Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Oracle Linux Cookbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
Oracle Linux Cookbook

Oracle Linux Cookbook

By : Erik Benner, Erik B. Thomsen, Jonathan Spindel
5 (4)
close
close
Oracle Linux Cookbook

Oracle Linux Cookbook

5 (4)
By: Erik Benner, Erik B. Thomsen, Jonathan Spindel

Overview of this book

Discover the power of Oracle Linux 8, the free and enterprise-grade Linux distribution designed for use in any environment, with this recipe-style book. Starting with instructions on how to obtain Oracle Linux for both X86 and ARM-based platforms, this book walks you through various installation methods, from running it as a Windows service to installing it on a Raspberry Pi. It unravels advanced topics such as system upgrades using Leapp for major version transitions and using a PXE server and kickstart files for more advanced installations. The book then delves into swapping kernels to take advantage of Oracle’s UEK, exploring boot options, managing software with DNF, and achieving high availability. Detailed recipes involving security topics will assist with tasks such as data encryption, both at rest and in motion. For developers, it offers guidance on building RPM files, using Docker and Podman in a containerized environment, working with AppStreams, and more. For large-scale deployments, the book introduces Oracle Linux Automation Manager for enterprise-level Ansible utilization, from setting up the Ansible server to basic playbook writing. Finally, you’ll discover strategies for cloud migration. By the end of this book, you’ll possess a comprehensive toolkit that will elevate your skills as a Linux administrator.
Table of Contents (16 chapters)
close
close

Keeping the Data Safe – Securing a System

No one wants to be the headline news story, especially when their data is stolen. One of the best ways to help protect your data is to secure the operating system and its services. Securing is often compared to an onion, as there are multiple layers that are difficult to peel open, each providing some defense against bad actors. When bad actors attack your data, it’s not always to steal it; it’s often to change it as well. To make matters worse, when you move to the cloud, you will have to protect not only against internal threats, such as rogue contractors or employees, and external threats, such as hackers attacking the systems, but you also have to protect your data against your cloud provider as well. In security, you never know who is the bad actor!

It is not just protecting your systems against bad actors; many industries also require a strong security stance. This is common with healthcare, which often requires...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY