34
Chapter 2. Red Hat Update Agent
After running this command, your RHN System Profile reflects the latest software versions
installed on your system.
2.3.4. Log File
The
Red Hat Update Agent
keeps a log of all the actions that it performs on your system
in the file
/var/log/up2date
. It uses the standard rotating log method. Thus, older logs
are in
/var/log/up2date.1
,
/var/log/up2date.2
, and
/var/log/up2date.3
.
The log files store actions performed by the
Red Hat Update Agent
such as when your
RPM database is opened, when it connects to Red Hat Network to retrieve information
from your System Profile, which packages are downloaded, which packages are installed
using the
Red Hat Update Agent
, and which packages are deleted from your system
after installation. If you choose to install and delete packages yourself, it is not logged in
this file. Red Hat Network recommends that you keep a log of actions not performed with
the
Red Hat Update Agent
.
2.4. Configuration
The
Red Hat Update Agent
offers various options to configure its settings.
If you are not running the X Window System or prefer the command line version, skip to
Section 2.4.2
Command Line Version
.
2.4.1. Using the Red Hat Update Agent Configuration Tool
You must be root to run the
Red Hat Update Agent Configuration Tool
. If started by
a user other than root, the Red Hat Update Agent prompts you for the root password.
The
Red Hat Update Agent Configuration Tool
can be started by typing the command
up2date --config
at a shell prompt (for example, an
xterm
or a
gnome-terminal
).
2.4.1.1. General Settings
The
General
tab allows you to enable an HTTP Proxy Server. If your network connec-
tion requires you to use an HTTP Proxy Server to make HTTP connections, select the
Enable HTTP Proxy
option and type your proxy server in the text field with the for-
mat http://HOST:PORT. For example, to use the proxy server squid.mysite.org on port
3128, you would enter
squid.mysite.org:3128
in the text field. Additionally, if
your proxy server requires a username and password, select the
Use Authentication
op-
tion and enter your username and password in the respective text fields.
Summary of Contents for NETWORK 4.0 -
Page 1: ...Red Hat Network 4 0 Reference Guide...
Page 10: ......
Page 16: ...vi Introduction to the Guide...
Page 24: ...8 Chapter 1 Red Hat Network Overview...
Page 40: ...24 Chapter 2 Red Hat Update Agent Figure 2 11 Available Package Updates...
Page 58: ...42 Chapter 2 Red Hat Update Agent...
Page 80: ...64 Chapter 5 Red Hat Network Registration Client Figure 5 15 Text Mode Welcome Screen...
Page 186: ...170 Chapter 7 Monitoring...
Page 200: ...184 Chapter 8 UNIX Support Guide...
Page 214: ...198 Appendix A Command Line Config Management Tools...
Page 274: ...258 Appendix C Probes...
Page 282: ...266 Glossary...