The second edition of Progressive Linux will be published (with cover) _php tutorial

Source: Internet
Author: User
Tags clear screen haproxy proxmox

The second edition of Progressive Linux will be released (with cover)



From the first edition of "Progressive Linux" released, to now nearly 6 years, 6 years, the technology has changed a lot, the kernel version of Linux system from 2.6.9 (rhel4.x) has been updated to the current 3.10 (centos7.x), the first version of some of the content is obsolete, the Linux system part of the operating mechanism has changed a lot, in order to adapt to the technological trend, and for all the readers who support this book, I decided to revise the book, The introduction of "Progressive Linux" Second edition.
The second version of the basic inheritance of the first version of the content structure, the basic Redhat Linux, CentOS Two Linux distribution mainly introduced, the specific version is centos7.x/ rhel7.x, will be more prominent in the chapter, the theory and practice, the enterprise case and the application of actual combat part will increase;

In the basic knowledge section, we briefly introduce the application fields of Linux, then introduce some methods and techniques of mastering Linux Learning, then introduce the installation and system structure of Linux, and also introduce the common commands and usage techniques under Linux, as well as the installation method of Linux software.

In the server building chapter, remove the original content, but also added the content of MySQL database, mainly introduces the application of high-performance MySQL database, but also increased the lamp service environment, and then in the server security policy and troubleshooting to add a lot of experience and technical summary, it is worth a look.

In the system administration, this part of the content basically unchanged, mainly revised the file system management and memory management of some content, adding some of the latest Linux technology features.

In the performance tuning chapter, the case of system optimization is added on the basis of original theory, and the experience of system optimization is introduced by combining theory with practice.

In the virtualization, cluster application, this part is the highlight of the book, basically completely revised the original content, three chapters respectively introduced the Proxmox ve Virtualization Guan Ping platform, as well as high-availability software keepalived, load balancer software LVS and Haproxy, the introduction of the method is very accessible, The previous introduction of software applications, the following through the specific enterprise case, from the perspective of production application, introduced the enterprise environment commonly used in two high-availability cluster applications, it can be said that this is the whole book of content integrated application part, from the perspective of application of the enterprise high-availability cluster environment of the building and maintenance process.


Cover photo



Progressive Linux Second Edition directory

The first part of the basic knowledge Chapter

1th. Experience and skills in learning Linux

The current situation and trend of the development of 1.1 Linux in various fields
1.1.1 Linux and open source software
1.1.2 Linux in the field of server development
The development of 1.1.3 Linux in the Desktop field
The development of 1.1.4 Linux in mobile embedded field
1.1.5 Linux in the field of cloud computing/Big Data
1.2 Choose a Linux distribution that works for you
1.2.1 Common Linux Distributions
1.2.2 Beginners First Choice--centos series
1.2.3 Desktop Platform Preferred--ubuntu Linux
1.2.4 Enterprise-Class application preferred--red Hat/centos series
1.3 Develop a good Linux operating habit
1.3.1 must get used to the command line way
1.3.2 Theory combined with practice
1.3.3 Learn to use Linux online Help
1.3.4 learn to think independently and solve problems independently
1.3.5 to learn professional English
1.3.6Linux Learning Roadmap
1.4 Learning Linux with virtualization technology
1.4.1 What is virtual machine software
1.4.2 Benefits of using virtual machine technology
1.4.3 operating environment and hardware requirements for virtual machines
1.4.4 installation and use of virtual machines
1.5 Linux Learning Resources
1.5.1 network resources, search engine, forum
1.5.2 has a book on his side.

