RedHat FastTrack to Red Hat Linux System Administrator


 * My study notes from the training I did at Q&A
 * info about RHSA @ stayahead.com


 * I found this similar webpage http://rhcsastudy.com/

=FastTrack to Red Hat Linux System Administrator Course Overview=


 * This highly practical instructor led FastTrack to Red Hat Linux System Administrator course is designed to give experienced LINUX/UNIX administrators practical experience in the administration of a LINUX system to a level required by the Red Hat Certified Systems Administration certification. This course is targeted to closely follow the official Red Hat curriculum and will enable the student to work towards the RHCSA qualifications. This class will have a high, practical content and a fast pace. Delegates should have a strong command line experience of UNIX/LINUX including cp, grep, mkdir, ssh, tar, useradd, cups, be capable of using man pages and DHCP- to name just a few.


 * This course can also be used as a practical refresher course prior to taking the RHCSA examination.

=Skills Gained=
 * The delegates will have knowledge in all, and practise in some, of the following:


 * Install the Operating System using kickstart
 * Configure and test Network Interfaces
 * Configure a basic Apache Web Server, FTP and DHCP servers
 * Share data using the CIFS/Samba and NFS File sharing systems
 * Administer password ageing and configure an LDAP client
 * Secure systems using SELinux, Firewalls and Access Control Lists (ACL's)
 * Configure Partitions, File systems and Swap space
 * Install and Manage software using rpm, yum and RHN
 * Configure Advanced System Logging (rsyslog)
 * Manage Processes and system logs
 * Install and Manage KVM virtual machines
 * Troubleshoot Systems

=Who will the Course Benefit?=


 * The FastTrack to Red Hat Linux System Administrator course is suitable for experienced LINUX/UNIX System Administrators who need to acquire knowledge of the key administrative tasks required to administer a LINUX system. This course will teach the necessary skills to enable the student to work towards the RHCSA certification.


 * This course assumes a strong prior knowledge of the LINUX/UNIX operating system. The content of the Administering Red Hat Linux - Part I course is the minimum level of knowledge required for attendance on this course.

=Course Objectives=


 * On completion of the FastTrack to Red Hat Linux System Administrator course, the delegate will have a greater technical awareness of the system and will have acquired practical experience of the key administration duties on a Red Hat Linux system. They will possess the essential knowledge required to study towards the official Red Hat Certified System Administrator (RHCSA) qualification.

Examinations


 * This course is targeted to closely follow the official Red Hat curriculum and covers some of the major topics for the exam, and thus will enable the student to work towards the Red Hat Certified System Administrator (RHCSA) qualifications.


 * Before taking any exam, ensure you have the recommended experience. The Red Hat website lists all exam requirements and these are updated regularly.


 * Exams are not included as part of the course.

=Requirements=


 * Experienced Linux/UNIX Administrators.

=Follow-On Courses=
 * Administering Red Hat Linux - Part III
 * Apache Web Server
 * Perl Programming
 * Oracle SQL


 * NOTE: Course technical content is subject to change without notice.

=Course Contents=

Course Introduction

 * Administration and Course Materials
 * Course Structure and Agenda
 * Delegate and Trainer Introductions

Session 1: ACCESSING DOCUMENTATION
man -k "keyword to search on description" man -f "word to search on the man files"
 * Getting Help - man pages, info, /usr/share/doc

Standard UNIX systems manual pages sections: (1) User commands (2) Commands for system programmers (3) Commands for ordinary C programmers (4) Special files (5) File Formats (6) Games and Demos (7) Miscellaneous (ex.: characters ets, file-system types) (8) System Admin COmmands (9) Kernel routines

man passwd man 5 passwd

man -k password

man -f password

info df

who --help

cal --help ls --help | more


 * Sources of information available on the WEB
 * The Linux Documentation Project - TLDP Official website

