Introduction |
|
xxxix | |
Part 1: RHCSA |
|
3 | (552) |
|
Chapter 1 Installing Red Hat Enterprise Linux Server |
|
|
7 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
7 | (4) |
|
|
11 | (1) |
|
Preparing to Install Red Hat Enterprise Linux |
|
|
11 | (6) |
|
What Is Red Hat Enterprise Linux 7 Server? |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Understanding Access to Repositories |
|
|
13 | (1) |
|
Understanding Red Hat Enterprise Linux 7 Server Variants and Add-Ons |
|
|
14 | (1) |
|
|
15 | (1) |
|
Course Environment Description |
|
|
16 | (1) |
|
Performing a Manual Installation |
|
|
17 | (12) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (3) |
|
|
31 | (2) |
|
Chapter 2 Using Essential Tools |
|
|
33 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
33 | (3) |
|
|
36 | (1) |
|
|
36 | (6) |
|
|
36 | (1) |
|
|
37 | (2) |
|
|
39 | (1) |
|
|
40 | (2) |
|
|
42 | (1) |
|
|
42 | (3) |
|
Understanding the Shell Environment |
|
|
45 | (2) |
|
|
45 | (1) |
|
Environment Configuration Files |
|
|
46 | (1) |
|
Using /etc/motd and /etc/issue |
|
|
46 | (1) |
|
|
47 | (6) |
|
|
48 | (1) |
|
|
48 | (1) |
|
Finding the Right man Page |
|
|
48 | (2) |
|
|
50 | (1) |
|
|
51 | (2) |
|
Using /usr/share/doc Documentation Files |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
Complete Tables and Lists from Memory |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (3) |
|
|
55 | (2) |
|
Chapter 3 Essential File Management Tools |
|
|
57 | (28) |
|
Do I Know This Already Quiz |
|
|
57 | (3) |
|
|
60 | (1) |
|
Working with the File System Hierarchy |
|
|
60 | (6) |
|
Defining the File System Hierarchy |
|
|
60 | (1) |
|
|
61 | (5) |
|
|
66 | (7) |
|
|
67 | (1) |
|
Managing and Working with Directories |
|
|
67 | (1) |
|
Working with Absolute and Relative Pathnames |
|
|
68 | (1) |
|
Listing Files and Directories |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (2) |
|
|
73 | (3) |
|
|
73 | (1) |
|
Understanding Symbolic Links |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
Working with Archives and Compressed Files |
|
|
76 | (4) |
|
Managing Archives with tar |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Complete Tables and Lists from Memory |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (3) |
|
|
82 | (3) |
|
Chapter 4 Working with Text Files |
|
|
85 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
85 | (3) |
|
|
88 | (1) |
|
Using Common Text File-Related Tools |
|
|
88 | (5) |
|
|
88 | (1) |
|
Showing File Contents with cat |
|
|
89 | (1) |
|
Displaying the First or Last Lines of a File with head and tail |
|
|
90 | (1) |
|
Filtering Specific Columns with cut |
|
|
91 | (1) |
|
Sorting File Contents and Output with sort |
|
|
91 | (2) |
|
Counting Lines, Words, and Characters with wc |
|
|
93 | (1) |
|
A Primer to Using Regular Expressions |
|
|
93 | (3) |
|
|
94 | (1) |
|
Using Escaping in Regular Expressions |
|
|
95 | (1) |
|
Using Wildcards and Multipliers |
|
|
95 | (1) |
|
Using grep to Analyze Text |
|
|
96 | (1) |
|
Working with Other Useful Text Processing Utilities |
|
|
97 | (2) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Complete Tables and Lists from Memory |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
100 | (3) |
|
|
100 | (3) |
|
Chapter 5 Connecting to Red Hat Enterprise Linux 7 |
|
|
103 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
103 | (3) |
|
|
106 | (1) |
|
Working on Local Consoles |
|
|
106 | (6) |
|
Logging In to a Local Console |
|
|
106 | (1) |
|
Switching Between Terminals in a Graphical Environment |
|
|
107 | (1) |
|
Working with Multiple Terminals in a Nongraphical Environment |
|
|
108 | (1) |
|
Understanding Pseudo Terminal Devices |
|
|
109 | (1) |
|
Booting, Rebooting, and Shutting Down Systems |
|
|
110 | (2) |
|
Using SSH and Related Utilities |
|
|
112 | (7) |
|
Accessing Remote Systems Using SSH |
|
|
112 | (2) |
|
Using Graphical Applications in an SSH Environment |
