ditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available
at http://www.opencontent.org/openpub/).
Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder.
Distribution of the work or derivative of the work in any standard (paper) book form for commercial
purposes is prohibited unless prior permission is obtained from the copyright holder.
Red Hat, Red Hat Network, the Red Hat "Shadow Man" logo, RPM, Maximum RPM, the RPM logo,
Linux Library, PowerTools, Linux Undercover, RHmember, RHmember More, Rough Cuts, Rawhide
and all Red Hat-basedtrademarks and logos are trademarks orregisteredtrademarks of Red Hat, Inc.
in the United States and other countries.
Linux is a registered trademark of Linus Torvalds.
Motif and UNIX are registered trademarks of The Open Group.
Itanium is a registered trademark of Intel Corporation.
Netscape is a registered trademark of Netscape Communications Corporation in the United States and
other countries.
Windows is a registered trademark of Microsoft Corporation.
SSH and Secure Shell are trademarks of SSH Communications Security, Inc.
FireWire is a trademark of Apple Computer Corporation.
S/390 and zSeries are trademarks of International Business Machines Corporation.
All other trademarks and copyrights referred to are the property of their respective owners.
Printed in Canada, Ireland, and Japan
ii
Contents
Red Hat Network
Introduction................... ..................... ..................... ..................... . v
Document Conventions.................................................................... v
More to Come .............................................................................. viii
Chapter 1What is Red Hat Network? . ..................... .............. 9
Welcome to the Red Hat Network User Reference Guide 3.1.
The Red Hat Network User Reference Guide will guide you through registering your system for Red
Hat Network and using its many features. Depending on which version of Red Hat Linux you have
installed, the Red Hat Network Registration Client and the Red Hat Update Agent might be
different than the ones described in this manual as new features are added. All version of this manual
are available in HTML and PDF formats at http://www.redhat.com/docs/manuals/RHNetwork/. Once
you use Red Hat Network to update these applications, you can use the latest version of this manual.
This version of the manual covers version 2.7.0 of the Red Hat Update Agent and version 1.5.0 of the
Red Hat Network Registration Client.
For a more detailed, technical overview of Red Hat Network, please refer to the Red Hat NetworkTechnical Paper available at http://www.redhat.com/products/network/.
Document Conventions
When you read this manual, you will see that certain words are represented in different fonts, typefaces, sizes and weights. This highlighting is systematic; different words are represented in the same
style to indicate their inclusion in a specific category. The types of words that are represented this way
include the following:
command
Linux commands (and other operating system commands, when used) are represented this way.
This style should indicate to you that you can type in the word or phrase on the command line
and press
displayed in a different style on their own (e.g., filenames). In these cases, they are considered
to be part of the command, so the entire phrase will be displayed as a command. For example:
Use the cat testfile command to view the contents of a file, named testfile, in the
current working directory.
filename
Filenames, directory names, paths and RPM package names are represented this way. This style
should indicate that a particular file or directory exists by that name on your Red Hat Linux
system. Examples:
The .bashrc file in your home directory contains bash shell definitions and aliases for your
own use.
The /etc/fstab file contains information about different system devices and filesystems.
[Enter] to invoke a command. Sometimes a command contains words that would be
viIntroduction
The /usr/share/doc directory contains documentation for various programs.
Install the webalizer RPM if you want to use a Web server log file analysis program.
application
This style should indicate to you that the program named is an end-user application (as opposed
to system software). For example:
Use Netscape Navigator to browse the Web.
[key]
A key on the keyboard is shown in this style. For example:
[Tab]
To use
completion, type in a character and then press the [Tab] key. Your terminal will
display the list of files in the directory that start with that letter.
[key]-[combination]
A combination of keystrokes is represented in this way. For example:
The
[Ctrl]-[Alt]-[Backspace] key combination will restart the X Window System.
text found on a GUI interface
A title, word or phrase found on a GUI interface screen or window will be shown in this style.
