Linux Bible

Linux Bible
Автор книги: id книги: 1887771     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 4829,04 руб.     (47,08$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Зарубежная компьютерная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119578895 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

The industry favorite Linux guide Linux Bible, 10th Edition  is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. this updated tenth edition covers the latest versions of Red Hat Enterprise Linux (RHEL 8), Fedora 30, and Ubuntu 18.04 LTS. It includes information on cloud computing, with new guidance on containerization, Ansible automation, and Kubernetes and OpenShift. With a focus on RHEL 8, this new edition teaches techniques for managing storage, users, and security, while emphasizing simplified administrative techniques with Cockpit. Written by a Red Hat expert, this book provides the clear explanations and step-by-step instructions that demystify Linux and bring the new features seamlessly into your workflow. This useful guide assumes a base of little or no Linux knowledge, and takes you step by step through what you need to know to get the job done. Get Linux up and running quickly Master basic operations and tackle more advanced tasks Get up to date on the recent changes to Linux server system management Bring Linux to the cloud using Openstack and Cloudforms Simplified Linux administration through the Cockpit Web Interface Automated Linux Deployment with Ansible Learn to navigate Linux with Amazon (AWS), Google (GCE), and Microsofr Azure Cloud services  Linux Bible, 10th Edition  is the one resource you need, and provides the hands-on training that gets you on track in a flash.