Configuring Network Interfaces

 * Controlling Network Devices: ifup/ifdown
 * Configuring IPV4 dynamic and static networking
 * Network Tools ifconfig, ethtool etc

hostname

ping "hostname"

ifup ifdown

ifconfig

ifconfig eth0 192.168.10.10

/etc/rc.d/init.d/network

biosdevname=0 #to disable the new naming convention pXpY and go back to the old ethX

system-config-network-tui system-config-network

service network restart /etc/init.d/network restart

nm-connection-editor #(GUI)

/etc/sysconfig/network-scripts DEVICE BOOTPROTO ONBOOT IPADDR NETWORK BROADCAST NETMASK USERCTRL TYPE PEERDNS HWADDR IPV6INIT GATEWAY DNS# NM_CONTROLLED
 * 1) cat ifcfg-eth0

/etc/hosts

Connecting NIS and LDAP clients to corresponding servers
/etc/openldap/ldap.conf

service nscd restart

/etc/nsswitch.conf #this file indicates where to get login information

password:	files sss shadow:		files sss group:		files sss

sssd <-- deamon
 * 1) sss --> System Security Services

system-config-authentication authconfig-tui

/etc/pam.d/system-auth

getent passwd

ldapsearch -x -b "dc=mylab,dc=com" `uid=user1´

/etc/nsswitch.conf
 * 1) Resolution order #

hosts: file,nis,dns

ethtool eth0 ethtool -i etho ethtool -s eth0 speed 100 duplex full autoneg off
 * 1) Network Tools #

ping -n 192.168.10.10

tcpdump -vi eth0

Linking to a system using ssh and rsync
ssh -l "user" ... ssh --help

rsync -options "source" user@host:/destination

rsync -options user@host:/source_folder/files* /local_destination_folder/


 * 1) remote desktop with "vino"
 * 2) same as VNC, use port tcp/5900
 * 3) connections is not secure when not using encryption
 * eg, you can create a ssh tunnel and send the vnc non-encrypted traffic over the ssh encrypted tunnel

rpm -q vino

ssh -L 5900:localhost:5900 "remote_host_running_vino"


 * 1) start vino and point to localhost:5900

vncviewer localhost:5900


 * or

ssh -f -N -L 5900:localhost:5900 "remote_host_running_vino"

-- man ssh

-f	Requests ssh to go to background just before command execution. This is useful if ssh is going to ask for passwords or passphrases, but the user wants it in the background. This implies -n. The recommended way to start X11 programs at a remote site is with something like ssh -f host xterm.

-N	Do not execute a remote command. This is useful for just forwarding ports (protocol version 2 only). ---


 * 1) this can be also done in Windows, using putty, check "Tunnels" on putty settings/connection

Configuring basic NTP

 * 1) Network Time Protocol (NTP), uses deamon ntpd, port udp/123

system-config-date

ntpq -pn


 * Exercise

Authentication policies and User Private Groups
/etc/passwd
 * 1) user_name:passwd:UID:GID:userinfo:home_folder:shell
 * 2) passwd --> /etc/shadow

id

finger "user_name"

/etc/shadow
 * 1) user_name:password:lastchg:min:max:warn:inactive:expire
 * 2) password encryption SHA512
 * 3) lastchg - date last changed, as a nu,ber of days since 1/1/1970
 * 4) min - minimum days to elapse before passwd can be changed
 * 5) max - max days to elapse before passwd myst be changed
 * 6) warn - number of days warning before passwd expiration
 * 7) inactive - number of days on no login activity
 * 8) expire - expiry date

