Difference between revisions of "OPS235 Lab 2 - Fedora17"
Line 6: | Line 6: | ||
== Introduction == | == Introduction == | ||
− | A ''virtual machine'' is a software simulation of a computer which can be used as though it were actual hardware. It's possible to run multiple virtual machines on one computer, reducing hardware requirements and introducing flexibility. Some common uses of virtualization include: | + | A '''virtual machine''' is a software simulation of a computer which can be used as though it were actual hardware. It's possible to run multiple virtual machines on one computer, reducing hardware requirements and introducing flexibility. Some common uses of virtualization include: |
− | * Software testing -- Using multiple operating systems simultaneously on a single computer for testing and experimentation. | + | * '''Software testing''' -- Using multiple operating systems simultaneously on a single computer for testing and experimentation. |
− | * Network simulation -- Testing network services, protocols, and security scenarios with a small number of computers. | + | * '''Network simulation''' -- Testing network services, protocols, and security scenarios with a small number of computers. |
− | * Isolation -- Protecting multiple sets of data by storing them on multiple virtual machines. If one of the virtual machines is compromised, the data on other virtual machines is still protected. | + | * '''Isolation''' -- Protecting multiple sets of data by storing them on multiple virtual machines. If one of the virtual machines is compromised, the data on other virtual machines is still protected. |
− | * Server consolidation -- Reducing the number of physical servers in a network by moving physical machines to virtual machines. This saves hardware, administration, cooling, and electricity costs, and it can increase the utilization of hardware (by ensuring that the hardware is not under-loaded). | + | * '''Server consolidation''' -- Reducing the number of physical servers in a network by moving physical machines to virtual machines. This saves hardware, administration, cooling, and electricity costs, and it can increase the utilization of hardware (by ensuring that the hardware is not under-loaded). |
− | * Load-balancing and disaster recovery -- It is possible to migrate virtual machines between different physical machines, to ensure that a workload is balanced across multiple computers, to allow routine hardware maintenance and upgrading, and to compensate for hardware failure or other disasters. | + | * '''Load-balancing and disaster recovery''' -- It is possible to migrate virtual machines between different physical machines, to ensure that a workload is balanced across multiple computers, to allow routine hardware maintenance and upgrading, and to compensate for hardware failure or other disasters. |
− | In this lab, you will create three virtual machines. This also gives you an opportunity to experiment with different ways of installing Fedora. Later in this course you will install another operating system distribution in a virtual machines. | + | '''In this lab, you will create three virtual machines'''. This also gives you an opportunity to experiment with different ways of installing Fedora. Later in this course you will install another operating system distribution in a virtual machines. |
− | You have | + | You should already have both a Fedora installation DVD and a Fedora LIVE CD. In both cases, the boot media (which you used to load the installation software) and the installation source (where the software that got installed came from) were the same: your CD/DVD provides both. However, the Fedora (and most other Linux distributions) permits you to use any combination of boot media and installation media: |
* Boot Media | * Boot Media | ||
Line 36: | Line 36: | ||
* Use KVM virtualization on Fedora | * Use KVM virtualization on Fedora | ||
* Use a variety of installation methods | * Use a variety of installation methods | ||
− | ** Live Image Installation | + | ** '''Live Image Installation''' |
− | ** Network Installation | + | ** '''Network Installation''' |
− | ** Kickstart Installation | + | ** '''Kickstart Installation''' |
== Reference Material == | == Reference Material == |
Revision as of 10:58, 13 January 2012
Contents
OPS235 Lab 2: Fedora 16 Installation Methods (on Virtual Machines)
Introduction
A virtual machine is a software simulation of a computer which can be used as though it were actual hardware. It's possible to run multiple virtual machines on one computer, reducing hardware requirements and introducing flexibility. Some common uses of virtualization include:
- Software testing -- Using multiple operating systems simultaneously on a single computer for testing and experimentation.
- Network simulation -- Testing network services, protocols, and security scenarios with a small number of computers.
- Isolation -- Protecting multiple sets of data by storing them on multiple virtual machines. If one of the virtual machines is compromised, the data on other virtual machines is still protected.
- Server consolidation -- Reducing the number of physical servers in a network by moving physical machines to virtual machines. This saves hardware, administration, cooling, and electricity costs, and it can increase the utilization of hardware (by ensuring that the hardware is not under-loaded).
