HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.
Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.
Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat’s most valuable tools for monitoring and optimization and presents thorough coverage of security—including a detailed introduction to Security-Enhanced Linux (SELinux).
Part I Installation and Configuration
Chapter 1 Installing Red Hat Enterprise Linux
Chapter 2 Post-Installation Configuration
Chapter 3 Operating System Updates
Part II Operating System Core Concepts
Chapter 4 Understanding Linux Concepts
Chapter 5 Working with RPM Software
Chapter 6 Analyzing Hardware
Chapter 7 Managing Storage
Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors
Part III System Administration
Chapter 9 Managing Users and Groups
Chapter 10 Techniques for Backup and Recovery
Chapter 11 Automating Tasks with Scripts
Part IV Network Services
Chapter 12 Identity Management
Chapter 13 Network File Sharing
Chapter 14 Granting Network Connectivity with DHCP
Chapter 15 Creating a Web Server with the Apache HTTP Server
Chapter 16 Hostname Resolution with BIND
Chapter 17 Securing Remote Logins with OpenSSH
Chapter 18 Setting Up an Email Server with Sendmail
Chapter 19 Explaining Other Common Network Services
Part V Monitoring and Tuning
Chapter 20 Monitoring System Resources
Chapter 21 Monitoring and Tuning the Kernel
Chapter 22 Monitoring and Tuning Applications
Chapter 23 Protecting Against Intruders with Security-Enhanced Linux
Chapter 24 Configuring a Firewall
Chapter 25 Linux Auditing System
Appendixes
Appendix A Installing Proprietary Kernel Modules
Appendix B Creating Virtual Machines
Appendix C Preventing Security Breaches with ExecShield
Appendix D Troubleshooting
Tammy Fox served as technical leader of Red Hat’s documentation group, where she wrote and revised The Red Hat Enterprise Linux System Administration Guide. She was founding editor of Red Hat Magazine, now an online publication reaching more than 800,000 system administrators and others interested in Linux and open source. She wrote Red Hat’s LogViewer tool and has written and contributed to several Red Hat configuration tools. Fox is also the founding leader of the Fedora Docs Project.
Register your book at www.samspublishing.com/register for convenient access to updates and to download example scripts presented in this book.
Category: Linux/Networking
Covers: Red Hat Enterprise Linux 5
User Level: Intermediate–Advanced
Managing Storage in Red Hat Enterprise Linux 5
Part I Installation and Configuration
Chapter 1 Installing Red Hat Enterprise Linux
Choosing an Installation Method
Creating the Installation Source
Starting the Installation
Performing the Installation
Installing with Kickstart
Installing with PXE
Performing an Upgrade
Red Hat Network Provisioning
Summary
Chapter 2 Post-Installation Configuration
Red Hat Setup Agent
Logging In for the First Time
Network Configuration
Printer Configuration
Adding Boot Parameters
Summary
Chapter 3 Operating System Updates
Navigating Through the RHN Website
Assigning Users for the RHN Website
Subscribing to RHN Channels
Performing Actions on Individual Systems from the RHN Website
Using System Groups on the RHN Website
Retrieving Software from RHN with YUM
Summary
Part II Operating System Core Concepts
Chapter 4 Understanding Linux Concepts
Learning the Desktop
Filesystem Hierarchy System
Shell Basics
Becoming the Root User
Manual Pages
Editing Text Files
File Permissions
Initialization Scripts
Runlevels
Summary
Chapter 5 Working with RPM Software
Understanding How RPM Works
Finding the Software
Installing Software
Updating Software
Removing Software
Verifying Software Files
Querying Package Files
Building RPM Packages
Summary
Chapter 6 Analyzing Hardware
Listing Devices
Detecting Hardware
Gathering Information from the BIOS
Listing and Configuring Kernel Modules
HAL
Summary
Chapter 7 Managing Storage
Understanding Partitioning
Understanding LVM
Understanding RAID
Understanding Clustering and GFS
Using Access Control Lists
Using Disk Quotas
Summary
Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors
64-Bit Processors
Multi-Core Processors
Processors with Hyper-Threading Technology
Summary
Part III System Administration
Chapter 9 Managing Users and Groups
What Are Users and Groups?
