Introduction |
|
xxx | |
|
Part I Performing Basic System Management Tasks |
|
|
|
Chapter 1 Installing Red Hat Enterprise Linux |
|
|
3 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
3 | (3) |
|
|
6 | (1) |
|
Preparing to Install Red Hat Enterprise Linux |
|
|
6 | (3) |
|
What Is Red Hat Enterprise Linux |
|
|
9 | |
|
|
6 | (1) |
|
|
7 | (1) |
|
Using Red Hat Enterprise Linux |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
Understanding Access to Repositories |
|
|
8 | (1) |
|
|
9 | (1) |
|
Cert Guide Environment Description |
|
|
9 | (1) |
|
Performing an Installation |
|
|
10 | (12) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (3) |
|
Chapter 2 Using Essential Tools |
|
|
27 | (13) |
|
"Do I Know This Already?" Quiz |
|
|
27 | (3) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (2) |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
35 | (2) |
|
|
37 | |
|
|
3 | (37) |
|
7 Understanding the Shell Environment |
|
|
40 | (13) |
|
|
40 | (1) |
|
Recognizing Environment Configuration Files |
|
|
41 | (1) |
|
Using /etc/motd and /etc/issue |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
Finding the Right man Page |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Using /usr/share/doc Documentation Files |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
Complete Tables and Lists from Memory |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (2) |
|
Chapter 3 Essential File Management Tools |
|
|
53 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
53 | (3) |
|
|
56 | (1) |
|
Working with the File System Hierarchy |
|
|
56 | (1) |
|
Defining the File System Hierarchy |
|
|
56 | (1) |
|
|
57 | (4) |
|
|
61 | (1) |
|
|
61 | (1) |
|
Managing and Working with Directories |
|
|
61 | (1) |
|
Working with Absolute and Relative Pathnames |
|
|
62 | (2) |
|
Listing Files and Directories |
|
|
64 | (1) |
|
Copying Files and Directories |
|
|
64 | (1) |
|
Moving Files and Directories |
|
|
65 | (1) |
|
Deleting Files and Directories |
|
|
66 | (2) |
|
|
68 | (1) |
|
|
68 | (1) |
|
Understanding Symbolic Links |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
Working with Archives and Compressed Files |
|
|
71 | (1) |
|
Managing Archives with tar |
|
|
72 | (1) |
|
Creating Archives with tar |
|
|
72 | |
|
Monitoring and Extracting tar Files |
|
|
13 | (61) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
Complete Tables and Lists from Memory |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (4) |
|
Chapter 4 Working with Text Files |
|
|
81 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
81 | (3) |
|
|
84 | (1) |
|
Using Common Text File-Related Tools |
|
|
84 | (1) |
|
|
84 | (1) |
|
Showing File Contents with cat |
|
|
85 | (1) |
|
Displaying the First or Last Lines of a File with head and tail |
|
|
86 | (1) |
|
Filtering Specific Columns with cut |
|
|
87 | (1) |
|
Sorting File Contents and Output with sort |
|
|
87 | (1) |
|
Counting Lines, Words, and Characters with wc |
|
|
88 | (1) |
|
A Primer to Using Regular Expressions |
|
|
89 | (1) |
|
|
90 | (1) |
|
Using Escaping in Regular Expressions |
|
|
91 | (1) |
|
Using Wildcards and Multipliers |
|
|
91 | (1) |
|
Using Extended Regular Expressions |
|
|
91 | (2) |
|
Using grep to Analyze Text |
|
|
93 | (1) |
|
Working with Other Useful Text Processing Utilities |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
Complete Tables and Lists from Memory |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (3) |
|
Chapter 5 Connecting to Red Hat Enterprise Linux 9 |
|
|
101 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
101 | (3) |
|
|
104 | (1) |
|
Working on Local Consoles |
|
|