|
|
114 | (1) |
|
Securely Transferring Files Between Systems |
|
|
115 | (1) |
|
Configuring Key-Based Authentication for SSH |
|
|
116 | (1) |
|
Using Passphrases or Not? |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (2) |
|
|
121 | (2) |
|
Chapter 6 User and Group Management |
|
|
123 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
123 | (3) |
|
|
126 | (1) |
|
|
126 | (3) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (8) |
|
System and Normal Accounts |
|
|
129 | (3) |
|
|
132 | (2) |
|
|
134 | (1) |
|
Configuration Files for User Management Defaults |
|
|
134 | (1) |
|
Managing Password Properties |
|
|
135 | (1) |
|
Creating a User Environment |
|
|
136 | (1) |
|
Creating and Managing Group Accounts |
|
|
137 | (3) |
|
Understanding Linux Groups |
|
|
137 | (1) |
|
|
138 | (1) |
|
Managing Group Properties |
|
|
139 | (1) |
|
Logging In Through an External Authentication Service |
|
|
140 | (6) |
|
|
140 | (2) |
|
Making the Authentication Platform Available |
|
|
142 | (1) |
|
Configuring RHEL 7 for LDAP Authentication |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (2) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
Complete Tables and Lists from Memory |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (3) |
|
|
148 | (1) |
|
|
148 | (3) |
|
Chapter 7 Configuring Permissions |
|
|
151 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
151 | (4) |
|
|
155 | (1) |
|
|
155 | (3) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
Understanding Default Ownership |
|
|
157 | (1) |
|
Managing Basic Permissions |
|
|
158 | (3) |
|
Understanding Read, Write, and Execute Permissions |
|
|
158 | (1) |
|
Applying Read, Write, and Execute Permissions |
|
|
159 | (2) |
|
Managing Advanced Permissions |
|
|
161 | (4) |
|
Understanding Advanced Permissions |
|
|
161 | (3) |
|
Applying Advanced Permissions |
|
|
164 | (1) |
|
|
165 | (4) |
|
|
166 | (1) |
|
Preparing Your File System for ACLs |
|
|
166 | (1) |
|
Changing and Viewing ACL Settings with setfacl and getfacl |
|
|
166 | (2) |
|
Working with Default ACLs |
|
|
168 | (1) |
|
Setting Default Permissions with umask |
|
|
169 | (1) |
|
Working with User Extended Attributes |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (4) |
|
|
173 | (4) |
|
Chapter 8 Configuring Networking |
|
|
177 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
177 | (3) |
|
|
180 | (1) |
|
|
180 | (3) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
Managing Network Addresses and Interfaces |
|
|
183 | (1) |
|
Validating Network Configuration |
|
|
184 | (5) |
|
Validating Network Address Configuration |
|
|
185 | (2) |
|
|
187 | (1) |
|
Validating the Availability of Ports and Services |
|
|
187 | (2) |
|
Configuring Network Configuration with nmtui and nmcli |
|
|
189 | (7) |
|
Configuring the Network with nmcli |
|
|
189 | (4) |
|
Configuring the Network with nmtui |
|
|
193 | (1) |
|
Working on Network Configuration Files |
|
|
194 | (2) |
|
Setting Up Hosmame and Name Resolution |
|
|
196 | (4) |
|
|
196 | (2) |
|
|
198 | (2) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
Complete Tables and Lists from Memory |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (4) |
|
|
202 | (3) |
|
Chapter 9 Managing Processes |
|
|
205 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
205 | (3) |
|
|
208 | (1) |
|
Introduction to Process Management |
|
|
208 | (1) |
|
|
208 | (3) |
|
Running Jobs in the Foreground and Background |
|
|
208 | (1) |
|
|
209 | (2) |
|
Managing Parent Child Relations |
|
|
211 | (1) |
|
Using Common Command-Line Tools for Process Management |
|
|
211 | (9) |
|
Understanding Processes and Threads |
|
|
211 | (1) |
|
Using ps to Get Process Information |
|
|
212 | (2) |
|
Adjusting Process Priority with nice |
|
|
214 | (2) |
|
Sending Signals to Processes with kill, killall, and pkill |
|
|
216 | (2) |
|
Using top to Manage Processes |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
