Linux Bible
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Christopher Negus. Linux Bible
Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Linux® BIBLE
Introduction
How This Book Is Organized
Conventions Used in This Book
NOTE
TIP
CAUTION
Jumping into Linux
Visit the Linux Bible website
How to Contact Wiley or the Author
Part I Getting Started. IN THIS PART
CHAPTER 1 Starting with Linux. IN THIS CHAPTER
Understanding What Linux Is
Understanding How Linux Differs from Other Operating Systems
Exploring Linux History
NOTE
Free-flowing UNIX culture at Bell Labs
Commercial UNIX
Berkeley Software Distribution arrives
UNIX Laboratory and commercialization
GNU transitions UNIX to freedom
BSD loses some steam
NOTE
Linus builds the missing piece
NOTE
OSI open source definition
Understanding How Linux Distributions Emerged
Choosing a Red Hat distribution
Using Red Hat Enterprise Linux
Using Fedora
Choosing Ubuntu or another Debian distribution
Finding Professional Opportunities with Linux Today
Understanding how companies make money with Linux
Becoming Red Hat certified
RHCSA
RHCE
RHCSA topics
RHCE topics
System configuration and management
Installing and configuring network services
Summary
CHAPTER 2 Creating the Perfect Linux Desktop. IN THIS CHAPTER
NOTE
Understanding Linux Desktop Technology
Starting with the Fedora GNOME Desktop Live image
Using the GNOME 3 Desktop
After the computer boots up
Navigating with the mouse
Navigating with the keyboard
Setting up the GNOME 3 desktop
Extending the GNOME 3 desktop
Using GNOME shell extensions
Using the GNOME Tweak Tool
Starting with desktop applications
Managing files and folders with Nautilus
Installing and managing additional software
NOTE
Playing music with Rhythmbox
Stopping the GNOME 3 desktop
Using the GNOME 2 Desktop
Using the Metacity window manager
NOTE
Changing GNOME's appearance
Using the GNOME panels
Using the Applications and System menus
Adding an applet
Adding another panel
Adding an application launcher
NOTE
Adding a drawer
Changing panel properties
TIP
Adding 3D effects with AIGLX
Summary
Exercises
Part II Becoming a Linux Power User. IN THIS PART
CHAPTER 3 Using the Shell. IN THIS CHAPTER
About Shells and Terminal Windows
Using the shell prompt
NOTE
Using a Terminal window
Using virtual consoles
Choosing Your Shell
TIP
Running Commands
Understanding command syntax
NOTE
NOTE
Locating commands
TIP
TIP
Recalling Commands Using Command History
Command-line editing
TIP
Command-line completion
TIP
Command-line recall
NOTE
Connecting and Expanding Commands
Piping between commands
Sequential commands
Background commands
Expanding commands
Expanding arithmetic expressions
Expanding variables
Using Shell Variables
Creating and using aliases
Exiting the shell
Creating Your Shell Environment
Configuring your shell
Setting your prompt
TIP
Adding environment variables
Getting Information about Commands
NOTE
Summary
Exercises
CHAPTER 4 Moving Around the Filesystem. IN THIS CHAPTER
Linux Filesystems versus Windows-Based Filesystems
Using Basic Filesystem Commands
Using Metacharacters and Operators
Using file-matching metacharacters
Using file-redirection metacharacters
Using brace expansion characters
Listing Files and Directories
Identifying Directories
Understanding File Permissions and Ownership
NOTE
Changing permissions with chmod (numbers)
Changing permissions with chmod (letters)
Setting default file permission with umask
Changing file ownership
Moving, Copying, and Removing Files
CAUTION
Summary
Exercises
CHAPTER 5 Working with Text Files. IN THIS CHAPTER
Editing Files with vim and vi
Exploring Other Text Editors
Starting with vi
NOTE
Adding text
TIP
TIP
Moving around in the text
Deleting, copying, and changing text
Pasting (putting) text
Repeating commands
Exiting vi
Skipping around in the file
Searching for text
Using ex mode
Learning more about vi and vim
Finding Files
Using locate to find files by name
Searching for files with find
NOTE
Finding files by name
Finding files by size
Finding files by user
Finding files by permission
Finding files by date and time
Using ‘not' and ‘or' when finding files
Finding files and executing commands
Searching in files with grep
Summary
Exercises
CHAPTER 6 Managing Running Processes. IN THIS CHAPTER
Understanding Processes
NOTE
Listing Processes
Listing processes with ps
NOTE
Listing and changing processes with top
Listing processes with System Monitor
Managing Background and Foreground Processes
TIP
