boot systems into different run levels for troubleshooting and system maintenance
Requirements for RHCT skills
Grub Boot loader
grub commands
a = append command
c = command line
b = boot into listed kernel
d = delete the current line
e = edit line
o = create next empty line
O = create empty line above
appending runlevel to grub command
Runlevel
Description
0
Halts the system
1
Activates SELinux; runs /etc/rc.sysinit, which checks and mounts filesystems; executes all scripts in the /etc/rc1.d directory
single
Single-user mode; activates SELinux; runs /etc/rc.sysinit, which checks and mounts filesystems
emergency
Emergency boot mode; activates SELinux; mounts only the root (/) filesystem
init=/bin/sh
Emergency boot mode; mounts only the root (/) filesystem
2
Multiuser mode with some networking; does not include some NFS functions, the automounter, or CUPS
3
Multiuser mode with networking; boots into a text login console
4
Generally unused; however, the defaults support near-identical settings to runlevel 3
5
Multiuser mode with the X Window; boots into an X-based login screen
6
Reboots the system
Incase init ramdisk missing of deleted
mkinitrd /boot/initrd-`uname -r`.img `uname -r`
troubleshooting boot problems with grub: to find boot loader file
find /grub/stage1
(hd0,0)
root
(hd0,0): Filesystem type is ext3
diagnose and correct misconfigured networking
check /etc/sysconfig/network
check /etc/sysconfig/network-scripts/ifcfg-eth?
service network restart
chkconfig network on
ifconfig -a
ping
netstat -nr
ping
ping
system-config-network
diagnose and correct hostname resolution problems
check /etc/nsswitch.conf
check /etc/resolv.conf
check /etc/hosts
dig @server google.com
system-config-network
configure the X Window System and a desktop environment
install X:
yum groupinstall "x window system"
install gnome:
yum groupinstall "gnome desktop environment"
To start from console / init 3:
startx
init respawn /etc/X11/prefdm -nodaemon to keep X running in runlevel 5
X configuration:
/etc/sysconfig/desktop
/etc/X11/xinit/xinitrc
/etc/X11/xinit/Xclients
~/.xinitrc
~./Xclients
configuring display:
system-config-display [--reconfig]
configuring display (text mode):
Xorg -configure
Xorg -probeonly
(X Font Server) xfs is required:
service xfs start
chkconfig xfs on
For xfs error messages, check:
~/.xsession-errors or /var/log/messages
make sure /tmp and /home are not full
To change desktop environment:
yum install switchdesk
switchdesk
if switchdesk is not available, edit /etc/sysconfig/desktop:
DISPLAYMANAGER=
DESKTOP=
To stop X without a reboot: Drop out to console
init 3
init 5
problems starting xclients, make sure DISPLAY vairable is correct:
export DISPLAY=localhost:0.0
add new partitions, filesystems, and swap to existing systems
manage partitions
fdisk
fdisk -l
partprobe (for system to reread partition table after fdisk writes)
filesystems
make filesystems:
mkfs.
label filesystems:
e2label /dev/sda6 /usr/local
find device from label:
findfs LABEL=
check/print filesystem info:
blkid
manage filesystem settings:
tune2fs
to print details:
dumpe2fs
add swap
add swap partition through fdisk (id 82), then
partprobe
mkswap
# add partition into /etc/fstab
swapon -va
verify the following line exists in /etc/nsswitch.conf:
automount: files nisplus
define an autofs-controlled mountpoint called test by adding the following to /etc/auto.master:
/test /etc/auto.test
create /etc/auto.test:
vi /etc/auto.test
:/
reload autofs:
service autofs restart
try accessing:
ls /test/
# redhat defaults
ls /net/
ls /misc/cd
add and manage users, groups, quotas, and File Access Control Lists
If the /etc/nologin file exists, regular users are not allowed to log into the local console. Any regular user that tries to log in gets to read the contents of /etc/nologin as a message
configure filesystem permissions for collaboration
create group:
groupadd -g #
add users to group:
usermod -g
chown dir:
chown root:
chmod dir SGID:
chmod <2770|g+s>
install and update packages using rpm
install:
rpm -ivh
update:
rpm -Uvh
freshen:
rpm -Fvh
remove:
rpm -e
query by filename:
rpm -qf /path/to/file
verify file:
rpm -Vf /path/to/file
query all installed:
rpm -qa
Find out what files have been modified since package install
rpm -qf /etc/inittab
rpm -V -p init-scripts*.rpm
query all files associated
rpm -ql squid | grep ncsa
while inside the rescue environment, use the –-root option to specify the real location of your root file system (e.g. –-root=/mnt/sysimage).