Complete Tables and Lists from Memory |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (3) |
|
|
222 | (3) |
|
Chapter 10 Working with Virtual Machines |
|
|
225 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
225 | (3) |
|
|
228 | (1) |
|
Understanding RHEL 7 Virtualization |
|
|
228 | (3) |
|
Understanding KVM Virtualization |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
Understanding the Role of Libvirtd |
|
|
229 | (2) |
|
Making Your Server a KVM Host |
|
|
231 | (3) |
|
Checking Host Requirements |
|
|
231 | (1) |
|
Installing the KVM Software |
|
|
232 | (1) |
|
Understanding KVM Host Networking |
|
|
233 | (1) |
|
Managing Virtual Machines |
|
|
234 | (11) |
|
Installing Virtual Machines |
|
|
234 | (6) |
|
Using KVM Virtual Machines |
|
|
240 | (1) |
|
Accessing Virtual Machines from a Text-Only Console |
|
|
241 | (1) |
|
Managing Virtual Machine Properties |
|
|
242 | (1) |
|
Managing Virtual Machines from the Command Line |
|
|
243 | (1) |
|
Monitoring Virtual Machine Activity from Top |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
247 | (2) |
|
|
247 | (2) |
|
Chapter 11 Managing Software |
|
|
249 | (32) |
|
"Do I Know This Already?" Quiz |
|
|
249 | (3) |
|
|
252 | (1) |
|
Managing Software Packages with yum |
|
|
252 | (19) |
|
Understanding the Role of Repositories |
|
|
252 | (1) |
|
Specifying Which Repository to Use |
|
|
253 | (3) |
|
Understanding Repository Security |
|
|
256 | (3) |
|
Creating Your Own Repository |
|
|
259 | (1) |
|
|
260 | (1) |
|
Using yum to Find Software Packages |
|
|
261 | (1) |
|
Getting More Information About Packages |
|
|
262 | (1) |
|
Installing and Removing Software Packages |
|
|
263 | (2) |
|
Showing Lists of Packages |
|
|
265 | (2) |
|
|
267 | (1) |
|
Working with yum Package Groups |
|
|
268 | (2) |
|
|
270 | (1) |
|
Managing Software Packages with rpm |
|
|
271 | (5) |
|
Understanding RPM Filenames |
|
|
272 | (1) |
|
Querying the RPM Database |
|
|
273 | (1) |
|
Querying RPM Package Files |
|
|
273 | (2) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
Complete Tables and Lists from Memory |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (3) |
|
|
278 | (3) |
|
Chapter 12 Scheduling Tasks |
|
|
281 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
281 | (3) |
|
Configuring cron to Automate Recurring Tasks |
|
|
284 | (6) |
|
Managing the cron Service |
|
|
284 | (1) |
|
Understanding cron Timing |
|
|
285 | (1) |
|
Managing cron Configuration Files |
|
|
286 | (2) |
|
Understanding the Purpose of anacron |
|
|
288 | (1) |
|
|
289 | (1) |
|
Configuring at to Schedule Future Tasks |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (2) |
|
|
293 | (2) |
|
Chapter 13 Configuring Logging |
|
|
295 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
295 | (3) |
|
|
298 | (1) |
|
Understanding System Logging |
|
|
298 | (5) |
|
Understanding the Role of rsyslogd and journald |
|
|
298 | (2) |
|
|
300 | (1) |
|
Understanding Log File Contents |
|
|
300 | (2) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
303 | (5) |
|
Understanding rsyslogd Configuration Files |
|
|
303 | (1) |
|
Understanding rsyslog.conf Sections |
|
|
304 | (1) |
|
Understanding Facilities, Priorities, and Log Destinations |
|
|
304 | (4) |
|
|
308 | (2) |
|
|
310 | (6) |
|
Using journalctl to Find Events |
|
|
310 | (4) |
|
Preserving the systemd Journal |
|
|
314 | (2) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (2) |
|
|
317 | (2) |
|
Chapter 14 Managing Partitions |
|
|
319 | (30) |
|
"Do I Know This Already?" Quiz |
|
|
319 | (3) |
|
Understanding MBR and GPT Partitions |
|
|
322 | (2) |
|
Understanding the MBR Partitioning Scheme |
|
|
322 | (1) |
|
Understanding the Need for GPT Partitioning |
|
|
323 | (1) |
|
Understanding Storage Measurement Units |
|
|
324 | (1) |
|
Managing Partitions and File Systems |
|
|
324 | (15) |
|
Creating MBR Partitions with fdisk |
