Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Oracle Linux Cookbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
Oracle Linux Cookbook

Oracle Linux Cookbook

By : Erik Benner, Erik B. Thomsen, Jonathan Spindel
5 (4)
close
close
Oracle Linux Cookbook

Oracle Linux Cookbook

5 (4)
By: Erik Benner, Erik B. Thomsen, Jonathan Spindel

Overview of this book

Discover the power of Oracle Linux 8, the free and enterprise-grade Linux distribution designed for use in any environment, with this recipe-style book. Starting with instructions on how to obtain Oracle Linux for both X86 and ARM-based platforms, this book walks you through various installation methods, from running it as a Windows service to installing it on a Raspberry Pi. It unravels advanced topics such as system upgrades using Leapp for major version transitions and using a PXE server and kickstart files for more advanced installations. The book then delves into swapping kernels to take advantage of Oracle’s UEK, exploring boot options, managing software with DNF, and achieving high availability. Detailed recipes involving security topics will assist with tasks such as data encryption, both at rest and in motion. For developers, it offers guidance on building RPM files, using Docker and Podman in a containerized environment, working with AppStreams, and more. For large-scale deployments, the book introduces Oracle Linux Automation Manager for enterprise-level Ansible utilization, from setting up the Ansible server to basic playbook writing. Finally, you’ll discover strategies for cloud migration. By the end of this book, you’ll possess a comprehensive toolkit that will elevate your skills as a Linux administrator.
Table of Contents (16 chapters)
close
close

Validating adherence to a compliance policy

Securing systems is much more than encrypting data at rest or in motion. Many configuration files should be checked, along with other common security settings. This can be done automatically using Security Content Automation Protocol (SCAP) files. SCAP is a standardized framework that is used to automate the process of maintaining the security of computer systems. It is a suite of specifications that provide a standardized approach to security automation, enabling organizations to implement consistent and repeatable security practices across their IT infrastructure.

SCAP defines a common language for communicating security-related information, which allows security tools and products from different vendors to work together seamlessly. It includes a set of standards and guidelines for creating and sharing security content, such as vulnerability data, security checklists, and configuration baselines. Some of the key components of SCAP include...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY