Fedora 16 System Administrator's Guide

Fedora 16 System Administrator's Guide

Fedora 16 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 16 Jaromír Hradílek Douglas Silas Martin Prpič Eva Kopalová Eliška Slobodová Tomáš Čapek Petr Kovář Miroslav Svoboda System Administrator's Guide John Ha David O'Brien Michael Hideo Don Domingo Fedora 16 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 16 Edition 1 Author Jaromír Hradílek [email protected] Author Douglas Silas [email protected] Author Martin Prpič [email protected] Author Eva Kopalová [email protected] Author Eliška Slobodová [email protected] Author Tomáš Čapek [email protected] Author Petr Kovář [email protected] Author Miroslav Svoboda [email protected] Author John Ha Author David O'Brien Author Michael Hideo Author Don Domingo Copyright © 2011 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. All other trademarks are the property of their respective owners. The System Administrator's Guide documents relevant information regarding the deployment, configuration, and administration of Fedora 16. It is oriented towards system administrators with a basic understanding of the system. Preface xv 1. Target Audience ............................................................................................................ xv 2. How to Read this Book .................................................................................................. xv 3. Document Conventions ................................................................................................ xviii 3.1. Typographic Conventions .................................................................................. xviii 3.2. Pull-quote Conventions ....................................................................................... xix 3.3. Notes and Warnings ........................................................................................... xx 4. Feedback ...................................................................................................................... xx 5. Acknowledgments ......................................................................................................... xxi I. Basic System Configuration 1 1. Configuring the Language and Keyboard 3 1.1. Changing the Language ....................................................................................... 3 1.2. Changing the Date, Time, and Numeric Format ...................................................... 4 1.3. Changing the Keyboard Layout ............................................................................. 6 1.4. Viewing the Current Configuration ......................................................................... 8 2. Configuring the Date and Time 9 2.1. Using the Date and Time Configuration Tool .......................................................... 9 2.2. Using the Command Line Tools .......................................................................... 10 2.2.1. Changing the Date ................................................................................... 10 2.2.2. Changing the Time .................................................................................. 10 2.2.3. Configuring the Network Time Protocol ..................................................... 10 2.3. Additional Resources .......................................................................................... 12 2.3.1. Installed Documentation ........................................................................... 12 3. Managing Users and Groups 13 3.1. Introduction to Users and Groups ........................................................................ 13 3.1.1. User Private Groups ................................................................................ 13 3.1.2. Shadow Passwords ................................................................................. 13 3.2. Using the User Accounts Tool ............................................................................. 14 3.2.1. Configuring an Account ............................................................................ 15 3.2.2. Adding a New User ................................................................................. 16 3.2.3. Removing a User ..................................................................................... 16 3.3. Using the User Manager Tool ............................................................................. 17 3.3.1. Viewing Users and Groups ....................................................................... 17 3.3.2. Adding a New User ................................................................................. 18 3.3.3. Adding a New Group ............................................................................... 19 3.3.4. Modifying User Properties ........................................................................ 19 3.3.5. Modifying Group Properties ...................................................................... 20 3.4. Using Command Line Tools ................................................................................ 21 3.4.1. Adding a New User ................................................................................. 21 3.4.2. Adding a New Group ............................................................................... 24 3.4.3. Enabling Password Aging ......................................................................... 25 3.4.4. Enabling Automatic Logouts ..................................................................... 26 3.4.5. Creating Group Directories ....................................................................... 27 3.5. Additional Resources .......................................................................................... 28 3.5.1. Installed Documentation ........................................................................... 28 II. Package Management 29 4. Yum 31 4.1. Checking For and Updating Packages ................................................................. 31 4.1.1. Checking For Updates ............................................................................. 31 v System Administrator's Guide 4.1.2. Updating Packages .................................................................................. 32 4.1.3. Preserving Configuration File Changes ..................................................... 34 4.2. Packages and Package Groups .......................................................................... 34 4.2.1. Searching Packages ................................................................................ 34 4.2.2. Listing Packages ..................................................................................... 34 4.2.3. Displaying Package Information ................................................................ 37 4.2.4. Installing Packages .................................................................................. 38 4.2.5. Removing Packages ................................................................................ 40 4.2.6. Working with Transaction History .............................................................. 41 4.3. Configuring Yum and Yum Repositories ............................................................... 46 4.3.1. Setting [main] Options .............................................................................. 46 4.3.2. Setting [repository] Options ...................................................................... 49 4.3.3. Using Yum Variables ............................................................................... 50 4.3.4. Viewing the Current Configuration ............................................................. 51 4.3.5. Adding, Enabling, and Disabling a Yum Repository .................................... 52 4.3.6. Creating a Yum Repository ...................................................................... 53 4.4. Yum Plug-ins ..................................................................................................... 54 4.4.1. Enabling, Configuring, and Disabling Yum Plug-ins .................................... 54 4.4.2. Installing Additional Yum Plug-ins ............................................................. 55 4.4.3. Plug-in

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    566 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us