Red Hat Enterprise Linux 4 System Administration Guide provides documentation on installation, configuration, and administration of Red Hat Enterprise Linux 4 systems. Key topics covered include kickstart installations, Logical Volume Manager (LVM), Software RAID, package management, network configuration, firewall configuration, NFS, Samba, DHCP, Apache, authentication, console access, users/groups, printers, and more. The guide is intended to help system administrators manage and maintain Red Hat Enterprise Linux servers.
This document provides instructions for configuring and managing Red Hat Cluster for Red Hat Enterprise Linux 5. It discusses setting up hardware and installing the Red Hat Cluster software. It then describes using the Conga and system-config-cluster tools to configure clusters, including defining global properties, cluster members, failover domains, resources, and services. It also covers starting, stopping, and managing clusters and troubleshooting problems.
This document provides copyright information and details about Parallels Plesk Panel. It covers topics such as logging in, customizing the control panel interface, viewing hosting package details, simplifying website setup, hosting websites, deploying databases, installing applications, and securing websites. The document contains instructions for tasks like creating hosting accounts, publishing websites, configuring ASP.NET, and setting up SSL encryption.
Red hat enterprise_linux-5-installation_guide-en-usahmady
This document provides instructions for installing Red Hat Enterprise Linux 5 across several architectures, including x86, AMD64, Intel 64, Itanium, and IBM POWER systems. It covers starting the installation program, partitioning disks, setting network and time configuration, selecting packages to install, and completing the installation process. The document also includes troubleshooting tips for common installation issues.
This document provides an overview and instructions for installing and configuring Slackware Linux. It covers getting and installing Slackware, system requirements, partitioning disks during setup, selecting and compiling kernels, configuring network hardware and network protocols like TCP/IP, and setting up dial-up connections using PPP. The table of contents provides additional details on topics like file system layout, finding files on the system, and managing kernel modules.
This document outlines the machine requirements, prerequisites, and expected outcomes for courses on Linux fundamentals, system administration, networking, shell scripting, and internals.
For the fundamentals course, a Pentium 2 500MHz computer with 32MB RAM is recommended. The system administration course requires completion of fundamentals first. After completing fundamentals and system administration, the equivalent of a junior administrator would be achieved. Additional courses build on this knowledge towards senior roles.
This module prints a simple "Hello world 1" message when loaded and "Goodbye world 1" when unloaded. It implements the basic init_module and cleanup_module functions required for all kernel modules, which are called when the module is loaded and unloaded respectively. The module demonstrates the simplest form of a kernel module and introduces the printk function for printing from a module.
Plesk 8.0 Administrator's Guide provides information to help administrators configure and maintain their Plesk control panel. It covers topics such as logging in, customizing the interface, upgrading licenses, securing the panel, configuring server services like DNS, mail, databases and statistics, managing server resources, and serving customers by simplifying account and domain setup. The guide contains information needed to optimize use of the Plesk control panel.
This document provides instructions for installing and administering R, the open-source statistical software and programming language. It covers obtaining R sources, installing on Unix-like and Windows systems, installing add-on packages, internationalization, and other topics. Permission is granted to distribute verbatim or modified copies of the manual under certain conditions.
This document provides instructions for installing and administering R on various operating systems. It covers obtaining R sources, installing on Unix-like systems, Windows, and OS X. It also discusses installing add-on packages, internationalization, choosing 32- vs 64-bit builds, and using the standalone Rmath library. The document is intended as a manual for installing and managing R versions 3.0.2 or higher.
This document is the Red Hat Enterprise Linux 7 System Administrator's Guide. It was written by 14 authors from Red Hat Engineering Content Services and covers topics such as basic system configuration, package management, infrastructure services, and server configuration. The guide includes chapters on topics like users and groups, package management with Yum, system services with systemd, OpenSSH, and configuring mail, web, directory, file, and time servers. It is intended to help system administrators deploy, configure, and administer Red Hat Enterprise Linux 7 systems.
This document provides an overview and guide for using HSPcomplete, a hosting automation solution that allows hosting service providers to manage infrastructure, billing, sales channels, and e-commerce through a single system. It describes HSPcomplete's advantages like integrated billing and credit card processing, virtual private server management, and domain registration. Hardware, software, and user requirements for HSPcomplete deployment are also outlined.
hp StorageWorks host bus adapter for Windows and Linux ...webhostingguy
This document provides installation and configuration instructions for an HP StorageWorks host bus adapter (HBA) for Windows and Linux platforms. It describes how to install the HBA hardware, install device drivers for Windows Server 2003 and various Linux distributions, and use diagnostic utilities to test and configure the HBA. The guide covers hardware installation, driver installation, troubleshooting, and how to use utilities to diagnose and configure the HBA.
The document provides an overview of getting started with GNU/Linux. It covers useful terminal shortcuts, file management commands like navigating directories, listing files, and copying/removing files. It also discusses detecting the Linux distribution, getting system information, and using common commands like ls, tar, ssh and more. The document is intended as a reference for Linux professionals.
This document provides instructions for installing and administering R on various operating systems. It covers obtaining R sources, compiling and installing R under Unix-like systems, Windows, and Mac OS X. It also discusses running R, installing add-on packages, internationalization, choosing 32- vs 64-bit builds, and the standalone Rmath library.
Verio Web Hosting Virtual Server Handbookwebhostingguy
The document is a user guide for Blue Reef's Virtual Server System. It introduces the Virtual Server System as an alternative to owning a dedicated server. The Virtual Server System allows customers to have their own virtual servers hosted on Blue Reef's equipment to gain the benefits of a dedicated server at a lower cost than maintaining their own physical server. It provides an overview of the core virtual server services including web, FTP, email, and the Virtual Server Administrator interface for remotely managing virtual servers.
This document is the user manual for EMS Data Export 2010 for MySQL version 3.3. It contains information about the product's features and how to use its wizard application to export data from MySQL databases to various file formats like Excel, Access, Word, and HTML. The manual has sections covering the wizard's steps for setting connection options, selecting tables and queries, choosing an export format and fields, and configuring format-specific export options.
Here are the key steps for browsing component classes using the PCB editor panel:
- Select "Component Classes" from the drop down box at the top of the panel. This will list all component classes in the PCB.
- Click on a component class name to select it. The components that belong to that class will then be listed in the lower scroll box.
- You can click on a component name to highlight it in the MiniViewer.
- Click the "Edit" button to open the Edit Component Class dialog box for the selected class. This allows you to modify the class properties.
- Double clicking a component name will also open the Edit Component dialog box for that specific component.
-
This document discusses Logical Volume Management (LVM) and provides an overview of how it works. LVM allows for more flexibility than traditional partitions by providing logical volumes that can be resized and moved more easily. It covers the basics of LVM including physical volumes, volume groups, and logical volumes. It also demonstrates features like thin provisioning, snapshots, mirroring, caching, and converting existing systems to use LVM. The presentation includes examples and demos of setting up LVM at installation time or manually converting an existing system to use LVM.
This presentation is completely designed for Industrial Training Presentation only that is needed by the Student in order to submit in the colleges. It contain Linux Introduction, Servers and Services, File System and many more about Linux
The document discusses the history and development of artificial intelligence over several decades. Early research focused on symbolic approaches using rules and logic but progress was slow. More recently, machine learning techniques such as deep learning have achieved significant successes in areas like computer vision and natural language processing by learning from large amounts of data rather than being explicitly programmed. These new approaches represent an important shift in how AI is developed.
Linux is a freely distributed implementation of a UNIX-like kernel developed by Linus Torvalds. The document discusses installation of Red Hat Enterprise Linux from DVD/CD, including language selection, partitioning, boot loader configuration, network configuration, package selection, and completion. It also covers file systems, including ext3, swap, RAID, and LVM, and the File System Hierarchy Standard.
This document provides an administrator manual for Atoll version 3.1.0. It discusses installing and configuring Atoll and its components, setting up distributed calculation servers, managing licenses, and working with Atoll databases. The manual is divided into several sections covering topics such as supported technologies, installation, license management, database management, and more.
The document provides an introduction to artificial intelligence, including:
- A brief history of AI from the 1980s "AI winter" period of failed projects through to recent advances enabled by improved hardware and new research areas like machine learning.
- Knowledge representation and reasoning, rule engines, hybrid reasoning systems, and expert systems are introduced as key concepts in AI.
- The advantages of using a rule engine are discussed, as well as when rule engines are appropriate versus other approaches like scripting engines. The Rete algorithm, which is commonly used in rule engines, is also introduced.
Spring Security requires a Java 8 or higher Runtime Environment.
As Spring Security aims to operate in a self-contained manner, you do not need to place any special
configuration files in your Java Runtime Environment. In particular, you need not configure a
special Java Authentication and Authorization Service (JAAS) policy file or place Spring Security
into common classpath locations.
Similarly, if you use an EJB Container or Servlet Container, you need not put any special
configuration files anywhere nor include Spring Security in a server classloader. All the required
files are contained within your application.
This design offers maximum deployment time flexibility, as you can copy your target artifact (be it a
JAR, WAR, or EAR) from one system to another and it immediately works.
This document is the training manual for Protel 99 SE PCB design software. It contains chapters that describe the PCB design process, the PCB editor workspace, creating a new PCB, transferring design information to the PCB from other software, setting up PCB layers and design rules. The manual provides instructions for using key features of the software and includes exercises for readers to practice.
The document provides an overview of configuring and managing Red Hat clusters. It discusses setting up hardware, installing cluster software, and using various configuration tools like Conga, system-config-cluster, and command line tools. Conga is a comprehensive GUI for installing, configuring, and managing clusters and storage. system-config-cluster is also a GUI for configuring and managing clusters. Command line tools provide an alternative to the graphical tools.
This document is the user's guide for Akeeba Backup, a site backup component for Joomla-powered websites. It covers both the free Akeeba Backup Core and the subscription-based Professional editions. The guide is divided into sections that explain how to install and update Akeeba Backup, configure backup profiles and settings, perform backups, manage backup files, and include or exclude specific files, databases, and directories from backups. It provides instructions on all the major functions and features of Akeeba Backup.
