Home > Store

Linux Administration Handbook, 2nd Edition

Register your product to gain access to bonus material or receive a coupon.

Linux Administration Handbook, 2nd Edition

  • Published Oct 30, 2006 by Pearson.

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

Major revision of must-have guide for Linux administrators working in production environments.

° Full section on LVM, Logical Voume Manager, subsystem for on-line disk storage management

° X11 basic administration and

° Significantly expanded coverage of patch management

° Nagios, open source host and network monitoring program

Description

  • Copyright 2007
  • Edition: 2nd
  • Book
  • ISBN-10: 0-13-148004-9
  • ISBN-13: 978-0-13-148004-9

“As this book shows, Linux systems are just as functional, secure, and reliable as their proprietary counterparts. Thanks to the ongoing efforts of thousands of Linux developers, Linux is more ready than ever for deployment at the frontlines of the real world. The authors of this book know that terrain well, and I am happy to leave you in their most capable hands.”
—Linus Torvalds
“The most successful sysadmin book of all time—because it works!”
—Rik Farrow, editor of ;login:
“This book clearly explains current technology with the perspective of decades of experience in large-scale system administration. Unique and highly recommended.”
—Jonathan Corbet, cofounder, LWN.net
“Nemeth et al. is the overall winner for Linux administration: it’s intelligent, full of insights, and looks at the implementation of concepts.”
—Peter Salus, editorial director, Matrix.net

Since 2001, Linux Administration Handbook has been the definitive resource for every Linux® system administrator who must efficiently solve technical problems and maximize the reliability and performance of a production environment. Now, the authors have systematically updated this classic guide to address today’s most important Linux distributions and most powerful new administrative tools.

The authors spell out detailed best practices for every facet of system administration, including storage management, network design and administration, web hosting, software configuration management, performance analysis, Windows interoperability, and much more. Sysadmins will especially appreciate the thorough and up-to-date discussions of such difficult topics such as DNS, LDAP, security, and the management of IT service organizations.

Linux® Administration Handbook, Second Edition, reflects the current versions of these leading distributions:

  • Red Hat® Enterprise Linux®
  • FedoraTM Core
  • SUSE® Linux Enterprise
  • Debian® GNU/Linux
  • Ubuntu® Linux

Sharing their war stories and hard-won insights, the authors capture the behavior of Linux systems in the real world, not just in ideal environments. They explain complex tasks in detail and illustrate these tasks with examples drawn from their extensive hands-on experience.

