+ All Categories
Home > Documents > Install Linux

Install Linux

Date post: 01-Feb-2016
Category:
Upload: pratyush
View: 222 times
Download: 0 times
Share this document with a friend
Description:
linx
Popular Tags:
37
Linux Installation
Transcript
Page 1: Install Linux

Linux Installation

Page 2: Install Linux

What this is about

Workshop on: System installation & customization System maintenance System performance & monitoring

Workshop does not deal with issues of: System Security IDS Packet filtering using iptables

Page 3: Install Linux

Overview

The object of this seminar is to provide comprehensive check list of the more important steps to be taken to install a linux system.

cont...

Page 4: Install Linux

Overview continued

Although the labs can be done without a lot of background in UNIX systems programming, it is advisable to have some basic concepts of the following topics:

1. Basic scripts2. Sed and awk expressions3. Regular expressions4. Setting up UDP and TCP sockets

Page 5: Install Linux

Overview cont.

5. Setting up DNS servers6. Setting up a web server

Enjoy the seminar

Raj NagendraWilliam Zereneh

Page 6: Install Linux

Introduction

1. System Installation and Customization 2. System Maintenance 3. System Performance and Monitoring

Page 7: Install Linux

1. Installation and Customization

Hardware compatibility

Disk space

Installation method

Installation class

Personal Desktop Installation

Workstation Installation

Server Installation

Custom Installation

Upgrade

Page 8: Install Linux

1. Installation and Customization

Hardware Information

Where to get information about hardware

Record your system's hardware

Page 9: Install Linux

1. Installation and Customization

The Graphical Installation Program Virtual Consoles

The Text Mode Installation Program Keyboard Navigation Displaying Online Help

Starting the Installation Program Booting the Installation Program

Selecting an Installation Method Installing from CD-ROM

Problems detecting the CD-ROM

Page 10: Install Linux

1. Installation and Customization

Installing from a Hard Drive Preparing for a Network Installation

Server setup Installing via NFS Installing via FTP Installing via HTTP Welcome to RedHat Linux Language Configuration Keyboard Configuration Mouse Configuration

Page 11: Install Linux

1. Installation and Customization

Choosing to Upgrade or Install Installation Type Disk Partitioning Setup Automatic Partitioning Partitioning Your System

Graphical Display of Hard Drive(s) Disk Druid's Buttons Partition Fields Recommended Partition Scheme Adding/Editing/Deleting Partitions

Page 12: Install Linux

1. Installation and Customization

Boot Loader Configuration Advanced Boot Loader Configuration Rescue Mode Alternative Boot Loaders SMP Motherboards, GRUP, and LILO

Network Configuration Firewall Configuration Language Support Selection Time Zone Configuration Set Root Password

Page 13: Install Linux

1. Installation and Customization

Authentication Configuration Package Group Selection

Selecting Individual Packages Unresolved Dependencies

Preparing to Install Installing Packages Boot Diskette Creation Video Card Configuration X Configuration – Monitor and

Customization Installation Complete

Page 14: Install Linux

1. Installation and Customization

Configuring a Dual-Boot System Allocating Disk Space for Linux

Add a New Hard Drive Use an Existing Hard Drive or Partition Create a New Partition

Installing Red Hat Linux in a Dual-Boot Environment

Disk Partitioning Configuring the Boot Loader Post-Installation

Partitioning with parted Partitioning a Windows System

Page 15: Install Linux

1. Kerberos

Kerberos is a network authentication protocol created by MIT which uses symmetric key cryptography.

Design goal is to eliminate the need to send passwords over the network

Advantages Conventional networks require password-based

authentication schemes Such schemes requires username and password Transmission of authentication information for many services

is unencrypted KERBEROS NEVER SENDS PASSWORDS ACROSS THE

NETWORK

Page 16: Install Linux

1. Kerberos Cont.

Disadvantages Implementation is difficult Account information migration from UNIX password database

to a Kerberos password can be tedious Partial compatibility with Pluggable Authentication Modules

PAM Applications need to be modified to utilize Kerberos Assumes a trusted user using an untrusted host on an

untrusted network, but if Key Distribution Center (KDC) is compromised, then the entire Kerberos authentication system will be at risk.

All or nothing solution. must use PAM or kerberized versions of all clients/server applications

Page 17: Install Linux

1. Kerberos Cont.

How does it work? Three-way authentication, client/server and KDC User authenticate to a service by sending a request to KDC KDC sends a Ticket Granting Ticket (TGT) encrypted with

user's key back to user Services (kinit,klogin,..) on the client machine then decrypts

the TGT using the user's key (which is derived from the user's password). User's key is used only on the client machine, never sent on the network.

If client provides correct password, then TGT will be decrypted and therefore used for subsequent request, otherwise authentication fails.

The TGT is set to expire after a certain period of time defined by Network Administrator

Page 18: Install Linux

2. System Maintenance

Update Packages - up2date Install/Remove Packages - RPM Resize Existing Partition – resize2fs

NOTE: boot into rescue mode Create New Partition - fdisk Mount File System Create Swap File/Partition

dd if=/dev/zero of=/swapfile bs=1M count=512 mkswap /swapfile swapon /swapfile Make it Permanent: edit /etc/fstab and add:

/swapfile none swap defaults 0 0

Page 19: Install Linux

2. System Maintenance

Run levels /etc/inittab Change run level for system maintenance

Halt System: /sbin/init 0 Single User: /sbin/init 1 Multiuser: /sbin/init 2 Full Multiuser: /sbin/init 3 Graphical: /sbin/init 5 Reboot System: /sbin/init 6

Page 20: Install Linux

2. System Maintenance

Booting Into Rescue Mode Why? Forgotten root password

Boot from CD-ROM, at the prompt type linux rescue mount root filesystem, if not already mounted chroot /mountpoint passwd

Why? New updated kernel is not booting Boot from CD-ROM, at the prompt type linux rescue mount boot filesystem, if not already mounted edit /boot/grub/grub.conf change option to boot old kernel

Emergency boot option linux -b

Page 21: Install Linux

2. System Maintenance

File system maintenance Rotate /var/log files Remove stale files from /tmp

Documentation Policies Procedures Changes

Network maintenance Keep Firewall up-to-date Keep services up-to-date

Page 22: Install Linux

2. System Maintenance

Planning for Disaster Disaster: Unplanned event that disrupts the

normal operation of the organization Types of Disasters

Hardware failures Software failures Environmental failures Human errors

Backups To restore individual file To restore entire file system

Page 23: Install Linux

2. System Maintenance

Type of Backups Full backup

Every single file is written to backup media Incremental backup

Only modified files are written to backup media Differential backup - Cumulative

Modified files will continue to be included in all subsequent differential backups

Backup Media Tape Disk Network

Page 24: Install Linux

2. System Maintenance

Backup Technologies tar

tar vcf /mnt/backup/home.backup.tar /home/tar vzcf /mnt/backup/home.backup.tar /home/

cpiofind /home/ | cpio -o > /mnt/backup/home.backup.cpiofind /home/ -atime +365 | cpio -o >

/mnt/backup/home.backup.cpio AMANDA – Advanced Maryland Automatic Disk

Archiver A client/server based backup application Single backup server; multiple clients

Page 25: Install Linux

3. System Performance and Monitoring

Tuning IDE Hard Disk Performance Put swap partition near the beginning of hard

drive Hard disk read timing

/sbin/hdparm -t /dev/hdaX Enable 32-bit Transferes

/sbin/hdparm -c1 /dev/hdX Enable DMA “using_dma” flag

/sbin/hdparm -d1 /dev/hdX Show information

/sbin/hdparm -i /dev/hdX

Page 26: Install Linux

3. System Performance and Monitoring

Network Change the following TCP/IP values

edit /etc/sysctl.conf change/add

# Decrease the time default value for tcp_fin_timeout connection net.ipv4.tcp_fin_timeout = 30 # Decrease the time default value for tcp_keepalive_time connection net.ipv4.tcp_keepalive_time = 1800 # Turn off the tcp_window_scaling net.ipv4.tcp_window_scaling = 0 # Turn off the tcp_sack net.ipv4.tcp_sack = 0 # Turn off the tcp_timestamps net.ipv4.tcp_timestamps = 0 Restart network - /etc/init.d/network restart

