Alinuxmaterial Doc's
Alinuxmaterial Doc's
Page 1
RED-HAT LINUX 6/7
Page 2
RED-HAT LINUX 6/7
Type of
Example User ID Group ID Home Directory Default Shell
User
Super User Root 0 0 /root /bin/bash
Normal users
Same as Same as
Sudo User with admin /home/<user name> /bin/bash
normal users normal users
privileges
Page 3
RED-HAT LINUX 6/7
Page 4
RED-HAT LINUX 6/7
19. What are the uses of .bash_logout, .bash_profile and .bashrc files?
.bash_logout : is a user's logout ending program file. It will execute first whenever the user is logout.
.bash_profile : is user's login startup program file. It will execute first whenever the user is login. It
consists the user's environmental variables.
.bashrc : This file is used to create the user's custom commands and to specify the umask values for
that user's only.
21. What is the command to check the user belongs to how many groups?
# groups <user name>
Page 5
RED-HAT LINUX 6/7
Page 6
RED-HAT LINUX 6/7
Page 7
RED-HAT LINUX 6/7
# tailf /var/log/secure (to see the updates of this file continuously and press ctrl + c to quit the
tailf)
33. How to assign the password to normal user by him whenever first login to the system?
Whenever the user is created and that user is trying to login to the system, it will ask the password. If
the root user is not assign the password to that user, then that normal user can assign the password by his own
using the following commands.
# useradd <user name> (to create the user)
# passwd -S <user name> (to see the status of the password of that user. if root user is not
assigned the password then the password status is locked)
# passwd -d <user name> (then delete the password for that user)
# chage -d 0 <user name> (it will change the password age policy)
# su - <user name> (Try to switch to that user then it will display the following
message)
Newpassword : (type new password for that user)
Retype password : (retype the password again)
The other useful commands :
# w (this command gives the login user information like how many users currently login and full
information )
# who (to see users who are currently login and on which terminal they login)
# last (see the list of users who are login and logout since the /var/log/wtmp file was
created)
# lastb (to see the list of the users who tried as bad logins)
# lastreboot (to see all reboots since the log file was created)
# uptime (to see the information from how long the system is running, how many users login
and load average)
* The load average is from 1 sec : 5 secs : 15 secs
# df (to see the mounted partitions, their mount points and amount of disk space)
# du (to see the disk usage of the each file in bytes)
# uname -r (gives the current kernel version)
# last -x (It shows last shutdown date and time)
# last -x grep shutdown (only shutdown time shows ie., grep will filter the 'last -x' command)
* grep: It is used to search a word or sentence in file (ie., inside the file)
* find : It is used to search a command or file inside the system)
# cat /etc/shells or # chsh -l (to see how many shells that are supported by Linux)
/bin/sh -----> default shell for Unix
/bin/bash -----> default shell for Linux
/sbin/nologin -----> users cannot login shell
/bin/tcsh -----> c shell to write 'C++' language programs
/bin/csh -----> c shell to write 'C' language programs
# echo $SHELL (to see the current shell)
# chsh <user name> (to change the user's shell)
Changing shell for <user name> :
New shell : <type new shell for example /bin/sh to change the current shell>
New shell changed (But it will effect by restarting the server)
# date + %R (to display the time only)
# date + %x (to display the date only)
# history (to see the history of the commands)
#history -c (to clear the history)
# history -r (to recover the history)
* .bash_history is the hidden file to store the history of the user commands. By default history size is
1000.
# echo $HISTSIZE (to check the current history size)
# export HISTSIZE=500 (to change the current history size to 500 temporarily)
#export HISTTIMEFORMAT=" "%D" "%T" " (to display the date and time of each command
temporarily)
# vim /etc/bashrc (open this file go to last line and type as follows to make history i
Page 8
RED-HAT LINUX 6/7
# ls -ld <directory name> (to see the long listing of the directories)
# stat <file name/directory name> (to see the statistics of the file or directory)
35. What are permission types available in Linux and their numeric representations?
There are mainly three types of permissions available in Linux and those are,
read ----- r ----- 4 null permission ------ 0
write ----- w ----- 2
execute ----- rx ----- 1
Permissions File Directory
r Read a file Ex. # cat <file name> Read a directory contents Ex. ls /dir
w Create, delete or modify the file contents Create, delete or modify the files in a directory
x Not required for file. It is required only for Go to inside the directory Ex. # cd /dir
Page 9
RED-HAT LINUX 6/7
scripting files
Page 10
RED-HAT LINUX 6/7
* If the/etc/login.defs file is corrupted then new users will be added and can be assigned the
passwords but users cannot login.
* If the /etc/login.defs file is deleted then new users cannot be added.
Page 11
RED-HAT LINUX 6/7
(iii) So, if we create one group and assign that group to all the users in that department, then we can
easily identify which user belongs to which group.
(iv) We can share files, directories and execute some programs to that group and also give permissions
to that group. So, each user of that group can easily share those directories and also can easily
access, execute or even write in those shared files and directories.
RHEL - 7 :
(i) Restart the system.
(ii) Using arrow keys select 1st line and press 'e' to edit.
(iii) Go to Linux 16 line press End key or Ctrl + e to go to the end of the line and give one space.
(iv) Then type as rd.break console=tty1 selinux=0
(v) Then press Ctrl + x to start the computer in single user mode.
(vi) After starting we get swith_root :/# prompt appears and then type as follows.
(vii) # mount -o remount, rw /sysroot and press Enter and then type as follows.
(viii) # chroot /sysroot press Enter.
(ix) Then sh - 4.2 # prompt appears and type as
(x) sh - 4.2 #passwd root
New password : XXXXXX
Retype password : XXXXXX
(xi) sh - 4.2 # exit
(xii) switch-root :/# exit
(xiii) Then the system starts and the desktop appears.
Page 12
RED-HAT LINUX 6/7
Global profile :
(1) Only root user can set and applicable to all the users.
(2) Only global parameters can entered in this profile.
(3) The location of the global profile is /etc/bashrc
Local profile :
(1) Every user has his/her own profile.
(2) The settings entered in this profile are only for that user.
(3) The location of the profile is .bash_profile (hidden file) in that particular user's home directory.
54. How to find the users who are login and how to kill them?
# fuser -cu (to see who are login)
#fuser -ck <user login name> (to kill the specified user)
59. What is the syntax to assign read and write permissions to particular user, group and other?
# setfacl -m u : <user name> : <permissions><file or directory>
# setfacl -m g : <user name> : <permissions><file or directory>
# setfacl -m o : <user name> : <permissions><file or directory>
Page 13
RED-HAT LINUX 6/7
60. What is the syntax to assign read and write permissions to particular user, group and other at a
time?
# setfacl -m u : <user name> : <permissions>, g : <user name> : <permissions>, o : <user name> :
<permissions><file or directory>
Useful commands :
# setfacl -x u : <user name><file or directory name> (to remove the ACL permissions from the user)
# setfacl -x g : <user name><file or directory name>(to remove the ACL permissions from group)
# setfacl -x o : <user name><file or directory name> (to remove the ACL permissions from other)
# setfacl -b <file or directory> (to remove all the ACL permissions on that file directory)
61. How will you lock a user, if he enters wrong password 3 times?
pam_tally.so module maintains a count of attempted accesses, can reset count on success, can deny
access if too many attempts fail. Edit /etc/pam.d/system-auth file, enter:
(i) # vi /etc/pam.d/system-auth
Modify as follows:
auth required pam_tally.so no_magic_root
account required pam_tally.so deny=3 no_magic_root lock_time=180
Where,
deny=3 : Deny access if tally for this user exceeds 3 times.
lock_time=180 : Always deny for 180 seconds after failed attempt. There is alsounlock_time=n option. It allow
access after n seconds after failed attempt. If this option is used the user will be locked out for the specified
amount of time after he exceeded his maximum allowed attempts. Otherwise the account is locked until the
lock is removed by a manual intervention of the system administrator.
magic_root : If the module is invoked by a user with uid=0 the counter is not incremented. The sys-admin
should use this for user launched services, like su, otherwise this argument should be omitted.
no_magic_root : Avoid root account locking, if the module is invoked by a user with uid=0
Save and close the file.
Page 14
RED-HAT LINUX 6/7
(iii) Create the user quota database by # quotacheck -cu <mount point> command (where -c
means created the quota database and -u means user quota).
(iv) Check whether the quota is applied or not by # mount command.
(v) Enable the quota by # quotaon <mount point> command.
(vi) Apply the user quota for a user by # edquota -u <user name><mount point>
command.
File system blocks soft hard inodes soft
hard
/dev/sdb1 0 0 0 0 0
0
blocks -----> No. of blocks used (already)
soft -----> Warning limit
hard -----> Maximum limit
0 -----> Unlimited usage
inodes -----> No. of files created (already)
* If soft=10 and hard=15 means after crossing the soft limit a warning message will be
displayed and if hard limit is also crosses then it won't allow to create the files for that user.
(save and exit the above quota editor)
# edquota -p <user name 1><user name 2> (to apply user name 1 quotas to user name 2, ie., no
need to edit the quota editor for user name 2)
(ii) Update the quota on mount point by # mount -o remount, usrquota, grpquota <mount point>command.
(iii) Create the user quota database by # quotacheck -cug <mount point> command (where -c means
created the quota database, -u means user quota and -g means group quota ).
(iv) Check whether the quota is applied or not by # mount command.
(v) Enable the quota by # quotaon <mount point> command.
(vi) Apply the user quota for a user by # edquota -g <group name><mount point> command.
File system blocks soft hard inodes soft
hard
/dev/sdb1 0 0 0 0 0
0
blocks -----> No. of blocks used (already)
soft -----> Warning limit
hard -----> Maximum limit
0 -----> Unlimited usage
inodes -----> No. of files created (already)
Page 15
RED-HAT LINUX 6/7
* Here we can specify the block level quota or file level quotas.
* group quota can be applicable to all the users of that specified group.
(save and exit the above quota editor)
2. What is partitioning?
Partitioning means to divide a single hard drive into many logical drives.
Page 16
RED-HAT LINUX 6/7
Page 17
RED-HAT LINUX 6/7
14. What are differences between the ext2, ext3, ext4 and xfs file systems?
S.No. Ext2 Ext3 Ext4
1. Stands for Second Stands for Third Extended Stands for Fourth
Extended file system. file system. Extended file system.
2. Does not having Supports Journaling Supports Journaling
Journaling feature. feature. feature.
3. Max. file size can be from Max. file size can be from Max. file size can be from
16 GB to 2 TB. 16 GB to 2 TB. 16 GB to 16 TB.
4. Max. file system size can Max. file system size can Max. file system size can
be from 2 TB to 32 TB be from 2 TB to 32 TB be from 2 TB to 1 EB
*1EB = 1024 Peta bytes.
16. The partitions are not mounting even though there are entries in /etc/fstab. How to solve this
problem?
Page 18
RED-HAT LINUX 6/7
First check any wrong entries are there in /etc/fstab file. If all are ok then unmount all the partitions by
executing the below command,
# umount -a
Then mount again mount all the partitions by executing the below command,
# mount -a
17. When trying to unmounting it is not unmounting, how to troubleshoot this one?
Some times directory reflects error while unmounting because,
(i) you are in the same directory and trying to unmount it, check with # pwdcommand.
(ii) some users are present or accessing the same directory and using the contents in it, check this with
# fuser -cu <device name> (to check the users who are accessing that partition)
# lsof <device name> (to check the files which are open in that mount point)
# fuser -ck <opened file name with path> (to kill that opened files)
Now we can unmount that partition using # umount <mount point>
Page 19
RED-HAT LINUX 6/7
27. How to check the integrity of a file system or consistency of the file system?
# fsck <device or partition name>command we can check the integrity of the file system.
But before running the fsck command first unmount that partition and then run fsck command.
28. What is fsck check or what are the phases of the fsck?
(a) First it checks blocks and sizes of the file system
(b) Second it checks file system path names
(c) Third it checks file system connectivity
(d) Fourth it checks file system reference counts (nothing but inode numbers)
(e) Finally it checks file system occupied cylindrical groups
29. Why the file system should be unmount before running the fsck command?
If we run fsck on mounted file systems, it leaves the file systems in unusable state and also deletes the
data. So, before running the fsck command the file system should be unmounted.
31. How to extend the root file system which is not on LVM?
By using # gparted command we can extend the root partition, otherwise we cannot extend
the file systems which is not on LVM.
Page 20
RED-HAT LINUX 6/7
34. How to know which file system occupy more space and top 10 file systems?
# df -h <device or partition name> | sort -r | head -10
39. How to find how many disk are attached to the system?
# fdisk -l (to see how many disk are attached to the system)
42. How to create the file systems with the user specified superblock reserve space?
# mkfs.ext4 -m <no.><partition name> (to format the partition with <no.>% of reserve space to
superblock)
Whenever we format the file system, by default it reserve the 5% partition space for Superblock.
Important Commands :
# fsck <partition name> (to check the consistency of the file system)
# e2fsck <partition name> (to check the consistency of the file system in interactive mode)
# e2fsck -p <partition name> (to check the consistency of the file system without interact mode)
# mke2fs -n <partition name> (to see the superblock information)
# mke2fs -t <file system type><partition name> (to format the partition in the specified filesys type)
# mke2fs <partition name> (to format the partition in default ext2 file system type)
Page 21
RED-HAT LINUX 6/7
# blockdev --getbs /dev/sdb1 (to check the block size of the /dev/sdb1 file system)
# fsck <device or partition name> (to check and repair the file system)
Note: Before running this command first unmount that partition then run fsck command.
# umount -a (to unmount all the file systems except ( / ) root file system)
# mount -a (to mount all the file systems which are having entries in /etc/fstab file)
# fsck -A (to run fsck on all file systems)
# fsck -AR -y (to run fsck without asking any questions)
# fsck -AR -t ext3 -y (to run fsck on all ext3 file systems)
# fsck -AR -t no ext3 -y (to run fsck on all file systems except ext3 file systems)
# fsck -n /dev/sdb1 (to see the /dev/sdb1 file system report without running fsck)
# tune2fs -l /dev/sdb1 (to check whether the journaling is there or not)
# tune2fs -j /dev/sdb1 (to convert ext2 file system to ext3 file system)
# tune2fs -l /dev/sdb1 (to check whether the journaling is added or not)
# tune2fs -O ^has_journal /dev/sdb1 (to convert ext3 file system to ext2 file system)
# tune2fs -O dir_index, has_journal, unit_bg /dev/sdb1 (to convert ext2 file system to ext4 file system)
# tune2fs -O extents, dir_index, unit_bg /dev/sdb1 (to convert ext3 file system to ext4 file system)
# mount -o remount, rw /dev/sdb1 (to mount the partition with read and write permissions)
# mount -o remount, ro /dev/sdb1 (to mount the partition with read only permissions)
# mount < directory name> (to check whether this directory is mount/ normal directory)
# dump2fs <device or partition name> (to check the metadata of the partition and repair the metadata)
# fdisk -l (to list total hard disks attached to system and their partitions)
# fuser -cu <device or partition name> (to see the users who are accessing that file system)
# fuser -cK <device or partition name> (to kill the users processes who accessing the file systems)
Note: Even though we kill those users processes sometimes we cannot unmount those partitions, so if this
situation arises then first see the process id's of the user opened files by
# lsof <mount point>
# kill -9 <process id> killthose processesforcefully
# journalctl (It tracks all the log files between two different timings and by default saved in /run/log )
* /run/log is mounted on tmpfs file system. ie., if system is rebooted, the whole information in that location
will be deleted or erased.
* We can change the location of the /run/log to another like /var/log/journal by
# mkdir -p /var/log/journal (to make a directory in /var/log location)
# chown root : systemd-journal /var/log/journal (to change the group ownership of /var/log/journal)
# chmod g+s /var/log/journal (to set the sgid on /var/log/journal)
# killall -URS1 systemd-journald (It is necessary to kill old /run/log process and the location of journal
messages is changed to /var/log/journal)
# journalctl -n 5 (to display last five lines of all the log files)
# journalctl -p err (to display all the error messages)
# journalctl -f (to watch journalctl messages continuously)
# journalctl --since<today> or <yesterday> (to see all the journalctl messages since today or yesterday)
# journalctl --since "date" --until "date" (to see the journal messages between the specified two dates)
# journalctl -pid=1 (to see the pid=1 process name)
# auditctl (to see the audit report).
2. Logical Volume Management and RAID Levels
1. What is LVM and why we go for LVM?
Lvm means Logical Volume Management. The combination of 2 or more physical disk in order to make
a big logical disk is called Logical Volume.
If normal Linux partition is full and an application requires some more disk space, then normal
partition cannot be extended for that application requirement. For this first we have to take a backup of that
normal partition, delete that partition and again create that partition with more disk space, format and mount
that partition and finally restore the application from the backup. This process requires down time.
Page 22
RED-HAT LINUX 6/7
So, to overcome this problem LVM concept is coming into the picture. Using this LVM we can extend
or reduce the file systems as per requirement without loss of any data.
2. What are the components of the LVM?
Physical Volume (PV)
Physical Extent (PE)
Volume Group (VG)
Logical Volume (LV)
Logical Extent (LE)
Physical Volume (PV) :
It is the standard partition that we add to the LVM. Normally a physical volume is a standard primary or logical
partition with the partition code as 8e.
Physical Extent (PE) :
It is chunk of disk space. Every physical volume is divided into a number of equal sized PEs.
Volume Group (VG) :
It is composed of a group of physical volumes and logical volumes. It is the organizational group of LVM.
Logical Volume (LV) :
It is composed of a group of LEs. We can format (make a file system) and mount any file system on the logical
volume. The size of these logical volumes can easily be increased or decreased as per the requirement.
Logical Extent (LE) :
It is also a chunk of disk space. Every logical extent is mapped to a specific physical extent.
3. How to create the LVM, make a file system and mount that permanently?
(i) Take two physical disks for example /dev/sdb and /dev/sdc. if there is no second disk then
make the required partitions using # fdisk command and change the partition code
as 8e.
(ii) Convert the Physical disk into physical volumes by,
# pvcreate /dev/sdb /dev/sdc
(iii) Then create the volume group by combining physical volumes by,
# vgcreate <volume group name><physical volume names> or
# vgcreate -s <PE size in MBs><volume group name><physical volume names>
(iv) Then create the logical volume on the above created volume group by,
# lvcreate -L +<size in MBs> -n <logical volume name><Volume group name> or
# lvcreate -l <no. of PEs> -n <logical volume name><volume group name>
(v) Make a file system on the above created logical volume by,
# mkfs.ext2/ext3/ext4/xfs /dev/<volume group name>/<logical volume name>
(vi) Create a mount point to mount the above created LVM file system by,
# mkdir /mnt/<directory name>
(vii) Mount the LVM on the above created mount point temporarily by,
# mount /dev/<volume group name>/<logical volume name><mount point>or
Mount the LVM on mount point permanently by,
# vim /etc/fstab
/dev/<VG name>/<LV name> /mnt/<directory> <file system type> defaults 0
0
Esc+:+wq!
# mount -a
# df -hT (to see the mounted partitions with file system types)
4. How to see the details of the Physical Volumes?
# pvs (displays all physical volumes with less details)
# pvdisplay (displays all physical volumes with more details)
# pvdisplay <physical volume name> (displays the details of the specified physical volume)
# pvscan (to scan all the physical volumes)
#pvscan <PV name> (to scan the specified physical volume)
5. How to see the details of the Volume Groups?
# vgs (displays all volume groups with less details)
# vgdisplay (displays all volume groups with more details)
# vgdisplay <VG name> (displays the specified volume group with more details)
# vgscan (to scan all the volume groups)
Page 23
RED-HAT LINUX 6/7
Page 24
RED-HAT LINUX 6/7
10. How to move or migrate the logical volume data from one physical volume to another physical
volume?
There might be a situation where the physical volume might be failing and it is required to replaced. In such
case, we need to migrate or move the logical volume data from the failed physical volume new physical volume
and isolate (remove) the failed physical volume.
First access the mount point of the failing physical volume and check the data in it.
Verify the size of the physical volume by #pvs or #pvdisplay </dev/vgname/lvname>command.
Unmount the file system of that physical volume by # umount <file system mount point>
Add a new physical volume and the size should be same size or higher than that failing physical volume.
Migrate the physical volume contents to the new physical volume using # pvmove <old PV><new PV>
Mount back the logical volume, access the mount point and verify the data in it.
Remove the failed the physical volume by #vgreduce <vgname><pvname> command.
Example : # cd <file system mount point>
# ls
# pvs <pvname> or # pvdisplay <pvname>
# umount <file system mount point>
# pvcreate <device or partition name>
#vgextend <vgname><pvname>
# pvmove <old pvname><new pvname>
# mount -a
# vgreduce <vgname><failed pvname>
# cd <file system mount point>
# ls
11. How to delete or remove the logical volume?
To delete or remove the logical volume, first unmount the file system by # umount <mount point>
Remove the entry in /etc/fstab file.
Remove the logical volume by # lvremove </dev/vgname/lvname>command.
Verify whether the logical volume is removed or not by # lvs or # lvdisplay command.
Example : # umount <file system mount point>
# vim /etc/fstab (delete the entry of the logical volume)
Esc+:+wq! (save and exit the file)
# lvremove </dev/vgname/lvname>
# lvs or # lvdisplay (to verify whether logical volume is removed or
not)
12. How to delete or remove the volume group?
To delete or remove the volume group, first make sure that any logical volume should not be mounted because
while removing a volume group it will delete or remove the logical volumes in that volume group.
Then delete or remove the volume group by # vgremove <vgname>command.
Verify whether the volume group is remove or not by # vgs or # vgdisplay command.
Example : # umount <file system mount point> (to unmount the file system if
there is any LV)
# vim /etc/fstab (delete the entry of the logical volume)
Esc+:+wq! (save and exit the file)
# vgremove <vgname>
# vgs or # vgdisplay (to verify whether volume
group is removed or not)
13. How to delete or remove the physical volume?
Deleting or removing a physical volume is very simple and the only thing we should check that the physical
volume we are going to delete should not belong to any volume group ie., we can only delete or remove the
physical volume which is free.
Then delete or remove the physical volume by # pvremove <pvname>command.
Verify whether the physical volume is removed or not by # pvs or #pvdisplay command.
Example : # pvremove <pvname>
# pvs or #pvdisplay (to verify whether the physical volume is
removed or not)
14. How to restore the volume group which is removed mistakenly?
First unmount file system by # umount <file system mount point> command.
Page 25
RED-HAT LINUX 6/7
Check the volume group backup list by # vgcfgrestore --list <volume group name>command.
Then remove the logical volume by # lvremove </dev/vgname/lvname> command.
Copy the backup file which is taken backup before removed the volume group from the above backup list and
paste it in this command # vgcfgrestore -f <paste the above copied file name><vgname>
The logical volume is created automatically after restoring the volume group but the volume group and logical
volumes both will be in inactive state. So, check the state of the volume group by #vgscanand the logical
volume state by # lvscan commands.
Then activate that volume group by # vgchange -ay <volume group name>commandand activate the logical
volume by # lvchange -ay <logical volume name>command.
Mount the logical volume file system by # mount -a command.
Example : # umount <file system mount point>
# vgcfgrestore --list <volume group name> (copy the backup file from the
list)
# lvremove </dev/vgname/lvname>
# vgcfgrestore -f <paste the above copied file><volume group name>
# vgscan (to check the status of the
volume group)
# lvscan (to check the status of the
logical volume)
# vgchange -ay <volume group name> (activate the volume group if it is in
inactive state)
# lvchange -ay <logical volume name> (activate the logical volume if it is in
inactive state)
Note: The option a means active VG or LV and option y means yes.
# mount -a
15. How to change the volume group name and other parameters?
# vgrename <existing volume group name><new volume group name> (to rename the volume
group)
By default, unlimited logical volumes can be created per volume group. But we can control this limit by
# vgchange -l <no.><volume group> (to limit max. no. of logical volumes to the specified
number)
Example : # vgchange -l 2 <vgname> (to limit max. 2 logical volumes cab be created in this
volume group)
# vgchange -p <no.><volume group> (to limit max. no. of physical volumes to the specified
number)
Example : # vgchange -p 2 <vgname> (to limit max. 2 physical volumes can be added to this
volume group)
# vgchange -s <block size in no.><volume group> (to change the block size of the volume
group)
Example : # vgchange -s 4 <vgname> (to change the volume group block size to 4MB)
16. How to change the logical volume name and other parameters?
# lvrename <existing lvname><new lvname> (to rename the logical volume)
# lvchange -pr <logical volume> (to put the logical volume into read only mode)
# lvs (to see the logical volume permissions)
# lvchange -prw <logical volume> (to put the logical volume into read and write mode)
Page 26
RED-HAT LINUX 6/7
20. What are the locations of the logical volume and volume groups?
# cd /etc/lvm/backup (the logical volumes backup location)
# cd /etc/lvm/archive (the volume groups backup location)
23. How to extend the logical volume to max. disk space and half of the disk space?
# lvextend -l +100% FREE <logical volume> (to extend the logical volume by adding the
volume group's total available space)
# lvextend -l 50% <vgname><lvname> (to extend the logical volume by adding the 50%
free space of the volume group)
24. How to check on which physical volume the data is writing in the logical volume?
# lvdisplay -m ( to check on which physical volume the data is currently writing from all
logical volumes)
# lvdisplay -m <lvname> (to check on which physical volume the data is writing from the
Specified logical volume)
26. How to scan and detect the luns over the network?
# ls /sys/class/fc_host (to check the available fibre channels)
# echo "---" > /sys/class/scsi_host/<lun no.>/scan (to scan and detect the luns over the network)
Page 27
RED-HAT LINUX 6/7
# mount /dev/cdrom /mnt/mycdrom (to mount the CD/DVD on the above created mount point)
# cd /mnt/mycdrom (to access the CD/DVD ROM drives)
29. How to mount the " .iso " image files in Linux?
# mount -t iso9660 /root/rhel6.iso /iso -o ro, loop (to mount the .iso image files)
# cdrecord /root/Desktop/rhel6.iso (to write the CD/DVD ROM. Before executing this
command put the empty CD/DVD into CD/DVD drive)
# eject (to eject the CD/DVD drive tray)
# eject -t (to insert and close the CD/DVD drive tray)
30. What is RAID? What is the use of the RAID and how many types of RAIDs available?
RAID stands for Redundant Array of Independent Disks.
It provides fault tolerance, load balancing using stripping, mirroring and parity concepts.
There are mainly two types of RAIDs available.
(i) Hardware RAID (Depends on vendors and also more expensive)
(ii) Software RAID (Does not depends on vendors and less expensive when compared to Hardware
RAID and also it is maintained by system administrator only.
