Red Hat System Administration II v7.0
Preface A: Introduction
Section A.1: Orientation to the Classroom Lab Environment
Chapter 1: Automating Installation with Kickstart
Section 1.1: Defining the Anaconda Kickstart System
Section 1.2: Quiz: Practice: Kickstart File Syntax and Modification
Section 1.3: Deploying a New Virtual System with Kickstart
Section 1.4: Guided Exercise: Practice: Installing a System Using Kickstart
Section 1.5: Quiz: Chapter Automating Installation with Kickstart
Chapter 2: Using Regular Expressions with grep
Section 2.1: Regular Expressions Fundamentals
Section 2.2: Quiz: Practice: Match the Regular Expression
Section 2.3: Matching Text with grep
Section 2.4: Guided Exercise: Practice: Using grep with Logs
Section 2.5: Lab: Lab: Using Regular Expressions with grep
Chapter 3: Creating and Editing Text Files with vim
Section 3.1: The vim Text Editor
Section 3.2: Quiz: Practice: vim Modes
Section 3.3: Basic vim Workflow
Section 3.4: Guided Exercise: Practice: Basic vim Workflow
Section 3.5: Editing with vim
Section 3.6: Guided Exercise: Practice: Edit a File with vim
Section 3.7: Lab: Lab: Edit a System File with vim
Chapter 4: Scheduling Future Linux Tasks
Section 4.1: Scheduling One-Time Tasks with at
Section 4.2: Guided Exercise: Practice: Scheduling One-Time Tasks with at
Section 4.3: Scheduling Recurring Jobs with cron
Section 4.4: Guided Exercise: Practice: Scheduling Recurring Jobs with cron
Section 4.5: Scheduling System cron Jobs
Section 4.6: Guided Exercise: Practice: Scheduling System cron Jobs
Section 4.7: Managing Temporary Files
Section 4.8: Guided Exercise: Practice: Managing Temporary Files
Section 4.9: Quiz: Chapter Scheduling Future Linux Tasks
Chapter 5: Managing Priority of Linux Processes
Section 5.1: Process Priority and "nice" Concepts
Section 5.2: Quiz: Practice: Process Priority and "nice" Concepts
Section 5.3: Using nice and renice to Influence Process Priority
Section 5.4: Guided Exercise: Practice: Discovering Process Priorities
Section 5.5: Lab: Lab: Managing Priority of Linux Processes
Chapter 6: Controlling Access to Files with Access Control Lists (ACLs)
Section 6.1: POSIX Access Control Lists (ACLs)
Section 6.2: Quiz: Practice: Interpret ACLs
Section 6.3: Securing Files with ACLs
Section 6.4: Guided Exercise: Practice: Using ACLs to Grant and Limit Access
Section 6.5: Lab: Lab: Controlling Access to Files with Access Control Lists (ACLs)
Chapter 7: Managing SELinux Security
Section 7.1: Enabling and Monitoring Security Enhanced Linux (SELinux)
Section 7.2: Quiz: Practice: SELinux Concepts
Section 7.3: Changing SELinux Modes
Section 7.4: Guided Exercise: Practice: Changing SELinux Modes
Section 7.5: Changing SELinux Contexts
Section 7.6: Guided Exercise: Practice: Changing SELinux Contexts
Section 7.7: Changing SELinux Booleans
Section 7.8: Guided Exercise: Practice: Changing SELinux Booleans
Section 7.9: Troubleshooting SELinux
Section 7.10: Guided Exercise: Practice: Troubleshooting SELinux
Section 7.11: Lab: Lab: Managing SELinux Security
Chapter 8: Connecting to Network-defined Users and Groups
Section 8.1: Using Identity Management Services
Section 8.2: Guided Exercise: Practice: Connecting to a Central LDAP and Kerberos Server
Section 8.3: Lab: Lab: Connecting to Network-defined Users and Groups
Chapter 9: Adding Disks, Partitions, and File Systems to a Linux System
Section 9.1: Adding Partitions, File Systems, and Persistent Mounts
Section 9.2: Guided Exercise: Practice: Adding Partitions, File Systems, and Persistent Mounts
Section 9.3: Managing Swap Space
