Cari di RHE Linux 
    RHE Linux User Manual
Daftar Isi
(Sebelumnya) 12 : HA Resource Behavior - Cl ...13 : Part I. Basic System Conf ... (Berikutnya)

Deployment Guide

Deployment, Configuration and Administration of Red Hat Enterprise Linux 6

Edition 4

Jaromír Hradílek

Red Hat Engineering Content Services

Douglas Silas

Red Hat Engineering Content Services

Martin Prpič

Red Hat Engineering Content Services

Stephen Wadeley

Red Hat Engineering Content Services

Eva Kopalová

Red Hat Engineering Content Services

Ella Deon Lackey

Red Hat Engineering Content Services

Tomáš Čapek

Red Hat Engineering Content Services

Petr Kovář

Red Hat Engineering Content Services

Miroslav Svoboda

Red Hat Engineering Content Services

Petr Bokoč

Red Hat Engineering Content Services

John Ha

Red Hat Engineering Content Services

David O'Brien

Red Hat Engineering Content Services

Michael Hideo

Red Hat Engineering Content Services

Don Domingo

Red Hat Engineering Content Services

Legal Notice

Copyright © 2010-2013 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution-Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
All other trademarks are the property of their respective owners.


1801 Varsity Drive
RaleighNC 27606-2072 USA
Phone: +1 919 754 3700
Phone: 888 733 4281
Fax: +1 919 754 3701

Daftar Isi

Abstract

The Deployment Guide documents relevant information regarding the deployment, configuration and administration of Red Hat Enterprise Linux 6. It is oriented towards system administrators with a basic understanding of the system.
Preface
1. Target Audience
2. How to Read this Book
3. Document Conventions
3.1. Typographic Conventions
3.2. Pull-quote Conventions
3.3. Notes and Warnings
4. Feedback
5. Acknowledgments
I. Basic System Configuration
1. Keyboard Configuration
1.1. Changing the Keyboard Layout
1.2. Adding the Keyboard Layout Indicator
1.3. Setting Up a Typing Break
2. Date and Time Configuration
2.1. Date/Time Properties Tool
2.1.1. Date and Time Properties
2.1.2. Network Time Protocol Properties
2.1.3. Time Zone Properties
2.2. Command Line Configuration
2.2.1. Date and Time Setup
2.2.2. Network Time Protocol Setup
3. Managing Users and Groups
3.1. Introduction to Users and Groups
3.1.1. User Private Groups
3.1.2. Shadow Passwords
3.2. Using the User Manager Tool
3.2.1. Viewing Users and Groups
3.2.2. Adding a New User
3.2.3. Adding a New Group
3.2.4. Modifying User Properties
3.2.5. Modifying Group Properties
3.3. Using Command Line Tools
3.3.1. Adding a New User
3.3.2. Adding a New Group
3.3.3. Creating Group Directories
3.4. Additional Resources
3.4.1. Installed Documentation
4. Gaining Privileges
4.1. The su Command
4.2. The sudo Command
4.3. Additional Resources
II. Package Management
5. Registering a System and Managing Subscriptions
5.1. Using Red Hat Subscription Manager Tools
5.1.1. Launching the Red Hat Subscription Manager GUI
5.1.2. Running the subscription-manager Command-Line Tool
5.2. Registering and Unregistering a System
5.2.1. Registering from the GUI
5.2.2. Registering from the Command Line
5.2.3. Unregistering
5.3. Attaching and Removing Subscriptions
5.3.1. Attaching and Removing Subscriptions through the GUI
5.3.2. Attaching and Removing Subscriptions through the Command Line
5.4. Redeeming Vendor Subscriptions
5.4.1. Redeeming Subscriptions through the GUI
5.4.2. Redeeming Subscriptions through the Command Line
5.5. Attaching Subscriptions from a Subscription Asset Manager Activation Key
5.6. Setting Preferences for Systems
5.6.1. Setting Preferences in the UI
5.6.2. Setting Service Levels Through the Command Line
5.6.3. Setting a Preferred Operating System Release Version in the Command Line
5.7. Managing Subscription Expiration and Notifications
6. Yum
6.1. Checking For and Updating Packages
6.1.1. Checking For Updates
6.1.2. Updating Packages
6.1.3. Preserving Configuration File Changes
6.2. Packages and Package Groups
6.2.1. Searching Packages
6.2.2. Listing Packages
