Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Red Hat Enterprise Linux 8 Administration
  • Toc
  • feedback
Red Hat Enterprise Linux 8 Administration

Red Hat Enterprise Linux 8 Administration

By : Miguel Pérez Colino, Pablo Iranzo Gómez, Scott McCarty
4.5 (4)
close
Red Hat Enterprise Linux 8 Administration

Red Hat Enterprise Linux 8 Administration

4.5 (4)
By: Miguel Pérez Colino, Pablo Iranzo Gómez, Scott McCarty

Overview of this book

Whether in infrastructure or development, as a DevOps or site reliability engineer, Linux skills are now more relevant than ever for any IT job, forming the foundation of understanding the most basic layer of your architecture. With Red Hat Enterprise Linux (RHEL) becoming the most popular choice for enterprises worldwide, achieving the Red Hat Certified System Administrator (RHCSA) certification will validate your Linux skills to install, configure, and troubleshoot applications and services on RHEL systems. Complete with easy-to-follow tutorial-style content, self-assessment questions, tips, best practices, and practical exercises with detailed solutions, this book covers essential RHEL commands, user and group management, software management, networking fundamentals, and much more. You'll start by learning how to create an RHEL 8 virtual machine and get to grips with essential Linux commands. You'll then understand how to manage users and groups on an RHEL 8 system, install software packages, and configure your network interfaces and firewall. As you advance, the book will help you explore disk partitioning, LVM configuration, Stratis volumes, disk compression with VDO, and container management with Podman, Buildah, and Skopeo. By the end of this book, you'll have covered everything included in the RHCSA EX200 certification and be able to use this book as a handy, on-the-job desktop reference guide. This book and its contents are solely the work of Miguel Pérez Colino, Pablo Iranzo Gómez, and Scott McCarty. The content does not reflect the views of their employer (Red Hat Inc.). This work has no connection to Red Hat, Inc. and is not endorsed or supported by Red Hat, Inc.
Table of Contents (25 chapters)
close
1
Section 1: Systems Administration – Software, User, Network, and Services Management
9
Section 2: Security with SSH, SELinux, a Firewall, and System Permissions
14
Section 3: Resource Administration – Storage, Boot Process, Tuning, and Containers
21
Section 4: Practical Exercises

Understanding users, groups, and basic permissions

Multi-user environments are defined by being able to handle more than one user simultaneously. But in order to be able to administer the system resources, there are two capabilities that help with the tasks:

  • Groups: Can aggregate users and provide permission for them in blocks.

    Each user has a primary group.

    By default, a group is created for each user and assigned to it as a primary with the same name as the username.

  • Permissions: Are assigned to files and determine which users and groups can access each file.

    Standard Linux (and UNIX/POSIX) permissions include user, group, and others (ugo).

The whole system comes with a set of permissions assigned by default to each file and directory. Be careful when changing them.

There is a principle in UNIX that Linux inherited that is: everything is a file. Even when there may be some corner cases to this principle, it stays true on almost any occasion. It means that a disk...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete