Home > Store

Red Hat Enterprise Linux 5 Administration Unleashed

Register your product to gain access to bonus material or receive a coupon.

Red Hat Enterprise Linux 5 Administration Unleashed

Book

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 2007
  • Dimensions: 7" x 9-1/8"
  • Pages: 624
  • Edition: 1st
  • Book
  • ISBN-10: 0-672-32892-5
  • ISBN-13: 978-0-672-32892-3

This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.

Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat’s most valuable tools for monitoring and optimization and presents thorough coverage of security—including a detailed introduction to Security-Enhanced Linux (SELinux).

  • Streamline deployment with Kickstart
  • Find, install, update, remove, and verify software
  • Detect, analyze, and manage hardware
  • Manage storage with LVM, RAID, ACLs, and quotas
  • Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems
  • Administer users and groups more efficiently and securely
  • Ensure trustworthy backup and rapid recovery
  • Script and schedule tasks to run automatically
  • Provide unified identity management services
  • Configure Apache, BIND, Samba, and Sendmail
  • Monitor and tune the kernel and individual applications
  • Protect against intruders with SELinux and ExecShield
  • Set up firewalls with iptables
  • Enable the Linux Auditing System
  • Use virtualization to run multiple operating systems concurrently

 

Part I     Installation and Configuration

Chapter 1 Installing Red Hat Enterprise Linux

Chapter 2 Post-Installation Configuration

Chapter 3 Operating System Updates

Part II Operating System Core Concepts

Chapter 4 Understanding Linux Concepts 

Chapter 5 Working with RPM Software

Chapter 6 Analyzing Hardware

Chapter 7 Managing Storage

Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors


Part III System Administration

Chapter 9 Managing Users and Groups

Chapter 10 Techniques for Backup and Recovery

Chapter 11 Automating Tasks with Scripts

Part IV Network Services

Chapter 12 Identity Management

Chapter 13 Network File Sharing

Chapter 14 Granting Network Connectivity with DHCP

Chapter 15 Creating a Web Server with the Apache HTTP Server  

Chapter 16 Hostname Resolution with BIND

Chapter 17 Securing Remote Logins with OpenSSH

Chapter 18 Setting Up an Email Server with Sendmail

Chapter 19 Explaining Other Common Network Services

Part V Monitoring and Tuning

Chapter 20 Monitoring System Resources  

Chapter 21 Monitoring and Tuning the Kernel

Chapter 22 Monitoring and Tuning Applications  

Chapter 23 Protecting Against Intruders with Security-Enhanced Linux  

Chapter 24 Configuring a Firewall

Chapter 25 Linux Auditing System

Appendixes

Appendix A Installing Proprietary Kernel Modules 

Appendix B Creating Virtual Machines  

Appendix C Preventing Security Breaches with ExecShield

Appendix D Troubleshooting



Tammy Fox served as technical leader of Red Hat’s documentation group, where she wrote and revised The Red Hat Enterprise Linux System Administration Guide. She was founding editor of Red Hat Magazine, now an online publication reaching more than 800,000 system administrators and others interested in Linux and open source. She wrote Red Hat’s LogViewer tool and has written and contributed to several Red Hat configuration tools. Fox is also the founding leader of the Fedora Docs Project.

Register your book at www.samspublishing.com/register for convenient access to updates and to download example scripts presented in this book.

Category: Linux/Networking

Covers: Red Hat Enterprise Linux 5

User Level: Intermediate–Advanced

Sample Content

Online Sample Chapters

Managing Storage

Managing Storage in Red Hat Enterprise Linux 5

Downloadable Sample Chapter

Download Chapter 7

Table of Contents

Part I     Installation and Configuration


Chapter 1 Installing Red Hat Enterprise Linux

Choosing an Installation Method

Creating the Installation Source

Starting the Installation

Performing the Installation

Installing with Kickstart

Installing with PXE

Performing an Upgrade

Red Hat Network Provisioning

Summary

Chapter 2 Post-Installation Configuration

Red Hat Setup Agent

Logging In for the First Time

Network Configuration

Printer Configuration

Adding Boot Parameters

Summary

Chapter 3 Operating System Updates

Navigating Through the RHN Website

Assigning Users for the RHN Website

Subscribing to RHN Channels

Performing Actions on Individual Systems from the RHN Website

Using System Groups on the RHN Website

Retrieving Software from RHN with YUM

Summary

Part II Operating System Core Concepts

Chapter 4 Understanding Linux Concepts

Learning the Desktop

Filesystem Hierarchy System

Shell Basics

Becoming the Root User

Manual Pages

Editing Text Files

File Permissions

Initialization Scripts

Runlevels

Summary

Chapter 5 Working with RPM Software

Understanding How RPM Works

Finding the Software

Installing Software

Updating Software

Removing Software

Verifying Software Files

Querying Package Files

Building RPM Packages

Summary

Chapter 6 Analyzing Hardware

Listing Devices

Detecting Hardware

Gathering Information from the BIOS

Listing and Configuring Kernel Modules

HAL

Summary

Chapter 7 Managing Storage

Understanding Partitioning

Understanding LVM

Understanding RAID

Understanding Clustering and GFS

Using Access Control Lists

Using Disk Quotas

Summary

Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors

64-Bit Processors

Multi-Core Processors

Processors with Hyper-Threading Technology

Summary

Part III System Administration

Chapter 9 Managing Users and Groups

What Are Users and Groups?