104 | (1) |
|
Logging In to a Local Console |
|
|
104 | (1) |
|
Switching Between Terminals in a Graphical Environment |
|
|
105 | (2) |
|
Working with Multiple Terminals in a Nongraphical Environment |
|
|
107 | (1) |
|
Understanding Pseudo Terminal Devices |
|
|
108 | (1) |
|
Booting, Rebooting, and Shutting Down Systems |
|
|
109 | (1) |
|
Using SSH and Related Utilities |
|
|
110 | (1) |
|
Accessing Remote Systems Using SSH |
|
|
110 | (3) |
|
Using Graphical Applications in an SSH Environment |
|
|
113 | (1) |
|
Securely Transferring Files Between Systems |
|
|
114 | (1) |
|
Using SCP to Securely Copy Files |
|
|
114 | (1) |
|
Using SFTP to Securely Transfer Files |
|
|
115 | (1) |
|
Using RSYNC to Synchronize Files |
|
|
115 | (1) |
|
Configuring Key-Based Authentication for SSH |
|
|
116 | (1) |
|
Using Passphrases or Not? |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
Complete Tables and Lists from Memory |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (2) |
|
Chapter 6 User and Group Management |
|
|
121 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
121 | (3) |
|
|
124 | (1) |
|
Understanding Different User Types |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (2) |
|
Creating and Managing User Accounts |
|
|
129 | (1) |
|
System Accounts and Normal Accounts |
|
|
129 | (3) |
|
|
132 | (1) |
|
Modifying the Configuration Files |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
Configuration Files for User Management Defaults |
|
|
134 | (1) |
|
Managing Password Properties |
|
|
135 | (1) |
|
Creating a User Environment |
|
|
135 | (2) |
|
Creating and Managing Group Accounts |
|
|
137 | (1) |
|
Understanding Linux Groups |
|
|
137 | (1) |
|
|
137 | (1) |
|
Creating Groups with vigr |
|
|
137 | (1) |
|
Using groupadd to Create Groups |
|
|
138 | (1) |
|
Managing Group Properties |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
Complete Tables and Lists from Memory |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (3) |
|
Chapter 7 Permissions Management |
|
|
145 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
145 | (3) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
Understanding Default Ownership |
|
|
150 | (1) |
|
Managing Basic Permissions |
|
|
151 | (1) |
|
Understanding Read, Write, and Execute Permissions |
|
|
152 | (1) |
|
Applying Read, Write, and Execute Permissions |
|
|
153 | (2) |
|
Managing Advanced Permissions |
|
|
155 | (1) |
|
Understanding Advanced Permissions |
|
|
155 | (2) |
|
Applying Advanced Permissions |
|
|
157 | (2) |
|
Setting Default Permissions with umask |
|
|
159 | (1) |
|
Working with User-Extended Attributes |
|
|
160 | (2) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
Complete Tables and Lists from Memory |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (3) |
|
Chapter 8 Configuring Networking |
|
|
167 | |
|
"Do I Know This Already?" Quiz |
|
|
167 | (3) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
Managing Network Addresses and Interfaces |
|
|
174 | (1) |
|
Validating Network Configuration |
|
|
175 | (1) |
|
Validating Network Address Configuration |
|
|
175 | (3) |
|
|
178 | (1) |
|
Validating the Availability of Ports and Sendees |
|
|
179 | (1) |
|
Managing Network Configuration with nmtui and nmcli |
|
|
180 | (1) |
|
Required Permissions to Change Network Configuration |
|
|
181 | (1) |
|
Configuring the Network with nmcli |
|
|
182 | (2) |
|
Configuring the Network with nmtui |
|
|
184 | (2) |
|
Working on Network Configuration Files |
|
|
186 | (1) |
|
Setting Up Hostname and Name Resolution |
|
|
187 | (1) |
|
|
187 | (2) |
|
|
189 | (2) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
Complete Tables and Lists from Memory |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | |
|
Part II Operating Running Systems Chapter |
|
|
9 | (7) |
|
|
195 | (1) |
|
"Do I Know This Already?" Quiz |
|
|
195 | (3) |
|
|
198 | (1) |
|
Managing Software Packages with DNF |
|
|
198 | (1) |
|
Understanding the Role of Repositories |
|
|
198 | (1) |
|
Registering Red Hat Enterprise Linux for Support |
|
|
199 | (1) |
|
|
200 | (1) |
|
Specifying Which Repository to Use |
|
|
200 | (3) |
|
Understanding Repository Security |
|
|
203 | (1) |
|
Creating Your Own Repository |
|
|
204 | (2) |
|
|
206 | (1) |
|
Using DNF to Find Software Packages |
|
|
206 | (2) |
|
Getting More Information About Packages |
|
|
208 | (1) |
|
Installing and Removing Software Packages |
|
|
209 | (2) |
|
Showing Lists of Packages |
|
|
211 | (2) |
|
|
213 | (1) |
|
Working with DNF Package Groups |
|
|
214 | (2) |
|
|
216 | (1) |
|
|
217 | (1) |
|
Understanding DNF Modules |
|
|
218 | (1) |
|
|
218 | (3) |
|
Managing Software Packages with rpm |
|
|
221 | (1) |
|
Understanding RPM Filenames |
|
|
222 | (1) |
|
Querying the RPM Database |
|
|
222 | (1) |
|
Querying RPM Package Files |
|
|
223 | (1) |
|
|
224 | (2) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
Complete Tables and Lists from Memory |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (3) |
|
Chapter 10 Managing Processes |
|
|
231 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
231 | (3) |
|
|
234 | (1) |
|
Introduction to Process Management |
|
|
234 | (1) |
|
|
234 | (1) |
|
Running Jobs in the Foreground and Background |
|
|
234 | (1) |
|
|
235 | (2) |
|
Understanding Parent-Child Relations |
|
|
237 | (1) |
|
Using Common Command-Line Tools for Process Management |
|
|
237 | (1) |
|
Understanding Processes and Threads |
|
|
238 | (1) |
|
Using ps to Get Process Information |
|
|
239 | (2) |
|
Understanding Process Priorities |
|
|
241 | (1) |
|
Exploring Relations Between Slices |
|
|
241 | (1) |
|
Managing Process Priorities |
|
|
242 | (1) |
|
Sending Signals to Processes with kill, killall, and pkill |
|
|
243 | (2) |
|
|
245 | (1) |
|
Using top to Manage Processes |
|
|
246 | (2) |
|
Using tuned to Optimize Performance |
|
|
248 | (2) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
Complete Tables and Lists from Memory |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
251 | (2) |
|
Chapter 11 Working with Systemd |
|
|
253 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
253 | (3) |
|
|
256 | (1) |
|
|
256 | (1) |
|
Understanding Systemd Unit Locations |
|
|
256 | (1) |
|
Understanding Systemd Service Units |
|
|
257 | (1) |
|
Understanding Systemd Mount Units |
|
|
258 | (1) |
|
Understanding Systemd Socket Units |
|
|
259 | (1) |
|
Understanding Systemd Target Units |
|
|
260 | (1) |
|
Managing Units Through Systemd |
|
|
261 | (2) |
|
|
263 | (2) |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
Complete Tables and Lists from Memory |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (3) |
|
Chapter 12 Scheduling Tasks |
|
|
271 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
271 | (3) |
|
|
274 | (1) |
|
Understanding Task Scheduling Options in RHEL |
|
|
274 | (1) |
|
|
274 | (2) |
|
Configuring cron to Automate Recurring Tasks |
|
|
276 | (1) |
|
Managing the crond Service |
|
|
276 | (2) |
|
Understanding cron Timing |
|
|
278 | (1) |
|
Managing cron Configuration Files |
|
|
278 | (3) |
|
Understanding the Purpose of anacron |
|
|
281 | (1) |
|
|
282 | (1) |
|
Configuring at to Schedule Future Tasks |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (2) |
|
Chapter 13 Configuring Logging |