When you see text shown in this style, it is being used to identify a particular GUI screen or an
element on a GUI screen (e.g., text associated with a checkbox or field). Examples:
On the GNOME
Selectthe
Control Center screen, you can customize your GNOME window manager.
RequirePasswordcheckbox if you would like your screensaverto require a password
before stopping.
top level of a menu on a GUI screen or window
When you see a word in this style, it indicates that the word is the top level of a pulldown menu.
If you click on the word on the GUI screen, the rest of the menu should appear. For example:
Settings on a GNOME terminal, you will see the following menu items: Preferences,
Under
Reset Terminal, Reset and Clear, and Color selector.
If you need to type in a sequence of commands from a GUI menu, they will be shown like the
following example:
Click on
button on a GUI screen or window
Programs=>Applications=>Emacs to start the Emacs text editor.
This style indicates that the text will be found on a clickable button on a GUI screen. For example:
Section 0.1:Document Conventionsvii
Click on the Back button to return to the Web page you last viewed.
computer output
When you see text in this style, it indicates text displayed by the computer on the command line.
You will see responses to commands you typed in, error messages and interactive prompts for
your input during scripts or programs shown this way. For example:
Use the ls to display the contents of a directory:
The output returned in response to the command (in this case, the contents of the directory) is
shown in this style.
prompt
A prompt, which is a computer’s way of signifying that it is ready for you to input something,
will be shown in this style. Examples:
$
#
[stephen@maturin stephen]$
leopard login:
user input
Text that the user has to type, either on the command line, or into a text box on a GUI screen, is
displayed in this style. In the following example, text is displayed in this style:
To boot your system into the text based installation program, you will need to type in the text
command at the boot: prompt.
Another example, with the word root displayed as something the user needs to type in:
If you need to log in as root when you first log into your system, and you are using the graphical
login screen, at the Login prompt, type root. At the Password prompt, type in the root
password.
Additionally,we use several different strategies to draw your attention to certain pieces of information.
In order of how critical the information is to your system, these items will be marked as a note, a
caution or a warning. For example:
viiiIntroduction
Note
Remember that Linux is case sensitive. In other words, a rose is not a ROSE
is not a rOsE.
CAUTION
Do not do routine tasks as root — use a regular user account unless you need
to use the root account to administer your system.
WARNING
If you choose not to partition manually, a server installation will remove
all existing partitions on all installed hard drives. Do not choose this
installation class unless you are sure you have no data you need to save.
More to Come
The Red Hat Network User Reference Guide is constantly expanding as newRed Hat Network features
and service plans are launched.
Send in Your Feedback
If you would like to make suggestions about the Red Hat Network User Reference Guide, please mention this guide’s identifier:
RHNurg(EN)-3.1-Print-RHI (2001-09-05T14:52-0400)
You can send mail to:
rhn-feedback@redhat.com
What is Red Hat Network?9
1What is Red Hat Network?
Have you ever read about a new version of a software package and wanted to install it but could not
find it?
Haveyou ever tried to find an RPM through an Internet search engine or an RPM Repository and been
linked to a site that you have never heard of?
Have you ever tried to find an RPM but instead you are only able to find the source files that you have
to compile yourself?
Haveyoueverspenthours or even days visiting different websites to see if you havethelatest packages
installed on your system, only to have to do it again in a few months?
Those days are over with Red Hat Network (RHN). RHN provides the solution to all your system
software management needs.
Red Hat Network is an Internet solution for managing a Red Hat Linux system or a network of Red
Hat Linux systems. All Security Alerts, Bug Fix Alerts, and Enhancement Alerts (collective known
as Errata Alerts) can be downloaded directly from Red Hat. You can even have updates automatically
delivered directly to your system as soon as they are released.
The three main components of Red Hat Network are as follows:
•The Red Hat Network Registration Client
•The Red Hat Network user interface
•Red Hat Network Daemon
The Red Hat Network Registration Client allows you to create a unique RHN user name and password and probes the hardware and software on your system to create a System Profile. The System
Profile is sent to RHN and RHN returns a unique System ID to your system (see Chapter 2,
Network Registration Client
You can use either of the two Red Hat Network user interfaces:
•Software Manager Web interface available at http://rhn.redhat.com
•The Red Hat Update Agent
Both the Webinterfaceand the Red Hat UpdateAgent allow you to view all Errata Alerts included in
the Red Hat Errata list. Only packages relevant to your system are shown. Red Hat Network can also
be configured to verify packages once downloaded, ignore update notifications for certain packages,
and view package details before downloading them.
for further information).
Red Hat
10Chapter 1:What is Red Hat Network?
The Red Hat Network Daemon (rhnsd) runs in the background as a service and probes the Red Hat
Network for notifications and updates at set time intervals (see Chapter 6, Red Hat Network Daemon
for further information).
Many Red Hat Network terms are used throughout this manual. As you read the Red Hat NetworkUser Reference Guide, refer to the Glossary as necessary for explanation of common terms.
1.1 Software Manager
The first subscription service offered through Red Hat Network is Software Manager. Additional
service offerings will be available in the near future. Registering a system with Red Hat Network is
free as well as one subscription to Software Manager. Additional subscription to Software Manager
can be purchased at http://rhn.redhat.com/purchase_info.pxt.
With each Software Manager subscription, you receive:
•Errata Alerts — learn when Security Alerts, Bug Fix Alerts, and Enhancement Alerts are issued
for all the systems in your network through the Software Manager interface
•Automatic email notifications — receive an email notification when an Errata Alert is issued for
your system
•Scheduled Errata Updates — schedule delivery of Errata Updates with optional automatic installation
•Package installation — Schedule package installation on one or more systems with the click of a
button.
•Red Hat Update Agent — use the Red Hat Update Agent to download the lastest software
packages for your system with optional installation of packages
1.2 Automatic Notifications
During registration, you can configure Red Hat Network to send you email notifications of new and
updated software packages. Automated notifications of the latest updates:
•Reduce the time and effort required by system administrators to stay on top of the Red Hat errata
list
•Minimize security vulnerabilities in your network by providing the patches as soon as Red Hat
releases them
•Filter out package updates not relevant to your network
•Provide a reliable method of managing multiple systems with similar configurations
Section 1.4:Before You Begin11
1.3 Security, Quality Assurance, and Red Hat
Network
Red Hat Network provides significant benefits to your network including security and quality assurance. All transactions made between you and Red Hat Network are encrypted, and all RPM packages
are signed with Red Hat’s GNU Privacy Guard (GPG) signature to ensure authenticity.
Red Hat Network incorporates the following security measures:
1.Your System Profile available at http://rhn.redhat.com is only accessible with the correct user
name and password.
2. A Digital Certificate stored on the client system in the file /etc/sysconfig/rhn/systemid
after registration is used to authenticate the system during each transaction between the client and
Red Hat Network.
3. All notifications and information messages are signed by Red Hat with an electronic signature using GPG. The rpm utility can be used to verify the authenticity of the package before it is installed.
4.All transactions are encrypted using a Secure Sockets Layer (SSL) connection.
5. All packages are tested and verified by the Red Hat Quality Assurance Teambefore they are added
to the Red Hat errata list and Red Hat Network.
1.4 Before You Begin
Red Hat Network is available for Red Hat Linux 6.2 and higher. For instructions on configuring Red
Hat Linux 6.2 for Red Hat Network, refer to Chapter 7, Using Red Hat Network with Red Hat Linux
6.2.
By default, all the software packages you need to use Red Hat Network are installed with Red Hat
Linux 7 and higher. However, if you chose not to install them during the installation process or performed an upgrade from Red Hat Linux 6.2 or lower, you might not have the Red Hat Network
Registration Client or the Red Hat Update Agent installed. To verify that the Red Hat Network
Registration Client is installed, type the following command:
rpm -q rhn_register
If the Red Hat Network Registration Client is installed, it will return something similar to
rhn_register-1.5.0-1
The version number might differ slightly if you have a newer version installed.