Starting background processes
TIP
Using foreground and background commands
CAUTION
Killing and Renicing Processes
Killing processes with kill and killall
Using kill to signal processes by PID
Using killall to signal processes by name
Setting processor priority with nice and renice
Limiting Processes with cgroups
Summary
Exercises
CHAPTER 7 Writing Simple Shell Scripts. IN THIS CHAPTER
Understanding Shell Scripts
Executing and debugging shell scripts
Understanding shell variables
Escaping Special Shell Characters
NOTE
Special shell positional parameters
Reading in parameters
Parameter expansion in bash
NOTE
Performing arithmetic in shell scripts
NOTE
Using programming constructs in shell scripts
The ″if…then″ statements
The case command
The ″for…do″ loop
The ″while…do″ and ″until…do″ loops
Trying some useful text manipulation programs
The general regular expression parser
NOTE
Remove sections of lines of text (cut)
Translate or delete characters (tr)
The stream editor (sed)
Using simple shell scripts
Telephone list
Backup script
Summary
Exercises
Part III Becoming a Linux System Administrator. IN THIS PART
CHAPTER 8 Learning System Administration. IN THIS CHAPTER
Understanding System Administration
Using Graphical Administration Tools
Using Cockpit browser-based administration
NOTE
Using system-config-* tools
Using other browser-based admin tools
Using the root User Account
TIP
NOTE
Becoming root from the shell (su command)
Allowing administrative access via the GUI
Gaining administrative access with sudo
TIP
Exploring Administrative Commands, Configuration Files, and Log Files
NOTE
Administrative commands
NOTE
Administrative configuration files
NOTE
Administrative log files and systemd journal
Using journalctl to view the systemd journal
Managing log messages with rsyslogd
Using Other Administrative Accounts
Checking and Configuring Hardware
Checking your hardware
NOTE
Managing removable hardware
NOTE
Working with loadable modules
Listing loaded modules
Loading modules
Removing modules
Summary
Exercises
CHAPTER 9 Installing Linux. IN THIS CHAPTER
Choosing a Computer
Installing Fedora from Live Media
CAUTION
Installing Red Hat Enterprise Linux from Installation Media
Understanding Cloud-Based Installations
Installing Linux in the Enterprise
Exploring Common Installation Topics
Upgrading or installing from scratch
TIP
Dual booting
CAUTION
Installing Linux to run virtually
Using installation boot options
Boot options for disabling features
Boot options for video problems
Boot options for special installation types
Boot options for kickstarts and remote repositories
Miscellaneous boot options
Using specialized storage
Partitioning hard drives
TIP
Coming from Windows
Understanding different partition types
Tips for creating partitions
Using the GRUB boot loader
Summary
Exercises
CAUTION
CHAPTER 10 Getting and Managing Software. IN THIS CHAPTER
Managing Software on the Desktop
Going Beyond the Software Window
Understanding Linux RPM and DEB Software Packaging
Understanding DEB packaging
NOTE
Understanding RPM packaging
What is in an RPM?
Where do RPMs come from?
Installing RPMs
Managing RPM Packages with YUM
Transitioning from yum to dnf
Understanding how yum works
NOTE
Using YUM with third-party software repositories
Managing software with the yum command
NOTE
Searching for packages
Installing and removing packages
Updating packages
Updating groups of packages
Maintaining your RPM package database and cache
Downloading RPMs from a YUM repository
Installing, Querying, and Verifying Software with the rpm Command
Installing and removing packages with rpm
Querying rpm information
Verifying RPM packages
Managing Software in the Enterprise
Summary
Exercises
CHAPTER 11 Managing User Accounts. IN THIS CHAPTER
Creating User Accounts
Adding users with useradd
NOTE
Setting user defaults
Modifying users with usermod
Deleting users with userdel
Understanding Group Accounts
Using group accounts
Creating group accounts
Managing Users in the Enterprise
Setting permissions with Access Control Lists
NOTE
Setting ACLs with setfacl
Setting default ACLs
Enabling ACLs
Adding directories for users to collaborate
Creating group collaboration directories (set GID bit)
Creating restricted deletion directories (sticky bit)
Centralizing User Accounts
Summary
Exercises
CHAPTER 12 Managing Disks and Filesystems. IN THIS CHAPTER
Understanding Disk Storage
NOTE
Coming from Windows
Partitioning Hard Disks
Changing partitioning can make a system unbootable!
