Red Hat® Enterprise Linux® 5 Administration Unleashed

Book description

This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.

Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat’s most valuable tools for monitoring and optimization and presents thorough coverage of security—including a detailed introduction to Security-Enhanced Linux (SELinux).

  • Streamline deployment with Kickstart

  • Find, install, update, remove, and verify software

  • Detect, analyze, and manage hardware

  • Manage storage with LVM, RAID, ACLs, and quotas

  • Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems

  • Administer users and groups more efficiently and securely

  • Ensure trustworthy backup and rapid recovery

  • Script and schedule tasks to run automatically

  • Provide unified identity management services

  • Configure Apache, BIND, Samba, and Sendmail

  • Monitor and tune the kernel and individual applications

  • Protect against intruders with SELinux and ExecShield

  • Set up firewalls with iptables

  • Enable the Linux Auditing System

  • Use virtualization to run multiple operating systems concurrently

  • Part I     Installation and Configuration

    Chapter 1 Installing Red Hat Enterprise Linux

    Chapter 2 Post-Installation Configuration

    Chapter 3 Operating System Updates

    Part II Operating System Core Concepts

    Chapter 4 Understanding Linux Concepts 

    Chapter 5 Working with RPM Software

    Chapter 6 Analyzing Hardware

    Chapter 7 Managing Storage

    Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors

    Part III System Administration

    Chapter 9 Managing Users and Groups

    Chapter 10 Techniques for Backup and Recovery

    Chapter 11 Automating Tasks with Scripts

    Part IV Network Services

    Chapter 12 Identity Management

    Chapter 13 Network File Sharing

    Chapter 14 Granting Network Connectivity with DHCP

    Chapter 15 Creating a Web Server with the Apache HTTP Server  

    Chapter 16 Hostname Resolution with BIND

    Chapter 17 Securing Remote Logins with OpenSSH

    Chapter 18 Setting Up an Email Server with Sendmail

    Chapter 19 Explaining Other Common Network Services

    Part V Monitoring and Tuning

    Chapter 20 Monitoring System Resources  

    Chapter 21 Monitoring and Tuning the Kernel

    Chapter 22 Monitoring and Tuning Applications  

    Chapter 23 Protecting Against Intruders with Security-Enhanced Linux  

    Chapter 24 Configuring a Firewall

    Chapter 25 Linux Auditing System

    Appendixes

    Appendix A Installing Proprietary Kernel Modules 

    Appendix B Creating Virtual Machines  

    Appendix C Preventing Security Breaches with ExecShield

    Appendix D Troubleshooting

    Tammy Fox served as technical leader of Red Hat’s documentation group, where she wrote and revised The Red Hat Enterprise Linux System Administration Guide. She was founding editor of Red Hat Magazine, now an online publication reaching more than 800,000 system administrators and others interested in Linux and open source. She wrote Red Hat’s LogViewer tool and has written and contributed to several Red Hat configuration tools. Fox is also the founding leader of the Fedora Docs Project.

    Register your book at www.samspublishing.com/register for convenient access to updates and to download example scripts presented in this book.

    Category: Linux/Networking

    Covers: Red Hat Enterprise Linux 5

    User Level: Intermediate–Advanced

    Table of contents

    1. Title Page
    2. Copyright Page
    3. Contents at a Glance
    4. Table of Contents
    5. About the Author
    6. Dedication
    7. Acknowledgments
    8. We Want to Hear from You!
    9. Reader Services
    10. Foreword
    11. Introduction
    12. Part I: Installation and Configuration
      1. Chapter 1. Installing Red Hat Enterprise Linux
      2. Chapter 2. Post-Installation Configuration
      3. Chapter 3. Operating System Updates
    13. Part II: Operating System Core Concepts
      1. Chapter 4. Understanding Linux Concepts
      2. Chapter 5. Working with RPM Software
      3. Chapter 6. Analyzing Hardware
      4. Chapter 7. Managing Storage
      5. Chapter 8. 64-Bit, Multi-Core, and Hyper-Threading Technology Processors
    14. Part III: System Administration
      1. Chapter 9. Managing Users and Groups
      2. Chapter 10. Techniques for Backup and Recovery
      3. Chapter 11. Automating Tasks with Scripts
    15. Part IV: Network Services
      1. Chapter 12. Identity Management
      2. Chapter 13. Network File Sharing
      3. Chapter 14. Granting Network Connectivity with DHCP
      4. Chapter 15. Creating a Web Server with the Apache HTTP Server
      5. Chapter 16. Hostname Resolution with BIND
      6. Chapter 17. Securing Remote Logins with OpenSSH
      7. Chapter 18. Setting Up an Email Server with Sendmail
      8. Chapter 19. Explaining Other Common Network Services
    16. Part V: Monitoring and Tuning
      1. Chapter 20. Monitoring System Resources
      2. Chapter 21. Monitoring and Tuning the Kernel
      3. Chapter 22. Monitoring and Tuning Applications
    17. Part VI: Security
      1. Chapter 23. Protecting Against Intruders with Security-Enhanced Linux
      2. Chapter 24. Configuring a Firewall
      3. Chapter 25. Linux Auditing System
    18. Appendixes
      1. Appendix A. Installing Proprietary Kernel Modules
      2. Appendix B. Creating Virtual Machines
      3. Appendix C. Preventing Security Breaches with ExecShield
      4. Appendix D. Troubleshooting
    19. Index

    Product information

    • Title: Red Hat® Enterprise Linux® 5 Administration Unleashed
    • Author(s): Tammy Fox
    • Release date: April 2007
    • Publisher(s): Sams
    • ISBN: None