31. How many types of software RAIDs available and their requirements?
(i) RAID - 0 ---- Stripping ---- Minimum 2 disks required
(ii) RAID - 1 ---- Mirroring ---- Minimum 2 disks required
(iii) RAID - (1+0) --- Mirroring + Stripping ---- Minimum 4 disks required
(iv) RAID - (0+1) --- Stripping + Mirroring ---- Minimum 4 disks required
(v) RAID - 5 ---- Stripping with parity ---- Minimum 3 disks required
1 2
3 Disk - 1 Disk - 2
4
If the Disk - 1 is 5 /dev/sdb and the Disk - 2 is /dev/sdc then,
6
# mdadm - Cv /dev/md0 -n 2 /dev/sdb /dev/sdc
-l 0 (to create the RAID - 0 using disk - 1 and disk - 2)
# cat /proc/mdstat
(to check the RAID - 0 is created or not)
# mkfs.ext4 /dev/md0 (to create the ext4 file system on the RAID - 0)
# mkdir /mnt/raid0 (to create the RAID - 0 mount point)
# mount /dev/md0 /mnt/raid0 (to mount RAID - 0 on the mount point)
# mdadm -D /dev/md0 (to see the details of the RAID - 0 partition)
# mdadm /dev/md0 -f /dev/sdb (to failed the disk manually)
# mdadm /dev/md0 -r /dev/sdb (to remove the above failed disk)
# mdadm /dev/md0 -a /dev/sdd (to add the new disk in place of failed disk)
# umount /mnt/raid0 (to unmount the raid file system)
# mdadm --stop /dev/md0 (to stop the RAID - 0 volume)
# mdadm /dev/md0 --add /dev/sde (to add third disk to the RAID - 0 volume)
# mdadm --grow /dev/md0 --raid_device=3 (to grow the RAID - 0 file system)
Page 28
RED-HAT LINUX 6/7
1 1
2 2
3 3 Disk - 1 Disk - 2
If the Disk - 1 is 4 4 /dev/sdb and the Disk - 2 is /dev/sdc then,
# mdadm - 5 5 Cv /dev/md0 -n 2 /dev/sdb /dev/sdc -l 1 (to
create the RAID - 1 6 6 using disk - 1 and disk - 2)
# cat /proc/mdstat (to check the RAID - 1
is created or not)
# mkfs.ext4 /dev/md0 (to create the ext4 file system on the RAID - 1)
# mkdir /mnt/raid1 (to create the RAID - 1 mount point)
# mount /dev/md0 /mnt/raid1 (to mount RAID - 1 on the mount point)
# mdadm -D /dev/md0 (to see the details of the RAID - 1 partition)
# mdadm /dev/md0 -f /dev/sdb (to failed the disk manually)
# mdadm /dev/md0 -r /dev/sdb (to remove the above failed disk)
# mdadm /dev/md0 -a /dev/sdd (to add the new disk in place of failed disk)
# umount /mnt/raid1 (to unmount the raid file system)
# mdadm --stop /dev/md0 (to stop the RAID - 1 volume)
# mdadm /dev/md0 --add /dev/sde (to add third disk to the RAID - 1 volume)
# mdadm --grow /dev/md0 --raid_device=3 (to grow the RAID - 1 file system)
2 1+2
1 Disk - 1 Disk
3 4
-2 Disk - 3+4 3
5+6 5
If the Disk - 1 is 6 /dev/sdb, the Disk - 2 is /dev/sdc
and Disk - 3 is /dev/sddthen,
# mdadm - Cv /dev/md0 -n 2 /dev/sdb
/dev/sdc -l 5 (to create the RAID - 5 using disks - 1, 2 and 3)
# cat /proc/mdstat (to check the RAID - 5 is created or not)
# mkfs.ext4 /dev/md0 (to create the ext4 file system on the RAID - 5)
# mkdir /mnt/raid5 (to create the RAID - 5 mount point)
# mount /dev/md0 /mnt/raid5 (to mount RAID - 5 on the mount point)
# mdadm -D /dev/md0 (to see the details of the RAID - 5 partition)
# mdadm /dev/md0 -f /dev/sdb (to failed the disk manually)
# mdadm /dev/md0 -r /dev/sdb (to remove the above failed disk)
# mdadm /dev/md0 -a /dev/sde (to add the new disk in place of failed disk)
# umount /mnt/raid5 (to unmount the raid file system)
# mdadm --stop /dev/md0 (to stop the RAID - 5 volume)
# mdadm /dev/md0 --add /dev/sdf (to add fourth disk to the RAID - 5 volume)
# mdadm --grow /dev/md0 --raid_device=4 (to grow the RAID - 5 file system)
Page 29
RED-HAT LINUX 6/7
So, the main advantage of RAID - 5 we can get fast writing, reading and also redundancy fault
tolerance with less expensive.
36. How will you troubleshoot if one of the eight disks failed in LVM?
First umount the file system and add the new disk with same size of the failed disk to the volume
group. Then move the data from failed physical volume to newly added physical volume and then
remove the failed physical volume from the volume group. And finally mount the file system.
38. How to inform the client and then troubleshoot if the disk is full?
First check which files are accessing more disk space by #du -h |sort - r command. if any temporary
and junk files are present remove them from the disk to make a room for new or updated data. Then
inform the actual situation to the client, take the permission from the client to get the lun
from storage and extend the file system by adding that lun to the LVM.
40. I have four disks each 1TB in RAID - (1+0). So, total how much disk space can I utilize in that RAID –
(1+0)? RAID - (1+0) means Mirroring + Stripping. It requires 4 disks, ie., 2 disks for mirroring and
remaining 2 disks for stripping. And 5 - 10% disk space is used for superblock information. So,
finally we can utilize 2TB - 2TB X 10% disk space in that RAID - (1+0).
41. If two disks failed in RAID - (1+0), can we recover the data?
The RAID - (1+0) requires minimum 4 disks and it uses Mirroring + Stripping. If one disk is failed we can
recover the data, but if two disks are failed we cannot recover the data.
42. How many types of disk space issues can we normally get?
(i) Disk is full.
(ii) Disk is failing or failed.
(iii) File system corrupted or crashed.
(iv) O/S is not recognizing the remote luns when scanning, ...etc.,
Page 30
RED-HAT LINUX 6/7
Hard link in nothing but a backup file. If the original file is deleted, there is no effect on hard link file.
i.e., we can access the original file data even though the link file is deleted. Hard links can be
applied on files only not on directories. Hard link files can be stored in the same file system. ie.,
original and hard link files both should be in the same file system not on different file systems. The
inode no's are same for original and hard link files. If the original is edited, the updations are
applied on both original and hard link files. The size of the hard link file is same as the size of
the original file.
Examples :
# find / -name <file name> (to search for file names in / directory)
# find / -name <file name> -type f (to find file names only)
# find / -name <directory name> -type d (to find directories with small letters only)
# find / -iname <file/directory name> -t d (to search for small or capital letter
files/directories)
#find / -empty (to search empty files or directories)
# find / -empty -type f (to search for empty files only)
# find / -empty -type d (to search for empty directories only)
# find / -name " *.mp3" (to search for .mp3 files only)
# find / -size 10M (to search for exact 10M size file/directories)
# find / -size -10M (to search for less than 10M size files/directories)
# find / -size +10M (to search for greater than 10M size files/directories)
Page 31
RED-HAT LINUX 6/7
Page 32
RED-HAT LINUX 6/7
(e) IP Addresses
4. Explain about NIC card?
A Network Interface Card or controller is hardware component that connects a computer to a
computer network. Each NIC card will be having MAC (Media Access Controller) address to avoid
conflicts between same NIC adapters. In Linux these NIC adapter is represented by the word "eth" . For
example if two NIC cards are there in a system then it will be denoted as "eho","eth1", .....etc.,
5. What is media?
Media is nothing but cable to connect two or systems. Example : RJ 45, CAT 5 and CAT 6, ....etc.,
6. What is topology?
Topology is a design in which the computers in network will be connected to each other. Example for
topologies are Bus, Ring, Star, Mesh, Tree topologies.
7. What is protocol?
A Network Protocol defines rules and conventions for communication between the network devices.
Protocols are generally use packet switching techniques to send and receive messages in the form of
packets.
Example for protocols are TCP/IP (Transmission Control Protocol and Internet Protocol), UPD (User
Datagram Protocol) and HTTP (Hyper Text Transfer Protocol), ....etc.,
8. What are the differences between TCP/IP and UDP protocols?
TCP/IP UDP
Transmission Control Protocol User Datagram Protocol
It is connection oriented It is connection less
Reliable Non-Reliable
TCP Acknowledgement will be sent / received No Acknowledgement
Slow communication Fast communication
Protocol No. for TCP is 6 Protocol No. for UDP is 17
HTTP, FTP, SMTP, ....etc., uses TCP DNS, DHCP, ....etc., uses UDP
9. What is an IP address?
Every Computer will be assigned an IP address to identify each one to communicate in the network.
The IP address sub components are Classes of an IP address, Subnet masks and Gateway.
Classes of IP address :
The IP addresses are further divided into classes. The classes are A, B, C, D, E and the ranges are given
below.
Start End Default Subnet mask Classless Inter Domain Routing
Class
Class A 0.0.0.0 127.255.255.255 255.0.0.0 /8
Class B 128.0.0.0 191.255.255.255 255.255.0.0 /16
Class C 192.0.0.0 223.255.255.255 255.255.255.0 /24
Class D 224.0.0.0 239.255.255.255
Class E 240.0.0.0 255.255.255.255
Page 33
RED-HAT LINUX 6/7
users and the computer that serve the pages to users are host nodes. The computer that control traffic
within your company's network or at our local internet service provider (ISP) are the gateway nodes.
14. What are important configuration files in network configuration?
# cat /etc/sysconfig/network (This file keeps the information about the hostname assigned to
the system and if we want to change the hostname permanently, we need to change
the hostname in this file)
# cat /etc/sysconfig/network-scripts/ (This directory keeps the configuration of network devices
connected to the system. Examples are ifcfg-eht0,
ifcfg-eth1, ifcfg-eth2, .....etc.,)
# cat /etc/hosts (This file is responsible for resolving hostname into IP address locally. ie., local DNS if
DNS
server is not available)
# cat /etc/resolve.conf (This file keeps the address of the DNS server to which the clients will be
accessing to resolve IP address to hostname
and hostname to IP address)
15. What are the differences between MAC and IP addresses?
MAC Address IP Address
It is a permanent address. So we cannot change this It is a temporary address. So, we can change this
address. address any no. of times.
It stands for Media Access Control Address. Internet Protocol address.
It is a physical address. It is a logical address.
It is two types.
IPV4 :(It is divided into 4 parts )
It is divided into 6 parts. --- . --- . --- . --- (each 8 bits. So, 8 X 4 = 32 bits
--- : --- : --- : --- : --- : --- (each 8 bits. So, 8 X 6 = 48 bits IPV6 : ( It is divided into 16 parts )
--- . --- . --- . --- . --- . --- . --- . --- . --- . --- . --- . --- . --- . --- .
--- . --- (each 8 bits. So, 8 X 16 = 128 bits.
ifconfig (to see the MAC address) # ifconfig (to see the IP address)
16. How many types of NIC cards available?
(a) eth0 (1st NIC card)
(b) eth1 (2nd NIC card)
(c) br0 (Bridge -----> used for communication from physical to virtual)
(d) lo (loopback device name and IP address is 127.0.0.1)
# ifconfig (to see all the NIC devices connected to the system)
17. How many types of cable connections available?
(i) Cross cable (to connect two systems directly)
(ii) Straight cable (to connect more systems with the help of switch)
# ethtool <device name> (to check the network cable is connected or not)
# miitool<device name> (It is also used to check the network cable but it will not supports
RHEL - 7 and only supports RHEL - 6 and it also works on physical system only not on
virtual system)
18. In how many ways we can configure the network?
There are two ways to configure the network.
(a) Static Network.
(b) Dynamic Network.
Static Network :
In this way we assign the IP address and hostname manually. Once we configure the IP address, it will
not change.
Dynamic Network :
In this way we assign the IP address and hostname dynamically. This means the IP address will change
at every boot.
19. How to assign the static IP address to the NIC card?
Page 34
RED-HAT LINUX 6/7
In RHEL - 6 :
# setup
(Move the cursor to Network configuration and press Enter key)
(Move the cursor to Device configuration and press Enter key)
(Select the NIC adapter ie., eth0 and press Enter key)
(Assign the above IP address and other details as per our requirements and move the cursor to "OK"
and press
Enter key)
(Move the cursor to "Save" to save the changes in device configuration and press Enter key)
(Once again move the cursor to "Save & Quit" button and press Enter key)
(Finally move the cursor to "Quit" button and press Enter key to quit the utility)
(Then restart the network service and check for the IP address by # service network restart
command)
(If the change is not reflected with the above service, then restart the network manager by
# service NetworkManager
restart command)
# ifconfig (to see the IP address of the NIC card)
# ping < IP address > (to check whether the IP is pinging or not)
In RHEL - 7 :
# nmcli connection show (to see all the network connections)
# nmcli device show (to see the network details if already configured manually or
dynamically)
# nmcli connection add con-name "System eth0" ifname eth0 type ethernet (to add the network
connection)
# nmcli connection modify "System eth0" ipv4.addresses ' < IP address >/< netmask >< gateway > '
ipv4.dns < dns server IP address > ipv4.dns-search < domain name> ipv4.method <static
or manually> (to assign IP address, gateway, dns, domain name and configure the network as
static or manually)
# nmcli connection up "System eth0" (to up the connection)
# systemctl restart network (to restart the network service)
# systemctl enable network (to enable the network service)
# ifconfig (to see the IP address of the NIC card)
# ping < IP address > (to check whether the IP is pinging or not)
20. What are the differences between RHEL - 6 and RHEL - 7 network configuration files?
RHEL - 6 RHEL - 7
/etc/sysconfig/network-scripts is the directory which /etc/sysconfig/network-scripts is the directory which
contains the NIC configuration information. contains the NIC configuration information.
/etc/sysconfig/network-scripts/ifcfg-<device name> is /etc/sysconfig/network-scripts/ifcfg-<device name> is
the file which contains the NIC configuration details. the file which contains the NIC configuration details.
/etc/resolve.conf is the file which contains DNS server IP /etc/resolve.conf is the file which contains DNS server IP
and domain name location. and domain name location.
/etc/sysconfig/network is the hostname configuration
/etc/hostname is the hostname configuration file.
file.
/etc/hosts is the file which contains the local DNS server /etc/hosts is the file which contains the local DNS server
IP address. IP address.
21. What are the differences between Dynamic and Static configuration information?
Dynamic configuration information Static configuration information
Device =<NIC device name> Device =<NIC device name>
HWADDR=02:8a:a6:30:45 HWADDR=02:8a:a6:30:45
Bootproto=DHCP Bootproto=none (means static network)
Onboot=yes (yes means whenever we restart the system
this connection will be activated and no means whenever Onboot=yes
we restart the system the connection will be deactivated)
Type=Ethernet Type=Ethernet
Userctl=yes/no ----> If it is yes all normal users can disable Userctl=yes/no ----> If it is yes all normal users can disabl
Page 35
RED-HAT LINUX 6/7
the NIC card and If it is no except root user nobody can the NIC card and If it is no except root user nobody can
disable the NIC card. disable the NIC card.
RHEL - 7 :
# hostname <fully qualified domain name> (to set the hostname temporarily)
# hostnamectl set-hostname <fully qualified domain name>(to set the hostname permanently)
# systemctl restart network (to update the hostname in the
network)
# systemctl enable network (to enable the connection at
next reboot)
23. How to troubleshoot if the NIC is notworking?
(a) First check the NIC card is present or not by # ifconfig command.
(b) If present thencheck the status of the NIC card is enabled or disabledby click on System menu
on the status bar, then select Network Connections menu.
(c) Click on IPV4 settings tab, select the device eth0 or any other and select Enable button, then
Apply and OK.
(d)Open /etc/sysconfig/network-scripts/ifcfg-eth0 file check Userctl=yes or no. If it is yes make it as
no, then check Onboot= yes or no. If it is no make it as yes and save that file.
(e) If not present thencheck the status of the NIC card is enabled or disabled by click on System menu
on the status bar, then select Network Connections menu.
(f) Click on IPV4 settings tab, select the device eth0 or any other and select Enable button, then Apply
and OK.
(g) Using # setup (in RHEL - 6) or # nmcli (in RHEL - 7) commands assign the IP address to the
system and restart the network service by # service network restart (in RHEL - 6) or #
systemctl restart network (in RHEL - 7) commands and enable the service at next reboot by #
chkconfig network on (in RHEL - 6) or # systemctl enable network (in RHEL - 7) commands.
(h) Then up the connection by # ifconfig eth0 up (in RHEL - 6) or # nmcli connection up
<connection name> commands.
(i) Even though it is not working may be the fault in NIC card. If so, contact the hardware vendor by
taking the permissions from higher authorities.
24. What is bonding and how to configure bonding? (from RHEL - 6)
What is link aggregation or bridging or teaming and how to configure teaming? (from RHEL - 7)
Bonding or Teaming or Bridging:
Collection of multiple NIC cards and make them as single connection (virtual) NIC card is called
bonding.
It is nothing but backup of NIC cards.
In RHEL - 6 it is called as Bonding or Bridging.
In RHEL - 7 it is called as Teaming or Link aggregation.
There are 3 types of backup in Bonding or Teaming.
(a) Mode 0 -----> Round Robbin
(b) Mode 1 -----> Activebackup
(c) Mode 3 -----> Broadcasting
Mode 0 :
It provides load balancing and fault tolerance.
Data will be shared by both NIC cards in round robbin.
If one NIC card failed then another NIC card will be activated to communicate with the server
So, there is a load balancing and fault tolerance features.
Mode 1 :
Page 36
RED-HAT LINUX 6/7
Activebackup means only one NIC card is activated at a time and another one is in down state.
So, there is no load balancing.
But if one NIC card is failed then another NIC card will be activated automatically.
Mode 3 :
In this mode broadcasting is done.
In this the same data will be transferred through two NIC cards.
So there is no load balancing.
But if one NIC card is failed then second NIC card will be activated automatically.
So, all the 3 modes are supports only fault tolerance, but round robbin is the only one mode that
provides load balancing.
Requirements to configure :
(i) Minimum two NIC cards.
(ii) One IP address.
(iii) Connection type is bond (in RHEL - 6) and team (in RHEL - 7) not the ethernet type.
Here no need to assign the IP addresses for two NIC cards and we are giving only one IP
address to bond or team.
Bonding configuration : (in RHEL - 6)
(i) # vim /etc/sysconfig/network-scripts/ifcfg-bond0
DEVICE=bond0
IP ADDR=<IP address>
TYPE=ethernet
NETMASK=255.225.225.0 or <IP address class netmask>
ONBOOT=yes
BOOTPROTO=none
USERCTL=no
MASTER=yes
BONDING_OPTS="mode0 or mode1 or mode3 miimon=50" (Save and exit this file)
(ii) vim /etc/sysconfig/network-scripts/ifcfg-eth1
DEVICE=eth1
ONBOOT=yes
BOOTPROTO=none
USERCTL=no
MASTER=bond0
SLAVE=yes (Save and exit this file)
(iii) vim /etc/sysconfig/network-scripts/ifcfg-eth2
DEVICE=eth2
ONBOOT=yes
BOOTPROTO=none
USERCTL=no
MASTER=bond0
SLAVE=yes (Save and exit this file)
(iv) To add virtual NIC cards eth1 and eth2 :
# setup -----> Networking -----> Device configuration -----> New Device -----> eth1
Name : eth1
Device : eth1 (save and exit this setup)
# setup -----> Networking -----> Device configuration -----> New Device -----> eth2
Name : eth2
Device : eth2 (save and exit this setup)
(v) Adding bond0 connection :
# setup -----> Networking -----> Device configuration -----> New Device -----> bond0
Name : bond0
Device : bond0
IP address : <IP address>
Netmask : 255.255.255.0
Default gateway : <gateway IP address> (save and exit this setup)
# ifdown bond0
# ifdown eth1
Page 37
RED-HAT LINUX 6/7
# ifdown eth2
# ifup bond0
# service NetworkManager stop
# service network restart
# chkconfig network on
# service NetworkManager restart
# cat /proc/net/bonding/bond0 (to check the bonding
information)
# watch -n 1 cat /proc/net/bonding/bond0 (to check the bonding information for
every 1 minute)
# echo "eth1" > /sys/devices/virtual/net/bond0/bonding/active_slave (to put the eth1 NIC
in active state)
Teaming configuration :
(i) Add the team0 connection by
# nmcli connection add con-name team0 ifname team0 type team
config ' { "runner" : { "name" : "roundrobbin" or "activebackup" or
"broadcasting" }} '
(ii) Add the two NIC cards one by one to the above created connection by
# nmcli connection add con-name port1 ifname eth1 type team-slave master team0
# nmcli connection add con-name port2 ifname eth2 type team-slave master team0
(iii) Assign the static IP address to the team0 connection by
#nmcli connection modify team0 ipv4.addresses <IP address>/<netmask> ipv4.method
static
(iv) Up the connection by
# nmcli connection up team0
(v) To see the team0 connection up details by
# teamdctl team0 state
(vi) To check the connection communication by
# ping -I team0 <IP address>
(vii) To down the one NIC card in team0 by
# nmcli connection down port1
(viii) teamdctl team0 state (to check the team0 NIC card up or down details)
25. What is the difference between TCP and UDP protocol?
TCP is a connection oriented protocol and contain the information of sender as well as receiver.
Example : HTTP, FTP, Telnet
TCP is slower than UDP due to its error checking mechanism
UDP protocols are connection less packets have no information to where they are going. These type of ports are
generally used for broadcasting.
For example : DNS, DHCP
UDP are faster
26. What are the benefits of NIC Teaming?
(i) Load balancing
(ii) Fault Tolerance
(iii) Failover
27. Mention all the network configuration files you would check to configure your ethernet card?
(i) /etc/sysconfig/network-scripts/ifcfg-eth*
(ii) /etc/sysconfig/network
(iii) /etc/resolve.conf
(iv) /etc/nsswitch.conf
28. What is the use of /etc/resolve.conf?
It contains the details of nameserver, i.e., details of your DNS server which helps us connect to
Internet.
29. What is the use of /etc/hosts file?
To map any hostname to its relevant IP address.
30. What is the command to check all the open ports of your machine?
#nmap localhost
Page 38
RED-HAT LINUX 6/7
31. What is the command to check all the open ports of remote machine?
# nmap <IP address or hostname of the remote system>
32. What is the command to check all the listening ports and services of your machine?
# netstat -ntulp
33. How can you make a service run automatically after boot?
# chkconfig <service name> on
34. What are the 6 run levels of linux? And how can you configure your script to run only when the
system boots into GUI and not to any other runlevel?
0 Power off
1 Single user
2 Multi user without network
3 Multiuser with network
4 Development purpose
5 GUI
6 Restart
# chkconfig --level 5 service_name on
# chkconfig --level 1234 service_name off
35. What is a 3 way handshake protocol? Give an example of it.
SYN - system 1 sends SYN signal to remote system.
SYN-ACK - remote system receives the syn signal and sends ack signal.
ACK - system again receives ack signal from remote system and connection is established.
For Example: When you ping to a machine you are sending a SYN signal which is ACK by the remote
machine then it sends a SYN ACK signal back to the host machine. Then the host machine receives SYN
ACK and sends the ACK signal back to confirm the same.
36. What are the possible ways to check if your system is listening to port 67?
# nmap localhost | grep 67
# netstat -ntulp | grep 67
37. Explain about IPV6?
It's length is 128 bits. It's netmask is 64
# nmcli connection modify "System eth0" ipv6.addresses 2005:db8:0:1::a00:1/64 ipv6.method static
(to add the IPV6 version of IP address to the connection
"System eth0" )
# nmcli connection modify "System eth0" ipv4.addresses '172.25.5.11/24 172.25.5.254' ipv4.dns
172.25.254.254 ipv4.dns-search example.com ipv4.method static ipv6. addresses 2005:ac18::45/64
ipv6.method static (to assign ipv4 and ipv6 IP addresses to "System eth0
connection)
# nmcli connection down "System eth0" (to down the "System eth0" connection)
# nmcli connection up "System eth0" (to up the "System eth0" connection)
38. How to troubleshoot if the network is not reaching?
(i) First check the network cable is connected or not by # ethtool <NIC device name>
command. if connected then check the IP address is assigned or not by # ifconfig <NIC device name>
command.
(ii) Then check the system uptime by # uptime command.
(iii) Then check the network services status by # service network status and # service
NetworkManager status commands.
(iv) Then check the network service at Run Level by # Chkconfig --list network command.
(v) Then check whether the source network and destination network are in the same domain or
not.
(v) Then finally check the routing table by # route -n command.
Page 39
RED-HAT LINUX 6/7
# ipcalc -m <IP address) (to find the subnet mask for that specified IP
address)
Normally IP addresses are assigned by ISP (Internet Service Provider) and managed by IANA
(Internet Assign
Number Authority)
# ifconfig (to see or check all the NIC device
names and IP addresses)
# ethtool <NIC device name> (to check the network cable is connected or not)
# miitool<NIC device name> (It is also used to check the network cable but it
works on physical system not on virtual system and
supports in RHEL - 6 only)
# ip addr show (to show all NIC devices present on the system)
# hostname (to see the hostname with fully qualified domain
name)
# hostname -i (to see the IP address of the system)
# hostname -d (to check the domain name of the system)
# hostname -s (to check the hostname without domain name)
# netstat -r (to check the default gateway and routing table)
# route (to check the default gateway with routing table)
# ip route (to display the NIC device with default
gateway)
# dig or # host or #nslookup (all are used to resolve the name to IP and IP to
name)
# nslookup <IP address> (to resolve IP to name)
# nslookup <hostname> (to resolve name to IP)
# host <IP address> (to resolve IP to name)
# host <fully qualified domain name> (to resolve name to IP address)
# dig -x <IP address> (to resolve IP address to name)
# dig <fully qualified domain name> (to resolve name to IP address)
# nmcli (Network Manager Command Line Interface
used to configure the network
setup in RHEL - 7)
# setup (to setup the static network in RHEL - 2, 3, 4, 5
and 6)
# nmtui (to setup the static network in GUI mode for
RHEL - 7)
# nmcli device show (It displays all the NIC devices network information of the
system )
# nmcli device show eth0 (to see all the network devices information of the
eth0)
# nmcli connection or nmcli connection show (to see all the network connection names)
# nmcli connection add con-name <connection name> ifname <NIC device name> type ethernet
(to create a new connection name for
eth0)
# nmcli connection show --activate (it shows which connection is active currently)
# nmcli connection add con-name <connection name> ifname <NIC device name> type ethernet
(to add a connection name to NIC
device)
# nmcli connection modify <connection name> ipv4.addresses ' <IP address>/<netmask><default
gateway> '
ipv4.dns <dns server IP address> ipv4.dsn-search <domain name> ipv4.method <static/manual>
(to modify the connection as static and assign the IP, gateway, dns IP,
domain name)
# nmcli connection delete <connection name> (to delete the specified connection)
# nmcli connection modify <connection name> ipv4.method <static/manual> (to modify dynamic
connection
to static connection)
Page 40
RED-HAT LINUX 6/7
Page 41
RED-HAT LINUX 6/7
(If we enter as sshd stop at the last line of the script file then sshd will be stopped even
though that
sshd is enabled)
# service sshd status (to check the sshd status)
# service --service -all (to see the process ID of all the services)
# netstat -ntulp (to see all the services with port no., status, process ID
and all open ports in local system, routing table and NIC
device information)
-n -----> port no. (numeric no) -t ----->tcp protocol
-u -----> upd protocol -l -----> port is listening or
not
-p -----> display the process ID
# netstat -r (to see all routing table information)
# netstat -i (to see all the NIC cards information)
# nmap (to see the network mapping ie., open ports list on
remote system)
Note : By default this command will not available. So, first install the nmap package by # you install
nmap -y
# nmap <remote system IP address> (to see all the services which are running in the specified
remote system)
# nmap <remote IP 1><remote IP 2><remote IP 3> (to see the running services on specified remote
systems)
# nmap 172.25.0.11 - 50 (to see the running service on 172.25.0.11 to 172.25.0.50
systems)
# nmap -p 80 <remote IP> (to see the http port is running or not on specified remote system)
# nmap -p 80 - 90 <remote IP> (to see port no's 80 to 90 are running or not on remote systems)
# nmap -sp 172.25.0.0/24 (to see all the systems which are in upstate ie., 172.25.0.1,
172.25.0.2,
(where s -- scan & p -- ping) 172.25.0.3, ......upto 172.25.0.254
systems)
Open a file, write all the systems IP addresses, save & exit the file. Example has given below,
# vim coss
172.25.2.50
172.25.3.50
172.25.4.50 ....etc., (save and exit this file)
# nmap -iL coss (to scan all the IP addresses by reading the coss file)(where -i ---->
input, -L ----> list)
# nmap --iflist (to see all the routing table information in the network)
# nmap 172.25.0.10 - 20 --exclude 172.25.0.15 (to scan all the systems from 172.25.0.10 to
172.25.0.20 systems and excluding
172.25.0.15 system)
# nmcli connection show --active (to control the network connections)
# ip link (to check the network connection)
# ping -I eth1 <IP address> (to check the 2nd NIC card connection)
Page 42
RED-HAT LINUX 6/7
5. Managing SELinux
1. What is SELinux?
It is a one type of security that enhances the security that allows users and administrators more
control over which users and applications can access which resources, such as files, Standard Linux access
controls etc.,
It is mainly used to protect internal data (not from external data) from system services. In real time
SELinux is disabled and instead of this IP tables are used. It protects all the services, files and directories by
default if SELinux is enabled.
2. In how many ways we can implement the SELinux? Explain them.
We can implement the SELinux mainly in 2 modes.
(i) Enabled
(ii) Disabled (default mode)
Enabled :
Enabled means enabling the SELinux policy and this mode of SELinux is divided into two parts.
(a) Enforcing
(b) Permissive
Disabled :
Disabled means disabling the SELinux policy.