Understanding partition tables
Viewing disk partitions
Creating a single‐partition disk
WARNING
Creating a multiple‐partition disk
TIP
Using Logical Volume Manager Partitions
Checking an existing LVM
NOTE
Creating LVM logical volumes
Growing LVM logical volumes
Mounting Filesystems
NOTE
Supported filesystems
Enabling swap areas
Disabling swap area
Using the fstab file to define mountable file systems
Coming from Windows
Using the mount command to mount file systems
Mounting a disk image in loopback
Using the umount command
TIP
Using the mkfs Command to Create a Filesystem
Managing Storage with Cockpit
Summary
Exercises
Part IV Becoming a Linux Server Administrator. IN THIS PART
CHAPTER 13 Understanding Server Administration. IN THIS CHAPTER
Starting with Server Administration
Step 1: Install the server
Step 2: Configure the server
Using configuration files
TIP
Checking the default configuration
Step 3: Start the server
NOTE
Step 4: Secure the server
Password protection
Firewalls
TCP Wrappers
SELinux
Security settings in configuration files
Step 5: Monitor the server
Configure logging
Run system activity reports
Watch activity live with Cockpit
Keep system software up to date
Check the filesystem for signs of crackers
Checking and Setting Servers
Managing Remote Access with the Secure Shell Service
NOTE
Starting the openssh-server service
Using SSH client tools
Using ssh for remote login
TIP
Using ssh for remote execution
Copying files between systems with scp and rsync
Interactive copying with sftp
Using key-based (passwordless) authentication
Configuring System Logging
Enabling system logging with rsyslog
Understanding the rsyslog.conf file
Understanding the messages log file
Setting up and using a loghost with rsyslogd
On the client side
On the loghost side
Watching logs with logwatch
Checking System Resources with sar
Checking System Space
Displaying system space with df
Checking disk usage with du
Finding disk consumption with find
NOTE
TIP
Managing Servers in the Enterprise
Summary
Exercises
CHAPTER 14 Administering Networking. IN THIS CHAPTER
Configuring Networking for Desktops
Checking your network interfaces
Checking your network from NetworkManager
Checking your network from Cockpit
Checking your network from the command line
Viewing network interfaces
Checking routing information
Viewing the host and domain names
Configuring network interfaces
Setting IP addresses manually
Setting IP address aliases
Setting routes
Configuring a network proxy connection
Configuring Networking from the Command Line
Configure networking with nmtui
Editing a NetworkManager TUI connection
Understanding networking configuration files
Network interface files
Other networking files
/etc/sysconfig/network file
/etc/hostname file
/etc/hosts file
/etc/resolv.conf file
/etc/nsswitch.conf
Setting alias network interfaces
Setting up Ethernet channel bonding
Setting custom routes
Configuring Networking in the Enterprise
Configuring Linux as a router
Configuring Linux as a DHCP server
Configuring Linux as a DNS server
CAUTION
Configuring Linux as a proxy server
Summary
Exercises
CHAPTER 15 Starting and Stopping Services. IN THIS CHAPTER
NOTE
Understanding the Initialization Daemon (init or systemd)
Understanding the classic init daemons
CAUTION
Understanding systemd initialization
Learning systemd basics
Learning systemd's backward compatibility to SysVinit
Checking the Status of Services
Checking services for SysVinit systems
Stopping and Starting Services
Stopping and starting SysVinit services
Stopping a service with systemd
Starting a service with systemd
Restarting a service with systemd
Reloading a service with systemd
Enabling Persistent Services
Configuring persistent services for SysVinit
Enabling a service with systemd
Disabling a service with systemd
Configuring a Default Runlevel or Target Unit
Configuring the SysVinit default runlevel
Adding New or Customized Services
Adding new services to SysVinit
Step 1: Create a new or customized service script file
Step 2: Add the service script to /etc/rc.d/init.d
Step 3: Set appropriate permission on the script
Step 4: Add the service to runlevel directories
Adding new services to systemd
Step 1: Create a new or customized service configuration unit file
Step 2: Move the service configuration unit file
TIP
Step 3: Add the service to the Wants directory
TIP
Summary
Exercises
CHAPTER 16 Configuring a Print Server. IN THIS CHAPTER
Common UNIX Printing System
Printing Directly from Windows to CUPS
Setting Up Printers
Adding a printer automatically
Using web-based CUPS administration
Allow remote printing administration
Add a printer not automatically detected
Using the Print Settings window
Configuring local printers with the Print Settings window
Adding a local printer
Editing a local printer
Configuring remote printers
Adding a remote CUPS printer
Adding a remote UNIX (LDP/LPR) printer
TIP
Adding a Windows (SMB) printer
CAUTION
TIP
Working with CUPS Printing
Configuring the CUPS server (cupsd.conf)
Starting the CUPS server
Configuring CUPS printer options manually
Using Printing Commands
Printing with lp
Listing status with lpstat -t
Removing print jobs with lprm
Configuring Print Servers
Configuring a shared CUPS printer
Configuring a shared Samba printer
Understanding smb.conf for printing
Setting up SMB clients
TIP
Summary
Exercises
CHAPTER 17 Configuring a Web Server. IN THIS CHAPTER
Understanding the Apache Web Server
NOTE
Getting and Installing Your Web Server
Understanding the httpd package
Installing Apache
Starting Apache
Securing Apache
Apache file permissions and ownership
Apache and firewalls
Apache and SELinux
Understanding the Apache configuration files
NOTE
Using directives
NOTE
Understanding default settings
Adding a virtual host to Apache
NOTE
NOTE
Allowing users to publish their own web content
Securing your web traffic with SSL/TLS
NOTE
Understanding how SSL is configured
Generating an SSL key and self‐signed certificate
Generating a certificate signing request
Troubleshooting Your Web Server
Checking for configuration errors
NOTE
Accessing forbidden and server internal errors
NOTE
Summary
Exercises
CHAPTER 18 Configuring an FTP Server. IN THIS CHAPTER
Understanding FTP
NOTE
Installing the vsftpd FTP Server
Starting the vsftpd Service
Securing Your FTP Server
Opening up your firewall for FTP
NOTE
NOTE
Configuring SELinux for your FTP server
Relating Linux file permissions to vsftpd
Configuring Your FTP Server
Setting up user access
Allowing uploading
Setting up vsftpd for the Internet
Using FTP Clients to Connect to Your Server
Accessing an FTP server from Firefox
Accessing an FTP server with the lftp command
Using the gFTP client
Summary
Exercises
CHAPTER 19 Configuring a Windows File Sharing (Samba) Server. IN THIS CHAPTER
Understanding Samba
Installing Samba
Starting and Stopping Samba
Starting the Samba (smb) service
Starting the NetBIOS (nmbd) name server
Stopping the Samba (smb) and NetBIOS (nmb) services
Securing Samba
Configuring firewalls for Samba
Configuring SELinux for Samba
Setting SELinux Booleans for Samba
Setting SELinux file contexts for Samba
Configuring Samba host/user permissions
Configuring Samba
Configuring the [global] section
Configuring the [homes] section
Configuring the [printers] section
Creating a Samba shared folder
Adding the shared folder to Samba
Checking the Samba share
NOTE
Restricting Samba access by network interface
Restricting Samba access by host
Restricting Samba access by user
Accessing Samba Shares
Accessing Samba shares in Linux
Accessing Samba shares from a Linux file manager
Mounting a Samba share from a Linux command line
Accessing Samba shares in Windows
Using Samba in the Enterprise
Summary
Exercises
CHAPTER 20 Configuring an NFS File Server. IN THIS CHAPTER
NOTE
Installing an NFS Server
Starting the NFS service
Sharing NFS Filesystems
Configuring the /etc/exports file
Hostnames in /etc/exports
Access options in /etc/exports
User mapping options in /etc/exports
Exporting the shared filesystems
TIP
Securing Your NFS Server
Opening up your firewall for NFS
Allowing NFS access in TCP wrappers
Configuring SELinux for your NFS server
Using NFS Filesystems
