| |
| |
Foreword to the First Edition | |
| |
| |
Preface | |
| |
| |
Acknowledgments | |
| |
| |
| |
Basic Administration | |
| |
| |
| |
Where to Start | |
| |
| |
Suggested background | |
| |
| |
Linux's relationship to UNIX | |
| |
| |
Linux in historical context | |
| |
| |
Linux distributions | |
| |
| |
Notation and typographical conventions | |
| |
| |
Where to go for information | |
| |
| |
How to find and install software | |
| |
| |
Essential tasks of the system administrator | |
| |
| |
System administration under duress | |
| |
| |
Recommended reading | |
| |
| |
Exercises | |
| |
| |
| |
Booting and Shutting Down | |
| |
| |
Bootstrapping | |
| |
| |
Booting PCs | |
| |
| |
Using boot loaders: LILO and GRUB | |
| |
| |
Booting single-user mode | |
| |
| |
Working with startup scripts | |
| |
| |
Rebooting and shutting down | |
| |
| |
Exercises | |
| |
| |
| |
Rootly Powers | |
| |
| |
Ownership of files and processes | |
| |
| |
The superuser | |
| |
| |
Choosing a root password | |
| |
| |
Becoming root | |
| |
| |
Other pseudo-users | |
| |
| |
Exercises | |
| |
| |
| |
Controlling Processes | |
| |
| |
Components of a process | |
| |
| |
The life cycle of a process | |
| |
| |
Signals | |
| |
| |
Kill and killall: send signals | |
| |
| |
Process states | |
| |
| |
Nice and renice: influence scheduling priority | |
| |
| |
ps: monitor processes | |
| |
| |
Top: monitor processes even better | |
| |
| |
The /proc filesystem | |
| |
| |
Strace: trace signals and system calls | |
| |
| |
Runaway processes | |
| |
| |
Recommended reading | |
| |
| |
Exercises | |
| |
| |
| |
The Filesystem | |
| |
| |
Pathnames | |
| |
| |
Filesystem mounting and unmounting | |
| |
| |
The organization of the file tree | |
| |
| |
File types | |
| |
| |
File attributes | |
| |
| |
Access control lists | |
| |
| |
Exercises | |
| |
| |
| |
Adding New Users | |
| |
| |
The /etc/passwd file | |
| |
| |
The /etc/shadow file | |
| |
| |
The /etc/group file | |
| |
| |
Adding users | |
| |
| |
Removing users | |
| |
| |
Disabling logins | |
| |
| |
Managing accounts | |
| |
| |
Exercises | |
| |
| |
| |
Adding a Disk | |
| |
| |
Disk interfaces | |
| |
| |
Disk geometry | |
| |
| |
Linux filesystems | |
| |
| |
An overview of the disk installation procedure | |
| |
| |
hdparm: set IDE interface parameters | |
| |
| |
fsck: check and repair filesystems | |
| |
| |
Adding a disk: a step-by-step guide | |
| |
| |
Advanced disk management: RAID and LVM | |
| |
| |
Mounting USB drives | |
| |
| |
Exercises | |
| |
| |
| |
Periodic Processes | |
| |
| |
Cron: schedule commands | |
| |
| |
The format of crontab files | |
| |
| |
Crontab management | |
| |
| |
Some common uses for cron | |
| |
| |
Other schedulers: anacron and fcron | |
| |
| |
Exercises | |
| |
| |
| |
Backups | |
| |
| |
Motherhood and apple pie | |
| |
| |
Backup devices and media | |
| |
| |
Setting up an incremental backup regime with dump | |
| |
| |
Restoring from dumps with restore | |
| |
| |
Dumping and restoring for upgrades | |
| |
| |
Using other archiving programs | |
| |
| |
Using multiple files on a single tape | |
| |
| |
Bacula | |
| |
| |
Commercial backup products | |
| |
| |
Recommended reading | |
| |
| |
Exercises | |
| |
| |
| |
Syslog and Log Files | |
| |
| |
Logging policies | |
| |
| |
Linux log files | |
| |
| |
Logrotate: manage log files | |
| |
| |
Syslog: the system event logger | |
| |
| |
Condensing log files to useful information | |
| |
| |
Exercises | |
| |
| |
| |
Software and Configuration Management | |
| |
| |
Basic Linux installation | |
| |
| |
Diskless clients | |
| |
| |
Package management | |
| |
| |
High-level package management systems | |
| |
| |
Revision control | |
| |
| |
Localization and configuration | |
| |
| |
Configuration management tools | |
| |
| |
Sharing software over NFS | |
| |
| |
Recommended software | |
| |
| |
Recommended reading | |
| |
| |
Exercises | |
| |
| |
| |
Networking | |
| |
| |
| |
TCP/IP Networking | |
| |
| |
TCP/IP and the Internet | |
| |
| |
Networking road map | |
| |
| |
Packets and encapsulation | |
| |
| |
IP addresses: the gory details | |
| |
| |
Routing | |
| |
| |
ARP: the address resolution protocol | |
| |
| |
Addition of a machine to a network | |
| |
| |
Distributi | |