux and virtualization
        2.3. SELinux
        2.4. Virtualization firewall information
    3. sVirt
        3.1. Security and Virtualization
        3.2. sVirt labeling
    4. KVM live migration
        4.1. Live migration requirements
        4.2. Live migration and Red Hat Enterprise Linux version compatibility
        4.3. Shared storage example: NFS for a simple migration
        4.4. Live KVM migration with virsh
        4.5. Migrating with virt-manager
    5. Remote management of guests
        5.1. Remote management with SSH
        5.2. Remote management over TLS and SSL
        5.3. Transport modes
    6. Overcommitting with KVM
        6.1. Introduction
        6.2. Overcommitting virtualized CPUs
    7. KSM
    8. Advanced virtualization administration
        8.1. Control Groups (cgroups)
        8.2. Hugepage support
    9. Miscellaneous administration tasks
        9.1. Automatically starting guests
        9.2. Guest memory allocation
        9.3. Using qemu-img
        9.4. Verifying virtualization extensions
        9.5. Setting KVM processor affinities
        9.6. Generating a new unique MAC address
        9.7. Improving guest response time
        9.8. Disable SMART disk monitoring for guests
        9.9. Configuring a VNC Server
        9.10. Gracefully shutting down guests
        9.11. Virtual machine timer management with libvirt
        9.12. Using PMU to monitor guest performance
        9.13. Guest virtual machine power management
        9.14. QEMU Guest Agent Protocol
        9.15. Setting a limit on device redirection
        9.16. Dynamically changing a host or a network bridge that is attached to a virtual NIC
    10. Storage concepts
        10.1. Storage pools
        10.2. Volumes
    11. Storage pools
        11.1. Creating storage pools
    12. Volumes
        12.1. Creating volumes
        12.2. Cloning volumes
        12.3. Adding storage devices to guests
        12.4. Deleting and removing volumes
    13. The Virtual Host Metrics Daemon (vhostmd)
        13.1. Installing vhostmd on the host
        13.2. Configuration of vhostmd
        13.3. Starting and stopping the daemon
        13.4. Verifying that vhostmd is working from the host
        13.5. Configuring guests to see the metrics
        13.6. Using vm-dump-metrics in Red Hat Enterprise Linux guests to verify operation
    14. Managing guests with virsh
        14.1. virsh command quick reference
        14.2. Attaching and updating a device with virsh
        14.3. Connecting to the hypervisor
        14.4. Creating a virtual machine XML dump (configuration file)
        14.5. Suspending, resuming, saving and restoring a guest
        14.6. Shutting down, rebooting and force-shutdown of a guest
        14.7. Retrieving guest information
        14.8. Retrieving node information
        14.9. Storage pool information
        14.10. Displaying per-guest information
        14.11. Managing virtual networks
        14.12. Migrating guests with virsh
        14.13. Guest CPU model configuration
    15. Managing guests with the Virtual Machine Manager (virt-manager)
        15.1. Starting virt-manager
        15.2. The Virtual Machine Manager main window
        15.3. The virtual hardware details window
        15.4. Virtual Machine graphical console
        15.5. Adding a remote connection
        15.6. Displaying guest details
        15.7. Performance monitoring
        15.8. Displaying CPU usage for guests
        15.9. Displaying CPU usage for hosts
        15.10. Displaying Disk I/O
        15.11. Displaying Network I/O
    16. Guest disk access with offline tools
        16.1. Introduction
        16.2. Terminology
        16.3. Installation
        16.4. The guestfish shell
        16.5. Other commands
        16.6. virt-rescue: The rescue shell
        16.7. virt-df: Monitoring disk usage
        16.8. virt-resize: resizing guests offline
        16.9. virt-inspector: inspecting guests
        16.10. virt-win-reg: Reading and editing the Windows Registry
        16.11. Using the API from Programming Languages
        16.12. Troubleshooting
        16.13. Where to find further documentation
    17. Virtual Networking
        17.1. Virtual network switches
        17.2. Network Address Translation
        17.3. Networking protocols
        17.4. The default configuration
        17.5. Examples of common scenarios
        17.6. Managing a virtual network
        17.7. Creating a virtual network
        17.8. Attaching a virtual network to a guest
        17.9. Directly attaching to physical interface
        17.10. Applying network filtering
    18. qemu-kvm Whitelist
        18.1. Introduction
        18.2. Basic options
        18.3. Disk options
        18.4. Display options
        18.5. Network options
        18.6. Device options
        18.7. Linux/Multiboot boot
        18.8. Expert options
        18.9. Help and information options
        18.10. Miscellaneous options
    19. Troubleshooting
        19.1. Debugging and troubleshooting tools
        19.2. kvm_stat
        19.3. Troubleshooting with serial consoles
        19.4. Virtualization log files
        19.5. Loop device errors
        19.6. Live Migration Errors
        19.7. Enabling Intel VT-x and AMD-V virtualization hardware extensions in BIOS
        19.8. KVM networking performance
        19.9. Missing characters on guest console with Japanese keyboard
        19.10. Known Windows XP guest issues
    A. Additional resources
    B. Revision History
    Index

    Preface
    1. Introduction
        1.1. Who should read this guide?
        1.2. Virtualization in Red Hat Enterprise Linux 6
        1.3. Red Hat Enterprise Virtualization (RHEV)
    2. What is virtualization and migration?
        2.1. What is virtualization?
        2.2. Migration
        2.3. Virtualized to virtualized migration (V2V)
    3. Advantages and misconceptions of virtualization
        3.1. Virtualization costs
        3.2. Virtualization learning curve
        3.3. Performance
        3.4. Disaster recovery
        3.5. Security
        3.6. Virtualization for servers and individuals
    4. Introduction to Red Hat virtualization products
        4.1. KVM and virtualization in Red Hat Enterprise Linux
        4.2. libvirt and libvirt tools
        4.3. Virtualized hardware devices
        4.4. Storage
    5. Virtualization Tools
        5.1. virsh
        5.2. virt-manager
        5.3. virt-install
        5.4. guestfish
        5.5. Other useful tools
    A. Revision History

    Preface
    1. Introduction
        1.1. What is in this guide?
    2. System requirements
    3. KVM guest virtual machine compatibility
        3.1. Red Hat Enterprise Linux 6 support limits
        3.2. Supported CPU Models
    4. Virtualization restrictions
        4.1. KVM restrictions
        4.2. Application restrictions
        4.3. Other restrictions
    5. Installing the virtualization packages
        5.1. Configuring a Virtualization Host installation
        5.2. Installing virtualization packages on an existing Red Hat Enterprise Linux system
    6. Guest virtual machine installation overview
        6.1. Guest virtual machine prerequisites and considerations
        6.2. Creating guests with virt-install
        6.3. Creating guests with virt-manager
        6.4. Installing guest virtual machines with PXE
    7. Installing a Red Hat Enterprise Linux 6 guest virtual machine on a Red Hat Enterprise Linux 6 host
        7.1. Creating a Red Hat Enterprise Linux 6 guest with local installation media
        7.2. Creating a Red Hat Enterprise Linux 6 guest with a network installation tree
        7.3. Creating a Red Hat Enterprise Linux 6 guest with PXE
    8. Virtualizing Red Hat Enterprise Linux on Other Platforms
        8.1. On VMWare
        8.2. On Hyper-V
    9. Installing a fully-virtualized Windows guest
        9.1. Using virt-install to create a guest
    10. KVM Para-virtualized Drivers
        10.1. Installing the KVM Windows para-virtualized drivers
        10.2. Installing the drivers on an installed Windows guest virtual machine
        10.3. Installing drivers during the Windows installation
        10.4. Using the para-virtualized drivers with Red Hat Enterprise Linux 3.9 guests
        10.5. Using KVM para-virtualized drivers for existing devices
        10.6. Using KVM para-virtualized drivers for new devices
    11. Network configuration
        11.1. Network Address Translation (NAT) with libvirt
        11.2. Disabling vhost-net
        11.3. Bridged networking with libvirt
    12. PCI device configuration
        12.1. Assigning a PCI device with virsh
        12.2. Assigning a PCI device with virt-manager
        12.3. PCI device assignment with virt-install
        12.4. Detaching an assigned PCI device
    13. SR-IOV
        13.1. Introduction
        13.2. Using SR-IOV
        13.3. Troubleshooting SR-IOV
    14. KVM guest timing management
    15. Network booting with libvirt
        15.1. Preparing the boot server
        15.2. Booting a guest using PXE
    16. QEMU Guest Agent
        16.1. Set Up Communication between Guest Agent and Host
    A. NetKVM Driver Parameters
    B. Common libvirt errors and troubleshooting
    C. Revision History

