Skip to content

Commit be98bff

Browse files
committed
Remove references to CL6 in installation doc - it's EOL
1 parent 72b5ecc commit be98bff

File tree

1 file changed

+11
-52
lines changed
  • docs/cloudlinuxos/cloudlinux_os_kernel

1 file changed

+11
-52
lines changed

docs/cloudlinuxos/cloudlinux_os_kernel/README.md

Lines changed: 11 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ This will:
9292
## Hybrid Kernels
9393

9494
::: tip Hybrid kernel availability
95-
Hybrid kernels are only available for CloudLinux OS 6 and 7.
95+
Hybrid kernels are only available for CloudLinux OS 7.
9696
:::
9797

9898
Hybrid kernels allow you to take advantage of the benefits and features available in newer kernels without having to completely upgrade to another version of the operating system.
@@ -125,13 +125,6 @@ hybrid-to-normal
125125
```
126126
:::
127127

128-
#### Known limitations and issues of hybrid kernels
129-
130-
**CloudLinux OS 6 Hybrid kernel**
131-
132-
1. We do not remove Hybrid kernel after migration from Hybrid to the normal channel, but we remove <span class="notranslate"> linux-firmware </span> package which is needed to boot Hybrid kernel. This is because <span class="notranslate"> CloudLinux OS </span> 6 does not allow to remove the package of currently running kernel. Thus please don't reboot the server back to Hybrid kernel after you remove it.
133-
134-
2. Kernel module signature isn't checking for now, as 3.10 kernel is using x509 certificates to generate keys and CloudLinux OS 6 cannot detect signatures created in such way.
135128

136129
## SecureLinks and Link Traversal Protection
137130

@@ -401,29 +394,20 @@ This command is available within CageFS.
401394

402395
**Requirements**
403396

404-
<span class="notranslate"> CloudLinux OS </span> 6 (requires Hybrid kernel) or 7
397+
<span class="notranslate"> CloudLinux OS 7</span>
405398
Kernel Version: 3.10.0-427.36.1.lve1.4.47
406399

407400
**Installation and configuration**
408401

409402
To install <span class="notranslate"> cloudlinux-fchange </span> system run:
410403

411-
_CloudLinux OS 7:_
412404
<div class="notranslate">
413405

414406
```
415407
yum install cloudlinux-fchange --enablerepo=cloudlinux-updates-testing
416408
```
417409
</div>
418410

419-
_CloudLinux OS 6 Hybrid:_
420-
421-
<div class="notranslate">
422-
423-
```
424-
yum install cloudlinux-fchange --enablerepo=cloudlinux-hybrid-testing
425-
```
426-
</div>
427411
Configuration file can be found in <span class="notranslate">/etc/sysconfig/cloudlinux-fchange </span>
428412

429413
Database containing list of modified files is located at <span class="notranslate">/var/lve/cloudlinux-fchange.db </span> by default.
@@ -433,7 +417,6 @@ Database containing list of modified files is located at <span class="notranslat
433417
After successful installation the event collecting daemon starts automatically, providing all <span class="notranslate"> kernel-exposed </span> data are in place.
434418

435419
To start daemon:
436-
<span class="notranslate">_CloudLinux OS 7:_ </span>
437420

438421
<div class="notranslate">
439422

@@ -442,17 +425,7 @@ systemctl start cloudlinux-file-change-collector
442425
```
443426
</div>
444427

445-
_CloudLinux OS 6 Hybrid:_
446-
447-
<div class="notranslate">
448-
449-
```
450-
service cloudlinux-file-change-collector start
451-
```
452-
</div>
453428
To stop daemon:
454-
<span class="notranslate"> </span>
455-
_CloudLinux OS 7:_
456429