|
|
287 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
287 | (3) |
|
|
290 | (1) |
|
Understanding System Logging |
|
|
290 | (1) |
|
Understanding the Role of systemd-journald and rsyslogd |
|
|
290 | (2) |
|
|
292 | (1) |
|
Understanding Log File Contents |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
Working with systemd-journald |
|
|
295 | (1) |
|
Using journalctl to Find Events |
|
|
295 | (3) |
|
Preserving the Systemd Journal |
|
|
298 | (2) |
|
|
300 | (1) |
|
Understanding rsyslogd Configuration Files |
|
|
300 | (1) |
|
Understanding rsyslog.conf Sections |
|
|
300 | (1) |
|
Understanding Facilities, Priorities, and Log Destinations |
|
|
301 | (3) |
|
|
304 | (2) |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
306 | (1) |
|
Complete Tables and Lists from Memory |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
308 | (3) |
|
Chapter 14 Managing Storage |
|
|
311 | (32) |
|
"Do I Know This Already?" Quiz |
|
|
311 | (3) |
|
|
314 | (1) |
|
Understanding MBR and GPT Partitions |
|
|
314 | (1) |
|
Understanding the MBR Partitioning Scheme |
|
|
314 | (1) |
|
Understanding the Need for GPT Partitioning |
|
|
315 | (1) |
|
Understanding Storage Measurement Units |
|
|
316 | (1) |
|
Managing Partitions and File Systems |
|
|
317 | (1) |
|
Creating MBR Partitions with fdisk |
|
|
318 | (2) |
|
Using Extended and Logical Partitions on MBR |
|
|
320 | (2) |
|
Creating GPT Partitions with gdisk |
|
|
322 | (5) |
|
Creating GPT Partitions with parted |
|
|
327 | (1) |
|
|
328 | (1) |
|
Changing File System Properties |
|
|
329 | (1) |
|
Managing Ext4 File System Properties |
|
|
329 | (2) |
|
Managing XFS File System Properties |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
Manually Mounting File Systems |
|
|
334 | (1) |
|
Using Device Names, UUIDs, or Disk Labels |
|
|
334 | (1) |
|
Automating File System Mounts Through /etc/fstab |
|
|
335 | (3) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
Complete Tables and Lists from Memory |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
341 | (1) |
|
|
341 | (2) |
|
Chapter 15 Managing Advanced Storage |
|
|
343 | |
|
"Do I Know This Already?" Quiz |
|
|
343 | (3) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
Creating LVM Logical Volumes |
|
|
348 | (2) |
|
Creating the Physical Volumes |
|
|
350 | (3) |
|
Creating the Volume Groups |
|
|
353 | (2) |
|
Creating the Logical Volumes and File Systems |
|
|
355 | (1) |
|
Understanding LVM Device Naming |
|
|
355 | (3) |
|
Resizing LVM Logical Volumes |
|
|
358 | (1) |
|
|
358 | (1) |
|
Resizing Logical Volumes and File Systems |
|
|
358 | (2) |
|
|
360 | (1) |
|
|
361 | (1) |
|
Understanding Stratis Architecture |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
363 | (2) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
Complete Tables and Lists from Memory |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
367 | |
|
Part III Performing Advanced System Administration Tasks Chapter |
|
|
16 | (4) |
|
|
369 | (1) |
|
"Do I Know This Already?" Quiz |
|
|
369 | (3) |
|
|
372 | (1) |
|
Understanding the Role of the Linux Kernel |
|
|
372 | (1) |
|
Understanding the Use of Kernel Threads and Drivers |
|
|
372 | (1) |
|
Analyzing What the Kernel Is Doing |
|
|
373 | (2) |
|
Working with Kernel Modules |
|
|
375 | (1) |
|
Understanding Hardware Initialization |
|
|
376 | (2) |
|
|
378 | (3) |
|
Checking Driver Availability for Hardware Devices |
|
|
381 | (1) |
|
Managing Kernel Module Parameters |
|
|
382 | (1) |
|
Upgrading the Linux Kernel |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