6.2.3. Displaying Package Information
6.2.4. Installing Packages
6.2.5. Removing Packages
6.2.6. Working with Transaction History
6.3. Configuring Yum and Yum Repositories
6.3.1. Setting [main] Options
6.3.2. Setting [repository] Options
6.3.3. Using Yum Variables
6.3.4. Viewing the Current Configuration
6.3.5. Adding, Enabling, and Disabling a Yum Repository
6.3.6. Creating a Yum Repository
6.4. Yum Plug-ins
6.4.1. Enabling, Configuring, and Disabling Yum Plug-ins
6.4.2. Installing Additional Yum Plug-ins
6.4.3. Plug-in Descriptions
6.5. Additional Resources
7. PackageKit
7.1. Updating Packages with Software Update
7.2. Using Add/Remove Software
7.2.1. Refreshing Software Sources (Yum Repositories)
7.2.2. Finding Packages with Filters
7.2.3. Installing and Removing Packages (and Dependencies)
7.2.4. Installing and Removing Package Groups
7.2.5. Viewing the Transaction Log
7.3. PackageKit Architecture
7.4. Additional Resources
III. Networking
8. NetworkManager
8.1. The NetworkManager Daemon
8.2. Interacting with NetworkManager
8.2.1. Connecting to a Network
8.2.2. Configuring New and Editing Existing Connections
8.2.3. Connecting to a Network Automatically
8.2.4. User and System Connections
8.3. Establishing Connections
8.3.1. Establishing a Wired (Ethernet) Connection
8.3.2. Establishing a Wireless Connection
8.3.3. Establishing a Mobile Broadband Connection
8.3.4. Establishing a VPN Connection
8.3.5. Establishing a DSL Connection
8.3.6. Establishing a Bond Connection
8.3.7. Establishing a VLAN Connection
8.3.8. Establishing an IP-over-InfiniBand (IPoIB) Connection
8.3.9. Configuring Connection Settings
8.4. NetworkManager Architecture
9. Network Interfaces
9.1. Network Configuration Files
9.2. Interface Configuration Files
9.2.1. Ethernet Interfaces
9.2.2. Specific ifcfg Options for Linux on System z
9.2.3. Required ifcfg Options for Linux on System z
9.2.4. Ethtool
9.2.5. Channel Bonding Interfaces
9.2.6. Network Bridge
9.2.7. Setting Up 802.1q VLAN Tagging
9.2.8. Alias and Clone Files
9.2.9. Dialup Interfaces
9.2.10. Other Interfaces
9.3. Interface Control Scripts
9.4. Static Routes and the Default Gateway
9.5. Network Function Files
9.6. Additional Resources
9.6.1. Installed Documentation
9.6.2. Useful Websites
IV. Infrastructure Services
10. Services and Daemons
10.1. Configuring the Default Runlevel
10.2. Configuring the Services
10.2.1. Using the Service Configuration Utility
10.2.2. Using the ntsysv Utility
10.2.3. Using the chkconfig Utility
10.3. Running Services
10.3.1. Determining the Service Status
10.3.2. Starting a Service
10.3.3. Stopping a Service
10.3.4. Restarting a Service
10.4. Additional Resources
10.4.1. Installed Documentation
10.4.2. Related Books
11. Configuring Authentication
11.1. Configuring System Authentication
11.1.1. Launching the Authentication Configuration Tool UI
11.1.2. Selecting the Identity Store for Authentication
11.1.3. Configuring Alternative Authentication Features
11.1.4. Configuring Authentication from the Command Line
11.1.5. Using Custom Home Directories
11.2. Using and Caching Credentials with SSSD
11.2.1. About SSSD
11.2.2. Setting up the sssd.conf File
11.2.3. Starting and Stopping SSSD
11.2.4. SSSD and System Services
11.2.5. Configuring Services: NSS
11.2.6. Configuring Services: PAM
11.2.7. Configuring Services: autofs
11.2.8. Configuring Services: sudo
11.2.9. Configuring Services: OpenSSH and Cached Keys
11.2.10. SSSD and Identity Providers (Domains)
11.2.11. Creating Domains: LDAP
11.2.12. Creating Domains: Identity Management (IdM)
11.2.13. Creating Domains: Active Directory
11.2.14. Domain Options: Setting Username Formats
11.2.15. Domain Options: Enabling Offline Authentication
11.2.16. Domain Options: Setting Password Expirations
11.2.17. Domain Options: Using DNS Service Discovery
11.2.18. Domain Options: Using IP Addresses in Certificate Subject Names (LDAP Only)
11.2.19. Creating Domains: Proxy
11.2.20. Creating Domains: Kerberos Authentication
11.2.21. Creating Domains: Access Control
11.2.22. Creating Domains: Primary Server and Backup Servers
11.2.23. Installing SSSD Utilities
11.2.24. Creatig Local System Users
11.2.25. Seeding Users into the SSSD Cache During Kickstart
11.2.26. Managing the SSSD Cache
11.2.27. Using NSCD with SSSD
11.2.28. Troubleshooting SSSD
12. OpenSSH
12.1. The SSH Protocol
12.1.1. Why Use SSH?
12.1.2. Main Features
12.1.3. Protocol Versions
12.1.4. Event Sequence of an SSH Connection
12.2. Configuring OpenSSH
12.2.1. Configuration Files
12.2.2. Starting an OpenSSH Server
12.2.3. Requiring SSH for Remote Connections
12.2.4. Using a Key-Based Authentication
12.3. OpenSSH Clients
12.3.1. Using the ssh Utility
12.3.2. Using the scp Utility
12.3.3. Using the sftp Utility
12.4. More Than a Secure Shell
12.4.1. X11 Forwarding
12.4.2. Port Forwarding
12.5. Additional Resources
12.5.1. Installed Documentation
12.5.2. Useful Websites
V. Servers
13. DHCP Servers
13.1. Why Use DHCP?
13.2. Configuring a DHCP Server
13.2.1. Configuration File
13.2.2. Lease Database
13.2.3. Starting and Stopping the Server
13.2.4. DHCP Relay Agent
13.3. Configuring a DHCP Client
13.4. Configuring a Multihomed DHCP Server
13.4.1. Host Configuration
13.5. DHCP for IPv6 (DHCPv6)
13.6. Additional Resources
13.6.1. Installed Documentation
14. DNS Servers
14.1. Introduction to DNS
14.1.1. Nameserver Zones
14.1.2. Nameserver Types
14.1.3. BIND as a Nameserver
14.2. BIND
14.2.1. Configuring the named Service
14.2.2. Editing Zone Files
14.2.3. Using the rndc Utility
14.2.4. Using the dig Utility
14.2.5. Advanced Features of BIND
14.2.6. Common Mistakes to Avoid
14.2.7. Additional Resources
15. Web Servers
15.1. The Apache HTTP Server
15.1.1. New Features
15.1.2. Notable Changes
15.1.3. Updating the Configuration
15.1.4. Running the httpd Service
15.1.5. Editing the Configuration Files
15.1.6. Working with Modules
15.1.7. Setting Up Virtual Hosts
15.1.8. Setting Up an SSL Server
15.1.9. Additional Resources
16. Mail Servers
16.1. Email Protocols
16.1.1. Mail Transport Protocols
16.1.2. Mail Access Protocols
16.2. Email Program Classifications
16.2.1. Mail Transport Agent
16.2.2. Mail Delivery Agent
16.2.3. Mail User Agent
16.3. Mail Transport Agents
16.3.1. Postfix
16.3.2. Sendmail
16.3.3. Fetchmail
16.3.4. Mail Transport Agent (MTA) Configuration
16.4. Mail Delivery Agents
16.4.1. Procmail Configuration
16.4.2. Procmail Recipes
16.5. Mail User Agents
16.5.1. Securing Communication
16.6. Additional Resources
16.6.1. Installed Documentation
16.6.2. Useful Websites
16.6.3. Related Books
17. Directory Servers
17.1. OpenLDAP
17.1.1. Introduction to LDAP
17.1.2. Installing the OpenLDAP Suite
17.1.3. Configuring an OpenLDAP Server
17.1.4. Running an OpenLDAP Server
17.1.5. Configuring a System to Authenticate Using OpenLDAP
17.1.6. Additional Resources
18. File and Print Servers
18.1. Samba
18.1.1. Introduction to Samba
18.1.2. Samba Daemons and Related Services
18.1.3. Connecting to a Samba Share
18.1.4. Configuring a Samba Server
18.1.5. Starting and Stopping Samba
18.1.6. Samba Server Types and the smb.conf File
18.1.7. Samba Security Modes
18.1.8. Samba Account Information Databases
18.1.9. Samba Network Browsing
18.1.10. Samba with CUPS Printing Support
18.1.11. Samba Distribution Programs
18.1.12. Additional Resources
18.2. FTP
18.2.1. The File Transfer Protocol
18.2.2. The vsftpd Server
18.2.3. Files Installed with vsftpd
18.2.4. Starting and Stopping vsftpd
18.2.5. vsftpd Configuration Options
18.2.6. Additional Resources
18.3. Printer Configuration
18.3.1. Starting the Printer Configuration Tool
18.3.2. Starting Printer Setup
18.3.3. Adding a Local Printer
18.3.4. Adding an AppSocket/HP JetDirect printer
18.3.5. Adding an IPP Printer
18.3.6. Adding an LPD/LPR Host or Printer
18.3.7. Adding a Samba (SMB) printer
18.3.8. Selecting the Printer Model and Finishing
18.3.9. Printing a Test Page
18.3.10. Modifying Existing Printers
18.3.11. Additional Resources
VI. Monitoring and Automation
19. System Monitoring Tools