Sample Content

Table of Contents

Foreword to the First Edition xxxiii

Preface xxxiv

Acknowledgments xxxvii

Section One: Basic Administration 1

Chapter 1: Where to Start 3

Suggested background 4

Linux’s relationship to UNIX 4

Linux in historical context 5

Linux distributions 6

Notation and typographical conventions 9

Where to go for information 11

How to find and install software 14

Essential tasks of the system administrator 16

System administration under duress 18

Recommended reading 19

Exercises 20

Chapter 2: Booting and Shutting Down 21

Bootstrapping 21

Booting PCs 25

Using boot loaders: LILO and GRUB 26

Booting single-user mode 31

Working with startup scripts 32

Rebooting and shutting down 40

Exercises 43

Chapter 3: Rootly Powers 44

Ownership of files and processes 44

The superuser 46

Choosing a root password 47

Becoming root 48

Other pseudo-users 51

Exercises 52

Chapter 4: Controlling Processes 53

Components of a process 53

The life cycle of a process 56

Signals 57

kill and killall: send signals 60

Process states 60

nice and renice: influence scheduling priority 61

ps: monitor processes 62

top: monitor processes even better 65

The /proc filesystem 65

strace: trace signals and system calls 66

Runaway processes 67

Recommended reading 69

Exercises 69

Chapter 5: The Filesystem 70

Pathnames 72

Filesystem mounting and unmounting 73

The organization of the file tree 75

File types 76

File attributes 81

Access control lists 88

Exercises 92

Chapter 6: Adding New Users 93

The /etc/passwd file 93

The /etc/shadow file 99

The /etc/group file 101

Adding users 102

Removing users 107

Disabling logins 108

Managing accounts 108

Exercises 110

Chapter 7: Adding a Disk 111

Disk interfaces 111

Disk geometry 119

Linux filesystems 120

An overview of the disk installation procedure 122

hdparm: set IDE interface parameters 129

fsck: check and repair filesystems 131

Adding a disk: a step-by-step guide 133

Advanced disk management: RAID and LVM 138

Mounting USB drives 147

Exercises 148

Chapter 8: Periodic Processes 150

cron: schedule commands 150

The format of crontab files 151

Crontab management 153

Some common uses for cron 154

Other schedulers: anacron and fcron 156

Exercises 157

Chapter 9: Backups 158

Motherhood and apple pie 159

Backup devices and media 163

Setting up an incremental backup regime with dump 169

Restoring from dumps with restore 173

Dumping and restoring for upgrades 176

Using other archiving programs 177

Using multiple files on a single tape 178

Bacula 179

Commercial backup products 197

Recommended reading 198

Exercises 198

Chapter 10: Syslog and Log Files 201

Logging policies 201

Linux log files 204

logrotate: manage log files 208

Syslog: the system event logger 209

Condensing log files to useful information 220

Exercises 222

Chapter 11: Software and Configuration Management 223

Basic Linux installation 223

Diskless clients 232

Package management 234

High-level package management systems 237

Revision control 247

Localization and configuration 255

Configuration management tools 260

Sharing software over NFS 263

Recommended software 266

Recommended reading 268

Exercises 268

Section Two: Networking 269

Chapter 12: TCP/IP Networking 271

TCP/IP and the Internet 272

Networking road map 275

Packets and encapsulation 276

IP addresses: the gory details 282

Routing 293

ARP: the address resolution protocol 296

Addition of a machine to a network 297

Distribution-specific network configuration 307

DHCP: the Dynamic Host Configuration Protocol 311

Dynamic reconfiguration and tuning 314

Security issues 316

Linux NAT 319

PPP: the Point-to-Point Protocol 320

Linux networking quirks 330

Recommended reading 331

Exercises 332

Chapter 13: Routing 334

Packet forwarding: a closer look 335

Routing daemons and routing protocols 337

Protocols on parade 341

routed: RIP yourself a new hole 343

gated: gone to the dark side 344

Routing strategy selection criteria 344

Cisco routers 346

Recommended reading 348

Exercises 349

Chapter 14: Network Hardware 350

LAN, WAN, or MAN? 351

Ethernet: the common LAN 351

Wireless: nomad’s LAN 359

FDDI: the disappointing, expensive, and outdated LAN 361

ATM: the promised (but sorely defeated) LAN 362

Frame relay: the sacrificial WAN 363

ISDN: the indigenous WAN 364

DSL and cable modems: the people’s WAN 364

Where is the network going? 365

Network testing and debugging 366

Building wiring 366

Network design issues 368

Management issues 370

Recommended vendors 371

Recommended reading 372

Exercises 372

Chapter 15: DNS: The Domain Name System 373

DNS for the impatient: adding a new machine 374

The history of DNS 375

Who needs DNS? 377

The DNS namespace 378

How DNS works 383

What’s new in DNS 386

The DNS database 389

The BIND software 409

Designing your DNS environment 415

BIND client issues 418

BIND server configuration 420

BIND configuration examples 439

Starting named 446

Updating zone files 447

Security issues 451

Testing and debugging 466

Distribution specifics 478

Recommended reading 481

Exercises 482

Chapter 16: The Network File System 484

General information about NFS 484

Server-side NFS 489

Client-side NFS 492

nfsstat: dump NFS statistics 495

Dedicated NFS file servers 496

Automatic mounting 497

Recommended reading 500

Exercises 501

Chapter 17: Sharing System Files 502

What to share 503

nscd: cache the results of lookups 504

Copying files around 505

NIS: the Network Information Service 511

