118
Chapter 7:Initial Configuration
7.3.1 Configuring the Piranha Configuration Tool Web Server
Port
The
Piranha Configuration Tool
runs on port 3636 by default.
To change this port number,
change the line
Port 3636
in Section 2 of the
piranha-gui
Web server configuration file
/etc/sysconfig/ha/conf/httpd.conf
.
To use the
Piranha Configuration Tool
you will need at minimum a text-only Web browser. If you
start a Web browser on the primary LVS router, open the location
http://
localhost:3636
. You
can reach the
Piranha Configuration Tool
from anywhere on through a Web browser by replacing
localhost with the hostname or IP address of the primary LVS router.
When your browser connects to the
Piranha Configuration Tool
, you will notice that you must login
to access the cluster configuration services. Enter
piranha
in the
Username
field and the password
set with
piranha-passwd
in the
Password
field.
Now that the
Piranha Configuration Tool
is running, you may wish to consider limiting who has
access to the tool over the network. The next section reviews ways to accomplish this task.
7.4 Limiting Access To the Piranha Configuration
Tool
The
Piranha Configuration Tool
prompts for a valid username and password combination. However,
because all of the data passed to the
Piranha Configuration Tool
is in clear-text, it is recommended
that you restrict access to trusted networks or only to the local machine.
The easiest way to restrict access is to use Apache’s built in access control mechanisms by editing
/etc/sysconfig/ha/web/secure/.htaccess
. After altering the file you do not have to
restart the
piranha-gui
service because the server checks the
.htaccess
file each time it ac-
cesses the directory.
By default, the access controls for this directory allow anyone to view the contents of the directory.
Here is what the default access looks like:
Order deny,allow
Allow from all
To limit access to the
Piranha Configuration Tool
to only the localhost change the
.htaccess
file
to allow access from only the loopback device (127.0.0.1). For more information on the loopback
device, see the chapter titled Network Scripts in the Official Red Hat Linux Reference Guide.
Order deny,allow
Deny from all
Allow from 127.0.0.1
Summary of Contents for ENTERPRISE LINUX AS 2.1 -
Page 1: ...Red Hat Enterprise Linux AS 2 1 The Official Red Hat Enterprise Linux AS Installation Guide ...
Page 8: ...viii ...
Page 14: ...xiv Introduction ...
Page 15: ...Part I Installing Red Hat Enterprise Linux AS ...
Page 16: ......
Page 26: ...26 Chapter 1 Steps to Get You Started ...
Page 30: ...30 Chapter 2 System Requirements Table ...
Page 80: ...80 Chapter 3 Installing Red Hat Enterprise Linux AS ...
Page 94: ...94 Chapter 4 Installing Red Hat Enterprise Linux AS via Text Mode ...
Page 95: ...Part II Configuring Red Hat Enterprise Linux AS ...
Page 96: ......
Page 100: ...100 Chapter 5 Introduction ...
Page 114: ...114 Chapter 6 Linux Virtual Server Overview ...
Page 153: ...Part III Appendixes ...
Page 154: ......
Page 156: ...156 Appendix A Additional Resources for LVS Clustering ...
Page 160: ...160 Appendix B A Sample etc sysconfig ha lvs cf File ...
Page 162: ...162 Appendix C Removing Red Hat Linux ...
Page 168: ...168 Appendix D Getting Technical Support ...
Page 178: ...178 Appendix E Troubleshooting Your Installation of Red Hat Enterprise Linux AS ...