You are on page 1of 19

TRAINING REDHAT ENTERPRISE SERVER

GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

HIMATEK TRAINING:

Green Your Redhat Enterprise Server, Make Powerful Server in Easy Ways

Copyright © 2010 HIMATEK POLITEKNIK TELKOM.


1 Street of Telecommunication Bandung
West Java
Phone: +628121462400
Phone: +6285224655699
PO Box 40267
HIMATEK Research of Joy Development, INA

Copyright © 2010 by Greenhimatek.com. This material may be distributed only


subject to the terms and conditions set forth in the Open Publication License, V1.0 or
later (the latest version is presently available at
http://www.opencontent.org/openpub/).

Distribution of substantively modified versions of this document is prohibited without


the explicit permission of the copyright holder.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

INTRODUCTION

Welcome to the Red Hat Enterprise Linux System Administration Guide.

The Red Hat Enterprise Linux System Administration Guide contains information on
how to customize your Red Hat Enterprise Linux system to it your needs. If you are
looking for a step-by-step, task oriented guide for configuring and customizing your
system, this is the manual for you. This manual discusses many intermediate topics
such as the following:

1. Install your Redhat Server

2. Basic Keyword In Linux

3. Performing Basic Command Linux

4. Linux Directories

5. Setting up a network interface card (NIC)

6. Managing your software with RPM

7. Uderstanding kernel

This guide assumes you have a basic understanding of your Red Hat Enterprise
Linux system. If you need help installing Red Hat Enterprise Linux, refer to the Red
Hat Enterprise Linux Installation Guide. For more general information about system
administration, refer to the Red Hat Enterprise Linux Introduction to System
Administration. If you need more advanced documentation such as overview of file
systems, refer to the Red Hat Enterprise Linux Reference Guide. If you need security
information, refer to the Red Hat Enterprise Linux Security Guide.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

THE COMPLETE STEPS OF TRAINING

1. INSTALL YOUR REDHAT SERVER

Press the “Start this virtual machine” to start the installation and wait the
loading. And type “Linux text” to enter the text mode installation, and press
Enter. Or Press ENTER to set up graphically.

In welcome screen, click OK to continue.

Choose the language section to install and choose the keyboard that is used,
about “US”. And click Ok.

In the disk partition setup press “Disk Druid” and OK

And set the partition of it in option: new, edit, delete dll.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

Crate the “swap” partition as virtual memory on the Hard disk about

512 MB

Create mount partition as: /. And choose the “fill all available space” press
Ok

Check the configuration carefully and press OK

In the “Boot Loader Configuration” window set as the requirement, be careful


of it and press Ok.

Here is the configuration was made before, read it carefully and click OK.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

In this window should be committing about the security, assumed no GRUB


password and click OK.

Here about the place wants to be installed of Linux, press OK.

In the network configuration for eth0 select all “Configure using DHCP” and
“activate on boot”. And click OK

About configuration of hostname choose “Automatically via DHCP” press OK

Enable the “Firewall”. And press OK.

Select the language that is used in Linux, for instance English UK and click
OK.

Choose time zonal we are living, example Asia/Jakarta

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

Set the root password as you can and easy to be remembered by yourself.

Select the software additional package want to be installed or leave it.

In the “customize” of package group selection, select the programs will be


customized. Select as the requirement and click OK.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

Will appear the window “Installation to begin” it just clicks OK to start


formatting phase.

INSTALLATION WAIT TO COMPLETE

2. BASIC KEYWORD IN LINUX

The ext3 File System

The ext3 file system is essentially an enhanced version of the ext2 file
system. These improvements provide the following advantages:

Availability

After an unexpected power failure or system crash (also called an unclean


system shutdown), each mounted ext2 file system on the machine must be
checked for consistency by the e2fsck program. This is a time-consuming
process that can delay system boot time significantly, especially with large
volumes containing a large number of files. During this time, any data on the
volumes is unreachable.

Data Integrity

The ext3 file system provides stronger data integrity in the event that an
unclean system shutdown occurs. The ext3 file system allows you to choose
the type and level of protection that your data receives. By default, the ext3
volumes are configured to keep a high level of data consistency with regard
to the state of the file system.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

Speed

Despite writing some data more than once, ext3 has a higher throughput in
most cases than ext2 because ext3's journaling optimizes hard drive head
motion. You can choose from three journaling modes to optimize speed, but
doing so means trade-offs in regards to data integrity.

Easy Transition

It is easy to migrate from ext2 to ext3 and gain the benefits of a robust
journaling file system without reformatting.

Logical Volume Manager (LVM)

LVM is a method of allocating hard drive space into logical volumes that can
be easily resized instead of partitions. With LVM, a hard drive or set of hard
drives is allocated to one or more physical volumes. A physical volume
cannot span over more than one drive.

The physical volumes are combined into logical volume groups, with the
exception of the /boot/partition. The /boot/ partition cannot be on a logical
volume group because the boot loader cannot read it. If the root (/) partition
is on a logical volume, create a separate /boot/ partition which is not a part
of a volume group. Since a physical volume cannot span over multiple drives,
to span over more than one drive, create one or more physical volumes per
drive.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

Redundant Array of Independent Disks (RAID)

The basic idea behind RAID is to combine multiple small, inexpensive disk
drives into an array to accomplish performance or redundancy goals not
attainable with one large and expensive drive. This array of drives appears to
the computer as a single logical storage unit or drive.

RAID is a method in which information is spread across several disks. RAID


uses techniques such as disk striping (RAID Level 0), disk mirroring (RAID
level 1), and disk striping with parity (RAID Level 5) to achieve redundancy,
lower latency and/or to increase bandwidth for reading or writing to disks,
and to maximize the ability to recover from hard disk crashes.

A. Level 0

RAID level 0, often called "striping," is a performance-oriented striped


data mapping technique. This means the data being written to the array
is broken down into strips and written across the member disks of the
array, allowing high I/O performance at low inherent cost but provides no
redundancy. The storage capacity of a level 0 array is equal to the total
capacity of the member disks in a Hardware RAID or the total capacity of
member partitions in a Software RAID.

B. Level 1

RAID level 1, or "mirroring," has been used longer than any other form of
RAID. Level 1 provides redundancy by writing identical data to each
member disk of the array, leaving a "mirrored" copy on each disk.
Mirroring that remains popular due to its simplicity and high level of data
availability. The storage capacity of the level 1 array is equal to the
capacity of one of the mirrored hard disks in a Hardware RAID or one of
the mirrored partitions in a Software RAID.

C. Level 4

Level 4 uses parity 3 concentrated on a single disk drive to protect data.


It is better suited to transaction I/O rather than large file transfers.
Because the dedicated parity disk represents an inherent bottleneck,
level 4 is seldom used without accompanying technologies such as write-
back caching. The storage capacity of Software RAID level 4 is equal to
the capacity of the member partitions, minus the size of one of the
partitions if they are of equal size.

D. Level 5

This is the most common type of RAID. By distributing parity across


some or all of an array's member disk drives, RAID level 5 eliminates the
write bottleneck inherent in level 4. The only performance bottleneck is
the parity calculation process. With modern CPUs and Software RAID,
that usually is not a very big problem. As with level 4, the result is

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

asymmetrical performance, with reads substantially outperforming


writes. Level 5 is often used with write-back caching to reduce the
asymmetry. The storage capacity of Hardware RAID level 5 is equal to
the capacity of member disks, minus the capacity of one member disk.
The storage capacity of Software RAID level 5 is equal to the capacity of
the member partitions, minus the size of one of the partitions if they are
of equal size.

E. Linear RAID

Linear RAID is a simple grouping of drives to create a larger virtual drive.


In linear RAID, the chunks are allocated sequentially from one member
drive, going to the next drive only when the first is completely filled. This
grouping provides no performance benefit, as it is unlikely that any I/O
operations will be split between member drives. Linear RAID also offers
no redundancy and, in fact, decreases reliability if any one member drive
fails, the entire array cannot be used. The capacity is the total of all
member disks.

Swap Space

Swap space in Linux is used when the amount of physical memory (RAM) is
full. If the system needs more memory resources and the RAM is full, inactive
pages in memory are moved to the swap space. While swap space can help
machines with a small amount of RAM, it should not be considered a
replacement for more RAM. Swap space is located on hard drives, which have
a slower access time than physical memory.