/etc/login.defs
 * 1) User defaults #

pwconv #enables /etc/shadow

pwunconv #disables /etc/shadow, password are store in /etc/passwd

grpconv #enables /etc/gshadow

grpunconv # removes /etc/gshadow and enables /etc/groups

Password management using passwd, chage etc
system-config-users (GUI)

useradd

usermod

userdel

groupadd

groupmod

groupdel

/etc/group

useradd -m -d /home/user1 -G study,redhat -c "Online study" user1

chage -l chage "option" user1 # allows to changes user settings related with password chage user1

passwd

Managing user profile files
/etc/profile        #global system profile

/etc/profile.d      #all files in this directory are executed

$HOME/.bash_profile #user

$HOME/.bashrc       #user

/etc/bashrc         #is called and executed by .bashrc

Extended file permissions including suid,sgid
chmod

/usr/bin/passwd #this file has the SUID bit set and is owned by root

/bin/su

chmod u+s "file"

chmod 4755 "file"


 * 1) using "-" to disable

ls -l /usr/bin/passwd -rwsr-xr-x. #<-- note the "s"

chmod g+s "file"

chmod 2755 "file"

chmod +t /tmp #sticky bit, only the owner can delete the file created by himself

chmod 1xxx /tmp

ls -ld /tmp

chattr +i "file"

lsattr "file"

lsattr -l "file"

Access Control List (ACL's)
mount -t ext4 -o default,acl /dev/vda5 /house

tune2fs /dev/vda5 #check acl is active, should be by default on a ext4

mv #preserves ACLs cp # does not preserve the ACL

setfacl -m u:user1:rwx /home/user2/project
 * 1) add permissions

set facl -x u:user1 /home/user2/project
 * 1) remove permission

setfacl --remove-all /home/user2/project

setfacl -b /home/user2/project

setfacl --remove-default /misc

getfacl /misc


 * 1) folder or files with acl will display an "+" when you run the "ls -l" command

Switching to another user
su #this option does not updated the environment profile

su - #this option updates the environment profile for the new user

id

who

chown

chgrp

////* Connecting to a centralised administration server

echo Hi there $LOGNAME
 * Exercise

pwck #verify the integrity of /etc/passwd and /etc/shadow files

cat /etc/redhat-release

Session 4: SYSTEM MONITORING

 * Monitor CPU and memory usage
 * Check disk utilisation
 * System Log Files
 * Monitor system logs
 * Syslogd and klogd Configuration
 * Advanced syslogd Configuration
 * Analysing and rotating logfiles
 * Exercise

Session 5: SOFTWARE MANAGEMENT

 * The Red Hat Package Management system
 * Installing removing software manually using rpm
 * RPM queries and verifying packages
 * Dependency problems and resolution
 * Updating the Kernel from RPM's
 * Other RPM features
 * Updating using Red Hat Network
 * The YUM management tool
 * Software repositories
 * Accessing repositories from a client
 * Updating your system with Red Hat Network
 * Exercise

Session 6: DATA SECURITY

 * SELinux
 * Management of SELinux
 * Easy configuration and customisation of SELinux
 * Configuring and using ssh and scp
 * Basic Firewall management
 * Exercise

Session 7: DEPLOY WEB, FTP and DHCP SERVERS

 * The Apache and Tux Web Servers
 * Apache server configuration files
 * Apache Configuration Directives
 * Virtual Host Management: Name and IP Based Access
 * HTTP and SELinux
 * The FTP Service using vsftpd
 * Copying files using sftp
 * Configuring a DHCP server
 * Exercise

LUKS encrypted partitions

 * my study example - how to create luks partition and mount the automatically at the boot time
 * source: http://www.howtoforge.com/automatically-unlock-luks-encrypted-drives-with-a-keyfile

Creating encrypted partition

 * 1) best practice, initialize drive/partition with random data

mkfs.ext4 /dev/vda6 cat /dev/urandom > /dev/vda6


 * 1) !!! Atention !!! the command above can take a while...(for example 11 days for a 4TB drive)
 * 2) check this example for a 5GB partition
 * 3) on a Intel(R) Xeon(R) CPU E5-2650 0 @ 2.00GHz
 * 4) 	[root@labs ~]# time `cat /dev/urandom > /dev/xvdj7`
 * 5) 	cat: write error: No space left on device
 * 6) 	real   19m26.477s
 * 7) 	user   0m0.201s
 * 8) 	sys    19m3.385s
 * 9) 	[root@labs ~]#
 * 1) 	user   0m0.201s
 * 2) 	sys    19m3.385s
 * 3) 	[root@labs ~]#

iostat -cm /dev/sdb hdparm -I /dev/sda hdparm -I /dev/sda | grep -i speed hdparm -tT /dev/sda
 * 1) START: some of my notes about initialize the partition #######################
 * 2) monitoring commands

1024+0 records in 1024+0 records out 1073741824 bytes (1.1 GB) copied, 145.665 s, 7.4 MB/s
 * 1) https://forums.hak5.org/index.php?/topic/11791-hard-drive-initialization-for-encryption/
 * 2) "good" encryption, but takes a while... (check shred command too) ##
 * 3) dd if=/dev/urandom bs=1024k | dd of=/dev/null bs=1024k count=1k
 * 1) dd if=/dev/urandom bs=1024k | dd of=/dev/null bs=1024k count=1k

1024+0 records in 1024+0 records out 1073741824 bytes (1.1 GB) copied, 1.53996 s, 697 MB/s
 * 1) "not recommended" for encryption or wiping disk "if=/dev/zero = 000000 only" ##
 * 2) dd if=/dev/zero bs=1024k | dd of=/dev/null bs=1024k count=1k
 * 1) dd if=/dev/zero bs=1024k | dd of=/dev/null bs=1024k count=1k

Total DISK READ: 3.86 K/s | Total DISK WRITE: 123.54 M/s 22507 be/4 user       0.00 B/s  137.91 M/s  0.00 % 48.42 % openssl enc xxxx 22507 be/4 user       0.00 B/s  136.49 M/s  0.00 % 49.48 % openssl enc xxxx 22507 be/4 user       0.00 B/s  132.67 M/s  0.00 % 50.84 % openssl enc xxxx 22507 be/4 user       0.00 B/s  138.58 M/s  0.00 % 47.81 % openssl enc xxxx 22507 be/4 user       0.00 B/s  135.12 M/s  0.00 % 47.21 % openssl enc xxxx 22507 be/4 user       0.00 B/s  137.90 M/s  0.00 % 47.92 % openssl enc xxxx 22507 be/4 user       0.00 B/s  135.47 M/s  0.00 % 48.53 % openssl enc xxxx
 * 1) TBC ##
 * 2) openssl enc -aes-256-cbc -pass pass:"$(dd if=/dev/urandom bs=128 count=1 2>/dev/null | base64)" -nosalt < /dev/zero > randomfile.bin
 * 3) iotop -o -b -q -P
 * 1) iotop -o -b -q -P