    Preface
    1. Introduction
        1.1. Virtualized and Non-Virtualized Environments
        1.2. Why Virtualization Security Matters
        1.3. Leveraging SELinux with sVirt
        1.4. Further Resources
    2. Host Security
        2.1. Why Host Security Matters
        2.2. Host Security Recommended Practices for Red Hat Enterprise Linux
        2.3. Host Security Recommended Practices for Red Hat Enterprise Virtualization
    3. Guest Security
        3.1. Why Guest Security Matters
        3.2. Guest Security Recommended Practices
    4. sVirt
        4.1. Introduction
        4.2. SELinux and Mandatory Access Control (MAC)
        4.3. sVirt Configuration
        4.4. sVirt Labeling
    5. Network Security in a Virtualized Environment
        5.1. Network Security Overview
        5.2. Network Security Recommended Practices
    6. Further Information
        6.1. Contributors
        6.2. Other Resources
    A. Revision History

    Preface
    1. Introduction
        1.1. About This Guide
        1.2. Further Resources
        1.3. KVM Overview
        1.4. KVM Performance Architecture Overview
        1.5. Performance Features and Improvements
    2. Virt-manager
        2.1. Introduction
        2.2. Operating System Details and Devices
        2.3. CPU Performance Options
    3. tuned
        3.1. tuned and tuned-adm
    4. Networking
        4.1. Introduction
        4.2. Network Tuning Tips
        4.3. Virtio and vhost_net
        4.4. Device Assignment and SR-IOV
    5. Memory
        5.1. Introduction
        5.2. Huge Pages and Transparent Huge Pages
    6. Block I/O
        6.1. Caching
        6.2. Block I/O related commands
    7. NUMA
        7.1. Memory Allocation Policies
        7.2. libvirt NUMA tuning
    8. Performance monitoring tools
        8.1. Introduction
        8.2. perf kvm
    A. Revision History

    Introduction
    1. High Availability Add-On Overview
        1.1. Cluster Basics
        1.2. High Availability Add-On Introduction
        1.3. Cluster Infrastructure
    2. Cluster Management with CMAN
        2.1. Cluster Quorum
    3. RGManager
        3.1. Failover Domains
        3.2. Service Policies
        3.3. Resource Trees - Basics / Definitions
        3.4. Service Operations and States
        3.5. Virtual Machine Behaviors
        3.6. Resource Actions
    4. Fencing
    5. Lock Management
        5.1. DLM Locking Model
        5.2. Lock States
    6. Configuration and Administration Tools
        6.1. Cluster Administration Tools
    7. Virtualization and High Availability
        7.1. VMs as Highly Available Resources/Services
        7.2. Guest Clusters
    A. Revision History

    Preface
    1. Eclipse Development Environment
        1.1. Starting an Eclipse project
        1.2. Eclipse User Interface
        1.3. Editing C/C++ Source Code in Eclipse
        1.4. Editing Java Source Code in Eclipse
        1.5. Eclipse RPM Building
        1.6. Eclipse Documentation
    2. Collaborating
        2.1. Concurrent Versions System (CVS)
        2.2. Apache Subversion (SVN)
        2.3. Git
    3. Libraries and Runtime Support
        3.1. Version Information
        3.2. Compatibility
        3.3. Library and Runtime Details
    4. Compiling and Building
        4.1. GNU Compiler Collection (GCC)
        4.2. Distributed Compiling
        4.3. Autotools
        4.4. Eclipse Built-in Specfile Editor
        4.5. CDT in Eclipse
        4.6. build-id Unique Identification of Binaries
        4.7. Software Collections and scl-utils
    5. Debugging
        5.1. ELF Executable Binaries
        5.2. Installing Debuginfo Packages
        5.3. GDB
        5.4. Variable Tracking at Assignments
        5.5. Python Pretty-Printers
        5.6. Debugging C/C++ Applications with Eclipse
    6. Profiling
        6.1. Valgrind
        6.2. OProfile
        6.3. SystemTap
        6.4. Performance Counters for Linux (PCL) Tools and perf
        6.5. ftrace
    7. Red Hat Developer Toolset
        7.1. What is Red Hat Developer Toolset?
        7.2. What Does Red Hat Developer Toolset Offer?
        7.3. Features and Improvements Provided by Red Hat Developer Toolset
        7.4. Which Platforms Are Supported?
        7.5. For More Information
    8. Documentation Tools
        8.1. Publican
        8.2. Doxygen
    A. Appendix
    B. Revision History
    Index