3. What is Enforcing mode in SELinux?
Enforcing means SELinux is on. It checks SELinux policy and stored a log. No can access the services by
default but we can change the policy whenever we needed.
4. What is Permissive mode in SELinux?
SELinux is on and it don't check SELinux policy and stored the log. Everybody can access the services by
default and we can also change the SELinux policy. It is also called as debugging mode or troubleshooting
mode. In this mode SELinux policies and rules are applied to subjects and objects but actions are not affected.
5. What is Disabled mode in SELinux?
SELinux is turned off and no warning and log messages will be generated and stored.
6. What are Booleans?
Page 43
RED-HAT LINUX 6/7
Booleans are variables that can either be set as true or false. Booleans enhance the effect of SELinux
policies implemented by the System Administrators. A policy may protects certain deamons or services by
applying various access control rules.
7. What is SELinux policy?
The SELinux policy is the set of rules that guide the SELinux security engine. It defines types for file
objects and domains for process. It uses roles to limit the domains that can be entered and the user identities to
specify the role that can be attained.
8. What are the required files for SELinux?
# vim /etc/selinux/config -----> It is main file for SELinux.
# vim /etc/sysconfig/selinux -----> It is a link file to the above file.
# vim /var/log/audit/audit.log -----> SELinux log messages will be stored in this file.
9. what is the command to see the SELinux mode?
# getenforce (to check the SELinux mode)
10. What is command to set the SELinux mode temporarily?
# setenforce 0 or 1 (to set the SELinux mode. Where ' 0 ' -----> permissive and ' 1 ' ----->
Enforcing)
Note : (i) To change the SELinux mode from Permissive to Enforcing or Enforcing to Permissive
modes the system restart is not required.
(ii) To change Enforcing mode to Disabled mode or Disabled mode to Enforcing mode
the system restart is required.
(iii) The above commands are changed the SELinux mode temporarily only. To make the
selinux changes permanently then open /etc/selinux/config and go to ,
SELINUX=Enforcing or Permissive or Disabled (save and
exit this file)
11. What is command to see the SELinux policy details?
# sestatus (to see the SELinux policy details)
Other useful commands :
# ls -Z <file name> (to see the SELinux context of the file)
# ls -ldZ <directory name>(to see the SELinux context of the directory)
# ps -efZ | grep <process name> (to see the SELinux context of the process running on the system)
# ps -efZ | grep http (to see the SELinux context of the http process running on the
system)
# chcon -t <argument> <file/directory name> (to change SELinux context of the file or
directory)
# chcon -t public_content_t /public (to change the SELinux context of the /public
directory)
# chcon -R public_content_t /public (to change the SELinux context of the /public
directory and
its contents)
# restorecon -v <file/directory name> (to restore the previous SELinux context of the
file/directory)
# restorecon -v /public (to restore the previous SELinux context of that
directory)
# restorecon -Rv <directory> (to restore the previous SELinux context of the
directory and
its contents)
# restorecon -Rv /public (to restore the previous SELinux context
of the /public
directory and its contents)
# getsebool -a | grep <service name> (to see the booleans of the specified service)
# getsebool -a | grep ftp (to see the booleans of the ftp service)
# setsebool <boolean><option on/off> (to change the boolean of a specified service)
# setsebool allow_ftpd_anon_write on (to change the boolean of the ftpd service
temporarily)
# setsebool -P <service name> = <0/1> (to change the boolean for the service on or off
permanently)
Page 44
RED-HAT LINUX 6/7
# setsebool -P samba_export_all_rw = 1 (to change the boolean for samba service permanently
on)
Page 45
RED-HAT LINUX 6/7
booted and the real root the file system is mounted. It also contains necessary drivers compiled inside
which helps it to access the hard drive partitions and other hardware.
init level :
In this init program reads the /etc/inittab file and put the system into specified run level. init
identifies the default run level from /etc/inittab file and we can change the this default run level
whenever we needed. We can find the default run level by # grep "initdefault" /etc/inittab command on
our system. Normally the
default run level in Linux is 3 in CLI (Command Line Interface) mode and 5 in GUI (Graphical User
Interface) mode.
Run Level Programs :
The following run levels are available in Linux systems.
0 -----> halt or shutdown the system
1 -----> Single user mode
2 -----> Multi user without NFS
3 -----> Full multi user mode but no GUI and only CLI mode
4 -----> Unused
5 -----> Full multi user mode with GUI (X11 system)
6 -----> reboot the system
Whenever we start the Linux system is booting we can see various services getting started. Those
services are located in different run levels programs executed from the run level directory as defined by
our default run level. Depending on our default init level setting, the system will execute the programs from
one of the following directories.
Run level 0 -----> /etc/rc.d/rc0.d
Run level 1 -----> /etc/rc.d/rc1.d
Run level 2 -----> /etc/rc.d/rc2.d
Run level 3 -----> /etc/rc.d/rc3.d
Run level 4 -----> /etc/rc.d/rc4.d
Run level 5 -----> /etc/rc.d/rc5.d
Run level 6 -----> /etc/rc.d/rc6.d
The above directories are also having symbolic links available for those directories under /etc/rc0.d,
/etc/rc1.d, ....etc., So, the /etc/rc0.d is linked to /etc/rc.d/rc0.d
Booting procedure in RHEL - 7:
Upto kernel the booting process is same as the above. /boot/grub2/grub.conf is the GRUB
configuration file in RHEL - 7. systemd is the initial process in RHEL - 7 and its process ID is 1.
linux16 read the root ( / ) file system and then initrd16process will mount the root ( / ) file system in
read & write mode and starts the systemdprocess. And the systemd process will read the /etc/fstab file and
mount all the file systems. Then it reads the file /etc/systemd/system/default.target file and brings
the system into the default run level according to the scripts the processes will start or stop.
2. How to check the current run level of the system?
# who -r (to see the present run level of the system)
3. How to change the default run level?
First open the /etc/inittab file by # vim /etc/inittab command and go to last line change the run
level number as we required and then reboot the system by # init 6 command. After rebooting the system
check the current run level by # who -r command.
4. How to start the graphical interface if the system is in run level 3 now?
# startx (it changes the run level 3 to 5 and reboots the system)
5. How to troubleshoot if the boot disk is not available?
(i) First check the hard disk is present in the system or not. If not present connect the hard disk
and restart the system.
(ii) If the hard disk is present, then go to BIOS and find the location of the hard disk.
(iii) Check the boot priority in the BIOS. If boot priority is not the hard disk then change it to hard disk
and restart the system.
(iv) Even though the system is not started then boot the system with CDROM in single user mode
and open the /boot/grub/grub.conf file and see the hard disk name and partition number.
Normally it should be /dev/hda1 (if the hard disk is IDE hard disk) or /dev/sda1 (if the
hard disk is SATA or SCSI). If the hard disk name and partition number is different instead of the
original then change them and reboot the system with hard disk.
Page 46
RED-HAT LINUX 6/7
(v)If the GRUB is corrupted then reboot the system with CDROM in single user mode and restore the
grub information from the recent backup and then restart the system with hard disk.
6. How to reboot the production server?
(i) In general the production servers will not be rebooted frequently because the end users will
suffer if the productions server are in down state. If any changes made to the system like grub,
selinux policy, default run level is changed and if kernel patches are applied the system reboot is
required.
(ii) If any inconsistency is root ( / ) file system, then take the business approval from higher
authorities,make a plan for proper scheduleand also inform to the different teams like
application team to stop the application, databaseteam to stop the databases, QC team to stop
the testing, monitoring people to ignore the alerts from thisserver and other teams if any and then
reboot the system withCDROM in single user mode and then run #fsck command on that file
system.
(iii) If O/S disk is corrupted or damaged then, reboot the system temporarily with the mirror
disk then fix that problem and again boot the system with original disk.
7. What is the difference between # reboot and # init 6 commands?
Both commands are used to restart or reboot the system.
# reboot command will not send the kill signals to the system and it will kill all the running processes
and services forcefully and then restart the system.
# init 6 command will send the kill signals to the system and it will stop all the processes and
services one by one and then restart the system.
8. What is console port and how to connect to the console port?
Console port is used to connect the system even though the system is not booted with the main O/S.
This port is used to connect the system for troubleshooting purpose only. We can connect the console
port as same as connect to systems LAN port and it is also having IP address, user name and password to
connect to the console.
There are different types of console ports for different types of servers. They are given below.
Server Name Name of the Console port Expansion name
DRAC ---> DELL Remote Access Controllers
DELL DRAC or i-DRAC i-DRAC ---> Integrated DELL Remote Access
Controllers
IBM Power series HMC Hardware Management Console
HP ILO Integrated Light Out
Page 47
RED-HAT LINUX 6/7
11. How many links will be created when we create the directory?
Whenever we create any directory there are two links will be created.
12. What are the differences between run level 2 and run level 3?
Run Level 2 :
(i) It supports multiuser operations.
(ii) Multiple users can access the system.
(iii) All the system deamons will run except NFS and some other network service related
deamons.
(iv) So, without NFS we can use all other services.
Run Level 3 :
(i) It is also supports Multi user operations.
(ii) Multiple users can access the system.
(iii) All the system deamons including NFS and other network related service deamons will run.
(iv) So, we can avail all the services including NFS also.
13. Server running in single user mode, can you login remotely and how?
We can login to the system remotely in single user mode also but it is possible to connect to console
instead of LAN port through putty tool by giving IP address, user name and password. Then console port
appears and boot the system with CDROM in single user mode.
14. How to check the present kernel version?
# uname -r (it displays the present kernel version)
# uname -a (it displays the present kernel version with other details)
# cat /boot/grub/grub.conf (in this file also we can find the kernel version)
15. What is the command to see the system architecture?
# arch or # uname -m (both commands gives the architecture of the system)
16. How to check the version of the O/S ?
# cat /etc/redhat-release (gives the version of the O/S)
17. How to repair the corrupted boot loader and recover it?
This problems may be occur if the GRUB is corrupted. So, we have to recover the GRUB. Basically the
repairing of GRUB means installing the new grub on the existing one from RHEL - 6 DVD. The steps are
given below.
(i) Insert the RHEL - 6 DVD and make sure that system should boot from CD/DVD.
(ii) Boot the system in Rescue Installed System mode.
(iii) Select the language with which we want to continue and click on OK.
(iv) Select the Keyboard type as US and click OK.
(v) Select Local CD/DVD and click OK.
(vi) Move the cursor to NO to ignore the Networking.
(vii) Move the cursor to Continue tab to mount the root ( / ) from CD/DVD and press Enter key.
(viii) Now the root ( / ) file system is mounted on /mnt/sysimage, here click on OK and Press Enter to
continue.
(ix) Select the "shell Start shell" option and click on OK, then shell will be displayed on screen.
(xi) At shell prompt type as # chroot /mnt/sysimage command, press Enter.
(xii) Check the /boot partition by # fdisk -l command.
(xiii) Install the new grub on the boot device ie., may be /dev/sda2 by # grub-install <device
name> command (For example #
grub-install /dev/sda2).
(xiv) If it show no error reported that means we have successfully recovered the grub.
(xv) Then type # exit command and again type # exit or # reboot command to reboot the
system.
18. What are Modules or Kernel Modules? How to find the Kernel Modules?
The drivers is Linux system are known as Modules or Kernel Modules. These modules are assigned by
kernel depending on the hardware. Hardware can only be communicated and can work efficiently when the
proper module is loaded in the kernel. we can find the kernel modules by # ls /etc/lib/modules command.
All the kernel modules in the system will be ended with " .ko " extension. So, we can see all the
modules in the system by # find / -name *.ko command.
19. What other commands related to kernel modules?
# lsmod (to list all the currently loaded modules)
# lsmod |grep -i <module name> (to check whether the particular module is loaded or not)
Page 48
RED-HAT LINUX 6/7
# lsmod |grep -i fat (to check the fat module is loaded or not)
There might be a situation where our module is not working properly, in that case we have to remove
that module and re-install it again by,
# modprobe -r <module name> (to remove the specified module)
# modprobe -r fat (to remove the fat module)
# modprobe <module name> (to install or re-install the module)
# modprobe fat (to install or re-install the module)
# modinfo <module name> (to see the specified module information)
# uname (to see the which O/S is present in the system)
# uname -s (to see which O/S kernel is this either Linux or
Unix)
# rpm -qa kernel --last (to see the kernel installation date and time)
# rpm -qa kernel* (to see how many kernels are there in the
system)
# ls /proc (to see the kernel processes
information)
# ls /boot (to see the present kernel version
created time) # ls /etc/lib/modules (installed kernel module
drivers)
# ls /usr/src (kernel source code location)
# kudzu (to scan the new hardware in RHEL - 4)
# depmod (to scan the new hardware from RHEL -
5, 6 and 7)
# rmmod <module name> (to remove the specified module)
# insmod <module name> (to install the kernel module without dependency
modules)
20. How to see the run level?
# who -r (to see the current run level)
21. How to block the USB / CDROM driver?
# lsmod |grep -i usb (to see the USB module is loaded or not)
# mount (to check the USB is mounted or not)
# modprobe -r usb_storage (remove the USB module, if it is mounted it will
not remove)
# umount /<mount point> (to unmount the USB if it is mounted)
# vim /etc/modprobe.d/blocklist.conf (it will open the blocklist.conf file, then put an
entry of USB)
blocklist usb_storage (after type this save and exit this file)
22. What is " wait " and where it is stored?
(i) If there is not enough memory to run the process, then it will wait for free space in memory.
That process is called wait.
(ii) wait is stored in buffer like cache memory.
23. What is run level?
(i) Run level is nothing but to put the system in different levels to perform different maintenance
modes.
(ii) There are 7 run levels. Those are 0, 1, 2, 3, 4, 5 and 6.
(iii) The above levels are used to put the system in different stages to avail different services.
24. What is the default run level?
(i) When we boot the server the system automatically go to one particular run level. That run
level is called the default run level.
(ii) In Linux the default run level is 5 in GUI and 3 in CLI.
(iii) We can modify the default run level by put an entry in /etc/inittab file.
25. Which run level are you using?
Run level 3.
26. How to change the run level temporarily?
# init <run level no.> (to change the run level temporarily)
Example : # init 0 or init 1 or init 2 or init 3 or init 4 or init 5 or init 6
27. Can I mount on two disks alternatively when booting?
Page 49
RED-HAT LINUX 6/7
No it is not possible to mount on two disks alternatively when booting because we can specify only one
disk as boot disk but not two disks as booting disks in BIOS settings.
So, it is not possible to mount on two disks alternatively when booting.
7. Job Automation
1. What is Job scheduling?
The process of creating the jobs and make them occur on the system repeatedly hourly, daily, weekly,
monthly and yearly is called Job scheduling. In Linux and other Unix systems this process is handled by the cron
service or deamon called crondand atd is the at jobs deamon which can be used to schedule the tasks (also
called as jobs).
2. What is the importance of the job scheduling?
The importance of the job scheduling is that the critical tasks like backups, which the client usually
wants to be taken in nights, can easily performed without the intervention of the administrator by
scheduling a cron job. If the cron job is scheduled carefully then the backup will be taken at any given time of
the client and there will be no need for the administrator to remain back at nights to take the backup.
3. What are the differences between cron and at jobs?
cron job :
(i) cron jobs are scheduling jobs automatically at a particular time, day of the week, week of the
month and month of the year.
(ii) The job may be a file or file system.
(iii) We cannot get the information as a log file if the job was failed to execute ie., when it was
failed and where is was failed and also cannot execute automatically the failed jobs.
at job :
(i) at jobs are executes only once.
(ii) Here also we cannot get the information if the job is failed and it is also do not execute the
failed jobs automatically.
4. What are the important files related to cron and at jobs?
/etc/crontab -----> is the file which stores all the scheduled jobs.
/etc/cron.deny -----> is the file used to restrict the users from using cron jobs.
/etc/cron.allow -----> is used to allow only users whose names are mentioned in this file to use cron jobs
and this file does not exist by
default.
/etc/at.deny ----->same as cron.deny for restricting the users to use at jobs.
/etc/at.allow -----> same as cron.allow for allowing users to use at jobs.
5. What is the format of the cron job?
# crontab -e (to edit the cron job editor to create or remove the cron
jobs)
<minutes><hours><day of the month><month of the year><day of the week><job or script>
Page 50
RED-HAT LINUX 6/7
(ii) Put the entries of the user names whom do we (ii) Put the entries of the user names whom do we
want to allow the cron jobs. want to deny the cron jobs.
Page 51
RED-HAT LINUX 6/7
(iii) Enter the above saved file name within the at job editor.
(iv) Press Ctrl + d to exit from the editor.
(v) Then system will assign a job id to that job. We can see the list of at jobs by # atq
command.
Delete :
(i) See the job id which job we want to delete by # atq command and note that job id.
(ii) Then delete that job by # at -r <job id> command.
14. How to know currently scheduled at jobs?
# atq (to see the currently scheduled at jobs)
15. How to allow or deny at jobs for a user?
For allow For deny
(i) Open /etc/at.allow file. (i) Open /etc/at.deny file.
(ii) Put the entries of the user names whom do we (ii) Put the entries of the user names whom do we
want to allow the at jobs. want to deny the at jobs.
Page 52
RED-HAT LINUX 6/7
Example : # at 9:30
at> useradd gopal
at> groupadd manager
at> rm -rf /opt
at> tar -cvf /root/etc.tar /etc/*
press Ctrl + d to save and exit from at job
# at -r <job id> (to remove the specified job)
* at jobs can be performed only one time. It cannot repeat daily.
* at jobs once scheduled, we cannot edit the jobs or modify the time of the job.
# at now +5min (to execute the at job now after 5
minutes)
at> touch f1 f2 f3
at> mkdir /ram
at><EOT> or Ctrl + d (to save and exit from at job editor)
# tailf /var/log/cron (to see the last 10 lines of at or cron log file
contents)
# at Jan 20 2015 (to schedule the at job on 20th Jan
2015)
# at 5PM Jan 13 2015 (to schedule the at job on 13th Jan 2015 at 5PM)
# at noon + 4days (to schedule the at job today and after 4
days)
# at midnight (to schedule the at job today midnight)
# at midnight + 4days (to schedule the at job today midnight and after
4 days)
# vim /etc/at.deny (to deny the at jobs for specified users)
# vim /etc/at.allow (to allow the at jobs for specified users)
* If both /etc/at.deny and /etc/at.allow files are deleted, except root user every user will be deny
to
execute at
jobs.
* Once scheduled the cron jobs, we can modify, edit that job any no. of times.
# cat /etc/crontab (to see the cron jobs list)
# crontab -lu <user name> (to list all the cron jobs of the specified user)
# crontab -eu <user name> (to create or edit the cron jobs)
# crontab -ru <user name> (to erase or remove the specified user's cron
jobs)
# crontab -r <job id> (to remove the specified cron jobs)
# vim /etc/cron.deny (to deny the cron jobs for specified users)
# vim /etc/cron.allow (to allow the cron jobs for specified users)
* If both files are remove or deleted, except root user all the users are deny to execute the cronjobs.
# crontab -eu raju
55 14 20 1 2 /usr/sbin/useradd gopal; usr/sbin/groupadd
team
(save & exit this crontab)
* This job executes the useradd and groupadd commands on Tuesday 20th Jan every year
Examples for crontab :
(i) 58 14,15 20-25 1 2,3,6 /usr/sbin/passwd
where 58 -----> 58 minutes
14,15 -----> 14 hours and 15 hours ( 14:58 and 15:58)
20-25 -----> dates 20, 21, 22. 23, 24 and 25
1 -----> January
2, 3, 6 -----> 2nd day, 3rd day and 6th day
(ii) 58 15 * * * <command>
where 58 -----> 58 minutes
15 -----> 15 hours (at 15:58)
* * * -----> every day
Page 53
RED-HAT LINUX 6/7
Page 54
RED-HAT LINUX 6/7
(vi) If it is through putty, we can manage the serves using command line interface only. In both ways
we should give server name or IP address, port no., user name and password.
2. What is SSH and explain it?
SSH is stands for Secure Shell. It was designed and created to provide the best security when
accessing another computer remotely. Not only does it encrypt the session, it also provides better
authentication facilities.
On windows systems install the putty software and through putty we can access the remote system by
configuring ssh.
SSh is protocol which facilitates secured communication between two systems using Client-Server
architecture and allows users to login to the server host systems remotely.
It is used to connect to remote system and perform administrative task or jobs. By default ssh takes
password authentication mechanism and its port no. is 22. Through ssh the data will be transferred in
encrypted format.
3. What is telnet?
Telnet is a mechanism to connect and to administrate the remote system from local system. This is the
oldest program which is available on most network capable operating systems. Accessing a remote shell
account through the telnet method is danger because in that everything that you send or receive over that
telnet session is visible in plain text on your local network and the local network of the machine you are
connecting to.
So, anyone can sniff the connection in-between can see our user name, password, email and other
messages that we read and command that we run. For these reasons we need a more sophisticated program
than telnet to connect to a remote host.
4. What are the differences between Telnet and SSH?
Telnet SSH
(a) Through telnet we can connect the remote (a) Through ssh also we can connect the remote
system, but any network hacker may see the system, but nobody can see the transferred data.
transferred data. And the telnet port no. is 23. And the ssh port no. is 22.
(b) Data will be transferred in non-encrypted format. (b) Data will be transferred in encrypted format.
(c) We cannot trust this telnet connection. (c) We can trust this ssh connection.
(d) We cannot give the trusting in telnet. (d) We can give the trusting in ssh.
(e) By snooping or sniffing technologies we can see (e) By snooping or sniffing technologies we cannot
the data like system or hostname, login name, see the data like system name or hostname, login
password and other data. name, password and other data.
So, there is no security. So, there is a security
(f) # telnet<IP address of the remote system> (f) # ssh<IP address of the remote system>
(provide login name and password) (provide login name and password)
5. In how many ways we can connect the remote host through ssh?
Through ssh we can connect the remote host by two methods.
(i) Command Line Interface (CLI).
Example : # ssh <IP address of the remote system> (provide login name and password)
(ii) Graphical User Interface (GUI).
Example : open VNS server window and provide remote hostname, login name and
password.
6. What are the requirements for ssh?
(i) Remote systems IP address.
(ii) Remote systems user name and password
(iii) A proper network ie., our local and remote systems should be in the same network.
(iv) Open ssh package to configure the ssh.
7. In how many ways we can connect the remote system?
Page 55
RED-HAT LINUX 6/7
Page 56
RED-HAT LINUX 6/7
Page 57
RED-HAT LINUX 6/7
DenyGroup <group 1><group 2><group 3> ...etc., (these group users will be denied the
ssh service)
AllowGroup <group 1><group 2><group 3> ...etc., (these group users will be allowed the
ssh service)
(ii) Then restart the sshd service or deamon to effect the above modifications by
# service sshd restart (to restart the sshd deamon or service
in RHEL - 6)
# systemctl restart sshd (to restart the sshd deamon or service in
RHEL - 7)
# chkconfig sshd on (to enable the sshd deamon at next
reboot in RHEL - 6)
# systemctl enable sshd (to enable the sshd deamon at next reboot in
RHEL - 7)
# service sshd reload (to reload the sshd deamon in RHEL - 6)
# systemctl reload sshd (to reload the sshd deamon in RHEL - 7)
15. How allow the specified no. of users to access remote system at a time?
(i) Open the ssh configuration file by # vim /etc/ssh/sshd_config then go to MaxAuthTries
line and type as,
MaxAuthTries <no.> (type any numeric value equal to Max. users to allowat a time in
place of <no.>,
then save and exit this file)
(ii) Then restart the sshd service or deamon to effect the above modifications by
# service sshd restart (to restart the sshd deamon or service
in RHEL - 6)
# systemctl restart sshd (to restart the sshd deamon or service in
RHEL - 7)
# chkconfig sshd on (to enable the sshd deamon at next
reboot in RHEL - 6)
# systemctl enable sshd (to enable the sshd deamon at next reboot in
RHEL - 7)
# service sshd reload (to reload the sshd deamon in RHEL - 6)
# systemctl reload sshd (to reload the sshd deamon in RHEL - 7)
16. How to allow or deny the hosts or networks to use the ssh?
To deny IP addresses or hostnames :
(i) Open /etc/hosts.denyfile by # vim /etc/hosts.deny and go to last line and type as,
sshd: <IP address 1><IP address 2><IP address 3> ...etc., (to deny IP 1, IP 2, IP 3, ...etc.,)
sshd: <hostname 1><hostname 2><hostname 3> ...etc.,
sshd: *.example.com *.my133t.org ...etc., (to deny all the hosts from these domains)
sshd: 192.168.0. 172.25.0. ...etc., (to deny 192.168.0 and 172.25.0 networks)
sshd: ALL Except <hostname or IP address> (to deny all the hosts or IP addresses
except the specified one in that
network) and save & exit the file.
(ii) Then restart the sshd service or deamon to effect the above modifications by
# service sshd restart (to restart the sshd deamon or service
in RHEL - 6)
# systemctl restart sshd (to restart the sshd deamon or service in
RHEL - 7)
# chkconfig sshd on (to enable the sshd deamon at next
reboot in RHEL - 6)
# systemctl enable sshd (to enable the sshd deamon at next reboot in
RHEL - 7)
# service sshd reload (to reload the sshd deamon in RHEL - 6)
# systemctl reload sshd (to reload the sshd deamon in RHEL - 7)
To allow IP addresses or hostnames :
(i) Open /etc/hosts.allow file by # vim /etc/hosts.allow and go to last line and type as,
sshd: <IP address 1><IP address 2><IP address 3> ...etc., (to allow IP 1, IP 2, IP 3, ...etc.,)
sshd: <hostname 1><hostname 2><hostname 3> ...etc.,
Page 58
RED-HAT LINUX 6/7
sshd: *.example.com *.my133t.org ...etc., (to allow all the hosts from these domains)
sshd: 192.168.0. 172.25.0. ...etc., (to allow 192.168.0 and 172.25.0 networks)
sshd: ALL Except <hostname or IP address> (to allow all the hosts or IP addresses
except the specified one in that
network) and save & exit the file.
(ii) Then restart the sshd service or deamon to effect the above modifications by
# service sshd restart (to restart the sshd deamon or service
in RHEL - 6)
# systemctl restart sshd (to restart the sshd deamon or service in
RHEL - 7)
# chkconfig sshd on (to enable the sshd deamon at next
reboot in RHEL - 6)
# systemctl enable sshd (to enable the sshd deamon at next reboot in
RHEL - 7)
# service sshd reload (to reload the sshd deamon in RHEL - 6)
# systemctl reload sshd (to reload the sshd deamon in RHEL - 7)
17. How to check whether the ssh is running or not on remote host?
# nmap -p 22 <IP address of the remote host> (to see the ssh is running or not on remote
system)
18. How to troubleshoot if the client has complain that I am not accessing the server using ssh?
(i) First check the pinging of the client system. If it is not pinging then check the IP address of the
client system. If client system and sever system are in different domains or networks it will not ping. So,
bring the client system into the network of the server system. Check the network is working or not and also
check whether the network cable is connected or not.
(ii) If both systems are pinging then check whether the openssh package is installed or not. If
not installed then install that package and configure ssh on the client system and restart the sshd deamon.
(iii) Check the client <IP address or hostname> in /etc/hosts.deny files. If there is an entry of the
client system in this file, then remove that entry and restart the sshd deamon.
(iv) Finally open the ssh configuration file by # vim /etc/ssh/sshd_config and see any client user
name is present or not and check other lines for client entries in this file, if present remove those entries, save
that file and restart the sshd service.
(v) Finally check whether the client user is there in the server or not, if not create the client user,
assign the password share those details to client. If user is there then check whether the client user's
password is locked, account expired and any other or not, if locked then remove the lock, if client account
is expired then activate that account, assign the password and make the ssh trusting between client and
server systems.
19. How to copy the file from our system to remote system?
# scp <source file name with full path><IP address of the remote system>:<destination location>
Example : ssh /root/script1 192.168.1.1:/root/script1 (to copy /root/script1 file into 192.168.1.1
system)
ssh -r /root/raju/ 192.168.1.1:/root/raju/ (to copy /root/raju directory to remote
system)
* scp means secured copy to copy the files or directories from local system to remote system.
Page 59
RED-HAT LINUX 6/7
22. A system is echoing the ping, but not able to login via telnet. Why?
(i) Check telnet service is started or not. If not started, start the telnet service.
(ii) May be telnet service is disabled, if so, enable the telnet service.
