Parsing device fields of ifcfg files in CentOS
#cat ifcfg-eth0
device=eth0
...
Reason: There is a multi-node server migration computer room. I was afraid of damage, so I removed the hard disk first, but when I put it back, I remembered the wrong order, causing the network card to not match the boot, and the original eth01 became eth23. I know. How to do it.
analyze:
Solution to the problem that the eth0 device cannot be found under CentOS
After passing Baidu, I learned some information, and I will record it here for memento. Why does eth0 become eth1? Many Linux distributions use udev to dynamically manage device files and persistently name them based on device information. udev will identify the network card during the system boot process, and record the corresponding mac address and network card name in udev's rule script. For new virtual machines, VMware will automatically generate a MAC address for the virtual machine's network card. When you clone or reinstall the virtual machine software, you are using the virtual hard disk information of the previous system, and the system already has eth0. Information, for this new network card, udev will automatically name it eth1 (accumulation principle), so after your system starts, the network card you see using ifconfig is named eth1.
The eth0 here is defined in /etc/udev/rules.d/70-persistent-net.rules
# This file was automatically generated by the /lib/udev/write_net_rules
# program, run by the persistent-net-generator.rules rules file.
## You can modify it, as long as you keep each rule on a single
# line, and change only the value of the NAME= key.
# PCI device 0x8086:0x100f (e1000)
SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="xx:xx:xx:xx:xx:xx", ATTR{type}= ="1", KERNEL=="eth*", NAME="eth0"
Solution: Why does eth0 become eth1?
How to restore to eth0? The script for udev to record network rules is: /etc/udev/rules.d/70-persistent-net.rules [user@localhost ~]$ vi /etc/udev/rules.d/70 -persistent-net.rules
# This file was automatically generated by the /lib/udev/write_net_rules
# program run by the persistent-net-generator.rules rules file.
## You can modify it, as long as you keep each rule on a single line.
# PCI device 0x1022:0x2000 (pcnet32)
SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="00:0c:29:5a:6c:73", ATTR{type}= ="1",KERNEL=="eth*", NAME="eth0"
SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="00:0c:29:a9:22:9d", ATTR{type}= ="1",KERNEL=="eth*", NAME="eth1"
Solution to the problem that the eth0 device cannot be found under CentOS Open the file, and you will find that there is information about two network cards, eth0 and eth1, but in fact you can only find information about one network card, eth1, during ifconfig. Because eth0 does not exist at all. Delete the eth0 information and change the device name in the eth1 information to eth0. Restart the system. The network card you see is eth0. Or delete all the information and restart the system. Udev will help you discover new devices. . There is also a startup script file /etc/sysconfig/network-scripts/ifcfg-eth0. The mac address in this file is the physical address of the original eth0 network card, and the virtual machine assigns a new physical address to eth1, so the If the information does not match the actual information, change the MAC address information to the MAC address of eth1 in 70-persistent-net.rules, restart the network again, and it will be completely restored to the previous state of the eth0 network card.
The above is the detailed content of Parsing device fields of ifcfg files in CentOS. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Methods for using Chinese input in CentOS include: using the fcitx input method: install and enable fcitx, set shortcut keys, press the shortcut keys to switch input methods, and input pinyin to generate candidate words. Use iBus input method: Install and enable iBus, set shortcut keys, press the shortcut keys to switch input methods, and input pinyin to generate candidate words.

To read U disk files in CentOS 7, you need to first connect the U disk and confirm its device name. Then, use the following steps to read the file: Mount the USB flash drive: mount /dev/sdb1 /media/sdb1 (replace "/dev/sdb1" with the actual device name) Browse the USB flash drive file: ls /media/sdb1; cd /media /sdb1/directory; cat file name

There are two ways to enter the root authority of CentOS 7: use the sudo command: enter sudo su - in the terminal and enter the current user password. Log in directly as the root user: Select "Other" on the login screen, enter "root" and the root password. Note: Operate carefully with root privileges, perform tasks with sudo privileges, and change the root password regularly.

One can use the scp command to securely copy files between network hosts. It uses ssh for data transfer and authentication. Typical syntax is: scpfile1user@host:/path/to/dest/scp -r/path/to/source/user@host:/path/to/dest/scp exclude files I don't think you can when using scp command Filter or exclude files. However, there is a good workaround to exclude the file and copy it securely using ssh. This page explains how to filter or exclude files when copying directories recursively using scp. How to use rsync command to exclude files The syntax is: rsyncav-essh-

Solutions for forgotten CentOS passwords include: Single-user mode: Enter single-user mode and reset the password using passwd root. Rescue Mode: Boot from CentOS Live CD/USB, mount root partition and reset password. Remote access: Use SSH to connect remotely and reset the password with sudo passwd root.

After forgetting your CentOS username and password, there are two ways to restore access: Reset the root password: Restart the server, edit the kernel command line in the GRUB menu, add "rw init=/sysroot/bin/sh" and press Ctrl+x ;Mount the root file system and reset the password in single-user mode. Use rescue mode: Start the server from the CentOS installation ISO image, select rescue mode; mount the root file system, copy the chroot environment from the ISO image, reset the password, exit the chroot environment and restart the server.

CentOS 7 disables root permissions by default. You can enable it by following the following steps: Temporarily enable it: Enter "su root" on the terminal and enter the root password. Permanently enabled: Edit "/etc/ssh/sshd_config", change "PermitRootLogin no" to "yes", and restart the SSH service.

Three solutions for forgotten passwords in CentOS 7: Single-user mode: Restart the system, edit the kernel options, change ro to rw init=/sysroot/bin/sh, and use the passwd command to reset the root password. Rescue mode: Boot from the installation media, select rescue mode, mount the root file system, chroot to the root file system, and use the passwd command to reset the root password. Grub2 command line: Restart the system, press c to enter the command line, load the kernel, mount the root file system, chroot to the root file system, and use the passwd command to reset the root password.
