Book description
“As an author, editor, and publisher, I never paid much attention to the competition—except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against.”
—Tim O’Reilly, founder of O’Reilly Media
“This edition is for those whose systems live in the cloud or in virtualized data centers; those whose administrative work largely takes the form of automation and configuration source code; those who collaborate closely with developers, network engineers, compliance officers, and all the other worker bees who inhabit the modern hive.”
—Paul Vixie, Internet Hall of Fame-recognized innovator and founder of ISC and Farsight Security
“This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems’ history but doesn’t bloviate. It’s just straight-forward information delivered in a colorful and memorable fashion.”
—Jason A. Nunnelley
UNIX® and Linux® System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure.
Updated for new distributions and cloud environments, this comprehensive guide covers best practices for every facet of system administration, including storage management, network design and administration, security, web hosting, automation, configuration management, performance analysis, virtualization, DNS, security, and the management of IT service organizations. The authors—world-class, hands-on technologists—offer indispensable new coverage of cloud platforms, the DevOps philosophy, continuous deployment, containerization, monitoring, and many other essential topics.
Whatever your role in running systems and networks built on UNIX or Linux, this conversational, well-written guide will improve your efficiency and help solve your knottiest problems.
Table of contents
- Full Table of Contents
- Tribute to Evi
- Preface
- Foreword
- Acknowledgments
-
Where to Start
- 1.1 Essential duties of a system administrator
- 1.2 Suggested background
- 1.3 Linux distributions
- 1.4 Example systems used in this book
- 1.5 Notation and typographical conventions
- 1.6 Units
- 1.7 Man pages and other on-line documentation
- 1.8 Other authoritative documentation
- 1.9 Other sources of information
- 1.10 Ways to find and install software
- 1.11 Where to host
- 1.12 Specialization and adjacent disciplines
- 1.13 Recommended reading
- Booting and System Management Daemons
- Access Control and Rootly Powers
- Process Control
- The Filesystem
- Software Installation and Management
- Scripting and the Shell
-
User Management
- 8.1 Account mechanics
- 8.2 The /etc/passwd file
- 8.3 The Linux /etc/shadow file
- 8.4 FreeBSD's /etc/master.passwd and /etc/login.conf files
- 8.5 The /etc/group file
- 8.6 Manual steps for adding users
- 8.7 Scripts for adding users: useradd, adduser, and newusers
- 8.8 Safe removal of a user’s account and files
- 8.9 User login lockout
- 8.10 Risk reduction with PAM
- 8.11 Centralized account management
- Cloud Computing
- Logging
-
Drivers and the Kernel
- 11.1 Kernel chores for system administrators
- 11.2 Kernel version numbering
- 11.3 Devices and their drivers
- 11.4 Linux kernel configuration
- 11.5 FreeBSD kernel configuration
- 11.6 Loadable kernel modules
- 11.7 Booting
- 11.8 Booting alternate kernels in the cloud
- 11.9 Kernel errors
- 11.10 Recommended reading
- Printing
-
TCP/IP Networking
- 13.1 TCP/IP and its relationship to the Internet
- 13.2 Networking basics
- 13.3 Packet addressing
- 13.4 IP addresses: the gory details
- 13.5 Routing
- 13.6 IPv4 ARP and IPv6 neighbor discovery
- 13.7 DHCP: the Dynamic Host Configuration Protocol
- 13.8 Security issues
- 13.9 Basic network configuration
- 13.10 Linux networking
- 13.11 FreeBSD networking
- 13.12 Network troubleshooting
- 13.13 Network monitoring
- 13.14 Firewalls and NAT
- 13.15 Cloud networking
- 13.16 Recommended reading
- Physical Networking
- IP Routing
- DNS: The Domain Name System
- Single Sign-On
- Electronic Mail
- Web Hosting
-
Storage
- 20.1 I just want to add a disk!
- 20.2 Storage hardware
- 20.3 Storage hardware interfaces
- 20.4 Attachment and low-level management of drives
- 20.5 The software side of storage: peeling the onion
- 20.6 Disk partitioning
- 20.7 Logical volume management
- 20.8 RAID: redundant arrays of inexpensive disks
- 20.9 Filesystems
- 20.10 Traditional filesystems: UFS, ext4, and XFS
- 20.11 Next-generation filesystems: ZFS and Btrfs
- 20.12 ZFS: all your storage problems solved
- 20.13 Btrfs: “ZFS lite” for Linux
- 20.14 Data backup strategy
- 20.15 Recommended reading
- The Network File System
- SMB
- Configuration Management
- Virtualization
- Containers
- Continuous Integration and Delivery
-
Security
- 27.1 Elements of security
- 27.2 How security is compromised
- 27.3 Basic security measures
- 27.4 Passwords and user accounts
- 27.5 Security power tools
- 27.6 Cryptography primer
- 27.7 SSH, the Secure SHell
- 27.8 Firewalls
- 27.9 Virtual private networks (VPNs)
- 27.10 Certifications and standards
- 27.11 Sources of security information
- 27.12 When your site has been attacked
- 27.13 Recommended reading
-
Monitoring
- 28.1 An overview of monitoring
- 28.2 The monitoring culture
- 28.3 The monitoring platforms
- 28.4 Data collection
- 28.5 Network monitoring
- 28.6 Systems monitoring
- 28.7 Application monitoring
- 28.8 Security monitoring
- 28.9 SNMP: the Simple Network Management Protocol
- 28.10 Tips and tricks for monitoring
- 28.11 Recommended reading
- Performance Analysis
- Data Center Basics
-
Methodology, Policy, and Politics
- 31.1 The grand unified theory: DevOps
- 31.2 Ticketing and task management systems
- 31.3 Local documentation maintenance
- 31.4 Environment separation
- 31.5 Disaster management
- 31.6 IT policies and procedures
- 31.7 Service level agreements
- 31.8 Compliance: regulations and standards
- 31.9 Legal issues
- 31.10 Organizations, conferences, and other resources
- 31.11 Recommended reading
- A Brief History of System Administration
- Colophon
- About the Contributors
- About the Authors
- Index
Product information
- Title: UNIX and Linux System Administration Handbook, 5th Edition
- Author(s):
- Release date: September 2017
- Publisher(s): Addison-Wesley Professional
- ISBN: 9780134278308
You might also like
book
Software Engineering at Google
Today, software engineers need to know not only how to program effectively but also how to …
book
Automate the Boring Stuff with Python
Automate the Boring Stuff with Python teaches simple programming skills to automate everyday computer tasks.
book
Fluent Python
Python’s simplicity lets you become productive quickly, but this often means you aren’t using everything it …
book
Python for DevOps
Much has changed in technology over the past decade. Data is hot, the cloud is ubiquitous, …