Оглавление

Christopher Negus. Linux Bible

Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Linux® BIBLE

Introduction

How This Book Is Organized

Conventions Used in This Book

NOTE

TIP

CAUTION

Jumping into Linux

Visit the Linux Bible website

How to Contact Wiley or the Author

Part I Getting Started. IN THIS PART

CHAPTER 1 Starting with Linux. IN THIS CHAPTER

Understanding What Linux Is

Understanding How Linux Differs from Other Operating Systems

Exploring Linux History

NOTE

Free-flowing UNIX culture at Bell Labs

Commercial UNIX

Berkeley Software Distribution arrives

UNIX Laboratory and commercialization

GNU transitions UNIX to freedom

BSD loses some steam

NOTE

Linus builds the missing piece

NOTE

OSI open source definition

Understanding How Linux Distributions Emerged

Choosing a Red Hat distribution

Using Red Hat Enterprise Linux

Using Fedora

Choosing Ubuntu or another Debian distribution

Finding Professional Opportunities with Linux Today

Understanding how companies make money with Linux

Becoming Red Hat certified

RHCSA

RHCE

RHCSA topics

RHCE topics

System configuration and management

Installing and configuring network services

Summary

CHAPTER 2 Creating the Perfect Linux Desktop. IN THIS CHAPTER

NOTE

Understanding Linux Desktop Technology

Starting with the Fedora GNOME Desktop Live image

Using the GNOME 3 Desktop

After the computer boots up

Navigating with the mouse

Navigating with the keyboard

Setting up the GNOME 3 desktop

Extending the GNOME 3 desktop

Using GNOME shell extensions

Using the GNOME Tweak Tool

Starting with desktop applications

Managing files and folders with Nautilus

Installing and managing additional software

NOTE

Playing music with Rhythmbox

Stopping the GNOME 3 desktop

Using the GNOME 2 Desktop

Using the Metacity window manager

NOTE

Changing GNOME's appearance

Using the GNOME panels

Using the Applications and System menus

Adding an applet

Adding another panel

Adding an application launcher

NOTE

Adding a drawer

Changing panel properties

TIP

Adding 3D effects with AIGLX

Summary

Exercises

Part II Becoming a Linux Power User. IN THIS PART

CHAPTER 3 Using the Shell. IN THIS CHAPTER

About Shells and Terminal Windows

Using the shell prompt

NOTE

Using a Terminal window

Using virtual consoles

Choosing Your Shell

TIP

Running Commands

Understanding command syntax

NOTE

NOTE

Locating commands

TIP

TIP

Recalling Commands Using Command History

Command-line editing

TIP

Command-line completion

TIP

Command-line recall

NOTE

Connecting and Expanding Commands

Piping between commands

Sequential commands

Background commands

Expanding commands

Expanding arithmetic expressions

Expanding variables

Using Shell Variables

Creating and using aliases

Exiting the shell

Creating Your Shell Environment

Configuring your shell

Setting your prompt

TIP

Adding environment variables

Getting Information about Commands

NOTE

Summary

Exercises

CHAPTER 4 Moving Around the Filesystem. IN THIS CHAPTER

Linux Filesystems versus Windows-Based Filesystems

Using Basic Filesystem Commands

Using Metacharacters and Operators

Using file-matching metacharacters

Using file-redirection metacharacters

Using brace expansion characters

Listing Files and Directories

Identifying Directories

Understanding File Permissions and Ownership

NOTE

Changing permissions with chmod (numbers)

Changing permissions with chmod (letters)

Setting default file permission with umask

Changing file ownership

Moving, Copying, and Removing Files

CAUTION

Summary

Exercises

CHAPTER 5 Working with Text Files. IN THIS CHAPTER

Editing Files with vim and vi

Exploring Other Text Editors

Starting with vi

NOTE

Adding text

TIP

TIP

Moving around in the text

Deleting, copying, and changing text

Pasting (putting) text

Repeating commands

Exiting vi

Skipping around in the file

Searching for text

Using ex mode

Learning more about vi and vim

Finding Files

Using locate to find files by name

Searching for files with find

NOTE

Finding files by name

Finding files by size

Finding files by user

Finding files by permission

Finding files by date and time

Using ‘not' and ‘or' when finding files

Finding files and executing commands

Searching in files with grep

Summary

Exercises

CHAPTER 6 Managing Running Processes. IN THIS CHAPTER

Understanding Processes

NOTE

Listing Processes

Listing processes with ps

NOTE

Listing and changing processes with top

Listing processes with System Monitor

Managing Background and Foreground Processes

TIP

Starting background processes

TIP

Using foreground and background commands

CAUTION

Killing and Renicing Processes

Killing processes with kill and killall

Using kill to signal processes by PID

Using killall to signal processes by name

Setting processor priority with nice and renice

Limiting Processes with cgroups

Summary

Exercises

CHAPTER 7 Writing Simple Shell Scripts. IN THIS CHAPTER

Understanding Shell Scripts

Executing and debugging shell scripts

Understanding shell variables

Escaping Special Shell Characters

NOTE

Special shell positional parameters

Reading in parameters

Parameter expansion in bash

NOTE

Performing arithmetic in shell scripts

NOTE

Using programming constructs in shell scripts

The ″if…then″ statements

The case command

The ″for…do″ loop

The ″while…do″ and ″until…do″ loops

Trying some useful text manipulation programs

The general regular expression parser

NOTE

Remove sections of lines of text (cut)

Translate or delete characters (tr)

The stream editor (sed)

Using simple shell scripts

Telephone list

Backup script

Summary

Exercises

Part III Becoming a Linux System Administrator. IN THIS PART

CHAPTER 8 Learning System Administration. IN THIS CHAPTER

Understanding System Administration

Using Graphical Administration Tools

Using Cockpit browser-based administration

NOTE

Using system-config-* tools

Using other browser-based admin tools

Using the root User Account

TIP

NOTE

Becoming root from the shell (su command)