LDAP: the Lightweight Directory Access Protocol 520

Recommended reading 526

Exercises 527

Chapter 18: Electronic Mail 528

Mail systems 530

The anatomy of a mail message 534

Mail philosophy 539

Mail aliases 544

Mailing lists and list wrangling software 551

sendmail: ringmaster of the electronic mail circus 557

sendmail configuration 565

Basic sendmail configuration primitives 570

Fancier sendmail configuration primitives 574

Spam-related features in sendmail 588

Configuration file case study 599

Security and sendmail 603

sendmail performance 611

sendmail statistics, testing, and debugging 615

The Exim Mail System 621

Postfix 623

Recommended reading 639

Exercises 640

Chapter 19: Network Management and Debugging 643

Network troubleshooting 644

ping: check to see if a host is alive 645

traceroute: trace IP packets 647

netstat: get network statistics 649

sar: inspect live interface activity 654

Packet sniffers 655

Network management protocols 657

SNMP: the Simple Network Management Protocol 659

The NET-SMNP agent 661

Network management applications 662

Recommended reading 667

Exercises 668

Chapter 20: Security 669

Is Linux secure? 670

How security is compromised 671

Certifications and standards 673

Security tips and philosophy 676

Security problems in /etc/passwd and /etc/shadow 678

POSIX capabilities 683

Setuid programs 683

Important file permissions 684

Miscellaneous security issues 685

Security power tools 688

Cryptographic security tools 694

Firewalls 701

Linux firewall features: IP tables 704

Virtual private networks (VPNs) 708

Hardened Linux distributions 710

What to do when your site has been attacked 710

Sources of security information 712

Recommended reading 715

Exercises 716

Chapter 21: Web Hosting and Internet Servers 719

Web hosting basics 720

HTTP server installation 724

Virtual interfaces 727

The Secure Sockets Layer (SSL) 730

Caching and proxy servers 733

Anonymous FTP server setup 734

Exercises 736

Section Three: Bunch O’ Stuff 739

Chapter 22: The X Window System 741

The X display manager 743

Running an X application 744

X server configuration 748

Troubleshooting and debugging 754

A brief note on desktop environments 757

Recommended Reading 759

Exercises 759

Chapter 23: Printing 761

Printers are complicated 762

Printer languages 763

CUPS architecture 767

CUPS server administration 772

Troubleshooting tips 780

Printer practicalities 782

Other printer advice 784

Printing under KDE 788

Recommended reading 790

Exercises 790

Chapter 24: Maintenance and Environment 791

Hardware maintenance basics 791

Maintenance contracts 792

Electronics-handling lore 793

Monitors 794

Memory modules 794

Preventive maintenance 795

Environment 796

Power 798

Racks 799

Data center standards 800

Tools 800

Recommended reading 800

Exercises 802

Chapter 25: Performance Analysis 803

What you can do to improve performance 804

Factors that affect performance 806

System performance checkup 807

Help! My system just got really slow! 817

Recommended reading 819

Exercises 819

Chapter 26: Cooperating with Windows 821

Logging in to a Linux system from Windows 821

Accessing remote desktops 822

Running Windows and Windows-like applications 825

Using command-line tools with Windows 826

Windows compliance with email and web standards 827

Sharing files with Samba and CIFS 828

Sharing printers with Samba 836

Debugging Samba 840

Recommended reading 841

Exercises 842

Chapter 27: Serial Devices 843

The RS-232C standard 844

Alternative connectors 847

Hard and soft carrier 852

Hardware flow control 852

Cable length 853

Serial device files 853

setserial: set serial port parameters 854

Software configuration for serial devices 855

Configuration of hardwired terminals 855

Special characters and the terminal driver 859

stty: set terminal options 860

tset: set options automatically 861

Terminal unwedging 862

Modems 862

Debugging a serial line 864

Other common I/O ports 865

Exercises 866

Chapter 28: Drivers and the Kernel 868

Kernel adaptation 869

Drivers and device files 870

Why and how to configure the kernel 873

Tuning Linux kernel parameters 874

Building a Linux kernel 876

Adding a Linux device driver 878

Loadable kernel modules 880

Hot-plugging 882

Setting bootstrap options 883

Recommended reading 884

Exercises 884

Chapter 29: Daemons 885

init: the primordial process 886

cron and atd: schedule commands 887

xinetd and inetd: manage daemons 887

Kernel daemons 893

Printing daemons 894

File service daemons 895

Administrative database daemons 896

Electronic mail daemons 897

Remote login and command execution daemons 898

Booting and configuration daemons 898

Other network daemons 900

ntpd: time synchronization daemon 902

Exercises 903

Chapter 30: Management, Policy, and Politics 904

Make everyone happy 904

Components of a functional IT organization 906

The role of management 907

The role of administration 915

The role of development 919

The role of operations 924

The work of support 927

Documentation 930

Request-tracking and trouble-reporting systems 934

Disaster recovery 938

Written policy 943

Legal Issues 949

Software patents 957

Standards 958

Linux culture 961

Mainstream Linux 962

Organizations, conferences, and other resources 964

Recommended Reading 968

Exercises 970

Index 973

About the Contributors 999

About the Authors 1001

Index

Download the Index from this book.

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020