Red Hat Enterprise Linux 4 System Administration Guide

Red Hat Enterprise Linux 4 System Administration Guide

Red Hat Enterprise Linux 4 System Administration Guide Red Hat Enterprise Linux 4: System Administration Guide Copyright © 2005 Red Hat, Inc. Red Hat, Inc. 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA rhel-sag(EN)-4-Print-RHI (2005-06-06T17:10U1) Copyright © 2005 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. The GPG fingerprint of the [email protected] key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E Table of Contents Introduction.......................................................................................................................................... i 1. Changes To This Manual ....................................................................................................... i 2. Architecture-specific Information ......................................................................................... ii 3. Document Conventions ......................................................................................................... ii 4. Activate Your Subscription ................................................................................................... v 4.1. Provide a Red Hat Login........................................................................................ v 4.2. Provide Your Subscription Number ....................................................................... v 4.3. Connect Your System............................................................................................ vi 5. Using the Mouse .................................................................................................................. vi 6. Copying and Pasting Text With X........................................................................................ vi 7. More to Come ...................................................................................................................... vi 7.1. Send in Your Feedback ......................................................................................... vi I. Installation-Related Information .................................................................................................... i 1. Kickstart Installations ........................................................................................................... 1 1.1. What are Kickstart Installations? ........................................................................... 1 1.2. How Do You Perform a Kickstart Installation? ..................................................... 1 1.3. Creating the Kickstart File ..................................................................................... 1 1.4. Kickstart Options ................................................................................................... 2 1.5. Package Selection ................................................................................................ 18 1.6. Pre-installation Script........................................................................................... 19 1.7. Post-installation Script ......................................................................................... 21 1.8. Making the Kickstart File Available .................................................................... 22 1.9. Making the Installation Tree Available ................................................................ 23 1.10. Starting a Kickstart Installation ......................................................................... 24 2. Kickstart Configurator ..................................................................................................... 27 2.1. Basic Configuration ............................................................................................. 27 2.2. Installation Method .............................................................................................. 28 2.3. Boot Loader Options............................................................................................ 30 2.4. Partition Information............................................................................................ 30 2.5. Network Configuration ........................................................................................ 33 2.6. Authentication ...................................................................................................... 34 2.7. Firewall Configuration ......................................................................................... 35 2.8. Display Configuration .......................................................................................... 36 2.9. Package Selection ................................................................................................ 39 2.10. Pre-Installation Script ........................................................................................ 39 2.11. Post-Installation Script....................................................................................... 40 2.12. Saving the File ................................................................................................... 42 3. PXE Network Installations ................................................................................................. 43 3.1. Setting up the Network Server ............................................................................. 43 3.2. PXE Boot Configuration ...................................................................................... 43 3.3. Adding PXE Hosts............................................................................................... 45 3.4. Starting the tftp Server ...................................................................................... 46 3.5. Configuring the DHCP Server ............................................................................. 47 3.6. Adding a Custom Boot Message.......................................................................... 47 3.7. Performing the PXE Installation .......................................................................... 47 4. Diskless Environments........................................................................................................ 49 4.1. Start the tftp Server ........................................................................................... 49 4.2. Configuring the DHCP Server ............................................................................. 49 4.3. Configuring the NFS Server................................................................................. 50 4.4. Finish Configuring the Diskless Environment ..................................................... 50 4.5. Adding Hosts ....................................................................................................... 51 4.6. Booting the Hosts................................................................................................. 51 5. Basic System Recovery....................................................................................................... 53 5.1. Common Problems .............................................................................................. 53 5.2. Booting into Rescue Mode................................................................................... 53 5.3. Booting into Single-User Mode ........................................................................... 56 5.4. Booting into Emergency Mode ............................................................................ 56 II. File Systems .................................................................................................................................. 57 6. The ext3 File System .......................................................................................................... 59 6.1. Features of ext3.................................................................................................... 59 6.2. Creating an ext3 File System ............................................................................... 59 6.3. Converting to an ext3 File System ....................................................................... 60 6.4. Reverting to an ext2 File System ......................................................................... 60 7. Logical Volume Manager (LVM)........................................................................................ 63 7.1. What is LVM?...................................................................................................... 63 7.2. What is LVM2?.................................................................................................... 64 7.3. Additional Resources ........................................................................................... 64 8. LVM Configuration ............................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    352 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us