This document provides an overview and guide to deploying and configuring Red Hat Enterprise Linux 5.0.0. It covers file systems, RAID, swap space, disk partitioning and storage, package management, network configuration, DNS, SSH, and other administration topics. The document includes descriptions of configuration files and commands used to manage these systems.
This document provides a summary of the Hibernate reference documentation:
- It introduces Hibernate and covers basic concepts like mapping classes, associations, collections, inheritance, querying and transactions.
- The document includes tutorials for creating a simple Hibernate application, mapping associations between classes, and building a web application that uses Hibernate.
- It describes Hibernate's architecture and configuration options for integrating Hibernate with J2EE application servers and setting properties like SQL dialects.
- The reference covers advanced topics like batch processing, the Hibernate Query Language (HQL), and criteria queries for building queries programmatically.
The document is a user manual for DEFORM 3D Version 6.0. It provides an overview of the DEFORM software system for simulating metal forming processes using finite element analysis. DEFORM can model 2D and 3D forming processes as well as heat treatment processes. It has capabilities for modeling material deformation behavior, heat transfer, and integrated forming equipment. The manual describes the pre-processor for setting up simulations, running simulations, and using the post-processor to analyze results. It also covers user-defined material models and routines.
This document is the user manual for DEFORM 3D Version 6.0, a software for analyzing manufacturing processes. It provides an overview of DEFORM's capabilities for simulating metal forming processes, as well as descriptions of the pre-processor for setting up simulations, defining objects and materials, generating meshes, and applying boundary and initial conditions. It also covers using the post-processor to view results and running simulations in interactive or batch modes.
This document is the user manual for version 4.3.0 of X-Cart shopping cart software. The manual covers installing and using X-Cart 4.3.0, including both the X-Cart GOLD and PRO versions. It provides information on system requirements, installing X-Cart using the installation wizard or manually, configuring X-Cart's files, setting up the store, and managing products, orders and customers.
This document provides an installation and user manual for HyperGateway's HG-3000 & HG-2000 & HG-1600 Series products. The manual includes sections on system architecture, installation, configuration using the Hypermedia Management Console (HMC) software, settings for cellular and PRI cards, system monitoring and troubleshooting. The HyperGateway system allows integration of cellular networks like GSM and CDMA with PRI networks to take voice communications to the next level.
This document provides an overview of Zenoss and describes how to use its key features to monitor IT infrastructure, including adding and discovering devices, modeling devices, working with events, customizing the dashboard, and configuring alerts and performance monitoring. It covers Zenoss's architecture, interface, core monitoring capabilities like availability and performance monitoring, and event and configuration management.
This document provides an overview of the SmartPlant Instrumentation tutorial. The tutorial is divided into sections for system administration, domain administration, and instrument engineering. It guides the user through tasks to create instruments, loops, and associated documentation such as specifications, loop drawings, and wiring diagrams. These tasks include defining supporting data, creating and duplicating loops and tags, performing calculations, generating reports, linking documentation, and customizing views of the data. The tutorial also includes examples of tasks for the system administrator, such as initializing domains and defining users, and for the domain administrator, such as setting up the plant hierarchy and access rights.
This document provides an overview and reference for Hibernate, an object-relational mapping tool for Java. It discusses Hibernate's architecture and basic APIs for mapping objects to relational databases. The document also covers configuring Hibernate, implementing persistent classes, basic object-relational mappings, and integrating Hibernate with Java application servers.
This document provides an overview and instructions for installing and configuring IBM Tivoli Web Access for Information Management. It discusses planning the installation, performing the SMP/E installation, customizing the Information Management installation, enabling access for users, and verifying the installation. The document is intended to help users install and set up Web Access to move an existing help desk application to the web. It contains information on installing and configuring necessary software and components, as well as customizing settings. Various sections provide details on tasks involved in the implementation and setup process.
Plesk is a hosting automation solution that simplifies setup and management of user accounts, websites, and email accounts. It manages common software components like DNS, web, FTP, and mail servers. The new release of Plesk features a brand new desktop interface with quick access to major functions and statistics, as well as the ability to customize permissions for different types of user accounts.
This document provides an overview and reference for Hibernate, an object-relational mapping tool for Java. It includes tutorials on basic usage and mapping associations, as well as sections covering architecture, configuration, persistent classes, and basic object-relational mapping. The document aims to help developers learn and implement Hibernate for managing relational data in idiomatic Java applications.
Plesk 8.2 for Linux/Unix Domain Administrator's Guidewebhostingguy
1. Click on the "Domain Administrator" option in the navigation pane.
2. On the "Domain Administrator" page, select your preferred language and skin from the dropdown menus.
3. Click "OK" to save the changes and customize the interface language and theme of your control panel.
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
Data Protection in a Connected World: Sovereignty and Cyber Securityanupriti
Delve into the critical intersection of data sovereignty and cyber security in this presentation. Explore unconventional cyber threat vectors and strategies to safeguard data integrity and sovereignty in an increasingly interconnected world. Gain insights into emerging threats and proactive defense measures essential for modern digital ecosystems.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
Performance Budgets for the Real World by Tammy EvertsScyllaDB
Performance budgets have been around for more than ten years. Over those years, we’ve learned a lot about what works, what doesn’t, and what we need to improve. In this session, Tammy revisits old assumptions about performance budgets and offers some new best practices. Topics include:
• Understanding performance budgets vs. performance goals
• Aligning budgets with user experience
• Pros and cons of Core Web Vitals
• How to stay on top of your budgets to fight regressions
How Netflix Builds High Performance Applications at Global ScaleScyllaDB
We all want to build applications that are blazingly fast. We also want to scale them to users all over the world. Can the two happen together? Can users in the slowest of environments also get a fast experience? Learn how we do this at Netflix: how we understand every user's needs and preferences and build high performance applications that work for every user, every time.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
UiPath Community Day Kraków: Devs4Devs ConferenceUiPathCommunity
We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner!
We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too!
Check out our proposed agenda below 👇👇
08:30 ☕ Welcome coffee (30')
09:00 Opening note/ Intro to UiPath Community (10')
Cristina Vidu, Global Manager, Marketing Community @UiPath
Dawid Kot, Digital Transformation Lead @Proservartner
09:10 Cloud migration - Proservartner & DOVISTA case study (30')
Marcin Drozdowski, Automation CoE Manager @DOVISTA
Pawel Kamiński, RPA developer @DOVISTA
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
09:40 From bottlenecks to breakthroughs: Citizen Development in action (25')
Pawel Poplawski, Director, Improvement and Automation @McCormick & Company
Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company
10:05 Next-level bots: API integration in UiPath Studio (30')
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
10:35 ☕ Coffee Break (15')
10:50 Document Understanding with my RPA Companion (45')
Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath
11:35 Power up your Robots: GenAI and GPT in REFramework (45')
Krzysztof Karaszewski, Global RPA Product Manager
12:20 🍕 Lunch Break (1hr)
13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30')
Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance
13:50 Communications Mining - focus on AI capabilities (30')
Thomasz Wierzbicki, Business Analyst @Office Samurai
14:20 Polish MVP panel: Insights on MVP award achievements and career profiling
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecJames Anderson
The lecture titled "Automating AppSec" delves into the critical challenges associated with manual application security (AppSec) processes and outlines strategic approaches for incorporating automation to enhance efficiency, accuracy, and scalability. The lecture is structured to highlight the inherent difficulties in traditional AppSec practices, emphasizing the labor-intensive triage of issues, the complexity of identifying responsible owners for security flaws, and the challenges of implementing security checks within CI/CD pipelines. Furthermore, it provides actionable insights on automating these processes to not only mitigate these pains but also to enable a more proactive and scalable security posture within development cycles.
The Pains of Manual AppSec:
This section will explore the time-consuming and error-prone nature of manually triaging security issues, including the difficulty of prioritizing vulnerabilities based on their actual risk to the organization. It will also discuss the challenges in determining ownership for remediation tasks, a process often complicated by cross-functional teams and microservices architectures. Additionally, the inefficiencies of manual checks within CI/CD gates will be examined, highlighting how they can delay deployments and introduce security risks.
Automating CI/CD Gates:
Here, the focus shifts to the automation of security within the CI/CD pipelines. The lecture will cover methods to seamlessly integrate security tools that automatically scan for vulnerabilities as part of the build process, thereby ensuring that security is a core component of the development lifecycle. Strategies for configuring automated gates that can block or flag builds based on the severity of detected issues will be discussed, ensuring that only secure code progresses through the pipeline.
Triaging Issues with Automation:
This segment addresses how automation can be leveraged to intelligently triage and prioritize security issues. It will cover technologies and methodologies for automatically assessing the context and potential impact of vulnerabilities, facilitating quicker and more accurate decision-making. The use of automated alerting and reporting mechanisms to ensure the right stakeholders are informed in a timely manner will also be discussed.
Identifying Ownership Automatically:
Automating the process of identifying who owns the responsibility for fixing specific security issues is critical for efficient remediation. This part of the lecture will explore tools and practices for mapping vulnerabilities to code owners, leveraging version control and project management tools.
Three Tips to Scale the Shift Left Program:
Finally, the lecture will offer three practical tips for organizations looking to scale their Shift Left security programs. These will include recommendations on fostering a security culture within development teams, employing DevSecOps principles to integrate security throughout the development
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
What's Next Web Development Trends to Watch.pdfSeasiaInfotech2
Explore the latest advancements and upcoming innovations in web development with our guide to the trends shaping the future of digital experiences. Read our article today for more information.
