Skip to main content

Fedora Server: Enterprise Linux with Cutting-Edge Features

Created: March 5, 2026 CalmOps 7 min read

Introduction

Fedora Server stands as one of the most innovative Linux distributions, serving as the upstream development platform for Red Hat Enterprise Linux. It combines enterprise-grade stability with cutting-edge features, making it an excellent choice for modern server workloads.

In 2026, Fedora Server continues to lead in containerization, cloud deployment, and emerging technologies while maintaining strong security fundamentals. This comprehensive guide covers installation, configuration, package management, container tools, and production deployment best practices.

Understanding Fedora

Fedora vs RHEL vs CentOS

Fedora serves as the community-driven upstream project for Red Hat Enterprise Linux:

  • Fedora: Fast-paced, innovative, 13-month release cycle
  • RHEL: Enterprise stability, 10+ year support life cycle
  • CentOS Stream: Downstream of Fedora, upstream of RHEL

Fedora Server provides:

  • Latest kernel and GNU tools
  • Modern container runtimes
  • Cutting-edge security features
  • Testing ground for enterprise technologies

Release Cycle

# Fedora releases occur every 6 months
# Supported for ~13 months (until next + 2 weeks)

# Check version
cat /etc/fedora-release
# Fedora release 42 (Server Edition)

# Check kernel
uname -r

Installation and Initial Setup

Server Installation

# Download Fedora Server ISO
# https://getfedora.org/server/

# Installation options:
# - Server with GUI
# - Server (minimal)
# - Custom operating system

# Post-installation setup
sudo dnf update -y
sudo systemctl reboot

Initial Configuration

# Set hostname
sudo hostnamectl set-hostname server1.example.com

# Configure timezone
sudo timedatectl set-timezone America/New_York

# Enable NTP
sudo timedatectl set-ntp true

# Configure firewall
sudo firewall-cmd --permanent --add-service=http
sudo firewall-cmd --permanent --add-service=https
sudo firewall-cmd --permanent --add-service=ssh
sudo firewall-cmd --reload

# Check status
sudo firewall-cmd --list-all

Package Management with DNF

DNF Fundamentals

DNF (Dandified YUM) is Fedora’s next-generation package manager:

# Update all packages
sudo dnf update

# Upgrade to new release
sudo dnf system-upgrade download --releasever=42
sudo dnf system-upgrade reboot

# Install package
sudo dnf install nginx

# Remove package
sudo dnf remove nginx

# Search packages
dnf search nginx
dnf provides /usr/sbin/nginx

# List installed
dnf list installed
dnf list installed | grep nginx

# Package information
dnf info nginx

# Check for updates
dnf check-update
NF Repositories

#```bash

D List repositories

dnf repolist dnf repolist enabled

Repository information

dnf repoinfo fedora

Enable/disable repository

sudo dnf config-manager –set-enabled fedora sudo dnf config-manager –set-disabled fedora

Add custom repository

sudo dnf config-manager –add-repo https://example.com/repo.repo

Create custom repo file

sudo vim /etc/yum.repos.d/custom.repo

[custom] name=Custom Repository baseurl=https://example.com/repo/$releasever/$basearch/ enabled=1 gpgcheck=1 gpgkey=https://example.com/key.pub


### Module Streams

Fedora uses AppStream modules for multiple software versions:

List modules

dnf module list

Enable module stream

sudo dnf module enable nodejs:20

Install module

sudo dnf module install nodejs:20

Reset module

sudo dnf module reset nodejs


## Systemd and Service Management

### Service Management

Start/stop service

sudo systemctl start nginx sudo systemctl stop nginx

Enable/disable at boot

sudo systemctl enable nginx sudo systemctl disable nginx

Check status

systemctl status nginx

View logs

journalctl -u nginx journalctl -u nginx -f journalctl –since “1 hour ago”

List failed units

systemctl –failed

Restart on failure

sudo systemctl edit nginx

[Service] Restart=on-failure RestartSec=5


## SELinux on Fedora

### SELinux Basics

Fedora enforces SELinux by default:

Check SELinux status

getenforce sestatus

SELinux modes

Enforcing (default) - enforces policy

Permissive - logs but doesn’t enforce

Disabled - completely off

Temporarily set permissive

sudo setenforce 0

Permanently set mode

sudo setenforce 1 sudo vim /etc/selinux/config

SELinux context

ls -Z /var/www/html ps -Z nginx

Restore default context

sudo restorecon -Rv /var/www/html

Change context

sudo chcon -t httpd_sys_content_t /var/www/html/file.html

Manage booleans

getsebool -a sudo setsebool -P httpd_read_user_content 1

Audit logs

sudo tail /var/log/audit/audit.log sudo ausearch -m avc


### Troubleshooting SELinux

Install SELinux tools

sudo dnf install setools sepolicy

Find boolean for service

seinfo -b | grep http

Check denied access

sudo ausearch -m avc -c httpd

Create local policy module

sudo dnf install policycoreutils-devel sudo audit2allow -a -M mymodule sudo semodule -i mymodule.pp


## Container Tools

### Podman

Fedora includes Podman as the default container runtime:

Install Podman

sudo dnf install podman

Basic commands (Docker-compatible)

podman pull docker.io/library/nginx podman run -d –name web nginx podman ps podman logs web podman exec -it web /bin/bash

Rootless containers

podman run -d nginx # Runs without root

Build images

podman build -t myapp . podman push myapp:latest

Compose

podman-compose up -d

System containers (run systemd in container)

podman run -d –name=fedora fedora:latest /sbin/init


### Buildah and Skopeo

Install tools

sudo dnf install buildah skopeo

Buildah - build container images

buildah from fedora buildah run myfedora-1 dnf update -y buildah commit myfedora-1 myfedora:latest

Skopeo - inspect and copy images

skopeo inspect docker://docker.io/library/nginx skopeo copy docker://nginx registry.example.com:5000/nginx skopeo delete docker://localhost:5000/myimage:latest


### Fedora CoreOS

Fedora CoreOS for container workloads

Download and run

curl -L https://getfedora.org/coreos/download/ | bash

Install to disk

sudo fcos install /dev/sda

Configuration with Butane

https://docs.fedoraproject.org/en-US/fedora-coreos/producing-ign/

## Cockpit Administration

### Web-Based Management

Cockpit provides a web interface for server management:

Install Cockpit

sudo dnf install cockpit

Enable and start

sudo systemctl enable –now cockpit.socket

Access via https://server:9090

Enable additional features

sudo dnf install cockpit-storaged sudo dnf install cockpit-networkmanager sudo dnf install cockpit-packagekit


### Cockpit Features

Dashboard - system overview

Logs - journal entries

Services - systemd management

Storage - disk/RAID management

Networking - network configuration

Accounts - user management

Kernel dump - crash analysis

Subscriptions - RHEL subscription management

Terminal - web terminal


## Web Server Configuration

### Apache

Install Apache

sudo dnf install httpd

Configuration

sudo vim /etc/httpd/conf/httpd.conf sudo vim /etc/httpd/conf.d/ssl.conf

Create virtual host

sudo vim /etc/httpd/conf.d/example.com.conf

<VirtualHost *:80> ServerName example.com DocumentRoot /var/www/html

<Directory /var/www/html>
    Options -Indexes +FollowSymLinks
    AllowOverride All
    Require all granted
</Directory>

