34
Chapter 2. Red Hat Update Agent
After running this command, your RHN System Profile reflects the latest software versions
installed on your system.
2.3.4. Log File
The
Red Hat Update Agent
keeps a log of all the actions that it performs on your system
in the file
/var/log/up2date
. It uses the standard rotating log method. Thus, older logs
are in
/var/log/up2date.1
,
/var/log/up2date.2
, and
/var/log/up2date.3
.
The log files store actions performed by the
Red Hat Update Agent
such as when your
RPM database is opened, when it connects to Red Hat Network to retrieve information
from your System Profile, which packages are downloaded, which packages are installed
using the
Red Hat Update Agent
, and which packages are deleted from your system
after installation. If you choose to install and delete packages yourself, it is not logged in
this file. Red Hat Network recommends that you keep a log of actions not performed with
the
Red Hat Update Agent
.
2.4. Configuration
The
Red Hat Update Agent
offers various options to configure its settings.
If you are not running the X Window System or prefer the command line version, skip to
Section 2.4.2
Command Line Version
.
2.4.1. Using the Red Hat Update Agent Configuration Tool
You must be root to run the
Red Hat Update Agent Configuration Tool
. If started by
a user other than root, the Red Hat Update Agent prompts you for the root password.
The
Red Hat Update Agent Configuration Tool
can be started by typing the command
up2date --config
at a shell prompt (for example, an
xterm
or a
gnome-terminal
).
2.4.1.1. General Settings
The
General
tab allows you to enable an HTTP Proxy Server. If your network connec-
tion requires you to use an HTTP Proxy Server to make HTTP connections, select the
Enable HTTP Proxy
option and type your proxy server in the text field with the for-
mat http://HOST:PORT. For example, to use the proxy server squid.mysite.org on port
3128, you would enter
squid.mysite.org:3128
in the text field. Additionally, if
your proxy server requires a username and password, select the
Use Authentication
op-
tion and enter your username and password in the respective text fields.
Содержание NETWORK 4.0 -
Страница 1: ...Red Hat Network 4 0 Reference Guide...
Страница 10: ......
Страница 16: ...vi Introduction to the Guide...
Страница 24: ...8 Chapter 1 Red Hat Network Overview...
Страница 40: ...24 Chapter 2 Red Hat Update Agent Figure 2 11 Available Package Updates...
Страница 58: ...42 Chapter 2 Red Hat Update Agent...
Страница 80: ...64 Chapter 5 Red Hat Network Registration Client Figure 5 15 Text Mode Welcome Screen...
Страница 186: ...170 Chapter 7 Monitoring...
Страница 200: ...184 Chapter 8 UNIX Support Guide...
Страница 214: ...198 Appendix A Command Line Config Management Tools...
Страница 274: ...258 Appendix C Probes...
Страница 282: ...266 Glossary...