Viewing NFS shares
Manually mounting an NFS filesystem
NOTE
Mounting an NFS filesystem at boot time
TIP
Mounting noauto filesystems
TIP
Using mount options
Using autofs to mount NFS filesystems on demand
Automounting to the /net directory
Automounting home directories
Unmounting NFS filesystems
TIP
Summary
Exercises
CHAPTER 21 Troubleshooting Linux. IN THIS CHAPTER
Boot-Up Troubleshooting
Understanding Startup Methods
Starting with System V init scripts
Starting with systemd
Starting from the firmware (BIOS or UEFI)
Troubleshooting BIOS setup
Troubleshooting boot order
Troubleshooting the GRUB boot loader
The GRUB Legacy boot loader
GRUB 2 Boot loader
Starting the kernel
Troubleshooting the initialization system
Troubleshooting System V initialization
Troubleshooting rc.sysinit
Troubleshooting runlevel processes
Troubleshooting systemd initialization
Understanding the systemd boot process
Analyzing the systemd boot process
Troubleshooting Software Packages
NOTE
NOTE
Using cron for Software Updates
Fixing RPM databases and cache
Troubleshooting Networking
Troubleshooting outgoing connections
View network interfaces
Check physical connections
Check routes
Check hostname resolution
Troubleshooting incoming connections
Check if the client can reach your system at all
Check if the service is available to the client
Check the firewall on the server
Check the service on the server
Troubleshooting Memory
Uncovering memory issues
Checking for memory problems
Dealing with memory problems
NOTE
Troubleshooting in Rescue Mode
Summary
Exercises
Part V Learning Linux Security Techniques. IN THIS PART
CHAPTER 22 Understanding Basic Linux Security. IN THIS CHAPTER
Implementing Physical Security
Implementing disaster recovery
CAUTION
Securing user accounts
One user per user account
Limiting access to the root user account
Setting expiration dates on temporary accounts
TIP
Removing unused user accounts
Securing passwords
Choosing good passwords
TIP
Setting and changing passwords
Enforcing best password practices
TIP
NOTE
Understanding the password files and password hashes
NOTE
CAUTION
Securing the filesystem
Managing dangerous filesystem permissions
Securing the password files
NOTE
Locking down the filesystem
Managing software and services
Updating software packages
Keeping up with security advisories
Advanced implementation
Monitoring Your Systems
Monitoring log files
Monitoring user accounts
Detecting counterfeit new accounts and privileges
NOTE
Detecting bad account passwords
TIP
CAUTION
Monitoring the filesystem
Verifying software packages
NOTE
Scanning the filesystem
Detecting viruses and rootkits
Monitoring for viruses
TIP
Monitoring for rootkits
TIP
TIP
Detecting an intrusion
Auditing and Reviewing Linux
Conducting compliance reviews
Conducting security reviews
Summary
Exercises
CHAPTER 23 Understanding Advanced Linux Security. IN THIS CHAPTER
Implementing Linux Security with Cryptography
Understanding hashing
Understanding encryption/decryption
Understanding cryptographic ciphers
Understanding cryptographic cipher keys
Symmetric key cryptography
Encrypting and decrypting a tar archive file
Asymmetric key cryptography
Generating a key pair
Sharing a public key
Encrypting an email message
Understanding digital signatures
NOTE
Signing a file with a digital signature
TIP
Implementing Linux cryptography
Ensuring file integrity
Encrypting a Linux filesystem at installation
NOTE
Encrypting a Linux directory
TIP
TIP
TIP
Encrypting a Linux file
CAUTION
Encrypting Linux with miscellaneous tools
Using Encryption from the Desktop
Implementing Linux Security with PAM
Understanding the PAM authentication process
Understanding PAM contexts
Understanding PAM control flags
Understanding PAM modules
NOTE
CAUTION
TIP
Administering PAM on your Linux system
Managing PAM-aware application configuration files
Managing PAM system event configuration files
NOTE
NOTE
Implementing time restrictions with PAM
NOTE
Enforcing good passwords with PAM
NOTE
NOTE
NOTE
Encouraging sudo use with PAM
Obtaining more information on PAM
Summary
Exercises
