diff --git a/docs/en-US/configure-package-repository.xml b/docs/en-US/configure-package-repository.xml index 718b3ff5272..7687fa392ff 100644 --- a/docs/en-US/configure-package-repository.xml +++ b/docs/en-US/configure-package-repository.xml @@ -46,9 +46,9 @@ Use your preferred editor and open (or create) /etc/apt/sources.list.d/cloudstack. Add the community provided repository to the file: deb http://cloudstack.apt-get.eu/ubuntu precise 4.0 We now have to add the public key to the trusted keys. - # wget -O - http://cloudstack.apt-get.eu/release.asc|apt-key add - + $ wget -O - http://cloudstack.apt-get.eu/release.asc|apt-key add - Now update your local apt cache. - # apt-get update + $ apt-get update Your DEB package repository should now be configured and ready for use.
@@ -65,7 +65,7 @@ gpgcheck=1 Next you'll want to add the GPG key: -# rpm --import http://server.url/downloads/RPM-GPG-KEY.txt +$ rpm --import http://server.url/downloads/RPM-GPG-KEY.txt Now you should be able to install CloudStack using Yum.
diff --git a/docs/en-US/hypervisor-host-install-agent.xml b/docs/en-US/hypervisor-host-install-agent.xml index d1b774a7a30..e5bfa37fb6d 100644 --- a/docs/en-US/hypervisor-host-install-agent.xml +++ b/docs/en-US/hypervisor-host-install-agent.xml @@ -27,8 +27,8 @@ To manage KVM instances on the host &PRODUCT; uses a Agent. This Agent communicates with the Management server and controls all the instances on the host. First we start by installing the agent: In RHEL or CentOS: - yum install cloud-agent + $ yum install cloud-agent In Ubuntu: - apt-get install cloud-agent + $ apt-get install cloud-agent The host is now ready to be added to a cluster. This is covered in a later section, see . It is recommended that you continue to read the documentation before adding the host! \ No newline at end of file diff --git a/docs/en-US/hypervisor-host-install-firewall.xml b/docs/en-US/hypervisor-host-install-firewall.xml index d9f1146f41c..ae82fc47afa 100644 --- a/docs/en-US/hypervisor-host-install-firewall.xml +++ b/docs/en-US/hypervisor-host-install-firewall.xml @@ -37,23 +37,23 @@
Open ports in RHEL/CentOS RHEL and CentOS use iptables for firewalling the system, you can open extra ports by executing the following iptable commands: - iptables -I INPUT -p tcp -m tcp --dport 22 -j ACCEPT - iptables -I INPUT -p tcp -m tcp --dport 1798 -j ACCEPT - iptables -I INPUT -p tcp -m tcp --dport 16509 -j ACCEPT - iptables -I INPUT -p tcp -m tcp --dport 5900:6100 -j ACCEPT - iptables -I INPUT -p tcp -m tcp --dport 49152:49216 -j ACCEPT + $ iptables -I INPUT -p tcp -m tcp --dport 22 -j ACCEPT + $ iptables -I INPUT -p tcp -m tcp --dport 1798 -j ACCEPT + $ iptables -I INPUT -p tcp -m tcp --dport 16509 -j ACCEPT + $ iptables -I INPUT -p tcp -m tcp --dport 5900:6100 -j ACCEPT + $ iptables -I INPUT -p tcp -m tcp --dport 49152:49216 -j ACCEPT These iptable settings are not persistent accross reboots, we have to save them first. - iptables-save > /etc/sysconfig/iptables + $ iptables-save > /etc/sysconfig/iptables
Open ports in Ubuntu The default firewall under Ubuntu is UFW (Uncomplicated FireWall), which is a Python wrapper around iptables. To open the required ports, execute the following commands: - ufw allow proto tcp from any to any port 22 - ufw allow proto tcp from any to any port 1798 - ufw allow proto tcp from any to any port 16509 - ufw allow proto tcp from any to any port 5900:6100 - ufw allow proto tcp from any to any port 49152:49216 + $ ufw allow proto tcp from any to any port 22 + $ ufw allow proto tcp from any to any port 1798 + $ ufw allow proto tcp from any to any port 16509 + $ ufw allow proto tcp from any to any port 5900:6100 + $ ufw allow proto tcp from any to any port 49152:49216 By default UFW is not enabled on Ubuntu. Executing these commands with the firewall disabled does not enable the firewall.