Swap space can be a dedicated swap partition (recommended), a swap file,


or a combination of swap partitions and swap files. The size of your swap
should be equal to twice your computer's physical RAM for up to 2 GB of
physical RAM. For physical RAM above 2 GB, the size of your swap should be
equal to the amount of physical RAM above 2 GB. The size of your swap
should never less than 32 MB. Using this basic formula, a system with 2 GB
of physical RAM would have 4 GB of swap, while one with 3 GB of physical
RAM would have 5 GB of swap.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

3. PERFORMING BASIC COMMAND LINUX

- cd

- ls

- mkdir

- rmdir

- adduser

- addgroup

- passwd

- ping

- ifconfig

- /etc/sysconfig/network-scripts/ifcfg-eth0

- /etc/rc.d/rc.local

- nslookup 192.168.0.2

- rpm -qa | grep bind

- mount /media/cdrom/

- rpm -ivh /media/cdrom/RedHat/RPMS/bind-9.2.4-2.i386.rpm

- service named restart

- /dev/sda

- /dev/sdb

- /usr/share/doc/redhat-release-4

- /etc/fstab

- /usr/share/doc/

- /proc/swaps

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

4. LINUX DIRECTORIES

Linux Directory Structure

Note: Files are grouped according to purpose. Ex: commands, data files,
documentation.

Parts of a UNIX directory tree. See the FSSTND standard (File system standard)

/ Root
|---root The home directory for the root user
|---home Contains the user's home directories
| |----ftp Users include many services as listed here
| |----httpd
| |----samba
| |----user1
| |----user2
|---bin Commands needed during bootup that might be
needed by normal users
|---sbin Like bin but commands are not intended for
normal users. Commands run by LINUX.
|---proc This filesystem is not on a disk. Exists in the
kernels imagination (virtual). This directory
| | Holds information about kernel parameters and
system configuration.
| |----1 A directory with info about process number 1.
Each process
| has a directory below proc.
|---usr Contains all commands, libraries, man pages,
games and static files for normal
| | operation.
| |----bin Almost all user commands. some commands are in
/bin or /usr/local/bin.
| |----sbin System admin commands not needed on the root
filesystem. e.g., most server
| | programs.
| |----include Header files for the C programming language.
Should be below /user/lib for
| | consistency.
| |----lib Unchanging data files for programs and
subsystems
| |----local The place for locally installed software and
other files.
| |----man Manual pages
| |----info Info documents
| |----doc Documentation for various packages
| |----tmp
| |----X11R6 The X windows system files. There is a
directory similar to usr below this
| | directory.
| |----X386 Like X11R6 but for X11 release 5
|---boot Files used by the bootstrap loader, LILO.
Kernel images are often kept here.
|---lib Shared libraries needed by the programs on the
root filesystem
| |----modules Loadable kernel modules, especially those needed
to boot the system after disasters.
|---dev Device files for devices such as disk drives,
serial ports, etc.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

|---etc Configuration files specific to the machine.


| |----skel When a home directory is created it is
initialized with files from this directory
| |----sysconfig Files that configure the linux system for
networking, keyboard, time, and more.
|---var Contains files that change for mail, news,
printers log files, man pages, temp files
| |----file
| |----lib Files that change while the system is running
normally
| |----local Variable data for programs installed in
/usr/local.
| |----lock Lock files. Used by a program to indicate it is
using a particular device or file
| |----log Log files from programs such as login and syslog
which logs all logins,
| | logouts, and other system messages.
| |----run Files that contain information about the system
that is valid until the system is
| | next booted
| |----spool Directories for mail, printer spools, news and
other spooled work.
| |----tmp Temporary files that are large or need to exist
for longer than they should in
| | /tmp.
| |----catman A cache for man pages that are formatted on
demand
|---mnt Mount points for temporary mounts by the system
administrator.
|---tmp Temporary files. Programs running after bootup
should use /var/tmp.

5. SETTING UP A NETWORK INTERFACE CARD (NIC)

This is example to set IP in eth0 manually via command line

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

6. PACKAGE MANAGEMENT WITH RPM

The RPM Package Manager (RPM) is an open packaging system, available for
anyone to use, which runs on Red Hat Enterprise Linux as well as other Linux
and UNIX systems. Red Hat, Inc. encourages other vendors to use RPM for
their own products. RPM is distributable under the terms of the GPL. For the
end user, RPM makes system updates easy. Installing, uninstalling, and
upgrading RPM packages can be accomplished with short commands. RPM
maintains a database of installed packages and their files, so you can invoke
powerful queries and verifications on your system. If you prefer a graphical
interface, you can use the Package Management Tool to perform many RPM
commands.

