Red Hat Enterprise Linux 3 System Administration Guide Red Hat Enterprise Linux 3: System Administration Guide Copyright © 2003 by Red Hat, Inc. Red Hat, Inc. 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA rhel-sag(EN)-3-Print-RHI (2003-07-25T17:10) Copyright © 2003 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. Red Hat, Red Hat Network, the Red Hat "Shadow Man" logo, RPM, Maximum RPM, the RPM logo, Linux Library, PowerTools, Linux Undercover, RHmember, RHmember More, Rough Cuts, Rawhide and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Motif and UNIX are registered trademarks of The Open Group. XFree86 is a trademark of The XFree86 Project, Inc, and is pending registration. Intel and Pentium are registered trademarks of Intel Corporation. Itanium and Celeron are trademarks of Intel Corporation. AMD, Opteron, Athlon, Duron, and K6 are registered trademarks of Advanced Micro Devices, Inc. Netscape is a registered trademark of Netscape Communications Corporation in the United States and other countries. Java and Swing are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. or other countries. Oracle is a registered trademark, and Oracle8i, Oracle9i, and interMedia are trademarks or registered trademarks of Oracle Corporation. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. SSH and Secure Shell are trademarks of SSH Communications Security, Inc. FireWire is a trademark of Apple Computer Corporation. IBM, AS/400, OS/400, RS/6000, S/390, and zSeries are registered trademarks of International Business Machines Corporation. eServer, iSeries, and pSeries are trademarks of International Business Machines Corporation. All other trademarks and copyrights referred to are the property of their respective owners. The GPG fingerprint of the [email protected] key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E Table of Contents Introduction..........................................................................................................................................i 1. Changes to This Manual ........................................................................................................i 2. Document Conventions.........................................................................................................ii 3. More to Come ....................................................................................................................... v 3.1. Send in Your Feedback .......................................................................................... v 4. Sign Up for Support.............................................................................................................. v I. File Systems.......................................................................................................................................i 1. The ext3 File System ............................................................................................................ 1 1.1. Features of ext3...................................................................................................... 1 1.2. Creating an ext3 File System ................................................................................. 1 1.3. Converting to an ext3 File System......................................................................... 2 1.4. Reverting to an ext2 File System ........................................................................... 2 2. Swap Space ........................................................................................................................... 5 2.1. What is Swap Space?............................................................................................. 5 2.2. Adding Swap Space ............................................................................................... 5 2.3. Removing Swap Space .......................................................................................... 6 2.4. Moving Swap Space .............................................................................................. 7 3. Redundant Array of Independent Disks (RAID) .................................................................. 9 3.1. What is RAID?....................................................................................................... 9 3.2. Who Should Use RAID?........................................................................................ 9 3.3. Hardware RAID versus Software RAID................................................................ 9 3.4. RAID Levels and Linear Support ........................................................................ 10 4. Logical Volume Manager (LVM)........................................................................................ 13 4.1. What is LVM?...................................................................................................... 13 4.2. Additional Resources........................................................................................... 14 5. Managing Disk Storage....................................................................................................... 15 5.1. Viewing the Partition Table.................................................................................. 16 5.2. Creating a Partition .............................................................................................. 16 5.3. Removing a Partition ........................................................................................... 18 5.4. Resizing a Partition.............................................................................................. 19 6. Implementing Disk Quotas ................................................................................................. 21 6.1. Configuring Disk Quotas ..................................................................................... 21 6.2. Managing Disk Quotas ........................................................................................ 24 6.3. Additional Resources........................................................................................... 25 7. User-Defined Device Names............................................................................................... 27 7.1. Configuring Devlabel........................................................................................ 27 7.2. How It Works ....................................................................................................... 29 7.3. Additional Resources........................................................................................... 29 8. Access Control Lists ........................................................................................................... 31 8.1. Mounting File Systems ........................................................................................ 31 8.2. Setting Access ACLs ........................................................................................... 31 8.3. Setting Default ACLs........................................................................................... 32 8.4. Retrieving ACLs .................................................................................................. 33 8.5. Archiving File Systems With ACLs..................................................................... 33 8.6. Compatibility with Older Systems....................................................................... 34 8.7. Additional Resources........................................................................................... 34 II. Installation-Related Information................................................................................................ 37 9. Kickstart Installations ......................................................................................................... 39 9.1. What are Kickstart Installations?......................................................................... 39 9.2. How Do You Perform a Kickstart Installation? ................................................... 39 9.3. Creating the Kickstart File................................................................................... 39 9.4. Kickstart Options ................................................................................................. 40 9.5. Package Selection ................................................................................................ 55 9.6. Pre-installation Script........................................................................................... 56 9.7. Post-installation Script......................................................................................... 57 9.8. Making the Kickstart File Available ...................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages346 Page
-
File Size-