Benutzer-Werkzeuge

Webseiten-Werkzeuge


software_handreichungen:ubuntu_server_18.04_lts

Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen angezeigt.

Link zu dieser Vergleichsansicht

Beide Seiten der vorigen RevisionVorhergehende Überarbeitung
Nächste Überarbeitung
Vorhergehende Überarbeitung
software_handreichungen:ubuntu_server_18.04_lts [2019/03/13 21:30] – [Postfix mit domainfactory] andreassoftware_handreichungen:ubuntu_server_18.04_lts [2019/03/21 18:51] (aktuell) andreas
Zeile 5: Zeile 5:
 </WRAP> </WRAP>
  
-===== Postfix mit domainfactory =====+===== IP einstellen ===== 
 +<file yaml /etc/netplan/01-netcfg.yaml> 
 +# This file describes the network interfaces available on your system 
 +# For more information, see netplan(5). 
 +network: 
 +  version: 2 
 +  renderer: networkd 
 +  ethernets: 
 +    ens160: 
 +      addresses: [192.168.XXX.XXX/24] 
 +      gateway4: 192.168.XXX.XXX 
 +      nameservers: 
 +         addresses: [XXX.XXX.XXX.XXX,XXX.XXX.XXX.XXX] 
 +</file> 
 + 
 +Und mit dem folgenden Befehl die Änderung übernehmen: 
 +<file bash> 
 +netplan apply 
 +</file> 
 + 
 +===== Server Mail Versand ermöglichen =====
  
 ==== Installieren ==== ==== Installieren ====
Zeile 11: Zeile 31:
 apt install postfix mailutils apt install postfix mailutils
 </file> </file>
 +  * Internet Site
  
-==== Konfigurieren ====+==== Konfigurieren (am Beispiel von domainfactory) ====
 <file ini /etc/postfix/main.cf> <file ini /etc/postfix/main.cf>
 # See /usr/share/postfix/main.cf.dist for a commented, more complete version # See /usr/share/postfix/main.cf.dist for a commented, more complete version
Zeile 51: Zeile 72:
 alias_maps = hash:/etc/aliases alias_maps = hash:/etc/aliases
 alias_database = hash:/etc/aliases alias_database = hash:/etc/aliases
-myorigin = /etc/mailname 
 mydestination = $myhostname, XX-hostname-XX.XX-domain-XX.de, localhost.localdomain, localhost mydestination = $myhostname, XX-hostname-XX.XX-domain-XX.de, localhost.localdomain, localhost
 relayhost = sslout.df.eu:465 relayhost = sslout.df.eu:465
Zeile 80: Zeile 100:
 ==== Einstellung testen ==== ==== Einstellung testen ====
 <file bash> <file bash>
-echo "body of your email" | mail -s "This is a Subject" -a "From: you@example.com" andreas@giemza.net+echo "Test - Body" | mail -s "Test - Subject" XXX@XXX.XXX
 </file> </file>
  
