Upload
ngohuong
View
220
Download
1
Embed Size (px)
Citation preview
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Comprehensive, hands-on training that solves real-world problems
Red Hat System Administration II
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
DAY ONE
Kickstart
RegularExpressions
Vim
DAY TWO
ProcessPriorities
cron and at
ACLs
SELinux
DAY ONE DAY THREE
Partitions andFilesystems
Logical Volumes
Access NFS
DAY FOUR
BootTroubleshooting
Access SMB
Firewalls
ComprehensiveReview
Network Users
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Introduction
● Welcome to Class
● Course Objectives and Structure
● Orientation to Classroom Network
● Internationalization
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
DAY ONE
Kickstart
RegularExpressions
Vim
DAY TWO
ProcessPriorities
cron and at
ACLs
SELinux
DAY ONE DAY THREE
Partitions andFilesystems
Logical Volumes
Access NFS
DAY FOUR
BootTroubleshooting
Access SMB
Firewalls
ComprehensiveReview
Network Users
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 1:Automating Installation with Kickstart
● Defining the Anaconda Kickstart System
● Deploying a New Virtual System with Kickstart
Kickstart
DAY ONE
RegularExpressions
Vim
cron and at
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To automate the installation of Red Hat Enterprise Linux systems with Kickstart.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Explain Kickstart concepts and architecture.● Create a Kickstart configuration file.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Kickstart File Syntax and Modification
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Deploying a New Virtual Systemwith Kickstart
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Installing a System Using Kickstart
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter Test:Automating Installation
with Kickstart
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 2:Using Regular Expressions with grep
● Regular Expression Fundamentals
● Matching Text with grep
● Using grep with Logs
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To write regular expressions using grep to isolate or locate content in text files.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Create regular expressions to match text patterns● Use grep to locate content in files
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 3:Creating and Editing Text Files with vim
● The vim Text Editor
● Basic vim Workflow
● Editing with vim
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Explain the three main modes of vim.● Open, edit, and save text files.● Use editor shortcuts.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 4:Scheduling Future Linux Tasks
● Scheduling One-Time Tasks with at
● Scheduling Recurring Jobs with cron
● Scheduling System cron Jobs
● Managing Temporary Files
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To schedule tasks to automatically execute in the future.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Schedule one-time tasks with at.● Schedule recurring jobs with cron.● Schedule recurring system jobs.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Scheduling Recurring Jobs with cron
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 5:Managing Priority of Linux Processes
● Process Priorities and "nice" Concepts
● Using nice and renice to Influence Process Priority
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To influence the relative priorities at which Linux processes run.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe nice levels.● Set nice levels on new and existing processes.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Using nice and renice toInfluence Process Priority
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 6:Controlling Access to Files with Access Control Lists
● POSIX Access Control Lists (ACLs)
● Securing Files with ACLs
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To manage file security using POSIX access control lists (ACLs).
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe POSIX access control lists.● Manage POSIX access control lists.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Using ACLs to Grant and
Limit Access
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Controlling Access to Files with Access
Control Lists (ACLs)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 7:Managing SELinux Security
● Enabling and Monitoring SELinux
● Changing SELinux Modes
● Changing SELinux Contexts
● Changing SELinux Booleans
● Troubleshooting SELinux
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network servicecompromise.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Explain the basics of SELinux permissions.● Change SELinux modes with setenforce.● Change file contexts with semanage and restorecon.● Manage SELinux booleans with setsebool.● Examine logs and use sealert to troubleshoot SELinux
violations.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Enabling and Monitoring Security EnhancedLinux (SELinux)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 8:Connecting to Network-defined Users and Groups
● Using Identity Management Services
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To configure systems to use central identity management services.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
●Use centralized identity management services.
Objective:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Connecting to a Central LDAP and
Kerberos Server
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Connecting to Network-defined
Users and Groups
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 9:Adding Disks, Partitions, and Filesystems to a Linux System
● Adding Partitions, Filesystems, and Persistent Mounts
● Adding and Enabling Swap Space
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To create and manage disks, partitions, and filesystems from the command line.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Manage simple partitions and filesystems.● Manage swap space.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Adding Partition, Filesystem,and Persistent Mount
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Adding Partition, Filesystem,
Persistent Mount
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Adding Filesystem, Swap,
and Persistent Mount
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 10:Managing Logical Volume Management Storage
● Logical Volume Management Concepts
● Managing Logical Volumes
● Extending Logical Volumes
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To manage logical volumes from the command line.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe logical volume management components and concepts.
● Manage logical volumes.● Extend logical volumes.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Managing Logical Volume Management
(LVM) Storage
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 11:Accessing Network Storage with Network File System (NFS)
● Mounting Network Storage with NFS
● Automounting Network Storage with NFS
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To use autofs and the command line to mount and unmount network storage with NFS.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Mount, access and unmount network storage with NFS● Automount and access network storage with NFS
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Accessing Network Storage with Network
File System (NFS)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 12:Accessing Network Storage with SMB
● Accessing Network Storage with SMB
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To use autofs and the command line to mount and unmount SMB file systems.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Mount, automount, and unmount SMB file systems.
Objective:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 13:Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process
● The Red Hat Enterprise Linux Boot Process
● Repairing Common Boot Issues
● Repairing File System Issues at Boot
● Repairing Boot Loader Issues
BootTroubleshooting
DAY FOUR
Firewalls
ComprehensiveReview
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To troubleshoot the Red Hat Enterprise Linux boot process.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe the Red Hat Enterprise Linux boot process.● Repair common boot issues.● Repair file system issues at boot.● Repair bootloader problems.
Objectives:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Controlling and Troubleshooting the Red
Hat Enterprise Linux Boot Process
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 14:Limiting Network Communication with firewalld
● Limiting Network Communication
BootTroubleshooting
DAY FOUR
Firewalls
ComprehensiveReview
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Configure a basic firewall using firewalld, firewallconfig, and firewall-cmd.
Objective:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 15:Comprehensive Review
● Red Hat System Administration II Comprehensive Review
BootTroubleshooting
DAY FOUR
Firewalls
ComprehensiveReview
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To practice and demonstrate knowledge and skills learned in Red Hat System Administration II.
Goal:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Review course chapters to reinforce knowledge and skills.
Objective:
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Red Hat System Administration II Comprehensive Review
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Comprehensive Review of System Administration II