3. Table of Contents
Introduction.......................................................................................................................................... i
1. Changes To This Manual ....................................................................................................... i
2. Architecture-specific Information ......................................................................................... ii
3. Document Conventions ......................................................................................................... ii
4. Activate Your Subscription ................................................................................................... v
4.1. Provide a Red Hat Login........................................................................................ v
4.2. Provide Your Subscription Number ....................................................................... v
4.3. Connect Your System............................................................................................ vi
5. Using the Mouse .................................................................................................................. vi
6. Copying and Pasting Text With X........................................................................................ vi
7. More to Come ...................................................................................................................... vi
7.1. Send in Your Feedback ......................................................................................... vi
I. Installation-Related Information .................................................................................................... i
1. Kickstart Installations ........................................................................................................... 1
1.1. What are Kickstart Installations? ........................................................................... 1
1.2. How Do You Perform a Kickstart Installation? ..................................................... 1
1.3. Creating the Kickstart File ..................................................................................... 1
1.4. Kickstart Options ................................................................................................... 2
1.5. Package Selection ................................................................................................ 18
1.6. Pre-installation Script........................................................................................... 19
1.7. Post-installation Script ......................................................................................... 21
1.8. Making the Kickstart File Available .................................................................... 22
1.9. Making the Installation Tree Available ................................................................ 23
1.10. Starting a Kickstart Installation ......................................................................... 24
2. Kickstart Configurator ..................................................................................................... 27
2.1. Basic Configuration ............................................................................................. 27
2.2. Installation Method .............................................................................................. 28
2.3. Boot Loader Options............................................................................................ 30
2.4. Partition Information............................................................................................ 30
2.5. Network Configuration ........................................................................................ 33
2.6. Authentication ...................................................................................................... 34
2.7. Firewall Configuration ......................................................................................... 35
2.8. Display Configuration .......................................................................................... 36
2.9. Package Selection ................................................................................................ 39
2.10. Pre-Installation Script ........................................................................................ 39
2.11. Post-Installation Script....................................................................................... 40
2.12. Saving the File ................................................................................................... 42
3. PXE Network Installations ................................................................................................. 43
3.1. Setting up the Network Server ............................................................................. 43
3.2. PXE Boot Configuration ...................................................................................... 43
3.3. Adding PXE Hosts............................................................................................... 45
3.4. Starting the tftp Server ...................................................................................... 46
3.5. Configuring the DHCP Server ............................................................................. 47
3.6. Adding a Custom Boot Message.......................................................................... 47
3.7. Performing the PXE Installation .......................................................................... 47
4. Diskless Environments........................................................................................................ 49
4.1. Start the tftp Server ........................................................................................... 49
4.2. Configuring the DHCP Server ............................................................................. 49
4.3. Configuring the NFS Server................................................................................. 50
4.4. Finish Configuring the Diskless Environment ..................................................... 50
4.5. Adding Hosts ....................................................................................................... 51
4.6. Booting the Hosts................................................................................................. 51
5. Basic System Recovery....................................................................................................... 53
5.1. Common Problems .............................................................................................. 53
4. 5.2. Booting into Rescue Mode................................................................................... 53
5.3. Booting into Single-User Mode ........................................................................... 56
5.4. Booting into Emergency Mode ............................................................................ 56
II. File Systems .................................................................................................................................. 57
6. The ext3 File System .......................................................................................................... 59
6.1. Features of ext3 .................................................................................................... 59
6.2. Creating an ext3 File System ............................................................................... 59
6.3. Converting to an ext3 File System ....................................................................... 60
6.4. Reverting to an ext2 File System ......................................................................... 60
7. Logical Volume Manager (LVM)........................................................................................ 63
7.1. What is LVM? ...................................................................................................... 63
7.2. What is LVM2? .................................................................................................... 64
7.3. Additional Resources ........................................................................................... 64
8. LVM Configuration ............................................................................................................. 65
8.1. Automatic Partitioning ......................................................................................... 65
8.2. Manual LVM Partitioning .................................................................................... 66
9. Redundant Array of Independent Disks (RAID) ................................................................ 73
9.1. What is RAID?..................................................................................................... 73
9.2. Who Should Use RAID?...................................................................................... 73
9.3. Hardware RAID versus Software RAID.............................................................. 73
9.4. RAID Levels and Linear Support ........................................................................ 74
10. Software RAID Configuration .......................................................................................... 77
10.1. Creating the RAID Partitions ............................................................................. 77
10.2. Creating the RAID Devices and Mount Points .................................................. 80
11. Swap Space ....................................................................................................................... 85
11.1. What is Swap Space? ......................................................................................... 85
11.2. Adding Swap Space ........................................................................................... 85
11.3. Removing Swap Space ...................................................................................... 87
11.4. Moving Swap Space .......................................................................................... 88
12. Managing Disk Storage..................................................................................................... 89
12.1. Standard Partitions using parted ..................................................................... 89
12.2. LVM Partition Management .............................................................................. 94
13. Implementing Disk Quotas ............................................................................................... 97
13.1. Configuring Disk Quotas ................................................................................... 97
13.2. Managing Disk Quotas .................................................................................... 100
13.3. Additional Resources ....................................................................................... 102
14. Access Control Lists ....................................................................................................... 103
14.1. Mounting File Systems .................................................................................... 103
14.2. Setting Access ACLs ....................................................................................... 103
14.3. Setting Default ACLs....................................................................................... 104
14.4. Retrieving ACLs .............................................................................................. 105
14.5. Archiving File Systems With ACLs................................................................. 105
14.6. Compatibility with Older Systems................................................................... 106
14.7. Additional Resources ....................................................................................... 106
III. Package Management .............................................................................................................. 109
15. Package Management with RPM.................................................................................... 111
15.1. RPM Design Goals .......................................................................................... 111
15.2. Using RPM ...................................................................................................... 112
15.3. Checking a Package’s Signature ...................................................................... 117
15.4. Impressing Your Friends with RPM ................................................................ 118
15.5. Additional Resources ....................................................................................... 120
16. Package Management Tool .......................................................................................... 121
16.1. Installing Packages........................................................................................... 121
16.2. Removing Packages ......................................................................................... 123
17. Red Hat Network ............................................................................................................ 125
5. IV. Network-Related Configuration .............................................................................................. 129
18. Network Configuration ................................................................................................... 131
18.1. Overview .......................................................................................................... 132
18.2. Establishing an Ethernet Connection ............................................................... 132
18.3. Establishing an ISDN Connection ................................................................... 133
18.4. Establishing a Modem Connection .................................................................. 135
18.5. Establishing an xDSL Connection ................................................................... 136
18.6. Establishing a Token Ring Connection ............................................................ 138
18.7. Establishing a Wireless Connection ................................................................. 139
18.8. Managing DNS Settings .................................................................................. 141
18.9. Managing Hosts ............................................................................................... 142
18.10. Working with Profiles .................................................................................... 143
18.11. Device Aliases ............................................................................................... 145
18.12. Establishing an IPsec Connection .................................................................. 146
18.13. Saving and Restoring the Network Configuration ......................................... 151
19. Basic Firewall Configuration .......................................................................................... 153
19.1. Security Level Configuration Tool................................................................ 153
19.2. Activating the iptables Service.................................................................... 155
20. Controlling Access to Services ....................................................................................... 157
20.1. Runlevels.......................................................................................................... 157
20.2. TCP Wrappers.................................................................................................. 158
20.3. Services Configuration Tool .......................................................................... 159
20.4. ntsysv............................................................................................................... 160
20.5. chkconfig ...................................................................................................... 161
20.6. Additional Resources ....................................................................................... 161
21. OpenSSH......................................................................................................................... 163
21.1. Why Use OpenSSH?........................................................................................ 163
21.2. Configuring an OpenSSH Server ..................................................................... 163
21.3. Configuring an OpenSSH Client...................................................................... 163
21.4. Additional Resources ....................................................................................... 168
22. Network File System (NFS)............................................................................................ 169
22.1. Why Use NFS? ................................................................................................ 169
22.2. Mounting NFS File Systems ............................................................................ 169
22.3. Exporting NFS File Systems............................................................................ 171
22.4. Additional Resources ....................................................................................... 175
23. Samba.............................................................................................................................. 177
23.1. Why Use Samba? ............................................................................................. 177
23.2. Configuring a Samba Server ............................................................................ 177
23.3. Connecting to a Samba Share .......................................................................... 183
23.4. Additional Resources ....................................................................................... 185
24. Dynamic Host Configuration Protocol (DHCP) ............................................................. 187
24.1. Why Use DHCP? ............................................................................................. 187
24.2. Configuring a DHCP Server ............................................................................ 187
24.3. Configuring a DHCP Client ............................................................................. 192
24.4. Additional Resources ....................................................................................... 193
25. Apache HTTP Server Configuration ............................................................................... 195
25.1. Basic Settings................................................................................................... 195
25.2. Default Settings................................................................................................ 197
25.3. Virtual Hosts Settings ...................................................................................... 202
25.4. Server Settings ................................................................................................. 205
25.5. Performance Tuning......................................................................................... 207
25.6. Saving Your Settings ........................................................................................ 207
25.7. Additional Resources ....................................................................................... 208
