


Mastering Software Package Management with Yum and DNF on CentOS and RHEL
Mar 22, 2025 am 09:05 AMIntroduction: Mastering CentOS/RHEL Software Management
Effective software package management is paramount for Linux system administrators using CentOS and Red Hat Enterprise Linux (RHEL). This guide provides a comprehensive overview of using Yum and DNF, the primary package managers for these distributions, to ensure system security, updates, and optimal performance. While Yum was the standard in earlier versions (CentOS/RHEL 7 and below), DNF (Dandified Yum) has become the default in CentOS 8 and RHEL 8 and beyond, offering superior speed, dependency resolution, and memory management.
Yum and DNF: A Detailed Comparison
Yum (Yellowdog Updater, Modified): A long-standing package manager, Yum automates the installation, updating, and removal of software packages, handling dependencies effectively.
DNF (Dandified Yum): The successor to Yum, DNF boasts improved performance, reduced memory footprint, enhanced dependency handling, and increased security features. In newer CentOS/RHEL versions, Yum often acts as a symbolic link to DNF.
Key DNF Advantages over Yum:
- Significantly faster package management
- Optimized memory usage
- Robust dependency resolution
- Enhanced security and modular design
Repository Management: Keeping Your System Current
Before any software installation or update, ensure your system repositories are up-to-date.
Using Yum (CentOS/RHEL 7 and earlier):
yum check-update yum update
Using DNF (CentOS/RHEL 8 and later):
dnf check-update dnf update
The update
command synchronizes package lists and applies available updates.
Software Installation, Removal, and Search
Installation:
Yum: yum install package-name
DNF: dnf install package-name
(e.g., dnf install httpd -y
installs Apache; -y
auto-confirms)
Removal:
Yum: yum remove package-name
DNF: dnf remove package-name
(e.g., dnf remove httpd -y
removes Apache)
Searching:
Yum: yum search package-name
DNF: dnf search package-name
(e.g., dnf search nginx
searches for Nginx packages)
Package Information and Management
Listing Installed Packages:
Yum: yum list installed
DNF: dnf list installed
(e.g., dnf list installed | grep httpd
checks for Apache)
Detailed Package Information:
Yum: yum info package-name
DNF: dnf info package-name
(e.g., dnf info vim
shows Vim details)
Managing Software Groups:
List Groups: dnf group list
Install Group: dnf group install "Development Tools" -y
Remove Group: dnf group remove "Development Tools" -y
Advanced Package Management Techniques
Dependency Handling:
-
Check Dependencies:
dnf deplist package-name
-
Remove Unused Dependencies:
dnf autoremove
Cache Management:
Yum: yum clean all
DNF: dnf clean all
Repository Control:
Enable/disable repositories (temporarily): dnf --enablerepo=repository-name install package-name
or dnf --disablerepo=repository-name install package-name
. For permanent changes, modify /etc/yum.repos.d/
files.
DNF Transaction History:
-
View History:
dnf history
-
Undo Transaction:
dnf history undo transaction-id
-
Rollback:
dnf history rollback transaction-id
Local RPM Installation:
Yum: yum localinstall package.rpm
DNF: dnf install package.rpm
Security Updates:
-
Check Security Updates:
dnf updateinfo list security
-
Apply Security Updates:
dnf update --security
Conclusion: Optimizing Your CentOS/RHEL System
Proficient package management is vital for maintaining secure and efficient CentOS/RHEL systems. While Yum served its purpose well, DNF's enhancements make it the preferred choice for modern deployments. By mastering the commands outlined in this guide, you can effectively manage your software, ensuring system stability and security.
The above is the detailed content of Mastering Software Package Management with Yum and DNF on CentOS and RHEL. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Linux administrators should be familiar with the command-line environment. Since GUI (Graphical User Interface) mode in Linux servers is not commonly installed.SSH may be the most popular protocol to enable Linux administrators to manage the servers

LXD is described as the next-generation container and virtual machine manager that offers an immersive for Linux systems running inside containers or as virtual machines. It provides images for an inordinate number of Linux distributions with support

R is a widely-used programming language and software environment designed for developing statistical and graphical computing tools within data science. It closely resembles the S programming language and environment, with R serving as an alternative

Firefox browser is the default browser for most modern Linux distributions such as Ubuntu, Mint, and Fedora. Initially, its performance might be impressive, however, with the passage of time, you might notice that your browser is not as fast and resp

Clear Linux OS is the ideal operating system for people – ahem system admins – who want to have a minimal, secure, and reliable Linux distribution. It is optimized for the Intel architecture, which means that running Clear Linux OS on AMD sys

The key steps for creating a self-signed SSL certificate are as follows: 1. Generate the private key, use the command opensslgenrsa-outselfsigned.key2048 to generate a 2048-bit RSA private key file, optional parameter -aes256 to achieve password protection; 2. Create a certificate request (CSR), run opensslreq-new-keyselfsigned.key-outselfsigned.csr and fill in the relevant information, especially the "CommonName" field; 3. Generate the certificate by self-signed, and use opensslx509-req-days365-inselfsigned.csr-signk

Do you sometimes share your Linux desktop with family, friends, or coworkers? If so, you may want to hide some personal files and folders. The challenge is figuring out how to conceal these files on a Linux system.In this guide, we will walk through

Decompress the .zip file on Windows, you can right-click to select "Extract All", while the .tar.gz file needs to use tools such as 7-Zip or WinRAR; on macOS and Linux, the .zip file can be double-clicked or unzip commanded, and the .tar.gz file can be decompressed by tar command or double-clicked directly. The specific steps are: 1. Windows processing.zip file: right-click → "Extract All"; 2. Windows processing.tar.gz file: Install third-party tools → right-click to decompress; 3. macOS/Linux processing.zip file: double-click or run unzipfilename.zip; 4. macOS/Linux processing.tar