|
|
325 | (4) |
|
Using Extended and Logical Partitions on MBR |
|
|
329 | (1) |
|
Creating GPT Partitions with gdisk |
|
|
330 | (4) |
|
|
334 | (2) |
|
Changing File System Properties |
|
|
336 | (2) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
339 | (5) |
|
Manually Mounting File Systems |
|
|
340 | (1) |
|
Using Device Names, UUIDs, or Disk Labels |
|
|
340 | (1) |
|
Automating File System Mounts Through /etc/fstab |
|
|
341 | (3) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
Complete Tables and Lists from Memory |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
346 | (3) |
|
|
346 | (1) |
|
|
346 | (3) |
|
Chapter 15 Managing LVM Logical Volumes |
|
|
349 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
349 | (3) |
|
|
352 | (1) |
|
|
352 | (2) |
|
|
352 | (1) |
|
|
353 | (1) |
|
Creating LVM Logical Volumes |
|
|
354 | (9) |
|
Creating the Physical Volumes |
|
|
355 | (4) |
|
Creating the Volume Groups |
|
|
359 | (1) |
|
Creating the Logical Volumes and File Systems |
|
|
360 | (1) |
|
Understanding LVM Device Naming |
|
|
361 | (2) |
|
Resizing LVM Logical Volumes |
|
|
363 | (3) |
|
|
363 | (1) |
|
Resizing Logical Volumes and File Systems |
|
|
364 | (2) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
367 | (2) |
|
|
367 | (2) |
|
Chapter 16 Basic Kernel Management |
|
|
369 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
369 | (3) |
|
|
372 | (1) |
|
Understanding the Role of the Linux Kernel |
|
|
372 | (3) |
|
Understanding the use of Kernel Threads and Drivers |
|
|
372 | (2) |
|
Analyzing What the Kernel Is Doing |
|
|
374 | (1) |
|
Working with Kernel Modules |
|
|
375 | (9) |
|
Understanding Hardware Initialization |
|
|
376 | (2) |
|
|
378 | (3) |
|
Checking Driver Availability for Hardware Devices |
|
|
381 | (2) |
|
Managing Kernel Module Parameters |
|
|
383 | (1) |
|
Upgrading the Linux Kernel |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (3) |
|
|
386 | (3) |
|
Chapter 17 Configuring a Basic Apache Server |
|
|
389 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
389 | (3) |
|
|
392 | (1) |
|
Configuring a Basic Apache Server |
|
|
392 | (3) |
|
Installing the Required Software |
|
|
392 | (1) |
|
Identifying the Main Configuration File |
|
|
392 | (3) |
|
Creating Web Server Content |
|
|
395 | (2) |
|
Understanding Apache Configuration Files |
|
|
397 | (1) |
|
Creating Apache Virtual Hosts |
|
|
398 | (2) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (3) |
|
|
402 | (3) |
|
Chapter 18 Managing and Understanding the Boot Procedure |
|
|
405 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
405 | (3) |
|
|
408 | (1) |
|
|
408 | (12) |
|
|
408 | (5) |
|
Managing Units Through Systemd |
|
|
413 | (7) |
|
|
420 | (4) |
|
|
420 | (3) |
|
Modifying Default GRUB 2 Boot Options |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
|
Complete Tables and Lists from Memory |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
426 | (3) |
|
|
426 | (1) |
|
|
426 | (3) |
|
Chapter 19 Troubleshooting the Boot Procedure |
|
|
429 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
429 | (3) |
|
|
432 | (1) |
|
Understanding the RHEL 7 Boot Procedure |
|
|
432 | (2) |
|
Passing Kernel Boot Arguments |
|
|
434 | (2) |
|
Accessing the Boot Prompt |
|
|
434 | (1) |
|
Starting a Troubleshooting Target |
|
|
435 | (1) |
|
|
436 | (5) |
|
Restoring System Access Using a Rescue Disk |
|
|
436 | (3) |
|
Reinstalling GRUB Using a Rescue Disk |
|
|
439 | (1) |
|
Re-Creating the Initramfs Using a Rescue Disk |
|
|
439 | (2) |
|
|
441 | (3) |
|
|
441 | (1) |
|
|
442 | (1) |
|
Recovering from File System Issues |
|
|
442 | (1) |
|
Resetting the Root Password |
|
|
443 | (1) |
|
Recovering Access to a Virtual Machine |
|
|
444 | (2) |
|
|
446 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
Complete Tables and Lists from Memory |
|
|
446 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
448 | (3) |
