Evi nemeth linux administration handbook

Find it online

  • Sample chapters
  • Table of Contents
  • Tribute to Evi
  • Preface
  • Foreword
  • Where to Start
  • Index
  • Past Forewords
  • LAH1E by Linus Torvalds
  • ULSAH4E by Tim O’Reilly
  • USAH2E by Allman and McKusick
  • USAH1E by Dennis Ritchie
  • Other resources
  • Errata and updates (4th Edition)
  • Frequently asked questions
  • Obsolete chapters
  • SLIP and PPP (USAH2E)
  • Usenet News (USAH2E)
  • Disk Space Management (USAH2E)
  • Accounting (USAH2E)
  • UUCP (USAH2E)
  • Daemons (LAH2E)
  • Serial Devices and Terminals (ULSAH4E)
  • The X Windows System (ULSAH4E)

UNIX and Linux System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure.

Updated for new distributions and cloud environments, this comprehensive guide covers best practices for every facet of system administration, including storage management, network design and administration, security, web hosting, automation, configuration management, performance analysis, virtualization, DNS, security, and the management of IT service organizations. The authors—world-class, hands-on technologists—offer indispensable new coverage of cloud platforms, the DevOps philosophy, continuous deployment, containerization, monitoring, and many other essential topics.

Whatever your role in running systems and networks built on UNIX or Linux, this conversational, well-written guide will improve your efficiency and help solve your knottiest problems.

Contact us

Errata for UNIX and Linux System Administration Handbook, 4E

We usually have the opportunity to make corrections before each printing. Therefore, your book’s complement of errors may vary depending on its printing. To determine your printing, look at the last line of the copyright page.

Found a problem not listed here? Please let us know.

Page 33

The backquoted command wc -l /etc/passwd seen in the page’s last command line should actually be wc -l -le and -ge operators. The >= and operators listed in Table 2.2 do not exist.

The > and operators do exist. However, they must be backslash-escaped or double bracketed to prevent them from being interpreted as I/O redirection characters.

Page 45

The loop variable in the example for loop is actually called script . The text refers to it as file .

Pages 51 and 52

The regular expression shown on pages 51–52 for matching various spellings of Moammar Gadhafi’s name is OK as originally printed. However, the accompanying text does not explain why the ([dtz][dhz]?)+ group (a component of the last name match) allows repetition.

The + is there to accommodate variants such as Quadhdhafi. Really, that fragment should be ([dtz][dhz]?) <1,2>so that only one or two occurrences are permissible.

More generally, it’s worth noting that this regex is permissive. Not every string that it matches is a legitimate spelling of Gadhafi’s name. However, it should match all legitimate spellings.

Page 153

The cross-reference in the last line of the first paragraph under The setuid and setgid bits points to the wrong place.

The referenced material is on page 105, not page 106.

Page 466

The route commands at the bottom of the page are shell commands, not excerpts from a startup script as the surrounding text might imply.

The # character indicates root’s shell prompt, not the comment character used in shell scripts.

Page 574

DNS Punycode names begin with xn-- , not xf— as stated in the text.

Page 808

In addition to having its own conventions, Debian’s version of Exim configuration uses the m4 preprocessor.

We don’t describe the Debian system in this book.

Page 817

There are two errors on this page.

In the sentence «The sender’s address is not checked because many user agents get confused by error returns,» replace «sender’s address» with «recipient’s address.»

The paragraph that starts «We next check the destination domain. » claims that DKIM verification is not performed during this step. That is incorrect; DKIM is in fact enabled.

Читайте также:  Отмена изменений windows 10 при восстановлении системы бесконечно

Page 821

It is not entirely accurate to say that «If a message receives a pass or decline from all the routers in the sequence, it is bounced as an unroutable address.»

In fact, Exim may either bounce or reject such messages, depending on the context.

Page 827

Contrary to the statement in the Debugging section, exim does fork when given the -d flag. However, it does not detach itself from the control terminal.

Page 852

In the configuration file excerpt, the line that sets dkim_selector should do a lookup on $dkim_domain , not $sender_address_domain as shown.

No formal errata are available for this printing yet.
We will update this list after the next printing has been finalized.

Frequently Asked Questions about ULSAH4E

I’m teaching a course that uses UNIX and Linux System Administration Handbook as a textbook. Are there slides, outlines, or other materials available for instructors?

