It is sometimes useful not only to know your repo list covers you for all the stack of software you want but also where does a package actually reside.
The repoquery command comes to the rescue.
It is sometimes useful not only to know your repo list covers you for all the stack of software you want but also where does a package actually reside.
The repoquery command comes to the rescue.
EPEL stands for Extra Packages for Enterprise Linux. This is a massive collection of packages that are very useful for the building of many modern stacks and include many tools for the running and maintenance of systems.
The homepage of EPEL is here: http://fedoraproject.org/wiki/EPEL.
You can browse the package set using repoview:
Installing on Centos 5.x & 6.x:
For EL5:
su -c 'rpm -Uvh http://mirror.switch.ch/ftp/mirror/epel/5/i386/epel-release-5-4.noarch.rpm' ... su -c 'yum install puppet'
For EL6:
su -c 'rpm -Uvh http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm' ... su -c 'yum install puppet'
For EL7
sudo yum install epel-release
#vim /etc/sysconfig/network
Use something like
HOSTNAME=testarossa.maranello.local
to overwrite the default name and domain of the server.
e.g.
NETWORKING=yes HOSTNAME=testarossa.maranello.local
To avoid rebooting issue the following :
hostname testarossa.maranello.local
That will set it for the current session.
To monitor TCP and UDP connections the following command is very useful:
netstat -t -u
to have a continuous update use the watch command:
watch netstat -t -u
There is a much stronger tool for real time analysis called iptraf.
It is quite self explanatory :
at command line run
iptraf
This tool has many functions and is text mode menu ncurses based application really worth learning.
The yum message “Warning: RPMDB altered outside of yum.” or, as the yum message said for a few months, “Warning: RPMDB has been altered since the last yum transaction.” means some application has altered the rpm database (installed or removed a package) without going through the Yum APIs. This is almost always due to someone using rpm directly (Ie. rpm -ivh blah.rpm), but another possibility is an application built on top of the rpm APIs (Ie. smart, apt, zypp). While it’s possible that someone has hacked your machine and altered the rpmdb maliciously, it would have to be done poorly to trigger this warning.
There are three main sets of reasoning behind bringing this to the users attention.
There are now a few features in yum, requested by users of the package management system, that require yum is aware of all package actions on the system. Here a few of the current ones:
This is not a complete list, and as more package management features are implemented they are much more likely to be implemented at the yum layer than at the rpm layer. Not because rpm is bad, but for the same reasons that the above features were implemented in yum, it’s much easier and faster to implement them there.
# yum clean all
Setting up NTP is very important for a host of application especially clusters and applications like DBs requiring all the servers to be critically time-wise synced.
Install NTP on Red Hat and CentOS 6
$ yum install ntp
$ chkconfig ntpd on
$ ntpdate pool.ntp.org
$ service ntpd start
Install NTP on Ubuntu