Allowing administrative access via the GUI

Gaining administrative access with sudo

TIP

Exploring Administrative Commands, Configuration Files, and Log Files

NOTE

Administrative commands

NOTE

Administrative configuration files

NOTE

Administrative log files and systemd journal

Using journalctl to view the systemd journal

Managing log messages with rsyslogd

Using Other Administrative Accounts

Checking and Configuring Hardware

Checking your hardware

NOTE

Managing removable hardware

NOTE

Working with loadable modules

Listing loaded modules

Loading modules

Removing modules

Summary

Exercises

CHAPTER 9 Installing Linux. IN THIS CHAPTER

Choosing a Computer

Installing Fedora from Live Media

CAUTION

Installing Red Hat Enterprise Linux from Installation Media

Understanding Cloud-Based Installations

Installing Linux in the Enterprise

Exploring Common Installation Topics

Upgrading or installing from scratch

TIP

Dual booting

CAUTION

Installing Linux to run virtually

Using installation boot options

Boot options for disabling features

Boot options for video problems

Boot options for special installation types

Boot options for kickstarts and remote repositories

Miscellaneous boot options

Using specialized storage

Partitioning hard drives

TIP

Coming from Windows

Understanding different partition types

Tips for creating partitions

Using the GRUB boot loader

Summary

Exercises

CAUTION

CHAPTER 10 Getting and Managing Software. IN THIS CHAPTER

Managing Software on the Desktop

Going Beyond the Software Window

Understanding Linux RPM and DEB Software Packaging

Understanding DEB packaging

NOTE

Understanding RPM packaging

What is in an RPM?

Where do RPMs come from?

Installing RPMs

Managing RPM Packages with YUM

Transitioning from yum to dnf

Understanding how yum works

NOTE

Using YUM with third-party software repositories

Managing software with the yum command

NOTE

Searching for packages

Installing and removing packages

Updating packages

Updating groups of packages

Maintaining your RPM package database and cache

Downloading RPMs from a YUM repository

Installing, Querying, and Verifying Software with the rpm Command

Installing and removing packages with rpm

Querying rpm information

Verifying RPM packages

Managing Software in the Enterprise

Summary

Exercises

CHAPTER 11 Managing User Accounts. IN THIS CHAPTER

Creating User Accounts

Adding users with useradd

NOTE

Setting user defaults

Modifying users with usermod

Deleting users with userdel

Understanding Group Accounts

Using group accounts

Creating group accounts

Managing Users in the Enterprise

Setting permissions with Access Control Lists

NOTE

Setting ACLs with setfacl

Setting default ACLs

Enabling ACLs

Adding directories for users to collaborate

Creating group collaboration directories (set GID bit)

Creating restricted deletion directories (sticky bit)

Centralizing User Accounts

Summary

Exercises

CHAPTER 12 Managing Disks and Filesystems. IN THIS CHAPTER

Understanding Disk Storage

NOTE

Coming from Windows

Partitioning Hard Disks

Changing partitioning can make a system unbootable!