Unfortunately, no. This is something we’d like to do, but the scope of the book makes it likely that different courses will choose to focus on different aspects of the material included in the book. If you have specific suggestions for supplementary materials that you would find helpful, please let us know.

I’m interested in translating your book into another language.

Translation and foreign sales rights are handled by Prentice Hall. Please contact us and we will put you in touch with the right people.

Is your book available as an eBook? What formats are available?

ULSAH5E is available as a printed book, a Kindle book, a Nook-compatible ePub book, a DRM-free PDF file, and as an online resource through Safari Books Online. Please see the links on the home page.

Hey! I found a mistake! You suck!

We usually have the opportunity to make corrections before each printing. Please send us a note describing the issue and we will make sure it is addressed. (And thanks for your help!)

There’s a problem with my printed copy of the book.

A small number of books were sent into distribution with missing pages or with pages out of order. If you’ve ended up with one of these copies, please let us know and we will hook you up with a replacement.

Источник

UNIX and Linux System Administration Handbook, 5th Edition

©2018 | Addison-Wesley Professional | Available

If You’re an Educator

If You’re a Student

Introducing Pearson+ 1500+ eTexts and study tools, all in one place. Subscriptions starting at $9.99/month.

K-12 educators : This link is for individuals purchasing with credit cards or PayPal only. Contact your Savvas Learning Company Account General Manager for purchase options.

Overview

Description

UNIX and Linux System Administration Handbook, Fifth Edition is today’s definitive guide to installing, configuring and maintaining any Unix or Linux system — including the systems that provide core Internet and cloud infrastructure.

Now fully updated for today’s Linux distributions and cloud environments, it details best practices for every facet of system administration, including storage management, network design and administration, web hosting and scale-out, automation, configuration management, performance analysis, virtualization, DNS, security, management of IT service organizations, and much more. For modern system and network administrators, this edition contains indispensable new coverage of cloud deployments, continuous delivery, Docker and other containerization solutions, and much more.

Features

  • Covers today’s hottest sysadmin topics, including cloud computing, containerization, and continuous delivery
  • Addresses storage management, network design/administration, web hosting, automation, configuration management, performance analysis, virtualization, DNS, security, and more
  • Fully updated for latest versions of all major Linux distributions

New to This Edition

Table of Contents

Tribute to Evi xl

Section One: Basic Administration 1

Chapter 1: Where to Start 3

Essential duties of a system administrator 4

Suggested background 7

Linux distributions 8

Example systems used in this book 9

Notation and typographical conventions 12

Man pages and other on-line documentation 14

Other authoritative documentation 16

Other sources of information 18

Ways to find and install software 19

Where to host 25

Specialization and adjacent disciplines 26

Chapter 2: Booting and System Management Daemons 30

Boot process overview 30

System firmware 32

Boot loaders 35

GRUB: the GRand Unified Boot loader 35

The FreeBSD boot process 39

System management daemons .41

systemd in detail 44

FreeBSD init and startup scripts 57

Reboot and shutdown procedures 59

Stratagems for a nonbooting system 60

Chapter 3: Access Control and Rootly Powers 65

Standard UNIX access control 66

Management of the root account69

Extensions to the standard access control model 79

Modern access control 83

Chapter 4: Process Control 90

Components of a process 90

The life cycle of a process 93

Читайте также:  Avz восстановление файлов windows

ps: monitor processes 98

Interactive monitoring with top101

nice and renice: influence scheduling priority102

The /proc filesystem 104

strace and truss: trace signals and system calls 105

Runaway processes 107

Chapter 5: The Filesystem 120

Filesystem mounting and unmounting 122

Organization of the file tree125

Access control lists 140

Chapter 6: Software Installation and Management 153

Operating system installation 154

Managing packages 162

Linux package management systems 164

High-level Linux package management systems 166

FreeBSD software management175

Software localization and configuration 178

Recommended reading 181

Chapter 7: Scripting and the Shell 182

Scripting philosophy 183

Shell basics 189

sh scripting 198

Regular expressions 209

Python programming 215

Ruby programming 223

Library and environment management for Python and Ruby 229

Revision control with Git 235

Recommended reading 241

Chapter 8: User Management 243

Account mechanics 244

The /etc/passwd file 245

The Linux /etc/shadow file250

FreeBSD’s /etc/master.passwd and /etc/login.conf files 252

The /etc/group file 254

Manual steps for adding users 255

Scripts for adding users: useradd, adduser, and newusers 260

Safe removal of a user’s account and files264

User login lockout265

Risk reduction with PAM 266

Centralized account management 266

Chapter 9: Cloud Computing 270

The cloud in context 271

Cloud platform choices 273

Cloud service fundamentals 276

Clouds: VPS quick start by platform283

Cost control 291

Recommended Reading 293

Chapter 10: Logging 294

The systemd journal 299

Kernel and boot-time logging 318

Management and rotation of log files 319

Management of logs at scale 321

Logging policies 323

Chapter 11: Drivers and the Kernel 325

Kernel chores for system administrators 326

Kernel version numbering 327

Devices and their drivers 328

Linux kernel configuration339

FreeBSD kernel configuration 344

Loadable kernel modules 346

Booting alternate kernels in the cloud 355

Recommended reading 359

Chapter 12: Printing 360

CUPS printing 361

CUPS server administration 365

Troubleshooting tips 369

Recommended reading 371

Section Two: Networking 373

Chapter 13: TCP/IP Networking 375

TCP/IP and its relationship to the Internet 375

Networking basics 378

IP addresses: the gory details 387

IPv4 ARP and IPv6 neighbor discovery 401

DHCP: the Dynamic Host Configuration Protocol402

Security issues 406

Basic network configuration 410

FreeBSD networking 425

Network troubleshooting 428

Network monitoring 437

Firewalls and NAT 440

Recommended reading 457

Chapter 14: Physical Networking 459

Ethernet: the Swiss Army knife of networking460

Wireless: Ethernet for nomads 469

SDN: software-defined networking 473

Network testing and debugging474

Building wiring 475

Network design issues476

Management issues 478

Recommended vendors 479

Recommended reading 480

Chapter 15: IP Routing 481

Packet forwarding: a closer look482

Routing daemons and routing protocols 485

Protocols on parade 488

Routing protocol multicast coordination490

Routing strategy selection criteria 490

Recommended reading 496

Chapter 16: DNS: The Domain Name System 498

DNS architecture 499

DNS for lookups 500

The DNS namespace 502

How DNS works 503

The DNS database512

The BIND software 525

Split DNS and the view statement 541

BIND configuration examples 543

Zone file updating547

DNS security issues 551

BIND debugging 568

Recommended reading 576

Chapter 17: Single Sign-On 578

Core SSO elements 579

LDAP: “lightweight” directory services 580

Using directory services for login 586

Recommended reading 595

Chapter 18: Electronic Mail 596

Mail system architecture 597

Anatomy of a mail message600

The SMTP protocol 603

Spam and malware 605

Message privacy and encryption 607

Mail aliases 608

Email configuration 612

Recommended reading 672

Chapter 19: Web Hosting 674

HTTP: the Hypertext Transfer Protocol 674

Web software basics 682

Web hosting in the cloud 694

Recommended reading 714

Section Three: Storage 715

Chapter 20: Storage 717

I just want to add a disk! 718

Storage hardware 721

Storage hardware interfaces 730

Attachment and low-level management of drives 733

The software side of storage: peeling the onion 739

Disk partitioning 742

Logical volume management 747

RAID: redundant arrays of inexpensive disks 753

Traditional filesystems: UFS, ext4, and XFS 763

Next-generation filesystems: ZFS and Btrfs 772

ZFS: all your storage problems solved 773

Btrfs: “ZFS lite” for Linux 783