|
|
448 | (3) |
|
Chapter 20 Using Kickstart |
|
|
451 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
451 | (3) |
|
|
454 | (1) |
|
Setting Up an Installation Server |
|
|
454 | (1) |
|
Configuring a Network Server as Installation Server |
|
|
454 | (1) |
|
Setting Up a TFTP and DHCP Server for PXE Boot |
|
|
455 | (7) |
|
Installing the TFTP Server |
|
|
456 | (1) |
|
Configuring DHCP for PXE Boot |
|
|
457 | (1) |
|
Creating the TFTP PXE Server Content |
|
|
458 | (4) |
|
Creating a Kickstart File |
|
|
462 | (7) |
|
Using a Kickstart File to Perform an Automated Installation |
|
|
462 | (2) |
|
Modifying the Kickstart File with system-config-kickstart |
|
|
464 | (3) |
|
Making Manual Modifications to the Kickstart File |
|
|
467 | (2) |
|
|
469 | (1) |
|
|
470 | (1) |
|
|
470 | (1) |
|
|
470 | (1) |
|
|
470 | (1) |
|
|
471 | (2) |
|
|
471 | (2) |
|
Chapter 21 Managing SELinux |
|
|
473 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
474 | (3) |
|
|
477 | (1) |
|
Understanding SELinux Working and Modes |
|
|
477 | (4) |
|
Understanding Context Settings and the Policy |
|
|
481 | (6) |
|
Monitoring Current Context Labels |
|
|
481 | (2) |
|
|
483 | (3) |
|
Finding the Context Type You Need |
|
|
486 | (1) |
|
Restoring Default File Contexts |
|
|
487 | (2) |
|
Using Boolean Settings to Modify SELinux Settings |
|
|
489 | (2) |
|
Diagnosing and Addressing SELinux Policy Violations |
|
|
491 | (3) |
|
Making SELinux Analyzing Easier |
|
|
492 | (2) |
|
|
494 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
Complete Tables and Lists from Memory |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
496 | (3) |
|
|
496 | (3) |
|
Chapter 22 Configuring a Firewall |
|
|
499 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
499 | (3) |
|
|
502 | (1) |
|
Understanding Linux Firewalling |
|
|
502 | (3) |
|
Understanding Previous Solutions |
|
|
502 | (1) |
|
|
502 | (1) |
|
Understanding Firewalld Zones |
|
|
503 | (1) |
|
Understanding Firewalld Services |
|
|
504 | (1) |
|
|
505 | (6) |
|
Working with Firewall-cmd |
|
|
506 | (2) |
|
Working with Firewall-config |
|
|
508 | (3) |
|
|
511 | (1) |
|
|
511 | (1) |
|
|
511 | (1) |
|
|
512 | (1) |
|
Complete Tables and Lists from Memory |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
513 | (2) |
|
Chapter 23 Configuring Remote Mounts and FTP |
|
|
515 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
515 | (4) |
|
|
519 | (1) |
|
|
519 | (3) |
|
Understanding NFS Security Options |
|
|
519 | (1) |
|
Understanding Kerberos Requirements |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
Mounting SMB File Systems |
|
|
522 | (6) |
|
|
523 | (2) |
|
|
525 | (1) |
|
Authenticating to SMB Shares |
|
|
525 | (1) |
|
Accessing Samba Shares Through the Graphical Interface |
|
|
526 | (2) |
|
Mounting Remote File Systems Through fstab |
|
|
528 | (2) |
|
Mounting NFS Shares Through fstab |
|
|
528 | (1) |
|
Mounting SMB Shares Through fstab |
|
|
529 | (1) |
|
Using Automount to Mount Remote File Systems |
|
|
530 | (3) |
|
|
530 | (1) |
|
Configuring Automount for NFS |
|
|
531 | (1) |
|
Using Wildcards in Automount |
|
|
532 | (1) |
|
Using Automount to Mount SMB Shares |
|
|
533 | (1) |
|
Configuring an FTP Server |
|
|
533 | (2) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
Complete Tables and Lists from Memory |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
537 | (2) |
|
|
537 | (2) |
|
Chapter 24 Configuring Time Services |
|
|
539 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
539 | (3) |
|
|
542 | (1) |
|
|
542 | (1) |
|
Using Network Time Protocol |
|
|
543 | (1) |
|
Managing Time on Red Hat Enterprise Linux |
|
|
543 | (7) |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
545 | (3) |
|
Managing Time Zone Settings |
|
|
548 | (2) |
|
Using Graphical Tools to Manage Time |
|
|
550 | (1) |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
551 | (1) |
|