Page 27: Install Linux

3. System Performance and Monitoring

File System ext3 over ext2

/bin/umount /dev/hdaX/sbin/tune2fs -j /dev/hdaXedit /etc/fstab change ext2 to ext3 for /dev/hdaX/bin/mount /dev/hdaX

Maximum number of file handles allocated by the kernel - file-max parameter

Aprox: 256 file for every 4M Edit /etc/sysctl.conf add/change

# Improve the number of open filesfs.file-max = 8192 # for a 128M machine

Page 28: Install Linux

3. System Performance and Monitoring

Access Time Linux records information about when files were

created, last modified and last accessed Highly accessed files should have atime

attribute removed /usr/bin/chattr -R +A /var/spool/ noatime mount parameter edit /etc/fstab and add noatime option

/dev/hdaX /chroot ext3 defaults,noatime 1 2

Page 29: Install Linux

3. System Performance and Monitoring

Resource Monitoring What to Monitor? Resources

CPU Power Bandwidth Memory Storage

Utilities to use for CPU, Bandwidth and Memory free top vmstat

Page 30: Install Linux

3. System Performance and Monitoring

free – The free command displays system memory utilization

Example: total used free shared buffers cachedMem: 255508 240268 15240 0 7592

86188-/+ buffers/cache: 146488 109020Swap: 530136 26268 503868

Automate free/usr/bin/watch -n 1 -d free

Page 31: Install Linux

3. System Performance and Monitoring

top – Displays CPU utilization, process statistics, memory utilization

example

14:18:52 up 16 days, 21:37, 1 user, load average: 0.07, 0.02, 0.0071 processes: 70 sleeping, 1 running, 0 zombie, 0 stoppedCPU0 states: 0.0% user 0.0% system 0.0% nice 0.0% iowait 100.0% idleCPU1 states: 2.0% user 6.0% system 0.0% nice 0.0% iowait 90.0% idleMem: 513232k av, 505424k used, 7808k free, 0k shrd, 66464k buff 379364k actv, 0k in_d, 12044k in_cSwap: 417648k av, 108724k used, 308924k free 325384k cached

PID USER PRI NI SIZE RSS SHARE STAT %CPU %MEM TIME CPU COMMAND18866 root 20 0 984 984 788 R 6.5 0.1 0:00 1 top

Page 32: Install Linux

3. System Performance and Monitoring

vmstat – Display process, memory, swap, I/O, system and CPU activity

example: procs memory swap io system cpu r b w swpd free buff cache si so bi bo in cs us sy id 0 0 0 108724 6400 66452 325664 0 0 5 6 10 10 2 1 8

r – Runnable processes stateb – Uninterruptible sleep statew – Swaped out, but runnable

si – swaped inso – swaped out

Page 33: Install Linux

3. System Performance and Monitoring

Other monitoring tools The Sysstat suite

/usr/bin/iostat/usr/bin/mpstat/usr/bin/sar

Page 34: Install Linux

3. System Performance and Monitoring

Storage Utilities to use for Storage

smartd/smartctl df du badblocks

smartd – is a daemon that monitors the Self-Monitoring, Analysis and Reporting Technology System (S.M.A.R.T.) built into ATA-3 and later IDE and SCSI-3 hard drive.

/usr/sbin/smartctl -i /dev/hdaDevice: Maxtor 90650U2 Supports ATA Version 5Drive supports S.M.A.R.T. and is enabled

Page 35: Install Linux

3. System Performance and Monitoring

df – Disk free/bin/dfFilesystem 1K-blocks Used Available Use% Mounted on/dev/hda5 5578804 4279424 1298180 77% //dev/hda1 108868 9899 93348 10% /bootnone 256616 0 256616 0% /dev/shm

du – Disk usage/usr/bin/du /tmpdu /tmp/4 /tmp/screens/S-root8 /tmp/screens.....4 /tmp/ssh-XXa4kqTn4 /tmp/uscreens/S-donkey8 /tmp/uscreens88 /tmp

Page 36: Install Linux

3. System Performance and Monitoring

Other monitoring tools smartd Big Brother - bb Multi Router Traffic Grapher - mrtg logwatch .....

Page 37: Install Linux

References

www.redhat.com www.disasterplan.com www.amanda.org www.linux-backup.net http://web.mit.edu/kerberos/


Recommended