Data backup strategy 788

Recommended reading 790

Chapter 21: The Network File System 791

Meet network file services 791

The NFS approach794

Server-side NFS 801

Client-side NFS 807

Identity mapping for NFS version 4 810

nfsstat: dump NFS statistics 811

Dedicated NFS file servers 812

Automatic mounting 812

Recommended reading 818

Chapter 22: SMB 819

Samba: SMB server for UNIX 820

Installing and configuring Samba 821

Mounting SMB file shares 825

Читайте также:  Install netbeans c windows

Browsing SMB file shares 826

Ensuring Samba security 826

Recommended reading 829

Section Four: Operations 831

Chapter 23: Configuration Management 833

Configuration management in a nutshell834

Dangers of configuration management 834

Elements of configuration management 835

Popular CM systems compared 841

Introduction to Ansible 852

Introduction to Salt 871

Ansible and Salt compared 893

Recommended reading 899

Chapter 24: Virtualization 900

Virtualization with Linux 905

FreeBSD bhyve 910

Recommended reading 914

Chapter 25: Containers 915

Background and core concepts 916

Docker: the open source container engine 919

Containers in practice937

Container clustering and management 942

Recommended reading 948

Chapter 26: Continuous Integration and Delivery 949

CI/CD essentials 951

Jenkins: the open source automation server 961

CI/CD in practice964

Containers and CI/CD978

Recommended reading 980

Chapter 27: Security 981

Elements of security 983

How security is compromised 983

Basic security measures 987

Passwords and user accounts 992

Security power tools 996

SSH, the Secure SHell1016

Virtual private networks (VPNs) 1030

Certifications and standards 1031

Sources of security information 1034

When your site has been attacked 1037

Recommended reading 1038

Chapter 28: Monitoring 1040

An overview of monitoring 1041

The monitoring culture 1044

The monitoring platforms1045

Data collection 1051

Network monitoring 1055

Systems monitoring 1056

Application monitoring 1059

Security monitoring 1061

SNMP: the Simple Network Management Protocol 1063

Tips and tricks for monitoring1068

Recommended reading 1069

Chapter 29: Performance Analysis 1070

Performance tuning philosophy 1071

Ways to improve performance 1073

Factors that affect performance 1074

Stolen CPU cycles 1075

Analysis of performance problems 1076

System performance checkup 1077

Help! My server just got really slow! 1088

Recommended reading 1090

Chapter 30: Data Center Basics 1091

Cooling and environment1096

Data center reliability tiers 1101

Data center security 1102

Recommended reading 1104

Chapter 31: Methodology, Policy, and Politics 1105

The grand unified theory: DevOps 1106

Ticketing and task management systems 1111

Local documentation maintenance1115

Environment separation 1118

IT policies and procedures 1122

Service level agreements 1125

Compliance: regulations and standards 1127

Legal issues 1131

Organizations, conferences, and other resources 1133

Recommended reading 1135

A Brief History of System Administration 1166

About the Contributors 1178

About the Authors 1179

Resources

Instructor Resources

Format On-line Supplement
ISBN-13: 9780135140086
Availability

Discipline Resources

Format Digital Access Code
ISBN-13: 9780134872421
Online purchase price $55.99
Availability

Order

Pearson offers affordable and accessible purchase options to meet the needs of your students. Connect with us to learn more.

K12 Educators: Contact your Savvas Learning Company Account General Manager for purchase options. Instant Access ISBNs are for individuals purchasing with credit cards or PayPal.
Savvas Learning Company is a trademark of Savvas Learning Company LLC.

Digital

Pearson eText for UNIX and Linux System Administration Handbook — Instant Access, 5th Edition

Nemeth, Snyder, Hein, Whaley & Mackin

Format Website
ISBN-13: 9780135140758
Availability

Paper

UNIX and Linux System Administration Handbook, 5th Edition

Nemeth, Snyder, Hein, Whaley & Mackin

©2018 &nbsp|&nbspAddison-Wesley Professional &nbsp|&nbsp1232 pp

Format Electronic Book
ISBN-13: 9780137460359
Online purchase price $39.96 Students, buy or rent this eText
Availability

About the Author(s)

Evi Nemeth pioneered the discipline of UNIX system administration. She taught and mentored computer science students at the University of Colorado Boulder, was visiting faculty member at Dartmouth College and UC San Diego, and helped bring Internet technology to the developing world through her work with the Internet Society and the United Nations.В

Garth Snyder has worked at NeXT and Sun and holds a BS in Engineering from Swarthmore College and an MD and an MBA from the University of Rochester.В

Trent R. Hein (@trenthein) is a serial entrepreneur who is passionate about practical cybersecurity and automation. Outside of technology, he loves hiking, skiing, fly fishing, camping, bluegrass, dogs, and theВ Oxford comma. Trent holds a BS in Computer Science from the University of Colorado.

Ben Whaley is the founder of WhaleTech, an independent consultancy. He was honored by Amazon as one of the first AWS Community Heroes. He obtained a B.S. in Computer Science from the University of Colorado at Boulder.В

Dan Mackin’s (@dan_mackin) long-standing passion for technology inspired him to get a BS in Electrical and Computer Engineering from the University of Colorado at Boulder.  He applies Linux and other open source technologies not only in his day job, but also to automation, monitoring, and weather metrics collection projects at home. Dan loves spending time with his wife and dog, skiing, movies, sailing, and backcountry touring.

Источник

Оцените статью
Format Paper
ISBN-13: 9780134277554
Suggested retail price $69.99
Availability