Doing md2 for 3s on 16 size blocks: 396616 md2's in 3.00s Doing md2 for 3s on 64 size blocks: 201243 md2's in 2.99s Doing md2 for 3s on 256 size blocks: 67737 md2's in 3.00s Doing md2 for 3s on 1024 size blocks: 18552 md2's in 3.00s Doing md2 for 3s on 8192 size blocks: 2385 md2's in 3.00s Doing md4 for 3s on 16 size blocks: 12592732 md4's in 2.99s Doing md4 for 3s on 64 size blocks: 9577572 md4's in 3.00s Doing md4 for 3s on 256 size blocks: 5558906 md4's in 3.00s (....) The 'numbers' are in 1000s of bytes per second processed. type            16 bytes     64 bytes    256 bytes   1024 bytes   8192 bytes md2              2115.29k     4307.54k     5780.22k     6332.42k     6512.64k mdc2                0.00         0.00         0.00         0.00         0.00 md4             67385.86k   204321.54k   474359.98k   708988.59k   828767.38k md5             48365.83k   142355.37k   316976.98k   459152.70k   524632.06k hmac(md5)       39497.93k   117900.61k   284490.23k   438983.00k   521513.64k sha1            55421.00k   155251.93k   336577.71k   477321.90k   545890.30k rmd160          32080.09k    76293.03k   138437.12k   171858.94k   182861.82k rc4            326248.48k   545590.87k   627138.47k   658667.28k   673895.77k des cbc         53193.21k    54667.71k    55060.29k    55032.83k    54941.01k des ede3        20547.98k    20755.20k    20808.53k    20807.68k    20452.69k idea cbc            0.00         0.00         0.00         0.00         0.00 seed cbc        59497.08k    59330.20k    59856.47k    59685.50k    59913.56k rc2 cbc         33172.63k    33640.00k    33968.55k    33944.23k    33925.80k rc5-32/12 cbc       0.00         0.00         0.00         0.00         0.00 blowfish cbc    92728.76k    97928.99k    98252.37k    98181.46k    98661.72k cast cbc        84221.31k    87760.43k    88466.69k    87629.48k    88501.00k aes-128 cbc     86426.50k    92814.04k    94501.03k    94904.32k    95460.09k aes-192 cbc     72136.77k    77916.39k    79774.04k    80295.64k    78318.25k aes-256 cbc     61088.52k    65468.25k    67873.13k    67762.86k    68703.57k camellia-128 cbc 79105.30k  120645.74k   136806.74k   140702.38k   140869.63k camellia-192 cbc 69090.03k   94372.79k   103115.09k   106483.71k   107451.73k camellia-256 cbc 68377.57k   94027.75k   103254.95k   105706.15k   107090.54k sha256          33105.88k    71516.52k   121262.76k   146752.17k   156557.61k sha512          25855.07k   104665.26k   154846.81k   215855.43k   242600.62k whirlpool       20217.45k    43358.38k    72452.45k    85689.00k    92091.73k aes-128 ige     86733.58k    89543.64k    90298.03k    90611.37k    91450.03k aes-192 ige     74227.90k    75081.26k    76112.47k    76115.97k    76503.42k aes-256 ige     63700.57k    65002.24k    65782.67k    65867.09k    65921.02k sign   verify    sign/s verify/s rsa 512 bits 0.000067s 0.000006s  15018.8 172237.7 rsa 1024 bits 0.000338s 0.000018s  2960.8  55615.4 rsa 2048 bits 0.002077s 0.000062s   481.5  16189.7 rsa 4096 bits 0.014713s 0.000247s    68.0   4050.2 sign   verify    sign/s verify/s dsa 512 bits 0.000071s 0.000067s  13989.7  14910.5 dsa 1024 bits 0.000182s 0.000203s  5495.4   4916.7 dsa 2048 bits 0.000617s 0.000759s  1619.9   1317.9
 * 1) benchmark openssl speed
 * 2) http://www.madboa.com/geek/openssl/
 * 3) openssl speed
 * 1) openssl speed


 * 1) good explication about openssl
 * 2) http://security.stackexchange.com/questions/29106/openssl-recover-key-and-iv-by-passphrase
 * 3) openssl enc -aes-256-cbc -pass pass:MYPASSWORD -p -in foo_clear -out foo_enc
 * 4) --> http://security.stackexchange.com/users/655/thomas-pornin -->
 * 5) --> http://www.bolet.org/~pornin/cv-en.html
 * 6) suggests the using of GnuPG ...
 * 1) --> http://www.bolet.org/~pornin/cv-en.html
 * 2) suggests the using of GnuPG ...
 * 1) suggests the using of GnuPG ...

iv=$(dd if=/dev/random count=1); while :; do iv=$(echo $iv|sha512sum); (echo $iv|xxd -r -p); done | dd of=/dev/MYDISK
 * 1) http://blog.kadiraltan.com/disk-wiping-dd-and-devrandom/