26. Apache HTTP Secure Server Configuration ................................................................... 211
26.1. Introduction ...................................................................................................... 211
26.2. An Overview of Security-Related Packages .................................................... 211
6. 26.3. An Overview of Certificates and Security ....................................................... 213
26.4. Using Pre-Existing Keys and Certificates ........................................................ 214
26.5. Types of Certificates ........................................................................................ 214
26.6. Generating a Key ............................................................................................. 215
26.7. Generating a Certificate Request to Send to a CA ........................................... 217
26.8. Creating a Self-Signed Certificate ................................................................... 218
26.9. Testing The Certificate ..................................................................................... 219
26.10. Accessing The Server .................................................................................... 220
26.11. Additional Resources ..................................................................................... 220
27. Authentication Configuration.......................................................................................... 223
27.1. User Information .............................................................................................. 223
27.2. Authentication .................................................................................................. 224
27.3. Command Line Version ................................................................................... 226
V. System Configuration ................................................................................................................ 229
28. Console Access ............................................................................................................... 231
28.1. Disabling Shutdown Via [Ctrl]-[Alt]-[Del]...................................................... 231
28.2. Disabling Console Program Access................................................................. 231
28.3. Defining the Console........................................................................................ 232
28.4. Making Files Accessible From the Console .................................................... 232
28.5. Enabling Console Access for Other Applications ........................................... 233
28.6. The floppy Group .......................................................................................... 234
29. Date and Time Configuration.......................................................................................... 235
29.1. Time and Date Properties................................................................................. 235
29.2. Network Time Protocol (NTP) Properties ....................................................... 236
29.3. Time Zone Configuration ................................................................................. 236
30. Keyboard Configuration.................................................................................................. 239
31. Mouse Configuration ...................................................................................................... 241
32. X Window System Configuration ................................................................................... 243
32.1. Display Settings ............................................................................................... 243
32.2. Display Hardware Settings .............................................................................. 243
32.3. Dual Head Display Settings ............................................................................. 244
33. User and Group Configuration ........................................................................................ 247
33.1. Adding a New User.......................................................................................... 247
33.2. Modifying User Properties............................................................................... 248
33.3. Adding a New Group ....................................................................................... 249
33.4. Modifying Group Properties ............................................................................ 249
33.5. Command Line Configuration ......................................................................... 250
33.6. Explaining the Process ..................................................................................... 253
33.7. Additional Information .................................................................................... 254
34. Printer Configuration ...................................................................................................... 257
34.1. Adding a Local Printer..................................................................................... 258
34.2. Adding an IPP Printer ...................................................................................... 259
34.3. Adding a Remote UNIX (LPD) Printer ........................................................... 260
34.4. Adding a Samba (SMB) Printer ....................................................................... 261
34.5. Adding a Novell NetWare (NCP) Printer......................................................... 262
34.6. Adding a JetDirect Printer ............................................................................... 263
34.7. Selecting the Printer Model and Finishing....................................................... 264
34.8. Printing a Test Page.......................................................................................... 265
34.9. Modifying Existing Printers............................................................................. 266
34.10. Saving the Configuration File ........................................................................ 268
34.11. Command Line Configuration ....................................................................... 268
34.12. Managing Print Jobs ...................................................................................... 270
34.13. Sharing a Printer ............................................................................................ 272
34.14. Additional Resources ..................................................................................... 274
35. Automated Tasks............................................................................................................. 275
7. 35.1. Cron.................................................................................................................. 275
35.2. At and Batch .................................................................................................... 277
35.3. Additional Resources ....................................................................................... 279
36. Log Files ......................................................................................................................... 281
36.1. Locating Log Files ........................................................................................... 281
36.2. Viewing Log Files ............................................................................................ 281
36.3. Adding a Log File ............................................................................................ 282
36.4. Examining Log Files........................................................................................ 283
37. Manually Upgrading the Kernel ..................................................................................... 285
37.1. Overview of Kernel Packages .......................................................................... 285
37.2. Preparing to Upgrade ....................................................................................... 286
37.3. Downloading the Upgraded Kernel ................................................................. 287
37.4. Performing the Upgrade................................................................................... 288
37.5. Verifying the Initial RAM Disk Image ............................................................ 288
37.6. Verifying the Boot Loader ............................................................................... 289
38. Kernel Modules............................................................................................................... 293
38.1. Kernel Module Utilities ................................................................................... 293
38.2. Persistent Module Loading .............................................................................. 295
38.3. Additional Resources ....................................................................................... 295
39. Mail Transport Agent (MTA) Configuration .................................................................. 297
VI. System Monitoring ................................................................................................................... 299
40. Gathering System Information........................................................................................ 301
40.1. System Processes ............................................................................................. 301
40.2. Memory Usage................................................................................................. 303
40.3. File Systems ..................................................................................................... 304
40.4. Hardware.......................................................................................................... 304
40.5. Additional Resources ....................................................................................... 305
41. OProfile ........................................................................................................................... 307
41.1. Overview of Tools............................................................................................ 307
41.2. Configuring OProfile........................................................................................ 308
41.3. Starting and Stopping OProfile ........................................................................ 312
41.4. Saving Data ...................................................................................................... 312
41.5. Analyzing the Data .......................................................................................... 312
41.6. Understanding /dev/oprofile/ ................................................................... 315
41.7. Example Usage ................................................................................................ 316
41.8. Graphical Interface........................................................................................... 316
41.9. Additional Resources ....................................................................................... 318
Index................................................................................................................................................. 321
Colophon.......................................................................................................................................... 333
9. Introduction
Welcome to the Red Hat Enterprise Linux System Administration Guide.
The Red Hat Enterprise Linux System Administration Guide contains information on how to customize
your Red Hat Enterprise Linux system to fit your needs. If you are looking for a step-by-step, task-
oriented guide for configuring and customizing your system, this is the manual for you. This manual
discusses many intermediate topics such as the following:
• Setting up a network interface card (NIC)
• Performing a Kickstart installation
• Configuring Samba shares
• Managing your software with RPM
• Determining information about your system
• Upgrading your kernel
This manual is divided into the following main categories:
• Installation-Related Reference
• File Systems Reference
• Package Management
• Network Configuration
• System Configuration
• System Monitoring
This guide assumes you have a basic understanding of your Red Hat Enterprise Linux system. If you
need help installing Red Hat Enterprise Linux, refer to the Red Hat Enterprise Linux Installation
Guide. For more general information about system administration, refer to the Red Hat Enterprise
Linux Introduction to System Administration. If you need more advanced documentation such as an
overview of file systems, refer to the Red Hat Enterprise Linux Reference Guide. If you need security
information, refer to the Red Hat Enterprise Linux Security Guide.
1. Changes To This Manual
This manual has been reorganized for clarity and updated for the latest features of Red Hat Enterprise
Linux 4. Some of the changes include:
Updated Kernel Modules and Manually Updating the Kernel Chapters
The Kernel Modules and the Upgrading the Kernel Manually chapters include updated
information in regards to the 2.6 kernel. Special thanks to Arjan van de Ven for his hard work
in helping to complete this chapter.
An Updated Network File System (NFS) Chapter
The Network File System (NFS) chapter has been revised and reorganized to include NFSv4.
Special thanks to Steve Dickson for his hard work in helping to complete this chapter.
10. ii Introduction
An Updated OProfile Chapter
The OProfile chapter has been revised and reorganized to include updated information in regards
to the 2.6 kernel. Special thanks to Will Cohen for his hard work in helping to complete this
chapter.
An Updated X Window System Chapter
The X Window System chapter has been revised to include information on the X11R6.8 release
developed by the X.Org team.
Before reading this guide, you should be familiar with the contents of the Red Hat Enterprise Linux
Installation Guide concerning installation issues, the Red Hat Enterprise Linux Introduction to System
Administration for basic administration concepts, the Red Hat Enterprise Linux System Administration
Guide for general customization instructions, and the Red Hat Enterprise Linux Security Guide for
security related instructions. This guide contains information about topics for advanced users.
HTML, PDF, and RPM versions of the manuals are available on the Red Hat Enterprise Linux Docu-
mentation CD and online at http://www.redhat.com/docs/.
Note
Although this manual reflects the most current information possible, read the Red Hat Enterprise
Linux Release Notes for information that may not have been available prior to our documentation
being finalized. The Release Notes can be found on the Red Hat Enterprise Linux CD #1, online at
http://www.redhat.com/docs/, or in the /usr/share/doc/redhat-release-4<product>/ directory
after installation, where <product> is AS, ES, WS, or Desktop.
2. Architecture-specific Information
Unless otherwise noted, information contained in this manual applies only to the x86 processor and
processors featuring the Intel® Extended Memory 64 Technology (Intel® EM64T) and AMD64 tech-
nologies. For architecture-specific information, refer to the Red Hat Enterprise Linux Installation
Guide for your respective architecture.
3. Document Conventions
In this manual, certain words are represented in different fonts, typefaces, sizes, and weights. This
highlighting is systematic; different words are represented in the same style to indicate their inclusion
in a specific category. The types of words that are represented this way include the following:
command
Linux commands (and other operating system commands, when used) are represented this way.
This style should indicate to you that you can type the word or phrase on the command line
and press [Enter] to invoke a command. Sometimes a command contains words that would be
displayed in a different style on their own (such as file names). In these cases, they are considered
to be part of the command, so the entire phrase is displayed as a command. For example:
Use the cat testfile command to view the contents of a file, named testfile, in the current
working directory.
11. Introduction iii
file name
File names, directory names, paths, and RPM package names are represented this way. This style
indicates that a particular file or directory exists with that name on your system. Examples:
The .bashrc file in your home directory contains bash shell definitions and aliases for your own
use.
The /etc/fstab file contains information about different system devices and file systems.
Install the webalizer RPM if you want to use a Web server log file analysis program.
application
This style indicates that the program is an end-user application (as opposed to system software).
For example:
Use Mozilla to browse the Web.
[key]
A key on the keyboard is shown in this style. For example:
To use [Tab] completion, type in a character and then press the [Tab] key. Your terminal displays
the list of files in the directory that start with that letter.
[key]-[combination]
A combination of keystrokes is represented in this way. For example:
The [Ctrl]-[Alt]-[Backspace] key combination exits your graphical session and returns you to the
graphical login screen or the console.
text found on a GUI interface
A title, word, or phrase found on a GUI interface screen or window is shown in this style. Text
shown in this style indicates that a particular GUI screen or an element on a GUI screen (such as
text associated with a checkbox or field). Example:
Select the Require Password checkbox if you would like your screensaver to require a password
before stopping.
top level of a menu on a GUI screen or window
A word in this style indicates that the word is the top level of a pulldown menu. If you click on
the word on the GUI screen, the rest of the menu should appear. For example:
Under File on a GNOME terminal, the New Tab option allows you to open multiple shell
prompts in the same window.
Instructions to type in a sequence of commands from a GUI menu look like the following exam-
ple:
Go to Applications (the main menu on the panel) => Programming => Emacs Text Editor to
start the Emacs text editor.
button on a GUI screen or window
This style indicates that the text can be found on a clickable button on a GUI screen. For example:
Click on the Back button to return to the webpage you last viewed.
computer output
Text in this style indicates text displayed to a shell prompt such as error messages and responses
to commands. For example:
The ls command displays the contents of a directory. For example:
12. iv Introduction
Desktop about.html logs paulwesterberg.png
Mail backupfiles mail reports
The output returned in response to the command (in this case, the contents of the directory) is
shown in this style.
prompt
A prompt, which is a computer’s way of signifying that it is ready for you to input something, is
shown in this style. Examples:
$
#
[stephen@maturin stephen]$
leopard login:
user input
Text that the user types, either on the command line or into a text box on a GUI screen, is
displayed in this style. In the following example, text is displayed in this style:
To boot your system into the text based installation program, you must type in the text com-
mand at the boot: prompt.
