rhel 7
Post on 22-Dec-2015
37 Views
Preview:
DESCRIPTION
TRANSCRIPT
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Comprehensive, hands-on training that solves real-world problems
Red Hat System Administration II
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
DAY ONE
Kickstart
RegularExpressions
Vim
DAY TWO
ProcessPriorities
cron and at
ACLs
SELinux
DAY ONE DAY THREE
Partitions andFilesystems
Logical Volumes
Access NFS
DAY FOUR
BootTroubleshooting
Access SMB
Firewalls
ComprehensiveReview
Network Users
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Introduction
● Welcome to Class
● Course Objectives and Structure
● Orientation to Classroom Network
● Internationalization
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Welcome to Class
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Course Objectives and Structure
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
DAY ONE
Kickstart
RegularExpressions
Vim
DAY TWO
ProcessPriorities
cron and at
ACLs
SELinux
DAY ONE DAY THREE
Partitions andFilesystems
Logical Volumes
Access NFS
DAY FOUR
BootTroubleshooting
Access SMB
Firewalls
ComprehensiveReview
Network Users
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Orientation to Classroom Network
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Internationalization
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 1:Automating Installation with Kickstart
● Defining the Anaconda Kickstart System
● Deploying a New Virtual System with Kickstart
Kickstart
DAY ONE
RegularExpressions
Vim
cron and at
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To automate the installation of Red Hat Enterprise Linux systems with Kickstart.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Explain Kickstart concepts and architecture.● Create a Kickstart configuration file.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Defining the Anaconda Kickstart System
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Kickstart File Syntax and Modification
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Deploying a New Virtual Systemwith Kickstart
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Installing a System Using Kickstart
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter Test:Automating Installation
with Kickstart
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 2:Using Regular Expressions with grep
● Regular Expression Fundamentals
● Matching Text with grep
● Using grep with Logs
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To write regular expressions using grep to isolate or locate content in text files.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Create regular expressions to match text patterns● Use grep to locate content in files
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Regular Expressions Fundamentals
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Quiz:Match the Regular Expression
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Matching Text with grep
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Using grep with Logs
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Using Regular Expressions with grep
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 3:Creating and Editing Text Files with vim
● The vim Text Editor
● Basic vim Workflow
● Editing with vim
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To introduce the vim text editor.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Explain the three main modes of vim.● Open, edit, and save text files.● Use editor shortcuts.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
The vim Text Editor
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:vim Modes
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Basic vim Workflow
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Basic vim Workflow
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Editing with vim
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Edit a File with vim
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Edit a System File with vim
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 4:Scheduling Future Linux Tasks
● Scheduling One-Time Tasks with at
● Scheduling Recurring Jobs with cron
● Scheduling System cron Jobs
● Managing Temporary Files
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To schedule tasks to automatically execute in the future.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Schedule one-time tasks with at.● Schedule recurring jobs with cron.● Schedule recurring system jobs.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Scheduling One-Time Tasks with at
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Scheduling One-Time Tasks with at
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Scheduling Recurring Jobs with cron
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Scheduling Recurring Jobs with cron
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Scheduling System cron Jobs
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Managing Temporary Files
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Managing Temporary Files
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter Test:Scheduling Future Linux Tasks
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 5:Managing Priority of Linux Processes
● Process Priorities and "nice" Concepts
● Using nice and renice to Influence Process Priority
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To influence the relative priorities at which Linux processes run.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe nice levels.● Set nice levels on new and existing processes.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Process Priority and "nice" Concepts
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Quiz:Process Priority and "nice" Concepts
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Using nice and renice toInfluence Process Priority
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Discovering Process Priorities
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Managing Priority of Linux Processes
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 6:Controlling Access to Files with Access Control Lists
● POSIX Access Control Lists (ACLs)
● Securing Files with ACLs
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To manage file security using POSIX access control lists (ACLs).