Understanding partition tables

Viewing disk partitions

Creating a single‐partition disk

WARNING

Creating a multiple‐partition disk

TIP

Using Logical Volume Manager Partitions

Checking an existing LVM

NOTE

Creating LVM logical volumes

Growing LVM logical volumes

Mounting Filesystems

NOTE

Supported filesystems

Enabling swap areas

Disabling swap area

Using the fstab file to define mountable file systems

Coming from Windows

Using the mount command to mount file systems

Mounting a disk image in loopback

Using the umount command

TIP

Using the mkfs Command to Create a Filesystem

Managing Storage with Cockpit

Summary

Exercises

Part IV Becoming a Linux Server Administrator. IN THIS PART

CHAPTER 13 Understanding Server Administration. IN THIS CHAPTER

Starting with Server Administration

Step 1: Install the server

Step 2: Configure the server

Using configuration files

TIP

Checking the default configuration

Step 3: Start the server

NOTE

Step 4: Secure the server

Password protection

Firewalls

TCP Wrappers

SELinux

Security settings in configuration files

Step 5: Monitor the server

Configure logging

Run system activity reports

Watch activity live with Cockpit

Keep system software up to date

Check the filesystem for signs of crackers

Checking and Setting Servers

Managing Remote Access with the Secure Shell Service

NOTE

Starting the openssh-server service

Using SSH client tools

Using ssh for remote login

TIP

Using ssh for remote execution

Copying files between systems with scp and rsync

Interactive copying with sftp

Using key-based (passwordless) authentication

Configuring System Logging

Enabling system logging with rsyslog

Understanding the rsyslog.conf file

Understanding the messages log file

Setting up and using a loghost with rsyslogd

On the client side

On the loghost side

Watching logs with logwatch

Checking System Resources with sar

Checking System Space

Displaying system space with df

Checking disk usage with du

Finding disk consumption with find

NOTE

TIP

Managing Servers in the Enterprise

Summary

Exercises

CHAPTER 14 Administering Networking. IN THIS CHAPTER

Configuring Networking for Desktops

Checking your network interfaces

Checking your network from NetworkManager

Checking your network from Cockpit

Checking your network from the command line

Viewing network interfaces

Checking routing information

Viewing the host and domain names

Configuring network interfaces

Setting IP addresses manually

Setting IP address aliases

Setting routes

Configuring a network proxy connection

Configuring Networking from the Command Line

Configure networking with nmtui

Editing a NetworkManager TUI connection

Understanding networking configuration files

Network interface files

Other networking files

/etc/sysconfig/network file

/etc/hostname file

/etc/hosts file

/etc/resolv.conf file

/etc/nsswitch.conf

Setting alias network interfaces

Setting up Ethernet channel bonding

Setting custom routes

Configuring Networking in the Enterprise

Configuring Linux as a router

Configuring Linux as a DHCP server

Configuring Linux as a DNS server

CAUTION

Configuring Linux as a proxy server

Summary

Exercises

CHAPTER 15 Starting and Stopping Services. IN THIS CHAPTER

NOTE

Understanding the Initialization Daemon (init or systemd)

Understanding the classic init daemons

CAUTION

Understanding systemd initialization

Learning systemd basics

Learning systemd's backward compatibility to SysVinit

Checking the Status of Services

Checking services for SysVinit systems

Stopping and Starting Services

Stopping and starting SysVinit services

Stopping a service with systemd

Starting a service with systemd

Restarting a service with systemd

Reloading a service with systemd

Enabling Persistent Services

Configuring persistent services for SysVinit

Enabling a service with systemd

Disabling a service with systemd

Configuring a Default Runlevel or Target Unit

Configuring the SysVinit default runlevel

Adding New or Customized Services

Adding new services to SysVinit

Step 1: Create a new or customized service script file

Step 2: Add the service script to /etc/rc.d/init.d

Step 3: Set appropriate permission on the script

Step 4: Add the service to runlevel directories

Adding new services to systemd

Step 1: Create a new or customized service configuration unit file

Step 2: Move the service configuration unit file

TIP

Step 3: Add the service to the Wants directory

TIP

Summary

Exercises

CHAPTER 16 Configuring a Print Server. IN THIS CHAPTER

Common UNIX Printing System

Printing Directly from Windows to CUPS

Setting Up Printers

Adding a printer automatically

Using web-based CUPS administration

Allow remote printing administration

Add a printer not automatically detected

Using the Print Settings window

Configuring local printers with the Print Settings window

Adding a local printer

Editing a local printer

Configuring remote printers

Adding a remote CUPS printer

Adding a remote UNIX (LDP/LPR) printer

TIP

Adding a Windows (SMB) printer

CAUTION

TIP

Working with CUPS Printing

Configuring the CUPS server (cupsd.conf)