Zeile 87: Zeile 107:
 cat /var/log/mail.log cat /var/log/mail.log
 </file> </file>
 +
 +===== root Mails empfangen =====
 +<file ini /etc/aliases>
 +# See man 5 aliases for format
 +postmaster:    root
 +root: XXX@XXX.XXX
 +</file>
 +
 +**Einstellungen übernehmen:**
 +<file bash>
 +newaliases
 +</file>
 +
 +==== Einstellung testen ====
 +<file bash>
 +echo "Test - Body" | mail -s "Test - Subject" root
 +</file>
 +
 +==== Log checken ====
 +<file bash>
 +cat /var/log/mail.log
 +</file>
 +
 +===== DynDNS =====
 +[[https://www.duckdns.org/|Duck DNS]]
 +
 +**Anleitung:** [[https://www.duckdns.org/install.jsp|Duck DNS - install - linux cron]]
 +
 +===== unattended-upgrades =====
 +
 +==== Installieren ====
 +<file bash>
 +apt-get install unattended-upgrades
 +</file>
 +
 +==== Einstellugen ====
 +<file ini /etc/apt/apt.conf.d/50unattended-upgrades>
 +// Automatically upgrade packages from these (origin:archive) pairs
 +//
 +// Note that in Ubuntu security updates may pull in new dependencies
 +// from non-security sources (e.g. chromium). By allowing the release
 +// pocket these get automatically pulled in.
 +Unattended-Upgrade::Allowed-Origins {
 +        "${distro_id}:${distro_codename}";
 + "${distro_id}:${distro_codename}-security";
 + // Extended Security Maintenance; doesn't necessarily exist for
 + // every release and this system may not have it installed, but if
 + // available, the policy for updates is such that unattended-upgrades
 + // should also install from here by default.
 + "${distro_id}ESM:${distro_codename}";
 + "${distro_id}:${distro_codename}-updates";
 +// "${distro_id}:${distro_codename}-proposed";
 +// "${distro_id}:${distro_codename}-backports";
 +};
 +
 +// List of packages to not update (regexp are supported)
 +Unattended-Upgrade::Package-Blacklist {
 +// "vim";
 +// "libc6";
 +// "libc6-dev";
 +// "libc6-i686";
 +};
 +
 +// This option will controls whether the development release of Ubuntu will be
 +// upgraded automatically.
 +Unattended-Upgrade::DevRelease "false";
 +
 +// This option allows you to control if on a unclean dpkg exit
 +// unattended-upgrades will automatically run 
 +//   dpkg --force-confold --configure -a
 +// The default is true, to ensure updates keep getting installed
 +//Unattended-Upgrade::AutoFixInterruptedDpkg "false";
 +
 +// Split the upgrade into the smallest possible chunks so that
 +// they can be interrupted with SIGTERM. This makes the upgrade
 +// a bit slower but it has the benefit that shutdown while a upgrade
 +// is running is possible (with a small delay)
 +//Unattended-Upgrade::MinimalSteps "false";
 +
 +// Install all unattended-upgrades when the machine is shutting down
 +// instead of doing it in the background while the machine is running
 +// This will (obviously) make shutdown slower
 +//Unattended-Upgrade::InstallOnShutdown "true";
 +
 +// Send email to this address for problems or packages upgrades
 +// If empty or unset then no email is sent, make sure that you
 +// have a working mail setup on your system. A package that provides
 +// 'mailx' must be installed. E.g. "user@example.com"
 +Unattended-Upgrade::Mail "root";
 +
 +// Set this value to "true" to get emails only on errors. Default
 +// is to always send a mail if Unattended-Upgrade::Mail is set
 +Unattended-Upgrade::MailOnlyOnError "true";
 +
 +// Remove unused automatically installed kernel-related packages
 +// (kernel images, kernel headers and kernel version locked tools).
 +//Unattended-Upgrade::Remove-Unused-Kernel-Packages "false";
 +
 +// Do automatic removal of new unused dependencies after the upgrade
 +// (equivalent to apt-get autoremove)
 +//Unattended-Upgrade::Remove-Unused-Dependencies "false";
 +
 +// Automatically reboot *WITHOUT CONFIRMATION*
 +//  if the file /var/run/reboot-required is found after the upgrade 
 +Unattended-Upgrade::Automatic-Reboot "true";
 + 
 +// If automatic reboot is enabled and needed, reboot at the specific
 +// time instead of immediately
 +//  Default: "now"
 +Unattended-Upgrade::Automatic-Reboot-Time "02:00";
 +
 +// Use apt bandwidth limit feature, this example limits the download
 +// speed to 70kb/sec
 +//Acquire::http::Dl-Limit "70";
 +
 +// Enable logging to syslog. Default is False
 +// Unattended-Upgrade::SyslogEnable "false";
 +
 +// Specify syslog facility. Default is daemon
 +// Unattended-Upgrade::SyslogFacility "daemon";
 +
 +// Download and install upgrades only on AC power
 +// (i.e. skip or gracefully stop updates on battery)
 +// Unattended-Upgrade::OnlyOnACPower "true";
 +
 +// Download and install upgrades only on non-metered connection
 +// (i.e. skip or gracefully stop updates on a metered connection)
 +// Unattended-Upgrade::Skip-Updates-On-Metered-Connections "true";
 +</file>
 +
 +==== PPA hinzufügen (am Beispiel Syncthing) ====
 +<file ini /etc/apt/apt.conf.d/50unattended-upgrades>
 +...
 +
 +Unattended-Upgrade::Allowed-Origins {
 + ....
 + "Syncthing:syncthing";
 +};
 +
 +...
 +</file>
 +
 +Quelle: https://askubuntu.com/a/87854/687750
software_handreichungen/ubuntu_server_18.04_lts.1552509055.txt.gz · Zuletzt geändert: 2019/03/13 21:30 von andreas