Complete Tables and Lists from Memory |
|
|
551 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
552 | (5) |
|
|
552 | (3) |
Part 2 RHCE |
|
555 | (332) |
|
Chapter 25 Configuring External Authentication and Authorization |
|
|
557 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
557 | (3) |
|
|
560 | (1) |
|
Understanding Remote Authentication |
|
|
560 | (1) |
|
Understanding Kerberos Basics |
|
|
561 | (3) |
|
Understanding Kerberos Authentication |
|
|
561 | (2) |
|
Understanding Kerberos Principals |
|
|
563 | (1) |
|
Configuring LDAP Authentication with Kerberos Authorization |
|
|
564 | (8) |
|
Using nslcd or sssd as the Authentication Backend Service |
|
|
568 | (1) |
|
Setting Up External Authentication |
|
|
569 | (3) |
|
Using an IPA Server or Active Directory |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
Complete Tables and Lists from Memory |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
574 | (3) |
|
|
574 | (3) |
|
Chapter 26 Configuring an iSCSI SAN |
|
|
577 | (30) |
|
"Do I Know This Already" Quiz |
|
|
578 | (3) |
|
|
581 | (1) |
|
|
581 | (4) |
|
|
581 | (1) |
|
Software Versus Hardware iSCSI SAN |
|
|
582 | (1) |
|
|
582 | (1) |
|
|
583 | (2) |
|
Setting Up the iSCSI Target |
|
|
585 | (11) |
|
|
594 | (2) |
|
Setting Up the iSCSI Initiator |
|
|
596 | (2) |
|
Setting the iSCSI Initiatorname |
|
|
596 | (1) |
|
|
596 | (2) |
|
|
598 | (4) |
|
Making iSCSI Connections Persistent |
|
|
600 | (2) |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
603 | (1) |
|
|
603 | (1) |
|
Complete Tables and Lists from Memory |
|
|
603 | (1) |
|
|
604 | (1) |
|
|
604 | (1) |
|
|
604 | (3) |
|
|
604 | (1) |
|
|
605 | (1) |
|
|
605 | (2) |
|
Chapter 27 System Performance Reporting |
|
|
607 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
607 | (3) |
|
|
610 | (1) |
|
Understanding top Performance Data |
|
|
610 | (6) |
|
Understanding Load Average |
|
|
610 | (1) |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
613 | (2) |
|
|
615 | (1) |
|
|
615 | (1) |
|
Using iostat, vmstat, and pidstat |
|
|
616 | (5) |
|
|
617 | (1) |
|
|
618 | (2) |
|
|
620 | (1) |
|
|
621 | (1) |
|
|
622 | (1) |
|
|
622 | (1) |
|
|
622 | (1) |
|
Complete Tables and Lists from Memory |
|
|
623 | (1) |
|
|
623 | (1) |
|
|
623 | (1) |
|
|
624 | (3) |
|
Chapter 28 System Optimization Basics |
|
|
627 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
627 | (3) |
|
|
630 | (1) |
|
Understanding System Optimization Basics |
|
|
630 | (1) |
|
Understanding the /proc File System |
|
|
631 | (4) |
|
Using /proc to Analyze Performance |
|
|
631 | (2) |
|
Using /proc/sys to Tune Linux Performance |
|
|
633 | (2) |
|
Using sysctl to Automate System Optimization Parameters |
|
|
635 | (2) |
|
|
637 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
Complete Tables and Lists from Memory |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
639 | (1) |
|
|
639 | (2) |
|
|
639 | (2) |
|
Chapter 29 Configuring Advanced Log Features |
|
|
641 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
641 | (3) |
|
|
644 | (1) |
|
Understanding rsyslogd Modules |
|
|
644 | (2) |
|
Understanding the Need for Modules |
|
|
644 | (1) |
|
Using Modules in rsyslog Configuration |
|
|
645 | (1) |
|
Connecting journald to rsyslog |
|
|
646 | (2) |
|
Configuring Remote Logging |
|
|
648 | (3) |
|
Understanding the Need for Remote Log Servers |
|
|
648 | (1) |
|
Configuring Remote Logging |
|
|
649 | (2) |
|
|
651 | (1) |
|
|
651 | (1) |
|
|
651 | (1) |
|
Complete Tables and Lists from Memory |
|
|
651 | (1) |
|
|
651 | (1) |
|
|
652 | (1) |
|
|
652 | (3) |
|
|
652 | (3) |
|
Chapter 30 Configuring Routing and Advanced Networking |
|
|
655 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
655 | (3) |
|
|
658 | (1) |
|
Configuring Aggregated Network Interfaces |
|
|
658 | (15) |
|
|
658 | (5) |
|
|
663 | (1) |
|
Configuring Network Teams |
|
|
663 | (3) |
|
Looking Behind the Teaming Configuration |
