Solved

yum-xen.conf

Posted on 2013-01-31
1
309 Views
Last Modified: 2013-02-07
i need to create a custom yum-xen.conf file but i am not sure how to create base context

the mirror is
http://yum.freepbxdistro.org/centos/6.3/

and here is a sample yum-xen.conf file i found.  How can i modify it to match the mirror above?

[base]
name=CentOS-6.2 - Base
mirrorlist=http://mirrorlist.centos.org/?release=6.2&arch=x86_64&repo=os
#baseurl=http://mirror.centos.org/centos/6.2/os/x86_64/
gpgcheck=1
gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6
 
[updates]
name=CentOS-6.2 - Updates
mirrorlist=http://mirrorlist.centos.org/?release=6.2&arch=x86_64&repo=updates
#baseurl=http://mirror.centos.org/centos/6.2/updates/x86_64/
gpgcheck=1
gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6
 
[extras]
name=CentOS-6.2 - Extras
mirrorlist=http://mirrorlist.centos.org/?release=6.2&arch=x86_64&repo=extras
#baseurl=http://mirror.centos.org/centos/6.2/extras/x86_64/
gpgcheck=1
gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-6
 
[centosplus]
name=CentOS-6.2 - Plus
mirrorlist=http://mirrorlist.centos.org/?release=6.2&arch=x86_64&repo=centosplus
#baseurl=http://mirror.centos.org/centos/6.2/centosplus/x86_64/
gpgcheck=1
enabled=0
gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-6
 
[contrib]
name=CentOS-6.2 - Contrib
mirrorlist=http://mirrorlist.centos.org/?release=6.2&arch=x86_64&repo=contrib
#baseurl=http://mirror.centos.org/centos/6.2/contrib/x86_64/
gpgcheck=1
enabled=0
gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-6
0
Comment
Question by:Kylo Ren
1 Comment
 
LVL 40

Accepted Solution

by:
jlevie earned 500 total points
ID: 38843500
In the example you found replace 6.2 with 6.3, comment out each mirrorlist line, uncomment each baseurl line and replace:

http://mirror.centos.org

with:

http://yum.freepbxdistro.org

in the baseurl and gpgkey lines
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction We as admins face situation where we need to redirect websites to another. This may be required as a part of an upgrade keeping the old URL but website should be served from new URL. This document would brief you on different ways ca…
If you use Debian 6 Squeeze and you are tired of looking at the childish graphical GDM login screen that is used by default, here's an easy way to change it. If you've already tried to change it you've probably discovered that none of the old met…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now