CHAPTER 24 Enhancing Linux Security with SELinux. IN THIS CHAPTER
Understanding SELinux Benefits
NOTE
Understanding How SELinux Works
Understanding Type Enforcement
Understanding Multi-Level Security
TIP
Implementing SELinux security models
Understanding SELinux operational modes
Using the disabled mode
TIP
Using the permissive mode
Using the Enforcing mode
Understanding SELinux security contexts
Users have security contexts
Files have security contexts
Processes have security contexts
Understanding SELinux Policy types
NOTE
Targeted policy
MLS (Multi-Level Security) policy
Minimum policy
Understanding SELinux policy rule packages
Configuring SELinux
Setting the SELinux mode
CAUTION
Setting the SELinux policy type
NOTE
Managing SELinux security contexts
Managing the user security context
Managing the file security context
Managing the process security context
Managing SELinux policy rule packages
Managing SELinux via Booleans
Monitoring and Troubleshooting SELinux
Understanding SELinux logging
NOTE
Reviewing SELinux messages in the audit log
Reviewing SELinux messages in the messages log
Troubleshooting SELinux logging
CAUTION
Troubleshooting common SELinux problems
Using a nonstandard directory for a service
Using a nonstandard port for a service
Moving files and losing security context labels
Booleans set incorrectly
Putting It All Together
Obtaining More Information on SELinux
Summary
Exercises
CHAPTER 25 Securing Linux on a Network. IN THIS CHAPTER
Auditing Network Services
Evaluating access to network services with nmap
NOTE
Using nmap to audit your network services advertisements
TIP
TIP
NOTE
CAUTION
Working with Firewalls
Understanding firewalls
NOTE
Implementing firewalls
TIP
Starting with firewalld
Changing firewall rules with Cockpit
Understanding the iptables utility
netfilter/iptables tables
netfilter/iptables chains
netfilter/iptables rules, policies, and targets
TIP
Using the iptables utility
TIP
Modifying iptables policies and rules
Setting a policy of Drop
TIP
Blocking a source IP address
Blocking a protocol and port
Saving an iptables configuration
NOTE
Summary
Exercises
Part VI Engaging with Cloud Computing. IN THIS PART
CHAPTER 26 Shifting to Clouds and Containers. IN THIS CHAPTER
Understanding Linux Containers
Namespaces
Container registries
Base images and layers
Starting with Linux Containers
Pulling and running containers
Pulling a container
Running a shell from a container
Running an FTP server from a container
Starting and stopping containers
Building a container image
Build a simple container image
Build an FTP container from GitHub
Tagging and pushing an image to a registry
Using containers in the enterprise
Summary
Exercises
CHAPTER 27 Using Linux for Cloud Computing. IN THIS CHAPTER
Overview of Linux and Cloud Computing
Cloud hypervisors (aka compute nodes)
Cloud controllers
Cloud storage
Cloud authentication
Cloud deployment and configuration
Cloud platforms
Trying Basic Cloud Technology
Setting Up a Small Cloud
NOTE
Configuring hypervisors
Step 1: Get Linux software
Step 2: Check your computers
Step 3: Install Linux on hypervisors
Step 4: Start services on the hypervisors
Step 5: Edit /etc/hosts, or set up DNS
Configuring storage
Step 1: Install Linux software
Step 2: Configure NFS share
Step 3: Start the NFS service
Step 4: Mount the NFS share on the hypervisors
Creating virtual machines
Step 1: Get images to make virtual machines
Step 2: Check the network bridge
Step 3: Start Virtual Machine Manager (virt-manager)
Step 4: Check connection details
Step 5: Create a new virtual machine
Managing virtual machines
Migrating virtual machines
Step 1: Identify other hypervisors
Step 2: Migrate running VM to Other hypervisor
Summary
Exercises
CHAPTER 28 Deploying Linux to the Cloud. IN THIS CHAPTER
Getting Linux to Run in a Cloud
Creating Linux Images for Clouds
Configuring and running a cloud-init cloud instance
Investigating the cloud instance
Cloning the cloud instance
Expanding your cloud-init configuration
NOTE
Adding ssh keys with cloud-init
Adding software with cloud-init
Using cloud-init in enterprise computing