- Load-balancing and disaster recovery -- It is possible to migrate virtual machines between different physical machines, to ensure that a workload is balanced across multiple computers, to allow routine hardware maintenance and upgrading, and to compensate for hardware failure or other disasters.
In this lab, you will create three virtual machines. This also gives you an opportunity to experiment with different ways of installing Fedora. Later in this course you will install another operating system distribution in a virtual machines.
You should already have both a Fedora installation DVD and a Fedora LIVE CD. In both cases, the boot media (which you used to load the installation software) and the installation source (where the software that got installed came from) were the same: your CD/DVD provides both. However, the Fedora (and most other Linux distributions) permits you to use any combination of boot media and installation media:
- Boot Media
- CD or DVD
- Hard disk
- USB flash drive
- Network boot
- Installation source
- CD or DVD
- Hard disk
- USB flash drive
- Network HTTP or NFS software repository
Objectives
- Understand Virtualization
- Use KVM virtualization on Fedora
- Use a variety of installation methods
- Live Image Installation
- Network Installation
- Kickstart Installation
Reference Material
Virtualization
Installation Methods
- Live Image Installation
- Network Installation
- Kickstart Installation
Required Materials
- Removable disk pack with Fedora installed (see Lab 2).
- Fedora 13 x86_64 Live CD.
Objectives
- To perform a GNU/Linux installation using the Fedora 13 distribution
- To perform boot time customization and configuration
- To obtain network configuration from a DHCP server
- To secure the boot loader by adding password protection
- To investigate GRUB boot loader configuration
Reference
- man pages
- mount
- rpm
- hostname
- uname
- ps
- ifconfig
- netstat
- route
- nslookup
- wc
- grub
- Resources on the web
Required Material
- Fedora 13 x_64 Installation DVD - You can burn this onto a DVD-R in the Open Lab
- SATA Hard Disk (the same one used for Lab 1)
- USB Memory Stick (minimum 64M)
Prerequisite
- Completion of Lab 1
Instructions
- Insert and secure your SATA hard disk to the removable disk slot.
- Power up the computer.
- Insert the Fedora 13 x86_64 Installation DVD into the DVD drive.
- Reboot the system.
Investigation 1: How do you install Fedora?
- After booting from the Installation DVD, at the Welcome Screen choose "Install or upgrade an existing system" to launch the Graphical installation program and select the following options (you can use the media test to verify that your DVD burned correctly -- It will take some time -- otherwise, skip it):
- Language - English
- Keyboard Configuration - U.S. English
- Type of devices: Basic Storage Devices
- There should only be one storage drive listed - select it
- If you get a warning that the drive may need to be initialized, it is because your drive is new and contains no partitition table. Select "Re-Initialize"
- Set your hostname to - f13host (one word, no space, all lowercase)
- Root Password: enter a password of your own choosing. Pick one that is really, really hard to guess to protect your system. (Recommendation: use the first letter and all the punctuation from a favorite phrase or song verse. For example, "To be or not to be, that is the question!" could become the password "Tbontb,titq!").
- Disk Partition Setup - Specify a Custom Layout, and then set up the installation with this configuration:
- Find your existing 300MB partition (/dev/sda1). Edit this entry so that the mountpoint is /boot and is formatted as an ext3 filesystem.
- Don't touch the other existing 300M partition (/dev/sda5).
- Create 4 new LVM Physical Volumes that are 25000 MB in size. Set the File System Type to Physical Volume (LVM). Should be /dev/sda6 to /dev/sda9.
- Create an LVM Volume Group. Set the Volume Group Name to vg_main and set the Physical Extent size to 4MB.
- Click on the Add button (within the "Make LVM Volume Group" window) to create a logical volume within that volume group:
- Mount point / (root), filesystem type ext4, logical volume name root, size 90000MB.
- Say yes to continue without a swap partition.
- Say yes to format /dev/sda1.
- Accept Boot Loader defaults.
- Accept Graphical Desktop and repository defaults.
- Proceed with the installation. Note how long it takes to perform the installation.
- Reboot using the controls on the screen. When the system starts, it will ask you some final configuration questions.
