red hat system administration ii - s2.51cto.coms2.51cto.com/wyfs02/m02/4b/07/wkiom1... · title:...

148
Copyright © 2014 Red Hat, Inc. RH134-RHEL7-en-1-20140610 Comprehensive, hands-on training that solves real-world problems Red Hat System Administration II

Upload: ngohuong

Post on 05-May-2018

220 views

Category:

Documents


1 download

TRANSCRIPT

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Comprehensive, hands-on training that solves real-world problems

Red Hat System Administration II

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

DAY ONE

Kickstart

RegularExpressions

Vim

DAY TWO

ProcessPriorities

cron and at

ACLs

SELinux

DAY ONE DAY THREE

Partitions andFilesystems

Logical Volumes

Access NFS

DAY FOUR

BootTroubleshooting

Access SMB

Firewalls

ComprehensiveReview

Network Users

Introduction

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Introduction

● Welcome to Class

● Course Objectives and Structure

● Orientation to Classroom Network

● Internationalization

DAY ONE

Kickstart

RegularExpressions

Vim

cron and at

Introduction

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Welcome to Class

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Course Objectives and Structure

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

DAY ONE

Kickstart

RegularExpressions

Vim

DAY TWO

ProcessPriorities

cron and at

ACLs

SELinux

DAY ONE DAY THREE

Partitions andFilesystems

Logical Volumes

Access NFS

DAY FOUR

BootTroubleshooting

Access SMB

Firewalls

ComprehensiveReview

Network Users

Introduction

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Orientation to Classroom Network

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Internationalization

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 1:Automating Installation with Kickstart

● Defining the Anaconda Kickstart System

● Deploying a New Virtual System with Kickstart

Kickstart

DAY ONE

RegularExpressions

Vim

cron and at

Introduction

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To automate the installation of Red Hat Enterprise Linux systems with Kickstart.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Explain Kickstart concepts and architecture.● Create a Kickstart configuration file.

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Defining the Anaconda Kickstart System

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Kickstart File Syntax and Modification

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Deploying a New Virtual Systemwith Kickstart

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Installing a System Using Kickstart

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter Test:Automating Installation

with Kickstart

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 2:Using Regular Expressions with grep

● Regular Expression Fundamentals

● Matching Text with grep

● Using grep with Logs

DAY ONE

Kickstart

RegularExpressions

Vim

cron and at

Introduction

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To write regular expressions using grep to isolate or locate content in text files.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Create regular expressions to match text patterns● Use grep to locate content in files

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Regular Expressions Fundamentals

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Quiz:Match the Regular Expression

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Matching Text with grep

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Using grep with Logs

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Using Regular Expressions with grep

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 3:Creating and Editing Text Files with vim

● The vim Text Editor

● Basic vim Workflow

● Editing with vim

DAY ONE

Kickstart

RegularExpressions

Vim

cron and at

Introduction

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To introduce the vim text editor.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Explain the three main modes of vim.● Open, edit, and save text files.● Use editor shortcuts.

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

The vim Text Editor

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:vim Modes

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Basic vim Workflow

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Basic vim Workflow

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Editing with vim

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Edit a File with vim

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Edit a System File with vim

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 4:Scheduling Future Linux Tasks

● Scheduling One-Time Tasks with at

● Scheduling Recurring Jobs with cron

● Scheduling System cron Jobs

● Managing Temporary Files

DAY ONE

Kickstart

RegularExpressions

Vim

cron and at

Introduction

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To schedule tasks to automatically execute in the future.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Schedule one-time tasks with at.● Schedule recurring jobs with cron.● Schedule recurring system jobs.

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Scheduling One-Time Tasks with at

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Scheduling One-Time Tasks with at

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Scheduling Recurring Jobs with cron

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Scheduling Recurring Jobs with cron

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Scheduling System cron Jobs

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Managing Temporary Files

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Managing Temporary Files

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter Test:Scheduling Future Linux Tasks

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 5:Managing Priority of Linux Processes

● Process Priorities and "nice" Concepts

● Using nice and renice to Influence Process Priority

Process Priorities

DAY TWO

ACLs

SELinux

Network Users

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To influence the relative priorities at which Linux processes run.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Describe nice levels.● Set nice levels on new and existing processes.

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Process Priority and "nice" Concepts

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Quiz:Process Priority and "nice" Concepts

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Using nice and renice toInfluence Process Priority

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Discovering Process Priorities

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Managing Priority of Linux Processes

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 6:Controlling Access to Files with Access Control Lists

● POSIX Access Control Lists (ACLs)

● Securing Files with ACLs

Process Priorities

DAY TWO

ACLs

SELinux

Network Users

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To manage file security using POSIX access control lists (ACLs).

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Describe POSIX access control lists.● Manage POSIX access control lists.

