<p> Introduction. . . . . . . . . . . . xxiv</p> <p> </p> <p><strong>Part I: System Management</strong></p> <p><strong>CHAPTER 1: </strong><strong>Linux Fundamentals</strong><strong>. . . . . . . . . . . </strong><strong>1</strong></p> <p> Filesystem Hierarchy Standard (FHS).. . . . . . . 1</p> <p> Basic Boot Process.. . . . . . . . . . 3</p> <p> Kernel Panic. . . . . . . . . . . 10</p> <p> Device Types in /dev.. . . . . . . . . 10</p> <p> Basic Package Compilation from Source.. . . . . . 13</p> <p> ./configure.. . . . . . . . . . 13</p> <p> make.. . . . . . . . . . . 15</p> <p> make install.. . . . . . . . . . 16</p> <p> Storage Concepts.. . . . . . . . . . 16</p> <p> Listing Hardware Information.. . . . . . . . 22</p> <p> </p> <p><strong>CHAPTER 2: </strong><strong>Manage Files and Directories</strong><strong>.. . . . . . . . . </strong><strong>27</strong></p> <p> File Editing.. . . . . . . . . . . 27</p> <p> File Compression, Archiving, and Backup. . . . . . 36</p> <p> File Metadata.. . . . . . . . . . . 41</p> <p> Soft and Hard Links.. . . . . . . . . 43</p> <p> Copying Files Between Systems.. . . . . . . 46</p> <p> File and Directory Operations.. . . . . . . . 49</p> <p> </p> <p><strong>CHAPTER 3: </strong><strong>Configure and Manage Storage Using the Appropriate Tools</strong><strong>.. . . </strong><strong>57</strong></p> <p> Disk Partitioning.. . . . . . . . . . 57</p> <p> Mounting Local and Remote Devices.. . . . . . 61</p> <p> Filesystem Management. . . . . . . . . 66</p> <p> Monitoring Storage Space and Disk Usage. . . . . . 70</p> <p> Creating and Modifying Volumes Using Logical Volume Manager (LVM).. . . . . . . . . . 71</p> <p> Inspecting RAID Implementations.. . . . . . . 75</p> <p> Storage Area Network (SAN)/Network-Attached Storage (NAS). . 78</p> <p> Storage Hardware.. . . . . . . . . . 82</p> <p> </p> <p><strong>CHAPTER 4: </strong><strong>Configure and Use the Appropriate Processes and Services</strong><strong>.. . . </strong><strong>85</strong></p> <p> System Services. . . . . . . . . . 85</p> <p> Scheduling Services. . . . . . . . . . 90</p> <p> Process Management. . . . . . . . . 97</p> <p> </p> <p><strong>CHAPTER 5: </strong><strong>Use the Appropriate Networking Tools or Configuration Files</strong><strong>. . . </strong><strong>113</strong></p> <p> Interface Management.. . . . . . . . . 113</p> <p> Name Resolution.. . . . . . . . . . 122</p> <p> Network Monitoring.. . . . . . . . . 127</p> <p> Remote Networking Tools.. . . . . . . . 132</p> <p> </p> <p><strong>CHAPTER 6: </strong><strong>Build and Install Software</strong><strong>. . . . . . . . . </strong><strong>139</strong></p> <p> Package Management.. . . . . . . . . 139</p> <p> Sandboxed Applications.. . . . . . . . . 149</p> <p> System Updates.. . . . . . . . . . 150</p> <p> </p> <p><strong>Part II: Security</strong></p> <p><strong>CHAPTER 7: </strong><strong>Manage Software Configurations</strong><strong>.. . . . . . . . </strong><strong>155</strong></p> <p> Updating Configuration Files.. . . . . . . . 155</p> <p> Configure Kernel Options.. . . . . . . . 158</p> <p> Configure Common System Services.. . . . . . . 165</p> <p> Localization.. . . . . . . . . . . 172</p> <p> </p> <p><strong>CHAPTER 8: </strong><strong>Security Best Practices in a Linux Environment</strong><strong>.. . . . . </strong><strong>177</strong></p> <p> Managing Public Key Infrastructure (PKI) Certificates.. . . 177</p> <p> Certificate Use Cases. . . . . . . . . 181</p> <p> Authentication.. . . . . . . . . . 181</p> <p> Linux Hardening.. . . . . . . . . . 188</p> <p> </p> <p><strong>CHAPTER 9: </strong><strong>Implement Identity Management</strong><strong>. . . . . . . . </strong><strong>201</strong></p> <p> Account Creation and Deletion. . . . . . . . 201</p> <p> .bashrc. . . . . . . . . . . 212</p> <p> Account Management.. . . . . . . . . 212</p> <p> </p> <p><strong>CHAPTER 10: </strong><strong>Implement and Configure Firewalls</strong><strong>.. . . . . . . . </strong><strong>219</strong></p> <p> Firewall Use Cases.. . . . . . . . . . 219</p> <p> Common Firewall Technologies.. . . . . . . 221</p> <p> Key Firewall Features.. . . . . . . . . 223</p> <p> </p> <p><strong>CHAPTER 11: </strong><strong>Configure and Execute Remote Connectivity for System Management</strong><strong>.. </strong><strong>227</strong></p> <p> SSH.. . . . . . . . . . . . 227</p> <p> Executing Commands as Another User.. . . . . . 235</p> <p> </p> <p><strong>CHAPTER 12: </strong><strong>Apply the Appropriate Access Controls</strong><strong>. . . . . . . </strong><strong>241</strong></p> <p> File Permissions.. . . . . . . . . . 241</p> <p> Security-Enhanced Linux (SELinux).. . . . . . . 