ErrorLog /var/log/httpd/error.log
CustomLog /var/log/httpd/access.log combined
```

Nginx

# Install Nginx
sudo dnf install nginx

# Configuration
sudo vim /etc/nginx/nginx.conf
sudo vim /etc/nginx/conf.d/example.com.conf

# Test configuration
sudo nginx -t

# Reload
sudo systemctl reload nginx
server {
    listen 80;
    server_name example.com;
    root /var/www/html;
    
    location / {
        try_files $uri $uri/ =404;
    }
    
    location ~ \.php$ {
        fastcgi_pass unix:/run/php-fpm/www.sock;
        fastcgi_index index.php;
        fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
        include fastcgi_params;
    }
}

Database Installation

PostgreSQL

# Install PostgreSQL
sudo dnf install postgresql-server

# Initialize database
sudo postgresql-setup --initdb

# Start service
sudo systemctl enable --now postgresql

# Access database
sudo -u postgres psql

# Create user and database
sudo -u postgres createuser -s myuser
sudo -u postgres createdb mydb

MariaDB

# Install MariaDB
sudo dnf install mariadb-server

# Start service
sudo systemctl enable --now mariadb

# Secure installation
sudo mysql_secure_installation

# Access database
mysql -u root -p

Redis

# Install Redis
sudo dnf install redis

# Configure
sudo vim /etc/redis.conf

# Start service
sudo systemctl enable --now redis

Security Hardening

Firewall Configuration

# Using firewalld (default)
sudo firewall-cmd --permanent --add-service=http
sudo firewall-cmd --permanent --add-service=https
sudo firewall-cmd --permanent --add-service=ssh
sudo firewall-cmd --permanent --add-port=8080/tcp
sudo firewall-cmd --reload

# Check rules
sudo firewall-cmd --list-all

# Rich rules
sudo firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" service name="http" accept'

Fail2ban

# Install Fail2ban
sudo dnf install fail2ban

# Configuration
sudo vim /etc/fail2ban/jail.local
[DEFAULT]
bantime = 3600
findtime = 600
maxretry = 5

[sshd]
enabled = true
port = ssh
maxretry = 3

[nginx-http-auth]
enabled = true
# Start service
sudo systemctl enable --now fail2ban

Automatic Updates

# Enable dnf-automatic
sudo dnf install dnf-automatic

# Configure
sudo vim /etc/dnf/automatic.conf
[commands]
upgrade_type = default
random_sleep = 60

[email]
email_from = [email protected]
email_to = [email protected]
# Enable timers
sudo systemctl enable --now dnf-automatic.timer

Performance Tuning

Kernel Parameters

# Network tuning
sudo sysctl -w net.core.rmem_max=16777216
sudo sysctl -w net.core.wmem_max=16777216

# Make permanent
sudo vim /etc/sysctl.d/99-custom.conf
# IO scheduler
cat /sys/block/sda/queue/scheduler
echo "mq-deadline" | sudo tee /sys/block/sda/queue/scheduler

# Transparent huge pages
cat /sys/kernel/mm/transparent_hugepage/enabled

Resource Limits

# Systemd resource limits
sudo systemctl edit nginx
[Service]
MemoryLimit=512M
CPUQuota=50%
TasksMax=100

Backup and Recovery

Backup Scripts

#!/bin/bash
# /usr/local/bin/backup.sh

DATE=$(date +%Y%m%d)
BACKUP_DIR="/backup"
DB_NAME="mydb"
DB_USER="backup"

# Database backup
pg_dump -U $DB_USER $DB_NAME | gzip > $BACKUP_DIR/db-$DATE.sql.gz

# Files backup
tar -czf $BACKUP_DIR/files-$DATE.tar.gz /var/www/html

# Keep 7 days
find $BACKUP_DIR -mtime +7 -delete

Restore Procedures

# Database restore
gunzip < backup.sql.gz | psql -U user dbname

# Files restore
tar -xzf files.tar.gz -C /

# Full system restore
# Use Kickstart for reinstallation
# Restore /home and /etc from backup

Monitoring and Logging

System Monitoring

# Install monitoring tools
sudo dnf install htop iotop atop

# Resource monitoring
htop
iotop
atop

# Network monitoring
sudo dnf install nethogs
nethogs eth0

Logging with Journald

# View logs
journalctl
journalctl -u nginx
journalctl --since "2026-01-01"
journalctl --until "2026-01-02"
journalctl -p err

# Persistent logging
sudo vim /etc/systemd/journald.conf
[Journal]
Storage=persistent
SystemMaxUse=1G
RuntimeMaxUse=100M

Conclusion

Fedora Server provides an excellent platform for modern infrastructure, combining innovation with enterprise features. Its cutting-edge packages, strong SELinux integration, and excellent container tools make it ideal for organizations seeking the latest technology with production-ready stability.

Whether deploying web applications, databases, or containerized workloads, Fedora Server delivers the tools and features needed for 2026 infrastructure requirements.

Resources

Comments

Share this article

Scan to read on mobile