If you do not have Red Hat Network Registration Client installed, the command will return
12Chapter 1:What is Red Hat Network?
package rhn_register is not installed
Perform this check for every package in Table 1–1, Red Hat Network Packages. If you do not want to
use the graphical versions, you do not have to install the two packages ending in gnome.
Table 1–1Red Hat Network Packages
Package NameDescription
rhn_register
Provides the Red Hat Network Registration Client program and the
text mode interface
rhn_register-gnome
Provides the GNOME interface (graphical version) for the Red HatNetwork Registration Client; runs if the X Window System is available
up2date
Provides the Red Hat Update Agent command line version and the
Red Hat Network Daemon
up2date-gnome
Provides the GNOME interface (graphical version) for the Red HatUpdate Agent; runs if the X Window System is available
Ifthe packages are not installed, theycan be found on the RedHat Linux 7 or higher CD-ROM #1 in the
RedHat/RPMS directory or downloaded from the Red Hat FTP site available at ftp://ftp.redhat.com
(or from a Red Hat FTP mirror available at http://www.redhat.com/mirrors.html). Always check the
Red Hat errata page, available at http://www.redhat.com/errata/, for package updates. If you install
an older version of these packages, you can retreive the latest versions using Red Hat Network. The
first time that you request the RPM Updates for your system, they will be included.
Section 2.1:Configuring the Red Hat Network Registration Client13
2Red Hat Network Registration Client
Before you begin using Red Hat Network, you need to create a user name, password, and System
Profile. The Red Hat Network Registration Client will walk you through this process.
2.1 Configuring the Red Hat Network Registration
Client
WARNING
Mostusers do not need toconfiguretheRed Hat NetworkRegistration
Clientbeforeregistering their systems. Do not attempt to use this option
unless you are required to.
To start the configuration tool, use the command:
rhn_register --configure
You will be presented with a list of options and their current values:
0.enableProxyAuthNo
1.noSSLServerURLhttp://www.rhns.redhat.com/XMLRPC
2.enableProxyNo
3.httpProxy
4.proxyUser
5.serverURLhttps://www.rhns.redhat.com/XMLRPC
6.proxyPassword
7.debugNo
Enter number of item to edit <return to exit, q to quit without saving>:
Enter the number of the item that you want to modify, and enter a new value for the option. When
you finish changing your configuration, press
[Enter] to quit without saving your changes.
The most common options configured are numbers 1 and 2 to enable a proxy server. To enable
a proxy server, change the value for enableProxy to Yes and the value of httpProxy to
the name of the proxy server and port number in the format http://HOST:PORT. For example,
to use the proxy server http://squid.mysite.org on port 3128, you would change the value to
http://squid.mysite.org:3128.
[Enter] to save your changes and exit. Press [q] and then
14Chapter 2:Red Hat Network Registration Client
If you require a proxy username and password, change the values of numbers 0, 4, and 6. Set enableProxyAuth to Yes to enable username/password authentication for the proxy. Set proxyUser and proxyPassword to the appropriate username and password for the proxy.
2.2 Starting the Red Hat Network Registration Client
You must be root to register a system with RHN. If you start the Red Hat Network Registration
Client as a standard user, you will be prompted to enter the root password before proceeding. To start
the Red Hat Network Registration Client in Red Hat Linux 6.2 or higher, use one of the following
methods:
1. On the GNOME desktop, go to the
=> Red Hat Network
2. On the KDE desktop, go to the
Hat Network
3.Type the command rhn_register at a shell prompt (for example an xterm or gnome-terminal)
4. If you are not running the X Window System, type the command rhn_register at a virtual
console or remote terminal. Please refer to Section 2.7, Text Mode RHN Registration Client for
further details.
Main Menu Button (on the Panel) => Programs => System
Main Menu Button (on the Panel) => Red Hat => System => Red
CAUTION
You must use Python 1.5.2-24 or later with Secure Sockets Layer (SSL)
support. If not, the information you transfer will not be encrypted. If you
have an earlier version of Python, you will see the message shown in Figure 2–1, Use Python 1.5.2-24 or later. To determine the version of Python
on your system, use the command rpm -q python. It is strongly recommended you use Python 1.5.2-24 or later.
Section 2.2:Starting the Red Hat Network Registration Client15
Figure 2–1Use Python 1.5.2-24 or later
The opening screen for the Red Hat Network Registration Client gives you a brief overview of the
services available and the steps required to register (see Figure 2–2, Welcome Screen). Click
continue with the registration process. If you click
Cancel, the registration process will end and no
Next to
information will be sent.
Figure 2–2Welcome Screen
Red Hat is committed to protecting your privacy (see Figure 2–3, Red Hat Privacy Statement). The
information gathered during the Red Hat Network Registration process is used to create a System
Profile. The System Profile is essential if you wish to receive update notifications about your system.
If you have any questions about how your information is being used, please contact us at feed-back@redhat.com.
16Chapter 2:Red Hat Network Registration Client
Figure 2–3Red Hat Privacy Statement
2.3 Registering a User Account
Before you can create a System Profile, you must create a user account. The only required information
in this section is a unique user name and password and a valid email address.
In the screen shown in Figure 2–6, Create a Unique User Name and Password, you must choose a user
name and password. Once logged into Red Hat Network, you can modify your preferences, view your
existing System Profile, or obtain the lastest Red Hat software packages. You must choose a unique
user name. If you enter one already in use, you will see an error message (see Figure 2–4, Error:Username Already Exists).
Section 2.3:Registering a User Account17
Figure 2–4Error: Username Already Exists
Note
If you are already a member of redhat.com, you can use the same user name
and password. However, you will still need to continue with the registration
process to create your System Profile.
Your user name and password have the following restrictions:
•Must be at least four characters long
•Are case-insentitive
•Can not contain any spaces
•Can not contain any tabs
•Can not contain any line feeds
•Can not contain the characters &, +, %, or ’
If you have already registered your system and try to register it again, the dialog box shown in Figure
2–5, Warning: This System Already Registeredwill appear. If you continue, it will overwrite your ex-
isting systemid file (/etc/sysconfig/rhn/systemid) and you will create a different System
Profile. You will no longer be able to use your previous System Profile — be sure this is what you
want to do before you choose
Yes.
18Chapter 2:Red Hat Network Registration Client
Figure 2–5Warning: This System Already Registered
If you have already registered a machine and created a System Profile, you can add a new machine to
your account. Run the Red Hat Network Registration Client on the new machine you wish to add
and enter your existing Red Hat Network user name and password. The new machine will be added
to your existing account, and you can log into Red Hat Network with your user name and password
to view all your systems simultaneously.
Figure 2–6Create a Unique User Name and Password
Section 2.4:Registering a System Profile19
Most users can leave the Org Info section blank. If you have an existing organization account, enter
your organization’s ID and password in the provided text fields. If the values are valid, the system
will be added to the organization’s Red Hat Network account.
Next to continue.
Click
2.4 Registering a System Profile
Now that you have a user account, you can create a System Profile that consists of hardware and
software information about your Red Hat Linux system. The software System Profile information is
used by Red Hat Network to determine what software update notifications you receive.
2.4.1 Hardware System Profile
After creating a user name and password for your Red Hat Network account, the Red Hat Network
Registration Client probes your system for the following information:
•Red Hat Linux version
•Hostname
•IP address
•CPU model
•CPU speed
•Amount of RAM
•PCI devices
•Disk sizes
•Mount points
The next step is choosing a profile name for your system as shown in Figure 2–7, System Profile -
Hardware. The default value is the hostname for the system. You may modify this to be a more
descriptive string such as Email Server for Support Team if you find it more helpful. Optionally,
you can enter a computer serial or identification number for the system.