457430
<div class="notranslate">
458431

@@ -461,15 +434,6 @@ systemctl stop cloudlinux-file-change-collector
461434
```
462435
</div>
463436

464-
_CloudLinux OS 6 Hybrid:_
465-
466-
<div class="notranslate">
467-
468-
```
469-
service cloudlinux-file-change-collector stop
470-
```
471-
</div>
472-
473437

474438
To uninstall <span class="notranslate"> cloudlinux-fchange </span> run:
475439
<div class="notranslate">
@@ -831,10 +795,6 @@ mount -o remount /proc
831795
to apply `/etc/fstab` changes.
832796
Nevertheless, we recommend to manage procfs mount options via `/etc/sysctl.conf` as described above for backward compatibility.
833797

834-
::: tip Note
835-
There is a known issue on CloudLinux OS 6 systems. User cannot see full /proc inside CageFS even when this user is in “super” group, that should see full /proc. This issue does not affect users with CageFS disabled. CloudLinux OS 7 is not affected.
836-
:::
837-
838798
::: tip Note
839799
Starting from lve-utils 3.0-21.2, lve_namespaces service can read parameters from the /etc/sysctl.d/90-cloudlinux.conf.
840800
:::
@@ -867,7 +827,7 @@ On Cloudlinux OS 8, changing the `/etc/fstab` file for setting `/proc` remountin
867827
Since CL7 kernel it’s recommended to use the native sysctl parameter `yama.ptrace_scope`. For details refer to the [official documentation](https://docs.kernel.org/admin-guide/LSM/Yama.html#ptrace-scope).
868828
:::
869829

870-
Starting with kernel 3.10.0-427.18.s2.lve1.4.21 ( <span class="notranslate"> CloudLinux OS </span> 7) and 2.6.32-673.26.1.lve1.4.17 ( <span class="notranslate"> CloudLinux OS </span> 6) we re-implemented <span class="notranslate"> ptrace block </span> to protect against <span class="notranslate"> ptrace </span> family of vulnerabilities. It prevents end user from using any <span class="notranslate"> ptrace </span> related functionality, including such commands as <span class="notranslate"> strace, lsof </span> or <span class="notranslate"> gdb </span> .
830+
Starting with kernel 3.10.0-427.18.s2.lve1.4.21 ( <span class="notranslate"> CloudLinux OS </span> 7) we re-implemented <span class="notranslate"> ptrace block </span> to protect against <span class="notranslate"> ptrace </span> family of vulnerabilities. It prevents end user from using any <span class="notranslate"> ptrace </span> related functionality, including such commands as <span class="notranslate"> strace, lsof </span> or <span class="notranslate"> gdb </span> .
871831

872832
By default, <span class="notranslate"> CloudLinux OS </span> doesn't prevent <span class="notranslate"> ptrace </span> functionality.
873833

@@ -919,13 +879,13 @@ This is needed only for CloudLinux OS 6 and <span class="notranslate"> Hybrid </
919879
## Umask behavior
920880

921881
:::tip Note
922-
CloudLinux OS 6, CloudLinux OS 6 hybrid, CloudLinux OS 7, CloudLinux OS 7 hybrid kernels.
882+
CloudLinux OS 7, CloudLinux OS 7 hybrid kernels
923883
:::
924884

925885
Starting from the kernel module **lve-kmod-2.0-10**, the behavior of umask is changed.
926886

927887
Now, when entering LVE task's original umask value is preserved, instead of using LVE's umask value.
928-
This behavior is typical for all kernels: CloudLinux OS 6, CloudLinux OS 6 hybrid, CloudLinux OS 7, CloudLinux OS 7 hybrid kernels.
888+
This behavior is typical for all kernels: CloudLinux OS 7, CloudLinux OS 7 hybrid kernels.
929889

930890
## IO limits latency
931891

@@ -936,7 +896,7 @@ By defining <span class="notranslate"> IO latency, you can make sure that no pro
936896

937897
This option is <span class="notranslate"> OFF by default. </span>
938898

939-
_For CloudLinux OS 6 , CloudLinux OS 7, CloudLinux OS 8 (kmodlve 2.1-2 and later):_
899+
_For CloudLinux OS 7, CloudLinux OS 8 (kmodlve 2.1-2 and later):_
940900

941901
To enable <span class="notranslate"> IO </span> Limits latency and set it to 10 seconds:
942902
<div class="notranslate">
@@ -979,7 +939,7 @@ echo 2000000000 > /sys/module/iolimits/**parameters/latency
979939

980940
CloudLinux OS kernel provides real time usage data in file.
981941

982-
All the statistics can be read from that file in real time. Depending on your kernel version you will get either Version 6 of the file, or version 4 of the file.
942+
All the statistics can be read from that file in real time. Depending on your kernel version, you will get either version 6 or version 4 of the file.
983943
You can detect the version by reading the first line of the file. It should look like:
984944

985945
6:LVE... for version 6
@@ -989,7 +949,7 @@ First line presents headers for the data.
989949
Second line shows default limits for the server, with all other values being 0.
990950
The rest of the lines present limits & usage data on per <span class="notranslate"> LVE </span> bases.
991951

992-
Version 6 (CL6 & hybrid kernels):
952+
Version 6 file example:
993953
<div class="notranslate">
994954

995955
```
@@ -1047,7 +1007,7 @@ More info on <span class="notranslate"> flashcache </span> : [https://github.com
10471007

