Yum in Linux is the abbreviation of Yellow dog Updater Modified; the purpose of yum is to automatically upgrade, install and remove rpm packages, collect information about rpm packages, check dependencies and automatically prompt users to solve them.
#The operating environment of this tutorial: linux5.9.8 system, Dell G3 computer.
What is yum in Linux? How to configure? how to use?
yum is the abbreviation of Yellow dog Updater Modified. It was originally developed by yellow dog developer Terra Soft. Written in python, it was still called yup (yellow dog updater) at that time. It was later improved by the Linux@Duke development team at Duke University, hence the name.
The purpose of yum is to automatically upgrade, install/remove rpm packages, collect information about rpm packages, check dependencies and automatically prompt users to solve them.
The key to yum is to have a reliable repository. As the name suggests, this is a software warehouse. It can be an http or ftp site, or it can be a local software pool, but Must include the rpm header. The header includes various information about the rpm package, including description, functions, provided files, dependencies, etc. It is by collecting these headers and analyzing them that the remaining tasks can be completed automatically. .
It can automatically download and install RPM packages from a designated server. It can automatically handle dependencies and install all dependent software packages at once, without the need to download and install them again and again. You can also make a yum server yourself, and you can make a yum server based on the CD image.
Build a yum server:
(1) Local yum (the server cannot access the Internet)
The first step : Mount the CD first
mount?/dev/cdrom?/media/ echo?"/dev/cdrom??/media?iso9660?defaults?0?0"?>>?/etc/fstab?實現開機掛載
Step 2: Create a yum warehouse (take centos as an example)
vim /etc/yum.repos.d/iso.repo (iso is Get the name at will, but it must end with repo)
[Centos] name=CentOS baseurl=file:///media/?? gpgcheck=1 enabled=1 gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-6
Then save and exit
(if it is a redhat5.x system, write file:///media/Server/ here, It is the system of redhat6.x file:///media/Packages/)
Explanation of parameters
##### [Centos]?????????????????????????(這個是一個標識,可以隨便取,必須唯一) name=CentOS??????????????????????(這個是一個名字,可以隨便取,必須唯一) baseurl=file:///media/Server/????(本地的路徑)?? enabled=1????????????????????????(為1則是打開倉庫,為0則是關閉倉庫) gpgcheck=1???????????????????????(公鑰值) gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-6?(檢測公鑰值的文件路徑) [?]內的是倉庫的名字 name是倉庫的描述也可以說是名字 baseurl?倉庫的位置 enabled?是否啟用這個倉庫,1為起用,0為禁用 gpgcheck?是否檢查GPG簽名(用來驗證要安裝的包是不是REDHAT官方的) gpgcheck?的存放地址我們需要用下面的命令導入這個簽名。才能使用這項功能 #####
After building yum, first enter
yum clean all
(2) External network yum (the server can access the Internet)
vim /etc/yum.repos.d/163.repo
[base] name=centos6 baseurl=http://mirrors.163.com/centos/$releasever/os/$basearch gpgecheck=1 gpgkey=http://mirrors.163.com/centos/RPM-GPG-KEY-CentOS-6
Then save and exit
If the system is 5.x version of redhat (baseurl=http://mirrors.163.com/centos/5/os/$basearch)
When installing yum on the external network, you can go to this website first and have a look
http://mirrors.163.com/
Use yum
First use yum to upgrade the software. Most yum operations require superuser permissions. Of course, you can use sudo.
It is common to add and delete software after installing the system. Yum can also be qualified for this task, as long as the software is installed by rpm.
The installation command is :
yum install xxx
yum will query the database to see if there is this software package. If there is, check its dependency conflict. If there is no dependency conflict, it is best to download and install it; if there is, a prompt will be given asking whether you want to install the dependency at the same time, or delete the conflicting package. You can make your own judgment.
The command to delete is :
yum remove xxx
Same as installation, yum will also query the database and give Tips for resolving dependencies.
Commonly used commands of yum:
1.yum?check-update????????列出所有可更新的軟件清單 2.yum?update?????????????安裝所有更新軟件 3.yum?-y?install?<package_name>?安裝指定的軟件 4.yum?update?<package_name>??更新指定的軟件 5.yum?list??<package_name>???????不加<package_name>列出所有可安裝的軟件清單,加了列出指定的 6.yum?-y?remove?<package_name>?刪除軟件 7.yum?search?<package_name>???查找軟件??????? 8.yum?list?installed???列出所有已安裝的軟件包 9.yum?list?extras????列出所有已安裝但不在?Yum?Repository?內的軟件包 10.yum?info?<package_name>??不加<package_name>列出所有軟件包的信息,加了列出指定的? 11.yum?provides?<package_name>?列出軟件包提供哪些文件 12.yum?clean?packages?清除緩存目錄(/var/cache/yum)下的軟件包 13.?yum?clean?all?????清除緩存目錄(/var/cache/yum)下的軟件包及舊的headers
Recommended learning: "linux video tutorial"
The above is the detailed content of What does yum mean in linux. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Linux's cost of ownership is usually lower than Windows. 1) Linux does not require license fees, saving a lot of costs, while Windows requires purchasing a license. 2) Linux has low hardware requirements and can extend the service life of the device. 3) The Linux community provides free support to reduce maintenance costs. 4) Linux is highly secure and reduces productivity losses. 5) The Linux learning curve is steep, but Windows is easier to use. The choice should be based on specific needs and budget.

The key to installing dual systems in Linux and Windows is partitioning and boot settings. 1. Preparation includes backing up data and compressing existing partitions to make space; 2. Use Ventoy or Rufus to make Linux boot USB disk, recommend Ubuntu; 3. Select "Coexist with other systems" or manually partition during installation (/at least 20GB, /home remaining space, swap optional); 4. Check the installation of third-party drivers to avoid hardware problems; 5. If you do not enter the Grub boot menu after installation, you can use boot-repair to repair the boot or adjust the BIOS startup sequence. As long as the steps are clear and the operation is done properly, the whole process is not complicated.

The key to enabling EPEL repository is to select the correct installation method according to the system version. First, confirm the system type and version, and use the command cat/etc/os-release to obtain information; second, enable EPEL through dnfinstallepel-release on CentOS/RockyLinux, and the 8 and 9 version commands are the same; third, you need to manually download the corresponding version of the .repo file and install it on RHEL; fourth, you can re-import the GPG key when encountering problems. Note that the old version may not be supported, and you can also consider enabling epel-next to obtain the test package. After completing the above steps, use dnfrepolist to verify that the EPEL repository is successfully added.

Newbie users should first clarify their usage requirements when choosing a Linux distribution. 1. Choose Ubuntu or LinuxMint for daily use; programming and development are suitable for Manjaro or Fedora; use Lubuntu and other lightweight systems for old devices; recommend CentOSStream or Debian to learn the underlying principles. 2. Stability is preferred for UbuntuLTS or Debian; you can choose Arch or Manjaro to pursue new features. 3. In terms of community support, Ubuntu and LinuxMint are rich in resources, and Arch documents are technically oriented. 4. In terms of installation difficulty, Ubuntu and LinuxMint are relatively simple, and Arch is suitable for those with basic needs. It is recommended to try it first and then decide.

The steps to add a new hard disk to the Linux system are as follows: 1. Confirm that the hard disk is recognized and use lsblk or fdisk-l to check; 2. Use fdisk or parted partitions, such as fdisk/dev/sdb and create and save; 3. Format the partition to a file system, such as mkfs.ext4/dev/sdb1; 4. Use the mount command for temporary mounts, such as mount/dev/sdb1/mnt/data; 5. Modify /etc/fstab to achieve automatic mount on the computer, and test the mount first to ensure correctness. Be sure to confirm data security before operation to avoid hardware connection problems.

Have problems uploading files in Google Chrome? This may be annoying, right? Whether you are attaching documents to emails, sharing images on social media, or submitting important files for work or school, a smooth file upload process is crucial. So, it can be frustrating if your file uploads continue to fail in Chrome on Windows PC. If you're not ready to give up your favorite browser, here are some tips for fixes that can't upload files on Windows Google Chrome 1. Start with Universal Repair Before we learn about any advanced troubleshooting tips, it's best to try some of the basic solutions mentioned below. Troubleshooting Internet connection issues: Internet connection

Logs in Linux systems are usually stored in the /var/log directory, which contains a variety of key log files, such as syslog or messages (record system logs), auth.log (record authentication events), kern.log (record kernel messages), dpkg.log or yum.log (record package operations), boot.log (record startup information); log content can be viewed through cat, tail-f or journalctl commands; application logs are often located in subdirectories under /var/log, such as Apache's apache2 or httpd directory, MySQL log files, etc.; at the same time, it is necessary to note that log permissions usually require s

sudo stands for "substituteuserdo" or "superuserdo", allowing users to run commands with permissions of other users (usually root). Its core uses include: 1. Perform system-level operations such as installing software or editing system files; 2. Accessing protected directories or logs; 3. Manage services such as restarting nginx; 4. Modify global settings such as /etc/hosts. When using it, the system will check the /etc/sudoers configuration and verify the user password, provide temporary permissions instead of continuously logging in as root, ensuring security. Best practices include: only when necessary, avoid blindly executing network commands, editing sudoers files with visudo, and considering continuous operations.
