S & P Computer System Blog

I love Linux !! Sharing is caring….

You may try to install the modules via yum.

Search all app:
yum search app |grep app-

Then install the modules you want.
yum -y install app-content-filter.noarch

Hope this helps you.

 

yum install app-account-import.noarch app-account-import-core.noarch app-accounts.noarch app-accounts-core.noarch app-antiphishing.noarch app-antiphishing-core.noarch app-antivirus.noarch app-antivirus-core.noarch app-bandwidth.noarch app-bandwidth-core.noarch app-base.noarch app-base-core.noarch app-certificate-manager.noarch app-certificate-manager-core.noarch app-clearcenter.noarch app-clearcenter-core.noarch app-clearsync-core.noarch app-configuration-backup.noarch app-configuration-backup-core.noarch app-contact-extension-core.noarch app-content-filter.noarch app-content-filter-core.noarch app-dashboard.noarch app-dashboard-core.noarch app-date.noarch app-date-core.noarch app-dhcp.noarch app-dhcp-core.noarch app-disk-usage.noarch app-disk-usage-core.noarch app-dmz.noarch app-dmz-core.noarch app-dns.noarch app-dns-core.noarch app-egress-firewall.noarch app-egress-firewall-core.noarch app-firewall-core.noarch app-firewall-custom.noarch app-firewall-custom-core.noarch app-flexshare.noarch app-flexshare-core.noarch app-ftp.noarch app-ftp-core.noarch app-ftp-plugin-core.noarch app-graphical-console.noarch app-graphical-console-core.noarch app-groups.noarch app-groups-core.noarch app-incoming-firewall.noarch app-incoming-firewall-core.noarch app-intrusion-detection.noarch app-intrusion-detection-core.noarch app-intrusion-prevention.noarch app-intrusion-prevention-core.noarch app-language.noarch app-language-core.noarch app-ldap-core.noarch app-log-viewer.noarch app-log-viewer-core.noarch app-mail-extension-core.noarch app-mail-notification.noarch app-mail-notification-core.noarch app-marketplace.noarch app-marketplace-core.noarch app-mode-core.noarch app-multiwan.noarch app-multiwan-core.noarch app-mysql.noarch app-mysql-core.noarch app-nat-firewall.noarch app-nat-firewall-core.noarch app-network.noarch app-network-core.noarch app-network-visualiser.noarch app-network-visualiser-core.noarch app-ntp.noarch app-ntp-core.noarch app-openldap-core.noarch app-openldap-directory.noarch app-openldap-directory-core.noarch app-openvpn.noarch app-openvpn-core.noarch app-openvpn-plugin-core.noarch app-organization.noarch app-organization-core.noarch app-password-policies.noarch app-password-policies-core.noarch app-php-core.noarch app-port-forwarding.noarch app-port-forwarding-core.noarch app-pptpd.noarch app-pptpd-core.noarch app-pptpd-plugin-core.noarch app-print-server.noarch app-print-server-core.noarch app-print-server-plugin-core.noarch app-process-viewer.noarch app-process-viewer-core.noarch app-protocol-filter.noarch app-protocol-filter-core.noarch app-radius.noarch app-radius-core.noarch app-raid.noarch app-raid-core.noarch app-registration.noarch app-registration-core.noarch app-reports-core.noarch app-samba.noarch app-samba-core.noarch app-samba-extension-core.noarch app-shell-extension-core.noarch app-simple-mode-core.noarch app-software-repository.noarch app-software-repository-core.noarch app-software-updates.noarch app-software-updates-core.noarch app-ssh-server.noarch app-ssh-server-core.noarch app-storage-core.noarch app-suva-core.noarch app-tasks-core.noarch app-user-certificates.noarch app-user-certificates-core.noarch app-user-certificates-plugin-core.noarch app-user-profile.noarch app-user-profile-core.noarch app-users.noarch app-users-core.noarch app-web-access-control.noarch app-web-access-control-core.noarch app-web-proxy.noarch app-web-proxy-core.noarch app-web-proxy-plugin-core.noarch app-web-server.noarch app-web-server-core.noarch

 

echo “Running yum to install some programs… Might take a while”
yum install httpd gcc yum php pwgen php-devel php-gd php-imap php-ldap php-mysql php-odbc php-pear php-xml php-xmlrpc curl curl-devel perl-libwww-perl imagemagick libxml2 libxml2-devel mysql mysql-server xinetd transmission uudeview

echo “Yum Done”

PLEASE REMEMBER TO SET A PASSWORD FOR THE MySQL root USER !
To do so, start the server, then issue the following commands:

/usr/bin/mysqladmin -u root password ‘new-password’
/usr/bin/mysqladmin -u root -h sapuanrumah.no-ip.org password ‘new-password’

Alternatively you can run:
/usr/bin/mysql_secure_installation

which will also give you the option of removing the test
databases and anonymous user created by default.  This is
strongly recommended for production servers.