(iii) May be telnet port is blocked, if so, release that port no.
(iv) May be telnet permission is denied, if so, change the permissions to allow the telnet service.
(v) Check all the files whether the telnet service is blocked or not, if blocked remove those entries.
23. How will you login or start the system in what mode if you don't know the root password?
(i) If the user having sudo permissions, then login as sudo user.
(ii) If no sudo permissions then boot with CDROM in single user mode and start the system. Then
provide the root password to root user if there is no root password.
(iii) Even though if it is not possible then finally break the root password.
Other useful commands :
# telnet <IP address or hostname> (to connect the specified remote system through
telnet)
# ssh <IP address or hostname> (to connect the specified remote system through
ssh)
Username : xxxxxx
Password : xxxxxxx
# ssh <IP address> -l <user name> (to connect the remote system using user name)
Password : xxxxxxx
# ssh 192.168.1.1 -l root (to connect this remote system as root
user)
# ssh root@192.168.1.1 (to connect this remote system as root user)
# ssh root@server1.example.com (to connect the server1 system in example.com
domain)
#w (to see all the users who are login to our system)
# w -f (to see all the users who are login to our system with
other details)
# ssh <IP address> (if we not specified the user name, then it will ask the current users
password and search the current account
in remote system)
# cat /root/.ssh/known_hosts (to see the ssh trusting remote hosts finger print
information)
# ssh root@192.168.1.1 <command> (to run a command on remote host without login to that
system)
# ssh root@192.168.1.1 -X (to run GUI commands on the remote system because by default
the ssh is configured as command line
interface, X is capital)
# lastb (to see the login failed tries)
# last -x |grep shutdown (to see the date & time of the system's last
shutdown)
9. Memory Management (Swap)
1. What is swap?
Swap space in Linux is used when the amount of the Physical memory (RAM) is full. If the system
needs more memory resources and the RAM is full, inactive pages in the memory are moved from RAM to swap
space. It helps the machines which are having small amount RAM and it should not be considered a
replacement for more RAM. Swap is located on the hard disks which have slower access time than Physical
memory.
2. What is the recommended swap space?
Generally the recommended swap space is double the RAM size, but the following table shows actual
amount.
Apart from the below recommendation a basic rule is applied to create the swap partition.
* If the RAM size is less than or equal to 2 GB, then the size of the swap = 2 X RAM size.
* If the RAM size is more than 2 GB, then the size of the swap = 2 GB + RAM size.
Recommended Amount of Swap
Amount of RAM in the System
Space
Page 60
RED-HAT LINUX 6/7
4 GB or less Min. 2 GB
4 GB - 16 GB Min. 4 GB
16 GB - 64 GB Min. 8 GB
64 GB - 256 GB Min. 16 GB
256 GB - 512 GB Min. 32 GB
Page 61
RED-HAT LINUX 6/7
Page 62
RED-HAT LINUX 6/7
First take backup of all the system and then remove previous O/S and install the present
O/S and restore the backup from backup disks or tapes. So, it is very easy and non-risky
job.
Page 63
RED-HAT LINUX 6/7
-v -----> verbose
-h -----> progress in hash codes ( in % )
-qi -----> query information about the package
-ql -----> list all package related files.
-qd ----> query about the document of the package
-qc -----> displays the configuration files for that package
-qa -----> query on all installed packages
-V -----> (capital V) to verify the package for repair that package
-R -----> list all dependent packages
--force -----> install the package forcefully
--nodeps -----> install the package without dependency (do not check the
dependencies)
--last -----> all installed packages with date and time
Other useful rpm commands :
# rpm -ivh <package name> (to install the package)
# rpm -qa (to list all installed packages)
# rpm -qa <package name> (to check whether the package is installed or
not)
# rpm -qa |wc -l (to count how many packages already
installed)
# rpm -qa --last | less (to check last installed packages)
# rpmquery -qa (to list all the installed packages)
# rpm -qa |grep -i <package name> (to check the specified package is installed or
not)
# rpm -ivh --test <package name> (to check the package consistency)
* If the installation status shows 100%, then the package is in good condition or consistent. But while
showing
the hash progress if it shows any error, then the package is in inconsistent state.
# rpm -ivh finger* (to install the finger package)
# rpm -qa finger (to check whether the package is
installed or not)
# finger <user name> (to check whether the installed package is
working or not)
# rpm -e <package name> (to erase or remove or uninstall the package)
# rpm -evv <package name> (to remove the package in verbose mode)
# rpm --test -ivh (to test the package before installing ie., whether
the
package is suitable or not)
# rpm -qi <package name> (to see the details or information on the installed
package)
# rpm -ql <package name> (to list all package related files)
# rpm -qlc <package name> (to list all the configuration files of that package)
# rpm -qd <package name> (to list all the document files of that package)
# rpm -ivh <package name> --force (to install the package forcefully)
# rpm -qR <package name> (to list the dependencies of that package)
# rpm -qip <package full name> (to display the package information before
installation)
# which <command name> (to display the location of that command)
# rpm -qf <location of the command> (to check the package name for that command)
# rpm -V <package name> (to verify that package, ie., 100% package is
there or not, if any files missed in that package, those
are displayed as a list)
# rpm -ivh <package name> --replacepkgs (to replace the missed files in that package)
# rpm -qp --changelog <package name> (displays all the changed logs like lat time, when
the package
is installed, .....etc.,)
# rpm -qp --scripts <package name> (to see the package installation scripts)
Page 64
RED-HAT LINUX 6/7
Page 65
RED-HAT LINUX 6/7
enabled=1 (if multiple repositories are there, then enable this only)
(save and exit)
(iii) # yum clean all (to clean the old one update the new repository)
(iv) # yum repolist (it displays no. of packages in that
repository)
12. How to configure the yum repository to deny some packages to be installed?
(i) To configure the yum tool the yum configuration file is /etc/yum.conf
(ii) To deny some packages, open the yum configuration file by # vim /etc/yum.conf
command.
(iii) Gotolast line and type as, exclude=*(all) kernel* ftp* then save and exit this file.
(iv) Then kernel* and ftp* packages will be denied when we trying to install those packages.
13. How to change the yum repository default location?
(i) Open yum configuration file by # vim /etc/yum.conf command.
(ii) Goto last line and type as, repository=<yum repository new location with full path> then
save and exit this file.
(iii) Then the yum repository new location will be changed from old one new one.
14. How to change the yum log file default location?
(i) Open the yum configuration file by # vim /etc/yum.conf command.
(ii) Goto last line and type as, log=<yum log file new location with full path> then save and
exit this file.
(iii) Then the default log location is changed from /var/log/yum.log file to new location.
15. How to configure the yum to restrict the architecture (64 bit or 32 bit) etc.,?
(i) Open the yum configuration file by # vim /etc/yum.conf command.
(ii) Goto last line and type as, exactarch=1 then save and exit this file.
(iii) 1 means first it installs 64 bit packages and if it is 0 then 32 bit packages will be installed.
(iv) Open the yum configuration file by # vim /etc/yum.conf command.
(v) Goto last line and type as, cachedir=<download new location> then save and exit this
file.
(vi) Then whenever we install the packages the downloaded location will be the new location.
(vii) Open the yum configuration file by # vim /etc/yum.conf command.
(viii) Goto last line and type as, assumeyes=1 then save and exit this file.
(ix) Whenever we install any package using yum then no need to mention -y option if assumeyes=1
and if assumeyes=0 then we have to mention -y option when we install the package.
16. What is O/S patch and how to add those patches on production servers or how to upgrade the
kernel?
(i) O/S patch is nothing but update the new kernel. Normally O/S patch is software that contains
some programs to fix the bugs in O/S ie., in kernel.
(ii) If our server is registered and configured in RedHat network, then we will get the information
about that updated kernel s information and then download that kernel updations.
(iii) Every O/S patch is supplied with a document about pre-requisites to apply that patch.
(iv) Check the pre-requisites, space requirements and others. if all are ok,
(v) Then we take the business approval and make CRQ's (Change requests).
(vi) Then the project manager will initiate the mail thread ie., sending the mail or messages to various
teams who are dealing with that server.
(vii) We get the response from different teams which are involving in this process.
(a) For example Monitoring team to ignore alerts from that server if the system hangs or
rebooted.
(b) DBA team if database stopped or crashed or system failed.
(c) Application team if the application effects while patching.
(viii) If the server is in cluster, then move the service group and resources to another systems manually
called switch over.
(ix) Inform the Application team to stop the application and database team to stop the
database.
(x) If the server is in cluster there is no need of reboot (no down time) else down time needed to
reboot.
(xi) Check the root disk is in normal file system or VxVM.
Page 66
RED-HAT LINUX 6/7
(xii) If mirror disk is there, split the mirror disk from original disk and boot in single user mode and add
the patch by # rpm -ivh <patch name> command.
(xiii) Then reboot the system and won't attach the mirror disk to avoid any unexpected situations or
problems and put that server under test upto 1week or 10 days depending on the company's policy.
(xiv) After the test period, if there is no problems raised then attach the system in live mode and also
with mirror disk to sync the data to update the system.
(xv) Then we inform the Application, Database, Monitoring and other teams who are dealing with
that server to test application, database, monitoring and others see the status.
(xvi) Then finally close the issue or CRQ.
17. After installation of package or patch if the package or patch is removed then what will happened?
(i) If kernel patch is removed, then the system will hang and for others there is no effect.
(ii) If package is removed then the application that belongs to that removed package will effect.
18. After applying the patch need to reboot the system or not?
(i) If the patch is kernel patch or clustered patch then only the system reboot is required.
(ii) If the patch is normal patch then there is no need of the reboot required.
19. If the package is not installing. How to troubleshoot?
(i) Check the package pre-requisites to install the package.
(ii) If pre-requisites are not matched with our system, then the package will not be installed i.e.,
O/S compatibility to install that package.
(iii) If there is no sufficient space in the system, the package will not be installed.
(iv) If the package is not properly downloaded, then the package will not be installed.
20. If the patch is not applied successfully what will you do?
(i) Check whether the patch is installed properly or not by # rpm -qa <patch name>
command.
(ii) Check the /var/log/yum.log file to verify or see why the patch is not successfully installed.
(iii) If any possible to resolved those issues, resolve and remove that patch with # rpm -e
<patch name> command.
(iv) If any reboots required to effect, then reboot the system.
(v) Again add that patch by # rpm -ivh <patch name> command.
(vi) Then check the patch by # rpm -qa <patch name> command
Other useful yum commands :
# yum repoinfo (to list all the information on all the repositories)
# yum repoinfo <repo id> (to list all the information on specified
repository)
# yum install <package name> -y (to download and install the package and y
means yes)
# yum install <package name> -d (to download the package)
# yum erase or remove <package name> -y (to remove or uninstall the package and y
means yes)
# yum list installed (to display the list of all installed
packages)
# yum list available (to list all the available packages to be installed)
# yum list all | less (to list all the installed and not installed
packages)
# yum search <package name> (to search a particular package is available or
not)
# yum info <package name> (to display the information on that package)
# yum update <package name> (if the update version of the specified package is
available, then
update that package)
# yum update all (to update all the packages nothing but whole system
will be updated)
# yum downgrade <package name>(to revert back ie., go back to previous version of that package if
new version is not working
properly)
# yum history (to display the yum history)
# yum history info < id > (to display the information of that history id)
Page 67
RED-HAT LINUX 6/7
# yum history undo < id > (to remove that history id)
# yum history undo < id > (to redo the above removed history id)
# yum grouplist (to display the list of group packages)
# yum groupinstall <package name> (to install the group package)
# yum install@<group package name> (to install the group package in another way)
# yum groupinfo <group package name> (to display the group package information)
# yum grouplist hidden (to list all the group packages names including
installed or not installed and
hidden group packages)
# yum-config-manager disablerepo=<repo id> (to disable the yum repository. So, we cannot
install any package
from the repository)
# yum clean all (to clear the history, if we disable the repository id, then we have to clean the
history, then only it will
disable the repository)
# yumdownloader <package name> (to download the package from the repository,
and the downloaded location is the present
working directory)
# man yum.conf (to see the manual pages on yum configuration
file)
# yum-config-manager --add-repo=http://content.example.com/rhel7.0/x86_64/dvd (then the
yum repository will be created automatically with .repo file also. And this works
only in RHEL - 7)
# subscription-manager register --username=<user name> --password=<password> (to register
our product with RHN--Redhat Network. The user name and passwords will be provided by the Redhat
when we purchase the software)
# subscription-manager unregister --username=<user name> --password=<password> (to
unregister our product with RHN--Redhat Network. The user name and passwords will be provided by the
Redhat when we purchase the software)
Page 68
RED-HAT LINUX 6/7
Copying files from any removable media to local disk is called recovery or restore. Backup will be
helped in hardware failure or software failure or system crashed.
3. What are the backup tools available in the IT industry?
Platform Backup Tools
Windows ntbackup
Linux tar, cpio, dd, dump, restore
3rd party Veritas netbackup, Amanda and Tivoli
4. What is tar and Explain it or how to take a backup using tar?
Archiving means collection of files and directories and to make a single file nothing but compression.
tar means tape archiving. It is an archive file. By using tar command we can take a backup of files and
directories. It cannot support file systems backup and also not support for large files more than 80GB. tar will
not skip any single file including bad blocks also.
Full syntax of tar :
# tar <options><destination file name with path><source file or directory with path>
The options are, -c -----> create
-v -----> verbose
-f -----> file name
-t -----> listing
-tv ----> long listing
-x -----> extract
-w ---->interactive
-C -----> specific location (Capital C)
-u -----> update means adding new contents to the existing tar file
--update -----> " "
--delete -----> deletes the contents from the tar file
-p ----> preserve the old permissions of the files/directories when
extracting the tar file
-z ----> gzip (gun zip) compression
-j ----> bzip2 (bun zip) compression
-J ----> xz compression (from RHEL - 7)
Examples:
# tar -cvf /root/etc.tar /etc/* (to copy all the files and directories from /etc and make
a single file and place in
the /root/etc.tar file)
# tar -tvf /root/etc/tar (to long listing the contents of the /root/etc.tar
file)
# tar -xvf /root/etc.tar -C /root1/ (to extract and copy the files in /root1/
location)
# tar -xf /root/etc.tar (to list the contents of the tar file)
# tar -f /root/etc.tar --update or -u <file name or directory> (to add the new contents to the
existing
tar file)
# tar -f /root/etc.tar --delete <file name or directory> (to delete the file from the tar)
# tar -u /root/etc.tar /var (to add the /var contents into the /root/etc.tar file)
# tar -cvf mytar.tar / --xattrs (to archive the contents along with SELinux and ACL
permissions)
# du -h /root/etc.tar (to see the size of the tar compressed file)
5. What are the compressing & uncompressing tools available for tar and explain them?
Compressing Tools Uncompressing Tools
# gzip (.gz) # gunzip
# bzip2 (.bz2) # bunzip2
# xz (RHEL - 7) # unxz
# gzip <tar file name> (to compress the size of the tar file and the output file
is .tar.gz)
Page 69
RED-HAT LINUX 6/7
# gunzip < .gz compressed file name> (to uncompress the compressed tar file and the output
is .tar only)
# bzip2 <tar file name> (to compress the size of the tar file and the output
is .tar.bz2)
# bunzip2 < .bz2 compressed file name> (to uncompress the compressed file and the output
is .tar only)
6. What is scp, rsyncand how to use it?
scp means secure copy. ie., ssh + cp = scp which is used to copy the files/directories into remote
system.
scp will copy files/directories into remote system blindly ie., if the file already exits, it will over write
that file.
So, scp will take more time to copy when compared to # rsync tool.
# scp <file name><user name>@ <IP address of the remote system>:<location to be copied>
# scp anaconda* root@192.168.1.1:/root (to copy anaconda file into /root of the remote system)
# scp -r /etc/ root@192.168.1.1:/raju (to copy /etc/ directory into /raju of remote
system)
#scp -av /raju root@192.168.1.1:/root (to copy /raju into /root of the remote system)
# scp -r root@192.168.1.1 :/etc /home (to copy /etc of the remote system into /home of the
local
system)
rsync is also used to copy files/directories into remote systems. rsync tool will compare the new files
or directories and copy only the changed or modified contents of the files into remote system. So, it takes less
time to copy when compared to # scp tool.
# rsync -av root@192.168.1.1:/etc /home (to copy /etc directory changed contents into
/home)
rsync options are, -a -----> all (copy the file with all permissions except SELinux and ACL
permissions)
-aA -----> synchronize ACL permissions
-aAx ----> synchronize ACL and SELinux permissions also.
7. What is cpio and how to take a backup and restore using cpio?
cpio means copy input and output. It supports any size of the file system. It skips the bad blocks also.
Syntax of cpio with full options :
# ls <source file name> |cpio <options>><destination file name> (to take a backup of the source
directory and stored the backup into
destination directory)
The options are, -t -----> to list the cpio contents
-i -----> to restore the cpio backup
-v -----> to display on the screen ie., verbose
-o -----> to take a backup
Examples :
# ls | cpio -ov > /opt/root.cpio (to take a backup of root directory and stored
in /opt )
# cpio -iv < /opt/root.cpio (to restore the backup)
# ls /etc | cpio -ov > /opt/etc.cpio (to take a backup of the /etc directory and
stored in /opt)
# cd /etc (go to that /etc directory)
# rm -rf * (to remove all the contents from /etc)
# cpio -iv < /opt/etc.cpio (to restore the /etc contents from the cpio
backup)
8. What is dd and how to take a backup and restore using dd?
dd means disk to disk backup. Using dd command we can take a backup of the data from one
disk to another disk. It copies the data in byte to byte. It can take a backup of the disk including bad blocks.
# dd if = <disk 1> of = <disk 2> (to take a backup from disk 1 and stores in disk
2)
# dd if = /dev/zero of = /root/raju bs = 1M count = 2048 (to create an empty file with
2GB size)
Page 70
RED-HAT LINUX 6/7
Page 71
RED-HAT LINUX 6/7
Taking a backup from the last full backup or last incremental backup
Differential backup :
Taking a backup from last full backup or last cumulative or differential backup
12. Which file will update when backing up with dump command?
/etc/dumpdates file will be updated when backing up with dump command.
13. What are the dump devices?
(i) Tape drives
(ii) Disks (local disks)
(iii) Luns (network disks)
14. What is snap shot?
(i) The point - in - time copy of the file system is called the snap shot.
(ii) It provides online backup solution of the file system.
(iii) We can take a backup while the file system is mounted and it is in multi-user mode.
(iv) It occupied only as much disk space as the file system ie., being captured.
(v) We can also create backup, delete, query temporary (read-only) snap shots using fssnap
command.
15. What are the differences between tar and cpio commands?
(i) By tar we can take backup upto 80GB size of file systems , but using cpio there is no limit.
(ii) In tar the backup is in archive format ie., in compressed state, but in cpio there is no
compression.
(iii) In both the types only the whole backup is possible.
16. How to take a backup on production servers?
(i) Normally in backup environment we have 3 servers.
(a) Master server (production servers -- 1 or 2 no's).
(b) Media server (backup server -- 1 or 2 no's).
(c) Client server (Normal system)
(ii) Backups can be taken in types.
(a) Application Backup (Normally application users will take these types of backups)
(b) File system Backup (O/S backup, System Administrators will take these types of
backups)
(c) Database Backup (DBA users will take these types of backups)
(iii) Normally backup is automated through some backup tools like Veritas Net backup, IBM Tivoli and
Autosys.
(iv) Using cron tool also we can take backup. But cron will not inform the failed backup. The other
tools will inform by sending messages like why the backup is failed, when and where it is failed, ..etc.,
(v) On production servers the backup will follow the procedure,
(a) Master server deport from production.
(b) Import the master server on Media server.
(c) Then Master server will join with the Media server.
(d) Sync the data with the Master server.
(e) Take a backup from Master server and store the copy on Media server.
(f) Split the Master server from Media server.
(g) Deport the Master server from Media server.
(h) Import the Master server on production.
(i) Join the Master server with production.
17. What is your company's backup policy?
(i) By dump command we can take backups on disks, tapes and takes full, incremental and
differential or cumulative backups.
(ii) level 0 -- Full backup (monthly once)
level 3 -- Performed on every Monday (Incremental from last full or last
incremental backup)
level 4 -- Performed on every Tuesday (Incremental from last level 3
backup)
level 5 -- Performed on every Wednesday (Incremental from last level 4 backup)
level 6 -- Performed on every Thursday (Incremental from last level 5 backup)
level 7 -- Performed on every Friday (Incremental from last level 6
backup)
Page 72
RED-HAT LINUX 6/7
(c) # service command is used to start or stop the (c) # systemctl is the command to start or stop
services temporarily and # chkconfig is used the services temporarily or next booting
to start or stop the services at next booting time. time.
Page 73
RED-HAT LINUX 6/7
Initd systemd
(a) It is the starting process in RHEL - 4, 5 and 6. (a) It is starting process in RHEL - 7.
(c) It will take more time to the system and (c) It will take less time to start the system and
services. services when compared to RHEL - 6.
(d) It will start the services one by one. (d) It will start the services parallel not one by one.
adjustable niceness)
# renice (to alter the scheduling priority of one or more running processes)
# pgrep (to list the process id's which matches with the pgrep argument)
Page 74
RED-HAT LINUX 6/7
RHEL - 6 commands :
# service <service name> status (to check the status of the service)
# service <service name> start (to start the service)
# service <service name> stop (to stop the service)
# service <service name> reload (to reload the service)
# service <service name> restart (to restart the service)
* These above commands will change the service statuses temporarily. So if we want to change
statuses of the
process automatically from next boot onwards we have to enable those services as given below.
# chkconfig --list (to check the availability of the services in
different run levels)
# chkconfig --list <service name> (to check the availability of the service in
different run levels)
# chkconfig <service name> on (to make the service available after restart)
# chkconfig <service name> off (to make the service unavailable after next boot)
# chkconfig --level <1-6><service name><on/off> (to make the service available or unavailable on
the
particular run level)
# chkconfig --level 5 vsftpd on (to make the vsftpd service available on run level 5)
# chkconfig --level 345 vsftpd on (to make the vsftpd service available on run levels 3, 4
and 5)
RHEL - 7 commands :
# systemctl status <service name> (to check the status of the service)
# systemctl start <service name> (to start the service)
# systemctl stop <service name>(to stop the service)
# systemctl reload <service name> (to reload the service)
# systemctl restart <service name> (to restart the service)
* These above commands will change the service statuses temporarily. So if we want to change
statuses of the
process automatically from next boot onwards we have to enable those services as given below.
# systemctl enable <service name> (to make the service available at next boot)
# systemctl disable <service name> (to make the service unavailable at next boot)
# grep <string name><file name> (to display the specified string in that file)
# grep -n <string name><file name> (to display the string with line no's)
# grep -e <string name 1> -e <string 2><file name> (to display 2 or multiple strings in that
file)
# grep -o <string name><file name> (to display only that string in that file not whole the text
of that file)
# grep -v <string name><file name> (to display all the strings except the specified one)
# grep ^ this coss (to display the line which is starting with the
specified string)
Page 75
RED-HAT LINUX 6/7
Page 76
RED-HAT LINUX 6/7
is 1. Only after initd process gets started, the remaining processes are called by it, and hence it is
responsible for all the remaining processes in the system. The parent process is identified by PPID (parent
process ID).
4. What is child process?
A process which started or created by the parent process is called child process and it is identified by
PID.
Useful # ps commands :
# ps -a (it displays all the terminals processes information)
# ps -au (it displays all the terminals processes information with
user names)
# ps -aux (it displays all the terminals processes information
including background
processes with user names)
* ? (question mark) if it is appeared at tty column, it indicates that is a background process.
# ps -ef (it displays the total processes information with parent
process ID (PPID))
# ps -P <process id> (it displays the process name if we know the process ID (pid))
# pidof<process name> (to see the process ID of the specified process)
# pidof initd (to see the process ID of the initd process)
# pstree (to display the parent and child processes structure in tree
format)
# ps -u <user name> (to display all the processes of the specified user)
# ps -u raju (to display all the processes of the user raju)
# ps -G <group name> (to display all the processes that are running by a particular group)
# ps -o pid, comm, %mem, %cpu(to display process id, command, %memory and %cpu
utilization nothing
but filtering the output)
# ps -Ao pid, comm, %mem, %cpu (to display the same information as above but including
some more
information)
# ps -o pid, comm, %mem, %cpu |sort -k <no.> -r |head -n 10 (to display which process is
utilizingmore
memory or cpu in reverse order where -k means field, <no.> means field no. and -r reverse order)
# ps -o pid, comm, %mem, %cpu |sort -k 3 -r |head -n 10 (to display the process which
occupies more memory and cpu
utilization in reverse order)
# ps -aux |grep firefox (to check whether the firefox is
running or not)
# pgrep -U <user name> (to display all the process
ID's only for that user)
* To communicate with the processes # kill and # pkill commands are used.
# kill -----> It will kill the processes using PID's.
# pkill -----> It will kill the processes using process names.
* We can also give some signals while using the above commands and we get the signals information
by
# kill -l command. This command will list all the signals with no's and there are 64 signals to pass.
5. What is signal in Process management?
Signals are a way of sending simple messages to processes. Most of these messages are already
defined and however signals can only be processed when the process is in user mode. Every signal has a unique
signal name. Each signal name is a macro which stands for a positive integer. Signals can be generated by the
process itself or they can be sent from one process to another. A variety of signals can be generated or
delivered and they have many uses for programmers.
6. What are the important signals in process management?
1. SIGHUP -----> to reload (read the configuration and load)
2. SIGINT -----> to interrupt from the keyboard (nothing but Ctrl + c)
3. SIGQUIT -----> to quit the process from keyboard (nothing but Ctrl + l)
9. SIGKILL -----> to kill the process forcefully (nothing but unblockable)
Page 77
RED-HAT LINUX 6/7
15. SIGTERM -----> wait for completing the process and then terminate (terminate gracefully)
18. SIGCONT -----> to continue or resume the process if it is stopped
19. SIGSTOP -----> to terminate the process (If it is not stopped the process we cannot continue
or resume that process by Ctrl +
c or Ctrl + z)
20. SIGHTSTP ----> to stop the process (nothing but Ctrl + z)
* But the most commonly used signals are 1, 9, 15 and 20.
* The default signal is 15 (gracefully) when we not specified any signal.
# kill - <signal><process ID> (to kill the specified process using kill signal)
# kill -9 1291 (to kill the process which has the PID as 1291)
* If we not specified the signal no. then the default signal 15 will effect.
# kill 1291 (to kill the process 1291 with default signal)
# pkill -u <user name> (to kill all the processes of the specified user)
# pkill -u raju (to kill all the processes of the user raju)
# pkill -9 firefox (to kill the firefox process)
7. How many process states are there?
There are six process states and they are,
(i) Running process (the process which is in running state and is indicated by " r " ).
(ii) Sleeping process (the process which is in sleeping state and is indicated by " s " )
(iii) Waiting process (the process which is in waiting state and is indicated by " w " ).
(iv) Stopping process (the process which is in stopping state and is indicated by " T " ).
(v) Orphan process (the process which is running without parent process and is indicated by " o " ).
(vi) Zombie process (the process which is running without child process and is indicated by " Z " ).
8. What is Orphan process?
The processes which are running without parent processes are called Orphan processes. Sometimes
parent process closed without knowing the child processes. But the child processes are running at that time.
These child processes are called Orphan processes.
9. What is Zombie process?
When we start parent process, it will start some child processes. After some time the child processes
will died because of not knowing the parent processes. These parent processes (which are running without
child processes) are called Zambie processes. These are also called as defaunct processes.
10. How to set the priority for a process?
Processes priority means managing processor time. The processor or CPU will perform multiple tasks
at the same time. Sometimes we can have enough room to take on multiple projects and sometimes we can
only focus on one thing at a time. Other times something important pops up and we want to devote all of our
energy into solving that problem while putting less important tasks on the back burner.
In Linux we can set guidelines for the CPU to follow when it is looking at all the tasks it has to do.
These guidelines are called niceness or nice value. The Linux niceness scale goes from -20 to 19. The lower
the number the more priority that task gets. If the niceness value is higher number like 19 the task will be set
to the lowest priority and the CPU will process it whenever it gets a chance. The default nice value is 0 (zero).
By using this scale we can allocate our CPU resources more appropriately. Lower priority programs
that are not important can be set to a higher nice value, while the higher priority programs like deamons and
services can be set to receive more of the CPU's focus. We can even give a specific user a lower nice value for
all his/her processes so we can limit their ability to slow down the computer's core services.
There are two options to reduce/increase the value of a process. We can either do it using the nice
or renice commands.
Examples :
# nice -n <nice value range from -20 to 19><command> (to set a priority to a process before
starting it)
# nice -n 5 cat > raju (to set the medium priority to cat
command)
# ps -elf (to check the nice value for
that command)
* To reschedule the nice value of existing process, first check the PID of that process by # ps -elf
command
and then change the niceness of that command by # renice <nice value (-20 to 19)>< PID > command.
Page 78
RED-HAT LINUX 6/7
Page 79
RED-HAT LINUX 6/7
(i) First check which process and who executed that process is consuming more CPU utilization
or memory utilization by executing # top command.
(ii) Then inform to those users who executed that process though mail, message or raising the
ticket.
(iii) If those users are not available or not responding to our mail then we have to change the
priority of that process using # renice command.
(iv) Before changing the process priority level , we have to get or take approval from our team lead or
project manager.
13. How to check the wwn no. of lun?
(i) First install sysutils package to execute the commands to know the wwn number by
executing command,
# yum install sysutils -y
(ii) # systool -c fs_host -v |grep "port-name" (to check the wwn number)
14. How to remove the page caches and other caches?
# sysnc ; echo 2 > /proc/sys/vm/drop_caches (to remove the page caches)
# sysnc ; echo 3 > /proc/sys/vm/drop_caches (to remove all types of caches like dent
cache,
page caches and others)
15. What is "sosreport" and how to generate it?
Sosreport is a command in linux (RHEL / CentOS) which collects system configuration and
diagnostic information of your linux box like running kernel version, loaded modules, and system and
service configuration files. This command also runs external programs to collect further information, and
stores this output in the resulting archive.
Sosreport is required when you have open a case with redhat for technical support. Redhat support
Engineers will require sosreport of your server for troubleshooting purpose.
To run sosreport , sos package should be installed. Sos package is part of default installation in most
of linux. If for any reason this package is no installed , then use below yum command to install sos
package :
# yum install sos -y
Generate the sosreport :
Open the terminal and type sosreport command :
# sosreport
This command will normally complete within a few minutes. Depending on local configuration and
the options specified in some cases the command may take longer to finish. Once completed, sosreport
will generate a compressed a file under /tmp folder. Different versions use different compression schemes
(gz, bz2, or xz). The file should be provided to Redhat support representative (normally as an attachment
to an open case).
Note: sosreport requires root permissions to run.
Different Options used in sosreport command :
The sosreport command has a modular structure and allows the user to enable and disable modules
and specify module options via the command line. To list available modules (plug-ins) use the
following command:
# sosreport -l
To turn off a module include it in a comma-separated list of modules passed to the -n/–skip-
plugins option. For instance to disable both the kvmand amd modules:
# sosreport -n kvm,amd
Individual modules may provide additional options that may be specified via the -k option. For
example on Red Hat Enterprise Linux 5 installations the sos rpm module collects "rpm -Va" output by default.
As this may be time-consuming the behaviour may be disabled via:
# sosreport -k rpm.rpmva=off
16. What is the command to see the complete information on virtual memory?
# vmstat is the command to the complete information on virtual memory like no of processes,
memory usage, paging memory, block I/O (input /output), traps, disk and CPU activity.
# vmstat 2 10 (It will give the report for every 2 seconds upto 10 times)
The fields are, r -----> how many waiting processes
Page 80
RED-HAT LINUX 6/7
Page 81
RED-HAT LINUX 6/7
(iii) We can do start or stop the deamon, but we cannot start or stop the process. We only kill
the process.
(iv) We can enable or disable to start the deamons at boot time as per our requirement, ie., on
demand is possible, but it is not possible if is a process.
(v) Deamon is a background process where as process is a foreground process.
24. What is command to check the load average?
# uptime is the command to check the system load, present time, from how many hours the system
is running and load average.
* The load average shows three fields. The 1st field shows the load average from 1 minute, 2nd field
shows the load average from 5 minutes and 3rd field shows the load average from 15 minutes.
25. How to assign or shift the process to the particular CPU?
(i) First install util-linux package by # yum install util-linux -y command.
(ii) Check the specified process is assigned to which processor ie., which CPU by # taskset -p
<pid> command.
(iii) Then shift the process to another available CPU by # taskset -cp <cpu -list><pid> command.
Examples:
# taskset -p 2125 (to check which processor is assigned to that process ID)
# taskset -cp 0, 4 2125 (to shift the process to the CPUs 0 and 4)
# taskset 0 firefox (to assign the firefox process to the CPU 0)
26. How to limit the CPU usage of a linux process?
(a) First install the cpulimit package by # yum install cpulimit -y command.
* This package is not available in normal Linux packages and it is available in EPEL (Extra
Packages for Enterprise Linux). So, first we have to enable the EPEL repository in our
system by following steps.
(i) # yum install epel-release -y (to install the epel-release package in
RHEL - 7)
(ii) # rpm -Uvh http://mirrors.kernel.org/fedora-epel/6/i386/epel-release-6-8.noarch.rpm
(to install the
EPEL package in RHEL - 6)
(ii) # rpm -Uvh http://mirrors.kernel.org/fedora-epel/5/i386/epel-release-5-4.noarch.rpm
(to install the
EPEL package in RHEL - 5)
(iii) # rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-5 (to import the gpg key if it ask
when executing the above
command in RHEL - 5)
(iv) # rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-6 (to import the gpg key if it ask
when executing the
above command in RHEL - 6)
(v) # rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-7 (to import the gpg key if it ask
when executing the
above command in RHEL - 7)
(vi) # yum repolist (to check EPEL repolist)
(b) # cpulimit -p <PID> -l 10 (to see the CPU usage of that process and limit
the CPU usage to
10%)
(c) # cpulimit -e /usr/local/bin/myprog -l 20 (to limit the CPU usage of this command
to 20%)
27. How to capture the network traffic?
# tcpdump is the command to capture and analyze the network traffic. By using this command we
can also troubleshoot the network problems.
Examples :
# tcpdump (to capture and analyze the network traffic)
# tcpdump -i eth0 (to capture the network traffic from eth0 continuously and Ctrl +
c to exit)
# tcpdump -c 30 -i eth0 (to capture the network traffic from eth0 upto 30
packets only)
Page 82
RED-HAT LINUX 6/7
# tcpdump -w /root/tcp.pcap -i eth0 (to capture the network traffic from eth0 and
write that in
/root/tcp.pcap file)
# tcpdump -t t t -r /root/tcp.pcap (to read the contents of the above
captured file)
# tcpdump -i eth0 port 22 (to capture the network traffic from eth0 of
ssh traffic)
# tcpdump -i eth0 dst 172.25.0.11 and port 22 (to capture the network traffic from
172.25.0.11
system of ssh traffic)
28. What is SAR utility and how to use it?
SAR stands for System Activity Report. Using SAR we can check the information of CPU usage,
memory, swap, I/O, disk I/O, networking and paging. We can get the information of the present
status and post status (history using the data) upto last 7 days because HISTORY=7 is there in the
configuration file. The log messages are stored in /var/log/sa/sa1, /var/log/sa/sa2,
/var/log/sa/sa3, ....etc., (where 1, 2, 3, ....etc., are dates). The SAR configuration is stored in
/etc/sysconfig/sysstat file. In this file the HISTORY=7 default option will be there. So, we can
change the default 7 days to our required value.
Before using the SAR utility first we should install the SAR utility package by # yum install sysstat*
-y command.
Examples :
# sar 2 10 (It will give the system report for every 2 seconds upto
10 times)
# sar -p 2 10 (to see the CPU utilization for every 2 seconds upto
10 times)
# sar -p ALL -f /var/log/sa/sa25 (to check the CPU utilization on 25th day of the
current month)
# sar -p ALL -f /var/log/sa/sa10 -s 07:00:00 -e 15:00:00 (to check the CPU utilization on
10th day of the current month from 7:00 to 15:00 hrs. where -s means
start time -e end time)
# sar -r 2 10 (to see the memory utilization for every 2 seconds upto
10 times)
# sar -r -f /var/log/sa/sa14 (to check the memory utilization on 14th day of the
current month)
# sar -r -f /var/log/sa/sa10 -s 07:00:00 -e 15:00:00 (to check the memory utilization on
10th day of the current month from 7:00 to 15:00 hrs. where -s means
start time -e end time)
# sar -S 2 10 (to see the swap utilization for every 2 seconds upto
10 times)
# sar -S -f /var/log/sa/sa25 (to check the swap utilization on 25th day of the
current month)
# sar -S -f /var/log/sa/sa10 -s 07:00:00 -e 15:00:00 (to check the swap utilization on 10th
day of the current month from 7:00 to 15:00 hrs. where -s means
start time -e end time)
# sar -q 2 10 (to see the load average for every 2 seconds upto
10 times)
# sar -q -f /var/log/sa/sa14 (to check the load average on 14th day of the
current month)
# sar -q -f /var/log/sa/sa10 -s 07:00:00 -e 15:00:00 (to check the load average on 10th day
of the current month from 7:00 to 15:00 hrs. where -s means start
time -e end time)
# sar -B 2 10 (to see the paging information for every 2 seconds upto
10 times)
# sar -d 2 10 (to see the disk usage for every 2 seconds upto
10 times)
Page 83
RED-HAT LINUX 6/7
# sar -m 2 10 (to see the power management for every 2 seconds upto
10 times)
# sar -b 2 10 (to see the disk input and output statistics for every 2 seconds upto
10 times)
29. What are the port no. for different services?
The Port no. list :
FTP (For data transfer) 20 HTTP 80
FTP (For connection) 21 POP3 110
SSH 22 NTP 123
Telnet 23 LDAP 389
Send Mail or Postfix 25 Log Server 514
DNS 53 HTTPS 443
DHCP (For Server) 67 LDAPS (LDAP + SSL) 636
DHCP (For Client) 68 NFS 2049
TFTP (Trivial File transfer) 69 Squid 3128
Samba shared name verification 137 Samba Data Transfer 138
Samba Connection Establishment 138 Samba Authentication 445
MySQL 3306 ISCSI 3260
* Ping is not used any port number. It is used ICMP (Internet Control Message Protocol) only.
Other useful commands :
# uptime (to see from how long the system is running and also gives the load average report)
* The load average is having 3 fields. 1 - present status, 2 - 5 minutes back and 3 - 15 minutes
back.
# iostat 5 2 (to monitor the input and output statistics for every 5 seconds upto
10 times)
# nproc (to check how many processors (CPUs) are there in
the system)
# top 1 (to see the no. processors (CPUs) are there in
the system)
# iptraf (to monitor the TCP or network traffic statistics in graphical
mode)
* Before using this command install the iptraf package by # yum install iptraf* -y command.
# iftraf -ng -f eth0 (to see the IP traffic statistics in
graphical mode)
# lscpu (to see the no. of CPUs present in the
system)
# lsusb (to see the no. of USB devices present in the
system)
# lsblk (to see all the partitions or block devices
information)
# cat /etc/redhat-release (to see the RHEL
version of system)
# dmidecode (to see the complete hardware information of
the system)
# dmidecode -t memory (to see the memory
information of the system)
# dmidecode -t bios (to see the system's bios
information)
# dmidecode -t system (to see the system's
information)
Page 84
RED-HAT LINUX 6/7
Page 85
RED-HAT LINUX 6/7
Page 86
RED-HAT LINUX 6/7
Page 87
RED-HAT LINUX 6/7
If we upload or download any files the files owner and group are ftp only. We can change the
ownership of the uploaded or downloaded files as follows.
(i) Open the FTP configuration file by # vim /etc/vsftpd/vsftpd.conf command.
(ii) Go to line no : 48 and type as, chown_upload=yes
(iii) Go to line no : 49 and type as, chown_username=<user name>
(iv) We can display the banner when we connect the FTP server by uncomment on line no : 86 and
type as, ftp_banner=" Welcome to Hyderabad "
(v) We can limit the FTP maximum connections at a time to 5 by put an entry in configuration
file as,
max_clients=5 (save and exit the file)
(v) Restart the ftp deamon by # service vsftpd restart command in RHEL - 6 or
# systemctl restart vsftpd command in RHEL - 7.
13. How to deny specific users to access the ftp services?
(i) Open the FTP users file by # vim /etc/vsftpd/ftpusers command.
(ii) Enter the user names whom to deny FTP services. For example as follows,
root
raju
junnu (save and exit the file)
(iii) Restart the ftp deamon by # service vsftpd restart command in RHEL - 6 or
# systemctl restart vsftpd command in RHEL - 7.
14. What is LFTP and how to configure LFTP?
LFTP is also used to upload or download the files. But, by using LFTP we can login to the FTP
server without password because It will not ask any passwords. To use LFTP we have to install the LFTP
package on server.
(i) Install the LFTP package by # yum install lftp* -y command.
(ii) Restart the lftp deamon by # service lftpd restart command in RHEL - 6 or
# systemctl restart lftpd command in RHEL - 7.
(iii) Go to client system and access the LFTP server by,
# lftp 172.25.9.11 (to connect the LFTP server)
lftp> cd pub (to move to the pub directory)
lftp> get f1 (to download the f1 file)
lftp> mget f2 f3 f4 f5 (to download the f2 f3 f4 and f5 multiple files at a
time)
lftp> put f9 (to upload the f9 file)
lftp> mput f10 f11 f12 (to upload the f10 f11 f12 multiple files at a time)
lftp> quit (to quit the ftp server)
* In LFTP " Tab " key works as usual but in FTP " Tab " will not work.
15. How to allow the root user to access the FTP server?
By default root user is blocked to access the FTP server. To allow the root user to access the FTP
server follow the below steps.
(i) Open the /etc/vsftpd/user_list file by # vim /etc/vsftpd/user_list command.
(ii) Go to root user line and comment on that line. For example # root (save and
exit the file)
(iii) Open the /etc/vsftpd/ftpuser file by # vim /etc/vsftpd/ftpuser command.
(iv) Go to root user line and comment on that line. For example # root (save and
exit the file)
(v) Restart the ftp deamon by # service vsftpd restart command in RHEL - 6 or
# systemctl restart vsftpd command in RHEL - 7.
* Even though we changed the above, the root user cannot access the FTP server because the
home directory context is not added. we can solve this as follows.
(vi) # getsebool -a | grep ftp (to check the SELinux Boolean of the root home
directory)
(vii) # setsebool -p ftp_home_dir on (to change the Boolean of the root
home directory)
* Now go to client system and try to login the FTP server as root user. Here we can access the FTP
server.
16. What are the difference between FTP and LFTP servers?
Page 88
RED-HAT LINUX 6/7
(i)The user name and password are required to access the FTP server but LFTP does not requires
passwords.
(ii) In ftp>prompt the " Tab " key will not work but in lftp> prompt the " Tab " key will work
as usual.
Other useful FTP Commands :
# ftp 172.25.9.11 (to access the FTP server provide FTP user
name and password)
ftp > ls (to see all the files and directories in FTP root
directory)
ftp > !ls (to see the local nothing present working
directory files)
ftp > pwd (to see the FTP present working
directory)
ftp > !pwd (to see the local file system's present
working directory)
ftp > get <file name> (to download the specified file)
ftp > mget <file 1><file 2><file3> (to download multiple files at a time)
ftp > cd /var/ftp/pub/upload (to move to upload directory)
ftp > put <file name> (to upload the specified file into the FTP upload
directory)
ftp > lcd /root/Downloads (to change to the local /root/Download
directory)
ftp > help (to get the help about FTP commands)
ftp > bye or quit (to quit or exit from the FTP server)
# lftp 172.25.9.11 (to access the LFTP server without
asking any passwords)
Page 89
RED-HAT LINUX 6/7
Page 90
RED-HAT LINUX 6/7
The first field in /etc/auto.misc is the name of the /mnt subdirectory. This subdirectory is created
dynamically by automount. It should not actually exist on the client machine. The second field contains
mount options such asrw for read and write access. The third field is the location of the NFS export
including the hostname and directory.
The directory /mnt must be exits on the local file system. There should be no sub directories on the
local file system.
To start the autofs service, at a shell prompt, type the following command:
# servive autofs restart
To view the active mount points, type the following command at a shell prompt:
# service autofs status
If you modify the /etc/auto.master configuration file while autofs is running, you must tell the
automount daemon(s) to reload by typing the following command at a shell prompt:
# service autofs reload
7. How to configure NFS server?
(i) First install the NFS package by # yum install nfs* -y command.
(ii) Create the NFS shared directory on server system by # mkdir /public command.
(iii) Modify the permissions of the /public directory by # chmod 777 /public command. (These
permissions may be changed
depend on it's requirement)
(iv) Modify the SELinux context of the /public directory if SELinux is enabled by executing the below
command. # chcon -t public_content_t /public
(v) create some files in the /public directory by # touch f{1..10} command.
(vi) Open the file NFS configuration file and put an entry of the NFS shared information by # vim
/etc/exports command and type as an entry like <shared directory name><to whom to export the
shared directory> (<permissions>, sync)
For example,
# vim /etc/exports
/public *.example.com (ro/rw, sync) (save
and exit the file)
* Where *.example.com means the shared directory can be exported to all the systems of
the example.com domain.
* Permissions like ro (read only) or rw (read & write) and sync means the data will
always be synced.
/public desktop9.example.com (rw, sync) (to export the /public to desktop 5
system only)
/public *.example.com (ro, sync) (export to the entire example.com domain
with read only)
/public 172.25.0.0/24 (rw, sync) (export to 172.25.0.0 network only with
read and write)
/public server [ 0 - 20 ].example.com (rw, sync) (export to server0 to server20
in example.com
domain with read and write)
/public 172.25.0.10 (rw, sync) (export to 172.25.0.10 network only
with read and write)
Common Mount permission options :
rw read/write permissions
ro read-only permissions
Page 91
RED-HAT LINUX 6/7
(vii) Export the above shared directory to the defined client systems by # exportfs -rv command.
(viii) Restart the NFS services by following the commands in RHEL - 6 and RHEL - 7.
# service rpcbind restart (to restart the rpcbind service
in RHEL - 6)
# service nfs restart (to restart the
NFS service in RHEL - 6)
# systemctl restart nfs-server (to restart the NFS service
in RHEL - 7)
(ix) Make the NFS service permanently boot at next boot time onwards as follows.
# chkconfig rpcbind on (to on the rpcbind service
in RHEL - 6)
# chkconfig nfs on (to on the nfs
service in RHEL - 6)
# systemctl enable nfs-server (to enable the
nfs-server in RHEL - 7)
(x) Export the NFS shared directory as follows.
# exportfs -rv
(xi) Enable the NFS service to the IP tables and Firewall in RHEL - 6 and RHEL - 7 as follows.
In RHEL - 6 :
(i) # setup
(a) Select Firewall Configuration.
(b) Select Customize ( Make sure firewall option remain selected ).
(c) Select NFS4 ( by pressing spacebar once ).
(d) Select Forward and press Enter.
(e) Select eth0 and Select Close button and press Enter.
(f) Select ok and press Enter.
(g) Select Yes and press Enter.
(h) Select Quit and press Enter.
(ii) Now open/etc/sysconfig/iptables file and add the following rules under the rule for port
2049 and save file.
-A INPUT -m state --state NEW -m udp -p udp --dport 111 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 111 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 32803 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 32769 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 892 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 892 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 875 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 875 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 662 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 662 -j ACCEPT
(iii) Restart the IP tables service by # service iptables restart command.
(iv) Make the IP tables service as permanent from next boot onwards as follows.
# chkconfig iptables on
The following commands could be helpful for troubleshooting :
In RHEL - 7 :
# firewall-cmd --permanent -add-service=nfs (to enable the nfs
service at firewall)
# firewall-cmd --permanent -add-service=mountd (to enable
the mountd service at firewall)
Page 92
RED-HAT LINUX 6/7
Page 93
RED-HAT LINUX 6/7
So, to overcome the above problems normally indirect or automount is used using Autofs tool.
12. What is secure NFS server and explain it?
Secure NFS server means NFS server with Kerberos security. It is used to protect the NFS exports.
Kerbebors is a authentication tool to protect the NFS server shares. It uses the krb5p method to protect by
authentication mechanism and encrypt the data while communication.
For this one key file is required and this should be stored in each and every client which are accessing
the nfs secure directory. Then only Kerberos security will be available. This key file should be stored in
/etc/krb5.keytab file. For example the following command will download and store the keytab.
# wget http://classroom.example.com/pub/keytabs/server9.keytab -O /etc/krb5.keytab (where O
is capital)
13. How to configure the secure NFS server?
(i) Install the NFS package.
# yum install nfs* -y
(ii) Create a directory to share through NFS server.
# mkdir /securenfs
(iii) Modify the permissions of shared directory.
# chmod 777 /securenfs
(iv)Change the SELinux context of the directory if the SELinux is enabled.
# chcon -t public_content_t /securenfs
(v) Open the NFS configuration file and put an entry of the shared directory.
# vim /etc/exports
/securenfs *.example.com(rw,sec=krb5p)
(save and exit the file)
(vi)Download the keytab and store it in /etc/krb5.keytb file.
# wget http://classroom.example.com/pub/keytabs/server9.keytab -O
/etc/krb5.keytab
(vii)Export the shared the directory.
# exportfs -rv
(viii) Restart and enable the NFS services in RHEL - 6 and RHEL - 7.
# service nfs restart (restart the NFS
service in RHEL - 6)
# service nfs-secure-server restart (restart the secure NFS service in
RHEL - 6)
# chkconfig nfs on (enable the NFS
service in RHEL - 6)
# systemctl restart nfs-server (restart
the NFS service in RHEL - 7)
# systemctl restart nfs-secure-server (restart the secure
NFS service in RHEL - 7)
(ix) Enable the IPtables or firewall to allow NFS servicein RHEL - 6 and RHEL - 7 as follows.
In RHEL - 6 :
(i) # setup
(a) Select Firewall Configuration.
(b) Select Customize ( Make sure firewall option remain selected ).
(c) Select NFS4 ( by pressing spacebar once ).
(d) Select Forward and press Enter.
(e) Select eth0 and Select Close button and press Enter.
(f) Select ok and press Enter.
(g) Select Yes and press Enter.
(h) Select Quit and press Enter.
(ii) Now open /etc/sysconfig/iptables file and add the following rules under the rule for
port 2049 and save file.
-A INPUT -m state --state NEW -m udp -p udp --dport 111 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 111 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 32803 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 32769 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 892 -j ACCEPT
Page 94
RED-HAT LINUX 6/7
16. How to add the LDAP user shared directory and how the LDAP user access that directory on client?
(i) Create a sub-directory in /securenfs directory.
# mkdir /securenfs/secure
(ii) Change the ownership of the above sub directory to LDAP user.
# chown ldapuser9 /securenfs/secure
(iii) Assign the full permissions on that directory to LDAP user.
# setfacl -m u : ldapuser9 : rwx /securenfs/secure
(iv) Change the SELinux context of that directory if SELinux is enabled.
Page 95
RED-HAT LINUX 6/7
Page 96
RED-HAT LINUX 6/7
Page 97
RED-HAT LINUX 6/7
Page 98
RED-HAT LINUX 6/7
* The LDAP packages are different in RHEL - 6 and RHEL - 7 but, the configuration of LDAP
is same in both the versions.
(ii) Create the LDAP users and passwords in the LDAP server.
(iii) Configure the LDAP user's authentication by # system_config_authentication command in
graphical user interface.
(iv) The above command will display the configuration window and in that select and type the option
as below.
User Account Database = LDAP
LDAP search base on = dc=example, dc=com
LDAP server = ldap://classroom.example.com/
Enable TLS to encrypt = Click on Download CA Certificate button and then
enter the url as,
http://classroom.example.com:/pub/example-ca.crt
Authentication Method = LDAP Password (then click on
Apply button)
(v) Check whether the LDAP user is configured or not by # getent password ldapuser9
command.
29. How to mount the LDAP user's home directory automatically when demand using Autofs tool?
(i) Install the autofs package by # yum install autofs* -y command.
(ii) Open the /etc/auto.master file by # vim /etc/auto.master command and type as below.
/home/guests /etc/auto.misc
(save and exit this file)
(iii) Open the /etc/auto.misc file by # vim /etc/auto.misc command and type as below.
ldapuesr9 -rw classrrom.example.com:/home/guests/ldapuser9 (save and
exit this file)
(iv) Restart the autofs services.
# service autofs restart (restart the autofs service in RHEL - 6)
# chkconfig autofs on (enable the autofs service at
next boot in RHEL - 6)
# systemctl restart autofs (restart the autofs service in
RHEL - 7)
# systemctl enable autofs (enable the autofs service at
next boot in RHEL - 7)
Page 99
RED-HAT LINUX 6/7
Page 100
RED-HAT LINUX 6/7
Page 101
RED-HAT LINUX 6/7
Page 102
RED-HAT LINUX 6/7
Page 103
RED-HAT LINUX 6/7
Page 104
RED-HAT LINUX 6/7
Page 105
RED-HAT LINUX 6/7
example.com is .com, so the DNS server queries the Internet Registration Authority to find who
is responsible for example.com.
(iii) The Internet Registration Authority responds to the ISP by answering the query.
(iv) Once the ISP DNS Server knows the authoritative name servers, it contacts the authoritative name
servers to find out the IP address for www.example.com i.e. the IP address of host www in
the domain example.com. (v) example.com responds to the ISP DNS Server by answering the query and
providing the IP address of the web server i.e. www
(vi) The ISP DNS Server stores the answer in it's cache for future use and answers to the client by
sending the IP address of the www server.
(vii) The client may store the answer to the DNS query in it's own cache for future use. Then the client
communicates directly with the www server of domain example.com using the IP
address.
(viii) The www server responds by sending the index.html page.
3. What is the format of the domain name?
Like a physical address, internet domain names are hierarchical way. If the Fully Qualified Domain
Name is www.google.co.in , the www is the Hostname, google is the Domain, co is the Second Level
Domain and in is the Top Level Domain.
4. What are the files we have to edit to configure the DNS?
There are four files to edit to configure the DNS. They are /etc/named.conf,
/etc/named.rfc1912.zones, Forward Lookup Zoneand Reverse Lookup Zone. DNS provides a
centralised database for resolution. Zone
is storage databasewhich contains all the records.
Forward Lookup Zone is used to resolveHostnames to IP addresses.
Reverse Lookup Zone is used to resolve IP addresses to Hostnames.
5. What are the DNS record and explain them?
(i) SOA Record : (Start of Authority)
SOA contains the general administration and control information about the domain.
(ii) Host A Record :
(a) It is nothing but aForward Lookup Zone.
(b) It maps Hostname to IP address.
(iii) PTR : (Pointer Record)
(a) It is nothing but a Reverse Lookup Zone.
(b) It maps IP address to Hostname.
(iv) NS Record : (Name Server Record)
It stores the DNS server IP addresses.
(v) MX Record : (Mail Exchange Record)
It stores the records of the Mail Server IP address.
(vi) CNME Record :
It is nothing but Host's Canonical name allows additional names or aliases to be used
locate a system.
6. What is the profile of the DNS?
Package : bind and caching-name
Script : /etc/init.d/named
Configuration file : /etc/named.conf and /etc/named.rfc1912.zones
Client's configuration file : /etc/resolve.conf
Document root : /var/named/
Log file : /var/log/messages
Deamon : named
Port number : 53
7. How to configure the DNS server?
(i) Install the packages bind, caching-name for RHEL - 6 &bind, cashing-name and unbound
for RHEL - 7.
# yum install bind* caching-name* -y (to install the DNS packages
for RHEL - 6)
# yum install bind* caching-name* unbound* -y (to install the DNS
packages for RHEL - 7)
Page 106
RED-HAT LINUX 6/7
(ii) Change the hostname by adding fully qualified domain name and make it permanent.
# hostname <fully qualified domain name> (to change the
hostname in RHEL - 6)
# hostname server9.example.com (example for setting hostname temporarily in
RHEL - 6)
# hostnamectl set <fully qualified domain name> (to change the hostname in
RHEL - 7)
# hostnamectl set server9.example.com (example for setting hostname temporarily in
RHEL - 7)
# vim /etc/hosts (open this file and go to last line and type as below in
RHEL - 6 only)
<IP address> <fully qualified domain name> <hostname>
172.25.9.11 server9.example.com server9 (for example of the
above syntax)
# vim /etc/sysconfig/network (open this file and go to last line and type as below in
RHEL - 6 only)
HOSTNAME=<fully qualified domain name>
HOSTNAME=server9.example.com (for example of the above
syntax)
(ii) Open the DNS main configuration file by # vim /etc/named.conf command.
* Go to line number 11 and edit this line as below.
listen-on port 53 { 127.0.0.1; <server IP address>; };
Example : listen-on port 53 {127.0.0.1; 172.25.9.11; };
* Go to line number 17 and edit this line as below.
allow-query { localhost; <Network ID>/<netmask>; };
Example : allow-query {localhost; 172.25.9.0/24; };
(save and exit this file)
(iii) Open the DNS zone reference file by # vim /etc/named.rfc1912.zones command
* Go to line number 19 and copy 5 lines and paste them at last of the file.
zone "<domain name>" IN {
type-master;
file "<forward lookup zone file name>";
allow-update { none; };
};
Example : zone "example.com" IN {
type-master;
file "named.forward";
allow-update { none; };
};
* Go to line number 31 and copy 5 lines and paste them at last of the file.
zone "<Three octets of the DNS server IP address> . in . addr . arpa" IN {
type-master;
file "<reverse lookup zone file name>";
allow-update { none; };
};
Example : zone "9.25.172 . in . addr . arpa" IN {
type-master;
file "named.reverse";
allow-update { none; };
};
(save and exit this file)
(iv) Copy /var/named/named.localhost file to /var/named/named.forward and edit as follows.
# cp -p /var/named/named.localhost /var/named/named.forward
# vim /var/named/named.forward
* Go to line number 2 and edit as follows.
@ IN SOA <DNS server fully qualified domain name> . com root . <domain
name> . {
Page 107
RED-HAT LINUX 6/7
Page 108
RED-HAT LINUX 6/7
Page 109
RED-HAT LINUX 6/7
Page 110
RED-HAT LINUX 6/7
# nslookup 172.25.9.10
9. How to configure the Secondary DNS server?
(i) Install the packages bind, caching-name for RHEL - 6 &bind, cashing-name and unbound
for RHEL - 7.
# yum install bind* caching-name* -y (to install the DNS packages
for RHEL - 6)
# yum install bind* caching-name* unbound* -y (to install the DNS
packages for RHEL - 7)
(ii) Change the hostname by adding fully qualified domain name and make it permanent.
# hostname <fully qualified domain name> (to change the
hostname in RHEL - 6)
# hostname server6.example.com (example for setting hostname temporarily in
RHEL - 6)
# hostnamectl set <fully qualified domain name> (to change the hostname in
RHEL - 7)
# hostnamectl set server6.example.com (example for setting hostname temporarily in
RHEL - 7)
# vim /etc/hosts (open this file and go to last line and type as below in
RHEL - 6 only)
<IP address> <fully qualified domain name> <hostname>
172.25.6.11 server6.example.com server6 (for example of the
above syntax)
# vim /etc/sysconfig/network (open this file and go to last line and type as below in
RHEL - 6 only)
HOSTNAME=<fully qualified domain name>
HOSTNAME=server6.example.com (for example of the above
syntax)
(ii) Open the DNS main configuration file by # vim /etc/named.conf command.
* Go to line number 11 and edit this line as below.
listen-on port 53 { 127.0.0.1; <server IP address>; };
Example : listen-on port 53 {127.0.0.1; 172.25.6.11; };
* Go to line number 17 and edit this line as below.
allow-query { localhost; <Network ID>/<netmask>; };
Example : allow-query {localhost; 172.25.6.0/24; };
(save and exit this file)
(iii) Open the DNS zone reference file by # vim /etc/named.rfc1912.zones command
* Go to line number 19 and copy 5 lines and paste them at last of the file.
zone "<domain name>" IN {
type-slave;
file "slaves/<forward lookup zone file name>";
master { <Primary DNS server IP address; };
};
Example : zone "example.com" IN {
type-slave;
file "slaves/named.forward";
master { 172.25.9.11; };
};
* Go to line number 31 and copy 5 lines and paste them at last of the file.
zone "<Three octets of the DNS server IP address> . in . addr . arpa" IN {
type-slave;
file "slaves/<reverse lookup zone file name>";
master { <Primary DNS server IP address; };
};
Example : zone "9.25.172 . in . addr . arpa" IN {
type-slave;
file "slaves/named.reverse";
master { 172.25.9.11; };
Page 111
RED-HAT LINUX 6/7
};
(save and exit this file)
(iv) Copy /var/named/slaves/named.localhost to /var/named/slaves/named.forward and edit as
follows.
# mkdir /var/named/slaves
# cp -p /var/named/slaves/named.localhost /var/named/slaves/named.forward
# vim /var/named/slaves/named.forward
* Go to line number 2 and edit as follows.
@ IN SOA <secondary DNS server fully qualified domain name> . com
root . <domain name> . {
* Go to line number 8 and edit as follows.
NS <DNS server fully qualified domain name> .
A <DNS server IP address>
<secondary DNS server fully qualified domain name> IN A <secondary DNS server
IP address>
<DNS server fully qualified domain name> IN A <DNS server IP address>
<Client 1 fully qualified domain name> IN A <Client 1 IP address>
<Client 2 fully qualified domain name> IN A <Client 2 IP address>
<Client 3 fully qualified domain name> IN A <Client 3 IP address>
www IN CNAME <DNS server fully qualified domain name>
Example : The line number 2 should be edited as follows.
@ IN SOA server6.example.com. root.example.com. {
The line number 8 should be edited as follows.
NS server6.example.com.
A 172.25.6.11
server6.example.com. IN A 172.25.6.11
server9.example.com. IN A 172.25.9.11
client9.example.com. IN A 172.25.9.10
client10.example.com. IN A 172.25.9.12
client11.example.com. IN A 172.25.9.13
www IN CNAME server6.example.com. (save and
exit this file)
(v) Copy /var/named/slaves/named.empty file to /var/named/slaves/named.reverse and edit
as follows.
# cp -p /var/named/slaves/named.empty /var/named/slaves/named.reverse
# vim /var/named/slaves/named.reverse
* Go to line number 2 and edit as follows.
@ IN SOA <secondary DNS server fully qualified domain name> . com
root . <domain name> . {
* Go to line number 8 and edit as follows.
NS <secondary DNS server fully qualified domain name> .
<Last octet of the secondary DNS server IP address> IN PTR <secondary DNS server
fully qualified
domain name>
<Last octet of the DNS server IP address> IN PTR <DNS server fully qualified domain
name>
<Last octet of the Client 1 IP address> IN PTR <Client 1 fully qualified domain
name>
<Last octet of the Client 2 IP address> IN PTR <Client 2 fully qualified domain
name>
<Last octet of the Client 3 IP address> IN PTR <Client 3 fully qualified domain
name>
<secondary DNS server fully qualified domain name> IN A <secondary DNS server
IP address>
www IN CNAME <secondary DNS server fully qualified domain name>
Example : The line number 2 should be edited as follows.
@ IN SOA server6.example.com. root.example.com. {
Page 112
RED-HAT LINUX 6/7
Page 113
RED-HAT LINUX 6/7
Page 114
RED-HAT LINUX 6/7
Page 115
RED-HAT LINUX 6/7
}
Example :
subnet 172.25.0.0 netmask 255.255.255.0 {
range 172.25.9.50 172.25.9.100;
default-lease-time 600;
max-lease-time 7200;
}
* Go to line number 51 and edit that as below.
option routes <DHCP server IP address>;
option broadcast-address <DHCP server broadcast address>;
Example :
option routes 172.25.9.11;
option broadcast-address 172.25.9.255; (save and
exit this file)
(v) Restart the DHCP services in RHEL - 6 and RHEL - 7.
# service dhcpd restart (to restart the DHCP service
in RHEL - 6)
# chkconfig dhcpd on (to enable the DHCP service at next
boot in RHEL - 6)
# systemctl restart dhcpd (to restart the DHCP
service in RHEL - 7)
# systemctl enable dhcpd (to enable the DHCP service at next
boot in RHEL - 7)
(vi) Add the DHCP service to the IP tables and Firewall.
In RHEL - 6:
# iptables -A INPUT -p udp -i eth0 --deport 67 -j ACCEPT
# iptables -A INPUT -p tcp -i eth0 --deport 67 -j ACCEPT
# iptables -A INPUT -p udp -i eth0 --deport 68 -j ACCEPT
# iptables -A INPUT -p tcp -i eth0 --deport 68 -j ACCEPT
# iptables -A OUTPUT -p udp -i eth0 --deport 67 -j ACCEPT
# iptables -A OUTPUT -p tcp -i eth0 --deport 67 -j ACCEPT
# iptables -A OUTPUT -p udp -i eth0 --deport 68 -j ACCEPT
# iptables -A OUTPUT -p tcp -i eth0 --deport 68 -j ACCEPT
In RHEL - 7 :
# firewall-cmd --permanent --add-service=dhcp
# firewall-cmd --complete-reload
(vii) # cat /var/lib/dhcpd/dhcpd.lease (to see the DHCP lease message database on
DHCP server)
6. How to configure the DHCP client?
(i) Change the IP addressing from static to dynamic if it is configured as static.
In RHEL - 6 :
# setup
Network Configuration -----> Press Enter -----> Device Configuration -----> Select
eth0 ----->
Press Enter -----> Select Use DHCP -----> Press Spacebar -----> OK -----> Save -----
>Save & Quit
-----> Quit
# service NetworkManager restart
# service network restart
In RHEL - 7:
# nmcli connection modify "System eth0" ipv4.method auto or dynamic
# nmcli connection down "System eth0"
# nmcli connection up "System eth0"
# systemctl restart network
(ii) Open /etc/sysconfig/network-scripts/ifcfg-eth0 file and edit the BOOTPROTO line.
# vim /etc/sysconfig/network-scripts/ifcfg-eth0
* Go to BOOTPROTO line and edit that line as below.
Page 116
RED-HAT LINUX 6/7
BOOTPROTO=dhcp
(save and exit this file)
(iii) Get the IP address from the DHCP server.
# dhclient
# ifdown eth0
# ifup eth0
7. How to fix the IP address to the client every time it requests or how to configure the MAC
binding?
The process of assigning the same IP address (fixed IP address) to the DHCP client every time it
booted is called "MAC binding".
(i) Open the file /etc/dhcp/dhcpd.conf by # vim /etc/dhcp/dhcpd.conf command.
* Go to line number 76 and 77 and edit those lines as below.
host <dhcp client hostname> {
hardware ethernet <MAC address of the Client's NIC card>;
fixed addresses <IP address>;
}
Example :
host client 1 {
hardware ethernet 2015:ac18::55;
fixed addresses 172.25.9.150;
}
(save and exit this file)
(ii) Restart the DHCP services in RHEL - 6 and RHEL - 7.
# service dhcpd restart (to restart the DHCP service
in RHEL - 6)
# chkconfig dhcpd on (to enable the DHCP service at next
boot in RHEL - 6)
# systemctl restart dhcpd (to restart the DHCP service
in RHEL - 7)
# systemctl enable dhcpd (to enable the DHCP service at next boot in
RHEL - 7)
* Then the above MAC address of the system will get the same IP address every time it booted.
Page 117
RED-HAT LINUX 6/7
(ii) A DNS (Domain Naming Server) translates the domain name the user has entered into its
IP address, a numeric combination that represents the site's true address on the internet.
(iii) The browser now determines which protocol (rules and regulation which the client machine used
to communicate with servers) should be used. For example FTP (File Transfer
Protocol) and HTTP (Hyper Text Transfer Protocol).
(iv) The server sends a GET request to the Web Server to retrieve the address it has been given. For
example when a user types http://www.example.com/Myphoto.jpg , the browser sends a
GET Myphoto.jpg command to example.com server and waits for a response. The
server now responds to the browser's requests. It verifies that the given address exist, finds
the necessary files, runs the appropriate scripts, exchanges cookies if necessary and returns
the results back to the browser. If it cannot locate the file, the server sends an error message to
the client.
(v) Then the browser translates the data it has been given into HTML and displays the results to
the user.
4. In how many ways can we host the websites?
IP based Web Hosting :
IP based web hosting is usedIP address or hostname web hosting.
Name based Web Hosting :
Hosting the multiple websites using single IP address.
Port based Web Hosting :
Web hosting using another port number ie., other than the default port number.
User based Web Hosting :
We can host the Web sites using the user name and password.
Page 118
RED-HAT LINUX 6/7
<Directory "/var/www/html">
AllowOverride none
Require All Granted
</Directory>
(save and exit this file)
Example :
# vim /etc/httpd/conf.d/ip.conf (create the
configuration file)
<VirtualHost 172.25.9.11:80>
ServerAdmin root@server9.example.com
ServerName server9.example.com
DocumentRoot /var/www/html
</VirtualHost>
<Directory "/var/www/html">
AllowOverride none
Require All Granted
</Directory>
(h) Go to document root directory and create the index.html file.
# cd /var/www/html
# vim index.html
<html>
<H1>
This is IP based Web Hosting
</H1>
</html>
(save and exit this file)
(i) Restart the web server deamon.
# service httpd start (to start the webserver
deamon in RHEL - 6)
# chkconfig httpd on (to enable the service at
next boot in RHEL - 6)
# systemctl restart httpd (to start the webserver deamon in
RHEL - 7)
Page 119
RED-HAT LINUX 6/7
<Directory "/var/www/virtual">
AllowOverride none
Require All Granted
</Directory>
(save and exit this file)
Example :
# vim /etc/httpd/conf.d/virtual.conf (create
the configuration file)
<VirtualHost 172.25.9.11:80>
ServerAdmin root@server9.example.com
ServerName www9.example.com
DocumentRoot /var/www/virtual
</VirtualHost>
<Directory "/var/www/virtual">
AllowOverride none
Require All Granted
</Directory>
(d) Go to named based virtual directory and create the index.html file.
# cd /var/www/virtual
# vim index.html
<html>
<H1>
This is Name based Web Hosting
</H1>
</html>
(save and exit this file)
Page 120
RED-HAT LINUX 6/7
<Directory "/var/www/port">
AllowOverride none
Require All Granted
</Directory>
(save and exit this file)
Example :
# vim /etc/httpd/conf.d/virtual.conf (create
the configuration file)
<VirtualHost 172.25.9.11:8999>
ServerAdmin root@server9.example.com
ServerName port9.example.com
DocumentRoot /var/www/port
</VirtualHost>
<Directory "/var/www/port">
AllowOverride none
Require All Granted
</Directory>
(d) Go to port based virtual directory and create the index.html file.
# cd /var/www/port
Page 121
RED-HAT LINUX 6/7
# vim index.html
<html>
<H1>
This is Port based Web Hosting
</H1>
</html>
(save and exit this file)
(e) Generally port based web hosting requires DNS server. So, we can solve this problem by the
following way.
For that open the /etc/hosts file enter the server name and IP addresses on both
server and client.
# vim /etc/hosts
172.25.9.11 port5.example.com
(save and exit this file)
(f) By default the web server runs on port number 80. If we want to configure on deferent port
number, we have to add the port number in the main configuration file.
# vim /etc/httpd/conf/httpd.conf
* Go to Listen : 80 line and open new line below this line and type as,
Listen : 8999
(save and exit this file)
(g) By default SELinux will allow 80 and 8080 port numbers only for webserver. If we use
different port numbers other than 80 or 8080 then execute the following command.
# semanage port -a -t http_port_t -p tcp 8999
(h) Restart the web server deamon.
# service httpd start (to start the webserver
deamon in RHEL - 6)
# chkconfig httpd on (to enable the service at
next boot in RHEL - 6)
# systemctl restart httpd (to start the webserver deamon in
RHEL - 7)
# systemctl enable httpd (to enable the service at next boot in
RHEL - 7)
(i) Add the service to the IP tables and firewall.
In RHEL - 6 :
# iptables -A INPUT -i eth0 -p tcp -m tcp --deport 8999 -j ACCEPT
# iptables -A OUTPUT -i eth0 -p tcp -m tcp --deport 8999 -j ACCEPT
# service iptables save
# service iptables restart
In RHEL - 7 :
# firewall-cmd --permanent --add-service=http
# firewall-cmd --permanent -add-port=8999/tcp
# firewall-cmd --complete-reload
(j) Go to client system, open the firefox browser and type as http://port9.example.com in
address bar and check the index page is displayed or not.
(k) We can also access the website using elinks CLI tool.
# yum install elinks* -y (install the
elinks package)
# elinks --dump port9.example.com (access the
index page)
11. How to configure user authentication based web hosting?
It will ask user name and password to access this website. So, we have to provide http password.
(f) Go to the configuration file directory by # cd /etc/httpd/conf.d
(g) Create the configuration for user authentication based hosting.
# vim /etc/httpd/conf.d/userbase.conf
<VirtualHost <IP address of the web server> : 80>
ServerAdmin root@<hostname of the web server>
ServerName <hostname of the web server>
Page 122
RED-HAT LINUX 6/7
DocumentRoot /var/www/html
</VirtualHost>
<Directory "/var/www/html">
AllowOverride none
Require All Granted
AuthType Basic
AuthName "This site is protected"
AuthUserFile /etc/httpd/pass
Require User <user name>
</Directory>
(save and exit this file)
Example :
# vim /etc/httpd/conf.d/userbase.conf (create the
configuration file)
<VirtualHost 172.25.9.11:80>
ServerAdmin root@server9.example.com
ServerName server9.example.com
DocumentRoot /var/www/html
</VirtualHost>
<Directory "/var/www/html">
AllowOverride none
Require All Granted
AuthType Basic
AuthName "This site is protected"
AuthUserFile /etc/httpd/pass
Require User raju
</Directory>
(h) Go to document root directory and create the index.html file.
# cd /var/www/html
# vim index.html
<html>
<H1>
This is User Authentication based Web Hosting
</H1>
</html>
(save and exit this file)
(i) Restart the web server deamon.
# service httpd start (to start the webserver
deamon in RHEL - 6)
# chkconfig httpd on (to enable the service at
next boot in RHEL - 6)
# systemctl restart httpd (to start the webserver deamon in
RHEL - 7)
# systemctl enable httpd (to enable the service at next boot in
RHEL - 7)
(j) Add the service to the IP tables and firewall.
In RHEL - 6 :
# iptables -A INPUT -i eth0 -p tcp -m tcp --deport 80 -j ACCEPT
# iptables -A OUTPUT -i eth0 -p tcp -m tcp --deport 80 -j ACCEPT
# service iptables save
# service iptables restart
In RHEL - 7 :
# firewall-cmd --permanent --add-service=http
# firewall-cmd --complete-reload
(k) Create the user and assign the http password.
Page 123
RED-HAT LINUX 6/7
# useradd raju
* Don't give the normal password because this user requires the http password.
# htpasswd -c m /etc/httpd/pass <user name>
Example : # htpasswd -c m /etc/httpd/pass raju
(l) Go to client system, open the firefox browser and type as http://server9.example.com in
address bar and check the index page is displayed or not. Then it asks password, so we have to provide
http password.
(m)We can also access the website using elinks CLI tool.
# yum install elinks* -y (install the
elinks package)
# elinks --dump server9.example.com (access the
index page)
* Then it asks password, so we have to provide http password.
12. How to restrict the web sites access from hosts or domains or networks?
(a) Go to the configuration file directory by # cd /etc/httpd/conf.d
(b) Create the configuration for IP based hosting.
# vim /etc/httpd/conf.d/restrict.conf
<VirtualHost 172.25.9.11:80>
ServerAdmin root@server9.example.com
ServerName server9.example.com
DocumentRoot /var/www/html
</VirtualHost>
<Directory "/var/www/html">
AllowOverride none
Require All Granted
Order Allow, Deny
Allow from 172.25.9.0 or 172.25.0 (allows 172.25.9 network or 172.25 network to
access the websites)
Deny from .my133t.org (deny all the systems of *.my133t.org domain to access the
websites)
</Directory>
13. How to Redirect the website?
* Redirecting means whenever we access the website, it redirects to another website.
(a) Go to the configuration file directory by # cd /etc/httpd/conf.d
(b) Create the configuration for redirect based hosting.
# vim /etc/httpd/conf.d/rediect.conf
<VirtualHost 172.25.9.11:80>
ServerAdmin root@server9.example.com
ServerName server9.example.com
DocumentRoot /var/www/html
Redirect / "http://www.google.com"
</VirtualHost>
<Directory "/var/www/html">
AllowOverride none
Require All Granted
</Directory>
(save and exit this file)
(c) Go to document root directory and create the index.html file.
# cd /var/www/html
# vim index.html
<html>
<H1>
This is Redirect based Web Hosting
</H1>
Page 124
RED-HAT LINUX 6/7
</html>
(save and exit this file)
(d) Restart the web server deamon.
# service httpd start (to start the webserver
deamon in RHEL - 6)
# chkconfig httpd on (to enable the service at
next boot in RHEL - 6)
# systemctl restart httpd (to start the webserver deamon in
RHEL - 7)
# systemctl enable httpd (to enable the service at next boot in
RHEL - 7)
(e) Add the service to the IP tables and firewall.
In RHEL - 6 :
# iptables -A INPUT -i eth0 -p tcp -m tcp --deport 80 -j ACCEPT
# iptables -A OUTPUT -i eth0 -p tcp -m tcp --deport 80 -j ACCEPT
# service iptables save
# service iptables restart
In RHEL - 7 :
# firewall-cmd --permanent --add-service=http
# firewall-cmd --complete-reload
(f) Go to client system, open the firefox browser and type as http://server9.example.com in
address bar and check the redirection google web page is displayed or not.
(g) We can also access the website using elinks CLI tool.
# yum install elinks* -y (install the
elinks package)
# elinks --dump server9.example.com (access the
index page)
* This website redirects to the google website.
14. How to configure the website with alias name?
(a) Go to the configuration file directory by # cd /etc/httpd/conf.d
(b) Create the configuration for alias based hosting.
# vim /etc/httpd/conf.d/alias.conf
<VirtualHost 172.25.9.11:80>
ServerAdmin root@server9.example.com
ServerName server9.example.com
DocumentRoot /var/www/html
Alias /private /var/www/html/private
</VirtualHost>
<Directory "/var/www/html/private">
AllowOverride none
Require All Granted
</Directory>
(save and exit this file)
(c) Create private directory in /var/www/html.
# mkdir /var/www/html/private
(c) Go to document root private directory and create the index.html file.
# cd /var/www/html/private
# vim index.html
<html>
<H1>
This is Alias based Web Hosting
</H1>
</html>
(save and exit this file)
(d) Restart the web server deamon.
Page 125
RED-HAT LINUX 6/7
<Directory "/var/www/html/confidential">
AllowOverride none
Require All Granted
</Directory>
(save and exit this file)
(c) Create confidentialdirectory in /var/www/html.
# mkdir /var/www/html/confidential
(c) Go to confidential directory and create the index.html file.
# cd /var/www/html/confidential
# vim index.html
<html>
<H1>
This is Alias based Web Hosting
</H1>
</html>
(save and exit this file)
(d) Restart the web server deamon.
# service httpd start (to start the webserver
deamon in RHEL - 6)
# chkconfig httpd on (to enable the service at
next boot in RHEL - 6)
Page 126
RED-HAT LINUX 6/7
<Directory "/var/www/html">
AllowOverride none
Require All Granted
</Directory>
(save and exit this file)
(iii) Go to document root directory by # cd /var/www/html command.
(iv) # vim userpage.html
<html>
<H1>
This is userpage as home page web hosting
</H1>
</html>
(save and exit this file)
(d) Restart the web server deamon.
# service httpd start (to start the webserver
deamon in RHEL - 6)
# chkconfig httpd on (to enable the service at
next boot in RHEL - 6)
# systemctl restart httpd (to start the webserver deamon in
RHEL - 7)
# systemctl enable httpd (to enable the service at next boot in
RHEL - 7)
(e) Add the service to the IP tables and firewall.
Page 127
RED-HAT LINUX 6/7
In RHEL - 6 :
# iptables -A INPUT -i eth0 -p tcp -m tcp --deport 80 -j ACCEPT
# iptables -A OUTPUT -i eth0 -p tcp -m tcp --deport 80 -j ACCEPT
# service iptables save
# service iptables restart
In RHEL - 7 :
# firewall-cmd --permanent --add-service=http
# firewall-cmd --complete-reload
(f) Go to client system, open the firefox browser and type as http://server9.example.com
in address bar and check the user defined web page is displayed or not.
(g) We can also access the website using elinks CLI tool.
# yum install elinks* -y (install the
elinks package)
# elinks --dump server9.example.com (access the
index page)
17. How to configure CGI based web hosting?
CGI content will change dynamically every time the client accessed it. Normal web server will not be
used to support this type of web hosting. To access these dynamic pages, we have to configure the web server
as ".wsgi" server. The following steps will configure the CGI web server.
(a) Install the CGI package by # yum install mod_wsgi* -y command.
(b) Download or create the CGI script file in web server's document root directory.
Example : # cp webapp.wsgi /var/www/html
(c) Create the configuration file for CGI based web hosting.
<VirtualHost 172.25.9.11:80>
ServerAdmin root@server9.example.com
ServerName webapp9.example.com
DocumentRoot /var/www/html
WSGIScriptAlias / /var/www/html/webapp.wsgi
</VirtualHost>
(d) Restart the web server deamon.
# service httpd start (to start the webserver
deamon in RHEL - 6)
# chkconfig httpd on (to enable the service at
next boot in RHEL - 6)
# systemctl restart httpd (to start the webserver deamon in
RHEL - 7)
# systemctl enable httpd (to enable the service at next boot in
RHEL - 7)
(e) Add the service to the IP tables and firewall.
In RHEL - 6 :
# iptables -A INPUT -i eth0 -p tcp -m tcp --deport 80 -j ACCEPT
# iptables -A OUTPUT -i eth0 -p tcp -m tcp --deport 80 -j ACCEPT
# service iptables save
# service iptables restart
In RHEL - 7 :
# firewall-cmd --permanent --add-service=http
# firewall-cmd --complete-reload
(f) Go to client system, open the firefox browser and type as http://webapp9.example.com
in address bar and check the CGI based web page is displayed or not.
(g) We can also access the website using elinks CLI tool.
# yum install elinks* -y (install the
elinks package)
# elinks --dump webapp9.example.com (access the
index page)
18. What is secured web server?
Secured web server means normal Apache web server with SSL support. In normal web server the
data communication is done in plain text format. So, there is no security for data because everyone can access
Page 128
RED-HAT LINUX 6/7
the data. If we want to provide security to the data, then we have to configure the web server with SSL
support.
19. What is the profile of secured web server?
Package : mod_ssl
Configuration file : /etc/httpd/conf.d/ssl.conf
Private key location : /etc/pki/tls/private
Public key location : /etc/pki/tls/certs
Authentication certificate : /etc/pki/tls/certs
Port number : 443
* Private key extention is " . key " and public key extention is " . crt "
20. How to configure the secured web server?
(a) Install the web server and secure shell packages.
# yum install httpd* mod_ssl* -y command.
(b) Download the private key and public certificates.
# cd /etc/pki/tls/private
# wget http://classroom.example.com/pub/tls/private/server<no.> . key
# cd /etc/pki/tls/certs
# wget http://classroom.example.com/pub/tls/certs/server<no.> . crt
# wget http://classroom.example.com/pub/example-ca.crt
(c) Create the configuration file for secured web server.
# vim /etc/httpd/conf.d/https.conf
<VirtualHost 172.25.9.11:443>
ServerAdmin root@server9.example.com
ServerName server9.example.com
DocumentRoot /var/www/html
</VirtualHost>
(d) We have to copy 7 lines from ssl.conf file to https.conf file.
# vim -O ssl.conf https.conf
Copy the line numbers 70, 75, 80, 93, 100, 107, 116 copy and paste them in
https.conf file.
So, after copied those line the https.conf file should be as below.
<VirtualHost 172.25.9.11:443>
ServerAdmin root@server9.example.com
ServerName server9.example.com
SSLEngine on
SSLProtocol all -SSLv2 -SSLv3
SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW
SSLCertificateFile /etc/pki/tls/certs/server9.crt
SSLCertificateKeyFile /etc/pki/tls/private/server9.key
#SSLCertificateChainFile /etc/pki/tls/certs/example-ca.crt
DocumentRoot /var/www/html
</VirtualHost>
<Directory "/var/www/html">
AllowOverride
Require All Granted
</Directory>
(save and exit this file)
(e) Go to document root directory by # cd /var/www/html command.
(f) # vim index.html
<html>
<H1>
This is a secured web hosting
</H1>
</html>
(save and exit this file)
(g) Restart the web server deamon.
Page 129
RED-HAT LINUX 6/7
Page 130
RED-HAT LINUX 6/7
MTA stands for Mail Transfer Agent. It is used to transfer the messages and mails between
senders and recipients. Exchange, Qmail, Sendmail, Postfix, ....etc., are the examples for MTAs.
SMTP:
SMTP stands for Simple Mail Transfer Protocol. It is used to transfer the messages and mails
between the MTAs.
MDA :
MDA stands for Mail Delivery Agent. It is a computer software component that is responsible for
the delivery of e-mail messages to a local recipient's mailbox. Within the Internet mail architecture, local
message delivery is achieved through a process of handling messages from the message transfer agent, and
storing mail into the recipient's environment (typically a mailbox).
MRA :
MRA stands for Mail Retrieval Agent. It is a computer application that retrieves or fetches e-
mail from a remote mail server and works with a mail delivery agent to deliver mail to a local or remote email
mailbox. MRAs may be external applications by themselves or be built into a bigger application like an MUA.
Significant examples of standalone MRAs include fetchmail, getmail and retchmail.
4. What is the profile of mail server?
Package : sendmail (in RHEL - 5, 6 and 7) or postfix (in RHEL - 6 and 7).
Configuration file : /etc/postfix/main.cf, /etc/dovecot/dovecot.conf
Log file : /var/log/mail.log
User's mails location : /var/spool/mail/<user name>
root user's mail location : /var/spool/mail/root
Deamons : postfix
Port number : 25
5. How to configure the mail server?
The pre-requisite for mail server is DNS. ie., Domain Naming System should be configured first.
(i) Check the hostname of the server by # hostname command.
(ii) Install the mail server package by # yum install postfix* dovecot* -y command.
(iii) Open the mail configuration file and at last type as below.
# vim /etc/postfix/main.cf
myhostname = server9.example.com
mydomain = example.com
myorigin = $mydomain
inet_interfaces = $myhostname, localhost
mydestination = $myhostname, localhost.$localdomain, localhost, $mydomain
home_mailbox = Maildir /
(save and exit this file)
(iv) Open the another configuration file and at last type as below.
# vim /etc/dovecot/dovecot.conf
protocols = imap pop3 lmtp
(save and exit this file)
(v) Restart the mail server services.
# service postfix restart (to restart the postfix
deamon in RHEL - 6)
# service dovecot restart (to restart the dovecot
deamon in RHEL - 6)
# chkconfig postfix on (to enable the postfix deamon
at next boot in RHEL - 6)
# chkconfig dovecot on (to enable the dovecot deamon at next
boot in RHEL - 6)
# systemctl restart postfix doveco0t (to restart the postfix and
dovecot deamons in RHEL - 6)
# systemctl enable postfix dovecot (to enable the
deamons at next boot in RHEL - 6)
(vi) Add the service to the IP tables and firewall.
In RHEL - 6 :
# iptables -A INPUT -i eth0 -p tcp -m tcp --deport 25 -j ACCEPT
# iptables -A OUTPUT -i eth0 -p tcp -m tcp --deport 25 -j ACCEPT
Page 131
RED-HAT LINUX 6/7
Page 132
RED-HAT LINUX 6/7
Page 133
RED-HAT LINUX 6/7
Page 134
RED-HAT LINUX 6/7
Page 135
RED-HAT LINUX 6/7
Page 136
RED-HAT LINUX 6/7
Page 137
RED-HAT LINUX 6/7
Page 138
RED-HAT LINUX 6/7
name>="<value>";
Example : mysql or mariadb > update mydetails name="bangaram" where name='raju';
8. How to delete the table from the database?
mysql or mariadb > drop table <table name>;
Example : mysql or mariadb > drop table mydetails;
9. How to connect the remote database from our system?
# mysql -u root -h <host name> -p (here we have to enter the
password)
Example : # mysql -u root -h server9.example.com -p
(If the database is configured as localhost database, then server will not allow remote database
connections and Permission denied message will be displayed on the screen)
10. How to add mysqld service to IPtables and mariadb service to firewall?
In RHEL - 6 :
# iptables -A INPUT -i eth0 -p tcp -m tcp --deport 3306 -j ACCEPT
# iptables -A OUTPUT -i eth0 -p tcp -m tcp --deport 3306 -j ACCEPT
# service iptables save
# service iptables restart
# chkconfig iptables on
In RHEL - 7 :
# firewall-cmd --permanent --add-port=3306
# firewall-cmd --complete-reload
Page 139
RED-HAT LINUX 6/7
Page 140
RED-HAT LINUX 6/7
Page 141
RED-HAT LINUX 6/7
Page 142
RED-HAT LINUX 6/7
IP tables is a command-line firewall utility that uses policy chains to allow or block traffic. When a
connection tries to establish itself on your system, iptables looks for a rule in its list to match it to. If it doesn’t
find one, it resorts to the default action. IP tables almost always comes pre-installed on any Linux distribution.
We can update/Reinstall the IP tablespackage by # yum install iptables* -y command.
2. What are the types of firewalls?
There are four types of firewalls.
(i) Packet firewalls :
It works atPhysical, Data Link and Network Layers.
It works fast and efficiently.
It treats each packet in isolation.
(ii) Statefull firewalls :
It identifies a packets connection state.
It maintains packets history in the state tables.
(iii) Application layer firewalls :
It inspects and filter packets on OSI layer upto Application Layer.
It identifies if protocols are being misused.
(iv) Proxies firewalls :
It acts as an intermediary.
It operates at Application Layer.
It won't allow direct connections.
3. What are the tables maintained by IP tables?
Normally IP tables maintain 3 tables.
(i) INPUT table:
This chain handles all packets that are addressed to your server and also to control the
behaviour for incoming connections. For example, if a user attempts to SSH into your
PC/server, iptables will attempt to match the IP address and port to a rule in the input chain.
(ii) OUTPUT table :
This chain contains rules for traffic created by your server. This chain is used for outgoing
connections. For example, if you try to ping google.com, iptables will check its output chain to see what the
rules are regarding ping and google.combefore making a decision to allow or deny the connection
attempt.
(iii) FORWARD table :
This chain is used for incoming connections that aren’t actually being delivered locally. Think
of a router – data is always being sent to it but rarely actually destined for the router itself; the data is just
forwarded to its target. Unless you’re doing some kind of routing, NATing, or something else on your
system that requires forwarding, you won’t even use this chain.This chain is used to deal with traffic
destined for other servers that are not created on your server. This chain is basically a way to configure your
server to route requests to other machines.
4. What are the meanings of REJECT, DROP and ACCEPT ?
REJECT :
REJECT means server receives the FTP request from the specified IP address and rejects that
request and
also send the acknowledgement.
DROP :
DROP means server receives the FTP requests from the specified IP address and drop the request
without sending any acknowledgement.
ACCEPT :
ACCEPT means server receives the FTP requests from the specified IP address and allow that
system for FTP services.
5. What is the configuration file of IP tables and what are the options available in IP tables
command?
/etc/sysconfig/iptables is the configuration file of IP tables.
# iptables <options><chain> firewall-rule (to execute
the IP tables)
The options are as follows.
-A -----> Add or append the rule.
-p -----> Indicates the protocol for that rule (tcp, udp, icmp, ....etc.;).
Page 143
RED-HAT LINUX 6/7
-s -----> Indicates the source of the packet (IP address, Network ID or Hostname).
-d ----->Indicates the destination of the packet.
-j -----> 'Jump to target' indicates the interface through which the incoming packets are
coming through the INPUT , FORWARD and PREROOTING chain.
-o -----> 'Output Interface' indicates the interface through which the outgoing packets are
sent through the INPUT, FORWARD and PREROOTING chain.
-sport or -source-port -----> Source port for -p tcp or -p udp.
-dport or -destination-port -----> Destination port for -p tcp or -p udp.
6. How to allow a ping from outside to inside and inside to outside?
# iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
# iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
# iptables -A OUTPUT -p icmp --icmp-type echo-request -j ACCEPT
# iptables -A INPUT -p icmp --icmp-type echo-reply -j ACCEPT
7. In how many ways can we protect the network?
There are 4 ways to protect the network.
(i) SELinux
(ii) IP tables
(iii) Firewalld
(iv) TCP wrappers
IP tables and firewalld both are used to protect our systems services from outside. But we can use
only one way at a time.
8. How to configure the firewalld?
(i) Install the firewalld package by # yum install firewalld* -y command.
(ii) Check whether the firewalld package is installed or not by # rpm -qa firewalld
command.
(iii) Check the status of the firewalld by executing the below commands.
# systemctl status firewalld or # firewall-cmd --status
Examples of IP tables commands :
# service iptables status (to check the IP
tables status)
# service iptables start (to start the
IP tables)
# service iptables stop (to stop the
IP tables)
# service iptables restart (to restart
the IP tables)
# service iptables save (to save the iptable rules
permanently)
# chkconfig iptables on (to enable the iptables
at next boot)
# chkconfig iptables off (to disable the iptables
at next boot)
# iptables -A INPUT -i eth0 -p tcp --deport 22 -j ACCEPT (to add the rules to the
existing
iptables to allow ssh)
where -A ---> Add or append a rule to the INPUT chain for incoming traffic.
-i eth0 ---> Incoming packets through the interface eth0 will be verified against this
added new rule.
-p tcp -deport 22 ---> protocol is tcp and the destination port is 22.
-j ACCEPT ---> Accept the packet.
# iptables -A INPUT -p tcp -m state --state NEW -m tcp --deport 80 -j ACCEPT
Page 144
RED-HAT LINUX 6/7
Page 145
RED-HAT LINUX 6/7
# logsave filelist.txt ls -l (to capture the output of any command and stores it in a file
along with the starting and ending
time of the command)
# look "printf" avltree.c (to display all the lines in a file that start with a particular
string and performance of this command
is more than grep)
# stat <file name> (to display the status of a file or file system like absolute path of the files,
the no of blocks used by the file, the I/O block size, inode access specifier, access time, time of modification,
....etc)
# mc (it is a powerful text based file manager and it is a directory browsing tool and
allows to see thecontents of the archived
files, ...etc.;)
* In RHEL - 6 we have to write the rules and regulations to allow or deny the system but, in RHEL - 7
we have
enable or disable the firewalld options only.
# firewall-config (to manage the firewalld services using graphical
user mode)
# firewall-cmd --get-zones (to display all
available zones)
# firewall-cmd --get-default-zone (to check the default zone, the default zone is
public zone)
# firewall-cmd --set-default-zone=work (to activate the work zone, nothing but
changing default
zone temporarily)
# firewall-cmd --permanent --set-default-zone=work (to set the default zone as work
permanently)
# firewall-cmd --get-activate-zones (to display which zone is an active with IP address and
interface eth0)
# firewall-cmd --add-service=172.25.0.0/24 --zone=public (to add the source to the public zone
temporarily)
# firewall-cmd --get-activate-zone (to see the default zone which is
activated)
# firewall-cmd --permanent -add-source=172.25.0.0/24 --zone=public
(to add the IP address to
public zone permanently)
# firewall-cmd --remove -souce =172.25.0.0/24 --zone=public (to remove the iP address from
public zone
temporarily)
# firewall-cmd --permanent --remove-source=172.25.0.0/24 --zone=public
(to remove the iP address from public
zone permanently)
# firewall-cmd --add-interface=eth1 --zone=public (to change the interface or add
interface to the
public zone temporarily)
# firewall-cmd --permanent --add-interface=eth1 --zone=public (to change the
interface or add interface to
the public zone permanently)
# firewall-cmd --get-active-zones (to see the activated
zones)
* All rules what we have written are temporary. If the system is rebooted then all changed values
are revert
back to it's previous state
* To make the changed values permanent then, add --permanent to all the commands set of
firewalld.
# firewall-cmd --reload (to apply the changed rules
immediately)
# firewall-cmd --permanent --add-service=sshd (to add the sshd service to firewall permanently)
Page 146
RED-HAT LINUX 6/7
Page 147
RED-HAT LINUX 6/7
26. Virtualization
1. What is virtualization?
Virtualization allows multiple operating system instances to run concurrently on a single computer;it is
a means of separating hardware from a single operating system. Each “guest” OS is managed bya
Virtual Machine Monitor (VMM), also known as a hypervisor. Because the virtualization system sitsbetween
the guest and the hardware, it can control the guests’ use of CPU, memory, and storage,even allowing
a guest OS to migrate from one machine to another.
2. What are types of virtualizations available in Linux?
RHEL - 5 : RHEL - 6 & 7 :
xen kvm
64 bit 64 bit
VT-Enabled VT-Enabled
Intel/AMD Intel/AMD
2 GB RAM 2 GB RAM
6 GB Hard disk 6 GB Hard disk
3. What are the packages of virtualization and how to install the packages?
(i) qemu (It is used to provide user level KVM virtualization and disk image also)
(ii) virt (It is used to provide virtualization software)
(iii) libvirt (It is used to provide the libraries for virtualization software)
(iv) python (This package provides the host and server libraries for interacting with Hypervisor
and
Host system)
# yum install qemu* virt* libvirt* python* -y (to install the
virtualization softwares)
4. How to start the virtualization manager and how to create a new virtual machine?
(i) Go to Applications -----> System Tools -----> Virtual Machine Manager
(ii) Vitual Machine Manager is used to check and displays the available virtual machines. It is
also used to create the new virtual machines.
(iii) To create a new virtual machine first click on monitor icon, then enter the virtual machine
name, Select Local and Select Forward.
(iv) Click on Browse Local, Select the guest O/S " . iso " image file and Select Forward.
5. What are the packages of Virtualization Hypervisor and how to install the packages?
(i) "virtualization hypervisor" (provides the foundation to host virtual machines includes
the libvirt and
qemu- kvm package)
(ii) "virtualization client" (provides the support to install and manage virtual
machines includes virsh, virt-install, virt-manager, virt-
top and virt-viewer packages)
(iii) "virtualization tools" (provides tools for offline management of virtual machines
includes the
libguestfs package)
(iv) "virtualization platform" (provides an interface to access and control virtual machines
includes the libvirt, libvirt-client and
virt-who packages)
Installation of Virtualization Hypervisor :
Page 148
RED-HAT LINUX 6/7
Page 149
RED-HAT LINUX 6/7
Page 150
RED-HAT LINUX 6/7
Page 151
RED-HAT LINUX 6/7
Page 152
RED-HAT LINUX 6/7
Page 153
RED-HAT LINUX 6/7
(c) If all are ok, then check network statistics and interfaces whether the interfaces are running in full
duplex mode or half duplex mode and check whether the packets are missing. If all are ok from our
side then,
(d) Inform to network team and other respective teams to solve this issue.
25. How to troubleshoot if the node is down?
(a) Check pinging the system. If pinging, then check whether the system is in single user mode or
not.
(b) If the system is in single user mode then put the system in multi user mode ie., default run
level by confirming with our team whether system is under maintenance or not.
(c) Check in which run level the system is running. If it is in init 1 it will not be able to ping. If it is
in init s then it will ping.
(d) In this situation also if it is not pinging then try to login through console port. If not possible
then inform to data centres people to hard boot the system.
(d) If connected through console port then we may get the console prompt.
26. How to troubleshoot if the memory utilization full?
(a) Check how much memory is installed in the system by # dmidecode -t memory command.
(b) Check the memory utilization by # vmstat -v command.
(c) Normally application or heavy backups utilize more memory. So, inform to application team
or backup team or other teams which team is utilizing the more memory to reduce the processes by
killing them or pause them.
(d) Try to kill or disable or stop the unnecessary services.
(e) If all the ways are not possible then inform to team lead or tech lead or manager to increase
the memory (swap space). If it is also not possible then taking higher authority's permissions to
increase the physical memory. For those we contact the server vendor and co-ordinate
with them through data centre people to increase the RAM size.
27. How to replace the failed hard disk?
(a) Check whether the disk is failed or not by # iostat -En | grep -i hard/soft command.
(b) If hard errors are above 20 then we will go for replacement of the disk.
(c) If the disk is from SAN people then we will inform to them about the replacement of the disk.
If it is internal disk then we raise the CRQ to replace the disk.
(d) For this we will considered two things.
(i) whether the system is within the warranty.
(ii) without warranty.
(e) We will directly call to the toll free no. of the system vendor and raise the ticket. They will
issue the case no. This is the no. we have to mention in all correspondences to vendor
regarding this issue.
(f) If it is having warranty they asks rack no. system no. and other details and replace the hard
disk with co- ordinate of the data centre people.
(g) If it is not having warranty, we have to solve the problem by our own or re-agreement to
extend the warranty and solve that problem.
28. How to replace the processor?
(a) Check the processor's status using # lscpu or # dmidecode -t processor commands.
(b) If it shows any errors then we have to replace the processor.
(c) Then raise the case to vendor by toll free no. with higher authorities permission.
(d) The vendor will give case no. for future references.
(e) They also asks rack no. system no. of the data centre for processor replacement.
(f) We will inform to the Data centre people to co-ordinate with vendor.
29. How replace the failed memory modules?
Causes :
(a) The system is continuously rebooting .
(b) When in peak business hours, if the heavy applications are running the system get panic
and rebooted. This is repeating regularly.
Solution :
(a) First we check how much RAM present in the system with # dmidecode -t memory
command.
(b) Then we raise the case to vendor with the help of higher authorities.
(c) Then the vendors will provide the case no. for future reference.
Page 154
RED-HAT LINUX 6/7
(d) They will also asks rack no. system no. to replace the memory.
(e) we will inform the data centre people to co-ordinate with the vendor.
30. What is your role in DB patching?
In Database patching the following teams will be involved.
(i) Database Administrator (DBA) team.
(ii) Linux Administrators team.
(iii) Monitoring team.
(iv) Application team.
(i) DBA team :
This is the team to apply the patches to the databases.
(ii) Linux team :
This team is also involved if any problems occur. If the database volume is having a mirror we
should first break the mirror and then the DBA people will apply the patches. After 1 or 2 days
there is no problem again we need sync the data between mirrored volume to patch applied
volume. If there is no space for patch we have to provide space to DBA team.
(iii) Monitoring team :
This team should receive requests or suggestions to ignore any problems occurs. After applied
the patch if the system is automatically rebooted then monitoring team will raise the ticket
"Node down" to system administrators team. So, to avoid those type of tickets we have to
sent requests to ignore those type alerts.
(iv) Application team :
For applying any patches, the databases should not be available to application. So, if
suddenly database is not available then application may be crashed. So, first the application
should be stopped. This will be done by application team.
31. What is SLA?
A service-level agreement (SLA) is simply a document describing the level of service expected by a
customer from a supplier, laying out the metrics by which that service is measured and the remedies or
penalties, if any, should the agreed-upon levels not be achieved. Usually, SLAs are between companies and
external suppliers, but they may also be between two departments within a company.
32. What is Problem Management?
The objective of Problem Management is to minimize the impact of problems on the organisation.
Problem Management plays an important role in the detection and providing solutions to problems
(work around& known errors) and prevents their reoccurrence.
A 'Problem' is the unknown cause of one or more incidents, often identified as a result of multiple
similar
incidents.A 'Known error' is an identified root cause of a Problem.
33. What is Incident Management?
An 'Incident' is any event which is not part of the standard operation of the service and which causes
or may cause, an interruption or a reduction of the quality of the service.
The objective of Incident Management is to restore normal operations as quickly as possible with the
least possible impact on either the business or the user, at a cost-effective price.
Inputs for Incident Management mostly come from users, but can have other sources as well like
management Information or Detection Systems. The outputs of the process are RFC’s (Requests for
Changes), resolved and closed Incidents, management information and communication to the customer.
34. What is Change Management?
Change management is a systematic approach to dealing with change, both from the perspective of
an organization and on the individual level. change management has at least three different aspects,
including adapting to change, controlling change, and effecting change. A proactive approach to
dealing with change is at the core of all three aspects.In an information technology (IT) system environment,
change management refers to a systematic approach to keeping track of the details of the system (for
example, what operating system release is running on each computer and which fixes have been applied).
35. What is Request Management?
service request management (SRM) is the underlying workflow and processes that enable an IT
procurement or service request to be reliably submitted, routed, approved, monitored and delivered. SRM is
the process of managing a service request through its lifecycle from submission through delivery and follow-
up.
Page 155
RED-HAT LINUX 6/7
SRM may be manual or automated. In a manual system, a user calls a help desk to request a service,
and help desk personnel create a service ticket to route the service request. In an automated system,
the user submits a request through an online service catalog, and the application software
automatically routes the request through the appropriate processes for approval and service delivery. These
systems also typically enable users to track the status of their service requests, and management to monitor
service delivery levels for quality control purposes.
36. What is grep?
(i) grep means Globally search for Regular Expression.
(ii) Using grep we can filter the results to get a particular information.
(iii) We can get only information about what string we have specified in grep command.
37. What are pipes and filters in Linux?
Pipes :
(a) Pipes are nothing but adding two commands and make as one command.
(b) Normally we cannot combine two commands, but using pipes we get one command by
combining two commands.
(c) So, we can get the results as what we required.
Filters :
(a) Filters are nothing but filtering the results what we required.
(b) Using filters we can get exact results depends upon what we specified in the expression.
(c) So, there is no wastage of time because it filters results what we specified in the command
expression.
38. What is the full form of COMPUTER ?
C ----->Commonly
O -----> Operated
M -----> Machine
P -----> Particularly
U ----->Used
T ----->Technical and
E ----->Educational
R -----> Research
39. What is the command in sar to monitor NIC devices received/transmitted packets?
# sar -n DEV 1 5
This will show 5 consecutive output each with a time interval of 1 sec for all the ethernet devices
40. What is Linux Kernel?
It acts as an interpreter between Linux OS and its hardware. It is the fundamental component of Linux
OS and contains hardware drivers for the devices installed on the system. The kernel is a part of the system
which loads first and it stays on the memory.
41. What are the main parameters effect on server performance?
The one of the most important task of any Linux Admin includes performance monitoring which
includes a parameter "Load Average" or "CPU Load".
42. What is load average?
Load Average is the value which represents the load on your system for a specific period of time. Also
it can be considered the ratio of the number of active tasks to the number of available CPUs.
43. How to check?
We can use either top or uptime command to view the output of the load average as shown below.
# uptime
00:07:00 up 4 days, 6:14, 1 user, load average: 0.11, 0.14, 0.09
# top
top - 00:07:12 up 4 days, 6:15, 1 user, load average: 0.09, 0.13, 0.09
44. What are the three values?
As you can see three values representing the load average column. These show the load on your
system over a significant period of time (one or current, five and fifteen minutes averages).
45. How do you know your system has a high load?
The most important question as in most cases I have seen how do you determine your system has high
load.
Does a high value represents high load average and that your system requires attention?
Page 156
RED-HAT LINUX 6/7
Page 157
RED-HAT LINUX 6/7
Page 158
RED-HAT LINUX 6/7
Manufacturer: IBM
Product Name: System x3550 M2 -[7284AC1]-
Version: 00
Wake-up Type: Other
SKU Number: XxXxXxX
Family: System x
Virtual Servers :
# dmidecode -s system-product-name
VMware Virtual Platform
# dmidecode | less
System Information
Manufacturer: VMware, Inc.
Product Name: VMware Virtual Platform
Version: None
Wake-up Type: Power Switch
SKU Number: Not Specified
Family: Not Specified
On a virtual server running VMware you can run the below command to verify :
# lspci | grep -i vmware
00:0f.0 VGA compatible controller: VMware SVGA II Adapter
51. How to find the bit size of your linux machine?
# uname -m
i686
# uname -m
x86_64
If we get i386, i586 and i686 that signifies your machine is 32-bit but if we
getx86_64 or ia64 then your machine will be 64-bit.
# getconf LONG_BIT
32
# getconf LONG_BIT
64 (Here we get an output of bit size either 32 or 64)
52. How can you add a banner or login message in Linux?
By editing these two files
/etc/issue
/etc/motd
53. What is the difference between normal kernel and kernel-PAE?
kernel in 32 bit machine supports max of 4 GB RAM, whereas
kernel PAE in 32 bit linux machine supports till 64 GB RAM
54. Tell me the command to find all the commands in your linux machine having only 2 words like ls, cp,
cd etc.
# find /bin /sbin/usr/bin /usr/sbin -name ?? -type f
55. Which file is generally used to configure kickstart?
anaconda.cfg
56. Which log file will you check for all authentication related messages?
/var/log/secure
57. What is the command used to find the process responsible for a particular running file?
# fuser filename
# lsof filename
58. What is the command to take remote of any Linux machine?
# rdesktop
59. What are the three values shown in load average section of top command?
It shows the current, 5 min back and 15 min back load average value.
60. How to check all the process running by a particular user?
# ps -u<username>
Page 159
RED-HAT LINUX 6/7
Page 160
RED-HAT LINUX 6/7
Page 161
RED-HAT LINUX 6/7
Page 162
RED-HAT LINUX 6/7
(iii) Boot the system with the above created boot.iso image and press Esc key to get the boot :
prompt.
(iv) Then execute the below command to install the O/S.
boot : linux askmethod (Press Enter key)
(v) Select the preferred language for installation (for example English).
(vi) Select the Keyboard layout as US.
(vii) Select the urloption for the installation media (for example FTP/NFS/HTTP).
(viii) Select IPv4 or IPv6 to define network settings and select dynamic or static options.
(ix) Assign the same range IP address and netmask to the client system to communicate with
server.
(x) Then specify the FTP server IP address and path of the installation media to install the
O/S.
7. How to install RedHat Linux through NFS?
(i) Make an entry in /etc/exports to export the RHEL media.
# vim /etc/exports
<installation media directory> <network ID>(rw, sync)
(save and exit this file)
Example :
/var/ftp/pub/rhel6 172.25.9.0(rw, sync) (If the installation media is
in /var/ftp/pub/rhel6)
(ii) Export the above NFS shared directory by # exportfs -rv command.
(iii) Then restart the NFS service by # service restart nfs command and add the NFS to IPtables or
firewall.
(iv) Installation of Linux through network requires one boot.iso image or RHEL DVD.
To make a DVD/Pendrive bootable using boot.iso image :
(a) Download the boot.iso image from redhat website.
# cdrecord /root/boot.iso (/root/boot.iso is the path of
boot.iso image)
(b) Copy the boot.iso image into DVD or pendrive.
# dd if=/root/boot.iso of=/dev/sdb1 (/dev/sdb1 is the address of the USB
or pendrive)
(v) Boot the system with the above created boot.iso image and press Esc key to get the boot :
prompt.
(vi) Then execute the below command to install the O/S.
boot : linux askmethod (Press Enter key)
(vii) Select the preferred language for installation (for example English).
(viii) Select the Keyboard layout as US.
(ix) Then select the NFS directory option and specify the NFS server IP address and NFS shared
directory and the installation will be done.
8. How to install the RedHat Linux through HTTP?
(i) First install the http webserver by # yum install httpd* -y command.
(ii) Copy the entire RHEL DVD contents into /var/www/html/rhel6 by
# cp -rvpf /media/RHEL/*.* /var/www/html/rhel6
(iii) If not possible to do the above step2, then create a link between the /var/ftp/pub/rhel6 and
/var/www/html by # ln -s /var/ftp/pub/rhel6
/var/www/html/rhel6 command.
(iv) Restart the http services and add it to the firewall.
In RHEL - 6 :
# service httpd restart (to restart the http service in
RHEL - 6)
# chkconfig httpd on (to enable the http service at
next boot in RHEL - 6)
# setup (through the setup command add the http
service to the IP tables)
# service iptables save (to save the iptables
configuration)
# service iptables restart (to restart the iptables service)
Page 163
RED-HAT LINUX 6/7
In RHEL - 7 :
# systemctl restart httpd (to restart the http service in RHEL - 7)
# systemctl enable httpd (to enable the http service at next boot
in RHEL - 7)
# firewall-cmd --permanent -add-service=http (to add the http service to the firewall in
RHEL - 7)
# firewall-cmd -complete-reload (to reload the firewall
configuration)
(v) Installation of Linux through network requires one boot.iso image or RHEL DVD.
To make a DVD/Pendrive bootable using boot.iso image :
(a) Download the boot.iso image from redhat website.
# cdrecord /root/boot.iso (/root/boot.iso is the path of
boot.iso image)
(b) Copy the boot.iso image into DVD or pendrive.