RPM Design Goals

- Upgradability

Using RPM, you can upgrade individual components of your system without
completely reinstalling. When you get a new release of an operating system
based on RPM (such as Red Hat Enterprise Linux), you do not need to
reinstall on your machine (as you do with operating systems based on other
packaging systems). There is no special upgrade files needed to upgrade a
package because the same RPM file is used to install and upgrade the
package on your system.

- Powerful Querying

RPM is designed to provide powerful querying options. You can do searches


through your entire database for packages or just for certain files. You can
also easily find out what package a file belongs to and from where the
package came. The files an RPM package contains are in a compressed
archive, with a custom binary header containing useful information about the
package and its contents, allowing you to query individual packages quickly
and easily.

- System Verification

Another powerful feature is the ability to verify packages. If you are worried
that you deleted an important file for some package, verify the package. You
are notified of any anomalies. At that point, you can reinstall the package if
necessary. Any configuration files that you modified are preserved during
reinstallation.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

- Pristine Sources

A crucial design goal was to allow the use of "pristine" software sources, as
distributed by the original authors of the software. With RPM, you have the
pristine sources along with any patches that were used, plus complete build
instructions. This is an important advantage for several reasons. For
instance, if a new version of a program comes out, you do not necessarily
have to start from scratch to get it to compile. You can look at the patch to
see what you might need to do.

Using RPM

RPM has five basic modes of operation it is installing, uninstalling, upgrading,


querying, and verifying. This section contains an overview of each mode. For
complete details and options, try rpm --help

Installing Packages

Unresolved Dependency

RPM packages can, essentially, depend on other packages, which mean that
they require other packages to be installed to run properly. If you try to
install a package which has an unresolved dependency, output similar to the
following is displayed

Package Management Tool

We must install the step as given to the command, from first command or to
force the installation anyway (which is not recommended since the package
may not run correctly), use the --nodeps option.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

Removing Packages

Uninstalling a package is just as simple as installing one. Type the following


command at a shell prompt:

rpm -e foo

Upgrading

Upgrading a package is similar to installing one. Type the following command


at a shell prompt:

rpm -Uvh foo-2.0-1.i386.rpm

As part of upgrading a package, RPMautomatically uninstalls any old versions


of the foo package. In fact, you may want to always use -U to install
packages which works even when there are no previous versions of the
package installed.

Freshening

Freshening a package is similar to upgrading one. Type the following


command at a shell prompt:

rpm -Fvh foo-1.2-1.i386.rpm

RPM's freshen option checks the versions of the packages specified on the
command line against the versions of packages that have already been
installed on your system. When a newer version of an already-installed
package is processed by RPM's freshen option, it is upgraded to the newer
version.

Querying

Use the rpm -q command to query the database of installed packages. The
rpm -q foo command displays the package name, version, and release
number of the installed package foo:

foo-2.0-1

Note

To query a package, replace foo with the actual package name.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

Verifying

Verifying a package compares information about files installed from a


package with the same information from the original package. Among other
things, verifying compares the size, MD5 sum, permissions, type, owner, and
group of each file.

The command rpm -V verifies a package. You can use any of the Package
Verify Options listed for querying to specify the packages you wish to verify.
A simple use of verifying is rpm -V foo, which verifies that all the files in the
foo package are as they were when they were originally installed. For
example:

- To verify a package containing a particular file:

rpm -Vf /usr/bin/vim

- To verify ALL installed packages:

rpm -Va

- To verify an installed package against an RPM package file:

rpm -Vp foo-1.0-1.i386.rpm

This command can be useful if you suspect that your RPM databases are
corrupt.

7. UDERSTANDING KERNEL

In computing, the kernel is the central component of most computer operating


systems; it is a bridge between applications and the actual data processing done at
the hardware level. The kernel's responsibilities include managing the system's
resources (the communication between hardware and software components).
Usually as a basic component of an operating system, a kernel can provide the
lowest-level abstraction layer for the resources (especially processors and I/O
devices) that application software must control to perform its function. It typically
makes these facilities available to application processes through inter-process
communication mechanisms and system calls.