Starting the CUPS server

Configuring CUPS printer options manually

Using Printing Commands

Printing with lp

Listing status with lpstat -t

Removing print jobs with lprm

Configuring Print Servers

Configuring a shared CUPS printer

Configuring a shared Samba printer

Understanding smb.conf for printing

Setting up SMB clients

TIP

Summary

Exercises

CHAPTER 17 Configuring a Web Server. IN THIS CHAPTER

Understanding the Apache Web Server

NOTE

Getting and Installing Your Web Server

Understanding the httpd package

Installing Apache

Starting Apache

Securing Apache

Apache file permissions and ownership

Apache and firewalls

Apache and SELinux

Understanding the Apache configuration files

NOTE

Using directives

NOTE

Understanding default settings

Adding a virtual host to Apache

NOTE

NOTE

Allowing users to publish their own web content

Securing your web traffic with SSL/TLS

NOTE

Understanding how SSL is configured

Generating an SSL key and self‐signed certificate

Generating a certificate signing request

Troubleshooting Your Web Server

Checking for configuration errors

NOTE

Accessing forbidden and server internal errors

NOTE

Summary

Exercises

CHAPTER 18 Configuring an FTP Server. IN THIS CHAPTER

Understanding FTP

NOTE

Installing the vsftpd FTP Server

Starting the vsftpd Service

Securing Your FTP Server

Opening up your firewall for FTP

NOTE

NOTE

Configuring SELinux for your FTP server

Relating Linux file permissions to vsftpd

Configuring Your FTP Server

Setting up user access

Allowing uploading

Setting up vsftpd for the Internet

Using FTP Clients to Connect to Your Server

Accessing an FTP server from Firefox

Accessing an FTP server with the lftp command

Using the gFTP client

Summary

Exercises

CHAPTER 19 Configuring a Windows File Sharing (Samba) Server. IN THIS CHAPTER

Understanding Samba

Installing Samba

Starting and Stopping Samba

Starting the Samba (smb) service

Starting the NetBIOS (nmbd) name server

Stopping the Samba (smb) and NetBIOS (nmb) services

Securing Samba

Configuring firewalls for Samba

Configuring SELinux for Samba

Setting SELinux Booleans for Samba

Setting SELinux file contexts for Samba

Configuring Samba host/user permissions

Configuring Samba

Configuring the [global] section

Configuring the [homes] section

Configuring the [printers] section

Creating a Samba shared folder

Adding the shared folder to Samba

Checking the Samba share

NOTE

Restricting Samba access by network interface

Restricting Samba access by host

Restricting Samba access by user

Accessing Samba Shares

Accessing Samba shares in Linux

Accessing Samba shares from a Linux file manager

Mounting a Samba share from a Linux command line

Accessing Samba shares in Windows

Using Samba in the Enterprise

Summary

Exercises

CHAPTER 20 Configuring an NFS File Server. IN THIS CHAPTER

NOTE

Installing an NFS Server

Starting the NFS service

Sharing NFS Filesystems

Configuring the /etc/exports file

Hostnames in /etc/exports

Access options in /etc/exports

User mapping options in /etc/exports

Exporting the shared filesystems

TIP

Securing Your NFS Server

Opening up your firewall for NFS

Allowing NFS access in TCP wrappers

Configuring SELinux for your NFS server

Using NFS Filesystems

Viewing NFS shares

Manually mounting an NFS filesystem

NOTE

Mounting an NFS filesystem at boot time

TIP

Mounting noauto filesystems

TIP

Using mount options

Using autofs to mount NFS filesystems on demand

Automounting to the /net directory

Automounting home directories

Unmounting NFS filesystems

TIP

Summary

Exercises

CHAPTER 21 Troubleshooting Linux. IN THIS CHAPTER

Boot-Up Troubleshooting

Understanding Startup Methods

Starting with System V init scripts

Starting with systemd

Starting from the firmware (BIOS or UEFI)

