Add

How to find out CentOS, Debian or Ubuntu version and architecture


This article describes how to show your CentOS, Debian or Ubuntu OS version, architecture and kernel version.

 

CentOS

Log in to SSH and run the commands below to find out your version of CentOS:

cat /etc/redhat-release
CentOS release 5.6 (Final)

To see what architecture your CentOS server is running:

arch
i686

To check what CentOS kernel is running:

uname -a
Linux XXXX.ctkn.net 2.6.18-238.5.1.el5.028stabXX.Y #1 SMP DDD MMM timestamp TZ YYYY i686 i686 i386 GNU/Linux

 

Debian

Log in to SSH and run the commands below to find out your version of Debian:

cat /etc/issue
Debian GNU/Linux 5.0 \n \l

To see what architecture and kernel your Debian server is running:

uname -a
Linux HOSTNAME 2.6.18-028stab0XX.YY #1 SMP DDD MMM dd time TZ YYYY x86_64 GNU/Linux

The x86_64 denotes a 64-bit OS.

Ubuntu

Log in to SSH and run the commands below to find out your version of Ubuntu:

cat /etc/issue
Ubuntu 10.04.2 LTS \n \l

To see what architecture and kernel your Ubuntu server is running:

uname -a
Linux HOSTNAME 2.6.18-028stab0XX.Y #1 SMP DDD MMM dd time TZ YYYY x86_64 GNU/Linux

The x86_64 denotes a 64-bit OS.

The Discussion

see what everyone is saying

  • [...] you have only standard CentOS repositories enabled to avoid dependency issues.If you are unsure, you can check what version of CentOS you have installed here.New InstallationsFor new installations, you can download the CentOS 5.8 32-bit or 64-bit ISO from [...]

  • How to enable Epel repo on CentOS | ctkn.net March 25th, 2012 at 6:57 pm #2

    [...] x64, log in to SSH on your server and execute the following command (dependent on your OS – unsure of what version of CentOS you are running?): CentOS 6.x 32-bit (x86/i386):rpm -Uvh [...]

  • [...] To enable EPEL (Extra Packages for Enterprise Linux) for CentOS 5 x86 or x64, log in to SSH on your server and execute the following command (dependent on your OS – unsure of what version of CentOS you are running?): [...]

  • Jari Aalto June 25th, 2013 at 7:14 pm #4

    To determine OS, you can also use command lsb_release(1). See the options how to extract only part of the information. An example:

    $ lsb_release –all

    Distributor ID: Debian
    Description: Debian GNU/Linux testing (jessie)
    Release: testing
    Codename: jessie

Respond

get in on the action.

* Required

Random Posts Recent Comments

  • Tony Says:

    Thanks it works! Just close the cmd windows and open a new one...

  • greenhart Says:

    I found another way around it. For the /format switch I used: /format:"%WINDIR%\system32\wbem\en-...

  • Jari Aalto Says:

    To determine OS, you can also use command lsb_release(1). See the options how to extract only part o...

  • shadovice Says:

    thanks! it worked like a charm, although there is still minor typo remained: rpm -Uvh http://downlo...

  • Joh Says:

    Great, thank you. Also works with the new version and Centos 6.3 without test repo, just install ...

  • sierprinsky Says:

    Muchas gracias por tu aporte :)...

  • kilby Says:

    The listed solution worked fine for me under Win7 64bit Though I had to run the copy as Asministr...

  • Viper5112 Says:

    The files are already in the C:\Windows\SysWOW64\wbem\en-US and they need to be in the system32 fold...

  • slowmOoh Says:

    Thanks...

  • Jørgen Says:

    @Jordan, I had the same problem also on Windows 7 64 bits. It worked for my user account and Admini...

Tag Cloud

backup mail backup mail server backup mailserver backup mx cd burner control multiple computers with one keyboard and mouse control panel DAG disk benchmark disk performance test DNS DNS check enable dag repo free cd burner free DNS check hdd benchmark http proxy install keyboard over network kloxo kloxo 64-bit kvm lxadmin lxadmin-master lxlabs mouse over network mtr ping plotter proxy proxy hide IP qmail repo RPM rpmforge share keyboard and mouse over network share keyboard over network share mouse and keyboard share mouse over network software kvm squid squid hide IP squid proxy trace traceroute tracert