Complete Tables and Lists from Memory |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (2) |
|
Chapter 17 Managing and Understanding the Boot Procedure |
|
|
387 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
387 | (3) |
|
|
390 | (1) |
|
|
390 | (1) |
|
Understanding Systemd Targets |
|
|
390 | (1) |
|
|
390 | (1) |
|
Understanding Target Units |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
393 | (3) |
|
Setting the Default Target |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
Understanding GRUB 2 Configuration Files |
|
|
397 | (1) |
|
Modifying Default GRUB 2 Boot Options |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
401 | (2) |
|
Chapter 18 Essential Troubleshooting Skills |
|
|
403 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
403 | (3) |
|
|
406 | (1) |
|
Understanding the RHEL 9 Boot Procedure |
|
|
406 | (2) |
|
Passing Kernel Boot Arguments |
|
|
408 | (1) |
|
Accessing the Boot Prompt |
|
|
408 | (1) |
|
Starting a Troubleshooting Target |
|
|
409 | (1) |
|
|
410 | (1) |
|
Restoring System Access Using a Rescue Disk |
|
|
411 | (2) |
|
Reinstalling GRUB Using a Rescue Disk |
|
|
413 | (1) |
|
Re-creating the Initramfs Using a Rescue Disk |
|
|
413 | (1) |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
415 | (1) |
|
Recovering from File System Issues |
|
|
415 | (1) |
|
Resetting the Root Password |
|
|
416 | (1) |
|
|
417 | (1) |
|
|
417 | (1) |
|
|
418 | (1) |
|
Complete Tables and Lists from Memory |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
419 | (2) |
|
Chapter 19 An Introduction to Automation with Bash Shell Scripting |
|
|
421 | |
|
"Do I Know This Already?" Quiz |
|
|
421 | (3) |
|
|
424 | (1) |
|
Understanding Shell Scripting Core Elements |
|
|
424 | (2) |
|
Using Variables and Input |
|
|
426 | (1) |
|
Using Positional Parameters |
|
|
426 | (1) |
|
|
427 | (2) |
|
|
429 | (1) |
|
Working with if then else |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
431 | (1) |
|
Understanding while and until |
|
|
432 | (2) |
|
|
434 | (1) |
|
Bash Shell Script Debugging |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | |
|
Part IV Managing Network Services Chapter |
|
|
20 | |
|
|
439 | (1) |
|
"Do I Know This Already?" Quiz |
|
|
439 | (3) |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
Configuring Alternative Ports |
|
|
443 | (1) |
|
Modifying SELinux to Allow for Port Changes |
|
|
443 | (1) |
|
|
444 | (1) |
|
Using Other Useful sshd Options |
|
|
445 | (1) |
|
|
446 | (1) |
|
Connection Keepalive Options |
|
|
446 | (1) |
|
Configuring Key-Based Authentication with Passphrases |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
Complete Tables and Lists from Memory |
|
|
449 | (1) |
|
|
449 | (1) |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
450 | (3) |
|
Chapter 21 Managing Apache HTTP Services |
|
|
453 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
453 | (3) |
|
|
456 | (1) |
|
Configuring a Basic Apache Server |
|
|
456 | (1) |
|
Installing the Required Software |
|
|
456 | (1) |
|
Identifying the Main Configuration File |
|
|
456 | (3) |
|
Creating Web Server Content |
|
|
459 | (1) |
|
Understanding Apache Configuration Files |
|
|
460 | (2) |
|
Creating Apache Virtual Hosts |
|
|
462 | (2) |
|
|
464 | (1) |
|
|
464 | (1) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
466 | (3) |
|
Chapter 22 Managing SE Linux |
|
|
469 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
470 | (3) |
|
|
473 | (1) |
|
Understanding SELinux Working Modes |
|
|
473 | (4) |
|
Understanding Context Settings and the Policy |
|
|
477 | (1) |
|
Monitoring Current Context Labels |
|
|
477 | (2) |
|
|
479 | (3) |
|
Finding the Context Type You Need |