Section 9.4: Guided Exercise: Practice: Adding and Enabling Swap Space
Section 9.5: Lab: Lab: Adding Disks, Partitions, and File Systems to a Linux System
Chapter 10: Managing Logical Volume Management (LVM) Storage
Section 10.1: Logical Volume Management Concepts
Section 10.2: Quiz: Practice: Logical Volume Management Concepts
Section 10.3: Managing Logical Volumes
Section 10.4: Guided Exercise: Practice: Adding a Logical Volume
Section 10.5: Extending Logical Volumes
Section 10.6: Guided Exercise: Practice: Extending a Logical Volume
Section 10.7: Lab: Lab: Managing Logical Volume Management (LVM) Storage
Chapter 11: Accessing Network Storage with Network File System (NFS)
Section 11.1: Mounting Network Storage with NFS
Section 11.2: Guided Exercise: Practice: Mounting and Unmounting NFS
Section 11.3: Automounting Network Storage with NFS
Section 11.4: Guided Exercise: Practice: Automounting NFS
Section 11.5: Lab: Lab: Accessing Network Storage with Network File System (NFS)
Chapter 12: Accessing Network Storage with SMB
Section 12.1: Accessing Network Storage with SMB
Section 12.2: Guided Exercise: Practice: Mounting a SMB File System
Section 12.3: Lab: Lab: Accessing Network Storage with SMB
Chapter 13: Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process
Section 13.1: The Red Hat Enterprise Linux Boot Process
Section 13.2: Guided Exercise: Practice: Selecting a Boot Target
Section 13.3: Repairing Common Boot Issues
Section 13.4: Guided Exercise: Practice: Resetting a Lost root Password
Section 13.5: Repairing File System Issues at Boot
Section 13.6: Guided Exercise: Practice: Repairing Boot Problems
Section 13.7: Repairing Boot Loader Issues
Section 13.8: Guided Exercise: Practice: Repairing a Boot Loader Problem
Section 13.9: Quiz: Chapter Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process
Chapter 14: Limiting Network Communication with firewalld
Section 14.1: Limiting Network Communication
Section 14.2: Guided Exercise: Practice: Limiting Network Communication
Section 14.3: Lab: Lab: Limiting Network Communication
Chapter 15: Comprehensive Review of System Administration II
Section 15.1: Red Hat System Administration II Comprehensive Review
Section 15.2: Lab: Lab: Comprehensive Review of System Administration II
Red Hat System Administration II v8.2
Preface A: Introduction
Section A.1: Red Hat System Administration II
Section A.2: Orientation to the Classroom Environment
Section A.3: Internationalization
Chapter 1: Improving Command-line Productivity
Section 1.1: Writing Simple Bash Scripts
Section 1.2: Guided Exercise: Writing Simple Bash Scripts
Section 1.3: Running Commands More Efficiently Using Loops
Section 1.4: Guided Exercise: Running Commands More Efficiently Using Loops
Section 1.5: Matching Text in Command Output with Regular Expressions
Section 1.6: Guided Exercise: Matching Text in Command Output with Regular Expressions
Section 1.7: Lab: Improving Command-line Productivity
Section 1.8: Summary
Chapter 2: Scheduling Future Tasks
Section 2.1: Scheduling a Deferred User Job
Section 2.2: Guided Exercise: Scheduling a Deferred User Job
Section 2.3: Scheduling Recurring User Jobs
Section 2.4: Guided Exercise: Scheduling Recurring User Jobs
Section 2.5: Scheduling Recurring System Jobs
Section 2.6: Guided Exercise: Scheduling Recurring System Jobs
Section 2.7: Managing Temporary Files
Section 2.8: Guided Exercise: Managing Temporary Files
Section 2.9: Quiz: Scheduling Future Tasks
Section 2.10: Summary
Chapter 3: Tuning System Performance
Section 3.1: Adjusting Tuning Profiles