If you do not wish to include information about your hardware or network in your System Profile,
deselect
ware).
Click
Include information about hardware and network (see Figure 2–7, System Profile - Hard-
Next to continue with the registration process.
20Chapter 2:Red Hat Network Registration Client
Figure 2–7System Profile - Hardware
2.4.2 Software System Profile
The software System Profile consists of a list of RPM packages for which you wish to receive notifications. The Red Hat Network Registration Client shows you a list of all RPM packages listed in
the RPM database on your system and then allows you to customize the list by deselecting packages.
Gathering RPM Database Information
Only those packages you choose during this part of the registration will be included in in your System
Profile, and you will only receive notifications about the packages in your System Profile. Thus, if
you use an older version of a package and deselect it from the list, it will not be replaced with a newer
version. This RPM list can be modifed through the Red Hat Network web interface or by using the
Red Hat Update Agent. As shown in Figure 2–8, RegistrationWizard , querying the RPM database
may take some time depending on your system.
Section 2.4:Registering a System Profile21
Figure 2–8Registration Wizard
Once the RPM package list is built, the list will be displayed as shown in Figure 2–9, RPM Package
Information. Deselecting
will omit this information from your System Profile.
Include RPM Packages installed on this system in my System Profile
Figure 2–9RPM Package Information
Choosing Which RPM Packages to Exclude from the System Profile
By default, all RPM packages in your RPM database are included in your System Profile to be updated
by Red Hat Network. Toexcludeapackage, uncheck the package from the list by clicking theX beside
the package name. For example, Figure 2–10, Choose which RPM Packages to Exclude from System
22Chapter 2:Red Hat Network Registration Client
Profile shows that the procmail, procps, and psgml packages have been omitted from the package
list.
Choose which packages to exclude from the system profile, and click
tration process.
Next to continue with the regis-
Figure 2–10Choose which RPM Packages to Exclude from System Profile
2.5 Finishing Registration
As seen in Figure 2–11, Finished Collecting Information for System Profile,thelast step of registration
is to confirm that you want to send your System Profile to the Red Hat Network. If you choose Cancel
at this point, no information will be sent. Clicking Next will send your profile.
Section 2.5:Finishing Registration23
Figure 2–11Finished Collecting Information for System Profile
Figure 2–12, Send System Profileto Red Hat Network shows the progress bar you will see while your
profile is being sent. This process may take some time depending on your connection speed.
Figure 2–12Send System Profile to Red Hat Network
You will know your System Profile has been successfully sent when you see the Registration Finished
screen (Figure 2–13, RegistrationFinished). Click Finish to exit the Red Hat Network RegistrationClient.
After completing registration, visit http://rhn.redhat.com to verify your System Profile and make any
changes.
24Chapter 2:Red Hat Network Registration Client
Figure 2–13Registration Finished
2.6 Entitling Your System
Nowthatyou haveregistered your system, it must be entitled before you can receiveupdated packages.
In other words, you must subscribe it to Software Manager. Everyone automatically receives one free
Software Manager subscription after creating an account through registering a system for RHN or
creating a redhat.com account.
To entitle a system, go to http://rhn.redhat.com and login using the same username and password you
just used in the Red HatNetwork RegistrationClient. On the left navigation bar, click
under the Your RHN category. The Entitlement Manager tells you how many entitlements you have
left. If you have one or more left, check the checkbox under the
the system that you just registered. Then click the
page. The number of entitlements remaining will decrease, and your system is now ready to use the
Red Hat Update Agent and Software Manager. Refer to Chapter 4,
Chapter 5, Software Manager for details on how to use them. If you do not have any entitlement slots
left, enter the number you want to purchase and click the
subscriptions.
Update Entitlements button at the bottom of the
Entitled column beside the name of
Red Hat Update Agent
Buy Now! button to purchase additional
Entitlements
and
Loading...
+ 54 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.