Administrator's Guide for Release 6
E41138-31
January 2019
Table of Contents
- Preface
- I System Configuration
- 1 Yum
- 1.1 About Yum
- 1.2 About ULN
- 1.3 Yum Configuration
- 1.4 Using Yum from the Command Line
- 1.5 Yum Groups
- 1.6 Installing and Using the Yum Security Plugin
- 1.7 Switching CentOS or Scientific Linux Systems to Use the Oracle Linux Yum Server
- 1.8 Creating and Using a Local ULN Mirror
- 1.9 Creating a Local Yum Repository Using an ISO Image
- 1.10 Setting up a Local Yum Server Using an ISO Image
- 1.11 For More Information About Yum
- 2 Ksplice
- 3 Boot Configuration
- 4 System Configuration Settings
- 5 Kernel Modules
- 6 Device Management
- 7 Task Management
- 8 System Monitoring and Tuning
- 9 System Dump Analysis
- II Networking and Network Services
- 10 Network Configuration
- 10.1 About Network Interfaces
- 10.2 About Network Configuration Files
- 10.3 Command-line Network Configuration Interfaces
- 10.4 Configuring Network Interfaces Using Graphical Interfaces
- 10.5 Configuring Network Interface Bonding
- 10.6 Configuring VLANs with Untagged Data Frames
- 10.7 Configuring Network Routing
- 11 Network Address Configuration
- 12 Name Service Configuration
- 13 Network Time Configuration
- 14 Web Service Configuration
- 15 Email Service Configuration
- 16 Load Balancing and High Availability Configuration
- 16.1 About HAProxy
- 16.2 Installing and Configuring HAProxy
- 16.3 Configuring Simple Load Balancing Using HAProxy
- 16.4 About Keepalived
- 16.5 Installing and Configuring Keepalived
- 16.6 Configuring Simple Virtual IP Address Failover Using Keepalived
- 16.7 Configuring Load Balancing Using Keepalived in NAT Mode
- 16.8 Configuring Load Balancing Using Keepalived in DR Mode
- 16.9 Configuring Keepalived for Session Persistence and Firewall Marks
- 16.10 Making HAProxy Highly Available Using Keepalived
- 16.11 About Keepalived Notification and Tracking Scripts
- 16.12 Making HAProxy Highly Available Using Oracle Clusterware
- III Storage and File Systems
- 17 Storage Management
- 18 File System Administration
- 18.1 Making File Systems
- 18.2 Mounting File Systems
- 18.3 About the File System Mount Table
- 18.4 Configuring the Automounter
- 18.5 Mounting a File Containing a File System Image
- 18.6 Creating a File System on a File
- 18.7 Checking and Repairing a File System
- 18.8 About Access Control Lists
- 18.9 About Disk Quotas
- 19 Local File System Administration
- 19.1 About Local File Systems
- 19.2 About the Btrfs File System
- 19.3 Creating a Btrfs File System
- 19.4 Modifying a Btrfs File System
- 19.5 Compressing and Defragmenting a Btrfs File System
- 19.6 Resizing a Btrfs File System
- 19.7 Creating Subvolumes and Snapshots
- 19.8 Using the Send/Receive Feature
- 19.9 Using Quota Groups
- 19.10 Replacing Devices on a Live File System
- 19.11 Creating Snapshots of Files
- 19.12 Converting an Ext2, Ext3, or Ext4 File System to a Btrfs File System
- 19.13 Installing a Btrfs root File System
- 19.13.1 Setting up a New NFS Server
- 19.13.2 Configuring an Existing NFS Server
- 19.13.3 Setting up a New HTTP Server
- 19.13.4 Configuring an Existing HTTP Server
- 19.13.5 Setting up a Network Installation Server
- 19.13.6 Installing from a Network Installation Server
- 19.13.7 About the Installation root File System
- 19.13.8 Creating Snapshots of the root File System
- 19.13.9 Mounting Alternate Snapshots as the root File System
- 19.13.10 Deleting Snapshots of the root File System
- 19.14 Converting a Non-root Ext2 File System to Ext3
- 19.15 Converting a root Ext2 File System to Ext3
- 19.16 Creating a Local OCFS2 File System
- 19.17 About the XFS File System
- 19.18 Installing the XFS Packages
- 19.19 Creating an XFS File System
- 19.20 Modifying an XFS File System
- 19.21 Growing an XFS File System
- 19.22 Freezing and Unfreezing an XFS File System
- 19.23 Setting Quotas on an XFS File System
- 19.24 Backing up and Restoring XFS File Systems
- 19.25 Defragmenting an XFS File System
- 19.26 Checking and Repairing an XFS File System
- 20 Shared File System Administration
- 21 Oracle Cluster File System Version 2
- 21.1 About OCFS2
- 21.2 Installing and Configuring OCFS2
- 21.2.1 Preparing a Cluster for OCFS2
- 21.2.2 Configuring the Firewall
- 21.2.3 Configuring the Cluster Software
- 21.2.4 Creating the Configuration File for the Cluster Stack
- 21.2.5 Configuring the Cluster Stack
- 21.2.6 Configuring the Kernel for Cluster Operation
- 21.2.7 Starting and Stopping the Cluster Stack
- 21.2.8 Creating OCFS2 volumes
- 21.2.9 Mounting OCFS2 Volumes
- 21.2.10 Querying and Changing Volume Parameters
- 21.3 Troubleshooting OCFS2
- 21.4 Use Cases for OCFS2
- 21.5 For More Information About OCFS2
- IV Authentication and Security
- 22 Authentication Configuration
- 22.1 About Authentication
- 22.2 About Local Oracle Linux Authentication
- 22.3 About IPA
- 22.4 About LDAP Authentication
- 22.4.1 About LDAP Data Interchange Format
- 22.4.2 Configuring an LDAP Server
- 22.4.3 Replacing the Default Certificates
- 22.4.4 Creating and Distributing Self-signed CA Certificates
- 22.4.5 Initializing an Organization in LDAP
- 22.4.6 Adding an Automount Map to LDAP
- 22.4.7 Adding a Group to LDAP
- 22.4.8 Adding a User to LDAP
- 22.4.9 Adding Users to a Group in LDAP
- 22.4.10 Enabling LDAP Authentication
- 22.5 About NIS Authentication
- 22.6 About Kerberos Authentication
- 22.7 About Pluggable Authentication Modules
- 22.8 About the System Security Services Daemon
- 22.9 About Winbind Authentication
- 23 Local Account Configuration
- 24 System Security Administration
- 24.1 About System Security
- 24.2 Configuring and Using SELinux
- 24.3 About Packet-filtering Firewalls
- 24.4 About TCP Wrappers
- 24.5 About chroot Jails
- 24.6 About Auditing
- 24.7 About System Logging
- 24.8 About Process Accounting
- 24.9 Security Guidelines
- 24.9.1 Minimizing the Software Footprint
- 24.9.2 Configuring System Logging
- 24.9.3 Disabling Core Dumps
- 24.9.4 Minimizing Active Services
- 24.9.5 Locking Down Network Services
- 24.9.6 Configuring a Packet-filtering Firewall
- 24.9.7 Configuring TCP Wrappers
- 24.9.8 Configuring Kernel Parameters
- 24.9.9 Restricting Access to SSH Connections
- 24.9.10 Configuring File System Mounts, File Permissions, and File Ownerships
- 24.9.11 Checking User Accounts and Privileges
- 25 OpenSSH Configuration