2nd. Installing Linux systems in multiple ways

2.1 Installation Requirements
Several installation methods of 2.2 Linux
2.2.1 Hard Drive Installation method
2.2.2U Disc Mounting method
2.2.3 Network Installation method
2.2.4 Optical Drive Installation method
2.3 Optical Drive installation process
2.3.1 Partition naming scheme
2.3.2 Start Installation
2.4 U disk installation process

3rd basic structure of Linux system

3.1 Use of Linux consoles
3.2 System and Hardware
3.2.1Linux Hardware Resource Management
3.2.2Linux use of external devices
3.3 Introduction to the file system structure
3.3.1 Directory Structure
3.3.2 System Core Composition
3.4 Introduction of operating mechanism
3.4.1Linux Init initialization System
3.4.2runlevel to target change
3.4.3 System Shutdown Process
3.5 System Services management tool SYSTEMD
3.5.1 Start, stop, restart service
3.5.2 viewing, prohibiting, enabling services
3.5.3 systemd Command and sysvinit command comparison
3.6 Linux and SecureCRT
3.6.1 SECURECRT Overview
Installation and use of 3.6.2 SECURECR
3.6.3 Linux commands related to SECURECRT

The 4th Chapter Linux Common command and use skill

Introduction to Shell under 4.1 Linux
4.1.1 What is a shell
Syntax analysis for 4.1.2shell commands
4.2 System Management and maintenance
4.2.1 command to display the contents of the specified working directory LS
4.2.2 command to display the current working directory PWD
4.2.3 Changing the current working directory of the Command CD
4.2.4 Display or modify the system time and date command date
4.2.5 command to set the user's password passwd
4.2.6 command to change identity su
4.2.7 command to clear screen information
4.2.8 command to display Help information for a specified command man
4.2.9 Show commands for users who are currently logged on to the system who
4.2.10 command to display user information logged on to the system W
4.2.11 commands that display information about the operating system uname
4.2.12 command to output system task queue information uptime
4.2.13 lists the commands that are currently relevant to users who have logged in to the system last
4.2.14 command to display boot information DMESG
4.2.15 command to display system memory status free
4.2.16 Display System process instantaneous running dynamic command PS
4.2.17 command top for real-time monitoring system processor status
4.3 File management and editing
4.3.1 command to create a directory mkdir
4.3.2 commands to display content screen by pixel more
4.3.3 the command to print the contents of a file to standard output cat
4.3.4 diff for diff files
4.3.5 command grep for filtering text
4.3.6 the command RM to delete a directory and all of its files and subdirectories
4.3.7 Change the access time and modification time of the specified file touch
4.3.8 create a linked command between a file or directory ln
4.3.9 command file that displays the type of files
4.3.10 command to copy a file or directory CP
4.3.11 the command to find the specified file under the specified path find
4.3.12 splitting a document command split
4.3.13 File/directory rename or change storage location command MV
4.4 Compression and decompression
4.4.1 a command to compress/unzip a file or directory Zip/unzip
4.4.2 Compression/Unzip the file command Gzip/gunzip
4.4.3 Compression/Unzip the file command bzip2/bunzip2
4.4.4 command tar to pack files or directories for archiving
4.4.5 commands to convert or copy files DD
4.4.6 REDIRECT command to package backup, restore recovery files Cpio
4.5 Disk Management and maintenance
4.5.1 Command DF to check disk space usage
4.5.2 command du that displays the disk space occupied by a file or directory
4.5.3 Check the file system and try to fix the wrong command fsck
4.5.4 Force command Sync to write memory data back to the hard disk
4.5.5 command to exit the pull-out device eject
4.5.6 mount/Unload the specified file system command Mount/umount
4.6 Network Setup and maintenance
4.6.1 Configuring the network or displaying the current network interface Status command ifconfig
4.6.2 a command SCP that copies a file or directory to another Linux system
4.6.3 commands that display information such as a native network connection, a running port, and a routing table netstat
4.6.4 command to display the path information of a network packet to a specified host Traceroute
4.6.5 to communicate with a remote host or to obtain a remote host port information command Telnet
4.6.6 command to download software from the network wget
4.7 Text Editing Tools VI

The 5th chapter installs and manages the software under the Linux

5.1 Source Installation Method
5.1.1 Download Extract Source
5.1.2 Analysis Installation Platform environment
5.1.3 compiling and installing the software
5.1.4 Source installation Apache Http server
5.2 RPM Tool Installation method
5.2.1RPM Package Management Tool Introduction
5.2.2RPM Package Types and commands
Use of 5.2.3RPM Tools
5.3 Yum Installation method
Installation and configuration of the 5.3.1 Yum
The characteristics and basic usage of 5.3.2 Yum
5.3.3 a few nice yum sources
5.4 Binary Package Installation method
5.4.1 Installing the "*.tar.gz", "*.bz2" binary packages
5.4.2 package that provides the installer
The second part of the server building