Troubleshooting BIOS setup

Troubleshooting boot order

Troubleshooting the GRUB boot loader

The GRUB Legacy boot loader

GRUB 2 Boot loader

Starting the kernel

Troubleshooting the initialization system

Troubleshooting System V initialization

Troubleshooting rc.sysinit

Troubleshooting runlevel processes

Troubleshooting systemd initialization

Understanding the systemd boot process

Analyzing the systemd boot process

Troubleshooting Software Packages

NOTE

NOTE

Using cron for Software Updates

Fixing RPM databases and cache

Troubleshooting Networking

Troubleshooting outgoing connections

View network interfaces

Check physical connections

Check routes

Check hostname resolution

Troubleshooting incoming connections

Check if the client can reach your system at all

Check if the service is available to the client

Check the firewall on the server

Check the service on the server

Troubleshooting Memory

Uncovering memory issues

Checking for memory problems

Dealing with memory problems

NOTE

Troubleshooting in Rescue Mode

Summary

Exercises

Part V Learning Linux Security Techniques. IN THIS PART

CHAPTER 22 Understanding Basic Linux Security. IN THIS CHAPTER

Implementing Physical Security

Implementing disaster recovery

CAUTION

Securing user accounts

One user per user account

Limiting access to the root user account

Setting expiration dates on temporary accounts

TIP

Removing unused user accounts

Securing passwords

Choosing good passwords

TIP

Setting and changing passwords

Enforcing best password practices

TIP

NOTE

Understanding the password files and password hashes

NOTE

CAUTION

Securing the filesystem

Managing dangerous filesystem permissions

Securing the password files

NOTE

Locking down the filesystem

Managing software and services

Updating software packages

Keeping up with security advisories

Advanced implementation

Monitoring Your Systems

Monitoring log files

Monitoring user accounts

Detecting counterfeit new accounts and privileges

NOTE

Detecting bad account passwords

TIP

CAUTION

Monitoring the filesystem

Verifying software packages

NOTE

Scanning the filesystem

Detecting viruses and rootkits

Monitoring for viruses

TIP

Monitoring for rootkits

TIP

TIP

Detecting an intrusion

Auditing and Reviewing Linux

Conducting compliance reviews

Conducting security reviews

Summary

Exercises

CHAPTER 23 Understanding Advanced Linux Security. IN THIS CHAPTER

Implementing Linux Security with Cryptography

Understanding hashing

Understanding encryption/decryption

Understanding cryptographic ciphers

Understanding cryptographic cipher keys

Symmetric key cryptography

Encrypting and decrypting a tar archive file

Asymmetric key cryptography

Generating a key pair

Sharing a public key

Encrypting an email message

Understanding digital signatures

NOTE

Signing a file with a digital signature

TIP

Implementing Linux cryptography

Ensuring file integrity

Encrypting a Linux filesystem at installation

NOTE

Encrypting a Linux directory

TIP

TIP

TIP

Encrypting a Linux file

CAUTION

Encrypting Linux with miscellaneous tools

Using Encryption from the Desktop

Implementing Linux Security with PAM

Understanding the PAM authentication process

Understanding PAM contexts

Understanding PAM control flags

Understanding PAM modules

NOTE

CAUTION

TIP

Administering PAM on your Linux system

Managing PAM-aware application configuration files

Managing PAM system event configuration files

NOTE

NOTE

Implementing time restrictions with PAM

NOTE

Enforcing good passwords with PAM

NOTE

NOTE

NOTE

Encouraging sudo use with PAM

Obtaining more information on PAM

