- Find it online
- Contact us
- Errata for UNIX and Linux System Administration Handbook, 4E
- Page 33
- Page 45
- Pages 51 and 52
- Page 153
- Page 466
- Page 574
- Page 808
- Page 817
- Page 821
- Page 827
- Page 852
- No formal errata are available for this printing yet. We will update this list after the next printing has been finalized.
- Frequently Asked Questions about ULSAH4E
- UNIX and Linux System Administration Handbook, 5th Edition
- If You’re an Educator
- If You’re a Student
- Overview
- Description
- Features
- New to This Edition
- Table of Contents
- Resources
- Instructor Resources
- Discipline Resources
- Order
- Digital
- Pearson eText for UNIX and Linux System Administration Handbook — Instant Access, 5th Edition
- Paper
- UNIX and Linux System Administration Handbook, 5th Edition
- About the Author(s)
Find it online
|
|
|
UNIX and Linux System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure.
Updated for new distributions and cloud environments, this comprehensive guide covers best practices for every facet of system administration, including storage management, network design and administration, security, web hosting, automation, configuration management, performance analysis, virtualization, DNS, security, and the management of IT service organizations. The authors—world-class, hands-on technologists—offer indispensable new coverage of cloud platforms, the DevOps philosophy, continuous deployment, containerization, monitoring, and many other essential topics.
Whatever your role in running systems and networks built on UNIX or Linux, this conversational, well-written guide will improve your efficiency and help solve your knottiest problems.
Contact us
Errata for UNIX and Linux System Administration Handbook, 4E
We usually have the opportunity to make corrections before each printing. Therefore, your book’s complement of errors may vary depending on its printing. To determine your printing, look at the last line of the copyright page.
Found a problem not listed here? Please let us know.
Page 33
The backquoted command wc -l /etc/passwd seen in the page’s last command line should actually be wc -l -le and -ge operators. The >= and operators listed in Table 2.2 do not exist.
The > and operators do exist. However, they must be backslash-escaped or double bracketed to prevent them from being interpreted as I/O redirection characters.
Page 45
The loop variable in the example for loop is actually called script . The text refers to it as file .
Pages 51 and 52
The regular expression shown on pages 51–52 for matching various spellings of Moammar Gadhafi’s name is OK as originally printed. However, the accompanying text does not explain why the ([dtz][dhz]?)+ group (a component of the last name match) allows repetition.
The + is there to accommodate variants such as Quadhdhafi. Really, that fragment should be ([dtz][dhz]?) <1,2>so that only one or two occurrences are permissible.
More generally, it’s worth noting that this regex is permissive. Not every string that it matches is a legitimate spelling of Gadhafi’s name. However, it should match all legitimate spellings.
Page 153
The cross-reference in the last line of the first paragraph under The setuid and setgid bits points to the wrong place.
The referenced material is on page 105, not page 106.
Page 466
The route commands at the bottom of the page are shell commands, not excerpts from a startup script as the surrounding text might imply.
The # character indicates root’s shell prompt, not the comment character used in shell scripts.
Page 574
DNS Punycode names begin with xn-- , not xf— as stated in the text.
Page 808
In addition to having its own conventions, Debian’s version of Exim configuration uses the m4 preprocessor.
We don’t describe the Debian system in this book.
Page 817
There are two errors on this page.
In the sentence «The sender’s address is not checked because many user agents get confused by error returns,» replace «sender’s address» with «recipient’s address.»
The paragraph that starts «We next check the destination domain. » claims that DKIM verification is not performed during this step. That is incorrect; DKIM is in fact enabled.
Page 821
It is not entirely accurate to say that «If a message receives a pass or decline from all the routers in the sequence, it is bounced as an unroutable address.»
In fact, Exim may either bounce or reject such messages, depending on the context.
Page 827
Contrary to the statement in the Debugging section, exim does fork when given the -d flag. However, it does not detach itself from the control terminal.