properly update the kernel package
install new kernel:
yum install kernel
rpm -ivh
check grub conf has been updated:
less /boot/grub/grub.conf
configure the system to update/install packages from remote repositories using yum or pup
edit the yum repo conf /etc/yum.repos.d/:
[id]
name=the name of your repo
baseurl=http://locationofyourrepo.example/repo
enabled=1
gpgcheck=0
modify the system bootloader
Main configuration is in /boot/grub/grub.conf
see examples in /usr/share/doc/grub-*/menu.lst
/boot/grub/grub.conf = default=0 (references system kernel to boot into)
to create new init ram disk:
mkinitrd /boot/initrd-`uname -r`.img `uname -r`
implement software RAID at install-time and run-time
to use software raid, we need two devices/partitions set to “linux raid autodetect”, use fdisk and set partition type to “fd”
create a raid device:
mdadm --create /dev/md0 -a yes --level=<0|1|4|5|6||10> --raid-devices=2 /dev/sda7 /dev/sda8
Watch the -a yes for udev to create device file on reboot
format raid device:
mkfs.ext3 /dev/md0
remove disk from array:
mdadm /dev/md0 --remove
add disk to array:
mdadm /dev/md0 --add
fail a disk:
mdadm /dev/md0 --fail
stop array:
mdadm --stop /dev/md0
check status:
mdadm --detail /dev/md0
cat /proc/mdstat
Remember to add raid device into /etc/fstab and check mounting device
use /proc/sys and sysctl to modify and set kernel run-time parameters
config in /etc/sysctl.conf
# search for options
sysctl -a | grep
use scripting to automate system maintenance tasks
Need to look into what is reqired here ?
configure NTP for time synchronization with a higher-stratum server
Redhat config tool:
system-config-date
config file locate /etc/ntp.conf
configuration server example:
server 0.pool.ntp.org
server 1.pool.ntp.org
server 2.pool.ntp.org
apply changes after config change:
service ntpd restart
chkconfig ntpd on
verify changes:
ntpq -p
RHCE Skills Required
Troubleshooting and System Maintenance
use the rescue environment provided by first installation CD
boot into rescue mode:
linux rescue
when working in non-chrooted environment:
mount /dev/hdc /mnt/cdrom to access install dvd
rpm commands require -root=/mnt/sysimage
manually make /dev and /proc available in chrooted mode:
mount -o bind /dev /mnt/sysimage/dev
mount -o bind /proc /mnt/sysimage/proc
diagnose and correct boot failures arising from bootloader, module, and filesystem errors
check the following in order:
MBR
/boot/grub/grub.conf
/etc/fstab
/etc/inittab
/etc/rc.d/rc.sysinit
/etc/rc.d/rc?.d
/etc/rc.d/init.d/*
/etc/rc.d/rc.local
grub errors
in general, use the last line before the error message to see where grub error'd out
to find correct value for root option, type find /grub/stage1 at the grub command line ( remember that all file names in grub.conf are relative to the root option)
check for missing files in kernel and/or initrd lines
kernel errors
missing/corrupt initrd file results in: kernel panic - not syncing: vfs: unable to mount root fs on unknown-block
invalid root parameter for kernel results in: setuproot: error mounting /proc: No such file or directory
reinstall grub on MBR:
grub-install
new initrd:
mkinitrd /boot/initrd-`uname -r`.img `uname -r`
corrupt filesystem:
fsck
if fsck is unable to locate a superblock, you can specify an alternative one: :
dumpe2fs
fsck -b
diagnose and correct problems with network services (see Installation and Configuration below for a list of these services)
check which process on listening on what port:
netstat -ntaupe | grep LIST
add, remove, and resize logical volumes
redhat lvm tool:
system-config-lvm
create physical volume partition:
fdisk
Command (m for help) : t
Partition number (1-4)
2
Partition ID (L to list options): 8e
Command (m for help) : w
create physical volume:
pvcreate
create volume group:
vgcreate
extend volume group:
vgextend
create logical volume:
lvcreate --size 10G --name
mkfs.ext3 /dev//
# add to /etc/fstab
extend logical volume:
lvextend --size 12G /dev//
resize2fs /dev//
shrink logical volume:
resize2fs M
lvreduce --size M
remove logical volume:
lvremove
display volumegroup info:
vgdisplay
diagnose and correct networking services problems where SELinux contexts are interfering with proper operation
enable/disable SELinux in /etc/sysconfig/selinux:
SELINUX=enforcing
SELINUXTYPE=targeted
install setroubleshoot:
yum install setroubleshoot
service setroubleshoot start
chkconfig setroubleshoot on
install selinux management tool:
yum install policycoreutils-gui
redhat selinux management tool:
system-config-selinux
change selinux status:
setenforce
launch setroubleshoot gui browser:
sealert -b
list selinux booleans:
getsebool -a
list selinux errors:
sealert -a /var/log/ | less
set selinux boolean:
setsebool -P = <0|1>
list security contexts:
ls -Z
change security contexts:
# using reference (copy contexts from existing known-good file)
chcon -R --reference
# manual
chcon -R -u
chcon -R -t
# check the local pwdb (default)
security = user
# member server of a domain (uses DC as pwdb)
security = domain
password server =
workgroup =
# member of active directory domain
security = ads
password server = kerberos.domain.com
realm = EXAMPLE.COM
# use pwdb on another server thats not a DC
security =
share options:
[]
# path for share
path =
# share is visible
browseable =
# rw enabled
writeable =
# this is a shared printer
printable =
# all users connecting to this share use as their primary group
group =
join domain:
net rpc join -U root
fstab example:
/// cifs user=,pass= 0 0
mount commands:
# root only
mount -o username= "//server/share"
# users mount command
/sbin/mount.cifs //server/share -o username=
/sbin.mount.cifs & /sbin/umount.cifs require a chmod u+s to allow to be used by non-root users
host-based security
firewall:
protocol
port
tcp
139,445
udp
137,138
hosts allow/deny can be used per-server or per-share:
# add account (local linux account must exist first, or be translated via /etc/samba/smbusers):
smbpasswd -a
# enable/disable account:
smbpasswd -e
smbpasswd -d
# remove account:
smbpasswd -x
service smb reload may be needed after account changes
verify service functionality
list shares:
smbclient -L -U
browse shares:
smbclient /// -U
test allow/deny statements for a host:
testparm /etc/samba/smb.conf
NFS
install
yum install portmap nfs-utils
service nfs start
chkconfig portmap on
chkconfig nfs on
chkconfig nfslock on
chkconfig netfs on
selinux
Support for read-write access:
setsebool -P nfs_export_all_rw=1
basic config
redhat tool:
yum install system-config-nfs
system-config-nfs
/etc/exportfs format:
() [() ...]
activate exports:
service nfs restart
host-based security
edit /etc/sysconfig/nfs to set static ports, and restart
set host / network restrictions per export in /etc/exports
Add the following to /etc/hosts.allow:
portmap:
mountd:
rpc.statd:
firewall config:
# see ports (include ALL tcp-udp ports)
rpcinfo -p
user-based security
use normal file permissions
verify service functionality
list exports:
showmount -e
FTP
install
yum install vsftpd
service vsftpd start
chkconfig vsftpd on
selinux
allow local users to login to ftp and access local home dir:
# enable the following auth_param options
auth_param basic program /usr/lib/squid/ncsa_auth /usr/etc/passwd
auth_param basic children 5
auth_param basic realm Squid proxy-caching web server
auth_param basic credentialsttl 2 hours
auth_param basic casesensitive off
# change the acl to reflect auth_param
acl proxy_auth REQUIRED
# finally edit the http_access line
http_access allow
Allow squid to read htpasswd file:
chmod o+s /usr/etc/passwd
verify service functionality
squid -z
service squid start
HTTP_PROXY=hostname:port elinks
SMTP
install
yum install postfix
service sendmail stop
chkconfig sendmail off
alternatives --config mta
service postfix start
chkconfig postfix on
outbound address rewriting in hash:/etc/postfix/generic:
@@
# enable outbound rewriting in main.cf
smtp_generic_maps = hash:/etc/postfix/generic
Remember to postmap hash:/etc/postfix/generic
host-based security
use iptables -s !
to block hosts
protocol
port
tcp
25
user-based security
copy postfix configuration from doc example /usr/share/doc/postfix-*/README_SASL*, and make sure MECH=PAM is configured in /etc/sysconfig/saslauthd
enable saslauthd:
service saslauthd start
chkconfig saslauthd on
restart postfix:
postfix reload
verify service functionality
test smtp:
telnet 25
ehlo me
# check for 250-AUTH ... info
IMAP,IMAPS/POP3
install
yum install dovecot
service dovecot start
chkconfig dovecot on
config
enable which protocols are to be used:
protocols = "list of protocols"
create the ssl certificate:
# edit cert settings
vi /etc/pki/dovecot/dovecot-openssl.cnf
/usr/share/doc/dovecot-*/examples/mkcert.sh
service dovecot restart
host-based security
use iptables -s !
to block hosts
protocol
port
tcp
143,110,995,993
user-based security
use pam_listfile in /etc/pam.d/dovecot
verify service functionality
test mailbox access:
mutt -f ://@
SSH
install
yum install openssh-server
chkconfig sshd on
host-based security
enable only local network through firewall (iptables):
# first we need to remove last reject rule
cat /etc/sysconfig/iptables
# Copy bottom reject rule to clipboard
iptables -D
iptables -A -s 192.168.1.0/24 -p tcp --dport 22 -j ACCEPT
iptables -A
service iptables save