![]()
Linux System Administration and Configuration. Related Yo. Linux Configuration and Admin Tutorials. The Linux boot process. Quotas: Assign disk resource limits to users or groups. Managing groups and user security: Linux Networking tutorial. DHCP Server tutorial. NIS Server / Client configuration tutorial. Configuring an internet web server. Apache, DNS, FTP.. Internet Server Security. System optimization: System re- configuration: Commands used to re- configure video, keyboard, mouse, date/time, sound card, NIC, Printer.. Installing a new kernel RPMYo. How to Install Java on Linux. Java allows you run cross-platform applications that can run on Mac OS-X, Linux, and Windows (among other OS's) without modification. Linux Tutorials Index. Monitoring the system: Basic command line: pstree Processes and parent- child relationshipstop Show top processesmpstat Report processors related statistics. Example: mpstat - A(Ubuntu install: apt- get install sysstat)dstat generate system resource statistics report. Examples: dstat - a, dstat - f(Ubuntu install: apt- get install dstat)iostat Report CPU statistics and input/output statistics for devices and partitions. Report virtual memory statisticsstat display file or file system status. Example: stat - f /dev/sda. NFS statistics(Ubuntu install: apt- get install nfs- common). Display Linux kernel version in use. Display Red Hat Linux Release. Also number of users and system's load average. Show who is logged on and what they are doing./sbin/lsmod. List all currently loaded kernel modules. Same as cat /proc/modules/sbin/runlevel. Displays the system's current runlevel. Displays/changes the system's node name. Command will change entry in /etc/hosts)service. Red Hat/Fedora command to display status of system services. Example: service - -status- all. Help: service - -help. Also see ntpstat. Very cool 3- D graphics. Operating system monitor: load, memory, swap, net, disk, .. List of tools. Process Management. Processes execute within their own process environment, they have their own memory, current working directory, priority, process ID, parent process ID and the file access privileges of the user ID under which they execute. To terminate a process. Identify the process. OR. ps - auxw. OR. Kill the process. This will perform an orderly shutdown of the process. The program must be programmed to handle the given signal. See /usr/include/bits/signum. If the software (command) is not written to respond to a particular. For Red. Hat 8. 0+ one must. QT library RPMs to satisfy dependencies. Xt- 2. 3. 1- 8. i. Then install qps: rpm - ivh qps- 1. Note Fedora Core 3: rpm - ivh qt. These older RH 8. AMD6. 4 Fedora Core 3 x. Try it with the process qps itself.). Show output written by process. T . Display the limits of a shell using the bash command. Limits can be set for the number of open files and. Usage: pmap pidtop Show top processessar - B Show statistics on page swapping. Show system page size, page faults, etc of a process during execution. Note you must fully qualify the command as . One may increase/decrease this limit: echo 3. Show memory size and usage. Examination of memory usage: Show system page size: /usr/bin/time - v date .. Page size (bytes): 4. Exit status: 0. Show paging: /usr/bin/time - v firefox .. Used with command line arguments to mount file system. Display filesystems currently in use. Display mounted filesystems currently in use. Displays mount info for NFS filesystems. Displays swap partition(s) size, type and quantity used. Displays disk information held by kernel. Adding an extra hard drive. See commands and dialog of adding a second IDE hard drive). Allocate drive space and register info on the partition table. For more info see SCSI info. See. man page for fstab. Unmount it first. Assign a priority with the . One may also use a swap partition. This is annoying for systems with many file systems because they. The individual file system's mount count may be. Refer to your particular filesystem.). Perform the previous command on all the filesystems to obtain their mount counts. Next change the mount counts for some of them. If not you may get the. Unexpected inconsistency; Run fsck Manually. For files larger than 2. Gb use SGI XFS and the SGI Linux Red Hat RPM or Red Hat ISO CD install image. One may use the raw command for both. IDE and SCSI devices. This info may be. Mount can be interrupted by the kill command. The sync option, however, can lower performance. Causes the NFS server to delay writing to the disk if it suspects another write request is imminent. This can improve performance by reducing the number of times the disk must be accessed by separate write commands, reducing write overhead. This effectively . Alternatively, the no. Clear iptables rules with iptables - F to test. Check the. numbers used in /etc/passwd and /etc/group. Typically this problem is solved by using a single point. Use NIS or LDAP. See the Yo. Linux. com NIS tutorial. Use who - u. H for idle time and terminal info. Show all users logged in. Use id user- id to display info for another user id. Listing of most recent logins by users. Show where from, date and time of login (ftp, ssh, ..) Also see lastlog command. Show last 1. 00 logins: last - 1. Shell command to display previously entered commands. System uses configuration and security defaults set in /etc/default/useradd and /etc/login. Default files from /etc/skel/ will be placed in the users home directory. Default is /bin/bash in most Linux distributions. Purges user from /etc/passwd, group and shadow files. Other files will remain. Thus as a policy it is best to NEVER generate a mount. It is best to mount to /mnt/mount- dir and. The users personal bash shell customizations are held in. HOME/. bashrc. There is. One can. modify or delete users from linuxconf as well. Then select the Passwd button. This will allow you. File Editing Method: - (as root) Edit files to add/remove a user. Create user entry in /etc/passwduser: x: 5. Mr. Dude User: /home/user: /bin/bash. Create group: /etc/groupuser: x: 5. Create home directory. Copy default files: cp - p. R /etc/skel/. The problem this creates is when a file with one system can not. UID. Many systems administrators use the employee ID. This will allow files. This tip is for separate autonomous systems. NFS. Possible values are: # targeted - Only targeted network daemons are protected.# strict - Full SELinux protection. SELINUXTYPE=targeted. One may turn off the SELinux features by setting: SELINUX=disabled(Requires reboot to read new configuration.). Direct setting of enforcement. Enforce. Use command: setenforce 1(Alter SELinux enforcement while kernel is running.). Specify in /etc/grub. Files and directories in current directory and all subdirectories. In many instances one would be logged in as a user and. Here is how. Switch user account to root. Shell/command mode. Since no user id was given, the default is root user. This all would be equivalent to: su - root. Some systems may be configured so that only the switch user. X- window configuration. Often used with grep: dpkg - l . See /var/lib/dpkg/availabledpkg - i package- name. Install package. Keep configuration files. Also see . Remove configuration files. Also see . Keeps configuration files. In this example, apt- get simulates an update. Update the package index on the system. OS release in use. Only the. index (package list) is changed. An update should always be performed. The command will identify all packages. Stop any services. Upgrade all packages on the system to. The command will first. Please satisfy yourself as to. Also, please note that software in. WILL NOT receive any review or updates from the Ubuntu security. Your system is ready.). Remove your public key: (RHEL5). Use YUM.). . My. SQL: 0x. E1. F5). can be obtained from. Great tool for inspecting an RPM package. Removes all files (including config files) of older version during upgrade. Use this with grep to find families of packages. List prerequisites. What packages will break if this RPM is removed. K - -nogpg *. rpm Non sure if RPM downloaded ok? Verify md. 5 sum. RPM Flag. Description- -nodeps RPM flag to force install even if dependency requirements are not met.- -force Overwrite of other packages allowed.- -notriggers Don't execute scripts which are triggered by the installation of this package.- -root /directory- name Use the system chrooted at /directory- name. This means the database will be read or modified under /directory- name. This is often required for RPM's which. Fedora RPM downloads: http: //archives. Fedora/arch/os/Packages/. Use your browser, wget, curl (downloads using http, https, ftp, ..) or ftp the site download. RPM package rpmdb- redhat. Use option - -clean for cleanup. One may also use the command line if managing a remote. This command will perform a hardware inventory. Red Hat knows which software to load. It allows you to define directories to use, actions. It gives you a. chance to unselect packages targeted for upgrade. It will download. RPM packages needed, resolve dependencies and perform a system update. When up. 2date finds the first. You then have to unselect the. It then starts again from the beginning. RPM packages and support files are downloaded. One can. upgrade Red Hat Linux 7 and 8 to 9. Red Hat 8 and 9 can be upgraded to. Fedora Core. Must purchase a license to get this. It will interactively ask permission. Please wait. The following command will reveal if this is true: rpm - q package- name. To install a single package: yum - y install package- name. This will also resolve package dependencies. This is common when installing Firefox . Will also list those which contain the specified regular expression search pattern. Same as rpm - qa. Typically useful for licensed Red Hat Enterprise Linux. It is a collective group of supporting (not dependent) packages and tools. It allows. the administrator to install/update packages from internet repositories. RPMs from the system. The process is launched from one computer. This is ideal for web site maintenance. Also see command dmesg. Log of system init process. File transfer log. Requires the use of the lastlog command to examine contents. Note: The lastlog command. If left unchecked they. The program will. I'm trying to use Pu. TTY v. 5. 8 from a Windows 7 Desktop to log into an Red Hat Linux Enterprise Server and I'm getting the following error: Code: Couldn't agree a client- to- server cipher (available: aes. I believe that all of the Red Hat Linux systems are setup correctly, with the following.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
August 2017
Categories |