Summary

Exercises

CHAPTER 24 Enhancing Linux Security with SELinux. IN THIS CHAPTER

Understanding SELinux Benefits

NOTE

Understanding How SELinux Works

Understanding Type Enforcement

Understanding Multi-Level Security

TIP

Implementing SELinux security models

Understanding SELinux operational modes

Using the disabled mode

TIP

Using the permissive mode

Using the Enforcing mode

Understanding SELinux security contexts

Users have security contexts

Files have security contexts

Processes have security contexts

Understanding SELinux Policy types

NOTE

Targeted policy

MLS (Multi-Level Security) policy

Minimum policy

Understanding SELinux policy rule packages

Configuring SELinux

Setting the SELinux mode

CAUTION

Setting the SELinux policy type

NOTE

Managing SELinux security contexts

Managing the user security context

Managing the file security context

Managing the process security context

Managing SELinux policy rule packages

Managing SELinux via Booleans

Monitoring and Troubleshooting SELinux

Understanding SELinux logging

NOTE

Reviewing SELinux messages in the audit log

Reviewing SELinux messages in the messages log

Troubleshooting SELinux logging

CAUTION

Troubleshooting common SELinux problems

Using a nonstandard directory for a service

Using a nonstandard port for a service

Moving files and losing security context labels

Booleans set incorrectly

Putting It All Together

Obtaining More Information on SELinux

Summary

Exercises

CHAPTER 25 Securing Linux on a Network. IN THIS CHAPTER

Auditing Network Services

Evaluating access to network services with nmap

NOTE

Using nmap to audit your network services advertisements

TIP

TIP

NOTE

CAUTION

Working with Firewalls

Understanding firewalls

NOTE

Implementing firewalls

TIP

Starting with firewalld

Changing firewall rules with Cockpit

Understanding the iptables utility

netfilter/iptables tables

netfilter/iptables chains

netfilter/iptables rules, policies, and targets

TIP

Using the iptables utility

TIP

Modifying iptables policies and rules

Setting a policy of Drop

TIP

Blocking a source IP address

Blocking a protocol and port

Saving an iptables configuration

NOTE

Summary

Exercises

Part VI Engaging with Cloud Computing. IN THIS PART

CHAPTER 26 Shifting to Clouds and Containers. IN THIS CHAPTER

Understanding Linux Containers

Namespaces

Container registries

Base images and layers

Starting with Linux Containers

Pulling and running containers

Pulling a container

Running a shell from a container

Running an FTP server from a container

Starting and stopping containers

Building a container image

Build a simple container image

Build an FTP container from GitHub

Tagging and pushing an image to a registry

Using containers in the enterprise

Summary

Exercises

CHAPTER 27 Using Linux for Cloud Computing. IN THIS CHAPTER

Overview of Linux and Cloud Computing

Cloud hypervisors (aka compute nodes)

Cloud controllers

Cloud storage

Cloud authentication

Cloud deployment and configuration

Cloud platforms

Trying Basic Cloud Technology

Setting Up a Small Cloud

NOTE

Configuring hypervisors

Step 1: Get Linux software

Step 2: Check your computers

Step 3: Install Linux on hypervisors

Step 4: Start services on the hypervisors

Step 5: Edit /etc/hosts, or set up DNS

Configuring storage

Step 1: Install Linux software

Step 2: Configure NFS share

Step 3: Start the NFS service

Step 4: Mount the NFS share on the hypervisors

Creating virtual machines

Step 1: Get images to make virtual machines

Step 2: Check the network bridge

Step 3: Start Virtual Machine Manager (virt-manager)

