Red Hat Enterprise Linux 6.5 System Management Directory

Source: Internet
Author: User
Tags system log time and date mysql backup rsyslog

Http://product.dangdang.com/23577811.html

The 1th chapter must master the Linux Foundation
1.1 Understanding Linux
1.1.1 The difference between Windows and Linux
1.1.2 The difference between UNIX and Linux
1.2 GNU Public License
Kernel version of 1.3 Linux
1.4 Release of Linux
1.5 recognize red Hat Enterprise Linux
1.5.1 Desktop Edition
1.5.2 Server Edition
1.6 New features of Red Hat Enterprise Linux 6.5
1.6.1 Security and Identity management
1.6.2 Network
1.6.3 File system and Storage
1.6.4 Virtualization
1.6.5 Subscription Management
1.6.6 User Experience
1.7 Tips for Learning Linux
1.8 Summary
1.9 Exercises
2nd installation of Red Hat Enterprise Linux
2.1 Pre-Installation Preparation
2.1.1 Hardware Preparation
2.1.2 Select Installation method
2.2 Installing Linux on a virtual machine
Introduction to 2.2.1 Virtual machines
2.2.2 Installing VMware virtual machines
2.2.3 Creating a virtual machine
2.2.4 Installing red Hat Enterprise Linux
2.3 Linux for the first time boot
2.3.1 Local Login
2.3.2 Telnet
2.4 Summary
2.5 Exercises
3rd. The graphical interface of Red Hat Enterprise Linux
Introduction to 3.1 Linux desktop system
3.1.1 X Window System
3.1.2 KDE Desktop Environment
3.1.3 GNOME Desktop Environment
3.2 operation of the desktop system
3.2.1 Menu Management
3.2.2 Setting input methods
3.2.3 Setting the date and time
3.2.4 Configuring the NIC and Wired
3.2.5 using a USB flash drive, disc, and removable hard drive
3.2.6 Logoff and shutdown
3.3 Summary
3.4 Exercises
4th. Red Hat Enterprise Linux command-line interface
4.1 Understanding Linux Command-line mode
Why should 4.1.1 learn the shell first?
4.1.2 How to enter the command line
4.2 Bash Shell Usage
Use of 4.2.1 aliases
4.2.2 Use of historical commands
4.2.3 command to be padded
4.2.4 Command Line editing
4.2.5 wildcard characters
4.3 Piping and redirection
4.3.1 standard input and output
4.3.2 Input redirect
4.3.3 Output redirect
4.3.4 Error Output redirection
4.3.5 Pipe
4.4 Directory Structure of Linux
4.5 Common Commands
4.5.1 Copy file CP
4.5.2 Moving files MV
4.5.3 Create a file or modify a file time touch
4.5.4 Deleting a file rm
4.5.5 View File Cat tac more less TAC tail
4.5.6 Find files or directories find
4.5.7 filtering text grep
4.5.8 Compare File Differences diff
4.5.9 Create a link between a file or directory ln
4.5.10 Display file type
4.5.11 Split file Split
4.5.12 Merge file Join
4.5.13 file Permissions Umask
4.5.14 text Operations awk and SED
4.6 Directory Management
4.6.1 Display current working directory PWD
4.6.2 Creating a directory MkDir
4.6.3 Deleting a directory RmDir
4.6.4 changing the working directory CD
4.6.5 viewing working directory files ls
4.6.6 View directory tree trees
4.6.7 package or unpack files tar
4.6.8 compressing or decompressing files and directories Zip/unzip
4.6.9 compressing or decompressing files and directories Gzip/gunzip
4.6.10 compressing or decompressing files and directories bzip2/bunzip2
4.7 System Management
4.7.1 View Commands Help man
4.7.2 Exporting environment variable export
4.7.3 View History
4.7.4 Display or modify system time and date dates
4.7.5 Erase Screen Clear
4.7.6 Viewing system load uptime
4.7.7 Display system memory status free
4.7.8 convert or copy files DD
4.8 Task Management
4.8.1 One-time mission at
4.8.2 Cycle Task Crond
4.9 Shutdown command
4.9.1 using shutdown to shut down or restart the computer
4.9.2 The simplest shutdown command halt
4.9.3 using reboot to restart the system
4.9.4 using Poweroff to terminate system operation
4.9.5 using the init command to change the system RunLevel
4.10 Use of the text editor VI
4.10.1 Entry and Exit VI
4.10.2 Move Cursor
4.10.3 entering text
4.10.4 Copy and paste
4.10.5 Delete and modify
4.10.6 Find and replace
4.10.7 Execute shell command
4.10.8 Saving a document
4.11 Example-Backing up important files and directories with scripts
4.12 Summary
4.13 Exercises
