Red Hat System Administration II
Abstract
| Goal |
Review tasks from Red Hat System Administration II. |
| Sections |
|
| Lab |
|
After completing this section, you should have reviewed and refreshed the knowledge and skills that you learned in Red Hat System Administration II.
Before beginning the comprehensive review for this course, you should be comfortable with the topics covered in each chapter. Do not hesitate to ask the instructor for extra guidance or clarification on these topics.
Run commands more efficiently by using advanced features of the Bash shell, shell scripts, and various Red Hat Enterprise Linux utilities.
Run commands more efficiently by using advanced features of the Bash shell, shell scripts, and various Red Hat Enterprise Linux utilities.
Run repetitive tasks with
forloops, evaluate exit codes from commands and scripts, run tests with operators, and create conditional structures withifstatements.Create regular expressions to match data, apply regular expressions to text files with the
grepcommand, and usegrepto search files and data from piped commands.
Schedule tasks to execute at a specific time and date.
Set up a command to run once at a future time.
Schedule commands to run on a repeating schedule with a user's
crontabfile.Schedule commands to run on a repeating schedule with the system
crontabfile and directories.Enable and disable
systemdtimers, and configure a timer that manages temporary files.
Locate and accurately interpret system event logs for troubleshooting purposes.
Describe the basic Red Hat Enterprise Linux logging architecture to record events.
Interpret events in the relevant syslog files to troubleshoot problems or to review system status.
Find and interpret entries in the system journal to troubleshoot problems or review system status.
Configure the system journal to preserve the record of events when a server is rebooted.
Maintain accurate time synchronization with Network Time Protocol (NTP) and configure the time zone to ensure correct time stamps for events that are recorded by the system journal and logs.
Archive and copy files from one system to another.
Archive files and directories into a compressed file with
tar, and extract the contents of an existingtararchive.Transfer files to or from a remote system securely with SSH.
Efficiently and securely synchronize the contents of a local file or directory with a remote server copy.
Improve system performance by setting tuning parameters and adjusting the scheduling priority of processes.
Optimize system performance by selecting a tuning profile that the
tuneddaemon manages.Prioritize or deprioritize specific processes, with the
niceandrenicecommands.
Protect and manage server security by using SELinux.
Explain how SELinux protects resources, change the current SELinux mode of a system, and set the default SELinux mode of a system.
Manage the SELinux policy rules that determine the default context for files and directories with the
semanage fcontextcommand, and apply the context defined by the SELinux policy to files and directories with therestoreconcommand.Activate and deactivate SELinux policy rules with the
setseboolcommand, manage the persistent value of SELinux Booleans with thesemanage boolean -lcommand, and consultmanpages that end with_selinuxto find useful information about SELinux Booleans.Use SELinux log analysis tools and display useful information during SELinux troubleshooting with the
sealertcommand.
Create and manage storage devices, partitions, file systems, and swap spaces from the command line.
Create storage partitions, format them with file systems, and mount them for use.
Create and manage swap spaces to supplement physical memory.
Create and manage logical volumes that contain file systems or swap spaces from the command line.
Describe logical volume manager components and concepts, and implement LVM storage and display LVM component information.
Analyze the multiple storage components that make up the layers of the storage stack.
Access network-attached storage with the NFS protocol.
Identify NFS export information, create a directory to use as a mount point, mount an NFS export with the
mountcommand or by configuring the/etc/fstabfile, and unmount an NFS export with theumountcommand.Describe the benefits of using the automounter, and automount NFS exports by using direct and indirect maps.
Manage the boot process to control offered services and to troubleshoot and repair problems.
Describe the Red Hat Enterprise Linux boot process, set the default target when booting, and boot a system to a non-default target.
Log in to a system and change the root password when the current root password is lost.
Manually repair file-system configuration or corruption issues that stop the boot process.
Control network connections to services with the system firewall and SELinux rules.
Accept or reject network connections to system services with
firewalldrules.Verify that network ports have the correct SELinux type for services to bind to them.
Install Red Hat Enterprise Linux on servers and virtual machines.
Install Red Hat Enterprise Linux on a server.
Explain Kickstart concepts and architecture, create a Kickstart file with the Kickstart Generator website, modify an existing Kickstart file with a text editor and check its syntax with
ksvalidator, publish a Kickstart file to the installer, and install Kickstart on the network.Install a virtual machine on your Red Hat Enterprise Linux server with the web console.
Obtain, run, and manage simple lightweight services as containers on a single Red Hat Enterprise Linux server.
Explain container concepts and the core technologies for building, storing, and running containers.
Pull container images from a registry and run containers by using Podman.
Authenticate to and explore the container images stored in remote container registries.
Manage the lifecycle of a container from creation to deletion.