6th Chapter Linux Server network Management

6.1 Network card-driven installation
General idea of 6.1.1 network card driver installation
6.1.2 Compiling and installing the NIC
6.2 Configuring the Linux Network
6.2.1 Network configuration files for different Linux distributions
6.2.2 Network configuration file detailed
6.3 Linux Network applications
6.3.1 the IP alias function under Linux
6.3.2 turn on the Linux proxy forwarding feature
The concept and configuration of 6.3.3 routing
6.3.4 Linux Router Setup

The 7th chapter of Linux under Common server erection

7.1 Managing Linux servers remotely using OpenSSH
7.2 Web server Build-up
7.2.1 the need to integrate Apache with Tomcat
7.2.2 Apache and Tomcat connectors
Installation of 7.2.3 Apache and Tomcat and JK modules
7.2.4 Apache and Tomcat integrated configuration
7.3 Lamp Server Build-up
7.3.1 Lamp and WordPress overview
Construction of 7.3.2 Lamp service environment
7.3.3 testing the accuracy of lamp environment installation
7.4 DNS Server Build-up
7.4.1DNS Service Overview
7.4.2DNS Service Build-up
7.5 Samba Server Build-up
Concept and function of 7.5.1Samba
Installation and configuration of 7.5.2Samba

The 8th chapter constructs the high-performance MySQL database system

8.1 MySQL and MARIADB
8.2 Common high-availability MySQL Solutions
8.1.1 Master-slave Replication Solution
8.1.2 MMM high-availability solution
8.1.3 Heartbeat/san High-availability solution
8.1.4 HEARTBEAT/DRBD High-availability solution
8.1.5 MySQL Cluster High-availability solution
8.2 Using keepalived to build MySQL dual master mode high-availability cluster system
8.2.1 MySQL Replication Introduction
8.2.2 MySQL Replication Implementation principle
8.2.3 MySQL Replication Common architecture
8.2.4 MySQL Master Master Interop mode architecture diagram
8.2.5 MySQL Master Master Interop mode configuration
8.2.6 configuration keepalived for MySQL dual master high Availability
8.2.7 test MySQL master-slave synchronization function
8.2.8 test keepalived for MySQL failover
8.3 Build MySQL high-availability cluster system through MMM
8.3.1 mmm high-availability MySQL solution brief
8.3.2 MMM typical application solution
8.3.3 mmm high-availability MySQL solution architecture diagram
Installation and configuration of 8.3.4 mmm
The management of 8.3.5 MMM
8.3.6 test mmm for MySQL high-availability features
8.4 MySQL Read-Write separation solution
8.4.1 Common MySQL read-write separation scheme
8.4.2 MySQL read-write separation via amoeba

9th Chapter Linux Server Security Policy

9.1 Network Security Overview
9.1.1 Common attack types
9.1.2 Attack prevention Strategy
9.2 Common Security policies for operating systems
Upgrade of 9.2.1 Software
9.2.2 Ports and services
9.2.3 Password Login Security
9.2.4 Other security settings
9.3 Linux Software firewall iptables
9.3.1iptables of Use environment
9.3.2iptables Usage Specifications and syntax
9.4 Backup of Linux Systems
9.4.1 Why to back up a Linux system
Data that 9.4.2Linux systems need to back up
9.4.3 Backup media and ways
9.4.4 Developing a backup strategy
9.4.5 Selection of backup tools

10th Chapter Linux Troubleshooting ideas and Cases

The processing of common system faults under 10.1 Linux
10.1.1 to deal with the problems of Linux system
10.1.2 Forget the Linux root password
10.1.3Linux system does not start a workaround
10.2 Common network fault handling under Linux
10.3 Common troubleshooting cases with Linux servers
10.3 "Read-onlyfile System" errors and resolution cases
10.4 su command to switch user confusion
10.5 Linux System Recovery case due to NAS storage failure
10.5.1 Description of fault phenomena
The thinking of 10.5.2 question judgment
10.5.3 Problem Handling Process
10.5.4 Problem Solving

Part III System Management Chapter

11th Chapter Linux User Rights Management

11.1 Overview of user and user group management
11.1.1 concepts for users and groups
11.1.2 User Profiles Overview
11.2 Introduction to User management tools
11.2.1 Add, toggle, and delete user group commands Groupadd/newgrp/groupdel
11.2.2 Add, modify, and delete user commands Useradd/usermod/userdel
11.3 Settings for files and permissions
11.3.1 viewing permissions properties for a file
11.3.2 using Chown to change the genus and the genera group
11.3.3 changing access rights with chmod

The 12th Chapter Linux disk storage Management

12.1 Basic concepts of Disk Management
How 12.1.1 disk devices are represented under Linux
Mounting and use of 12.1.2 equipment
12.1.3 partitioning standards for disk partitions
12.2 Partitioning a disk using the Fdisk tool
12.2.1 fdisk parameter meaning introduction
12.2.2 Fdisk Example Explanation
12.3 Planning for disk partitioning with the parted tool
12.3.1 parted introduction
12.3.2 parted how to use
12.3.3 parted application Example
12.4 LVM (Logical volume management)
Basic concepts of 12.4.1LVM
Terms of use for 12.4.2LVM
12.4.3 Installing the LVM tool
Creation and management of 12.4.4LVM

13th Chapter Linux File System Management

13.1 File System Overview
13.1.1 What is a file system
13.1.2 Why to use the file system
13.1.3 File System usage flow
Introduction of common File system under 13.2 Linux
12.2.1 ext3 and Ext4 file systems
13.2.2 ReiserFS File System
13.2.3 XFS File System
13.3 Choosing a file system standard
13.4 Use of Network File System (NFS)
13.4.1NFS Introduction
The implementation principle of 13.4.2NFS
Installation and configuration of 13.4.3NFS
13.5 ext3/ext4 file system to recover deleted files accidentally
13.5.1 How to use the "RM-RF" command
Similarities and differences of 13.5.2 Extundelete and Ext3grep
The recovery principle of 13.5.3 Extundelete
13.5.4 installation Extundelete
13.5.5 Extundelete Usage Explanation
13.5.6 Combat: Extundelete The process of recovering data

14th Chapter Linux Memory management

14.1 Physical memory and virtual memory
14.2 Monitoring of memory
14.3 Use of swap space swap
14.4 Viewing processes consuming memory

15th Chapter Linux System process Management

15.1 concept and classification of the process
15.2 Monitoring and management of the process
15.2.1 monitoring the system process with the PS command
15.2.2 using Pstree to monitor system processes
15.2.3 using top monitoring system processes
15.2.4 using lsof Monitoring system processes and procedures
15.2.5 using Pgrep to query the process ID
15.3 The use of task scheduling process Crond
15.3.1crond Introduction
Use of 15.3.2crontab Tools
15.3.3 considerations for using the Crontab tool
15.4 Closing a process
15.4.1 terminate a process with kill
15.4.2 terminating a set of processes with Killall

Part IV Performance Tuning Chapter

16th Linux System Performance Optimization principles

16.1 Overview of performance issues
16.2 factors that affect Linux performance
16.2.1 System Hardware Resources
16.2.2 Operating System related resources
16.2.3 Application Software Resources
16.3 people involved in analyzing system performance
16.3.1 Linux operations and maintenance personnel
16.3.2 System Architect Designers
16.3.3 Software Developer
16.4 System Performance analysis tools
16.5 System Performance Analysis criteria
16.6 Summary of this chapter

17th. Linux system performance evaluation and optimization case

17.1 CPU Performance evaluation
17.2 Memory Performance evaluation
17.3 disk I/O performance evaluation
17.4 Network Performance evaluation
17.4.1 to detect network connectivity through the ping command
17.4.2 Detecting network interface status through Netstat-i combination
17.4.3 routing table information through NETSTAT-R combination detection system
17.4.4 Display the network operation status of the system through the sar-n combination
17.4.5 This section summarizes
17.5 performance analysis and optimization cases based on Web applications
17.5.1 site optimization case based on dynamic content
17.5.2 site optimization case based on dynamic and static content combination

Part V Virtualization, cluster application Chapter

18th Virtualization Cloud computing Platform Proxmox VE

18.1 OpenVZ Introduction
18.2 KVM Introduction
18.3 Proxmoxve Introduction
18.4 Installing Proxmox VE
Use of 18.5 Proxmoxve
18.5.1 proxmox ve feature options description
18.5.2 Creating a OpenVZ virtual machine
18.5.3 Creating a KVM virtual machine

19th Chapter High Performance cluster software keepalived

19.1 Definition of clusters
Features and functions of cluster 19.2
19.2.1 High Availability and scalability
19.2.2 load balancing and error recovery
19.2.3 heartbeat detection and drift IP
19.3 Classification of clusters
19.3.1 High-availability clusters
19.3.2 Load Balancing cluster
19.3.3 Scientific Computing Cluster
Related terminology in 19.4 ha clusters
19.5 keepalived Introduction
Use of 19.5.1 keepalived
19.5.2 VRRP protocol and how it works
19.5.3 keepalived Working principle
Architecture of 19.5.4 keepalived
19.6 keepalived Installation and configuration
installation process of 19.6.1 keepalived
Global configuration of the 19.6.2 keepalived
19.6.3 Keepalived's VRRPD configuration
19.6.4 Keepalived's LVS configuration
19.7 keepalived Basic Function Application Example
19.7.1 keepalived Basic Ha function demo
19.7.2 monitoring of cluster resources through Vrrp_script
19.7.3 the master and backup roles in the keepalived cluster election strategy

20th chapter Load-balanced cluster LVS and Haproxy

20.1 LVs Introduction
20.2 LVS Architecture
Characteristics of 20.3 LVS cluster
Installation and use of 20.4 LVS
20.4.1 Installing Ipvs Management software
The usage of 20.4.2 Ipvsadm
20.5 Build LVS High Availability cluster system through keepalived
20.5.1 Instance Environment
20.5.2 Configuration keepalived
20.5.3 Configuring the Real server node
20.5.4 starting the Keepalived+lvs cluster system
20.6 Testing high-availability LVS load Balancing cluster system
20.6.1 High Availability Functional Testing
20.6.2 Load Balancing test
20.6.3 Failover Test
20.7 High performance load balancer software Haproxy
20.7.1 Haproxy Introduction
20.7. Difference between 24-and seven-layer load balancing
Similarities and differences of 20.7.3 Haproxy and LVs
20.8 haproxy Basic configuration and application examples
20.8.1 Fast installation of haproxy cluster software
20.8.2 haproxy Basic Configuration file
20.8.3 Intelligent load Balancing with Haproxy ACL rules
20.8.4 Management and Maintenance Haproxy
20.8.5 using Haproxy's web monitoring platform
20.9 Building haproxy+keepalived high-availability load balancing system
20.9.1 Building Environment Description
20.9.2 Configuring Haproxy Load Balancer Server
20.9.3 Configuring primary, Standby keepalived servers
20.10 Testing haproxy+keepalived High-availability load Balancing clusters
20.10.1 testing Keepalived's high-availability features
20.10.2 Test Load Balancing function

http://www.bkjia.com/PHPjc/1084016.html www.bkjia.com true http://www.bkjia.com/PHPjc/1084016.html techarticle "Progressive Linux" the second edition of the forthcoming release (with the cover) from the "Progressive Linux" first release, to now nearly 6 years, 6 years of time, the technology has changed a lot ...

  • Contact Us

    The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

    If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

    A Free Trial That Lets You Build Big!

    Start building with 50+ products and up to 12 months usage for Elastic Compute Service

    • Sales Support

      1 on 1 presale consultation

    • After-Sales Support

      24/7 Technical Support 6 Free Tickets per Quarter Faster Response

    • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.