|
|
482 | (1) |
|
Restoring Default File Contexts |
|
|
483 | (1) |
|
|
484 | (1) |
|
Using Boolean Settings to Modify SELinux Settings |
|
|
485 | (2) |
|
Diagnosing and Addressing SELinux Policy Violations |
|
|
487 | (2) |
|
Making SELinux Analyzing Easier |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
491 | (1) |
|
|
491 | (1) |
|
Complete Tables and Lists from Memory |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
492 | (1) |
|
|
492 | (3) |
|
Chapter 23 Configuring a Firewall |
|
|
495 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
495 | (3) |
|
|
498 | (1) |
|
Understanding Linux Firewalling |
|
|
498 | (1) |
|
Understanding Previous Solutions |
|
|
498 | (1) |
|
|
498 | (1) |
|
Understanding Firewalld Zones |
|
|
499 | (1) |
|
Understanding Firewalld Services |
|
|
500 | (1) |
|
|
501 | (3) |
|
|
504 | (1) |
|
|
504 | (1) |
|
|
505 | (1) |
|
Complete Tables and Lists from Memory |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (1) |
|
|
506 | (3) |
|
Chapter 24 Accessing Network Storage |
|
|
509 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
509 | (3) |
|
|
512 | (1) |
|
|
512 | (1) |
|
Understanding NFS Security |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
513 | (1) |
|
|
514 | (1) |
|
Mounting Remote File Systems Through fstab |
|
|
515 | (1) |
|
Mounting NFS Shares Through fstab |
|
|
515 | (1) |
|
Using Automount to Mount Remote File Systems |
|
|
516 | (1) |
|
|
516 | (1) |
|
Defining Mounts in Automount |
|
|
516 | (1) |
|
Configuring Automount for NFS |
|
|
517 | (1) |
|
Using Wildcards in Automount |
|
|
517 | (1) |
|
|
518 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
520 | (3) |
|
Chapter 25 Configuring Time Services |
|
|
523 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
523 | (3) |
|
|
526 | (1) |
|
|
526 | (1) |
|
Using Network Time Protocol |
|
|
527 | (1) |
|
Managing Time on Red Hat Enterprise Linux |
|
|
527 | (1) |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
529 | (2) |
|
Managing Time Zone Settings |
|
|
531 | (2) |
|
Configuring Time Service Clients |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
Complete Tables and Lists from Memory |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
536 | (3) |
|
Chapter 26 Managing Containers |
|
|
539 | (34) |
|
"Do I Know This Already?" Quiz |
|
|
539 | (3) |
|
|
542 | (1) |
|
|
542 | (1) |
|
Container Host Requirements |
|
|
543 | (1) |
|
|
544 | (1) |
|
|
545 | (1) |
|
|
545 | (5) |
|
Working with Container Images |
|
|
550 | (1) |
|
|
550 | (2) |
|
|
552 | (1) |
|
|
553 | (3) |
|
Performing Image Housekeeping |
|
|
556 | (1) |
|
Building Images from a Containerfile |
|
|
556 | (2) |
|
|
558 | (1) |
|
Managing Container Status |
|
|
558 | (1) |
|
Running Commands in a Container |
|
|
559 | (2) |
|
|
561 | (1) |
|
Managing Container Environment Variables |
|
|
562 | (1) |
|
Managing Container Storage |
|
|
563 | (3) |
|
Running Containers as Systemd Services |
|
|
566 | (2) |
|
|
568 | (1) |
|
|
569 | (1) |
|
|
569 | (1) |
|
Complete Tables and Lists from Memory |
|
|
569 | (1) |
|
|
569 | (1) |
|
|
569 | (1) |
|
|
570 | (1) |
|
|
570 | (3) |
|
Chapter 27 Final Preparation |
|
|
573 | (6) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
574 | (1) |
|
|
575 | (1) |
|
The Nondisclosure Agreement |
|
|
576 | (3) |
|
Chapter 28 Theoretical Pre-Assessment Exam |
|
|
579 | |
|
|
9 | (576) |
|
|
|
|
581 | (2) |
|
|
583 | (2) |
Appendix A Answers to the "Do I Know This Already?" Quizzes and Review Questions |
|
585 | |
Appendix B Red Hat RHCSA |
|
9 | (608) |
Cert Guide: EX200 Exam Updates |
|
617 | (2) |
Glossary |
|
619 | (22) |
Index |
|
641 | |