- Check the License Agreement. What license is used for the Fedora distribution? What activities do have restrictions and obligations?
- Create a user account for yourself using the same name as your learn account.
- Set date and time. Normally, you would want to enable Network Time Protocol, but since we will be experimenting with the networking turned off in later labs, leave it disabled.
- Click on Do Not Send Hardware Profile.
- Finish the post-installation customization, wait for the login screen to appear, and then login to your Learn account.
Answer the Investigation 1 question in your lab log book.
Investigation 2: How many files packages and files are installed on the system?
For the rest of the tasks in this lab, you must login to your system using your Learn account and execute all commands under your learn account. If you get a Permission Denied message when trying to execute a command, then switch to the superuser account by running the command su - and type in the password for "root". Once the intended command is executed, type "exit" to exit from the superuser account and return to your regular Learn account.
Record the commands used and the output generated in each of the following steps:
- To find all the mount points, enter the command:
mount
- Study the output and record all the mount points in your log book.
- The name of the installation log file is
/root/install.log
-- It is an ASCII file (how can you be sure?) and can be viewed with theless
command. - You can make use of this file to determine how many packages have been installed: complete the following command to count the number of packages listed in the installation log file:
-
grep ________________ /root/install.log | wc -l
-
- Using the
rpm
command: you can also use the following commands to list all the installed packages, and the total number of packages installed:-
rpm -q -a
-
rpm -q -a | wc -l
-
rpm -qa | wc -l
-
- The
-q
option means query, and the-a
option means all (in other words, query all installed software packages). Did you get the same number of packages from the above two methods? - Some of the files on your system were installed with the software packages, and some were created by system activity (for example, by creating your Learn account and by logging in). If you know the package name (from the
install.log
), you can list all the files that were installed from the package by using the following command:-
rpm -q -l package_name
-
- This combines the
-q
(query) option with the-l
(list filenames) option. - You can pipe the outupt through
wc -l
to count the number of lines:-
rpm -ql package_name| wc -l
-
- Using what you learned in steps 3, 4, and 8, get a count of the total number of files installed by all of the software packages on your system.
- To find out the name that you have assigned to your Linux system, enter the command:
hostname
- To find out the kernel version of your GNU/Linux workstation and the date it was created, enter the command:
uname -r
- To find out all the system processes running on your GNU/Linux workstation, enter the command:
ps -ef
- To capture the list of all the system processes to a file called
ps.lst
, enter the command:ps -ef > ps.lst
- Copy the installation log file
/root/install.log
and the file ps.lst to a USB memory key, or scp to your matrix account as a backup.
Investigation 3: What is a runlevel?
After the kernel boots, it starts a single program, called init
. A running instance of a program is called a process -- the init process always has a process ID (PID) of 1. All other processes on the system are started by init, or they are started by processes started by init.
Most current Linux systems use some variation of the init system originally developed for Unix System V (called "sysvinit") or a newer version called "upstart".
These systems employ the concept of "runlevels" -- groups of software that can be selected, so that the system can be run in various modes. In Fedora systems, these runlevels are used:
Runlevel | Description |
---|---|
0 | Halt (powers off the system) |
1 | Single-user maintenance mode, network not running, character-mode display |
2 | Not normally used - originally meant: Multi-user mode, network not running, character-mode display |
3 | Multi-user mode, network running, character-mode display |
4 | Not normally used |
5 | Multi-user mode, network running, graphical user interface |
6 | Reboot |
In order to implement runlevels, init uses a configuration file and a number of script files:
-
/etc/inittab
is the configuration file, which sets the default runlevel. -
/etc/rc.d/init.d
is a directory of scripts.
In order to determine which of the startup scripts should be executed in each runlevel, the one directory per runlevel is created (/etc/rc.d/rcX.d
, where X is the runlevel). This directory is filled with symbolic links to the startup scripts in /etc/rc.d/init.d
- To find out the value of the runlevel your GNU/Linux system goes into after boot, enter the command:
grep initdefault /etc/inittab
- You should get a single line containing ":" as the field delimiter. The second field stores the value of the runlevel the init process will use after a reboot. Record the output in your log book.