10481008
## OOM killer for LVE processes
10491009

1050-
When <span class="notranslate">LVE</span> reaches its memory limit, the processes inside that <span class="notranslate"> LVE </span> are killed by <span class="notranslate"> OOM Killer </span> and appropriate message is written to <span class="notranslate"> /var/log/messages </span> . When any <span class="notranslate"> LVE </span> hits huge number of memory limits in short period of time, then <span class="notranslate"> OOM Killer </span> could cause system overload. Starting from kernel 2.6.32-673.26.1.lve1.4.15 ( <span class="notranslate"> CloudLinux OS </span> 6) and from kernel 3.10.0-427.18.2.lve1.4.14 ( <span class="notranslate"> CloudLinux OS </span> 7) heavy <span class="notranslate"> OOM Killer </span> could be disabled. If so - lightweight <span class="notranslate"> SIGKILL </span> will be used instead.
1010+
When <span class="notranslate">LVE</span> reaches its memory limit, the processes inside that <span class="notranslate"> LVE </span> are killed by <span class="notranslate"> OOM Killer </span> and appropriate message is written to <span class="notranslate"> /var/log/messages </span> . When any <span class="notranslate"> LVE </span> hits huge number of memory limits in short period of time, then <span class="notranslate"> OOM Killer </span> could cause system overload. Starting from kernel 3.10.0-427.18.2.lve1.4.14 ( <span class="notranslate"> CloudLinux OS </span> 7) heavy <span class="notranslate"> OOM Killer </span> could be disabled. If so - lightweight <span class="notranslate"> SIGKILL </span> will be used instead.
10511011

10521012
:::tip Note
10531013
It is recommended to disable OOM killer for LVE processes and use SIGKILL instead
@@ -1136,11 +1096,10 @@ Visit the [Kernel Panic Receiver project GitHub page](https://github.com/cloudli
11361096

11371097
To send required kernel logs from the clients' machines to _Kernel Panic Receiver_, we configure the default Linux kernel feature called _netconsole_.
11381098

1139-
#### For CloudLinux OS 6-9
1099+
#### For CloudLinux OS 7-9
11401100

11411101
The configuration is done by the `initscripts` package, starting from the following versions:
11421102

1143-
* For CloudLinux OS 6: `9.03.61-1.cloudlinux`
11441103
* For CloudLinux OS 7: `9.49.49-1.cloudlinux`
11451104
* For CloudLinux OS 8-9: `10.00.4-1.cloudlinux`
11461105

@@ -1162,7 +1121,7 @@ The _netconsole_ sends only OOPs-related messages from the kernel ring buffer. I
11621121

11631122
### Disabling the feature
11641123

1165-
#### For CloudLinux OS 6-9
1124+
#### For CloudLinux OS 7-9
11661125

11671126
If you don't want to send us the data, you can turn the _netconsole_ service off (we don't recommend it, though).
11681127
To disable transferring the data, just comment the `SYSLOGADDR` parameter in the _netconsole_ config file (`/etc/sysconfig/netconsole`):

0 commit comments

Comments
 (0)