Using OpenStack to Deploy Cloud Images
Starting from the OpenStack Dashboard
Configuring your OpenStack virtual network
Configuring keys for remote access
Launching a virtual machine in OpenStack
Accessing the virtual machine via ssh
Using Amazon EC2 to Deploy Cloud Images
Summary
Exercises
CHAPTER 29 Automating Apps and Infrastructure with Ansible. IN THIS CHAPTER
Understanding Ansible
Exploring Ansible Components
Inventories
Playbooks
Plays
Tasks
Modules
Roles, imports, and includes
Stepping Through an Ansible Deployment
Prerequisites
Setting up SSH keys to each node
Installing Ansible
Creating an inventory
Authenticating to the hosts
Creating a playbook
Run the playbook
Running Ad-Hoc Ansible Commands
Trying ad-hoc commands
Automating Tasks with Ansible Tower Automation Framework
Summary
Exercises
CHAPTER 30 Deploying Applications as Containers with Kubernetes. IN THIS CHAPTER
Understanding Kubernetes
Kubernetes masters
Kubernetes workers
Kubernetes applications
Kubernetes interfaces
Trying Kubernetes
NOTE
Getting Kubernetes
Starting the Kubernetes Basics Tutorial
Starting Minikube
Running the Kubernetes Basics tutorial
Get information about your cluster
Deploy a Kubernetes application
Get information on the deployment's pods
Expose applications with services
Label a service
Delete a service
Scale up an application
Check the load balancer
Scale down an application
Enterprise-Quality Kubernetes with OpenShift
Summary
Exercises
Part VII Appendixes. IN THIS PART
APPENDIX A Media. IN THIS APPENDIX
NOTE
Getting Fedora. NOTE
Getting Red Hat Enterprise Linux
NOTE
Getting Ubuntu
Booting Linux from a USB Drive
Creating Linux CDs and DVDs
Burning CDs/DVDs in Windows
Burning CDs/DVDs on a MacOS system
Burning CDs/DVDs in Linux
Burning CDs or DVDs from a Linux desktop
Burning CDs or DVDs from a Linux command line
APPENDIX B Exercise Answers
Chapter 1: Starting with Linux
Chapter 2: Creating the Perfect Linux Desktop
Chapter 3: Using the Shell
Chapter 4: Moving Around the Filesystem
Chapter 5: Working with Text Files
Chapter 6: Managing Running Processes
Chapter 7: Writing Simple Shell Scripts
Chapter 8: Learning System Administration
Chapter 9: Installing Linux
Chapter 10: Getting and Managing Software
Chapter 11: Managing User Accounts
Chapter 12: Managing Disks and Filesystems
Chapter 13: Understanding Server Administration
Chapter 14: Administering Networking
Chapter 15: Starting and Stopping Services
Chapter 16: Configuring a Print Server
Chapter 17: Configuring a Web Server
Chapter 18: Configuring an FTP Server. CAUTION
Chapter 19: Configuring a Windows File Sharing (Samba) Server
Chapter 20: Configuring an NFS File Server
Chapter 21: Troubleshooting Linux
Chapter 22: Understanding Basic Linux Security
Chapter 23: Understanding Advanced Linux Security
Chapter 24: Enhancing Linux Security with SELinux
Chapter 25: Securing Linux on a Network
Chapter 26: Shifting to Clouds and Containers
Chapter 27: Using Linux for Cloud Computing
Chapter 28: Deploying Linux to the Cloud
Chapter 29: Automating Apps and Infrastructure with Ansible
Chapter 30: Deploying Applications as Containers with Kubernetes
Index
About the Author
About the Technical Editors
Acknowledgments
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
Tenth Edition
Christopher Negus
.....
Instead of just selling RHEL, Red Hat offers an ecosystem of benefits upon which Linux customers could draw. To use RHEL, customers buy subscriptions that they can use to deploy any version of RHEL that they desire. If they decommission a RHEL system, they can use the subscription to deploy another system.
Different levels of support are available for RHEL, depending on customer needs. Customers can be assured that, along with support, they can get hardware and third-party software that is certified to work with RHEL. They can get Red Hat consultants and engineers to help them put together the computing environments they need. They can also get training and certification exams for their employees (see the discussion of RHCE certification later in this chapter).
.....