See the manual for more instructions.

You can start the MySQL daemon with:
cd /usr ; /usr/bin/mysqld_safe &

Using the Webmin YUM repository

If you like to install and update Webmin via RPM, create the /etc/yum.repos.d/webmin.repo file containing : [Webmin]
name=Webmin Distribution Neutral
#baseurl=http://download.webmin.com/download/yum
mirrorlist=http://download.webmin.com/download/yum/mirrorlist
enabled=1 You should also fetch and install my GPG key with which the packages are signed, with the commands : wget http://www.webmin.com/jcameron-key.asc
rpm –import jcameron-key.asc You will now be able to install with the command : yum install webmin All dependencies should be resolved automatically.

Langkah 1: Stop dan remove squid-3.1.10
Code: [Select]

# service squid stop
# yum remove squid

Langkah 2: Donlot squid-3.1.19 dan debug-nya
Code: [Select]

# wget http://people.redhat.com/jskala/squid/squid-3.1.19-1.el6/i686/squid-3.1.19-1.el6.i686.rpm
# wget http://people.redhat.com/jskala/squid/squid-3.1.19-1.el6/i686/squid-debuginfo-3.1.19-1.el6.i686.rpm

Langkah 3: Pasang squid-3.1.19 dan debug-nya
Code: [Select]

# rpm -Uvh –nodeps squid-3.1.19-1.el6.i686.rpm
# rpm -Uvh squid-debuginfo-3.1.19-1.el6.i686.rpm

Langkah 4: Pasang kembali aplikasi squid std cos 6.2
Code: [Select]

# yum install app-content-filter
# yum install app-web-access-control

Langkah 5: Bangunkan squid-3.1.19
Code: [Select]

# service squid start

yum install phpMyAdmin –enablerepo=clearos-updates-testing

o start MySql Server automatically on a CentOS box simply issue the following command as root:
1    chkconfig –levels 235 mysqld on

You can also use this to autostart Apache:
1    chkconfig –levels 235 httpd on

 

GNU nano 2.0.9                    File: /etc/webmin/squid/config

squid_restart=service squid -k reconfigure
squidclient=squidclient
cache_dir=/var/spool/squid
log_dir=/var/log/squid
pid_file=/var/run/squid.pid
squid_start=service squid start
squid_path=squid
squid_conf=/etc/squid/squid.conf
cachemgr_path=/usr/lib/squid/cachemgr.cgi
squid_stop=service squid stop

SARG on CentOS 6

Usually, it’s pretty hard to analyze information from the squid log file. For example, I don’t know how to analyze date or number of hits from /var/log/squid/access.log. If someone needs to analyze which websites are being accessed from the network, SARG may be a very good tool. SARG, or Squid Analysis Report Generator (http://sarg.sourceforge.net) analyzes the log, and generates a web based table where one can easily analyze proxy traffic.
Although SARG can be installed using YUM, I have faced problems with CentOS 6. So, I went for tarball installation instead. And believe, it’s really easy unlike many tarball installtions.

So, let’s start

# yum install gcc make wget httpd
# wget http://sourceforge.net/projects/sarg/files/sarg/sarg-2.3.1/sarg-2.3.1.tar.gz/download

# tar zxvf sarg-2.3.1.tar.gz
# cd sarg-2.3.1
# ./configure
# make
# make install

Time to modify the conf file

# nano /usr/local/etc/sarg.conf

There are a lot of options, and it is always recommended to go through them. However, we’ll be editing only the ones that we need.

#### sarg.conf####
access_log /var/log/squid/access.log
date_format e     ## since here we use date format DD-MM-YYYY
overwrite_report yes     ## because I don’t want multiple sarg reports for the same day
output_dir /var/www/html/squid-reports

Time for a test run

# sarg -x

We have used to the “-x” parameter for to view detail information on the run (used for debugging). If all goes well, there should be a report generated at /var/www/html/squid-reports directory which can be accessed from the web browser using the address http://IP/squid-reports

Now, we’d be adding a scheduled task to run SARG at 02:30 everyday.

# crontab -e

30 2 * * * sarg

# service crond restart
# chkconfig crond on

 

Troubleshooting
If there is problem viewing the SARG page, here are a few tips:
  1. Check whether the Firewall is blocking (iptables)
  2. Check if there is a file /etc/httpd/conf.d/sarg.conf. There is a line “allow from”. Modify it to suit your needs.
  3. Verify  that there is directory “/var/www/html/squid-reports”
Did you like this? Share it:

Add A Comment

*

?>