Preface A: Introduction
Section A.1: Red Hat System Administration II
Section A.2: Orientation to the Classroom Environment
Section A.3: Performing Lab Exercises
Chapter 1: Improve Command-line Productivity
Section 1.1: Write Simple Bash Scripts
Section 1.2: Guided Exercise: Write Simple Bash Scripts
Section 1.3: Loops and Conditional Constructs in Scripts
Section 1.4: Guided Exercise: Loops and Conditional Constructs in Scripts
Section 1.5: Match Text in Command Output with Regular Expressions
Section 1.6: Guided Exercise: Match Text in Command Output with Regular Expressions
Section 1.7: Lab: Improve Command-line Productivity
Section 1.8: Summary
Chapter 2: Schedule Future Tasks
Section 2.1: Schedule a Deferred User Job
Section 2.2: Guided Exercise: Schedule a Deferred User Job
Section 2.3: Schedule Recurring User Jobs
Section 2.4: Guided Exercise: Schedule Recurring User Jobs
Section 2.5: Schedule Recurring System Jobs
Section 2.6: Guided Exercise: Schedule Recurring System Jobs
Section 2.7: Manage Temporary Files
Section 2.8: Guided Exercise: Manage Temporary Files
Section 2.9: Quiz: Schedule Future Tasks
Section 2.10: Summary
Chapter 3: Analyze and Store Logs
Section 3.1: Describe System Log Architecture
Section 3.2: Quiz: Describe System Log Architecture
Section 3.3: Review Syslog Files
Section 3.4: Guided Exercise: Review Syslog Files
Section 3.5: Review System Journal Entries
Section 3.6: Guided Exercise: Review System Journal Entries
Section 3.7: Preserve the System Journal
Section 3.8: Guided Exercise: Preserve the System Journal
Section 3.9: Maintain Accurate Time
Section 3.10: Guided Exercise: Maintain Accurate Time
Section 3.11: Lab: Analyze and Store Logs
Section 3.12: Summary
Chapter 4: Archive and Transfer Files
Section 4.1: Manage Compressed tar Archives
Section 4.2: Guided Exercise: Manage Compressed tar Archives
Section 4.3: Transfer Files Between Systems Securely
Section 4.4: Guided Exercise: Transfer Files Between Systems Securely
Section 4.5: Synchronize Files Between Systems Securely
Section 4.6: Guided Exercise: Synchronize Files Between Systems Securely
Section 4.7: Lab: Archive and Transfer Files
Section 4.8: Summary
Chapter 5: Tune System Performance
Section 5.1: Adjust Tuning Profiles
Section 5.2: Guided Exercise: Adjust Tuning Profiles
Section 5.3: Influence Process Scheduling
Section 5.4: Guided Exercise: Influence Process Scheduling
Section 5.5: Lab: Tune System Performance
Section 5.6: Summary
Chapter 6: Manage SELinux Security
Section 6.1: Change the SELinux Enforcement Mode
Section 6.2: Guided Exercise: Change the SELinux Enforcement Mode
Section 6.3: Control SELinux File Contexts
Section 6.4: Guided Exercise: Control SELinux File Contexts
Section 6.5: Adjust SELinux Policy with Booleans
Section 6.6: Guided Exercise: Adjust SELinux Policy with Booleans
Section 6.7: Investigate and Resolve SELinux Issues
Section 6.8: Guided Exercise: Investigate and Resolve SELinux Issues
Section 6.9: Lab: Manage SELinux Security
Section 6.10: Summary
Chapter 7: Manage Basic Storage
Section 7.1: Add Partitions, File Systems, and Persistent Mounts
Section 7.2: Guided Exercise: Add Partitions, File Systems, and Persistent Mounts
Section 7.3: Manage Swap Space
Section 7.4: Guided Exercise: Manage Swap Space
Section 7.5: Lab: Manage Basic Storage
Section 7.6: Summary
Chapter 8: Manage Storage Stack
Section 8.1: Create and Extend Logical Volumes
Section 8.2: Guided Exercise: Create and Extend Logical Volumes
Section 8.3: Manage Layered Storage
Section 8.4: Guided Exercise: Manage Layered Storage
Section 8.5: Lab: Manage Storage Stack
Section 8.6: Summary
Chapter 9: Access Network-Attached Storage
Section 9.1: Manage Network-Attached Storage with NFS
Section 9.2: Guided Exercise: Manage Network-Attached Storage with NFS
Section 9.3: Automount Network-Attached Storage
Section 9.4: Guided Exercise: Automount Network-Attached Storage
Section 9.5: Lab: Access Network-Attached Storage
Section 9.6: Summary
Chapter 10: Control the Boot Process
Section 10.1: Select the Boot Target
Section 10.2: Guided Exercise: Select the Boot Target
Section 10.3: Reset the Root Password
Section 10.4: Guided Exercise: Reset the Root Password
Section 10.5: Repair File-system Issues at Boot
Section 10.6: Guided Exercise: Repair File-system Issues at Boot
Section 10.7: Lab: Control the Boot Process
Section 10.8: Summary
Chapter 11: Manage Network Security
Section 11.1: Manage Server Firewalls
Section 11.2: Guided Exercise: Manage Server Firewalls
Section 11.3: Control SELinux Port Labeling
Section 11.4: Guided Exercise: Control SELinux Port Labeling
Section 11.5: Lab: Manage Network Security
Section 11.6: Summary
SectionChapter 12: Install Red Hat Enterprise Linux
SectionSection 12.1: Install Red Hat Enterprise Linux
Section 12.2: Guided Exercise: Install Red Hat Enterprise Linux
Section 12.3: Automate Installation with Kickstart
Section 12.4: Guided Exercise: Automate Installation with Kickstart
Section 12.5: Install and Configure Virtual Machines
Section 12.6: Quiz: Install and Configure Virtual Machines
Section 12.7: Lab: Install Red Hat Enterprise Linux
Section 12.8: Summary
Chapter 13: Run Containers
Section 13.1: Introduction to Containers
Section 13.2: Quiz: Introduction to Containers
Section 13.3: Creating Containers with Podman
Section 13.4: Guided Exercise: Creating Containers with Podman
Section 13.5: Container Image Registries
Section 13.6: Guided Exercise: Container Image Registries
Section 13.7: Managing the Container Lifecycle
Section 13.8: Guided Exercise: Managing the Container Lifecycle
Section 13.9: Lab: Run Containers
Section 13.10: Summary
Chapter 14: Comprehensive Review
Section 14.1: Comprehensive Review
Section 14.2: Lab: Fix Boot Issues and Maintain Servers
Section 14.3: Lab: Configure and Manage File Systems and Storage
Section 14.4: Lab: Configure and Manage Server Security
Section 14.5: Lab: Run Containers