|
|
666 | (5) |
|
Troubleshooting Network Teaming |
|
|
671 | (2) |
|
Configuring IPv6 Addresses |
|
|
673 | (4) |
|
Understanding IPv6 Addresses |
|
|
673 | (2) |
|
Managing IPv6 Address Configurations |
|
|
675 | (1) |
|
|
676 | (1) |
|
|
677 | (2) |
|
|
677 | (1) |
|
Configuring Custom Routes |
|
|
678 | (1) |
|
|
679 | (1) |
|
|
679 | (1) |
|
|
679 | (1) |
|
Complete Tables and Lists from Memory |
|
|
680 | (1) |
|
|
680 | (1) |
|
|
680 | (1) |
|
|
681 | (2) |
|
|
681 | (2) |
|
Chapter 31 An Introduction to Bash Shell Scripting |
|
|
683 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
683 | (3) |
|
|
686 | (1) |
|
Understanding Shell Scripting Core Elements |
|
|
686 | (1) |
|
Using Variables and Input |
|
|
687 | (4) |
|
Using Positional Parameters |
|
|
688 | (1) |
|
|
689 | (2) |
|
|
691 | (7) |
|
Working with if then else |
|
|
692 | (1) |
|
|
693 | (1) |
|
|
693 | (2) |
|
Understanding while and until |
|
|
695 | (1) |
|
|
696 | (1) |
|
Bash Shell Script Debugging |
|
|
697 | (1) |
|
|
698 | (1) |
|
|
698 | (1) |
|
|
698 | (1) |
|
|
699 | (1) |
|
|
699 | (1) |
|
|
699 | (2) |
|
|
699 | (2) |
|
Chapter 32 Advanced Firewall Configuration |
|
|
701 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
701 | (4) |
|
|
705 | (1) |
|
Excluding Iptables Services |
|
|
705 | (1) |
|
Creating Firewalld Services |
|
|
706 | (2) |
|
Configuring Firewalld Rich Rules |
|
|
708 | (3) |
|
|
708 | (1) |
|
|
709 | (1) |
|
|
709 | (2) |
|
|
711 | (1) |
|
Configuring Network Address Translation |
|
|
711 | (4) |
|
|
712 | (1) |
|
Configuring Port Forwarding |
|
|
713 | (2) |
|
|
715 | (1) |
|
|
716 | (1) |
|
|
716 | (1) |
|
Complete Tables and Lists from Memory |
|
|
716 | (1) |
|
|
716 | (1) |
|
|
716 | (1) |
|
|
717 | (2) |
|
|
717 | (2) |
|
Chapter 33 Managing Advanced Apache Services |
|
|
719 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
719 | (4) |
|
|
723 | (1) |
|
|
723 | (4) |
|
Essential Apache Parameters |
|
|
723 | (2) |
|
Revising Apache SELinux-Related Settings |
|
|
725 | (1) |
|
Configuring Write Access to the DocumentRoot |
|
|
726 | (1) |
|
|
727 | (4) |
|
Understanding TLS Security |
|
|
728 | (1) |
|
Configuring Apache for Using TLS Certificates |
|
|
729 | (2) |
|
Deploying CGI Applications |
|
|
731 | (4) |
|
Using Common Gateway Interface |
|
|
731 | (1) |
|
Serving Dynamic PHP Content |
|
|
732 | (1) |
|
Using Dynamic Python Content |
|
|
733 | (1) |
|
|
733 | (2) |
|
Configuring Private Directories |
|
|
735 | (1) |
|
|
736 | (1) |
|
|
737 | (1) |
|
|
737 | (1) |
|
Complete Tables and Lists from Memory |
|
|
737 | (1) |
|
|
737 | (1) |
|
|
737 | (1) |
|
|
738 | (3) |
|
|
738 | (3) |
|
Chapter 34 Configuring DNS |
|
|
741 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
741 | (3) |
|
|
744 | (1) |
|
|
744 | (5) |
|
|
744 | (1) |
|
|
745 | (1) |
|
Understanding DNS Lookups |
|
|
745 | (2) |
|
Understanding Resource Records |
|
|
747 | (2) |
|
Setting Up a Cache-Only DNS Server |
|
|
749 | (3) |
|
Understanding the Need for DNSSEC |
|
|
749 | (1) |
|
Configuring the Unbound Caching Name Server |
|
|
749 | (2) |
|
Configuring Trust Anchors |
|
|
751 | (1) |
|
Troubleshooting DNS Issues |
|
|
752 | (3) |
|
Dumping and Changing the Unbound Cache |
|
|
753 | (1) |
|
|
753 | (2) |
|
|
755 | (1) |
|
|
755 | (1) |
|
|
755 | (2) |
|
|
755 | (1) |
|
Complete Tables and Lists from Memory |
|
|
756 | (1) |
|
|
756 | (1) |
|
|
757 | (2) |
|
|
757 | (2) |
|
Chapter 35 Configuring a MariaDB Database |
|
|
759 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
759 | (3) |
|
|
762 | (1) |
|
MariaDB Base Configuration |
|
|
762 | (6) |
|
Performing Simple Database Administration Tasks |
|
|
768 | (5) |
|
|
771 | (2) |
|
MariaDB Backup and Restore |
|
|
773 | (3) |
|
|
776 | (1) |
|
|
777 | (1) |
|
|
777 | (1) |
|
Complete Tables and Lists from Memory |
|
|
777 | (1) |
|
|
777 | (1) |
|
|
777 | (1) |
|
|
778 | (3) |
|
|
778 | (3) |
|
Chapter 36 Configuring NFS |
|
|
781 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
781 | (4) |
|
|
785 | (1) |
|
Setting Up the Basic NFSv4 Server |
|
|
785 | (6) |
|
Configuring the NFSv4 Server |
|
|
785 | (2) |
|
|
787 | (1) |
|
Testing Client Access with showmount |
|
|
787 | (1) |
|
Making NFS Mounts Persistent |
|
|
788 | (1) |
|
Configuring the Firewall for NFSv4 |
|
|
788 | (1) |
|
Configuring SELinux for NFSv4 |
|
|
788 | (3) |
|
Configuring NFS Kerberos Authentication |
|
|
791 | (5) |
|
Understanding NFSv4 SELinux Transparency |
|
|
795 | (1) |
|
|
796 | (1) |
|
|
796 | (1) |
|
|
796 | (1) |
|
|
797 | (1) |
|
|
797 | (1) |
|
|
798 | (3) |
|
|
798 | (3) |
|
Chapter 37 Configuring Samba File Services |
|
|
801 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
801 | (3) |
|
|
804 | (1) |
|
Setting Up SMB File Sharing |
|
|
804 | (6) |
|
|
804 | (1) |
|
Preparing Shared Directories on Linux |
|
|
804 | (1) |
|
Configuring /etc/samba/smb.conf |
|
|
805 | (3) |
|
|
808 | (2) |
|
|
810 | (5) |
|
Samba-Related SELinux Parameters |
|
|
810 | (1) |
|
|
811 | (2) |
|
Setting Up Kerberized Samba Shares |
|
|
813 | (2) |
|
|
815 | (5) |
|
|
815 | (1) |
|
|
816 | (1) |
|
Performing a Multiuser Samba Mount |
|
|
817 | (2) |
|
Mounting Samba Shares Through automount |
|
|
819 | (1) |
|
|
820 | (1) |
|
|
820 | (1) |
|
|
820 | (1) |
|
Complete Tables and Lists from Memory |
|
|
821 | (1) |
|
|
821 | (1) |
|
|
821 | (1) |
|
|
822 | (3) |
|
|
822 | (3) |
|
Chapter 38 Setting Up an SMTP Server |
|
|
825 | (20) |
|
Do I Know This Already Quiz |
|
|
825 | (3) |
|
|
828 | (1) |
|
Understanding Email Basics |
|
|
828 | (4) |
|
Understanding Roles in Mail Handling |
|
|
828 | (1) |
|
The Email Transmission Process |
|
|
829 | (1) |
|
Mail Server Solutions on RHEL 7 |
|
|
830 | (2) |
|
Configuring Postfix Parameters |
|
|
832 | (6) |
|
Understanding Essential Parameters |
|
|
833 | (2) |
|
Configuring Postfix to Relay Mail |
|
|
835 | (3) |
|
Verifying a Working Mail Configuration |
|
|
838 | (2) |
|
|
840 | (1) |
|
|
840 | (1) |
|
|
840 | (1) |
|
Complete Tables and Lists from Memory |
|
|
841 | (1) |
|
|
841 | (1) |
|
|
841 | (1) |
|
|
842 | (3) |
|
|
842 | (3) |
|
Chapter 39 Configuring SSH |
|
|
845 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
845 | (3) |
|
|
848 | (1) |
|
|
848 | (3) |
|
|
848 | (1) |
|
Configuring Alternative Ports |
|
|
849 | (1) |
|
Modifying SELinux to Allow for Port Changes |
|
|
849 | (1) |
|
|
850 | (1) |
|
Using Other Useful sshd Options |
|
|
851 | (2) |
|
|
852 | (1) |
|
Connection Keepalive Options |
|
|
852 | (1) |
|
Configuring Key-Based Authentication with Passphrases |
|
|
853 | (1) |
|
|
854 | (2) |
|
|
856 | (1) |
|
|
856 | (1) |
|
|
856 | (1) |
|
Complete Tables and Lists from Memory |
|
|
856 | (1) |
|
|
856 | (1) |
|
|
857 | (1) |
|
|
857 | (2) |
|
|
857 | (2) |
|
Chapter 40 Managing Time Synchronization |
|
|
859 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
859 | (3) |
|
|
862 | (1) |
|
Understanding the Need for Synchronized Time |
|
|
862 | (1) |
|
Setting Up Time Synchronization |
|
|
862 | (4) |
|
|
863 | (1) |
|
Configuring chrony to Synchronize Time |
|
|
864 | (2) |
|
Managing and Monitoring Time Synchronization with chronyc |
|
|
866 | (5) |
|
|
871 | (1) |
|
|
871 | (1) |
|
|
871 | (1) |
|
Complete Tables and Lists from Memory |
|
|
872 | (1) |
|
|
872 | (1) |
|
|
872 | (1) |
|
|
873 | (2) |
|
|
873 | (2) |
|
Chapter 41 Final Preparation |
|
|
875 | (6) |
|
|
875 | (6) |
|
|
875 | (1) |
|
|
876 | (1) |
|
|
876 | (1) |
|
|
877 | (1) |
|
The Nondisclosure Agreement |
|
|
878 | (3) |
|
Chapter 42 Theoretical Pre-Assessment Exams |
|
|
881 | (6) |
|
RHCSA Theoretical Pre-Assessment Exam |
|
|
881 | (2) |
|
RHCE Theoretical Pre-Assessment Exam |
|
|
883 | (4) |
RHCSA Practice Exam A |
|
887 | (4) |
RHCSA Practice Exam B |
|
891 | (4) |
RHCE Practice Exam A |
|
895 | (4) |
RHCE Practice Exam B |
|
899 | (3) |
Index |
|
902 | |