Managing Users
Managing Groups
How It All Works
Best Practices
Summary
Chapter 10 Techniques for Backup and Recovery
Writing a Backup Plan
Using Amanda for Backups
Other Linux Backup Utilities
Recovery and Repair
Summary
Chapter 11 Automating Tasks with Scripts
Writing Scripts with Bash
Additional Scripting Languages
Scheduling Tasks with Cron
Summary
Part IV Network Services
12 Identity Management
Understanding PAM
Enabling NIS
Enabling LDAP
Enabling Kerberos
Enabling SMB or Winbind Authentication
Enabling with the Authentication Tool
Summary
Chapter 13 Network File Sharing
Network File System
Samba File Sharing
Summary
Chapter 14 Granting Network Connectivity with DHCP
Allowing Connections
Configuring the Server
Logging Connections
Summary
Chapter 15 Creating a Web Server with the Apache HTTP Server
Apache HTTP Server and SELinux
Allowing Connections
Configuring the Server
Logging Connections
Starting and Stopping the Server
Summary
Chapter 16 Hostname Resolution with BIND
Understanding DNS Concepts
Allowing Connections
Configuring BIND
Configuring BIND Graphically
Logging Connections
Summary
Chapter 17 Securing Remote Logins with OpenSSH
Allowing Connections
Configuring the Server
Connecting from the Client
Logging Connections
Summary
Chapter 18 Setting Up an Email Server with Sendmail
Understanding Email Concepts
Configuring Sendmail
Using POP and IMAP
Logging Sendmail Connections
Allowing Email Connections
Summary
Chapter 19 Explaining Other Common Network Services
The xinetd Super Server
Keeping Accurate Time with NTP
Creating a Network Printer with CUPS
Summary
Part V Monitoring and Tuning
Chapter 20 Monitoring System Resources
Reporting Filesystem Usage
Reporting Disk Performance
Reporting System Processes
Reporting on the System Processors
Reporting Memory Usage
Reporting on the Network Subsystem
Generating a System Report
Locating Log Files
Viewing Log Files with Logwatch
Summary
Chapter 21 Monitoring and Tuning the Kernel
Using the /proc Directory .
Optimizing Virtual Memory
Managing Memory with NUMA
Using AltSysRq to Execute System Requests
Saving Kernel Dumps for Analysis
Setting SMP IRQ Affinity
Enabling NMI Watchdog for Locked Systems
Summary
Chapter 22 Monitoring and Tuning Applications
OProfile
Valgrind
Additional Programs to Consider
Summary
Chapter 23 Protecting Against Intruders with Security-Enhanced Linux
Selecting an SELinux Mode
Selecting and Customizing the SELinux Policy
Utilizing the SELinux Troubleshooting Tool
Working with Security Contexts
Summary
Chapter 24 Configuring a Firewall
Selecting a Table and Command for IPTables
Selecting IPTables Options
Using IPTables Match Extensions
Using IPTables Target Extensions
Starting and Stopping the IPTables Service
Saving the IPTables Rules
IPTables Examples
Enabling the Default Firewall
Summary
Chapter 25 Linux Auditing System
Configuring the Audit Daemon
Writing Audit Rules and Watches
Starting and Stopping the Daemon
Analyzing the Records
Tracing a Process with Audit
Summary
Appendixes
Appendix A Installing Proprietary Kernel Modules
Installing Proprietary Modules
Installing the nVidia Display Driver
Recognizing a Tainted Kernel
Appendix B Creating Virtual Machines
Virtualization System Requirements
Installing Virtualization
Setting Up the VM and Installing the Guest OS
Introducing the virsh Command
Starting and Stopping the Virtual Machine
Modifying Dedicated Resources
Performing Additional Actions
Managing VMs with the xm Utility
Appendix C Preventing Security Breaches with ExecShield 547
How ExecShield Works
Determining Status of ExecShield
Disabling ExecShield
Appendix D Troubleshooting
Installation and Configuration Troubleshooting
OS Core Concepts Troubleshooting
System Administration Troubleshooting
Network Troubleshooting
Monitoring and Tuning Troubleshooting
Security Troubleshooting
PrintNumber | ErrorLocation | Error | Correction | DateAdded |
---|---|---|---|---|
2 | xx | 3rd para: Security remains a cornerstone of Red Hat offerings, and Tammy has done a great job of explaining the background and history of the Linux Audit System and Security Enhanced Linux (SELinux). | Security remains a cornerstone of Red Hat offerings, and Tammy has done a great job of explaining the background and history of the Linux Audit System and Security-Enhanced Linux (SELinux). | 10/18/2007 |
2 | 35 | 1st entry, bad break: --netmask=, | fixed | 10/18/2007 |
2 | 37 | Code after Note: logvol <mountpoint> -vgname=<name> --size=<size> --name=<name> <options> | logvol <mountpoint> --vgname=<name> --size=<size> --name=<name> <options> | 10/18/2007 |