Managing Users

Managing Groups

How It All Works

Best Practices

Summary

Chapter 10 Techniques for Backup and Recovery

Writing a Backup Plan

Using Amanda for Backups

Other Linux Backup Utilities

Recovery and Repair

Summary

Chapter 11 Automating Tasks with Scripts

Writing Scripts with Bash

Additional Scripting Languages

Scheduling Tasks with Cron

Summary

Part IV Network Services

12 Identity Management

Understanding PAM

Enabling NIS

Enabling LDAP

Enabling Kerberos

Enabling SMB or Winbind Authentication

Enabling with the Authentication Tool

Summary

Chapter 13 Network File Sharing

Network File System

Samba File Sharing

Summary

Chapter 14 Granting Network Connectivity with DHCP

Allowing Connections

Configuring the Server

Logging Connections

Summary

Chapter 15 Creating a Web Server with the Apache HTTP Server

Apache HTTP Server and SELinux

Allowing Connections

Configuring the Server

Logging Connections

Starting and Stopping the Server

Summary

Chapter 16 Hostname Resolution with BIND

Understanding DNS Concepts

Allowing Connections

Configuring BIND

Configuring BIND Graphically

Logging Connections

Summary

Chapter 17 Securing Remote Logins with OpenSSH

Allowing Connections

Configuring the Server

Connecting from the Client

Logging Connections

Summary

Chapter 18 Setting Up an Email Server with Sendmail

Understanding Email Concepts

Configuring Sendmail

Using POP and IMAP

Logging Sendmail Connections

Allowing Email Connections

Summary

Chapter 19 Explaining Other Common Network Services

The xinetd Super Server

Keeping Accurate Time with NTP

Creating a Network Printer with CUPS

Summary

Part V Monitoring and Tuning

Chapter 20 Monitoring System Resources

Reporting Filesystem Usage

Reporting Disk Performance

Reporting System Processes

Reporting on the System Processors

Reporting Memory Usage

Reporting on the Network Subsystem

Generating a System Report

Locating Log Files

Viewing Log Files with Logwatch

Summary

Chapter 21 Monitoring and Tuning the Kernel

Using the /proc Directory .

