Product SiteDocumentation Site

Part IV. Technical appendixes

The appendixes in this section do not contain instructions that tell you how to install Fedora. Instead, they provide technical background that you might find helpful to understand the options that Fedora offers you at various points in the installation process.

Table of Contents

A. An Introduction to Disk Partitions
A.1. Hard Disk Basic Concepts
A.1.1. It is Not What You Write, it is How You Write It
A.1.2. Partitions: Turning One Drive Into Many
A.1.3. Partitions within Partitions — An Overview of Extended Partitions
A.1.4. Making Room For Fedora
A.1.5. Partition Naming Scheme
A.1.6. Disk Partitions and Other Operating Systems
A.1.7. Disk Partitions and Mount Points
A.1.8. How Many Partitions?
B. ISCSI disks
B.1. iSCSI disks in anaconda
B.2. iSCSI disks during start up
C. Disk Encryption
C.1. What is block device encryption?
C.2. Encrypting block devices using dm-crypt/LUKS
C.2.1. Overview of LUKS
C.2.2. How will I access the encrypted devices after installation? (System Startup)
C.2.3. Choosing a Good Passphrase
C.3. Creating Encrypted Block Devices in Anaconda
C.3.1. What Kinds of Block Devices Can Be Encrypted?
C.3.2. Saving Passphrases
C.3.3. Creating and Saving Backup Passphrases
C.4. Creating Encrypted Block Devices on the Installed System After Installation
C.4.1. Create the block devices
C.4.2. Optional: Fill the device with random data
C.4.3. Format the device as a dm-crypt/LUKS encrypted device
C.4.4. Create a mapping to allow access to the device's decrypted contents
C.4.5. Create filesystems on the mapped device, or continue to build complex storage structures using the mapped device
C.4.6. Add the mapping information to /etc/crypttab
C.4.7. Add an entry to /etc/fstab
C.5. Common Post-Installation Tasks
C.5.1. Set a randomly generated key as an additional way to access an encrypted block device
C.5.2. Add a new passphrase to an existing device
C.5.3. Remove a passphrase or key from a device
D. Understanding LVM
E. The GRUB Boot Loader
E.1. Boot Loaders and System Architecture
E.2. GRUB
E.2.1. GRUB and the boot process on BIOS-based x86 systems
E.2.2. GRUB and the boot process on UEFI-based x86 systems
E.2.3. Features of GRUB
E.3. Installing GRUB
E.4. GRUB Terminology
E.4.1. Device Names
E.4.2. File Names and Blocklists
E.4.3. The Root File System and GRUB
E.5. GRUB Interfaces
E.5.1. Interfaces Load Order
E.6. GRUB Commands
E.7. GRUB Menu Configuration File
E.7.1. Configuration File Structure
E.7.2. Configuration File Directives
E.8. Changing Target Environment at Boot Time
E.9. Additional Resources
E.9.1. Installed Documentation
E.9.2. Useful Websites
F. Boot Process, Init, and Shutdown
F.1. The Boot Process
F.2. A Detailed Look at the Boot Process
F.2.1. The firmware interface
F.2.2. UEFI-based x86 systems
F.3. The Boot Loader
F.3.1. The GRUB2 boot loader for x86 systems
F.3.2. Boot Loaders for Other Architectures
F.4. The Kernel
F.5. Booting with systemd
F.6. systemd units
F.7. systemd targets
F.8. Running Additional Programs at Boot Time
F.9. Administering services with systemd
F.9.1. Checking up on services
F.9.2. Starting and stopping services
F.9.3. Running services automatically
F.9.4. Killing and Masking services
F.9.5. Getting more from systemd
G. Logging the Installation
G.1. Log files and formats
G.1.1. Logging on the installed system
G.2. Remote logging with rsyslog
G.3. Remote logging via virtio
G.3.1. virtio logging with virt-install
G.3.2. Adding a virtio log channel with virsh edit
G.3.3. Listening for virtio logs
H. Other Technical Documentation