19.1. Viewing System Processes
19.1.1. Using the ps Command
19.1.2. Using the top Command
19.1.3. Using the System Monitor Tool
19.2. Viewing Memory Usage
19.2.1. Using the free Command
19.2.2. Using the System Monitor Tool
19.3. Viewing CPU Usage
19.3.1. Using the System Monitor Tool
19.4. Viewing Block Devices and File Systems
19.4.1. Using the lsblk Command
19.4.2. Using the blkid Command
19.4.3. Using the findmnt Command
19.4.4. Using the df Command
19.4.5. Using the du Command
19.4.6. Using the System Monitor Tool
19.5. Viewing Hardware Information
19.5.1. Using the lspci Command
19.5.2. Using the lsusb Command
19.5.3. Using the lspcmcia Command
19.5.4. Using the lscpu Command
19.6. Monitoring Performance with Net-SNMP
19.6.1. Installing Net-SNMP
19.6.2. Running the Net-SNMP Daemon
19.6.3. Configuring Net-SNMP
19.6.4. Retrieving Performance Data over SNMP
19.6.5. Extending Net-SNMP
19.7. Additional Resources
19.7.1. Installed Documentation
20. Viewing and Managing Log Files
20.1. Configuring rsyslog
20.1.1. Global Directives
20.1.2. Modules
20.1.3. Rules
20.1.4. rsyslog Command Line Configuration
20.2. Locating Log Files
20.2.1. Configuring logrotate
20.3. Viewing Log Files
20.4. Adding a Log File
20.5. Monitoring Log Files
20.6. Additional Resources
20.6.1. Installed Documentation
20.6.2. Useful Websites
21. Automating System Tasks
21.1. Cron and Anacron
21.1.1. Installing Cron and Anacron
21.1.2. Running the Crond Service
21.1.3. Configuring Anacron Jobs
21.1.4. Configuring Cron Jobs
21.1.5. Controlling Access to Cron
21.1.6. Black and White Listing of Cron Jobs
21.2. At and Batch
21.2.1. Installing At and Batch
21.2.2. Running the At Service
21.2.3. Configuring an At Job
21.2.4. Configuring a Batch Job
21.2.5. Viewing Pending Jobs
21.2.6. Additional Command Line Options
21.2.7. Controlling Access to At and Batch
21.3. Additional Resources
22. Automatic Bug Reporting Tool (ABRT)
22.1. Installing ABRT and Starting its Services
22.2. Using the Graphical User Interface
22.3. Using the Command Line Interface
22.3.1. Viewing Problems
22.3.2. Reporting Problems
22.3.3. Deleting Problems
22.4. Configuring ABRT
22.4.1. ABRT Events
22.4.2. Standard ABRT Installation Supported Events
22.4.3. Event Configuration in ABRT GUI
22.4.4. ABRT Specific Configuration
22.4.5. Configuring ABRT to Detect a Kernel Panic
22.4.6. Automatic Downloads and Installation of Debuginfo Packages
22.4.7. Configuring Automatic Reporting
22.4.8. Uploading and Reporting Using a Proxy Server
22.5. Configuring Centralized Crash Collection
22.5.1. Configuration Steps Required on a Dedicated System
22.5.2. Configuration Steps Required on a Client System
22.5.3. Saving Package Information
22.5.4. Testing ABRT's Crash Detection
23. OProfile
23.1. Overview of Tools
23.2. Configuring OProfile
23.2.1. Specifying the Kernel
23.2.2. Setting Events to Monitor
23.2.3. Separating Kernel and User-space Profiles
23.3. Starting and Stopping OProfile
23.4. Saving Data
23.5. Analyzing the Data
23.5.1. Using opreport
23.5.2. Using opreport on a Single Executable
23.5.3. Getting more detailed output on the modules
23.5.4. Using opannotate
23.6. Understanding /dev/oprofile/
23.7. Example Usage
23.8. OProfile Support for Java
23.8.1. Profiling Java Code
23.9. Graphical Interface
23.10. OProfile and SystemTap
23.11. Additional Resources
23.11.1. Installed Docs
23.11.2. Useful Websites
VII. Kernel, Module and Driver Configuration
24. Manually Upgrading the Kernel
24.1. Overview of Kernel Packages
24.2. Preparing to Upgrade
24.3. Downloading the Upgraded Kernel
24.4. Performing the Upgrade
24.5. Verifying the Initial RAM Disk Image
24.6. Verifying the Boot Loader
24.6.1. Configuring the GRUB Boot Loader
24.6.2. Configuring the OS/400 Boot Loader
24.6.3. Configuring the YABOOT Boot Loader
25. Working with Kernel Modules
25.1. Listing Currently-Loaded Modules
25.2. Displaying Information About a Module
25.3. Loading a Module
25.4. Unloading a Module
25.5. Setting Module Parameters