Page 852
In the configuration file excerpt, the line that sets dkim_selector should do a lookup on $dkim_domain , not $sender_address_domain as shown.
No formal errata are available for this printing yet.
We will update this list after the next printing has been finalized.
Frequently Asked Questions about ULSAH4E
I’m teaching a course that uses UNIX and Linux System Administration Handbook as a textbook. Are there slides, outlines, or other materials available for instructors?
Unfortunately, no. This is something we’d like to do, but the scope of the book makes it likely that different courses will choose to focus on different aspects of the material included in the book. If you have specific suggestions for supplementary materials that you would find helpful, please let us know.
I’m interested in translating your book into another language.
Translation and foreign sales rights are handled by Prentice Hall. Please contact us and we will put you in touch with the right people.
Is your book available as an eBook? What formats are available?
ULSAH5E is available as a printed book, a Kindle book, a Nook-compatible ePub book, a DRM-free PDF file, and as an online resource through Safari Books Online. Please see the links on the home page.
Hey! I found a mistake! You suck!
We usually have the opportunity to make corrections before each printing. Please send us a note describing the issue and we will make sure it is addressed. (And thanks for your help!)
There’s a problem with my printed copy of the book.
A small number of books were sent into distribution with missing pages or with pages out of order. If you’ve ended up with one of these copies, please let us know and we will hook you up with a replacement.
Источник
UNIX and Linux System Administration Handbook, 5th Edition
©2018 | Addison-Wesley Professional | Available
If You’re an Educator
If You’re a Student
Introducing Pearson+ 1500+ eTexts and study tools, all in one place. Subscriptions starting at $9.99/month.
K-12 educators : This link is for individuals purchasing with credit cards or PayPal only. Contact your Savvas Learning Company Account General Manager for purchase options.
Overview
Description
UNIX and Linux System Administration Handbook, Fifth Edition is today’s definitive guide to installing, configuring and maintaining any Unix or Linux system — including the systems that provide core Internet and cloud infrastructure.
Now fully updated for today’s Linux distributions and cloud environments, it details best practices for every facet of system administration, including storage management, network design and administration, web hosting and scale-out, automation, configuration management, performance analysis, virtualization, DNS, security, management of IT service organizations, and much more. For modern system and network administrators, this edition contains indispensable new coverage of cloud deployments, continuous delivery, Docker and other containerization solutions, and much more.
Features
- Covers today’s hottest sysadmin topics, including cloud computing, containerization, and continuous delivery
- Addresses storage management, network design/administration, web hosting, automation, configuration management, performance analysis, virtualization, DNS, security, and more
- Fully updated for latest versions of all major Linux distributions
New to This Edition
Table of Contents
Tribute to Evi xl
Section One: Basic Administration 1
Chapter 1: Where to Start 3
Essential duties of a system administrator 4
Suggested background 7
Linux distributions 8
Example systems used in this book 9
Notation and typographical conventions 12
Man pages and other on-line documentation 14
Other authoritative documentation 16
Other sources of information 18
Ways to find and install software 19
Where to host 25
Specialization and adjacent disciplines 26
Chapter 2: Booting and System Management Daemons 30
Boot process overview 30
System firmware 32
Boot loaders 35
GRUB: the GRand Unified Boot loader 35
The FreeBSD boot process 39
System management daemons .41
systemd in detail 44
FreeBSD init and startup scripts 57
Reboot and shutdown procedures 59
Stratagems for a nonbooting system 60
