?
Solved

Yum install

Posted on 2014-01-14
5
Medium Priority
?
552 Views
Last Modified: 2014-01-21
I have downloaded 4 rpm's for my Red Hat 6.4 to a private folder(\\folder1\folder2\folder3\rpms. My Red Hat server is on a closed network.  
What command syntax do I use install those specific rpm's for my Red Hat 6.4 server?
0
Comment
Question by:gumball60
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 31

Accepted Solution

by:
farzanj earned 1200 total points
ID: 39780088
First cd to the directory where you have your RPMS
rpm -ivh RPMNAME.rpm
0
 

Author Comment

by:gumball60
ID: 39780121
So rpm -ivh RPMNAME.rpm will perform/install the selected rpm's like yum?
0
 
LVL 31

Expert Comment

by:farzanj
ID: 39780132
It will install RPMs.

Replace RPMNAME.rpm with the name of actual RPM that you have.

It installs RPMS but unlike YUM, it doesn't resolve dependencies.  Yum has the capability of finding the dependencies and then installing those dependencies as well.
0
 
LVL 35

Assisted Solution

by:Seth Simmons
Seth Simmons earned 280 total points
ID: 39780137
yes they both will
the difference is, rpm will just fail if there are dependencies that don't exist while yum will detect the dependencies and attempt to install from whatever repository is configured
assuming dependencies are satisfied on your system, that rpm command will work
0
 
LVL 44

Expert Comment

by:Darr247
ID: 39781026
$ su -c yum install /folder1/folder2/folder3/rpms/[packagename-version-arch].rpm

I believe is what you're seeking. You'll be prompted for the root password before yum runs.

$ sudo yum install /folder1/folder2/folder3/rpms/[packagename-version-arch].rpm

would prompt you for the current user's password if that user's in the /etc/sudoers file with at least yum privileges.
0

Featured Post

How Blockchain Is Impacting Every Industry

Blockchain expert Alex Tapscott talks to Acronis VP Frank Jablonski about this revolutionary technology and how it's making inroads into other industries and facets of everyday life.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Have you ever been frustrated by having to click seven times in order to retrieve a small bit of information from the web, always the same seven clicks, scrolling down and down until you reach your target? When you know the benefits of the command l…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Suggested Courses
Course of the Month14 days, 16 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question