 * 1) ==> if=/dev/zero <==######

1024+0 records in 1024+0 records out 1073741824 bytes (1.1 GB) copied, 0.825367 s, 1.3 GB/s real	0m11.334s user	0m0.001s sys	0m0.726s rm: remove regular file `testfile'? y
 * 1) http://askubuntu.com/questions/87035/how-to-check-hard-disk-performance
 * 2) sync ; time sh -c "dd if=/dev/zero of=testfile bs=1024k count=1k  && sync" ; rm testfile
 * 1) sync ; time sh -c "dd if=/dev/zero of=testfile bs=1024k count=1k  && sync" ; rm testfile

1024+0 records in 1024+0 records out 1073741824 bytes (1.1 GB) copied, 12.3093 s, 87.2 MB/s
 * 1) dd if=/dev/zero of=/tmp/output conv=fdatasync bs=1024k count=1k; rm -f /tmp/output

1024+0 records in 1024+0 records out 1073741824 bytes (1.1 GB) copied, 141.733 s, 7.6 MB/s
 * 1) dd if=/dev/urandom of=/tmp/output conv=fdatasync bs=1024k count=1k; rm -f /tmp/output

Total DISK READ: 0.00 B/s | Total DISK WRITE: 0.00 B/s 17659 be/4 user 0.00 B/s         7.75 M/s   0.00 %  0.00 % dd if=/dev/urandom of=/tmp/output conv=fdatasync bs=1024k count=1k 3061 be/4 user 0.00 B/s         11.62 K/s  0.00 %  0.00 % gnome-terminal
 * 1) (in another shell)
 * 2) iotop -o -b -P -q

1) luksForm 2) luksOpen 3) dd if=/dev/zero of=/dev/mapper/testdev bs=1M   --> writing encrypted "zeros" in the luks partition =) ~writing speed depending on the Hard drive speed 4) luksClose 5) luksDump (note the "Payload offset" value, example 2056 6) dd if=/dev/urandom of=/dev/loop3 bs=512 count=2056  <--- this command "overwrites" that payload offset value 7) partition is now full of random data and to use with your cryptographic software
 * 1) http://www.globallinuxsecurity.pro/quickly-fill-a-disk-with-random-bits-without-dev-urandom/


 * 1) ==> using shred <==#######


 * 1) http://fedoraproject.org/wiki/Implementing_LUKS_Disk_Encryption
 * 2) shred -v -z -n5 /dev/xxx

Total DISK READ: 0.00 B/s | Total DISK WRITE: 130.54 M/s 17742 be/4 user        0.00 B/s    0.00 B/s  0.00 % 88.67 % shred -zv -n 1 /dev/sxx 17742 be/4 user        0.00 B/s    0.00 B/s  0.00 % 99.99 % shred -zv -n 1 /dev/sxx 17742 be/4 user        0.00 B/s  239.23 M/s  0.00 % 67.16 % shred -zv -n 1 /dev/sxx 17742 be/4 user        0.00 B/s  742.41 M/s  0.00 %  0.00 % shred -zv -n 1 /dev/sxx 17742 be/4 user        0.00 B/s  335.50 M/s  0.00 % 49.29 % shred -zv -n 1 /dev/sxx 17742 be/4 user        0.00 B/s  137.73 M/s  0.00 % 73.93 % shred -zv -n 1 /dev/sxx 17742 be/4 user        0.00 B/s   73.14 M/s  0.00 % 83.01 % shred -zv -n 1 /dev/sxx
 * 1) with shred, the speed seam to be random
 * 2) shred -zv -n 1 /dev/sxx
 * 3) iotop -o -b -P -q
 * 1) iotop -o -b -P -q