243</p> <p> AppArmor.. . . . . . . . . . . 247</p> <p> Command-Line Utilities.. . . . . . . . . 250</p> <p> </p> <p><strong>Part III: Scripting, Containers, and Automation</strong></p> <p><strong>CHAPTER 13: </strong><strong>Create Simple Shell Scripts to Automate Common Tasks</strong><strong>. . . . </strong><strong>265</strong></p> <p> Shell Script Elements.. . . . . . . . . 265</p> <p> Common Script Utilities.. . . . . . . . . 286</p> <p> Environment Variables. . . . . . . . . 298</p> <p> Relative and Absolute Paths.. . . . . . . . 302</p> <p> </p> <p><strong>CHAPTER 14: </strong><strong>Perform Basic Container Operations</strong><strong>. . . . . . . </strong><strong>305</strong></p> <p> Container Management.. . . . . . . . . 305</p> <p> Container Image Operations.. . . . . . . . 312</p> <p> </p> <p><strong>CHAPTER 15: </strong><strong>Perform Basic Version Control Using Git</strong><strong>.. . . . . . . </strong><strong>317</strong></p> <p> Introduction to Version Control and Git.. . . . . . 317</p> <p> clone.. . . . . . . . . . . . 321</p> <p> push.. . . . . . . . . . . . 323</p> <p> pull.. . . . . . . . . . . . 324</p> <p> commit.. . . . . . . . . . . . 324</p> <p> add.. . . . . . . . . . . . 325</p> <p> branch/checkout.. . . . . . . . . . 325</p> <p> tag.. . . . . . . . . . . . 329</p> <p> gitignore.. . . . . . . . . . . 330</p> <p> </p> <p><strong>CHAPTER 16: </strong><strong>Common Infrastructure as Code Technologies</strong><strong>.. . . . . </strong><strong>333</strong></p> <p> File Formats. . . . . . . . . . . 334</p> <p> Utilities.. . . . . . . . . . . . 335</p> <p> Continuous Integration/Continuous Deployment (CI/CD).. . . 338</p> <p> Advanced Git Topics.. . . . . . . . . 339</p> <p> </p> <p><strong>CHAPTER 17: </strong><strong>Container, Cloud, and Orchestration Concepts</strong><strong>.. . . . . </strong><strong>343</strong></p> <p> Kubernetes Benefits and Application Use Cases.. . . . . 344</p> <p> Single-Node, Multicontainer Use Cases. . . . . . 346</p> <p> Container Persistent Storage.. . . . . . . . 346</p> <p> Container Networks.. . . . . . . . . 347</p> <p> Service Mesh.. . . . . . . . . . . 349</p> <p> Bootstrapping. . . . . . . . . . . 350</p> <p> Container Registries.. . . . . . . . . 350</p> <p> </p> <p><strong>Part IV: Troubleshooting</strong></p> <p><strong>CHAPTER 18: </strong><strong>Analyze and Troubleshoot Storage Issues</strong><strong>.. . . . . . </strong><strong>353</strong></p> <p> High Latency.. . . . . . . . . . . 353</p> <p> Input/Output Operations per Second (IOPS) Scenarios.. . . 354</p> <p> Capacity Issues.. . . . . . . . . . 355</p> <p> Filesystem Issues. . . . . . . . . . 358</p> <p> I/O Scheduler. . . . . . . . . . . 359</p> <p> Device Issues.. . . . . . . . . . . 360</p> <p> Mount Option Problems.. . . . . . . . . 363</p> <p> </p> <p><strong>CHAPTER 19: </strong><strong>Analyze and Troubleshoot Network Resource Issues</strong><strong>.. . . . </strong><strong>365</strong></p> <p> Network Configuration Issues.. . . . . . . . 365</p> <p> Firewall Issues.. . . . . . . . . . 367</p> <p> Interface Errors.. . . . . . . . . . 367</p> <p> Bandwidth Limitations. . . . . . . . . 373</p> <p> Name Resolution Issues. . . . . . . . . 374</p> <p> Testing Remote Systems.. . . . . . . . . 375</p> <p> </p> <p><strong>CHAPTER 20: </strong><strong>Analyze and Troubleshoot Central Processing Unit (CPU) and Memory Issues</strong><strong>. . . . </strong><strong>379</strong></p> <p> Runaway Processes.. . . . . . . . . . 379</p> <p> Zombie Processes.. . . . . . . . . . 380</p> <p> High Load Average.. . . . . . . . . . 383</p> <p> High Run Queues.. . . . . . . . . . 384</p> <p> CPU Times.. . . . . . . . . . . 384</p> <p> CPU Process Priorities.. . . . . . . . . 384</p> <p> Memory Exhaustion.. . . . . . . . . 385</p> <p> Out of Memory (OOM). . . . . . . . . 385</p> <p> Swapping.. . . . . . . . . . . 386</p> <p> Hardware. . . . . . . . . . . 388</p> <p> </p> <p><strong>CHAPTER 21: </strong><strong>Analyze and Troubleshoot User Access and File Permissions</strong><strong>. . . </strong><strong>397</strong></p> <p> User Login Issues.. . . . . . . . . . 397</p> <p> User File Access Issues. . . . . . . . . 400</p> <p> Password Issues. . . . . . . . . . 404</p> <p> Privilege Elevation.. . . . . . . . . . 405</p> <p> Quota Issues. . . . . . . . . . . 405</p> <p> </p> <p><strong>CHAPTER 22: </strong><strong>Use systemd to Diagnose and Resolve Common Problems with a Linux System</strong><strong>. . . . . </strong><strong>411</strong></p> <p> Unit Files. . . . . . . . . . . 412</p> <p> Common Problems.. . . . . . . . . . 429</p> <p> </p> <p>9780137898558, TOC, 8/11/2022</p>