    1. Installer
        1.1. Known Issues
    2. Deployment
        2.1. Known Issues
    3. Virtualization
        3.1. Known Issues
    4. Storage and Filesystems
        4.1. Technology Previews
        4.2. Known Issues
    5. Networking
        5.1. Technology Previews
        5.2. Known Issues
    6. Clustering
        6.1. Technology Previews
        6.2. Known Issues
    7. Authentication
        7.1. Technology Previews
        7.2. Known Issues
    8. Security
        8.1. Technology Previews
    9. Devices and Device Drivers
        9.1. Technology Previews
        9.2. Known Issues
    10. Kernel
        10.1. Technology Previews
        10.2. Known Issues
    11. Development and Tools
        11.1. Technology Previews
        11.2. Known Issues
    12. Desktop
        12.1. Known Issues
    A. Package Manifest
    B. Package Updates
    C. Revision History

    Preface
    1. Installation
    2. Kernel
    3. Device Drivers
    4. Networking
    5. Authentication and Interoperability
    6. Security
    7. Subscription Management
    8. Virtualization
    9. Clustering
    10. Storage
    11. Compiler and Tools
    12. General Updates
    A. Component Versions
    B. Revision History

    Preface
    1. Important Changes to External Kernel Parameters
    2. Device Drivers
    3. Technology Previews
    4. Known Issues
    5. New Packages
    6. Updated Packages
    A. Revision History

    Preface
    1. Kernel
    2. Device Drivers
    3. Networking
    4. Resource Management
    5. Authentication and Interoperability
    6. Subscription Management
    7. Virtualization
    8. Clustering and High Availability
    9. Storage
    10. General Updates
    A. Component Versions
    B. Revision History

    Preface
    1. Important Changes to External Kernel Parameters
    2. Technology Previews
    3. Known Issues
    4. New Packages
    5. Package Updates
    A. Revision History

    Preface
    1. Hardware Support
    2. Installation
    3. Kernel
    4. Resource Management
    5. Device Drivers
    6. Storage
    7. File System
    8. Networking
    9. Authentication and Interoperability
    10. Entitlement
    11. Security, Standards and Certification
    12. Compiler and Tools
    13. Clustering
    14. High Availability
    15. Virtualization
    16. Graphics
    17. General Updates
    A. Component Versions
    B. Revision History

    Preface
    1. Technology Previews
    2. Known Issues
    3. New Packages
    4. Package Updates
    A. Revision History

    1. Hardware Support
    2. Kernel
    3. Desktop
    4. Storage
    5. Authentication and Interoperability
    6. Security
    7. Installation
    8. Compiler and Tools
    9. Clustering
    10. Virtualization
    11. Entitlement
    12. General Updates
    A. Revision History

    1. Package Updates
    2. New Packages
    3. Technology Previews
    4. Known Issues
    A. Revision History

    1. Introduction
    2. Installer
    3. File Systems
    4. Storage
    5. Power Management
    6. Package Management
    7. Clustering
    8. Security
    9. Networking
    10. Desktop
    11. Documentation
    12. Kernel
    13. Compiler and Tools
    14. Interoperability
    15. Virtualization
    16. Supportability and Maintenance
    17. Web Servers and Services
    18. Databases
    19. Architecture Specific Notes
    A. Revision History
 1 : Installation Guide (Berikutnya)