diff --git a/docs/en-US/hypervisor-host-install-libvirt.xml b/docs/en-US/hypervisor-host-install-libvirt.xml index e63a8f40dc1..34e66783600 100644 --- a/docs/en-US/hypervisor-host-install-libvirt.xml +++ b/docs/en-US/hypervisor-host-install-libvirt.xml @@ -49,9 +49,9 @@ Restart libvirt In RHEL or CentOS: - service libvirtd restart + $ service libvirtd restart In Ubuntu: - service libvirt-bin restart + $ service libvirt-bin restart diff --git a/docs/en-US/hypervisor-host-install-prepare-os.xml b/docs/en-US/hypervisor-host-install-prepare-os.xml index e2e32e709ae..44852f21c2d 100644 --- a/docs/en-US/hypervisor-host-install-prepare-os.xml +++ b/docs/en-US/hypervisor-host-install-prepare-os.xml @@ -29,12 +29,12 @@ Log in to your OS as root. Check for a fully qualified hostname. - hostname --fqdn + $ hostname --fqdn This should return a fully qualified hostname such as "kvm1.lab.example.org". If it does not, edit /etc/hosts so that it does. Make sure that the machine can reach the Internet. - ping www.cloudstack.org + $ ping www.cloudstack.org Turn on NTP for time synchronization. @@ -42,9 +42,9 @@ Install NTP On RHEL or CentOS: - yum install ntp + $ yum install ntp On Ubuntu: - apt-get install openntpd + $ apt-get install openntpd diff --git a/docs/en-US/hypervisor-host-install-security-policies.xml b/docs/en-US/hypervisor-host-install-security-policies.xml index 5fd6925a8c0..03da04b6eb3 100644 --- a/docs/en-US/hypervisor-host-install-security-policies.xml +++ b/docs/en-US/hypervisor-host-install-security-policies.xml @@ -32,10 +32,10 @@ Check to see whether SELinux is installed on your machine. If not, you can skip this section. In RHEL or CentOS, SELinux is installed and enabled by default. You can verify this with: - rpm -qa | grep selinux + $ rpm -qa | grep selinux - Set the SELINUX variable in /etc/selinux/config to "permissive". This ensures that the permissive setting will be maintained after a system reboot. + Set the SELINUX variable in /etc/selinux/config to "permissive". This ensures that the permissive setting will be maintained after a system reboot. In RHEL or CentOS: vi /etc/selinux/config Change the following line @@ -45,7 +45,7 @@ Then set SELinux to permissive starting immediately, without requiring a system reboot. - setenforce permissive + $ setenforce permissive @@ -55,14 +55,14 @@ Check to see whether AppArmor is installed on your machine. If not, you can skip this section. In Ubuntu AppArmor is installed and enabled by default. You can verify this with: - dpkg --list 'apparmor' + $ dpkg --list 'apparmor' Disable the AppArmor profiles for libvirt - ln -s /etc/apparmor.d/usr.sbin.libvirtd /etc/apparmor.d/disable/ - ln -s /etc/apparmor.d/usr.lib.libvirt.virt-aa-helper /etc/apparmor.d/disable/ - apparmor_parser -R /etc/apparmor.d/usr.sbin.libvirtd - apparmor_parser -R /etc/apparmor.d/usr.lib.libvirt.virt-aa-helper + $ ln -s /etc/apparmor.d/usr.sbin.libvirtd /etc/apparmor.d/disable/ + $ ln -s /etc/apparmor.d/usr.lib.libvirt.virt-aa-helper /etc/apparmor.d/disable/ + $ apparmor_parser -R /etc/apparmor.d/usr.sbin.libvirtd + $ apparmor_parser -R /etc/apparmor.d/usr.lib.libvirt.virt-aa-helper