25.6. Persistent Module Loading
25.7. Specific Kernel Module Capabilities
25.7.1. Using Multiple Ethernet Cards
25.7.2. Using Channel Bonding
25.8. Additional Resources
26. The kdump Crash Recovery Service
26.1. Installing the kdump Service
26.2. Configuring the kdump Service
26.2.1. Configuring the kdump at First Boot
26.2.2. Using the Kernel Dump Configuration Utility
26.2.3. Configuring kdump on the Command Line
26.2.4. Testing the Configuration
26.3. Analyzing the Core Dump
26.3.1. Running the crash Utility
26.3.2. Displaying the Message Buffer
26.3.3. Displaying a Backtrace
26.3.4. Displaying a Process Status
26.3.5. Displaying Virtual Memory Information
26.3.6. Displaying Open Files
26.3.7. Exiting the Utility
26.4. Additional Resources
26.4.1. Installed Documentation
26.4.2. Useful Websites
A. Consistent Network Device Naming
A.1. Affected Systems
A.2. System Requirements
A.3. Enabling and Disabling the Feature
A.4. Notes for Administrators
B. RPM
B.1. RPM Design Goals
B.2. Using RPM
B.2.1. Finding RPM Packages
B.2.2. Installing and Upgrading
B.2.3. Configuration File Changes
B.2.4. Uninstalling
B.2.5. Freshening
B.2.6. Querying
B.2.7. Verifying
B.3. Checking a Package's Signature
B.3.1. Importing Keys
B.3.2. Verifying Signature of Packages
B.4. Practical and Common Examples of RPM Usage
B.5. Additional Resources
B.5.1. Installed Documentation
B.5.2. Useful Websites
B.5.3. Related Books
C. The X Window System
C.1. The X Server
C.2. Desktop Environments and Window Managers
C.2.1. Desktop Environments
C.2.2. Window Managers
C.3. X Server Configuration Files
C.3.1. The Structure of the Configuration
C.3.2. The xorg.conf.d Directory
C.3.3. The xorg.conf File
C.4. Fonts
C.4.1. Adding Fonts to Fontconfig
C.5. Runlevels and X
C.5.1. Runlevel 3
C.5.2. Runlevel 5
C.6. Additional Resources
C.6.1. Installed Documentation
C.6.2. Useful Websites
D. The sysconfig Directory
D.1. Files in the /etc/sysconfig/ Directory
D.1.1. /etc/sysconfig/arpwatch
D.1.2. /etc/sysconfig/authconfig
D.1.3. /etc/sysconfig/autofs
D.1.4. /etc/sysconfig/clock
D.1.5. /etc/sysconfig/dhcpd
D.1.6. /etc/sysconfig/firstboot
D.1.7. /etc/sysconfig/i18n
D.1.8. /etc/sysconfig/init
D.1.9. /etc/sysconfig/ip6tables-config
D.1.10. /etc/sysconfig/keyboard
D.1.11. /etc/sysconfig/ldap
D.1.12. /etc/sysconfig/named
D.1.13. /etc/sysconfig/network
D.1.14. /etc/sysconfig/ntpd
D.1.15. /etc/sysconfig/quagga
D.1.16. /etc/sysconfig/radvd
D.1.17. /etc/sysconfig/samba
D.1.18. /etc/sysconfig/saslauthd
D.1.19. /etc/sysconfig/selinux
D.1.20. /etc/sysconfig/sendmail
D.1.21. /etc/sysconfig/spamassassin
D.1.22. /etc/sysconfig/squid
D.1.23. /etc/sysconfig/system-config-users
D.1.24. /etc/sysconfig/vncservers
D.1.25. /etc/sysconfig/xinetd
D.2. Directories in the /etc/sysconfig/ Directory
D.3. Additional Resources
D.3.1. Installed Documentation
E. The proc File System
E.1. A Virtual File System
E.1.1. Viewing Virtual Files
E.1.2. Changing Virtual Files
E.2. Top-level Files within the proc File System
E.2.1. /proc/buddyinfo
E.2.2. /proc/cmdline
E.2.3. /proc/cpuinfo
E.2.4. /proc/crypto
E.2.5. /proc/devices
E.2.6. /proc/dma
E.2.7. /proc/execdomains
E.2.8. /proc/fb
E.2.9. /proc/filesystems
E.2.10. /proc/interrupts
E.2.11. /proc/iomem
E.2.12. /proc/ioports
E.2.13. /proc/kcore
E.2.14. /proc/kmsg
E.2.15. /proc/loadavg
E.2.16. /proc/locks
E.2.17. /proc/mdstat
E.2.18. /proc/meminfo
E.2.19. /proc/misc
E.2.20. /proc/modules
E.2.21. /proc/mounts
E.2.22. /proc/mtrr
E.2.23. /proc/partitions
E.2.24. /proc/slabinfo
E.2.25. /proc/stat
E.2.26. /proc/swaps
E.2.27. /proc/sysrq-trigger
E.2.28. /proc/uptime
E.2.29. /proc/version
E.3. Directories within /proc/
E.3.1. Process Directories
E.3.2. /proc/bus/
E.3.3. /proc/bus/pci
E.3.4. /proc/driver/
E.3.5. /proc/fs
E.3.6. /proc/irq/
E.3.7. /proc/net/
E.3.8. /proc/scsi/
E.3.9. /proc/sys/
E.3.10. /proc/sysvipc/
E.3.11. /proc/tty/
E.3.12. /proc/PID/
E.4. Using the sysctl Command
E.5. Additional Resources
E.5.1. Installed Documentation
E.5.2. Useful Websites
F. Revision History
Index

Preface

The Deployment Guide contains information on how to customize the Red Hat Enterprise Linux 6 system to fit your needs. If you are looking for a comprehensive, task-oriented guide for configuring and customizing your system, this is the manual for you.
This manual discusses many intermediate topics such as the following:
  • Installing and managing packages using the graphical PackageKit and command line Yum package managers
  • Setting up a network-from establishing an Ethernet connection using NetworkManager to configuring channel bonding interfaces to increase server bandwidth
  • Configuring DHCP, BIND, Apache HTTP Server, Postfix, Sendmail and other enterprise-class servers and software
  • Gathering information about your system, including obtaining user-space crash data with the Automatic Bug Reporting Tool, and kernel-space crash data with kdump
  • Easily working with kernel modules and upgrading the kernel

1. Target Audience

The Deployment Guide assumes you have a basic understanding of the Red Hat Enterprise Linux operating system. If you need help with the installation of this system, refer to the Red Hat Enterprise Linux 6 Installation Guide.

2. How to Read this Book

This manual is divided into the following main categories:
Part I, "Basic System Configuration"
This part covers basic system administration tasks such as keyboard configuration, date and time configuration, managing users and groups, and gaining privileges.
Chapter 1, Keyboard Configuration covers basic keyboard setup. Read this chapter if you need to change the keyboard layout, add the Keyboard Indicator applet to the panel, or enforce a periodic typing brake.
Chapter 2, Date and Time Configuration covers the configuration of the system date and time. Read this chapter if you need to change the date and time setup, or configure the system to synchronize the clock with a remote Network Time Protocol (NTP) server.
Chapter 3, Managing Users and Groups covers the management of users and groups in a graphical user interface and on the command line. Read this chapter if you need to manage users and groups on your system, or enable password aging.
Chapter 4, Gaining Privileges documents how to gain administrative privileges. Read this chapter to learn how to use the su and sudo commands.
Part II, "Package Management"
This part focuses on product subscriptions and entitlements, and describes how to manage software packages on Red Hat Enterprise Linux using both Yum and the PackageKit suite of graphical package management tools.
Chapter 5, Registering a System and Managing Subscriptions provides an overview of subscription management in Red Hat Enterprise Linux and the Red Hat Subscription Manager tools which are available. Read this chapter to learn how to register or unregister a system, activate a machine, and handle product subscriptions and entitlements.
Chapter 6, Yum describes the Yum package manager. Read this chapter for information how to search, install, update, and uninstall packages on the command line.
Chapter 7, PackageKit describes the PackageKit suite of graphical package management tools. Read this chapter for information how to search, install, update, and uninstall packages using a graphical user interface.
Part III, "Networking"
This part describes how to configure the network on Red Hat Enterprise Linux.
Chapter 8, NetworkManager focuses on NetworkManager, a dynamic network control and configuration system that attempts to keep network devices and connections up and active when they are available. Read this chapter for information how to run the NetworkManager daemon, and how to interact with it using the corresponding applet for the notification area.
Chapter 9, Network Interfaces explores various interface configuration files, interface control scripts, and network function files located in the /etc/sysconfig/network-scripts/ directory. Read this chapter for information how to use these files to configure network interfaces.
Part IV, "Infrastructure Services"
This part provides information how to configure services and daemons, configure authentication, and enable remote logins.
Chapter 10, Services and Daemons explains the concept of runlevels, and describes how to set the default one. It also covers the configuration of the services to be run in each of these runlevels, and provides information on how to start, stop, and restart a service. Read this chapter to learn how to manage services on your system.
Chapter 11, Configuring Authentication describes how to configure user information retrieval from Lightweight Directory Access Protocol (LDAP), Network Information Service (NIS), and Winbind user account databases, and provides an introduction to the System Security Services Daemon (SSSD). Read this chapter if you need to configure authentication on your system.
Chapter 12, OpenSSH describes how to enable a remote login via the SSH protocol. It covers the configuration of the sshd service, as well as a basic usage of the ssh, scp, sftp client utilities. Read this chapter if you need a remote access to a machine.
Part V, "Servers"
This part discusses various topics related to servers such as how to set up a web server or share files and directories over the network.
Chapter 13, DHCP Servers guides you through the installation of a Dynamic Host Configuration Protocol (DHCP) server and client. Read this chapter if you need to configure DHCP on your system.