Chapter 3: Access Control and Rootly Powers 65
Standard UNIX access control 66
Management of the root account69
Extensions to the standard access control model 79
Modern access control 83
Chapter 4: Process Control 90
Components of a process 90
The life cycle of a process 93
ps: monitor processes 98
Interactive monitoring with top101
nice and renice: influence scheduling priority102
The /proc filesystem 104
strace and truss: trace signals and system calls 105
Runaway processes 107
Chapter 5: The Filesystem 120
Filesystem mounting and unmounting 122
Organization of the file tree125
Access control lists 140
Chapter 6: Software Installation and Management 153
Operating system installation 154
Managing packages 162
Linux package management systems 164
High-level Linux package management systems 166
FreeBSD software management175
Software localization and configuration 178
Recommended reading 181
Chapter 7: Scripting and the Shell 182
Scripting philosophy 183
Shell basics 189
sh scripting 198
Regular expressions 209
Python programming 215
Ruby programming 223
Library and environment management for Python and Ruby 229
Revision control with Git 235
Recommended reading 241
Chapter 8: User Management 243
Account mechanics 244
The /etc/passwd file 245
The Linux /etc/shadow file250
FreeBSD’s /etc/master.passwd and /etc/login.conf files 252
The /etc/group file 254
Manual steps for adding users 255
Scripts for adding users: useradd, adduser, and newusers 260
Safe removal of a user’s account and files264
User login lockout265
Risk reduction with PAM 266
Centralized account management 266
Chapter 9: Cloud Computing 270
The cloud in context 271
Cloud platform choices 273
Cloud service fundamentals 276
Clouds: VPS quick start by platform283
Cost control 291
Recommended Reading 293
Chapter 10: Logging 294
The systemd journal 299
Kernel and boot-time logging 318
Management and rotation of log files 319
Management of logs at scale 321
Logging policies 323
Chapter 11: Drivers and the Kernel 325
Kernel chores for system administrators 326
Kernel version numbering 327
Devices and their drivers 328
Linux kernel configuration339
FreeBSD kernel configuration 344
Loadable kernel modules 346
Booting alternate kernels in the cloud 355
Recommended reading 359
Chapter 12: Printing 360
CUPS printing 361
CUPS server administration 365
Troubleshooting tips 369
Recommended reading 371
Section Two: Networking 373
Chapter 13: TCP/IP Networking 375
TCP/IP and its relationship to the Internet 375
Networking basics 378
IP addresses: the gory details 387
IPv4 ARP and IPv6 neighbor discovery 401
DHCP: the Dynamic Host Configuration Protocol402
Security issues 406
Basic network configuration 410
FreeBSD networking 425
Network troubleshooting 428
Network monitoring 437
Firewalls and NAT 440
Recommended reading 457
Chapter 14: Physical Networking 459
Ethernet: the Swiss Army knife of networking460
Wireless: Ethernet for nomads 469
SDN: software-defined networking 473
Network testing and debugging474
Building wiring 475
Network design issues476
Management issues 478
Recommended vendors 479
Recommended reading 480
Chapter 15: IP Routing 481
Packet forwarding: a closer look482
Routing daemons and routing protocols 485
Protocols on parade 488
Routing protocol multicast coordination490
Routing strategy selection criteria 490
Recommended reading 496
Chapter 16: DNS: The Domain Name System 498
DNS architecture 499
DNS for lookups 500
The DNS namespace 502
How DNS works 503
The DNS database512
The BIND software 525
Split DNS and the view statement 541
BIND configuration examples 543
Zone file updating547
DNS security issues 551
BIND debugging 568
Recommended reading 576
Chapter 17: Single Sign-On 578
Core SSO elements 579
LDAP: “lightweight” directory services 580
Using directory services for login 586
Recommended reading 595
Chapter 18: Electronic Mail 596
Mail system architecture 597
Anatomy of a mail message600
The SMTP protocol 603
Spam and malware 605
Message privacy and encryption 607
Mail aliases 608
Email configuration 612
Recommended reading 672
Chapter 19: Web Hosting 674
HTTP: the Hypertext Transfer Protocol 674
Web software basics 682
Web hosting in the cloud 694
Recommended reading 714
