Configuration; Using The Red Hat Update Agent Configuration Tool - Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0 User Reference Manual

Table of Contents

Advertisement

Chapter 2. Red Hat Update Agent
29
After running this command, your RHN System Profile will reflect the latest software versions in-
stalled on your system.
2.3.5.4. Log File
The Red Hat Update Agent keeps a log of all the actions that it performs on your system in
the file
. It uses the standard rotating log method. Thus, older logs are in
/var/log/up2date
,
, and
. The log files store
/var/log/up2date.1
/var/log/up2date.2
/var/log/up2date.3
actions performed by the Red Hat Update Agent such as when your RPM database is opened,
when it connects to Red Hat Network to retrieve information from your System Profile, which
packages are downloaded, which packages are installed using the Red Hat Update Agent, and
which packages are deleted from your system after installation. If you choose to install and delete
packages yourself, it will not be logged in this file. You should keep your own log of actions not
performed with the Red Hat Update Agent.
2.4. Configuration
The Red Hat Update Agent offers various options to configure its settings.
If you are not running the X Window System or prefer the command line version, skip to Section
2.4.2.
2.4.1. Using the Red Hat Update Agent Configuration Tool
You must be root to run the Red Hat Update Agent Configuration Tool. If you start the Red Hat
Update Agent Configuration Tool as a standard user, you will be prompted to enter the root password
before proceeding. The Red Hat Update Agent Configuration Tool can be started by typing the
command
at a shell prompt (for example, an xterm or a gnome-terminal).
up2date-config
2.4.1.1. General Settings
The General tab allows you to enable an HTTP Proxy Server. If your network connection
requires you to use an HTTP Proxy Server to make HTTP connections, select the Enable HTTP
Proxy option and type your proxy server in the text field with the format http://HOST:PORT.
For example, to use the proxy server http://squid.mysite.org on port 3128, you would enter
http://squid.mysite.org:3128 in the text field. Additionally, if your proxy server requires
a username and password, select the Use Authentication option and enter your username and
password in the respective text fields.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network basic 4.0

Table of Contents