Question : My system is taking a lot of time to boot. How can I find out which services are taking long time to start? Answer : systemd-analyze command can be utilized to find out information about how much each service took to start. systemd-analyze time can provide overall information about how long it took […]
Archives for October 2016
CentOS / RHEL 6 : How do I find my current runlevel?
The output of the runlevel command will indicate your previous and current runlevel separated by a single space. If there was no previous runlevel ‘N‘ will be used as a placeholder. For example: # runlevel N 5 The output above indicates that the current runlevel is 5 and there was no previous runlevel. Changing current […]
CentOS / RHEL 7 : How to change runlevels (targets) with systemd
Systemd has replaced sysVinit as the default service manager in RHEL 7. Some of the sysVinit commands have been symlinked to their RHEL 7 counterparts, however this will eventually be deprecated in favor of the standard systemd commands in the future. SysVinit V/s systemd runlevels Here is a comparison between SysVinit runlevels V/s systemd targets. […]
CentOS / RHEL 6 : How to Boot into single user mode
Booting into single user mode using GRUB is accomplished by editing the kernel line. single user mode can be accessed by appending an “S“, “s“, or “single” to the kernel command line in GRUB. This assumes that either the GRUB boot menu is not password protected or that you have access to the password if […]
CentOS / RHEL 6 : How to completely remove device mapper multipath (dm-multipath)
Device Mapper Multipathing (or DM-multipathing) is a Linux native multipath tool, which allows you to configure multiple I/O paths between server nodes and storage arrays into a single device. The post describes the steps to un-configure and remove device mapper multipath completely from the system. Disabling the service 1. Make sure device mapper multipath is […]
CentOS / RHEL 6 : How to Disable / Enable direct root login via telnet
By default root is not allowed to login through telnet for security reasons. Passwords are transmitted in plain text when you use telnet. For this reason, the root user is not allowed to connect using telnet by default. To verify root is disabled we can check the config file /etc/xinetd.d/telnet. When the parameter disable is […]
CentOS / RHEL : How to Disable / Enable direct root and non-root user ssh login
Question : How do I secure SSH to disable direct root/non-root user login? Answer : The procedure described here disallows direct root login, so when you connect using SSH you need to first login as a normal user, then su to obtain root access. Disabling root login 1. Edit the /etc/ssh/sshd_config file with a text […]
CentOS / RHEL : How to disable root login or root access on a system
Why to disable root login? – Having the root password defined is not necessary on a linux system. Root password can be disabled but it is not a good practice since the system prompts for the root password absolutely if in case it goes into the maintenance mode. It will not be possible to proceed […]
CentOS / RHEL 5 : How to password-protect single user mode
Locking down single-user mode in RHEL5 requires editing /boot/grub/grub.conf and /etc/inittab files. 1. Define the single user login shell in /etc/inittab by adding a the below line : # vi /etc/inittab … su:S:wait:/sbin/sulogin Or you can also use output redirection to have the entry placed in the file /etc/inittab : # echo “su:S:wait:/sbin/sulogin” >>/etc/inittab 2. […]
CentOS / RHEL 6 : How to password-protect single user mode
Locking down single-user mode in RHEL6 requires editing /boot/grub/grub.conf and /etc/sysconfig/init. 1. Change the definition of the single user login shell in /etc/sysconfig/init from sushell to sulogin # vi /etc/sysconfig/init … # Set to ‘/sbin/sulogin’ to prompt for password on single-user mode # Set to ‘/sbin/sushell’ otherwise SINGLE=/sbin/sulogin