Book description
“As this book shows, Linux systems are just as functional,
secure, and reliable as their proprietary counterparts. Thanks to
the ongoing efforts of thousands of Linux developers, Linux is more
ready than ever for deployment at the frontlines of the real world.
The authors of this book know that terrain well, and I am happy to
leave you in their most capable hands.”
—Linus Torvalds
“The most successful sysadmin book of all
time—because it works!”
—Rik Farrow, editor of ;login:
“This book clearly explains current technology with the
perspective of decades of experience in large-scale system
administration. Unique and highly recommended.”
—Jonathan Corbet, cofounder, LWN.net
“Nemeth et al. is the overall winner for Linux
administration: it’s intelligent, full of insights, and looks
at the implementation of concepts.”
—Peter Salus, editorial director,
Matrix.net
Since 2001, Linux Administration Handbook has been the definitive resource for every Linux® system administrator who must efficiently solve technical problems and maximize the reliability and performance of a production environment. Now, the authors have systematically updated this classic guide to address today’s most important Linux distributions and most powerful new administrative tools.
The authors spell out detailed best practices for every facet of system administration, including storage management, network design and administration, web hosting, software configuration management, performance analysis, Windows interoperability, and much more. Sysadmins will especially appreciate the thorough and up-to-date discussions of such difficult topics such as DNS, LDAP, security, and the management of IT service organizations.
Linux® Administration Handbook, Second Edition, reflects the current versions of these leading distributions:
Red Hat® Enterprise Linux®
FedoraTM Core
SUSE® Linux Enterprise
Debian® GNU/Linux
Ubuntu® Linux
Sharing their war stories and hard-won insights, the authors capture the behavior of Linux systems in the real world, not just in ideal environments. They explain complex tasks in detail and illustrate these tasks with examples drawn from their extensive hands-on experience.
Table of contents
- Title Page
- Copyright Page
- Contents
- Foreword to the First Edition
- Preface
- Acknowledgments
-
Section One: Basic Administration
-
1. Where to Start
- 1.1. Suggested background
- 1.2. Linux’s relationship to UNIX
- 1.3. Linux in historical context
- 1.4. Linux distributions
- 1.5. Notation and typographical conventions
- 1.6. Where to go for information
- 1.7. How to find and install software
- 1.8. Essential tasks of the system administrator
- 1.9. System administration under duress
- 1.10. Recommended reading
- 1.11. Exercises
- 2. Booting and Shutting Down
- 3. Rootly Powers
-
4. Controlling Processes
- 4.1. Components of a process
- 4.2. The life cycle of a process
- 4.3. Signals
- 4.4. kill and killall: send signals
- 4.5. Process states
- 4.6. nice and renice: influence scheduling priority
- 4.7. ps: monitor processes
- 4.8. top: monitor processes even better
- 4.9. The /proc filesystem
- 4.10. strace: trace signals and system calls
- 4.11. Runaway processes
- 4.12. Recommended reading
- 4.13. Exercises
- 5. The Filesystem
- 6. Adding New Users
-
7. Adding a Disk
- 7.1. Disk interfaces
- 7.2. Disk geometry
- 7.3. Linux filesystems
- 7.4. An overview of the disk installation procedure
- 7.5. hdparm: set IDE interface parameters
- 7.6. fsck: check and repair filesystems
- 7.7. Adding a disk: a step-by-step guide
- 7.8. Advanced disk management: RAID and LVM
- 7.9. Mounting USB drives
- 7.10. Exercises
- 8. Periodic Processes
-
9. Backups
- 9.1. Motherhood and apple pie
- 9.2. Backup devices and media
- 9.3. Setting up an incremental backup regime with dump
- 9.4. Restoring from dumps with restore
- 9.5. Dumping and restoring for upgrades
- 9.6. Using other archiving programs
- 9.7. Using multiple files on a single tape
- 9.8. Bacula
- 9.9. Commercial backup products
- 9.10. Recommended reading
- 9.11. Exercises
- 10. Syslog and Log Files
-
11. Software and Configuration Management
- 11.1. Basic Linux installation
- 11.2. Diskless clients
- 11.3. Package management
- 11.4. High-level package management systems
- 11.5. Revision control
- 11.6. Localization and configuration
- 11.7. Configuration management tools
- 11.8. Sharing software over NFS
- 11.9. Recommended software
- 11.10. Recommended reading
- 11.11. Exercises
-
1. Where to Start
-
Section Two: Networking
-
12. TCP/IP Networking
- 12.1. TCP/IP and the Internet
- 12.2. Networking road map
- 12.3. Packets and encapsulation
- 12.4. IP addresses: the gory details
- 12.5. Routing
- 12.6. ARP: the address resolution protocol
- 12.7. Addition of a machine to a network
- 12.8. Distribution-specific network configuration
- 12.9. DHCP: the Dynamic Host Configuration Protocol
- 12.10. Dynamic reconfiguration and tuning
- 12.11. Security issues
- 12.12. Linux NAT
- 12.13. PPP: the Point-to-Point Protocol
- 12.14. Linux networking quirks
- 12.15. Recommended reading
- 12.16. Exercises
- 13. Routing
-
14. Network Hardware
- 14.1. LAN, WAN, or MAN?
- 14.2. Ethernet: the common LAN
- 14.3. Wireless: nomad’s LAN
- 14.4. FDDI: the disappointing, expensive, and outdated LAN
- 14.5. ATM: the promised (but sorely defeated) LAN
- 14.6. Frame relay: the sacrificial WAN
- 14.7. ISDN: the indigenous WAN
- 14.8. DSL and cable modems: the people’s WAN
- 14.9. Where is the network going?
- 14.10. Network testing and debugging
- 14.11. Building wiring
- 14.12. Network design issues
- 14.13. Management issues
- 14.14. Recommended vendors
- 14.15. Recommended reading
- 14.16. Exercises
-
15. DNS: The Domain Name System
- 15.1. DNS for the impatient: adding a new machine
- 15.2. The history of DNS
- 15.3. Who needs DNS?
- 15.4. The DNS namespace
- 15.5. How DNS works
- 15.6. What’s new in DNS
- 15.7. The DNS database
- 15.8. The BIND software
- 15.9. Designing your DNS environment
- 15.10. BIND client issues
- 15.11. BIND server configuration
- 15.12. BIND configuration examples
- 15.13. Starting named
- 15.14. Updating zone files
- 15.15. Security issues
- 15.16. Testing and debugging
- 15.17. Distribution specifics
- 15.18. Recommended reading
- 15.19. Exercises
- 16. The Network File System
- 17. Sharing System Files
-
18. Electronic Mail
- 18.1. Mail systems
- 18.2. The anatomy of a mail message
- 18.3. Mail philosophy
- 18.4. Mail aliases
- 18.5. Mailing lists and list wrangling software
- 18.6. sendmail: ringmaster of the electronic mail circus
- 18.7. sendmail configuration
- 18.8. Basic sendmail configuration primitives
- 18.9. Fancier sendmail configuration primitives
- 18.10. Spam-related features in sendmail
- 18.11. Configuration file case study
- 18.12. Security and sendmail
- 18.13. sendmail performance
- 18.14. sendmail statistics, testing, and debugging
- 18.15. The Exim Mail System
- 18.16. Postfix
- 18.17. Recommended reading
- 18.18. Exercises
-
19. Network Management and Debugging
- 19.1. Network troubleshooting
- 19.2. ping: check to see if a host is alive
- 19.3. traceroute: trace IP packets
- 19.4. netstat: get network statistics
- 19.5. sar: inspect live interface activity
- 19.6. Packet sniffers
- 19.7. Network management protocols
- 19.8. SNMP: the Simple Network Management Protocol
- 19.9. The NET-SMNP agent
- 19.10. Network management applications
- 19.11. Recommended reading
- 19.12. Exercises
-
20. Security
- 20.1. Is Linux secure?