<replaceable>
Text used in examples that is meant to be replaced with data provided by the user is displayed in
this style. In the following example, <version-number> is displayed in this style:
The directory for the kernel source is /usr/src/kernels/<version-number>/, where
<version-number> is the version and type of kernel installed on this system.
Additionally, we use several different strategies to draw your attention to certain pieces of information.
In order of urgency, these items are marked as a note, tip, important, caution, or warning. For example:
Note
Remember that Linux is case sensitive. In other words, a rose is not a ROSE is not a rOsE.
Tip
The directory /usr/share/doc/ contains additional documentation for packages installed on your
system.
Important
If you modify the DHCP configuration file, the changes do not take effect until you restart the DHCP
daemon.
13. Introduction v
Caution
Do not perform routine tasks as root — use a regular user account unless you need to use the root
account for system administration tasks.
Warning
Be careful to remove only the necessary partitions. Removing other partitions could result in data
loss or a corrupted system environment.
4. Activate Your Subscription
Before you can access service and software maintenance information, and the support documenta-
tion included in your subscription, you must activate your subscription by registering with Red Hat.
Registration includes these simple steps:
• Provide a Red Hat login
• Provide a subscription number
• Connect your system
The first time you boot your installation of Red Hat Enterprise Linux, you are prompted to register
with Red Hat using the Setup Agent. If you follow the prompts during the Setup Agent, you can
complete the registration steps and activate your subscription.
If you can not complete registration during the Setup Agent (which requires network access), you
can alternatively complete the Red Hat registration process online at http://www.redhat.com/register/.
4.1. Provide a Red Hat Login
If you do not have an existing Red Hat login, you can create one when prompted during the Setup
Agent or online at:
https://www.redhat.com/apps/activate/newlogin.html
A Red Hat login enables your access to:
• Software updates, errata and maintenance via Red Hat Network
• Red Hat technical support resources, documentation, and Knowledgebase
If you have forgotten your Red Hat login, you can search for your Red Hat login online at:
https://rhn.redhat.com/help/forgot_password.pxt
14. vi Introduction
4.2. Provide Your Subscription Number
Your subscription number is located in the package that came with your order. If your package did not
include a subscription number, your subscription was activated for you and you can skip this step.
You can provide your subscription number when prompted during the Setup Agent or by visiting
http://www.redhat.com/register/.
4.3. Connect Your System
The Red Hat Network Registration Client helps you connect your system so that you can begin to get
updates and perform systems management. There are three ways to connect:
1. During the Setup Agent — Check the Send hardware information and Send system package
list options when prompted.
2. After the Setup Agent has been completed — From Applications (the main menu on the panel),
go to System Tools, then select Red Hat Network.
3. After the Setup Agent has been completed — Enter the following command from the command
line as the root user:
• /usr/bin/up2date --register
5. Using the Mouse
Red Hat Enterprise Linux is designed to use a three-button mouse. If you have a two-button mouse,
you should have selected three-button emulation during the installation process. If you are using three-
button emulation, pressing both mouse buttons at the same time equates to pressing the missing third
(middle) button.
In this document, if you are instructed to click with the mouse on something, that means click the left
mouse button. If you need to use the middle or right mouse button, that will be explicitly stated. (This
will be reversed if you have configured your mouse to be used by a left handed person.)
The phrase "drag and drop" may be familiar to you. If you are instructed to drag and drop an item
on your GUI desktop, click on something and hold the mouse button down. While continuing to hold
down the mouse button, drag the item by moving the mouse to a new location. When you have reached
the desired location, release the mouse button to drop the item.
6. Copying and Pasting Text With X
Copying and pasting text is easy using your mouse and the X Window System. To copy text, click and
drag your mouse over the text to highlight it. To paste the text somewhere, click the middle mouse
button in the spot where the text should be placed.
7. More to Come
The Red Hat Enterprise Linux System Administration Guide is part of Red Hat’s growing commitment
to provide useful and timely support to Red Hat Enterprise Linux users. As new tools and applications
are released, this guide will be expanded to include them.
15. Introduction vii
7.1. Send in Your Feedback
If you find an error in the Red Hat Enterprise Linux System Administration Guide, or if you have
thought of a way to make this manual better, we would love to hear from you! Please submit a report
in Bugzilla (http://bugzilla.redhat.com/bugzilla/) against the component rhel-sag.
Be sure to mention the manual’s identifier:
rhel-sag(EN)-4-Print-RHI (2005-06-06T17:10U1)
By mentioning this manual’s identifier, we know exactly which version of the guide you have.
If you have a suggestion for improving the documentation, try to be as specific as possible when de-
scribing it. If you have found an error, please include the section number and some of the surrounding
text so we can find it easily.
17. I. Installation-Related Information
The Red Hat Enterprise Linux Installation Guide discusses the installation of Red Hat Enterprise
Linux and some basic post-installation troubleshooting. However, advanced installation options are
covered in this manual. This part provides instructions for kickstart (an automated installation tech-
nique) and all related tools. Use this part in conjunction with the Red Hat Enterprise Linux Installation
Guide to perform any of these advanced installation tasks.
Table of Contents
1. Kickstart Installations .................................................................................................................... 1
2. Kickstart Configurator ................................................................................................................. 27
3. PXE Network Installations........................................................................................................... 43
4. Diskless Environments.................................................................................................................. 49
5. Basic System Recovery ................................................................................................................. 53
19. Chapter 1.
Kickstart Installations
1.1. What are Kickstart Installations?
Many system administrators would prefer to use an automated installation method to install Red Hat
Enterprise Linux on their machines. To answer this need, Red Hat created the kickstart installation
method. Using kickstart, a system administrator can create a single file containing the answers to all
the questions that would normally be asked during a typical installation.
Kickstart files can be kept on a single server system and read by individual computers during the
installation. This installation method can support the use of a single kickstart file to install Red Hat
Enterprise Linux on multiple machines, making it ideal for network and system administrators.
Kickstart provides a way for users to automate a Red Hat Enterprise Linux installation.
1.2. How Do You Perform a Kickstart Installation?
Kickstart installations can be performed using a local CD-ROM, a local hard drive, or via NFS, FTP,
or HTTP.
To use kickstart, you must:
1. Create a kickstart file.
2. Create a boot media with the kickstart file or make the kickstart file available on the network.
3. Make the installation tree available.
4. Start the kickstart installation.
This chapter explains these steps in detail.
1.3. Creating the Kickstart File
The kickstart file is a simple text file, containing a list of items, each identified by a keyword. You can
create it by editing a copy of the sample.ks file found in the RH-DOCS directory of the Red Hat En-
terprise Linux Documentation CD, using the Kickstart Configurator application, or writing it from
scratch. The Red Hat Enterprise Linux installation program also creates a sample kickstart file based
on the options that you selected during installation. It is written to the file /root/anaconda-ks.cfg.
You should be able to edit it with any text editor or word processor that can save files as ASCII text.
First, be aware of the following issues when you are creating your kickstart file:
• Sections must be specified in order. Items within the sections do not have to be in a specific order
unless otherwise specified. The section order is:
• Command section — Refer to Section 1.4 Kickstart Options for a list of kickstart options. You
must include the required options.
• The %packages section — Refer to Section 1.5 Package Selection for details.
20. 2 Chapter 1. Kickstart Installations
• The %pre and %post sections — These two sections can be in any order and are not required.
Refer to Section 1.6 Pre-installation Script and Section 1.7 Post-installation Script for details.
• Items that are not required can be omitted.
• Omitting any required item results in the installation program prompting the user for an answer to
the related item, just as the user would be prompted during a typical installation. Once the answer
is given, the installation continues unattended (unless it finds another missing item).
• Lines starting with a pound sign (#) are treated as comments and are ignored.
• For kickstart upgrades, the following items are required:
• Language
• Language support
• Installation method
• Device specification (if device is needed to perform the installation)
• Keyboard setup
• The upgrade keyword
• Boot loader configuration
If any other items are specified for an upgrade, those items are ignored (note that this includes
package selection).
1.4. Kickstart Options
The following options can be placed in a kickstart file. If you prefer to use a graphical
interface for creating your kickstart file, use the Kickstart Configurator application. Refer to
Chapter 2 Kickstart Configurator for details.
Note
If the option is followed by an equals mark (=), a value must be specified after it. In the example
commands, options in brackets ([]) are optional arguments for the command.
autopart (optional)
Automatically create partitions — 1 GB or more root (/) partition, a swap partition, and an
appropriate boot partition for the architecture. One or more of the default partition sizes can be
redefined with the part directive.
autostep (optional)
Similar to interactive except it goes to the next screen for you. It is used mostly for debug-
ging.
auth or authconfig (required)
Sets up the authentication options for the system. It is similar to the authconfig command,
which can be run after the install. By default, passwords are normally encrypted and are not
shadowed.
21. Chapter 1. Kickstart Installations 3
--enablemd5
Use md5 encryption for user passwords.
--enablenis
Turns on NIS support. By default, --enablenis uses whatever domain it finds on the
network. A domain should almost always be set by hand with the --nisdomain= option.
--nisdomain=
NIS domain name to use for NIS services.
--nisserver=
Server to use for NIS services (broadcasts by default).
--useshadow or --enableshadow
Use shadow passwords.
--enableldap
Turns on LDAP support in /etc/nsswitch.conf, allowing your system to retrieve infor-
mation about users (UIDs, home directories, shells, etc.) from an LDAP directory. To use
this option, you must install the nss_ldap package. You must also specify a server and a
base DN (distinguished name) with --ldapserver= and --ldapbasedn=.
--enableldapauth
Use LDAP as an authentication method. This enables the pam_ldap module for authen-
tication and changing passwords, using an LDAP directory. To use this option, you must
have the nss_ldap package installed. You must also specify a server and a base DN with
--ldapserver= and --ldapbasedn=.
--ldapserver=
If you specified either --enableldap or --enableldapauth, use this option to specify
the name of the LDAP server to use. This option is set in the /etc/ldap.conf file.
--ldapbasedn=
If you specified either --enableldap or --enableldapauth, use this option to specify
the DN in your LDAP directory tree under which user information is stored. This option is
set in the /etc/ldap.conf file.
--enableldaptls
Use TLS (Transport Layer Security) lookups. This option allows LDAP to send encrypted
usernames and passwords to an LDAP server before authentication.
--enablekrb5
Use Kerberos 5 for authenticating users. Kerberos itself does not know about home direc-
tories, UIDs, or shells. If you enable Kerberos, you must make users’ accounts known to
this workstation by enabling LDAP, NIS, or Hesiod or by using the /usr/sbin/useradd
command to make their accounts known to this workstation. If you use this option, you must
have the pam_krb5 package installed.
--krb5realm=
The Kerberos 5 realm to which your workstation belongs.
22. 4 Chapter 1. Kickstart Installations
--krb5kdc=
The KDC (or KDCs) that serve requests for the realm. If you have multiple KDCs in your
realm, separate their names with commas (,).
--krb5adminserver=
The KDC in your realm that is also running kadmind. This server handles password chang-
ing and other administrative requests. This server must be run on the master KDC if you
have more than one KDC.
--enablehesiod
Enable Hesiod support for looking up user home directories, UIDs, and shells.
More information on setting up and using Hesiod on your network is in
/usr/share/doc/glibc-2.x.x/README.hesiod, which is included in the glibc
package. Hesiod is an extension of DNS that uses DNS records to store information about
users, groups, and various other items.
--hesiodlhs
The Hesiod LHS ("left-hand side") option, set in /etc/hesiod.conf. This option is used
by the Hesiod library to determine the name to search DNS for when looking up informa-
tion, similar to LDAP’s use of a base DN.
--hesiodrhs
The Hesiod RHS ("right-hand side") option, set in /etc/hesiod.conf. This option is
used by the Hesiod library to determine the name to search DNS for when looking up
information, similar to LDAP’s use of a base DN.
Tip
To look up user information for "jim", the Hesiod library looks up
jim.passwd<LHS><RHS>, which should resolve to a TXT record that looks like what
his passwd entry would look like (jim:*:501:501:Jungle Jim:/home/jim:/bin/bash).
For groups, the situation is identical, except jim.group<LHS><RHS> would be used.
Looking up users and groups by number is handled by making "501.uid" a CNAME for
"jim.passwd", and "501.gid" a CNAME for "jim.group". Note that the LHS and RHS do not
have periods [.] put in front of them when the library determines the name for which to
search, so the LHS and RHS usually begin with periods.
--enablesmbauth
Enables authentication of users against an SMB server (typically a Samba or Windows
server). SMB authentication support does not know about home directories, UIDs, or shells.
If you enable SMB, you must make users’ accounts known to the workstation by enabling
LDAP, NIS, or Hesiod or by using the /usr/sbin/useradd command to make their ac-
counts known to the workstation. To use this option, you must have the pam_smb package
installed.
--smbservers=
The name of the server(s) to use for SMB authentication. To specify more than one server,
separate the names with commas (,).
--smbworkgroup=
The name of the workgroup for the SMB servers.
23. Chapter 1. Kickstart Installations 5
--enablecache
Enables the nscd service. The nscd service caches information about users, groups, and
various other types of information. Caching is especially helpful if you choose to distribute
information about users and groups over your network using NIS, LDAP, or hesiod.
bootloader (required)
Specifies how the GRUB boot loader should be installed. This option is required for both instal-
lations and upgrades. For upgrades, if GRUB is not the current boot loader, the boot loader is
changed to GRUB. To preserve other boot loaders, use bootloader --upgrade.
--append=
Specifies kernel parameters. To specify multiple parameters, separate them with spaces. For
example:
bootloader --location=mbr --append="hdd=ide-scsi ide=nodma"
--driveorder
Specify which drive is first in the BIOS boot order. For example:
bootloader --driveorder=sda,hda
--location=
Specifies where the boot record is written. Valid values are the following: mbr (the default),
partition (installs the boot loader on the first sector of the partition containing the kernel),
or none (do not install the boot loader).
--password=
Sets the GRUB boot loader password to the one specified with this option. This should be
used to restrict access to the GRUB shell, where arbitrary kernel options can be passed.
--md5pass=
Similar to --password= except the password should already be encrypted.
--upgrade
Upgrade the existing boot loader configuration, preserving the old entries. This option is
only available for upgrades.
clearpart (optional)
Removes partitions from the system, prior to creation of new partitions. By default, no partitions
are removed.
Note
If the clearpart command is used, then the --onpart command cannot be used on a logical
partition.
--all
Erases all partitions from the system.
24. 6 Chapter 1. Kickstart Installations
--drives=
Specifies which drives to clear partitions from. For example, the following clears all the
partitions on the first two drives on the primary IDE controller:
clearpart --drives=hda,hdb --all
--initlabel
Initializes the disk label to the default for your architecture (for example msdos for x86
and gpt for Itanium). It is useful so that the installation program does not ask if it should
initialize the disk label if installing to a brand new hard drive.
--linux
Erases all Linux partitions.
--none (default)
Do not remove any partitions.
cmdline (optional)
Perform the installation in a completely non-interactive command line mode. Any prompts for
interaction halts the install. This mode is useful on S/390 systems with the x3270 console.
device (optional)
On most PCI systems, the installation program autoprobes for Ethernet and SCSI cards properly.
On older systems and some PCI systems, however, kickstart needs a hint to find the proper
devices. The device command, which tells the installation program to install extra modules, is
in this format:
device <type> <moduleName> --opts=<options>
<type>
Replace with either scsi or eth
<moduleName>
Replace with the name of the kernel module which should be installed.
--opts=
Options to pass to the kernel module. Note that multiple options may be passed if they are
put in quotes. For example:
--opts="aic152x=0x340 io=11"
driverdisk (optional)
Driver diskettes can be used during kickstart installations. You must copy the driver diskettes’s
contents to the root directory of a partition on the system’s hard drive. Then you must use the
driverdisk command to tell the installation program where to look for the driver disk.
driverdisk <partition> [--type=<fstype>]
Alternatively, a network location can be specified for the driver diskette:
driverdisk --source=ftp://path/to/dd.img
driverdisk --source=http://path/to/dd.img
driverdisk --source=nfs:host:/path/to/img
25. Chapter 1. Kickstart Installations 7
<partition>
Partition containing the driver disk.
--type=
File system type (for example, vfat or ext2).
firewall (optional)
This option corresponds to the Firewall Configuration screen in the installation program:
firewall --enabled|--disabled [--trust=] <device> [--port=]
--enabled
Reject incoming connections that are not in response to outbound requests, such as DNS
replies or DHCP requests. If access to services running on this machine is needed, you can
choose to allow specific services through the firewall.
--disabled
Do not configure any iptables rules.
--trust=
Listing a device here, such as eth0, allows all traffic coming from that device to go through
the firewall. To list more than one device, use --trust eth0 --trust eth1. Do NOT
use a comma-separated format such as --trust eth0, eth1.
<incoming>
Replace with one or more of the following to allow the specified services through the fire-
wall.
• --ssh
• --telnet
• --smtp
• --http
• --ftp
--port=
You can specify that ports be allowed through the firewall using the port:protocol format.
For example, to allow IMAP access through your firewall, specify imap:tcp. Numeric
ports can also be specified explicitly; for example, to allow UDP packets on port 1234
through, specify 1234:udp. To specify multiple ports, separate them by commas.
firstboot (optional)
Determine whether the Setup Agent starts the first time the system is booted. If enabled, the
firstboot package must be installed. If not specified, this option is disabled by default.
--enable
The Setup Agent is started the first time the system boots.
26. 8 Chapter 1. Kickstart Installations
--disable
The Setup Agent is not started the first time the system boots.
--reconfig
Enable the Setup Agent to start at boot time in reconfiguration mode. This mode enables
the language, mouse, keyboard, root password, security level, time zone, and networking
configuration options in addition to the default ones.
halt (optional)
Halt the system after the installation has successfully completed. This is similar to a manual
installation, where anaconda displays a message and waits for the user to press a key before re-
booting. During a kickstart installation, if no completion method is specified, the reboot option
is used as default.
The halt option is roughly equivalent to the shutdown -h command.
For other completion methods, refer to the poweroff, reboot, and shutdown kickstart options.
install (optional)
Tells the system to install a fresh system rather than upgrade an existing system. This is the
default mode. For installation, you must specify the type of installation from cdrom, harddrive,
nfs, or url (for FTP or HTTP installations). The install command and the installation method
command must be on separate lines.
cdrom
Install from the first CD-ROM drive on the system.
harddrive
Install from a Red Hat installation tree on a local drive, which must be either vfat or ext2.
• --partition=
Partition to install from (such as, sdb2).
• --dir=
Directory containing the RedHat directory of the installation tree.
For example:
harddrive --partition=hdb2 --dir=/tmp/install-tree
nfs
Install from the NFS server specified.
• --server=
Server from which to install (hostname or IP).
• --dir=
Directory containing the RedHat directory of the installation tree.
For example:
nfs --server=nfsserver.example.com --dir=/tmp/install-tree
27. Chapter 1. Kickstart Installations 9
url
Install from an installation tree on a remote server via FTP or HTTP.
For example:
url --url http://<server>/<dir>
or:
url --url ftp://<username>:<password>@<server>/<dir>
interactive (optional)
Uses the information provided in the kickstart file during the installation, but allow for inspection
and modification of the values given. You are presented with each screen of the installation
program with the values from the kickstart file. Either accept the values by clicking Next or
change the values and click Next to continue. Refer to the autostep command.
keyboard (required)
Sets system keyboard type. Here is the list of available keyboards on i386, Itanium, and Alpha
machines:
be-latin1, bg, br-abnt2, cf, cz-lat2, cz-us-qwertz, de,
de-latin1, de-latin1-nodeadkeys, dk, dk-latin1, dvorak, es, et,
fi, fi-latin1, fr, fr-latin0, fr-latin1, fr-pc, fr_CH, fr_CH-latin1,
gr, hu, hu101, is-latin1, it, it-ibm, it2, jp106, la-latin1, mk-utf,
no, no-latin1, pl, pt-latin1, ro_win, ru, ru-cp1251, ru-ms, ru1, ru2,
ru_win, se-latin1, sg, sg-latin1, sk-qwerty, slovene, speakup,
speakup-lt, sv-latin1, sg, sg-latin1, sk-querty, slovene, trq, ua,
uk, us, us-acentos
The file /usr/lib/python2.2/site-packages/rhpl/keyboard_models.py also
contains this list and is part of the rhpl package.
lang (required)
Sets the language to use during installation. For example, to set the language to English, the
kickstart file should contain the following line:
lang en_US
The file /usr/share/system-config-language/locale-list provides a list of the valid
language codes in the first column of each line and is part of the system-config-language
package.
langsupport (required)
Sets the language(s) to install on the system. The same language codes used with lang can be
used with langsupport.
To install one language, specify it. For example, to install and use the French language fr_FR:
langsupport fr_FR
--default=
If language support for more than one language is specified, a default must be identified.
For example, to install English and French and use English as the default language:
langsupport --default=en_US fr_FR
If you use --default with only one language, all languages are installed with the specified
language set to the default.
28. 10 Chapter 1. Kickstart Installations
logvol (optional)
Create a logical volume for Logical Volume Management (LVM) with the syntax:
logvol <mntpoint> --vgname=<name> --size=<size> --name=<name> <options>
The options are as follows:
--noformat
Use an existing logical volume and do not format it.
--useexisting
Use an existing logical volume and reformat it.
Create the partition first, create the logical volume group, and then create the logical volume. For
example:
part pv.01 --size 3000
volgroup myvg pv.01
logvol / --vgname=myvg --size=2000 --name=rootvol
For a detailed example of logvol in action, refer to
Section 1.4.1 Advanced Partitioning Example.
mouse (required)
Configures the mouse for the system, both in GUI and text modes. Options are:
--device=
Device the mouse is on (such as --device=ttyS0).
--emulthree
If present, simultaneous clicks on the left and right mouse buttons are recognized as the
middle mouse button by the X Window System. This option should be used if you have a
two button mouse.
After options, the mouse type may be specified as one of the following:
alpsps/2, ascii, asciips/2, atibm, generic, generic3, genericps/2,
generic3ps/2, genericwheelps/2, genericusb, generic3usb, genericwheelusb,
geniusnm, geniusnmps/2, geniusprops/2, geniusscrollps/2, geniusscrollps/2+,
thinking, thinkingps/2, logitech, logitechcc, logibm, logimman,
logimmanps/2, logimman+, logimman+ps/2, logimmusb, microsoft, msnew,
msintelli, msintellips/2, msintelliusb, msbm, mousesystems, mmseries,
mmhittab, sun, none
This list can also be found in the /usr/lib/python2.2/site-packages/rhpl/mouse.py
file, which is part of the rhpl package.
If the mouse command is given without any arguments, or it is omitted, the installation program
attempts to automatically detect the mouse. This procedure works for most modern mice.
network (optional)
Configures network information for the system. If the kickstart installation does not require net-
working (in other words, it is not installed over NFS, HTTP, or FTP), networking is not config-
ured for the system. If the installation does require networking and network information is not
provided in the kickstart file, the installation program assumes that the installation should be done
over eth0 via a dynamic IP address (BOOTP/DHCP), and configures the final, installed system to
determine its IP address dynamically. The network option configures networking information
for kickstart installations via a network as well as for the installed system.
29. Chapter 1. Kickstart Installations 11
--bootproto=
One of dhcp, bootp, or static.
It defaults to dhcp. bootp and dhcp are treated the same.
The DHCP method uses a DHCP server system to obtain its networking configuration. As
you might guess, the BOOTP method is similar, requiring a BOOTP server to supply the
networking configuration. To direct a system to use DHCP:
network --bootproto=dhcp
To direct a machine to use BOOTP to obtain its networking configuration, use the following
line in the kickstart file:
network --bootproto=bootp
The static method requires that you enter all the required networking information in the
kickstart file. As the name implies, this information is static and are used during and after
the installation. The line for static networking is more complex, as you must include all
network configuration information on one line. You must specify the IP address, netmask,
gateway, and nameserver. For example: (the "" indicates that this should be read as one
continuous line):
network --bootproto=static --ip=10.0.2.15 --netmask=255.255.255.0
--gateway=10.0.2.254 --nameserver=10.0.2.1
If you use the static method, be aware of the following two restrictions:
• All static networking configuration information must be specified on one line; you cannot
wrap lines using a backslash, for example.
• You can only specify one nameserver here. However, you can use the kickstart file’s
%post section (described in Section 1.7 Post-installation Script) to add more name
servers, if needed.
--device=
Used to select a specific Ethernet device for installation. Note that using --device= is not
effective unless the kickstart file is a local file (such as ks=floppy), since the installation
program configures the network to find the kickstart file. For example:
network --bootproto=dhcp --device=eth0
--ip=
IP address for the machine to be installed.
--gateway=
Default gateway as an IP address.
--nameserver=
Primary nameserver, as an IP address.
--nodns
Do not configure any DNS server.
--netmask=
Netmask for the installed system.
30. 12 Chapter 1. Kickstart Installations
--hostname=
Hostname for the installed system.
part or partition (required for installs, ignored for upgrades)
Creates a partition on the system.
If more than one Red Hat Enterprise Linux installation exists on the system on different parti-
tions, the installation program prompts the user and asks which installation to upgrade.
Warning
All partitions created are formatted as part of the installation process unless --noformat and
--onpart are used.
For a detailed example of part in action, refer to Section 1.4.1 Advanced Partitioning Example.
<mntpoint>
The <mntpoint> is where the partition is mounted and must be of one of the following
forms:
• /<path>
For example, /, /usr, /home
• swap
The partition is used as swap space.
To determine the size of the swap partition automatically, use the --recommended op-
tion:
swap --recommended
The minimum size of the automatically-generated swap partition is no smaller than the
amount of RAM in the system and no larger than twice the amount of RAM in the system.
• raid.<id>
The partition is used for software RAID (refer to raid).
• pv.<id>
The partition is used for LVM (refer to logvol).
--size=
The minimum partition size in megabytes. Specify an integer value here such as 500. Do
not append the number with MB.
--grow
Tells the partition to grow to fill available space (if any), or up to the maximum size setting.
--maxsize=
The maximum partition size in megabytes when the partition is set to grow. Specify an
integer value here, and do not append the number with MB.
--noformat
Tells the installation program not to format the partition, for use with the --onpart com-
mand.
31. Chapter 1. Kickstart Installations 13
--onpart= or --usepart=
Put the partition on the already existing device. For example:
partition /home --onpart=hda1
puts /home on /dev/hda1, which must already exist.
--ondisk= or --ondrive=
Forces the partition to be created on a particular disk. For example, --ondisk=sdb puts
the partition on the second SCSI disk on the system.
--asprimary
Forces automatic allocation of the partition as a primary partition, or the partitioning fails.
--type= (replaced by fstype)
This option is no longer available. Use fstype.
--fstype=
Sets the file system type for the partition. Valid values are ext2, ext3, swap, and vfat.
--start=
Specifies the starting cylinder for the partition. It requires that a drive be specified with
--ondisk= or ondrive=. It also requires that the ending cylinder be specified with --end=
or the partition size be specified with --size=.
--end=
Specifies the ending cylinder for the partition. It requires that the starting cylinder be speci-
fied with --start=.
Note
If partitioning fails for any reason, diagnostic messages appear on virtual console 3.
poweroff (optional)
Shut down and power off the system after the installation has successfully completed. Normally
during a manual installation, anaconda displays a message and waits for the user to press a
key before rebooting. During a kickstart installation, if no completion method is specified, the
reboot option is used as default.
The poweroff option is roughly equivalent to the shutdown -p command.
Note
The poweroff option is highly dependent on the system hardware in use. Specifically, cer-
tain hardware components such as the BIOS, APM (advanced power management), and ACPI
(advanced configuration and power interface) must be able to interact with the system kernel.
Contact your manufacturer for more information on you system’s APM/ACPI abilities.
For other completion methods, refer to the halt, reboot, and shutdown kickstart options.
32. 14 Chapter 1. Kickstart Installations
raid (optional)
Assembles a software RAID device. This command is of the form:
raid <mntpoint> --level=<level> --device=<mddevice> <partitions*>
<mntpoint>
Location where the RAID file system is mounted. If it is /, the RAID level must be 1 unless
a boot partition (/boot) is present. If a boot partition is present, the /boot partition must be
level 1 and the root (/) partition can be any of the available types. The <partitions*>
(which denotes that multiple partitions can be listed) lists the RAID identifiers to add to the
RAID array.
--level=
RAID level to use (0, 1, or 5).
--device=
Name of the RAID device to use (such as md0 or md1). RAID devices range from md0 to
md7, and each may only be used once.
--spares=
Specifies the number of spare drives allocated for the RAID array. Spare drives are used to
rebuild the array in case of drive failure.
--fstype=
Sets the file system type for the RAID array. Valid values are ext2, ext3, swap, and vfat.
--noformat
Use an existing RAID device and do not format the RAID array.
--useexisting
Use an existing RAID device and reformat it.
The following example shows how to create a RAID level 1 partition for /, and a RAID level 5
for /usr, assuming there are three SCSI disks on the system. It also creates three swap partitions,
one on each drive.
part raid.01 --size=60 --ondisk=sda
part raid.02 --size=60 --ondisk=sdb
part raid.03 --size=60 --ondisk=sdc
part swap --size=128 --ondisk=sda
part swap --size=128 --ondisk=sdb
part swap --size=128 --ondisk=sdc
part raid.11 --size=1 --grow --ondisk=sda
part raid.12 --size=1 --grow --ondisk=sdb
part raid.13 --size=1 --grow --ondisk=sdc
raid / --level=1 --device=md0 raid.01 raid.02 raid.03
raid /usr --level=5 --device=md1 raid.11 raid.12 raid.13
For a detailed example of raid in action, refer to Section 1.4.1 Advanced Partitioning Example.
reboot (optional)
Reboot after the installation is successfully completed (no arguments). Normally during a manual
installation, anaconda displays a message and waits for the user to press a key before rebooting.
The reboot option is roughly equivalent to the shutdown -r command.
33. Chapter 1. Kickstart Installations 15
Note
Use of the reboot option may result in an endless installation loop, depending on the installation
media and method.
The reboot option is the default completion method if no other methods are explicitly specified
in the kickstart file.