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe POSIX access control lists.● Manage POSIX access control lists.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
POSIX Access Control Lists (ACLs)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Quiz:Interpret ACLs
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Securing Files with ACLs
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Using ACLs to Grant and
Limit Access
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Controlling Access to Files with Access
Control Lists (ACLs)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 7:Managing SELinux Security
● Enabling and Monitoring SELinux
● Changing SELinux Modes
● Changing SELinux Contexts
● Changing SELinux Booleans
● Troubleshooting SELinux
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network servicecompromise.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Explain the basics of SELinux permissions.● Change SELinux modes with setenforce.● Change file contexts with semanage and restorecon.● Manage SELinux booleans with setsebool.● Examine logs and use sealert to troubleshoot SELinux
violations.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Enabling and Monitoring Security EnhancedLinux (SELinux)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Quiz:SELinux Concepts
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Changing SELinux Modes
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Changing SELinux Modes
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Changing SELinux Contexts
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Changing SELinux Contexts
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Changing SELinux Booleans
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Changing SELinux Booleans
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Troubleshooting SELinux
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Troubleshooting SELinux
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Managing SELinux Security
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 8:Connecting to Network-defined Users and Groups
● Using Identity Management Services
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To configure systems to use central identity management services.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
●Use centralized identity management services.
Objective:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Using Identity Management Services
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Connecting to a Central LDAP and
Kerberos Server
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Connecting to Network-defined
Users and Groups
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 9:Adding Disks, Partitions, and Filesystems to a Linux System
● Adding Partitions, Filesystems, and Persistent Mounts
● Adding and Enabling Swap Space
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To create and manage disks, partitions, and filesystems from the command line.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Manage simple partitions and filesystems.● Manage swap space.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Adding Partition, Filesystem,and Persistent Mount
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Adding Partition, Filesystem,
Persistent Mount
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Managing Swap Space
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Adding and Enabling Swap Space
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Adding Filesystem, Swap,
and Persistent Mount
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 10:Managing Logical Volume Management Storage
● Logical Volume Management Concepts
● Managing Logical Volumes
● Extending Logical Volumes
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To manage logical volumes from the command line.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe logical volume management components and concepts.
● Manage logical volumes.● Extend logical volumes.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Logical Volume Management Concepts
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Quiz:Logical Volume
Management Concepts
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Managing Logical Volumes
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Adding a Logical Volume
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Extending Logical Volumes
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Extending a Logical Volume
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Managing Logical Volume Management
(LVM) Storage
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 11:Accessing Network Storage with Network File System (NFS)
● Mounting Network Storage with NFS
● Automounting Network Storage with NFS
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To use autofs and the command line to mount and unmount network storage with NFS.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Mount, access and unmount network storage with NFS● Automount and access network storage with NFS
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Mounting Network Storage with NFS
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Mounting and Unmounting NFS
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Automounting Network Storage with NFS
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Automounting NFS
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Accessing Network Storage with Network
File System (NFS)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 12:Accessing Network Storage with SMB
● Accessing Network Storage with SMB
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To use autofs and the command line to mount and unmount SMB file systems.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Mount, automount, and unmount SMB file systems.
Objective:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Accessing Network Storage with SMB
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Mounting a SMB File System
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Accessing Network Storage with SMB
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 13:Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process
● The Red Hat Enterprise Linux Boot Process
● Repairing Common Boot Issues
● Repairing File System Issues at Boot
● Repairing Boot Loader Issues
BootTroubleshooting
DAY FOUR
Firewalls
ComprehensiveReview
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To troubleshoot the Red Hat Enterprise Linux boot process.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe the Red Hat Enterprise Linux boot process.● Repair common boot issues.● Repair file system issues at boot.● Repair bootloader problems.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
The Red Hat Enterprise Linux Boot Process
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Selecting a Boot Target
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Repairing Common Boot Issues
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Repairing Common Boot Issues
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Resetting a Lost root Password
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Repairing File System Issues at Boot
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Repairing Boot Problems
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Repairing Boot Loader Issues
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Repairing a Boot Loader Problem
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Controlling and Troubleshooting the Red
Hat Enterprise Linux Boot Process
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 14:Limiting Network Communication with firewalld
● Limiting Network Communication
BootTroubleshooting
DAY FOUR
Firewalls
ComprehensiveReview
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To configure a basic firewall.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Configure a basic firewall using firewalld, firewallconfig, and firewall-cmd.
Objective:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Limiting Network Communication
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Limiting Network Communication
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Limiting Network Communication
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 15:Comprehensive Review
● Red Hat System Administration II Comprehensive Review
BootTroubleshooting
DAY FOUR
Firewalls
ComprehensiveReview
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To practice and demonstrate knowledge and skills learned in Red Hat System Administration II.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Review course chapters to reinforce knowledge and skills.
Objective:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Red Hat System Administration II Comprehensive Review
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Comprehensive Review of System Administration II
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
top related