Chapter 14, DNS Servers introduces you to Domain Name System (DNS), explains how to install, configure, run, and administer the BIND DNS server. Read this chapter if you need to configure a DNS server on your system.
Chapter 15, Web Servers focuses on the Apache HTTP Server 2.2, a robust, full-featured open source web server developed by the Apache Software Foundation. Read this chapter if you need to configure a web server on your system.
Chapter 16, Mail Servers reviews modern email protocols in use today, and some of the programs designed to send and receive email, including Postfix, Sendmail, Fetchmail, and Procmail. Read this chapter if you need to configure a mail server on your system.
Chapter 17, Directory Servers covers the installation and configuration of OpenLDAP 2.4, an open source implementation of the LDAPv2 and LDAPv3 protocols. Read this chapter if you need to configure a directory server on your system.
Chapter 18, File and Print Servers guides you through the installation and configuration of Samba, an open source implementation of the Server Message Block (SMB) protocol, and vsftpd, the primary FTP server shipped with Red Hat Enterprise Linux. Additionally, it explains how to use the Printer Configuration tool to configure printers. Read this chapter if you need to configure a file or print server on your system.
Part VI, "Monitoring and Automation"
This part describes various tools that allow system administrators to monitor system performance, automate system tasks, and report bugs.
Chapter 19, System Monitoring Tools discusses applications and commands that can be used to retrieve important information about the system. Read this chapter to learn how to gather essential system information.
Chapter 20, Viewing and Managing Log Files describes the configuration of the rsyslog daemon, and explains how to locate, view, and monitor log files. Read this chapter to learn how to work with log files.
Chapter 21, Automating System Tasks provides an overview of the cron, at, and batch utilities. Read this chapter to learn how to use these utilities to perform automated tasks.
Chapter 22, Automatic Bug Reporting Tool (ABRT) concentrates on ABRT, a system service and a set of tools to collect crash data and send a report to the relevant issue tracker. Read this chapter to learn how to use ABRT on your system.
Chapter 23, OProfile covers OProfile, a low overhead, system-wide performance monitoring tool. Read this chapter for information how to use OProfile on your system.
Part VII, "Kernel, Module and Driver Configuration"
This part covers various tools that assist administrators with kernel customization.
Chapter 24, Manually Upgrading the Kernel provides important information how to manually update a kernel package using the rpm command instead of yum. Read this chapter if you cannot update a kernel package with the Yum package manager.
Chapter 25, Working with Kernel Modules explains how to display, query, load, and unload kernel modules and their dependencies, and how to set module parameters. Additionally, it covers specific kernel module capabilities such as using multiple Ethernet cards and using channel bonding. Read this chapter if you need to work with kernel modules.
Chapter 26, The kdump Crash Recovery Service explains how to configure, test, and use the kdump service in Red Hat Enterprise Linux, and provides a brief overview of how to analyze the resulting core dump using the crash debugging utility. Read this chapter to learn how to enable kdump on your system.
Appendix A, Consistent Network Device Naming
This appendix covers consistent network device naming for network interfaces, a feature that changes the name of network interfaces on a system in order to make locating and differentiating the interfaces easier. Read this appendix to learn more about this feature and how to enable or disable it.
Appendix B, RPM
This appendix concentrates on the RPM Package Manager (RPM), an open packaging system used by Red Hat Enterprise Linux, and the use of the rpm utility. Read this appendix if you need to use rpm instead of yum.
Appendix C, The X Window System
This appendix covers the configuration of the X Window System, the graphical environment used by Red Hat Enterprise Linux. Read this appendix if you need to adjust the configuration of your X Window System.
Appendix D, The sysconfig Directory
This appendix outlines some of the files and directories located in the /etc/sysconfig/ directory. Read this appendix if you want to learn more about these files and directories, their function, and their contents.
Appendix E, The proc File System
This appendix explains the concept of a virtual file system, and describes some of the top-level files and directories within the proc file system (that is, the /proc/ directory). Read this appendix if you want to learn more about this file system.

3. Document Conventions

This manual uses several conventions to highlight certain words and phrases and draw attention to specific pieces of information.
In PDF and paper editions, this manual uses typefaces drawn from the Liberation Fonts set. The Liberation Fonts set is also used in HTML editions if the set is installed on your system. If not, alternative but equivalent typefaces are displayed. Note: Red Hat Enterprise Linux 5 and later includes the Liberation Fonts set by default.