Operating system tasks are done differently by different kernels, depending on their
design and implementation. While monolithic kernels will try to achieve these goals
by executing all the operating system code in the same address space to increase
the performance of the system, microkernels run most of the operating system
services in user space as servers, aiming to improve maintainability and modularity
of the operating system. A range of possibilities exists between these two extremes.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

Overview of Kernel Packages

Red Hat Enterprise Linux contains the following kernel packages (some may not
apply to your architecture):
1. kernel. Contains the kernel and the following key features:
2. Uniprocessor support for x86 and Athlon systems (can be run on a multi-
processor system, but only one processor is utilized)
3. Multi-processor support for all other architectures
4. For x86 systems, only the first 4 GB of RAM is used; use the kernel-
hugemem package for x86 systems with over 4 GB of RAM
5. kernel-devel . Contains the kernel headers and make files sufficient to
build modules against the kernel package.
6. kernel-hugemem . (only for i686 systems) In addition to the options
enabled for the kernel package, the key conFIguration options
7. kernel-smp . Contains the kernel for multi-processor systems.
8. kernel-smp-devel . Contains the kernel headers and make files sufficient
to build modules against the kernel-smp package.
9. kernel-utils. Contains utilities that can be used to control the kernel or
system hardware.
10. kernel-doc.Contains documentation files from the kernel source. Various
portions of the Linux kernel and the device drivers shipped with it are
documented in these FIles. Installation of this package provides a
reference to the options that can be passed to Linux kernel modules at
load time.

By default, these _les are placed in the

/usr/share/doc/kernel-doc-<version>/ directory.

Verifying the Initial RAM Disk Image


If the system uses the ext3 _le system, a SCSI controller, or uses labels to
reference partitions in /etc/fstab, an initial RAM disk is needed. The initial RAM
disk allows a modular kernel to have access to modules that it might need to boot
from before the kernel has access to the device where the modules normally reside.

On the Red Hat Enterprise Linux architectures other than IBM eServer iSeries, the
initial RAM disk can be created with the mkinitrd command. However, this step is
performed automatically if the kernel and its associated packages are installed or
upgraded from the RPM packages distributed by Red Hat, Inc.; thus, it does not
need to be executed manually. To verify that it was created, use the should match
the version of the kernel just installed).

On iSeries systems, the initial RAM disk FIle and vmlinux FIle are combined into one
file, which is created with the addRamDisk command. To verify that it was created,
use the command ls -l /boot to make sure the /boot/vmlinitrd-<kernel-
version> file was created (the version should match the version of the kernel just
installed). The next step is to verify that the boot loader has been configured to boot
the new kernel.

Telkom Polytechnic
TRAINING REDHAT ENTERPRISE SERVER
GREEN YOUR REDHAT ENTERPRISE SERVER, MAKE POWERFUL SERVER IN EASY WAYS

GRUB
Con_rm that the file /boot/grub/grub.conf contains a title section with the same
version as
the kernel package just installed (if the kernel-smp or kernel-hugemem package was
installed,
a section exists for it as well):

# Note that you do not have to rerun grub after making changes to this
file
# NOTICE: You have a /boot partition. This means that
# all kernel and initrd paths are relative to /boot/, eg.
# root (hd0,0)
# kernel /vmlinuz-version ro root=/dev/hda2
# initrd /initrd-version.img
#boot=/dev/hda
default=1
timeout=10
splashimage=(hd0,0)/grub/splash.xpm.gz
title Red Hat Enterprise Linux (2.6.9-5.EL)
root (hd0,0)
kernel /vmlinuz-2.6.9-5.EL ro root=LABEL=/
initrd /initrd-2.6.9-5.EL.img
title Red Hat Enterprise Linux (2.6.9-1.906_EL)
root (hd0,0)
kernel /vmlinuz-2.6.9-1.906_EL ro root=LABEL=/
initrd /initrd-2.6.9-1.906_EL.img

If a separate /boot/ partition was created, the paths to the kernel and initrd image
are relative to /boot/.

Telkom Polytechnic

You might also like