Step 4: Check connection details

Step 5: Create a new virtual machine

Managing virtual machines

Migrating virtual machines

Step 1: Identify other hypervisors

Step 2: Migrate running VM to Other hypervisor

Summary

Exercises

CHAPTER 28 Deploying Linux to the Cloud. IN THIS CHAPTER

Getting Linux to Run in a Cloud

Creating Linux Images for Clouds

Configuring and running a cloud-init cloud instance

Investigating the cloud instance

Cloning the cloud instance

Expanding your cloud-init configuration

NOTE

Adding ssh keys with cloud-init

Adding software with cloud-init

Using cloud-init in enterprise computing

Using OpenStack to Deploy Cloud Images

Starting from the OpenStack Dashboard

Configuring your OpenStack virtual network

Configuring keys for remote access

Launching a virtual machine in OpenStack

Accessing the virtual machine via ssh

Using Amazon EC2 to Deploy Cloud Images

Summary

Exercises

CHAPTER 29 Automating Apps and Infrastructure with Ansible. IN THIS CHAPTER

Understanding Ansible

Exploring Ansible Components

Inventories

Playbooks

Plays

Tasks

Modules

Roles, imports, and includes

Stepping Through an Ansible Deployment

Prerequisites

Setting up SSH keys to each node

Installing Ansible

Creating an inventory

Authenticating to the hosts

Creating a playbook

Run the playbook

Running Ad-Hoc Ansible Commands

Trying ad-hoc commands

Automating Tasks with Ansible Tower Automation Framework

Summary

Exercises

CHAPTER 30 Deploying Applications as Containers with Kubernetes. IN THIS CHAPTER

Understanding Kubernetes

Kubernetes masters

Kubernetes workers

Kubernetes applications

Kubernetes interfaces

Trying Kubernetes

NOTE

Getting Kubernetes

Starting the Kubernetes Basics Tutorial

Starting Minikube

Running the Kubernetes Basics tutorial

Get information about your cluster

Deploy a Kubernetes application

Get information on the deployment's pods

Expose applications with services

Label a service

Delete a service

Scale up an application

Check the load balancer

Scale down an application

Enterprise-Quality Kubernetes with OpenShift

Summary

Exercises

Part VII Appendixes. IN THIS PART

APPENDIX A Media. IN THIS APPENDIX

NOTE

Getting Fedora. NOTE

Getting Red Hat Enterprise Linux

NOTE

Getting Ubuntu

Booting Linux from a USB Drive

Creating Linux CDs and DVDs

Burning CDs/DVDs in Windows

Burning CDs/DVDs on a MacOS system

Burning CDs/DVDs in Linux

Burning CDs or DVDs from a Linux desktop

Burning CDs or DVDs from a Linux command line

APPENDIX B Exercise Answers

Chapter 1: Starting with Linux

Chapter 2: Creating the Perfect Linux Desktop

Chapter 3: Using the Shell

Chapter 4: Moving Around the Filesystem

Chapter 5: Working with Text Files

Chapter 6: Managing Running Processes

Chapter 7: Writing Simple Shell Scripts

Chapter 8: Learning System Administration

Chapter 9: Installing Linux

Chapter 10: Getting and Managing Software

Chapter 11: Managing User Accounts

Chapter 12: Managing Disks and Filesystems

Chapter 13: Understanding Server Administration

Chapter 14: Administering Networking

Chapter 15: Starting and Stopping Services

Chapter 16: Configuring a Print Server

Chapter 17: Configuring a Web Server

Chapter 18: Configuring an FTP Server. CAUTION

Chapter 19: Configuring a Windows File Sharing (Samba) Server

Chapter 20: Configuring an NFS File Server

Chapter 21: Troubleshooting Linux

Chapter 22: Understanding Basic Linux Security

Chapter 23: Understanding Advanced Linux Security

Chapter 24: Enhancing Linux Security with SELinux

Chapter 25: Securing Linux on a Network

Chapter 26: Shifting to Clouds and Containers

Chapter 27: Using Linux for Cloud Computing

Chapter 28: Deploying Linux to the Cloud

Chapter 29: Automating Apps and Infrastructure with Ansible

Chapter 30: Deploying Applications as Containers with Kubernetes

Index

About the Author

About the Technical Editors

Acknowledgments

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Tenth Edition

Christopher Negus

.....

Instead of just selling RHEL, Red Hat offers an ecosystem of benefits upon which Linux customers could draw. To use RHEL, customers buy subscriptions that they can use to deploy any version of RHEL that they desire. If they decommission a RHEL system, they can use the subscription to deploy another system.

Different levels of support are available for RHEL, depending on customer needs. Customers can be assured that, along with support, they can get hardware and third-party software that is certified to work with RHEL. They can get Red Hat consultants and engineers to help them put together the computing environments they need. They can also get training and certification exams for their employees (see the discussion of RHCE certification later in this chapter).

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Linux Bible
Подняться наверх