3.1. Typographic Conventions

Four typographic conventions are used to call attention to specific words and phrases. These conventions, and the circumstances they apply to, are as follows.
Mono-spaced Bold
Used to highlight system input, including shell commands, file names and paths. Also used to highlight keys and key combinations. For example:
To see the contents of the file my_next_bestselling_novel in your current working directory, enter the cat my_next_bestselling_novel command at the shell prompt and press Enter to execute the command.
The above includes a file name, a shell command and a key, all presented in mono-spaced bold and all distinguishable thanks to context.
Key combinations can be distinguished from an individual key by the plus sign that connects each part of a key combination. For example:
Press Enter to execute the command.
Press Ctrl+Alt+F2 to switch to a virtual terminal.
The first example highlights a particular key to press. The second example highlights a key combination: a set of three keys pressed simultaneously.
If source code is discussed, class names, methods, functions, variable names and returned values mentioned within a paragraph will be presented as above, in mono-spaced bold. For example:
File-related classes include filesystem for file systems, file for files, and dir for directories. Each class has its own associated set of permissions.
Proportional Bold
This denotes words or phrases encountered on a system, including application names; dialog box text; labeled buttons; check-box and radio button labels; menu titles and sub-menu titles. For example:
Choose SystemPreferencesMouse from the main menu bar to launch Mouse Preferences. In the Buttons tab, click the Left-handed mouse check box and click Close to switch the primary mouse button from the left to the right (making the mouse suitable for use in the left hand).
To insert a special character into a gedit file, choose ApplicationsAccessoriesCharacter Map from the main menu bar. Next, choose SearchFind… from the Character Map menu bar, type the name of the character in the Search field and click Next. The character you sought will be highlighted in the Character Table. Double-click this highlighted character to place it in the Text to copy field and then click the Copy button. Now switch back to your document and choose EditPaste from the gedit menu bar.
The above text includes application names; system-wide menu names and items; application-specific menu names; and buttons and text found within a GUI interface, all presented in proportional bold and all distinguishable by context.
Mono-spaced Bold Italic or Proportional Bold Italic
Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable or variable text. Italics denotes text you do not input literally or displayed text that changes depending on circumstance. For example:
To connect to a remote machine using ssh, type ssh username@domain.name at a shell prompt. If the remote machine is example.com and your username on that machine is john, type ssh [email protected].
The mount -o remount file-system command remounts the named file system. For example, to remount the /home file system, the command is mount -o remount /home.
To see the version of a currently installed package, use the rpm -q package command. It will return a result as follows: package-version-release.
Note the words in bold italics above - username, domain.name, file-system, package, version and release. Each word is a placeholder, either for text you enter when issuing a command or for text displayed by the system.
Aside from standard usage for presenting the title of a work, italics denotes the first use of a new and important term. For example:
Publican is a DocBook publishing system.

3.2. Pull-quote Conventions

Terminal output and source code listings are set off visually from the surrounding text.
Output sent to a terminal is set in mono-spaced roman and presented thus:
books Desktop   documentation  drafts  mss photos   stuff  svnbooks_tests  Desktop1  downloads  images  notes  scripts  svgs
Source-code listings are also set in mono-spaced roman but add syntax highlighting as follows:
package org.jboss.book.jca.ex1;import javax.naming.InitialContext;public class ExClient{   public static void main(String args[]) throws Exception   {  InitialContext iniCtx = new InitialContext();  Object ref = iniCtx.lookup("EchoBean");  EchoHome   home   = (EchoHome) ref;  Echo   echo   = home.create();  System.out.println("Created Echo");  System.out.println("Echo.echo('Hello') = " + echo.echo("Hello"));   }}

3.3. Notes and Warnings

Finally, we use three visual styles to draw attention to information that might otherwise be overlooked.

Note

Notes are tips, shortcuts or alternative approaches to the task at hand. Ignoring a note should have no negative consequences, but you might miss out on a trick that makes your life easier.

Important

Important boxes detail things that are easily missed: configuration changes that only apply to the current session, or services that need restarting before an update will apply. Ignoring a box labeled 'Important' will not cause data loss but may cause irritation and frustration.

Warning

Warnings should not be ignored. Ignoring warnings will most likely cause data loss.

4. Feedback

If you find a typographical error in this manual, or if you have thought of a way to make this manual better, we would love to hear from you! Please submit a report in Bugzilla against the product Red Hat Enterprise Linux 6.
When submitting a bug report, be sure to provide the following information:
  • Manual's identifier: doc-Deployment_Guide
  • Version number: 6
If you have a suggestion for improving the documentation, try to be as specific as possible when describing it. If you have found an error, please include the section number and some of the surrounding text so we can find it easily.

5. Acknowledgments

Certain portions of this text first appeared in the Deployment Guide, copyright © 2007 Red Hat, Inc., available at http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/index.html.
Section 19.6, "Monitoring Performance with Net-SNMP" is based on an article written by Michael Solberg.
The authors of this book would like to thank the following people for their valuable contributions: Adam Tkáč, Andrew Fitzsimon, Andrius Benokraitis, Brian Cleary Edward Bailey, Garrett LeSage, Jeffrey Fearn, Joe Orton, Joshua Wulf, Karsten Wade, Lucy Ringland, Marcela Mašláňová, Mark Johnson, Michael Behm, Miroslav Lichvár, Radek Vokál, Rahul Kavalapara, Rahul Sundaram, Sandra Moore, Zbyšek Mráz, Jan Včelák, Peter Hutterer and James Antill, among many others.
(Sebelumnya) 12 : HA Resource Behavior - Cl ...13 : Part I. Basic System Conf ... (Berikutnya)