Section 3.2: Guided Exercise: Adjusting Tuning Profiles
Section 3.3: Influencing Process Scheduling
Section 3.4: Guided Exercise: Influencing Process Scheduling
Section 3.5: Lab: Tuning System Performance
Section 3.6: Summary
Chapter 4: Controlling Access to Files with ACLs
Section 4.1: Interpreting File ACLs
Section 4.2: Quiz: Interpreting File ACLs
Section 4.3: Securing Files with ACLs
Section 4.4: Guided Exercise: Securing Files with ACLs
Section 4.5: Lab: Controlling Access to Files with ACLs
Section 4.6: Summary
Chapter 5: Managing SELinux Security
Section 5.1: Changing the SELinux Enforcement Mode
Section 5.2: Guided Exercise: Changing the SELinux Enforcement Mode
Section 5.3: Controlling SELinux File Contexts
Section 5.4: Guided Exercise: Controlling SELinux File Contexts
Section 5.5: Adjusting SELinux Policy with Booleans
Section 5.6: Guided Exercise: Adjusting SELinux Policy with Booleans
Section 5.7: Investigating and Resolving SELinux Issues
Section 5.8: Guided Exercise: Investigating and Resolving SELinux Issues
Section 5.9: Lab: Managing SELinux Security
Section 5.10: Summary
Chapter 6: Managing Basic Storage
Section 6.1: Adding Partitions, File Systems, and Persistent Mounts
Section 6.2: Guided Exercise: Adding Partitions, File Systems, and Persistent Mounts
Section 6.3: Managing Swap Space
Section 6.4: Guided Exercise: Managing Swap Space
Section 6.5: Lab: Managing Basic Storage
Section 6.6: Summary
Chapter 7: Managing Logical Volumes
Section 7.1: Creating Logical Volumes
Section 7.2: Guided Exercise: Creating Logical Volumes
Section 7.3: Extending Logical Volumes
Section 7.4: Guided Exercise: Extending Logical Volumes
Section 7.5: Lab: Managing Logical Volumes
Section 7.6: Summary
Chapter 8: Implementing Advanced Storage Features
Section 8.1: Managing Layered Storage with Stratis
Section 8.2: Guided Exercise: Managing Layered Storage with Stratis
Section 8.3: Compressing and Deduplicating Storage with VDO
Section 8.4: Guided Exercise: Compressing and Deduplicating Storage with VDO
Section 8.5: Lab: Implementing Advanced Storage Features
Section 8.6: Summary
Chapter 9: Accessing Network-Attached Storage
Section 9.1: Mounting Network-Attached Storage with NFS
Section 9.2: Guided Exercise: Managing Network-Attached Storage with NFS
Section 9.3: Automounting Network-Attached Storage
Section 9.4: Guided Exercise: Automounting Network-Attached Storage
Section 9.5: Lab: Accessing Network-Attached Storage
Section 9.6: Summary
Chapter 10: Controlling the Boot Process
Section 10.1: Selecting the Boot Target
Section 10.2: Guided Exercise: Selecting the Boot Target
Section 10.3: Resetting the Root Password
Section 10.4: Guided Exercise: Resetting the Root Password
Section 10.5: Repairing File System Issues at Boot
Section 10.6: Guided Exercise: Repairing File System Issues at Boot
Section 10.7: Lab: Controlling the Boot Process
Section 10.8: Summary
Chapter 11: Managing Network Security
Section 11.1: Managing Server Firewalls
Section 11.2: Guided Exercise: Managing Server Firewalls
Section 11.3: Controlling SELinux Port Labeling
Section 11.4: Guided Exercise: Controlling SELinux Port Labeling
Section 11.5: Lab: Managing Network Security
Section 11.6: Summary
SectionChapter 12: Installing Red Hat Enterprise Linux
SectionSection 12.1: Installing Red Hat Enterprise Linux
Section 12.2: Guided Exercise: Installing Red Hat Enterprise Linux
Section 12.3: Automating Installation with Kickstart
Section 12.4: Guided Exercise: Automating Installation with Kickstart
Section 12.5: Installing and Configuring Virtual Machines
