Linux Bible. Christopher Negus
target="_blank" rel="nofollow" href="#ue4546905-7a82-5f55-ac06-3eb8e7fa30a1">Chapter 8, “Learning System Administration,” provides information on basic graphical tools, commands, and configuration files for administering Linux systems. It introduces the Cockpit web UI for simplified, centralized Linux administration.
Chapter 9, “Installing Linux,” covers common installation tasks, such as disk partitioning and initial software package selection, as well as more advanced installation tools, such as installing from kickstart files.
Chapter 10, “Getting and Managing Software,” provides an understanding of how software packages work and how to get and manage software packages.
Chapter 11, “Managing User Accounts,” discusses tools for adding and deleting users and groups as well as how to centralize user account management.
Chapter 12, “Managing Disks and Filesystems,” provides information on adding partitions, creating filesystems, and mounting filesystems, as well as working with logical volume management.
In Part IV, “Becoming a Linux Server Administrator,” you learn to create powerful network servers and the tools needed to manage them:
Chapter 13, “Understanding Server Administration,” covers remote logging, monitoring tools, and the Linux boot process.
Chapter 14, “Administering Networking” discusses how to configure networking.
Chapter 15, “Starting and Stopping Services,” provides information on starting and stopping services.
Chapter 16, “Configuring a Print Server,” describes how to configure printers to use locally on your Linux system or over the network from other computers.
Chapter 17, “Configuring a Web Server,” describes how to configure an Apache web server.
Chapter 18, “Configuring an FTP Server,” covers procedures for setting up a vsftpd FTP server that can be used to enable others to download files from your Linux system over the network.
Chapter 19, “Configuring a Windows File Sharing (Samba) Server,” covers Windows file server configuration with Samba.
Chapter 20, “Configuring an NFS File Server,” describes how to use Network File System features to share folders of files among systems over a network.
Chapter 21, “Troubleshooting Linux,” covers popular tools for troubleshooting your Linux system.
In Part V, “Learning Linux Security Techniques,” you learn how to secure your Linux systems and services:
Chapter 22, “Understanding Basic Linux Security,” covers basic security concepts and techniques.
Chapter 23, “Understanding Advanced Linux Security,” provides information on using Pluggable Authentication Modules (PAM) and cryptology tools to tighten system security and authentication.
Chapter 24, “Enhancing Linux Security with SELinux,” shows you how to enable Security Enhanced Linux (SELinux) to secure system services.
Chapter 25, “Securing Linux on a Network,” covers network security features, such as firewalld and iptables firewalls, to secure system services.
In Part VI,” Engaging with Cloud Computing” the book pivots from a single-system focus toward containerization, cloud computing, and automation:
Chapter 26, “Shifting to Clouds and Containers,” describes how to pull, push, start, stop, tag, and build container images.
Chapter 27, “Using Linux for Cloud Computing,” introduces concepts of cloud computing in Linux by describing how to set up hypervisors, build virtual machines, and share resources across networks.
Chapter 28, “Deploying Linux to the Cloud,” describes how to deploy Linux images to different cloud environments, including OpenStack, Amazon EC2, or a local Linux system that is configured for virtualization.
Chapter 29, “Automating Apps and Infrastructure with Ansible,” tells you how to create Ansible playbooks and run ad-hoc Ansible commands to automate the configuration of Linux systems and other devices.
Chapter 30, “Deploying Applications as Containers with Kubernetes,” describes the Kubernetes project and how it is used to orchestrate container images, with the potential to massively scale up for large data centers.
Part VII contains two appendixes to help you get the most from your exploration of Linux. Appendix A, “Media,” provides guidance on downloading Linux distributions. Appendix B, “Exercise Answers,” provides sample solutions to the exercises included in Chapters 2 through 30.
Conventions Used in This Book
Throughout the book, special typography indicates code and commands. Commands and code are shown in a monospaced font:
This is how code looks.
In the event that an example includes both input and output, the monospaced font is still used, but input is presented in bold type to distinguish the two. Here's an example:
$ ftp ftp.handsonhistory.com Name (home:jake): jake Password: ******
As for styles in the text:
New terms and important words appear in italic when introduced.
Keyboard strokes appear like this: Ctrl+A. This convention indicates to hold the Ctrl key as you also press the "a" key.
Filenames, URLs, and code within the text appear as follows: persistence.properties.
The following items call your attention to points that are particularly important.