"As this book shows, Linux systems are just as functional, secure, and reliable as their proprietary counterparts. Thanks to the ongoing efforts of thousands of Linux developers, Linux is more ready than ever for deployment at the frontlines of the real world. The authors of this book know that terrain well, and I am happy to leave you in their most capable hands."-Linus Torvalds"The most successful sysadmin book of all time-because it works!"-Rik Farrow, editor of ;login:"This book clearly explains current technology with the perspective of decades of experience in large-scale system administration. Unique and highly recommended."-Jonathan Corbet, cofounder, LWN.net"Nemeth et al. is the overall winner for Linux administration: it's intelligent, full of insights, and looks at the implementation of concepts."-Peter Salus, editorial director, Matrix.netSince 2001, Linux Administration Handbook has been the definitive resource for every Linux (R) system administrator who must efficiently solve technical problems and maximize the reliability and performance of a production environment. Now, the authors have systematically updated this classic guide to address today's most important Linux distributions and most powerful new administrative tools.The authors spell out detailed best practices for every facet of system administration, including storage management, network design and administration, web hosting, software configuration management, performance analysis, Windows interoperability, and much more. Sysadmins will especially appreciate the thorough and up-to-date discussions of such difficult topics such as DNS, LDAP, security, and the management of IT service organizations.Linux (R) Administration Handbook, Second Edition, reflects the current versions of these leading distributions:Red Hat (R) Enterprise Linux (R) FedoraTM Core SUSE (R) Linux Enterprise Debian (R) GNU/Linux Ubuntu (R) LinuxSharing their war stories and hard-won insights, the authors capture the behavior of Linux systems in the real world, not just in ideal environments. They explain complex tasks in detail and illustrate these tasks with examples drawn from their extensive hands-on experience.
Les mer
Foreword to the First Edition xxxiiiPreface xxxivAcknowledgments xxxviiSection One: Basic Administration 1Chapter 1: Where to Start 3Suggested background 4Linux's relationship to UNIX 4Linux in historical context 5Linux distributions 6Notation and typographical conventions 9Where to go for information 11How to find and install software 14Essential tasks of the system administrator 16System administration under duress 18Recommended reading 19Exercises 20Chapter 2: Booting and Shutting Down 21Bootstrapping 21Booting PCs 25Using boot loaders: LILO and GRUB 26Booting single-user mode 31Working with startup scripts 32Rebooting and shutting down 40Exercises 43Chapter 3: Rootly Powers 44Ownership of files and processes 44The superuser 46Choosing a root password 47Becoming root 48Other pseudo-users 51Exercises 52Chapter 4: Controlling Processes 53Components of a process 53The life cycle of a process 56Signals 57kill and killall: send signals 60Process states 60nice and renice: influence scheduling priority 61ps: monitor processes 62top: monitor processes even better 65The /proc filesystem 65strace: trace signals and system calls 66Runaway processes 67Recommended reading 69Exercises 69Chapter 5: The Filesystem 70Pathnames 72Filesystem mounting and unmounting 73The organization of the file tree 75File types 76File attributes 81Access control lists 88Exercises 92Chapter 6: Adding New Users 93The /etc/passwd file 93The /etc/shadow file 99The /etc/group file 101Adding users 102Removing users 107Disabling logins 108Managing accounts 108Exercises 110Chapter 7: Adding a Disk 111Disk interfaces 111Disk geometry 119Linux filesystems 120An overview of the disk installation procedure 122hdparm: set IDE interface parameters 129fsck: check and repair filesystems 131Adding a disk: a step-by-step guide 133Advanced disk management: RAID and LVM 138Mounting USB drives 147Exercises 148Chapter 8: Periodic Processes 150cron: schedule commands 150The format of crontab files 151Crontab management 153Some common uses for cron 154Other schedulers: anacron and fcron 156Exercises 157Chapter 9: Backups 158Motherhood and apple pie 159Backup devices and media 163Setting up an incremental backup regime with dump 169Restoring from dumps with restore 173Dumping and restoring for upgrades 176Using other archiving programs 177Using multiple files on a single tape 178Bacula 179Commercial backup products 197Recommended reading 198Exercises 198Chapter 10: Syslog and Log Files 201Logging policies 201Linux log files 204logrotate: manage log files 208Syslog: the system event logger 209Condensing log files to useful information 220Exercises 222Chapter 11: Software and Configuration Management 223Basic Linux installation 223Diskless clients 232Package management 234High-level package management systems 237Revision control 247Localization and configuration 255Configuration management tools 260Sharing software over NFS 263Recommended software 266Recommended reading 268Exercises 268Section Two: Networking 269Chapter 12: TCP/IP Networking 271TCP/IP and the Internet 272Networking road map 275Packets and encapsulation 276IP addresses: the gory details 282Routing 293ARP: the address resolution protocol 296Addition of a machine to a network 297Distribution-specific network configuration 307DHCP: the Dynamic Host Configuration Protocol 311Dynamic reconfiguration and tuning 314Security issues 316Linux NAT 319PPP: the Point-to-Point Protocol 320Linux networking quirks 330Recommended reading 331Exercises 332Chapter 13: Routing 334Packet forwarding: a closer look 335Routing daemons and routing protocols 337Protocols on parade 341routed: RIP yourself a new hole 343gated: gone to the dark side 344Routing strategy selection criteria 344Cisco routers 346Recommended reading 348Exercises 349Chapter 14: Network Hardware 350LAN, WAN, or MAN? 351Ethernet: the common LAN 351Wireless: nomad's LAN 359FDDI: the disappointing, expensive, and outdated LAN 361ATM: the promised (but sorely defeated) LAN 362Frame relay: the sacrificial WAN 363ISDN: the indigenous WAN 364DSL and cable modems: the people's WAN 364Where is the network going? 365Network testing and debugging 366Building wiring 366Network design issues 368Management issues 370Recommended vendors 371Recommended reading 372Exercises 372Chapter 15: DNS: The Domain Name System 373DNS for the impatient: adding a new machine 374The history of DNS 375Who needs DNS? 377The DNS namespace 378How DNS works 383What's new in DNS 386The DNS database 389The BIND software 409Designing your DNS environment 415BIND client issues 418BIND server configuration 420BIND configuration examples 439Starting named 446Updating zone files 447Security issues 451Testing and debugging 466Distribution specifics 478Recommended reading 481Exercises 482Chapter 16: The Network File System 484General information about NFS 484Server-side NFS 489Client-side NFS 492nfsstat: dump NFS statistics 495Dedicated NFS file servers 496Automatic mounting 497Recommended reading 500Exercises 501Chapter 17: Sharing System Files 502What to share 503nscd: cache the results of lookups 504Copying files around 505NIS: the Network Information Service 511LDAP: the Lightweight Directory Access Protocol 520Recommended reading 526Exercises 527Chapter 18: Electronic Mail 528Mail systems 530The anatomy of a mail message 534Mail philosophy 539Mail aliases 544Mailing lists and list wrangling software 551sendmail: ringmaster of the electronic mail circus 557sendmail configuration 565Basic sendmail configuration primitives 570Fancier sendmail configuration primitives 574Spam-related features in sendmail 588Configuration file case study 599Security and sendmail 603sendmail performance 611sendmail statistics, testing, and debugging 615The Exim Mail System 621Postfix 623Recommended reading 639Exercises 640Chapter 19: Network Management and Debugging 643Network troubleshooting 644ping: check to see if a host is alive 645traceroute: trace IP packets 647netstat: get network statistics 649sar: inspect live interface activity 654Packet sniffers 655Network management protocols 657SNMP: the Simple Network Management Protocol 659The NET-SMNP agent 661Network management applications 662Recommended reading 667Exercises 668Chapter 20: Security 669Is Linux secure? 670How security is compromised 671Certifications and standards 673Security tips and philosophy 676Security problems in /etc/passwd and /etc/shadow 678POSIX capabilities 683Setuid programs 683Important file permissions 684Miscellaneous security issues 685Security power tools 688Cryptographic security tools 694Firewalls 701Linux firewall features: IP tables 704Virtual private networks (VPNs) 708Hardened Linux distributions 710What to do when your site has been attacked 710Sources of security information 712Recommended reading 715Exercises 716Chapter 21: Web Hosting and Internet Servers 719Web hosting basics 720HTTP server installation 724Virtual interfaces 727The Secure Sockets Layer (SSL) 730Caching and proxy servers 733Anonymous FTP server setup 734Exercises 736Section Three: Bunch O' Stuff 739Chapter 22: The X Window System 741The X display manager 743Running an X application 744X server configuration 748Troubleshooting and debugging 754A brief note on desktop environments 757Recommended Reading 759Exercises 759Chapter 23: Printing 761Printers are complicated 762Printer languages 763CUPS architecture 767CUPS server administration 772Troubleshooting tips 780Printer practicalities 782Other printer advice 784Printing under KDE 788Recommended reading 790Exercises 790Chapter 24: Maintenance and Environment 791Hardware maintenance basics 791Maintenance contracts 792Electronics-handling lore 793Monitors 794Memory modules 794Preventive maintenance 795Environment 796Power 798Racks 799Data center standards 800Tools 800Recommended reading 800Exercises 802Chapter 25: Performance Analysis 803What you can do to improve performance 804Factors that affect performance 806System performance checkup 807Help! My system just got really slow! 817Recommended reading 819Exercises 819Chapter 26: Cooperating with Windows 821Logging in to a Linux system from Windows 821Accessing remote desktops 822Running Windows and Windows-like applications 825Using command-line tools with Windows 826Windows compliance with email and web standards 827Sharing files with Samba and CIFS 828Sharing printers with Samba 836Debugging Samba 840Recommended reading 841Exercises 842Chapter 27: Serial Devices 843The RS-232C standard 844Alternative connectors 847Hard and soft carrier 852Hardware flow control 852Cable length 853Serial device files 853setserial: set serial port parameters 854Software configuration for serial devices 855Configuration of hardwired terminals 855Special characters and the terminal driver 859stty: set terminal options 860tset: set options automatically 861Terminal unwedging 862Modems 862Debugging a serial line 864Other common I/O ports 865Exercises 866Chapter 28: Drivers and the Kernel 868Kernel adaptation 869Drivers and device files 870Why and how to configure the kernel 873Tuning Linux kernel parameters 874Building a Linux kernel 876Adding a Linux device driver 878Loadable kernel modules 880Hot-plugging 882Setting bootstrap options 883Recommended reading 884Exercises 884Chapter 29: Daemons 885init: the primordial process 886cron and atd: schedule commands 887xinetd and inetd: manage daemons 887Kernel daemons 893Printing daemons 894File service daemons 895Administrative database daemons 896Electronic mail daemons 897Remote login and command execution daemons 898Booting and configuration daemons 898Other network daemons 900ntpd: time synchronization daemon 902Exercises 903Chapter 30: Management, Policy, and Politics 904Make everyone happy 904Components of a functional IT organization 906The role of management 907The role of administration 915The role of development 919The role of operations 924The work of support 927Documentation 930Request-tracking and trouble-reporting systems 934Disaster recovery 938Written policy 943Legal Issues 949Software patents 957Standards 958Linux culture 961Mainstream Linux 962Organizations, conferences, and other resources 964Recommended Reading 968Exercises 970Index 973About the Contributors 999About the Authors 1001
Les mer
"'Linux Administration Handbook, 2nd Edition deserves a place of honor on the shelf of every practicing Linux admin and anyone else who wants to learn. I predict though, that it won't spend many hours on the shelf. It is better used by your side at the keyboard and you learn from its pages."-James Pyles, Reviewer, The Linux Tutorial
Les mer
The first edition of this book became known for its thorough and lucid coverage of some of the toughest topics in system administration, including DNS, sendmail, and security. The new edition will focus on many open source tools that have gained acceptance since 1/e was published, including Nagios for network monitoring. Most titles on Linux administration focus on the configuration of a single box. Linux Administration Handbook (LAH) was the first title in this area to focus on the administration of a Linux system in a production environment. LAH examines how Linux systems behave in real-world ecosystems, not how they might behave in ideal environments. The Second Edition incorporates the changes in Linux systems in the past 54 months, which include current versions of RedHat, SuSE and Debian systems, new topics like Logical Volume Manager, X11 basic administration, and Nagios. Chapters on system admin policy, bind, sendmail, and security have been updated.
Les mer

Produktdetaljer

ISBN
9780131480049
Publisert
2006-11-09
Utgave
2. utgave
Utgiver
Vendor
Prentice Hall
Vekt
1348 gr
Høyde
179 mm
Bredde
232 mm
Dybde
33 mm
Aldersnivå
06, P
Språk
Product language
Engelsk
Format
Product format
Heftet
Antall sider
1040

Biographical note

Evi Nemeth is retired from the computer science faculty at the University of Colorado and is a senior staff member in network research at CAIDA, the Cooperative Association for Internet Data Analysis at the San Diego Supercomputer Center.

Garth Snyder has worked at NeXT and Sun and holds a degree in electrical engineering from Swarthmore College. He recently received an M.D./M.B.A. from the University of Rochester.

Trent R. Hein is the cofounder of Applied Trust Engineering, a company that provides network infrastructure security and performance consulting services. Trent holds a B.S. in computer science from the University of Colorado.