2 | 52 | 4. Copy all the .msg files from the isolinux/ directory in the installation tree or from the first installation CD in the newly created /tftpboot/linux-install/msg/ directory. | .msg should be in mono. | 10/18/2007 |
2 | 54 | chkconfig level 345 xinetd on chkconfig level 345 tftp on |
chkconfig --level 345 xinetd on chkconfig --level 345 tftp on |
10/18/2007 |
2 | 61 | Tip, last line: rhn_register | Should be mono font. | 10/18/2007 |
2 | 66 | Listing 2.1: /etc/modprobe.conf | Should be mono font. | 10/18/2007 |
2 | 66 | Listing 2.2: /etc/sysconfig/network | Should be mono font. | 10/18/2007 |
2 | 67 | Listing 2.3: /etc/hosts | Should be mono font. | 10/18/2007 |
2 | 138 | The URL in NOTE: http://fedora.redhat.com/docs/drafts/rpm-guide-en/ |
http://docs.fedoraproject.org/drafts/rpm-guide-en/ |
10/18/2007 |
2 | 303 | Extra space: The master configuration file is /etc/auto.master, Listing 13.2 shows the default auto.master file . |
The master configuration file is /etc/auto.master, Listing 13.2 shows the default auto.master file. |
10/22/2007 |
2 | 316 | Extra space: A successful connection is indicated by the smb: \> prompt. Once connected, the commands are similar to a command-line FTP client. Table 13.2 lists common commands . |
A successful connection is indicated by the smb: \> prompt. Once connected, the commands are similar to a command-line FTP client. Table 13.2 lists common commands. |
10/22/2007 |
2 | 324 | Bad break: Each time the server is started, it looks for the /var/lib/dhcp/dhcpd. leases file. If it is not found, the service is not started. Before the service is started for the first time, the file must be created with the command touch /var/lib/dhcp/dhcpd.leases. |
fixed |
10/22/2007 |
2 | 330 | Bad break: For a complete list of directives, go to http://httpd.apache.org/docs/2.2/mod/directives.html. |
fixed |
10/22/2007 |
2 | 342 | Last sentence: This is the same as the ndots statement in /etc/resolv.conf: |
This is the same as the ndots statement in /etc/resolv.conf. |
10/22/2007 |
2 | 426 | Bad break: If you add the change to /etc/sysctl.conf without executing the sysctl -w vm. swappiness=70 command, the change will not go into effect unless the sysctl -p command is also executed as root. |
Fixed |
10/22/2007 |
2 | 427 | vm.min_slab_ratio 5* vm.min_unmapped_ratio 1* |
vm.min_slab_ratio* 5 vm.min_unmapped_ratio* 1 |
10/22/2007 |
2 | 457 | opcontrol event=<name>:<sample-rate>:<unit-mask>:<kernel>:<user> \ |
opcontrol --event=<name>:<sample-rate>:<unit-mask>:<kernel>:<user> \ |
10/22/2007 |
2 | 468 | Bad break: The daemon, setroubleshootd, is started by default with the /etc/rc.d/init.d/setroubleshoot initialization script. |
Fixed |
10/22/2007 |
2 | 559 | access files (/etc/mail directory), 370 |
access file (/etc/mail directory), 370 |
10/22/2007 |
2 | 567 | domaintable files (/etc/mail directory), 370 |
domaintable file (/etc/mail directory), 370 |
10/22/2007 |
2 | 572 | helpfile files (/etc/mail directory), 370 |
helpfile file (/etc/mail directory), 370 |
10/22/2007 |
2 | 577 | local-host-names files (/etc/mail directory), 371 |
local-host-names file (/etc/mail directory), 371 |
10/22/2007 |
2 | 578 | mailertable files (/etc/mail directory), 371 |
mailertable file (/etc/mail directory), 371 |
10/22/2007 |
2 | 593 | trusted-users files (/etc/mail directory), 371 |
trusted-users file (/etc/mail directory), 371 |
10/22/2007 |
2 | 595 | virtusertable files (/etc/mail directory), 371 |
virtusertable file (/etc/mail directory), 371 |
10/22/2007 |
2 | 603 | Updated ad to reflect Fedora 7 |
Fixed |
10/22/2007 |
2 | p 67 | Listing 2.4: /etc/resolv.conf | Should be mono font. | 5/12/2008 |
2 | p 68 | Other device names include lo for the local loopback device, ppX for dialup interfaces, and irlanX for infrared devices where X is the device number starting with0. | X should be mono font. | 5/12/2008 |
2 | p 76 | Sometimes, boot parameters are needed for a system to boot or run properly. For example: | Sometimes, boot parameters are needed for a system to boot or run properly. For example | 5/12/2008 |
2 | p 105 | 5th para: For example, the cp status.txt reports/status01.txt will copy the status.txt file from the current working directory to the reports/ directory relative to the current working directory as the new filename status01.txt. | For example, the cp status.txt reports/status01.txt command will copy the status.txt file from the current working directory to the reports/ directory relative to the current working directory as the new filename status01.txt. | 5/12/2008 |