Chapter 5th Linux File management and Disk Management
5.1 Understanding Linux Partitions
5.2 File Management in Linux
Types of 5.2.1 Files
Properties and permissions for the 5.2.2 file
5.2.3 Change File ownership
5.2.4 Changing file permissions
5.3 Disk Management in Linux
5.3.1 Viewing disk space usage
5.3.2 Viewing the space occupied by a file or directory
5.3.3 adjusting and viewing file system parameters
5.3.4 Format File System
5.3.5 mount/unmount file system
5.3.6 Basic Disk Management
5.4 Swap space management
5.5 Redundant array of disks raid
5.6 Example--Monitor hard disk space
5.7 Summary
5.8 Exercises
The 6th Chapter Linux log System
6.1 Common log files in Linux
6.2 Linux Log System
6.2.1 Rsyslog Log System Introduction
6.2.2 Rsyslog configuration file and syntax
6.3 Using log rotation
6.3.1 logrotate command and configuration file parameter description
6.3.2 using logrotate to rotate Nginx log
6.4 Example-locating problems with system logs
6.4.1 viewing the System logon log
6.4.2 View History commands
6.4.3 Viewing the System log
6.5 Summary
6.6 Exercises
7th Chapter Users and Groups
7.1 User Management for Linux
7.1.1 Linux User Login process
7.1.2 Types of Linux users
7.2 Linux User Management mechanism
7.2.1 User account File/etc/passwd
7.2.2 User Password file/etc/shadow
7.2.3 User group File/etc/group
7.3 Linux User Management commands
7.3.1 Adding users
7.3.2 Changing users
7.3.3 Deleting a user
7.3.4 changing or setting a user password
7.3.5 su Switch User
7.3.6 sudo normal user get super permission
7.4 User Group Management commands
7.4.1 Adding a user group
7.4.2 Deleting a user group
7.4.3 Modifying user groups
7.4.4 to view the user group where the user is located
7.5 Example--batch add user and set password
7.6 Summary
7.7 Exercises
The 8th Chapter Application Management
8.1 Software Package Management Basics
8.1.1 RPM
8.1.2 DPKG
Use of 8.2 rpm
8.2.1 Installing Packages
8.2.2 Upgrade Package
8.2.3 to view installed packages
8.2.4 Uninstalling Packages
8.2.5 See which rpm package a file belongs to
8.2.6 get the RPM package description information
8.3 Installing software from source code
8.3.1 Software Configuration
8.3.2 Compiling software
8.3.3 Software Installation
8.4 Common users How to install common software
8.5 Linux Function library
8.6 Example-Install Web services software Nginx from source code
8.7 Summary
8.8 Exercises
The 9th Chapter System start Control and process management
9.1 Start Management
9.1.1 Grub Manager Overview
9.1.2 Linu System Start-up process
9.1.3 Linux Run Level
Parsing of 9.1.4 Linux initialization configuration script/etc/inittab
9.1.5 Linux Start-up service control
9.2 Linux Process Management
The concept of the 9.2.1 process
9.2.2 Process management tools and common commands
9.3 Common operations for system administrators
9.3.1 Changing the default run level of Linux
9.3.2 changing the sshd default port 22
9.3.3 View all processes for a user
9.3.4 determine the high memory consumption of the program
9.3.5 terminating a process
9.3.6 Terminate all processes belonging to a user
9.3.7 find the corresponding process based on the port number
9.4 Example-Process monitoring
9.5 Summary
9.6 Exercises
The 10th Chapter Linux Network Management
10.1 Network Management Protocol
10.1.1 TCP/IP protocol Introduction
10.1.2 Introduction to UDP and ICMP protocols
10.2 Network Management commands
10.2.1 Check whether the network is unobstructed or network connection speed ping
10.2.2 Configure the network or display the current network interface status Ifconfig
10.2.3 Show add or modify route table route
10.2.4 copying files to other system SCP
10.2.5 copying files to other systems rsync
10.2.6 Display network connection, routing table, or interface status netstat
10.2.7 The routing information to the destination address traceroute
10.2.8 testing, logging in, or controlling remote host Telnet
10.2.9 Download Network Files wget
10.3 Linux Network configuration
10.3.1 Linux Network-related configuration files
10.3.2 Configuring the IP address of the Linux system
10.3.3 Setting the host name
10.3.4 Setting the default gateway
10.3.5 setting up a DNS server
10.4 Dynamic Host Configuration Protocol DHCP
10.4.1 How DHCP Works
10.4.2 Configuring the DHCP server
10.4.3 Configuring DHCP clients
10.5 Linux Domain Name Service DNS
10.5.1 DNS Introduction
10.5.2 DNS Server Configuration
10.5.3 DNS Service Test
10.6 Configuring the exact time protocol
10.6.1 Precise Time Protocol
10.6.2 using precise Time protocol
10.6.3 using PTP Clients
10.6.4 Synchronous Clock
10.6.5 Verifying time synchronization
10.7 Example-Monitor network card traffic
10.8 Summary
10.9 Exercises
11th. Network File sharing NFS, Samba, and FTP
11.1 Network File System NFS
11.1.1 Network File System NFS Introduction
11.1.2 Configuring server for NFS
11.1.3 Configuring the NFS Client
11.2 File Server Samba
11.2.1 Samba Services Introduction
Installation and configuration of the 11.2.2 Samba service
11.3 FTP Server
11.3.1 FTP Service Overview
Installation and configuration of 11.3.2 Vsftp
Installation and configuration of 11.3.3 proftpd
11.3.4 How to set up FTP for file upload
11.4 Summary
11.5 Exercises
The 12th chapter builds MySQL service
12.1 MySQL Introduction
12.2 Installation and configuration of MySQL services
12.2.1 MySQL Version selection
12.2.2 MySQL version naming mechanism
12.2.3 MySQL RPM Package Installation
12.2.4 MySQL Source installation
12.2.5 MySQL Program introduction
12.2.6 MySQL configuration file introduction
12.2.7 MySQL start and stop
12.3 MySQL Basic management
12.3.1 login to MySQL server using local socket
12.3.2 using TCP to log on to the MySQL server
12.3.3 MySQL Storage engine
12.4 MySQL Daily Maintenance
12.4.1 MySQL Rights Management
12.4.2 MySQL Log management
12.4.3 MySQL Backup and recovery
12.4.4 MySQL Replication
12.4.5 MySQL Replication build process
12.5 Summary
12.6 Exercises
13th. Installing and configuring Oracle Database management System
13.1 Introduction to Oracle Database management system
13.1.1 Oracle's version naming mechanism
13.1.2 Version selection for Oracle
13.2 Oracle Database Architecture
13.2.1 Understanding Oracle Database Management System
13.2.2 Physical storage structure
13.2.3 Logical Storage structure
13.2.4 DB Instance
13.3 Installing the Oracle database server
13.3.1 checking the hardware and software environment
13.3.2 downloading the Oracle installation package
13.3.3 Creating Oracle user groups and users
13.3.4 Modifying kernel parameters
13.3.5 Modifying user limits
13.3.6 Modifying user Profiles
13.3.7 Preparing the installation directory
13.3.8 Installing the Software
13.4 Creating a Database
13.4.1 creating a database with DBCA
13.4.2 Creating a database manually
13.4.3 Opening a database
13.4.4 shutting down the database
13.5 Summary
13.6 Exercises
Chapter 14th Apache Services and Lamp
14.1 Installation and configuration of Apache HTTP service
14.1.1 HTTP Protocol Introduction
14.1.2 Apache Service installation, configuration and start-up
14.1.3 Apache IP-based virtual host configuration
14.1.4 Apache Port-based virtual host configuration
14.1.5 Apache Domain-based virtual host configuration
14.1.6 Apache security Control and authentication
14.2 Lamp integrated installation, configuration and testing
14.3 Exercises
15th Chapter Linux Routing
15.1 Understanding Linux Routes
Basic concepts of 15.1.1 routing
The principle of 15.1.2 routing
15.1.3 routing Table
15.1.4 static Routing and dynamic routing
15.2 Configuring the Linux static route
15.2.1 Configuring the Network interface address
15.2.2 test NIC interface IP configuration status
15.2.3 Route Command Introduction
15.2.4 routing settings for normal clients
15.2.5 Linux Router Configuration instance
15.3 Policy Routing for Linux
15.3.1 The concept of Policy Routing
15.3.2 Management of routing tables
15.3.3 Routing Management
15.3.4 Routing Policy Management
15.3.5 Policy Routing Application example
15.4 Summary
15.5 Exercises
16th. Configuring NAT Internet
16.1 Understanding NAT
Types of 16.1.1 NAT
Features of 16.1.2 NAT
NAT service configuration under 16.2 Linux