 * 1) END: some of my notes about initialize the partition #######################

cryptsetup luksFormat /dev/vda6

cryptsetup luksOpen /dev/vda6 luks-house

ll /dev/mapper/

mkfs.ext4 /dev/mapper/luks-house

mount /dev/mapper/luks-house /house

How to mount luks partition automatically

 * 1) as root, run the following commands

dd if=/dev/urandom of=/root/luks-house_key bs=1024 count=4

chmod 0400 /root/luks-house_key

cryptsetup luksAddKey /dev/vda6 /root/luks-house_key

vim /etc/crypttab luks-house UUID="c10b32e3-0727-48e5-b80e-b25ab51990aa" /root/luks-house_key	luks
 * 1) luks-house ---> is the device been mounted at /dev/mapper/luks-house
 * 2) /dev/vda6: UUID="c10b32e3-0727-48e5-b80e-b25ab51990aa" TYPE="crypto_LUKS"
 * 3) /dev/mapper/luks-house: UUID="912888bc-83c0-4203-acd3-ff6acaa60f10" TYPE="ext4" < this goes to /etc/fstab

vim /etc/fstab (...) UUID=912888bc-83c0-4203-acd3-ff6acaa60f10	/house	ext4 defaults 1 2

Session 9: MAINTAINING THE KERNEL

 * Kernel Design
 * Dynamic Modules
 * Loading and removing modules
 * Using kernel arguments
 * Changing Tuneable Parameters
 * Exercise

Session 10: INSTALLING RED HAT LINUX USING KICKSTART

 * How Kickstart works
 * Sections within a Kickstart configuration file
 * Pre and Post Kickstart processing
 * Creating a Kickstart file
 * Creating the Linux Install Server
 * Differing ways of starting a Kickstart installation
 * Exercise

Session 11: CHANGING RUN-LEVELS

 * The init program and run levels
 * The boot Sequence explained
 * The grub boot manager
 * The upstart process
 * The startup scripts
 * Control Services using chkconfig, ntsysv etc.
 * Changing Run-Levels
 * System Shutdown and Reboot management
 * Exercise

Session 12: MANAGING VIRTUAL SYSTEMS
[root@labs /VMs]# virt-install --prompt What is the name of your virtual machine? ldapserver How much RAM should be allocated (in megabytes)? 256 What would you like to use as the disk (file path)? /VMs/ldapserver This will overwrite the existing path '/VMs/ldapserver' Do you really want to use this disk (yes or no) yes What is the install CD-ROM/ISO or URL? http://mirror.centos.org/centos/6.4/os/x86_64/
 * Virtualisation concepts
 * 1) work in progress

Starting install... Retrieving file .treeinfo...                                                                                                                                                              |  798 B     00:00 ... Retrieving file vmlinuz...                                                                                                                                                                 | 7.7 MB     00:00 ... Retrieving file initrd.img...                                                                                                                                                              |  62 MB     00:04 ... Creating domain... |   0 B     00:00


 * (virt-viewer:1890): CRITICAL **: virt_viewer_display_get_monitor: assertion `VIRT_VIEWER_IS_DISPLAY(self)' failed

(virt-viewer:1890): Gtk-WARNING **: Attempting to add a widget with type VncDisplay to a container of type VirtViewerDisplayVnc, but the widget is already inside a container of type VirtViewerDisplayVnc, the GTK+ FAQ at http://library.gnome.org/devel/gtk-faq/stable/ explains how to reparent a widget. Domain installation still in progress. You can reconnect to the console to complete the installation process. [root@labs /VMs]#


 * Install a KVM virtual system
 * Checking for supported hardware
 * Start and shutdown a virtual system
 * Exercise

Session 13: ACCESSING REMOTE SYSTEMS

 * Configuring client access to an Network Filesystem Server (NFS)
 * Providing CIFS access
 * Configuring autofs
 * Exercise

remount root partition as rw
[root@server2 ~]# mount -o remount,rw /dev/vda2 /

Follow-On Courses

 * Administering Red Hat Linux - Part III
 * Apache Web Server
 * Perl Programming
 * Oracle SQL