# dd if=/root/boot.iso of=/dev/sdb1 (/dev/sdb1 is the address of the USB
or pendrive)
(vi) Boot the system with the above created boot.iso image and press Esc key to get the boot :
prompt.
(vii) Then execute the below command to install the O/S.
boot : linux askmethod (Press Enter key)
(viii) Select the preferred language for installation (for example English).
(ix) Select the Keyboard layout as US.
(x) Select the urloption for the installation media and specify the http or https IP address
and location.
Example :
http or https://172.25.9.11/rhel6
(xi) Then installation of RedHat Linux will be done through HTTP.
9. What is PXE installation and what are it's requirements?
Automatic Installation of RHEL from the Network is called PXE installation. This is also called as un-
attended
installation. The means nobody interaction is required in the installation process.
PXE stands for Pre Execution. The PXE does not requires a RHEL DVD or any boot.iso image.
The requirements for PXE server :
(i) Static network at server side.
(ii) DHCP server should be configured on the server.
(iii) FTP server should be configured on the server.
(iv) Yum server should be configured on the server.
(v) TFTP server should be configured on the server.
(vi) Create the kickstart installation file.
* If all the above 5 servers are configured in one server, that server should be called as PXE server.
10. How to configure the PXE server and how to install RedHat from PXE server?
(a) Put the RHEL - 6 DVD into the DVD drive and go to Packages directory.
# cd /media/RHEL6/Packages
(b) Install the vsftpd package to configure the FTP server.
# rpm -ivh vsftpd*
(c) Copy the entire RHEL - 6 DVD contents into the /var/ftp/pub/rhel6 directory.
# cp -rvpf /media/RHEL6/*.* /var/ftp/pub/rhel6
(d) Restart, enable the ftp service at next boot, add the service to IP tables and restart the IP
tables.
# service vsftpd restart
# chkconfig vsftpd on
# iptables -A INPUT -m state --state NEW -m tcp -p tcp --deport 21 -j ACCEPT
# iptables -A OUTPUT -m state --state NEW -m tcp -p tcp --deport 21 -j
ACCEPT
# iptables -A INPUT -m state --state NEW -m tcp -p tcp --deport 20 -j ACCEPT
# iptables -A OUTPUT -m state --state NEW -m tcp -p tcp --deport 20 -j
ACCEPT
Page 164
RED-HAT LINUX 6/7
Page 165
RED-HAT LINUX 6/7
Page 166
RED-HAT LINUX 6/7
Page 167
RED-HAT LINUX 6/7
(i) Switchover is the manual task. (i) But, Failover is a automatic task.
(ii) We can switchover service groups from online (ii) But, the failover will failover the service group to
cluster node to offline cluster node incase of the other node when Veritas Cluster heartbeat
power outage, hardware failure, schedule linkdown, damaged, broken because of some
shutdown and reboot. disaster or system hung.
7. Which the main configuration file for VCS (Veritas Cluster) and where it is stored?
' main.cf ' is the main configuration file for VCS and it is located in /etc/VRTSvcs/conf/config
directory.
8. What is the public region and private region?
when we bring the disk from O/S control to Volume Manager control in any format (either CDS,
simple or sliced), the disk is logically divided into two parts.
(a) Private region :
It contains Veritas configuration information like disk type and name, disk group name,
groupid and configdb. The default size is 2048 KB.
(b) Public region :
It contains the actual user's data like applications, databases and others.
9. There are five disks on VxVM (Veritas Volume Manager) and all are failed. What are the steps
you follow to get those disks into online?
(i) Check the list of disks in Volume manager control by # vxdisk list command.
(ii) If the above disks are not present, then bring them O/S control to VxVM control by
# vxdisksetup -i <disk names> (if data is not on those disk) or execute
# vxdiskadm command and select 2nd option ie., encapsulation method if the disks
having the data.
(iii) Even though If it is not possible, then check the disks are available at O/S level by # fdisk -
l command.
(a) If the disks are available, execute the above command once again.
(b) If the disks are not available then recognize them by scanning the hardware.
(iv) Even though if it is not possible, then reboot the system and follow the steps (i) and (ii).
10. What is the basic difference between private disk group and shared disk group?
Private disk group :
The disk group is only visible for the host on which we have created it. If the host is a part of the
cluster, the private disk group will not be visible to the other cluster nodes.
Shared disk group :
The disk group is sharable and visible to the other cluster nodes.
11. How will you create private disk group and shared disk group?
# vxdg init <disk group name><disk media name>=<O/S disk name> (to create the
private disk group)
# vxdg -s init <disk group name><disk media name>=<O/S disk name>(to create the shared disk
group)
12. How will you add new disk to the existing disk group?
we can do this in two ways.
(i) Run # vxdiskadm command, which will open menu driven program to do various disk
operations. Select add disk option and give disk group name and disk name.
(ii) # vxdg -g <disk group name> adddisk <disk media name>=<O/S disk name>
Example: # vxdg -g appsdg adddisk disk02=/dev/sdb
13. How will you grow or shrink the volume/file system? What is the meaning of grow by, grow to,
shrink by and shrink to options?
(i) We can grow the volume/file system by,
# vxassist -g appsdg growby or growto 100GB appsvol (or)
# vxresize -g appsdg +100GB appsvol alloc = <disk name>
(ii) We can shrink the volume/file system by,
# vxassist -g appsdg shrinkby 20GB appsvol
# vxassist -g appsdg shrinkto 20GB appsvol (or)
# vxresize -g appsdg -10GB appsvol (to shrink by the size 10GB)
# vxresize -g appsdg 10GB appsvol (to shrink to the size 10GB)
Page 168
RED-HAT LINUX 6/7
Meanings :
growby :
This will be used to grow the file system by adding new size to the existing file system.
growto :
This will be used to grow the file system upto the specified new size. This will not be added
the new size to the existing one.
shrinkby :
This will be used to shrink the file system by reducing the new size from the existing file
system size.
shrinkto :
This will be used to shrink the file system upto the specified new size. This will not be reduced
the file system new size from the existing one.
14. If vxdisk list command gives you disk status as " error ". What are the steps you follow to make
respective disk online?
This issue is mainly because of fabric disconnection. So, execute # vxdisk scandisks command.
Otherwise unsetup the disks using # /etc/vx/bin/vxdiskunsetup and setup the disks again using
# /etc/vx/bin/vxdisksetup command.
Note :/etc/vx/bin/vxdiskunsetup will remove the private region from the disk and destroy the data. So,
backup the data before using this command.
18. Define LLT and GAB. What are the commands to create them?
LLT :
(i) LLT means Low Latency Transport protocol
(ii) It monitor the kernel to kernel communication.
(iii) It maintain and distribute the network traffic within the cluster.
(iv) It uses heartbeat between the interfaces.
GAB :
(i) GAB means Global Atomic Broadcasting.
(ii) It maintain and distribute the configuration information of the cluster.
(iii) It uses heartbeat between the disks.
Commands :
# gabconfig -a (to check the status of the GAB, ie., GAB
is running or not)
If port ' a ' is listening, means GAB is running, otherwise GAB is not running.
If port ' b ' is listening, means I/O fencing is enabled, otherwise I/O fencing is
disabled.
If port ' h ' is listening means had deamon is working, otherwise had deamon is
not working.
# gabconfig -c n 2 (to start the GAB in 2 systems in the cluster,
where 2 is seed no.)
# gabconfig -u (to stop the GAB)
# cat /etc/gabtab (to see the GAB configuration information and
the it contains as, )
gabconfig -c n x (where x is a no. ie., 1, 2, 3, ....etc.,)
Page 169
RED-HAT LINUX 6/7
Page 170
RED-HAT LINUX 6/7
STALE-ADMIN-WAIT :
The configuration files are in read-only mode. If any changes wants to make that file as read-write
mode. If any changes occurs in ' main.cf ' file in cluster, then the changes are in ' .stale ' hidden file
under configuration directory. While changes occurring, if the system restarted or rebooted, then the
cluster will start with ' .stale ' file. So, the VCS is started on a system with a stale configuration file, the
system status will be STALE- ADMIN-WAIT until another system in the cluster starts with a valid
configuration file or otherwise execute
# hasys -stale -force <system name> (or) # hasys -force <system name> to start the
system forcefully with the correct or valid configuration file.
30. What is meant by resource and how many types?
Resource is a software or hardware component managed by the VCS.
Mount points, disk groups, volumes, IP addresses, ....etc., are the Software components.
Disks, Interfaces (NIC cards), ....etc., are the Hardware components.
There are two types of resources and they are,
(i) Persistent Resources (we can put them either on-line or off-line)
(ii) Non-Persistent Resources (we can put off-line only)
If the resource is in faulted state, then clear the service group state. Resources cab be critical or non-
critical. If the resource is critical, then it automatically failover if the resource is failed. If the resource is
Non-critical, then it switch over and we have to manually switch over the resource group to another
available system.
31. What are the dependencies between resources in a Cluster?
If one resource depends on other resource, then there is a dependency between those resources.
Example : NIC (Network Interface Card) is hardware component nothing but hardware resource. The
IP address is a software component nothing but software resource and it depends on NIC card. The
relationship between NIC and IP address is Parent - Child relationship. The resource which one is
starts first, that one is called Parentresource and the remaining dependency resources are called Child
resource.
32. What are the minimum requirements for or in VCS?
(i) Minimum two identical (same configuration) systems.
(ii) Two switches (Optical Fibre Channel).
(iii) Minimum three NIC cards. (Two NICs for private network and one NIC for public network).
(iv) One common storage.
(v) Veritas Volume Manager with license.
(vi) Veritas Cluster with license.
33. What are the Veritas Cluster deamons?
(i) had :
(a) It is the main deamon in Veritas Cluster for high availability.
(b) It monitors the cluster configuration and whole cluster environment.
(c) It interacts with all the agents and resources.
(ii) hashadow :
(a) It always monitor the had deamon.
(b) It's main functionality is logging about the cluster.
35. What are the main configuration files in a Cluster?
* /etc/VRTSvcs/conf/config/main.cf and
* /etc/VRTSvcs/conf/config/types.cf are the main configuration files in Cluster.
36. What are the main log files in a Cluster?
(i) /var/VRTSvcs/log/Engine_A.log (logging about when the cluster started, when
failed, when failover
occurs, when switchover forcefully, ...etc.,)
(ii) /var/VRTSvcs/log/hashadow_A.log (logging about the hashadow deamon)
(iii) /var/VRTSvcs/log/agent_A.log (logging bout agents)
37. What are the Cluster components?
(i) Cluster.
(ii) Service groups.
(iii) Resources.
(iv) Agents.
(v) Events.
Page 171
RED-HAT LINUX 6/7
Page 172
RED-HAT LINUX 6/7
Page 173
RED-HAT LINUX 6/7
# hastop -sys <system or node name> (to stop the specified system or node in the Cluster)
45. What is the Service group and Resource?
Service group :
(i) A collection or group of physical and logical resources is called the Service group.
(ii) Moving service group from one system to another system means, moving resources from one
system to another system.
Resources :
(i) It is a software or hardware components like, diskgroup, volume, IP address, mount point
are software resources and disk, NIC cards are hardware resources.
(ii) The value of resource is known as Attribute.
Example : (a) System list is attribute of a System A or System B.
(b) Auto start is the attribute of System.
Resource Attribute Value
NIC IP address 192.168.1.1
Diskgroup diskgroup name appsdg
Disk disk name disk01
Interface Interface name eth0
Attributes :
# hagrp -modify appssg system list={ sys A0, sys B0} (to add sys A and sys B attributes to
service group)
# hagrp -modify appssg autostart list={ sys A} (to start the sys A attributes
automatically)
# hagrp -modify appssg enabled 1 or 0 (1 means start and 0 means not to start
automatically)
(iii) Creating resources and adding them to the service group and specify their attributes.
For file system :
(a) /mnt/apps (the mount point)
(b) /appsvol (the volume name)
(c) /appsdg (the disk group)
# hares -add dg-apps diskgroup appssg (to add the diskgroup resource
to a service group)
(where dg-apps is resource name, diskgroup is a keyword and appssg is a service
group name)
Page 174
RED-HAT LINUX 6/7
# hares -modify dg-apps diskgroup appsdg (to add the diskgroup attribute to a
service group)
# hares -modify dg-apps enable 1 (to enable the resource)
# hares -add dg-volume volume appssg (to add the volume resource to
a service group)
# hares -modify dg-volume volume appsvol (to add the volume attribute to a service
group)
# hares -modify dg-volume diskgroup appsdg (to add the diskgroup to the volume)
# hares -modify dg-volume enable 1 (to enable the volume resource)
# hares -modify dg-volume critical 1 (to make the resource as critical)
# hares -add dg-mnt mount appssg (to add the mount point resource to a
service group)
# hares -modify dg-mnt blockdevice=/dev/vx/rdsk/appsdg/appsvol (to add the block
device resource
to a service group)
# hares -modify dg-mnt fstype=vxfs (to add the mount point attributes to a
service group)
# hares -modify dg-mnt mount=/mnt/apps (to add the mount point
directory attribute to a
service group)
# hares -modify dg-mnt fsckopt=% y or %n (to add the fsck attribute either yes or
no to
service group)
(iv) Create links between the above diskgroup, volume and mount point resources.
# hares -link parent-res child-res
# hares -link dg-appdg dg-volume
# hares -link dg-volume dg-mnt
47. What is meant by freezing and unfreezing a service group with persistent and evacuate options?
Freezing :
If we want to apply patches to the system in a cluster, then we have to freeze the service group
because first stop the service group, if it is critical, the service group will move automatically to another
system in Cluster. So, we don't want to move the service group from one system to another system,
we have to freeze the service group.
Unfreeze :
After completing the task, the service group should be unfreezed because, if the is crashed or down
and the resources are critical, then the service group cannot move from system 1 to system 2 due to
freezed the service group and results in not available of application. If unfreezed the service group after
maintenance, the service group can move from system 1 to system 2. So, if system 1 failed, the
system2 is available and application also available.
Persistent option :
If the service group is freezed with persistent option, then we can stop or down or restart the
system. So, there is no loss of data and after restarted the system, the service group is remains in
freezed state only.
Example : # hasys -freeze -persistent <system name>
# hasys -unfreeze -persistent <system name>
Evacuate :
If this option is used in freezed service group system, if the system down or restarted the persisted
information is evacuated, ie., before freeze all the service groups should be moved from system 1
to another system 2.
48. What are the layouts are available in VxVM and how they will work and how to configure?
(i) There are 5 layouts available in VxVM. They are RAID-0, RAID-1, RAID-5, RAID-0+1 and
RAID-1+0.
RAID-0 :
We can configure RAID-0 in two ways.
(a) Stripped (default).
(b) Concatenation.
Stripped :
Page 175
RED-HAT LINUX 6/7
Logs :
* If the layout is mirror, then log is DRL.
* If the layout is RAID-5, then the log is RAID-5 log.
* The main purpose of the log is fast recovery operation.
* We have to specify whether the log is required or not in all types of layouts except RAID-5
because the logging is default in RAID-5.
* If we want to configure RAID-5 without logging then,
# vxassist -g <diskgroup name> make <volume name> 50GB, nolog layout=raid 5
* If the layout is other than RAID-5 then,
# vxassist -g <diskgroup name> make <volume name> 50GB, log layout=mirror
* If we want to add the log to the existing volume then,
# vxassist -g <diskgroup name> addlog logtype=drl or raid5
* If we want to remove the log from the existing volume then,
# vxassist -g <diskgroup name> rmlog <volume name>
49. What is read policy and how many types of read policies available?
Read policy means, how the disk or volume should be read when accessing the data.
Types of read policies :
(i) Select
(ii) Prefer
(iii) Round Robin
* By default the read policy is Round Robin.
# vxvol -g <diskgroup name> rdpol = < select/prefer/roundrobin <volume name>
50. What is your role in VxVM?
Normally, we get requests from application, development, production and QA people like,
Page 176
RED-HAT LINUX 6/7
Page 177
RED-HAT LINUX 6/7
53. How to install VxVM? What version of Veritas you are using and how to know the veritas version?
(i) Install the veritas supplied packages using # rpm or # yum commands.
(ii) Execute the command #vxinstall to install VxVM ie., enable the system to use volume
manager.
(iii) #vxinstall will allow us to encapsulate or not encapsulate the root disk.
(iv) Always use option 2 ie., Custom installation because, if option 1 is used ie., Quick installation, it
takes all the disks for rootdg.
License :
(i) All the licenses are stored in /etc/vx/licenses directory and we can take backup of this
directory and restore it back, if we need reinstall the server.
(ii) Removing VxVM package will not remove the installed license.
(iii) To install license # vxlicinst command is used.
(iv) To see the VxVM license information by # vxlicrep command.
(v) To remove the VxVM license by # vxkeyless set NONE command.
(vi)The license packages are installed in /opt/VRTSvlic/bin/vxlicrep directory.
(vii) The license keys are stored in /etc/vx/licenses/lic directory.
(viii) We can see the licenses by executing the below commands,
# cat /etc/vx/licenses/lic/key or
# cat /opt/VRTSvlic/bin/vxlicrep | grep "License key"
(ix) To see the features of license key by # vxdctl license command.
Version :
(i) We are using VxVM6.2 version.
(ii) to know the version of VxVM by # rpm -qa VRTSvxvm command.
54. What are the available formats to take the control of disks from O/S to veritas in VxVM?
We can take the control of disks from O/S to veritas in 3 formats.
(i) CDS (Cross platform Data Sharing and the default format in VxVM).
(ii) Sliced.
(iii) Simple.
(i) CDS :
(a) We can share the data between different Unix flavours.
(b) The private and public both regions are available in 7th partition.
(c) The entire space is in 7th partition.
(d) So, there is a chance to loss the data because, if the disk is failed ie., partition 7 is
corrupted or damaged then the data may be lost.
(e) This is the default in veritas volume manager.
(ii) Sliced :
(a) It is always used for root disk only.
(b) In this format we cannot share the data between different Unix flavours. Normally sliced
is used for root disk and cds is used for data.
(c) Private region is available at 4th partition and public region is available at 3rd partition.
(d) So, if public region is failed, we can recover the data from private region ie., minimizing
the data loss.
(iii) Simple :
(a) This format is not using widely now because, it is available in old VxVM 3.5
(b) In this private and public regions are available at 3rd partition.
Specifying the format while setup :
# vxdisksetup -i /dev/sda (to setup the disk and this is default format ie., CDS
format)
# vxdisksetup -i /dev/sdb format =<sliced / simple> (to specify sliced or
simple format)
55. In how many ways can we manage VxVM?
(I) Command line tool.
(ii) GUI (vea tool)
(iii) # vxdiskadm command (it gives the options to manage the disks)
30. RedHat Cluster
Page 178
RED-HAT LINUX 6/7
1. How can you define a cluster and what are its basic types?
A cluster is two or more computers (called nodes or members) that work together to perform a task.
There are four major types of clusters:
Storage
High availability
Load balancing
High performance
2. What is Storage Cluster?
Storage clusters provide a consistent file system image across servers in a cluster, allowing the servers to
simultaneously read and write to a single shared file system.
A storage cluster simplifies storage administration by limiting the installation and patching of applications to
one file system.
The High Availability Add-On provides storage clustering in conjunction with Red Hat GFS2
3. What is High Availability Cluster?
High availability clusters provide highly available services by eliminating single points of failureand by failing
over services from one cluster node to another in case a node becomes inoperative.
Typically, services in a high availability cluster read and write data (via read-write mounted file systems).
A high availability cluster must maintain data integrity as one cluster node takes over control of a service from
another cluster node.
Node failures in a high availability cluster are not visible from clients outside the cluster.
High availability clusters are sometimes referred to as failover clusters.
4. What is Load Balancing Cluster?
Load-balancing clusters dispatch network service requests to multiple cluster nodes to balance the request load
among the cluster nodes.
Load balancing provides cost-effective scalability because you can match the number of nodes according to
load requirements. If a node in a load-balancing cluster becomes inoperative, the load-balancing software
detects the failure and redirects requests to other cluster nodes.
Node failures in a load-balancing cluster are not visible from clients outside the cluster.
Load balancing is available with the Load Balancer Add-On.
5. What is a High Performance Cluster?
High-performance clusters use cluster nodes to perform concurrent calculations.
A high-performance cluster allows applications to work in parallel, therefore enhancing the performance of the
applications.
High performance clusters are also referred to as computational clusters or grid computing.
6. How many nodes are supported in Red hat 6 Cluster?
A cluster configured with qdiskd supports a maximum of 16 nodes. The reason for the limit is because
of scalability; increasing the node count increases the amount of synchronous I/O contention on the
shared quorum disk device.
7. What is the minimum size of the Quorum Disk?
The minimum size of the block device is 10 Megabytes.
8. What is the order in which you will start the Red Hat Cluster services?
In Red Hat 4 :
# service ccsd start
# service cman start
# service fenced start
service clvmd start (If CLVM has been used to create clustered volumes)
# service gfs start
# service rgmanager start
In RedHat 5 :
# service cman start
# service clvmd start
# service gfs start
# service rgmanager start
In Red Hat 6 :
# service cman start
# service clvmd start
Page 179
RED-HAT LINUX 6/7
Page 180
RED-HAT LINUX 6/7
Page 181
RED-HAT LINUX 6/7
Page 182
RED-HAT LINUX 6/7
Page 183
RED-HAT LINUX 6/7
NOTE: You can enable/disable the marked blue line by pressing "m".
top - 17:51:07 up 1 day, 2:56, 27 users, load average: 5.33, 29.71, 28.33
Tasks: 1470 total, 1 running, 1469 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.0%us, 0.1%sy, 0.0%ni, 99.9%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
Mem: 264114424k total, 253006956k used, 11107468k free, 66964k buffers
Swap: 33554424k total, 3260k used, 33551164k free, 245826024k cached
Explanation: The next line shows your memory(RAM and swap) usage and capacity.
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+
COMMAND
13916 stmprd 18 0 903m 129m 9936 S 51.4 0.1 3:07.01 java
13921 stmprd 18 0 901m 128m 9936 S 49.8 0.0 3:02.92 java
13825 stmprd 18 0 951m 190m 9932 S 49.5 0.1 3:07.13 java
13856 stmprd 20 0 978m 197m 9936 S 49.2 0.1 3:05.89 java
13853 stmprd 18 0 921m 150m 9932 S 48.5 0.1 3:09.14 java
13875 stmprd 18 0 907m 132m 9940 S 48.5 0.1 3:09.49 java
13937 stmprd 25 0 926m 165m 9936 S 48.2 0.1 3:10.31 java
13919 stmprd 18 0 917m 153m 9936 S 47.5 0.1 3:05.92 java
13879 stmprd 25 0 921m 160m 9936 S 47.2 0.1 3:08.43 java
13908 stmprd 25 0 901m 131m 9932 S 47.2 0.1 3:12.23 java
Page 184
RED-HAT LINUX 6/7
Page 185
RED-HAT LINUX 6/7
top - 18:04:26 up 1 day, 3:09, 27 users, load average: 37.12, 34.56, 33.44
Tasks: 1676 total, 1 running, 1675 sleeping, 0 stopped, 0 zombie
Cpu(s): 2.3%us, 76.7%sy, 0.0%ni, 19.7%id, 1.3%wa, 0.0%hi, 0.0%si, 0.0%st
Mem: 264114424k total, 262605184k used, 1509240k free, 77924k buffers
Swap: 33554424k total, 3256k used, 33551168k free, 252198368k cached
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+
COMMAND
1852 pmartprd 18 0 2005m 319m 4776 S 6.9 4.1 28:34.32
java
2493 pmartprd 16 0 1397m 289m 9.8m S 0.0 4.0 18:37.79
pmrepagent
20557 etlprd 15 0 911m 201m 3024 S 0.0 3.0 17:09.02
pmdtm.orig
18778 root RT 0 286m 188m 156m S 0.0 2.1 13:24.98
aisexec
5456 pmartprd 15 0 1182m 130m 8560 S 6.2 1.1 38:40.58
pmserver
16004 etlprd 14 -1 179m 83m 2636 S 0.0 0.1 9:41.36 db2bp
11272 stmprd 25 0 906m 67m 9736 S 99.7 0.0 0:48.11 java
4. Change the nice value (priority) of any task
To understand what is nice value follow the below link
What is nice and how to change the priority of any process in Linux?
Press "r" when top is running on the terminal. You should get a prompt as shown below in blue color.
top - 18:08:38 up 115 days, 8:44, 4 users, load average: 0.03, 0.03, 0.00
Tasks: 325 total, 2 running, 323 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.1%us, 6.4%sy, 0.0%ni, 93.3%id, 0.3%wa, 0.0%hi, 0.0%si, 0.0%st
Mem: 49432728k total, 2063848k used, 47368880k free, 310072k buffers
Swap: 2097144k total, 0k used, 2097144k free, 1297572k cached
PID to renice: 1308 [Hit Enter]
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+
COMMAND
5359 root 39 19 0 0 0 R 100.1 0.0 94:31:35
kipmi0
1308 deepak 16 0 29492 2292 1512 S 0.7 0.0 0:00.33 top
6116 root 15 0 369m 30m 11m S 0.7 0.1 77:24.97 cimserver
Give the PID whose nice value has to be changed and hit "Enter". Then give the nice value for the PID
top - 18:08:38 up 115 days, 8:44, 4 users, load average: 0.03, 0.03, 0.00
Tasks: 325 total, 2 running, 323 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.1%us, 6.4%sy, 0.0%ni, 93.3%id, 0.3%wa, 0.0%hi, 0.0%si, 0.0%st
Mem: 49432728k total, 2063848k used, 47368880k free, 310072k buffers
Swap: 2097144k total, 0k used, 2097144k free, 1297572k cached
Renice PID 1308 to value: -1 [Hit Enter]
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+
COMMAND
5359 root 39 19 0 0 0 R 100.1 0.0 9431:35
kipmi0
1308 deepak 16 0 29492 2292 1512 S 0.7 0.0 0:00.33 top
6116 root 15 0 369m 30m 11m S 0.7 0.1 77:24.97 cimserver
Verify the changes :
top - 18:09:06 up 115 days, 8:45, 4 users, load average: 0.13, 0.06, 0.01
Tasks: 325 total, 1 running, 324 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.0%us, 0.1%sy, 0.0%ni, 99.8%id, 0.1%wa, 0.0%hi, 0.0%si, 0.0%st
Page 186
RED-HAT LINUX 6/7
Page 187
RED-HAT LINUX 6/7
Page 188
RED-HAT LINUX 6/7
init
Verify the changes. You must see the screen buffer getting refresh much earlier or just to verify you
can provide a higher value of delay and observer the refresh rate on the terminal
8. No. of task to be displayed
By default this option is set to unlimited that is the reason your terminal is fully covered with list of
tasks when you run the top command. Any how you can list the no of tasks to be visible once you run top
command.
Press "n"when top is running. You should get a prompt as shown below in blue color
top - 18:18:07 up 115 days, 8:54, 4 users, load average: 0.01, 0.03, 0.00
Tasks: 328 total, 1 running, 327 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.0%us, 0.2%sy, 0.0%ni, 99.7%id, 0.1%wa, 0.0%hi, 0.0%si, 0.0%st
Mem: 49432728k total, 2063348k used, 47369380k free, 310072k buffers
Swap: 2097144k total, 0k used, 2097144k free, 1297804k cached
Maximum tasks = 0, change to (0 is unlimited): 2 [Hit Enter]
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+
COMMAND
5359 root 34 19 0 0 0 S 2.3 0.0 9432:08
kipmi0
1795 root 15 0 29492 2304 1528 R 0.7 0.0 0:00.65
top
1 root 15 0 10352 692 580 S 0.0 0.0 0:02.16
init
2 root RT -5 0 0 0 S 0.0 0.0 0:02.37
migration/0
top - 14:48:40 up 116 days, 5:24, 3 users, load average: 0.05, 0.04, 0.00
Tasks: 318 total, 1 running, 317 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.0%us, 0.1%sy, 0.0%ni, 99.9%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
Mem: 49432728k total, 2051952k used, 47380776k free, 310176k buffers
Swap: 2097144k total, 0k used, 2097144k free, 1293800k cached
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+
COMMAND
5359 root 34 19 0 0 0 S 1.0 0.0 9502:15
kipmi0
25009 prasadee 15 0 29492 2280 1516 R 0.3 0.0 0:01.88
top
Page 189
RED-HAT LINUX 6/7
Page 190
RED-HAT LINUX 6/7
Page 191