Section Three: Storage 715
Chapter 20: Storage 717
I just want to add a disk! 718
Storage hardware 721
Storage hardware interfaces 730
Attachment and low-level management of drives 733
The software side of storage: peeling the onion 739
Disk partitioning 742
Logical volume management 747
RAID: redundant arrays of inexpensive disks 753
Traditional filesystems: UFS, ext4, and XFS 763
Next-generation filesystems: ZFS and Btrfs 772
ZFS: all your storage problems solved 773
Btrfs: “ZFS lite” for Linux 783
Data backup strategy 788
Recommended reading 790
Chapter 21: The Network File System 791
Meet network file services 791
The NFS approach794
Server-side NFS 801
Client-side NFS 807
Identity mapping for NFS version 4 810
nfsstat: dump NFS statistics 811
Dedicated NFS file servers 812
Automatic mounting 812
Recommended reading 818
Chapter 22: SMB 819
Samba: SMB server for UNIX 820
Installing and configuring Samba 821
Mounting SMB file shares 825
Browsing SMB file shares 826
Ensuring Samba security 826
Recommended reading 829
Section Four: Operations 831
Chapter 23: Configuration Management 833
Configuration management in a nutshell834
Dangers of configuration management 834
Elements of configuration management 835
Popular CM systems compared 841
Introduction to Ansible 852
Introduction to Salt 871
Ansible and Salt compared 893
Recommended reading 899
Chapter 24: Virtualization 900
Virtualization with Linux 905
FreeBSD bhyve 910
Recommended reading 914
Chapter 25: Containers 915
Background and core concepts 916
Docker: the open source container engine 919
Containers in practice937
Container clustering and management 942
Recommended reading 948
Chapter 26: Continuous Integration and Delivery 949
CI/CD essentials 951
Jenkins: the open source automation server 961
CI/CD in practice964
Containers and CI/CD978
Recommended reading 980
Chapter 27: Security 981
Elements of security 983
How security is compromised 983
Basic security measures 987
Passwords and user accounts 992
Security power tools 996
SSH, the Secure SHell1016
Virtual private networks (VPNs) 1030
Certifications and standards 1031
Sources of security information 1034
When your site has been attacked 1037
Recommended reading 1038
Chapter 28: Monitoring 1040
An overview of monitoring 1041
The monitoring culture 1044
The monitoring platforms1045
Data collection 1051
Network monitoring 1055
Systems monitoring 1056
Application monitoring 1059
Security monitoring 1061
SNMP: the Simple Network Management Protocol 1063
Tips and tricks for monitoring1068
Recommended reading 1069
Chapter 29: Performance Analysis 1070
Performance tuning philosophy 1071
Ways to improve performance 1073
Factors that affect performance 1074
Stolen CPU cycles 1075
Analysis of performance problems 1076
System performance checkup 1077
Help! My server just got really slow! 1088
Recommended reading 1090
Chapter 30: Data Center Basics 1091
Cooling and environment1096
Data center reliability tiers 1101
Data center security 1102
Recommended reading 1104
Chapter 31: Methodology, Policy, and Politics 1105
The grand unified theory: DevOps 1106
Ticketing and task management systems 1111
Local documentation maintenance1115
Environment separation 1118
IT policies and procedures 1122
Service level agreements 1125
Compliance: regulations and standards 1127
Legal issues 1131
Organizations, conferences, and other resources 1133
Recommended reading 1135
A Brief History of System Administration 1166
About the Contributors 1178
About the Authors 1179
Resources
Instructor Resources
Format | On-line Supplement | |||||||||||||||||||||||||||||||||||
ISBN-13: | 9780135140086 | |||||||||||||||||||||||||||||||||||
Availability |
Format | Digital Access Code | |||||||||||||||||||||||||
ISBN-13: | 9780134872421 | |||||||||||||||||||||||||
Online purchase price | $55.99 | |||||||||||||||||||||||||
Availability |
Format | Website | ||||||||||||||||||
ISBN-13: | 9780135140758 | ||||||||||||||||||
Availability |
Format | Electronic Book | ||||||||
ISBN-13: | 9780137460359 | ||||||||
Online purchase price | $39.96 | Students, buy or rent this eText | |||||||
Availability |
Format | Paper | |
ISBN-13: | 9780134277554 | |
Suggested retail price | $69.99 | |
Availability |