Home > Store

UNIX and Linux System Administration Handbook, 5th Edition

Register your product to gain access to bonus material or receive a coupon.

UNIX and Linux System Administration Handbook, 5th Edition

Best Value Purchase

Book + eBook Bundle

  • Your Price: $75.59
  • List Price: $125.98
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

More Purchase Options

Book

  • Your Price: $55.99
  • List Price: $69.99
  • Usually ships in 24 hours.

eBook (Watermarked)

  • Your Price: $44.79
  • List Price: $55.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

About

Features

  • Covers today's hottest sysadmin topics, including cloud computing, containerization, and continuous delivery
  • Addresses storage management, network design/administration, web hosting, automation, configuration management, performance analysis, virtualization, DNS, security, and more
  • Fully updated for latest versions of all major Linux distributions

Description

  • Copyright 2018
  • Dimensions: 7" x 9-1/8"
  • Pages: 1232
  • Edition: 5th
  • Book
  • ISBN-10: 0-13-427755-4
  • ISBN-13: 978-0-13-427755-4

“As an author, editor, and publisher, I never paid much attention to the competition—except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against.”

—Tim O’Reilly, founder of O’Reilly Media

“This edition is for those whose systems live in the cloud or in virtualized data centers; those whose administrative work largely takes the form of automation and configuration source code; those who collaborate closely with developers, network engineers, compliance officers, and all the other worker bees who inhabit the modern hive.”

—Paul Vixie, Internet Hall of Fame-recognized innovator and founder of ISC and Farsight Security

“This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems’ history but doesn’t bloviate. It’s just straight-forward information delivered in a colorful and memorable fashion.”

—Jason A. Nunnelley

UNIX® and Linux® System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure.

Updated for new distributions and cloud environments, this comprehensive guide covers best practices for every facet of system administration, including storage management, network design and administration, security, web hosting, automation, configuration management, performance analysis, virtualization, DNS, security, and the management of IT service organizations. The authors—world-class, hands-on technologists—offer indispensable new coverage of cloud platforms, the DevOps philosophy, continuous deployment, containerization, monitoring, and many other essential topics.

Whatever your role in running systems and networks built on UNIX or Linux, this conversational, well-written ¿guide will improve your efficiency and help solve your knottiest problems.