- 20.2. How security is compromised
- 20.3. Certifications and standards
- 20.4. Security tips and philosophy
- 20.5. Security problems in /etc/passwd and /etc/shadow
- 20.6. POSIX capabilities
- 20.7. Setuid programs
- 20.8. Important file permissions
- 20.9. Miscellaneous security issues
- 20.10. Security power tools
- 20.11. Cryptographic security tools
- 20.12. Firewalls
- 20.13. Linux firewall features: IP tables
- 20.14. Virtual private networks (VPNs)
- 20.15. Hardened Linux distributions
- 20.16. What to do when your site has been attacked
- 20.17. Sources of security information
- 20.18. Recommended reading
- 20.19. Exercises
- 21. Web Hosting and Internet Servers
-
12. TCP/IP Networking
-
Section Three: Bunch O’ Stuff
- 22. The X Window System
- 23. Printing
- 24. Maintenance and Environment
- 25. Performance Analysis
-
26. Cooperating with Windows
- 26.1. Logging in to a Linux system from Windows
- 26.2. Accessing remote desktops
- 26.3. Running Windows and Windows-like applications
- 26.4. Using command-line tools with Windows
- 26.5. Windows compliance with email and web standards
- 26.6. Sharing files with Samba and CIFS
- 26.7. Sharing printers with Samba
- 26.8. Debugging Samba
- 26.9. Recommended reading
- 26.10. Exercises
-
27. Serial Devices
- 27.1. The RS-232C standard
- 27.2. Alternative connectors
- 27.3. Hard and soft carrier
- 27.4. Hardware flow control
- 27.5. Cable length
- 27.6. Serial device files
- 27.7. setserial: set serial port parameters
- 27.8. Software configuration for serial devices
- 27.9. Configuration of hardwired terminals
- 27.10. Special characters and the terminal driver
- 27.11. stty: set terminal options
- 27.12. tset: set options automatically
- 27.13. Terminal unwedging
- 27.14. Modems
- 27.15. Debugging a serial line
- 27.16. Other common I/O ports
- 27.17. Exercises
-
28. Drivers and the Kernel
- 28.1. Kernel adaptation
- 28.2. Drivers and device files
- 28.3. Why and how to configure the kernel
- 28.4. Tuning Linux kernel parameters
- 28.5. Building a Linux kernel
- 28.6. Adding a Linux device driver
- 28.7. Loadable kernel modules
- 28.8. Hot-plugging
- 28.9. Setting bootstrap options
- 28.10. Recommended reading
- 28.11. Exercises
-
29. Daemons
- 29.1. init: the primordial process
- 29.2. cron and atd: schedule commands
- 29.3. xinetd and inetd: manage daemons
- 29.4. Kernel daemons
- 29.5. Printing daemons
- 29.6. File service daemons
- 29.7. Administrative database daemons
- 29.8. Electronic mail daemons
- 29.9. Remote login and command execution daemons
- 29.10. Booting and configuration daemons
- 29.11. Other network daemons
- 29.12. ntpd: time synchronization daemon
- 29.13. Exercises
-
30. Management, Policy, and Politics
- 30.1. Make everyone happy
- 30.2. Components of a functional IT organization
- 30.3. The role of management
- 30.4. The role of administration
- 30.5. The role of development
- 30.6. The role of operations
- 30.7. The work of support
- 30.8. Documentation
- 30.9. Request-tracking and trouble-reporting systems
- 30.10. Disaster recovery
- 30.11. Written policy
- 30.12. Legal Issues
- 30.13. Software patents
- 30.14. Standards
- 30.15. Linux culture
- 30.16. Mainstream Linux
- 30.17. Organizations, conferences, and other resources
- 30.18. Recommended Reading
- 30.19. Exercises
- About the Contributors
- About the Authors
- Colophon
- Index
Product information
- Title: Linux Administration Handbook, Second Edition
- Author(s):
- Release date: October 2006
- Publisher(s): Pearson
- ISBN: 9780137002900
You might also like
book
UNIX and Linux System Administration Handbook, 5th Edition
UNIX and Linux System Administration Handbook, Fifth Edition is today’s definitive guide to installing, configuring and …
book
Practical Linux System Administration
This essential guide covers all aspects of Linux system administration, from user maintenance, backups, filesystem housekeeping, …
book
Mastering Linux System Administration
Achieve Linux system administration mastery with time-tested and proven techniques In Mastering Linux System Administration, Linux …
book
Mastering Linux Administration
Develop advanced skills for working with Linux systems on-premises and in the cloud Key Features Become …