- A list of processes that should be running at a given runlevel can be found in the directory
/etc/rc.d/rcX.d
where X is the runlevel. Do a directory listing of that directory and study what files are in there. Pay attention to the first three characters of each file name. They have special meaning to the system. Record your observation in your log book. - Make a backup of the file /etc/inittab with the command:
cp /etc/inittab /etc/inittab.original
- Edit the file
/etc/inittab
and change the default runlevel to 3. Save the change and reboot your system. - After the reboot, you should get a "Text Login Screen". Login with your Learn account and type startx at the command prompt. Describe what happens in your log book.
- Enter the command:
runlevel
-- this shows the previous and current runlevel. Record the values in your book.
Answer the Investigation 3 question.
Investigation 4: What is the network configuration?
- To check the network configuration settings obtained from the DHCP server, run the following commands, describing the output in your log book:
- ifconfig
- route
- netstat -rn
- nslookup (at the > prompt, enter the word "server" (do not type the quotes) and record the output. Type exit to leave nslookup).
- Find the following information in the output of the above commands:
- MAC address (physical or hardware address) of the ethernet network interface
- The IP address (logical address) assigned by the DHCP server
- The default route (gateway)
- The DNS nameserver
Answer the Investigation 4 question.
Investigation 5: How do You Secure the Grub Boot Loader?
By default, the Grub boot loader allows anyone with access to the computer at boot time to set the runlevel, or change the boot parameters, which can allow them to influence the init process and which kernel image is loaded. Anyone with access to the boot prompt can therefore bypass security controls and control which software is loaded. For example, rebooting to runlevel 1, known as single user mode, gives the user root priveleges without the need for a password! Obviously, giving a non-administrator this much control can be dangerous, and it is wise to protect the boot loader with a secure password.
We will need to choose a password, encrypt with the grub programs hash utility (called md5crypt), and add the encrypted hash of your password to the grub configuration file, /etc/grub.conf
- Choose a suitable password.
- Open the grub program by typing the command:
grub
- At the grub prompt, type in the command:
md5crypt
- When prompted for a password, carefully type in your password. The program will display the encrypted hash of your password. Carefully write down that encrypted hash generated by the program.
- Type the command:
quit
to exit the grub program. - Open the grub configuration file,
/etc/grub.conf
for editing. (This file is actually linked to /boot/grub/grub.conf). - Carefully add the line:
password --md5 password-hash
(note: password-hash is the hash you generated with md5crypt) Place this line between the splashimage line and the title line. If there are other lines there, there is no need to remove them. Just insert your password line as a new line. - Make sure you have not made a mistake. What you type in must match exactly the output from the md5crypt command.
- While you are editing the file you should also increase the timeout for grub to automatically boot the default OS. Edit the line
timeout=0
totimeout=5
to give us more time to interrupt the process. - You should also ensure that the grub boot menu is not hidden. Add a hash sign (
#
) to the start of the line which reads:hiddenmenu
- Save the file and exit. Your Grub boot loader is now password protected.
- Find the section of this article that explains how to change the runlevel at boot time, and read it. Reboot your system, trying to change to runlevel 1 from the boot prompt, and see if the password protection worked.
- From now on, when you want to change boot parameters when you boot, you must type lowercase
p
at the boot prompt and enter the required password.
Completing the Lab
Check off the following items before asking your instructor to check your lab:
- Task 1 - Install GNU/Linux Workstation using Fedora
- Task 2 - Collect system information after installation.
- Task 3 - Customize and configure boot time environment
- Task 4 - Collect network information
- Task 5 - Password protect Grub Bootloader
Arrange evidence for each of these items on your screen, then ask your instructor to review them and sign off on the lab's completion:
- Grub is password protected.
- Can login with your "learn" account name
- Has all the mount points
- Has the package count
- Has edited the default runlevel
- Has the correct IP address and MAC address
- Find out the default route (gateway)
- IP of the DNS name server
- Name and contact information on your disk pack
Preparing for the Quizzes
- How many packages were installed?
- How many files (correct to the nearest hundred) were installed?
- How many mount points were used?
- How many users were created automatically on your system (do not count your learn account)?
- What is your learn account's UID and GID?
- What is your learn account's home directory?
- What is the home directory for the user "root"?
- How do you determine the host name of your GNU/Linux workstation?
- What command can display the NIC's MAC address?
- Which file contains the default "runlevel" value for your GNU/Linux workstation?