Sample Content

Table of Contents

Tribute to Evi xl

Preface xlii

Foreword xliv

Acknowledgments xlvi

Section One: Basic Administration 1

Chapter 1: Where to Start 3

Essential duties of a system administrator 4

Suggested background 7

Linux distributions 8

Example systems used in this book 9

Notation and typographical conventions 12

Units 13

Man pages and other on-line documentation 14

Other authoritative documentation 16

Other sources of information 18

Ways to find and install software 19

Where to host 25

Specialization and adjacent disciplines 26

Recommended reading28

Chapter 2: Booting and System Management Daemons 30

Boot process overview 30

System firmware 32

Boot loaders 35

GRUB: the GRand Unified Boot loader 35

The FreeBSD boot process 39

System management daemons .41

systemd in detail 44

FreeBSD init and startup scripts 57

Reboot and shutdown procedures 59

Stratagems for a nonbooting system 60

Chapter 3: Access Control and Rootly Powers 65

Standard UNIX access control 66

Management of the root account69

Extensions to the standard access control model 79

Modern access control 83

Recommended reading89

Chapter 4: Process Control 90

Components of a process 90

The life cycle of a process 93

ps: monitor processes 98

Interactive monitoring with top101

nice and renice: influence scheduling priority102

The /proc filesystem 104

strace and truss: trace signals and system calls 105

Runaway processes 107

Periodic processes109

Chapter 5: The Filesystem 120

Pathnames 122

Filesystem mounting and unmounting 122

Organization of the file tree125

File types 126

File attributes132

Access control lists 140

Chapter 6: Software Installation and Management 153

Operating system installation 154

Managing packages 162

Linux package management systems 164

High-level Linux package management systems 166

FreeBSD software management175

Software localization and configuration 178

Recommended reading 181

Chapter 7: Scripting and the Shell 182

Scripting philosophy 183

Shell basics 189

sh scripting 198

Regular expressions 209

Python programming 215

Ruby programming 223

Library and environment management for Python and Ruby 229

Revision control with Git 235

Recommended reading 241

Chapter 8: User Management 243

Account mechanics 244

The /etc/passwd file 245

The Linux /etc/shadow file250

FreeBSD's /etc/master.passwd and /etc/login.conf files 252

The /etc/group file 254

Manual steps for adding users 255

Scripts for adding users: useradd, adduser, and newusers 260

Safe removal of a user’s account and files264

User login lockout265

Risk reduction with PAM 266

Centralized account management 266

Chapter 9: Cloud Computing 270

The cloud in context 271

Cloud platform choices 273

Cloud service fundamentals 276

Clouds: VPS quick start by platform283

Cost control 291

Recommended Reading 293

Chapter 10: Logging 294

Log locations296

The systemd journal 299

Syslog 302

Kernel and boot-time logging 318

Management and rotation of log files 319

Management of logs at scale 321

Logging policies 323

Chapter 11: Drivers and the Kernel 325

Kernel chores for system administrators 326

Kernel version numbering 327

Devices and their drivers 328

Linux kernel configuration339

FreeBSD kernel configuration 344

Loadable kernel modules 346

Booting 348

Booting alternate kernels in the cloud 355

Kernel errors356

Recommended reading 359

Chapter 12: Printing 360

CUPS printing 361

CUPS server administration 365

Troubleshooting tips 369

Recommended reading 371

Section Two: Networking 373

Chapter 13: TCP/IP Networking 375

TCP/IP and its relationship to the Internet 375

Networking basics 378

Packet addressing384

IP addresses: the gory details 387

Routing 398

IPv4 ARP and IPv6 neighbor discovery 401

DHCP: the Dynamic Host Configuration Protocol402

Security issues 406

Basic network configuration 410

Linux networking417

FreeBSD networking 425

Network troubleshooting 428

Network monitoring 437

Firewalls and NAT 440

Cloud networking448

Recommended reading 457

Chapter 14: Physical Networking 459

Ethernet: the Swiss Army knife of networking460

Wireless: Ethernet for nomads 469

SDN: software-defined networking 473

Network testing and debugging474

Building wiring 475

Network design issues476

Management issues 478

Recommended vendors 479

Recommended reading 480

Chapter 15: IP Routing 481

Packet forwarding: a closer look482

Routing daemons and routing protocols 485

Protocols on parade 488

Routing protocol multicast coordination490

Routing strategy selection criteria 490

Routing daemons492

Cisco routers494

Recommended reading 496

Chapter 16: DNS: The Domain Name System 498

DNS architecture 499

DNS for lookups 500

The DNS namespace 502

How DNS works 503

The DNS database512

The BIND software 525

Split DNS and the view statement 541

BIND configuration examples 543

Zone file updating547

DNS security issues 551

BIND debugging 568

Recommended reading 576

Chapter 17: Single Sign-On 578

Core SSO elements 579

LDAP: “lightweight” directory services 580

Using directory services for login 586

Alternative approaches594

Recommended reading 595

Chapter 18: Electronic Mail 596

Mail system architecture 597

Anatomy of a mail message600

The SMTP protocol 603

Spam and malware 605

Message privacy and encryption 607

Mail aliases 608

Email configuration 612

sendmail 613

Exim 640

Postfix 658

Recommended reading 672

Chapter 19: Web Hosting 674

HTTP: the Hypertext Transfer Protocol 674

Web software basics 682

Web hosting in the cloud 694

Apache httpd696

NGINX 704

HAProxy 710

Recommended reading 714

Section Three: Storage 715

Chapter 20: Storage 717

I just want to add a disk! 718

Storage hardware 721

Storage hardware interfaces 730

Attachment and low-level management of drives 733

The software side of storage: peeling the onion 739

Disk partitioning 742

Logical volume management 747

RAID: redundant arrays of inexpensive disks 753

Filesystems 762

Traditional filesystems: UFS, ext4, and XFS 763

Next-generation filesystems: ZFS and Btrfs 772

ZFS: all your storage problems solved 773

Btrfs: “ZFS lite” for Linux 783

Data backup strategy 788

Recommended reading 790

Chapter 21: The Network File System 791

Meet network file services 791

The NFS approach794

Server-side NFS 801

Client-side NFS 807

Identity mapping for NFS version 4 810

nfsstat: dump NFS statistics 811

Dedicated NFS file servers 812

Automatic mounting 812

Recommended reading 818

Chapter 22: SMB 819

Samba: SMB server for UNIX 820

Installing and configuring Samba 821

Mounting SMB file shares 825

Browsing SMB file shares 826

Ensuring Samba security 826

Debugging Samba827

Recommended reading 829

Section Four: Operations 831

Chapter 23: Configuration Management 833

Configuration management in a nutshell834

Dangers of configuration management 834

Elements of configuration management 835

Popular CM systems compared 841

Introduction to Ansible 852

Introduction to Salt 871

Ansible and Salt compared 893

Best practices895

Recommended reading 899

Chapter 24: Virtualization 900

Virtual vernacular901

Virtualization with Linux 905

FreeBSD bhyve 910

VMware910

VirtualBox 911

Packer 911

Vagrant 913

Recommended reading 914

Chapter 25: Containers 915

Background and core concepts 916

Docker: the open source container engine 919

Containers in practice937

Container clustering and management 942

Recommended reading 948

Chapter 26: Continuous Integration and Delivery 949

CI/CD essentials 951

Pipelines 955

Jenkins: the open source automation server 961

CI/CD in practice964

Containers and CI/CD978

Recommended reading 980

Chapter 27: Security 981

Elements of security 983

How security is compromised 983

Basic security measures 987

Passwords and user accounts 992

Security power tools 996

Cryptography primer1005

SSH, the Secure SHell1016

Firewalls 1027

Virtual private networks (VPNs) 1030

Certifications and standards 1031

Sources of security information 1034

When your site has been attacked 1037

Recommended reading 1038

Chapter 28: Monitoring 1040

An overview of monitoring 1041

The monitoring culture 1044

The monitoring platforms1045

Data collection 1051

Network monitoring 1055

Systems monitoring 1056

Application monitoring 1059

Security monitoring 1061

SNMP: the Simple Network Management Protocol 1063

Tips and tricks for monitoring1068

Recommended reading 1069

Chapter 29: Performance Analysis 1070

Performance tuning philosophy 1071

Ways to improve performance 1073

Factors that affect performance 1074

Stolen CPU cycles 1075

Analysis of performance problems 1076

System performance checkup 1077

Help! My server just got really slow! 1088

Recommended reading 1090

Chapter 30: Data Center Basics 1091

Racks1092

Power 1092

Cooling and environment1096

Data center reliability tiers 1101

Data center security 1102

Tools 1103

Recommended reading 1104

Chapter 31: Methodology, Policy, and Politics 1105

The grand unified theory: DevOps 1106

Ticketing and task management systems 1111

Local documentation maintenance1115

Environment separation 1118

Disaster management1119

IT policies and procedures 1122

Service level agreements 1125

Compliance: regulations and standards 1127

Legal issues 1131

Organizations, conferences, and other resources 1133

Recommended reading 1135

Index 1136

A Brief History of System Administration 1166

Colophon 1176

About the Contributors 1178

About the Authors 1179

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020