16.2.1 iptables Introduction
16.2.2 iptables Work Flow
16.2.3 iptables Basic Syntax
16.2.4 Configuring the NAT service on Rhel
16.2.5 LAN by configuring NAT Internet
16.3 Summary
16.4 Exercises
17th. Linux Performance Detection and optimization
17.1 Linux Performance evaluation and analysis tool
17.1.1 CPU-related
17.1.2 Memory-related
17.1.3 hard disk I/O related
17.1.4 Network Performance evaluation
17.2 Linux kernel compilation and optimization
17.2.1 compiling and installing the kernel
Optimization of common kernel parameters in 17.2.2
17.3 Summary
17.4 Exercises
18th. Cluster Load Balancer LVS
18.1 Introduction to Cluster technology
18.2 LVS Cluster Introduction
18.2.1 3 kinds of load balancing technology
18.2.2 Load Balancing scheduling algorithm
Architecture of 18.3 LVS cluster
18.4 LVS Load Balancer Configuration Example
18.4.1 installation and configuration of LVS based on NAT mode
18.4.2 installation and configuration of LVS based on Dr mode
18.4.3 installation and configuration of LVS based on IP tunnel mode
18.5 Summary
18.6 Exercises
19th chapter cluster Technology and dual-machine hot standby software
19.1 High Availability Clustering technology
19.1.1 Availability and Clustering
19.1. Classification of 2 clusters
19.2 dual-Machine hot standby open source software heartbeat
19.2.1 know Heartbeat
Installation and configuration of 19.2.2 heartbeat
19.2.3 Heartbeat Start-up and test
19.3 dual-Machine hot standby software keepalived
19.3.1 know keepalived
Installation and configuration of 19.3.2 keepalived
19.3.3 keepalived Start-up and test
19.4 Summary
19.5 Exercises
20th Chapter Linux Firewall management
20.1 Linux Firewall iptables
How the 20.1.1 Linux kernel firewall works
20.1.2 Linux Software firewall iptables
20.1.3 iptables Configuration Instance
20.2 Linux Advanced Network Configuration Tool
20.2.1 Advanced network Management Tools IPROUTE2
20.2.2 Network data Acquisition and analysis tool tcpdump
20.3 example-using iptables to block out-of-network exception requests
20.4 Summary
20.5 Exercises
The 21st Chapter KVM Virtualization
Overview of 21.1 KVM Virtualization Technology
21.1.1 Basic Concepts
21.1.2 Hardware Requirements
21.2 Installing the Virtualization Package
21.2.1 Installing the virtualization package with the Yum command
21.2.2 Installing a virtualization package as a package group
21.3 Installing a virtual machine
21.3.1 Installing a Linux virtual machine
21.3.2 Installing Windows virtual machines
21.4 Managing virtual Machines
Introduction to 21.4.1 Virtual Machine Manager
21.4.2 query or modify virtual machine hardware configuration
21.4.3 managing Virtual Networks
21.4.4 managing remote virtual machines
21.4.5 using the command line to perform advanced management
21.5 Storage Management
21.5.1 creating a disk-based storage pool
21.5.2 creating a disk partition-based storage pool
21.5.3 creating a directory-based storage pool
21.5.4 creating an LVM-based storage pool
21.5.5 Creating an NFS-based storage pool
21.6 KVM Security Management
21.6.1 SELinux
21.6.2 Firewall
21.7 Summary
21.8 Exercises
The 22nd chapter installs OpenStack on Rhel 6.5
22.1 OpenStack Overview
22.2 OpenStack System Architecture
22.2.1 OpenStack Architecture
22.2.2 OpenStack Deployment Approach
22.2.3 Compute Module Nova
22.2.4 Distributed object Storage Module Swift
22.2.5 Virtual machine Image Management Module glance
22.2.6 Identity Authentication Module Keystone
22.2.7 Console Horizon
22.3 OpenStack's main deployment tools
22.3.1 Fuel
22.3.2 Tripleo
22.3.3 RDO
22.3.4 Devstack
22.4 Deploying OpenStack via RDO
22.4.1 Pre-deployment preparation
22.4.2 Configuring the installation source
22.4.3 installation Packstack
22.4.4 Installing OpenStack
22.5 managing OpenStack
22.5.1 Log in to the console
22.5.2 User Settings
22.5.3 Managing Users
22.5.4 managing Images
22.5.5 managing Cloud Host types
22.5.6 Management Network
22.5.7 Management Example
22.6 Summary
22.7 Exercises



Red Hat Enterprise Linux 6.5 System Management Directory

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.