You are previewing Red Hat.
O'Reilly logo
Red Hat

Book Description

This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.

Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat’s most valuable tools for monitoring and optimization and presents thorough coverage of security—including a detailed introduction to Security-Enhanced Linux (SELinux).

  • Streamline deployment with Kickstart

  • Find, install, update, remove, and verify software

  • Detect, analyze, and manage hardware

  • Manage storage with LVM, RAID, ACLs, and quotas

  • Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems

  • Administer users and groups more efficiently and securely

  • Ensure trustworthy backup and rapid recovery

  • Script and schedule tasks to run automatically

  • Provide unified identity management services

  • Configure Apache, BIND, Samba, and Sendmail

  • Monitor and tune the kernel and individual applications

  • Protect against intruders with SELinux and ExecShield

  • Set up firewalls with iptables

  • Enable the Linux Auditing System

  • Use virtualization to run multiple operating systems concurrently

Part I     Installation and Configuration

Chapter 1 Installing Red Hat Enterprise Linux

Chapter 2 Post-Installation Configuration

Chapter 3 Operating System Updates

Part II Operating System Core Concepts

Chapter 4 Understanding Linux Concepts 

Chapter 5 Working with RPM Software

Chapter 6 Analyzing Hardware

Chapter 7 Managing Storage

Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors

Part III System Administration

Chapter 9 Managing Users and Groups

Chapter 10 Techniques for Backup and Recovery

Chapter 11 Automating Tasks with Scripts

Part IV Network Services

Chapter 12 Identity Management

Chapter 13 Network File Sharing

Chapter 14 Granting Network Connectivity with DHCP

Chapter 15 Creating a Web Server with the Apache HTTP Server  

Chapter 16 Hostname Resolution with BIND

Chapter 17 Securing Remote Logins with OpenSSH

Chapter 18 Setting Up an Email Server with Sendmail

Chapter 19 Explaining Other Common Network Services

Part V Monitoring and Tuning

Chapter 20 Monitoring System Resources  

Chapter 21 Monitoring and Tuning the Kernel

Chapter 22 Monitoring and Tuning Applications  

Chapter 23 Protecting Against Intruders with Security-Enhanced Linux  

Chapter 24 Configuring a Firewall

Chapter 25 Linux Auditing System

Appendixes

Appendix A Installing Proprietary Kernel Modules 

Appendix B Creating Virtual Machines  

Appendix C Preventing Security Breaches with ExecShield

Appendix D Troubleshooting

Tammy Fox served as technical leader of Red Hat’s documentation group, where she wrote and revised The Red Hat Enterprise Linux System Administration Guide. She was founding editor of Red Hat Magazine, now an online publication reaching more than 800,000 system administrators and others interested in Linux and open source. She wrote Red Hat’s LogViewer tool and has written and contributed to several Red Hat configuration tools. Fox is also the founding leader of the Fedora Docs Project.

Register your book at www.samspublishing.com/register for convenient access to updates and to download example scripts presented in this book.

Category: Linux/Networking

Covers: Red Hat Enterprise Linux 5

User Level: Intermediate–Advanced

Table of Contents

  1. Title Page
  2. Copyright Page
  3. Contents at a Glance
  4. Table of Contents
  5. About the Author
  6. Dedication
  7. Acknowledgments
  8. We Want to Hear from You!
  9. Reader Services
  10. Foreword
  11. Introduction
  12. Part I: Installation and Configuration
    1. Chapter 1. Installing Red Hat Enterprise Linux
    2. Chapter 2. Post-Installation Configuration
    3. Chapter 3. Operating System Updates
  13. Part II: Operating System Core Concepts
    1. Chapter 4. Understanding Linux Concepts
    2. Chapter 5. Working with RPM Software
    3. Chapter 6. Analyzing Hardware
    4. Chapter 7. Managing Storage
    5. Chapter 8. 64-Bit, Multi-Core, and Hyper-Threading Technology Processors
  14. Part III: System Administration
    1. Chapter 9. Managing Users and Groups
    2. Chapter 10. Techniques for Backup and Recovery
    3. Chapter 11. Automating Tasks with Scripts
  15. Part IV: Network Services
    1. Chapter 12. Identity Management
    2. Chapter 13. Network File Sharing
    3. Chapter 14. Granting Network Connectivity with DHCP
    4. Chapter 15. Creating a Web Server with the Apache HTTP Server
    5. Chapter 16. Hostname Resolution with BIND
    6. Chapter 17. Securing Remote Logins with OpenSSH
    7. Chapter 18. Setting Up an Email Server with Sendmail
    8. Chapter 19. Explaining Other Common Network Services
  16. Part V: Monitoring and Tuning
    1. Chapter 20. Monitoring System Resources
    2. Chapter 21. Monitoring and Tuning the Kernel
    3. Chapter 22. Monitoring and Tuning Applications
  17. Part VI: Security
    1. Chapter 23. Protecting Against Intruders with Security-Enhanced Linux
    2. Chapter 24. Configuring a Firewall
    3. Chapter 25. Linux Auditing System
  18. Appendixes
    1. Appendix A. Installing Proprietary Kernel Modules
    2. Appendix B. Creating Virtual Machines
    3. Appendix C. Preventing Security Breaches with ExecShield
    4. Appendix D. Troubleshooting
  19. Index