Optimizing Virtual Memory

Managing Memory with NUMA

Using AltSysRq to Execute System Requests

Saving Kernel Dumps for Analysis

Setting SMP IRQ Affinity

Enabling NMI Watchdog for Locked Systems

Summary

Chapter 22 Monitoring and Tuning Applications

OProfile

Valgrind

Additional Programs to Consider

Summary

Chapter 23 Protecting Against Intruders with Security-Enhanced Linux

Selecting an SELinux Mode

Selecting and Customizing the SELinux Policy

Utilizing the SELinux Troubleshooting Tool

Working with Security Contexts

Summary

Chapter 24 Configuring a Firewall

Selecting a Table and Command for IPTables

Selecting IPTables Options

Using IPTables Match Extensions

Using IPTables Target Extensions

Starting and Stopping the IPTables Service

Saving the IPTables Rules

IPTables Examples

Enabling the Default Firewall

Summary

Chapter 25 Linux Auditing System

Configuring the Audit Daemon

Writing Audit Rules and Watches

Starting and Stopping the Daemon

Analyzing the Records

Tracing a Process with Audit

Summary

Appendixes

Appendix A Installing Proprietary Kernel Modules

Installing Proprietary Modules

Installing the nVidia Display Driver

Recognizing a Tainted Kernel

Appendix B Creating Virtual Machines

Virtualization System Requirements

Installing Virtualization

Setting Up the VM and Installing the Guest OS

Introducing the virsh Command

Starting and Stopping the Virtual Machine

Modifying Dedicated Resources

Performing Additional Actions

Managing VMs with the xm Utility

Appendix C Preventing Security Breaches with ExecShield 547

How ExecShield Works

Determining Status of ExecShield

Disabling ExecShield

Appendix D Troubleshooting

Installation and Configuration Troubleshooting

OS Core Concepts Troubleshooting

System Administration Troubleshooting

Network Troubleshooting

Monitoring and Tuning Troubleshooting

Security Troubleshooting

Foreword

Download the Forward

Index

Download the Index

Introduction

Download the Introduction

Updates

Errata

PrintNumber ErrorLocation Error Correction DateAdded
2 xx 3rd para: Security remains a cornerstone of Red Hat offerings, and Tammy has done a great job of explaining the background and history of the Linux Audit System and Security Enhanced Linux (SELinux). Security remains a cornerstone of Red Hat offerings, and Tammy has done a great job of explaining the background and history of the Linux Audit System and Security-Enhanced Linux (SELinux). 10/18/2007
2 35 1st entry, bad break: --netmask=, fixed 10/18/2007
2 37 Code after Note: logvol <mountpoint> -vgname=<name> --size=<size> --name=<name> <options> logvol <mountpoint> --vgname=<name> --size=<size> --name=<name> <options> 10/18/2007
2 52 4. Copy all the .msg files from the isolinux/ directory in the installation tree or from the first installation CD in the newly created /tftpboot/linux-install/msg/ directory. .msg should be in mono. 10/18/2007
2 54 chkconfig –level 345 xinetd on
chkconfig –level 345 tftp on
chkconfig --level 345 xinetd on
chkconfig --level 345 tftp on
10/18/2007
2 61 Tip, last line: rhn_register Should be mono font. 10/18/2007
2 66 Listing 2.1: /etc/modprobe.conf Should be mono font. 10/18/2007
2 66 Listing 2.2:  /etc/sysconfig/network Should be mono font. 10/18/2007
2 67 Listing 2.3:  /etc/hosts Should be mono font. 10/18/2007
2 138 The URL in NOTE: http://fedora.redhat.com/docs/drafts/rpm-guide-en/
http://docs.fedoraproject.org/drafts/rpm-guide-en/
10/18/2007
2 303 Extra space: The master configuration file is /etc/auto.master, Listing 13.2 shows the default auto.master file .
The master configuration file is /etc/auto.master, Listing 13.2 shows the default auto.master file.
10/22/2007
2 316 Extra space: A successful connection is indicated by the smb: \> prompt. Once connected, the commands are similar to a command-line FTP client. Table 13.2 lists common commands .

A successful connection is indicated by the smb: \> prompt. Once connected, the commands are similar to a command-line FTP client. Table 13.2 lists common commands.
10/22/2007
2 324 Bad break: Each time the server is started, it looks for the /var/lib/dhcp/dhcpd.
leases file. If it is not found, the service is not started. Before the service is started for the first time, the file must be created with the command touch /var/lib/dhcp/dhcpd.leases.

fixed
10/22/2007
2 330 Bad break: For a complete list of directives, go to http://httpd.apache.org/docs/2.2/mod/directives.html.
fixed
10/22/2007
2 342 Last sentence: This is the same as the ndots statement in /etc/resolv.conf:

This is the same as the ndots statement in /etc/resolv.conf.

10/22/2007
2 426 Bad break: If you add the change to /etc/sysctl.conf without executing the sysctl -w vm.
swappiness=”70” command, the change will not go into effect unless the sysctl
-p command is also executed as root.
Fixed

10/22/2007
2 427 vm.min_slab_ratio 5*
vm.min_unmapped_ratio 1*

vm.min_slab_ratio* 5
vm.min_unmapped_ratio* 1


10/22/2007
2 457 opcontrol –event=<name>:<sample-rate>:<unit-mask>:<kernel>:<user> \

opcontrol --event=<name>:<sample-rate>:<unit-mask>:<kernel>:<user> \


10/22/2007
2 468 Bad break: The daemon, setroubleshootd, is started by default with the /etc/rc.d/init.d/setroubleshoot initialization script.

Fixed


10/22/2007
2 559 access files (/etc/mail directory), 370

access file (/etc/mail directory), 370


10/22/2007
2 567 domaintable files (/etc/mail directory), 370

domaintable file (/etc/mail directory), 370


10/22/2007
2 572 helpfile files (/etc/mail directory), 370

helpfile file (/etc/mail directory), 370


10/22/2007
2 577 local-host-names files (/etc/mail directory), 371

local-host-names file (/etc/mail directory), 371


10/22/2007
2 578 mailertable files (/etc/mail directory), 371

mailertable file (/etc/mail directory), 371


10/22/2007
2 593 trusted-users files (/etc/mail directory), 371
trusted-users file (/etc/mail directory), 371


10/22/2007
2 595 virtusertable files (/etc/mail directory), 371
virtusertable file (/etc/mail directory), 371


10/22/2007
2 603 Updated ad to reflect Fedora 7
Fixed


10/22/2007
2 p 67 Listing 2.4: /etc/resolv.conf Should be mono font. 5/12/2008
2 p 68 Other device names include lo for the local loopback device, ppX for dialup interfaces, and irlanX for infrared devices where X is the device number starting with0. X should be mono font. 5/12/2008
2 p 76 Sometimes, boot parameters are needed for a system to boot or run properly. For example: Sometimes, boot parameters are needed for a system to boot or run properly. For example 5/12/2008
2 p 105 5th para: For example, the cp status.txt reports/status01.txt will copy the status.txt file from the current working directory to the reports/ directory relative to the current working directory as the new filename status01.txt. For example, the cp status.txt reports/status01.txt command will copy the status.txt file from the current working directory to the reports/ directory relative to the current working directory as the new filename status01.txt. 5/12/2008

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020