Section 12.6: Quiz: Installing and Configuring Virtual Machines
Section 12.7: Lab: Installing Red Hat Enterprise Linux
Section 12.8: Summary
Chapter 13: Running Containers
Section 13.1: Introducing Containers
Section 13.2: Quiz: Introducing Containers
Section 13.3: Running a Basic Container
Section 13.4: Guided Exercise: Running a Basic Container
Section 13.5: Finding and Managing Container Images
Section 13.6: Guided Exercise: Finding and Managing Container Images
Section 13.7: Performing Advanced Container Management
Section 13.8: Guided Exercise: Performing Advanced Container Management
Section 13.9: Attaching Persistent Storage to a Container
Section 13.10: Guided Exercise: Attaching Persistent Storage to a Container
Section 13.11: Managing Containers as Services
Section 13.12: Guided Exercise: Managing Containers as Services
Section 13.13: Lab: Running Containers
Section 13.14: Summary
Chapter 14: Comprehensive Review
Section 14.1: Comprehensive Review
Section 14.2: Lab: Fixing Boot Issues and Maintaining Servers
Section 14.3: Lab: Configuring and Managing File Systems and Storage
Section 14.4: Lab: Configuring and Managing Server Security
Section 14.5: Lab: Running Containers
Red Hat System Administration II - v9.0
SectionPreface A: Introduction
SectionSection A.1: Red Hat System Administration II
Section A.2: Orientation to the Classroom Environment
Section A.3: Performing Lab Exercises
Chapter 1: Improve Command-line Productivity
Section 1.1: Write Simple Bash Scripts
Section 1.2: Guided Exercise: Write Simple Bash Scripts
Section 1.3: Loops and Conditional Constructs in Scripts
Section 1.4: Guided Exercise: Loops and Conditional Constructs in Scripts
Section 1.5: Match Text in Command Output with Regular Expressions
Section 1.6: Guided Exercise: Match Text in Command Output with Regular Expressions
Section 1.7: Lab: Improve Command-line Productivity
Section 1.8: Summary
Chapter 2: Schedule Future Tasks
Section 2.1: Schedule a Deferred User Job
Section 2.2: Guided Exercise: Schedule a Deferred User Job
Section 2.3: Schedule Recurring User Jobs
Section 2.4: Guided Exercise: Schedule Recurring User Jobs
Section 2.5: Schedule Recurring System Jobs
Section 2.6: Guided Exercise: Schedule Recurring System Jobs
Section 2.7: Manage Temporary Files
Section 2.8: Guided Exercise: Manage Temporary Files
Section 2.9: Quiz: Schedule Future Tasks
Section 2.10: Summary
Chapter 3: Analyze and Store Logs
Section 3.1: Describe System Log Architecture
Section 3.2: Quiz: Describe System Log Architecture
Section 3.3: Review Syslog Files
Section 3.4: Guided Exercise: Review Syslog Files
Section 3.5: Review System Journal Entries
Section 3.6: Guided Exercise: Review System Journal Entries
Section 3.7: Preserve the System Journal
Section 3.8: Guided Exercise: Preserve the System Journal
Section 3.9: Maintain Accurate Time
Section 3.10: Guided Exercise: Maintain Accurate Time
Section 3.11: Lab: Analyze and Store Logs
Section 3.12: Summary
Chapter 4: Archive and Transfer Files
Section 4.1: Manage Compressed tar Archives
Section 4.2: Guided Exercise: Manage Compressed tar Archives
Section 4.3: Transfer Files Between Systems Securely
Section 4.4: Guided Exercise: Transfer Files Between Systems Securely
Section 4.5: Synchronize Files Between Systems Securely
Section 4.6: Guided Exercise: Synchronize Files Between Systems Securely
Section 4.7: Lab: Archive and Transfer Files
Section 4.8: Summary
Chapter 5: Tune System Performance
Section 5.1: Adjust Tuning Profiles
Section 5.2: Guided Exercise: Adjust Tuning Profiles
Section 5.3: Influence Process Scheduling
Section 5.4: Guided Exercise: Influence Process Scheduling
Section 5.5: Lab: Tune System Performance
Section 5.6: Summary
Chapter 6: Manage SELinux Security
Section 6.1: Change the SELinux Enforcement Mode
Section 6.2: Guided Exercise: Change the SELinux Enforcement Mode
Section 6.3: Control SELinux File Contexts
Section 6.4: Guided Exercise: Control SELinux File Contexts
Section 6.5: Adjust SELinux Policy with Booleans
Section 6.6: Guided Exercise: Adjust SELinux Policy with Booleans
Section 6.7: Investigate and Resolve SELinux Issues
Section 6.8: Guided Exercise: Investigate and Resolve SELinux Issues
Section 6.9: Lab: Manage SELinux Security
Section 6.10: Summary
Chapter 7: Manage Basic Storage
Section 7.1: Add Partitions, File Systems, and Persistent Mounts
Section 7.2: Guided Exercise: Add Partitions, File Systems, and Persistent Mounts
Section 7.3: Manage Swap Space
Section 7.4: Guided Exercise: Manage Swap Space
Section 7.5: Lab: Manage Basic Storage
Section 7.6: Summary
Chapter 8: Manage Storage Stack
Section 8.1: Create and Extend Logical Volumes
Section 8.2: Guided Exercise: Create and Extend Logical Volumes
Section 8.3: Manage Layered Storage
Section 8.4: Guided Exercise: Manage Layered Storage
Section 8.5: Lab: Manage Storage Stack
Section 8.6: Summary
Chapter 9: Access Network-Attached Storage
Section 9.1: Manage Network-Attached Storage with NFS
Section 9.2: Guided Exercise: Manage Network-Attached Storage with NFS
Section 9.3: Automount Network-Attached Storage
Section 9.4: Guided Exercise: Automount Network-Attached Storage
Section 9.5: Lab: Access Network-Attached Storage
Section 9.6: Summary
Chapter 10: Control the Boot Process
Section 10.1: Select the Boot Target
Section 10.2: Guided Exercise: Select the Boot Target
Section 10.3: Reset the Root Password
Section 10.4: Guided Exercise: Reset the Root Password
Section 10.5: Repair File-system Issues at Boot
Section 10.6: Guided Exercise: Repair File-system Issues at Boot
Section 10.7: Lab: Control the Boot Process
Section 10.8: Summary
Chapter 11: Manage Network Security
Section 11.1: Manage Server Firewalls
Section 11.2: Guided Exercise: Manage Server Firewalls
Section 11.3: Control SELinux Port Labeling
Section 11.4: Guided Exercise: Control SELinux Port Labeling
Section 11.5: Lab: Manage Network Security
Section 11.6: Summary
Chapter 12: Install Red Hat Enterprise Linux
Section 12.1: Install Red Hat Enterprise Linux
Section 12.2: Guided Exercise: Install Red Hat Enterprise Linux
Section 12.3: Automate Installation with Kickstart
Section 12.4: Guided Exercise: Automate Installation with Kickstart
Section 12.5: Install and Configure Virtual Machines
Section 12.6: Quiz: Install and Configure Virtual Machines
Section 12.7: Lab: Install Red Hat Enterprise Linux
Section 12.8: Summary
Chapter 13: Run Containers
Section 13.1: Container Concepts
Section 13.2: Quiz: Container Concepts
Section 13.3: Deploy Containers
Section 13.4: Guided Exercise: Deploy Containers
Section 13.5: Manage Container Storage and Network Resources
Section 13.6: Guided Exercise: Manage Container Storage and Network Resources
Section 13.7: Manage Containers as System Services
Section 13.8: Guided Exercise: Manage Containers as System Services
Section 13.9: Lab: Run Containers
Section 13.10: Summary
Chapter 14: Comprehensive Review
Section 14.1: Comprehensive Review
Section 14.2: Lab: Fix Boot Issues and Maintain Servers
Section 14.3: Lab: Configure and Manage File Systems and Storage
Section 14.4: Lab: Configure and Manage Server Security
Section 14.5: Lab: Run Containers