Preface A: Introduction
Section A.1: Red Hat Enterprise Linux Diagnostics and Troubleshooting
Section A.2: Orientation to the Classroom Environment
Section A.3: Performing Lab Exercises
Chapter 1: Introducing Troubleshooting Strategy
Section 1.1: Using the Scientific Method
Section 1.2: Guided Exercise: Using the Scientific Method to Solve a Login Issue
Section 1.3: Collecting Information to Support Troubleshooting
Section 1.4: Guided Exercise: Collecting Information to Support Troubleshooting
Section 1.5: Troubleshooting with Red Hat Resources
Section 1.6: Guided Exercise: Troubleshooting with Red Hat Resources
Section 1.7: Lab: Introducing Troubleshooting Strategy
Section 1.8: Summary
Chapter 2: Configuring Baseline Data
Section 2.1: Monitoring Systems
Section 2.2: Guided Exercise: Monitoring Systems
Section 2.3: Configuring Remote Logging
Section 2.4: Guided Exercise: Configuring Remote Logging
Section 2.5: Describing Configuration Management Automation
Section 2.6: Guided Exercise: Implementing Configuration Changes with an Ansible Playbook
Section 2.7: Configuring Change Tracking
Section 2.8: Guided Exercise: Configuring Change Tracking
Section 2.9: Lab: Configuring Baseline Data
Section 2.10: Summary
Chapter 3: Troubleshooting Boot Issues
Section 3.1: Resolving Boot Loader Issues on BIOS Systems
Section 3.2: Guided Exercise: Resolving Boot Loader Issues on BIOS Systems
Section 3.3: Resolving Boot Loader Issues on UEFI Systems
Section 3.4: Quiz: Resolving Boot Loader Issues on UEFI Systems
Section 3.5: Identifying and Resolving Failing Services
Section 3.6: Guided Exercise: Identifying and Resolving Failing Services
Section 3.7: Resetting the root Password
Section 3.8: Guided Exercise: Resetting the root Password
Section 3.9: Lab: Troubleshooting Boot Issues
Section 3.10: Summary
Chapter 4: Identifying Hardware Issues
Section 4.1: Identifying Hardware Issues
Section 4.2: Guided Exercise: Identifying Hardware Issues
Section 4.3: Managing Kernel Modules
Section 4.4: Guided Exercise: Managing Kernel Modules
Section 4.5: Resolving Virtualization Issues
Section 4.6: Guided Exercise: Resolving Virtualization Issues
Section 4.7: Lab: Identifying Hardware Issues
Section 4.8: Summary
Chapter 5: Troubleshooting Storage Issues
Section 5.1: Describing the Linux Storage Stack
Section 5.2: Guided Exercise: Configuring Storage with Stratis
Section 5.3: Recovering from File System Corruption
Section 5.4: Guided Exercise: Recovering from File System Corruption
Section 5.5: Repairing LVM Issues
Section 5.6: Guided Exercise: Repairing LVM Issues
Section 5.7: Resolving Storage Device Encryption Issues
Section 5.8: Guided Exercise: Resolving Storage Device Encryption Issues
Section 5.9: Resolving iSCSI Issues
Section 5.10: Guided Exercise: Resolving iSCSI Issues
Section 5.11: Lab: Troubleshooting Storage Issues
Section 5.12: Summary
Chapter 6: Troubleshooting RPM Issues
Section 6.1: Resolving Package Dependency Issues
Section 6.2: Guided Exercise: Resolving Package Dependency Issues
Section 6.3: Recovering a Corrupted RPM Database
Section 6.4: Guided Exercise: Recovering a Corrupted RPM Database
Section 6.5: Identifying and Recovering RPM Managed Files
Section 6.6: Guided Exercise: Identifying and Recovering RPM Managed Files
Section 6.7: Managing Red Hat Subscriptions
Section 6.8: Quiz: Managing Red Hat Subscriptions
Section 6.9: Lab: Troubleshooting RPM Issues
Section 6.10: Summary
Chapter 7: Troubleshooting Network Issues
Section 7.1: Verifying Network Connectivity
Section 7.2: Guided Exercise: Verifying Network Connectivity
Section 7.3: Resolving Connectivity Issues
Section 7.4: Guided Exercise: Resolving Connectivity Issues
Section 7.5: Inspecting Network Traffic
Section 7.6: Guided Exercise: Inspecting Network Traffic
Section 7.7: Lab: Troubleshooting Network Issues
Section 7.8: Summary
Chapter 8: Troubleshooting Application Issues
Section 8.1: Resolving Library Dependencies
Section 8.2: Guided Exercise: Resolving Library Dependencies
Section 8.3: Debugging Memory Leaks
Section 8.4: Guided Exercise: Debugging Memory Leaks
Section 8.5: Debugging Application Execution
Section 8.6: Guided Exercise: Debugging Application Execution
Section 8.7: Troubleshooting Containerized Applications
Section 8.8: Guided Exercise: Troubleshooting Containerized Applications
Section 8.9: Lab: Troubleshooting Application Issues
Section 8.10: Summary
SectionChapter 9: Troubleshooting Security Issues
SectionSection 9.1: Repairing SELinux Issues
Section 9.2: Guided Exercise: Repairing SELinux Issues
Section 9.3: Identifying Authentication Issues
Section 9.4: Guided Exercise: Identifying Authentication Issues
Section 9.5: Resolving Identity Management Issues
Section 9.6: Guided Exercise: Resolving Identity Management Issues
Section 9.7: Lab: Troubleshooting Security Issues
Section 9.8: Summary
Chapter 10: Troubleshooting Kernel Issues
Section 10.1: Configuring Kernel Crash Dumps
Section 10.2: Guided Exercise: Configuring Kernel Crash Dumps
Section 10.3: Kernel Debugging with SystemTap
Section 10.4: Guided Exercise: Kernel Debugging with SystemTap
Section 10.5: Lab: Troubleshooting Kernel Issues
Section 10.6: Summary
Chapter 11: Comprehensive Review
Section 11.1: Comprehensive Review
Section 11.2: Lab: Repairing a Non-running Application
Section 11.3: Lab: Resolving a Console Login Issue
Section 11.4: Lab: Resolving Authentication Issues
Section 11.5: Lab: Repairing a Web Server Issue
Section 11.6: Lab: Resolving Network Delay Issues
Section 11.7: Lab: Resolving Container Issues