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

POSIX Access Control Lists (ACLs)

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Quiz:Interpret ACLs

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Securing Files with ACLs

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Using ACLs to Grant and

Limit Access

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Controlling Access to Files with Access

Control Lists (ACLs)

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 7:Managing SELinux Security

● Enabling and Monitoring SELinux

● Changing SELinux Modes

● Changing SELinux Contexts

● Changing SELinux Booleans

● Troubleshooting SELinux

Process Priorities

DAY TWO

ACLs

SELinux

Network Users

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network servicecompromise.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Explain the basics of SELinux permissions.● Change SELinux modes with setenforce.● Change file contexts with semanage and restorecon.● Manage SELinux booleans with setsebool.● Examine logs and use sealert to troubleshoot SELinux

violations.

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Enabling and Monitoring Security EnhancedLinux (SELinux)

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Quiz:SELinux Concepts

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Changing SELinux Modes

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Changing SELinux Modes

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Changing SELinux Contexts

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Changing SELinux Contexts

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Changing SELinux Booleans

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Changing SELinux Booleans

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Troubleshooting SELinux

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Troubleshooting SELinux

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Managing SELinux Security

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 8:Connecting to Network-defined Users and Groups

● Using Identity Management Services

Process Priorities

DAY TWO

ACLs

SELinux

Network Users

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To configure systems to use central identity management services.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

●Use centralized identity management services.

Objective:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Using Identity Management Services

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Connecting to a Central LDAP and

Kerberos Server

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Connecting to Network-defined

Users and Groups

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 9:Adding Disks, Partitions, and Filesystems to a Linux System

● Adding Partitions, Filesystems, and Persistent Mounts

● Adding and Enabling Swap Space

Partitions andFilesystems

DAY THREE

Logical Volumes

Access NFS

Access SMB

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To create and manage disks, partitions, and filesystems from the command line.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Manage simple partitions and filesystems.● Manage swap space.

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Adding Partition, Filesystem,and Persistent Mount

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Adding Partition, Filesystem,

Persistent Mount

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Managing Swap Space

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Adding and Enabling Swap Space

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Adding Filesystem, Swap,

and Persistent Mount

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 10:Managing Logical Volume Management Storage

● Logical Volume Management Concepts

● Managing Logical Volumes

● Extending Logical Volumes

Partitions andFilesystems

DAY THREE

Logical Volumes

Access NFS

Access SMB

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To manage logical volumes from the command line.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Describe logical volume management components and concepts.

● Manage logical volumes.● Extend logical volumes.

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Logical Volume Management Concepts

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Quiz:Logical Volume

Management Concepts

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Managing Logical Volumes

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Adding a Logical Volume

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Extending Logical Volumes

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Extending a Logical Volume

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Managing Logical Volume Management

(LVM) Storage

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 11:Accessing Network Storage with Network File System (NFS)

● Mounting Network Storage with NFS

● Automounting Network Storage with NFS

Partitions andFilesystems

DAY THREE

Logical Volumes

Access NFS

Access SMB

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To use autofs and the command line to mount and unmount network storage with NFS.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Mount, access and unmount network storage with NFS● Automount and access network storage with NFS

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Mounting Network Storage with NFS

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Mounting and Unmounting NFS

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Automounting Network Storage with NFS

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Automounting NFS

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Accessing Network Storage with Network

File System (NFS)

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 12:Accessing Network Storage with SMB

● Accessing Network Storage with SMB

Partitions andFilesystems

DAY THREE

Logical Volumes

Access NFS

Access SMB

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To use autofs and the command line to mount and unmount SMB file systems.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Mount, automount, and unmount SMB file systems.

Objective:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Accessing Network Storage with SMB

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Mounting a SMB File System

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Accessing Network Storage with SMB

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 13:Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process

● The Red Hat Enterprise Linux Boot Process

● Repairing Common Boot Issues

● Repairing File System Issues at Boot

● Repairing Boot Loader Issues

BootTroubleshooting

DAY FOUR

Firewalls

ComprehensiveReview

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To troubleshoot the Red Hat Enterprise Linux boot process.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Describe the Red Hat Enterprise Linux boot process.● Repair common boot issues.● Repair file system issues at boot.● Repair bootloader problems.

Objectives:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

The Red Hat Enterprise Linux Boot Process

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Selecting a Boot Target

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Repairing Common Boot Issues

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Repairing Common Boot Issues

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Resetting a Lost root Password

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Repairing File System Issues at Boot

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Repairing Boot Problems

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Repairing Boot Loader Issues

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Repairing a Boot Loader Problem

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Controlling and Troubleshooting the Red

Hat Enterprise Linux Boot Process

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 14:Limiting Network Communication with firewalld

● Limiting Network Communication

BootTroubleshooting

DAY FOUR

Firewalls

ComprehensiveReview

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To configure a basic firewall.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Configure a basic firewall using firewalld, firewallconfig, and firewall-cmd.

Objective:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Limiting Network Communication

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Limiting Network Communication

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Limiting Network Communication

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 15:Comprehensive Review

● Red Hat System Administration II Comprehensive Review

BootTroubleshooting

DAY FOUR

Firewalls

ComprehensiveReview

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To practice and demonstrate knowledge and skills learned in Red Hat System Administration II.

Goal:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Review course chapters to reinforce knowledge and skills.

Objective:

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Red Hat System Administration II Comprehensive Review

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Comprehensive Review of System Administration II

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610