For other completion methods, refer to the halt, poweroff, and shutdown kickstart options.
rootpw (required)
Sets the system’s root password to the <password> argument.
rootpw [--iscrypted] <password>
--iscrypted
If this is present, the password argument is assumed to already be encrypted.
selinux (optional)
Sets the system’s SELinux mode to one of the following arguments:
--enforcing
Enables SELinux with the default targeted policy being enforced.
Note
If the selinux option is not present in the kickstart file, SELinux is enabled and set to
--enforcing by default.
--permissive
Outputs warnings only based on the SELinux policy, but does not actually enforce the pol-
icy.
--disabled
Disables SELinux completely on the system.
For complete information regarding SELinux for Red Hat Enterprise Linux, refer to the Red Hat
SELinux Guide.
shutdown (optional)
Shut down the system after the installation has successfully completed. During a kickstart instal-
lation, if no completion method is specified, the reboot option is used as default.
The shutdown option is roughly equivalent to the shutdown command.
For other completion methods, refer to the halt, poweroff, and reboot kickstart options.
skipx (optional)
If present, X is not configured on the installed system.
34. 16 Chapter 1. Kickstart Installations
text (optional)
Perform the kickstart installation in text mode. Kickstart installations are performed in graphical
mode by default.
timezone (required)
Sets the system time zone to <timezone> which may be any of the time zones listed by
timeconfig.
timezone [--utc] <timezone>
--utc
If present, the system assumes the hardware clock is set to UTC (Greenwich Mean) time.
upgrade (optional)
Tells the system to upgrade an existing system rather than install a fresh system. You must specify
one of cdrom, harddrive, nfs, or url (for FTP and HTTP) as the location of the installation
tree. Refer to install for details.
xconfig (optional)
Configures the X Window System. If this option is not given, the user must configure X manually
during the installation, if X was installed; this option should not be used if X is not installed on
the final system.
--noprobe
Do not probe the monitor.
--card=
Use specified card; this card name should be from the list of cards in
/usr/share/hwdata/Cards from the hwdata package. The list of cards can also be
found on the X Configuration screen of the Kickstart Configurator. If this argument is
not provided, the installation program probes the PCI bus for the card. Since AGP is part of
the PCI bus, AGP cards are detected if supported. The probe order is determined by the
PCI scan order of the motherboard.
--videoram=
Specifies the amount of video RAM the video card has.
--monitor=
Use specified monitor; monitor name should be from the list of monitors in
/usr/share/hwdata/MonitorsDB from the hwdata package. The list of monitors can
also be found on the X Configuration screen of the Kickstart Configurator. This is
ignored if --hsync or --vsync is provided. If no monitor information is provided, the
installation program tries to probe for it automatically.
--hsync=
Specifies the horizontal sync frequency of the monitor.
--vsync=
Specifies the vertical sync frequency of the monitor.
35. Chapter 1. Kickstart Installations 17
--defaultdesktop=
Specify either GNOME or KDE to set the default desktop (assumes that GNOME Desktop
Environment and/or KDE Desktop Environment has been installed through %packages).
--startxonboot
Use a graphical login on the installed system.
--resolution=
Specify the default resolution for the X Window System on the installed system. Valid
values are 640x480, 800x600, 1024x768, 1152x864, 1280x1024, 1400x1050, 1600x1200.
Be sure to specify a resolution that is compatible with the video card and monitor.
--depth=
Specify the default color depth for the X Window System on the installed system. Valid
values are 8, 16, 24, and 32. Be sure to specify a color depth that is compatible with the
video card and monitor.
volgroup (optional)
Use to create a Logical Volume Management (LVM) group with the syntax:
volgroup <name> <partition> <options>
The options are as follows:
--noformat
Use an existing volume group and do not format it.
--useexisting
Use an existing volume group and reformat it.
Create the partition first, create the logical volume group, and then create the logical volume. For
example:
part pv.01 --size 3000
volgroup myvg pv.01
logvol / --vgname=myvg --size=2000 --name=rootvol
For a detailed example of volgroup in action, refer to
Section 1.4.1 Advanced Partitioning Example.
zerombr (optional)
If zerombr is specified, and yes is its sole argument, any invalid partition tables found on
disks are initialized. This destroys all of the contents of disks with invalid partition tables. This
command should be in the following format:
zerombr yes
No other format is effective.
%include
Use the %include /path/to/file command to include the contents of another file in the
kickstart file as though the contents were at the location of the %include command in the kick-
start file.
36. 18 Chapter 1. Kickstart Installations
1.4.1. Advanced Partitioning Example
The following is a single, integrated example showing the clearpart, raid, part, volgroup, and
logvol kickstart options in action:
clearpart --drives=hda,hdc --initlabel
# Raid 1 IDE config
part raid.11 --size 1000 --asprimary --ondrive=hda
part raid.12 --size 1000 --asprimary --ondrive=hda
part raid.13 --size 2000 --asprimary --ondrive=hda
part raid.14 --size 8000 --ondrive=hda
part raid.15 --size 1 --grow --ondrive=hda
part raid.21 --size 1000 --asprimary --ondrive=hdc
part raid.22 --size 1000 --asprimary --ondrive=hdc
part raid.23 --size 2000 --asprimary --ondrive=hdc
part raid.24 --size 8000 --ondrive=hdc
part raid.25 --size 1 --grow --ondrive=hdc
# You can add --spares=x
raid / --fstype ext3 --device md0 --level=RAID1 raid.11 raid.21
raid /safe --fstype ext3 --device md1 --level=RAID1 raid.12 raid.22
raid swap --fstype swap --device md2 --level=RAID1 raid.13 raid.23
raid /usr --fstype ext3 --device md3 --level=RAID1 raid.14 raid.24
raid pv.01 --fstype ext3 --device md4 --level=RAID1 raid.15 raid.25
# LVM configuration so that we can resize /var and /usr/local later
volgroup sysvg pv.01
logvol /var --vgname=sysvg --size=8000 --name=var
logvol /var/freespace --vgname=sysvg --size=8000 --name=freespacetouse
logvol /usr/local --vgname=sysvg --size=1 --grow --name=usrlocal
This advanced example implements LVM over RAID, as well as the ability to resize various directories
for future growth.
1.5. Package Selection
Use the %packages command to begin a kickstart file section that lists the packages you would like
to install (this is for installations only, as package selection during upgrades is not supported).
Packages can be specified by group or by individual package name. The installation program defines
several groups that contain related packages. Refer to the RedHat/base/comps.xml file on the first
Red Hat Enterprise Linux CD-ROM for a list of groups. Each group has an id, user visibility value,
name, description, and package list. In the package list, the packages marked as mandatory are always
installed if the group is selected, the packages marked default are selected by default if the group is
selected, and the packages marked optional must be specifically selected even if the group is selected
to be installed.
In most cases, it is only necessary to list the desired groups and not individual packages. Note that
the Core and Base groups are always selected by default, so it is not necessary to specify them in the
%packages section.
Here is an example %packages selection:
%packages
@ X Window System
37. Chapter 1. Kickstart Installations 19
@ GNOME Desktop Environment
@ Graphical Internet
@ Sound and Video
dhcp
As you can see, groups are specified, one to a line, starting with an @ symbol, a space, and then the full
group name as given in the comps.xml file. Groups can also be specified using the id for the group,
such as gnome-desktop. Specify individual packages with no additional characters (the dhcp line
in the example above is an individual package).
You can also specify which packages not to install from the default package list:
-autofs
The following options are available for the %packages option:
--resolvedeps
Install the listed packages and automatically resolve package dependencies. If this option is not
specified and there are package dependencies, the automated installation pauses and prompts the
user. For example:
%packages --resolvedeps
--ignoredeps
Ignore the unresolved dependencies and install the listed packages without the dependencies. For
example:
%packages --ignoredeps
--ignoremissing
Ignore the missing packages and groups instead of halting the installation to ask if the installation
should be aborted or continued. For example:
%packages --ignoremissing
1.6. Pre-installation Script
You can add commands to run on the system immediately after the ks.cfg has been parsed. This
section must be at the end of the kickstart file (after the commands) and must start with the %pre
command. You can access the network in the %pre section; however, name service has not been
configured at this point, so only IP addresses work.
Note
Note that the pre-install script is not run in the change root environment.
--interpreter /usr/bin/python
Allows you to specify a different scripting language, such as Python. Replace
/usr/bin/python with the scripting language of your choice.
38. 20 Chapter 1. Kickstart Installations
1.6.1. Example
Here is an example %pre section:
%pre
#!/bin/sh
hds=""
mymedia=""
for file in /proc/ide/h*
do
mymedia=‘cat $file/media‘
if [ $mymedia == "disk" ] ; then
hds="$hds ‘basename $file‘"
fi
done
set $hds
numhd=‘echo $#‘
drive1=‘echo $hds | cut -d’ ’ -f1‘
drive2=‘echo $hds | cut -d’ ’ -f2‘
#Write out partition scheme based on whether there are 1 or 2 hard drives
if [ $numhd == "2" ] ; then
#2 drives
echo "#partitioning scheme generated in %pre for 2 drives" > /tmp/part-include
echo "clearpart --all" >> /tmp/part-include
echo "part /boot --fstype ext3 --size 75 --ondisk hda" >> /tmp/part-include
echo "part / --fstype ext3 --size 1 --grow --ondisk hda" >> /tmp/part-include
echo "part swap --recommended --ondisk $drive1" >> /tmp/part-include
echo "part /home --fstype ext3 --size 1 --grow --ondisk hdb" >> /tmp/part-include
else
#1 drive
echo "#partitioning scheme generated in %pre for 1 drive" > /tmp/part-include
echo "clearpart --all" >> /tmp/part-include
echo "part /boot --fstype ext3 --size 75" >> /tmp/part-includ
echo "part swap --recommended" >> /tmp/part-include
echo "part / --fstype ext3 --size 2048" >> /tmp/part-include
echo "part /home --fstype ext3 --size 2048 --grow" >> /tmp/part-include
fi
This script determines the number of hard drives in the system and writes a text file with a differ-
ent partitioning scheme depending on whether it has one or two drives. Instead of having a set of
partitioning commands in the kickstart file, include the line:
%include /tmp/part-include
The partitioning commands selected in the script are used.