Linux red hat system administration

Содержание
  1. Product Documentation for Red Hat Enterprise Linux 9
  2. Considerations in adopting RHEL 9
  3. Getting the most from your Support experience
  4. Package manifest
  5. Installing RHEL
  6. Performing a standard RHEL 9 installation
  7. Performing an advanced RHEL 9 installation
  8. Boot options for RHEL Installer
  9. Customizing Anaconda
  10. Upgrading RHEL
  11. Upgrading from RHEL 8 to RHEL 9
  12. Composing RHEL images using Image Builder
  13. Composing a customized RHEL system image
  14. Composing, installing, and managing RHEL for Edge images
  15. System Administration
  16. Configuring basic system settings
  17. Managing systems using the RHEL 9 web console
  18. Configuring and using a CUPS printing server
  19. Managing software with the DNF tool
  20. Automating system administration by using RHEL System Roles
  21. Managing networking infrastructure services
  22. Deploying mail servers
  23. Deploying web servers and reverse proxies
  24. Installing and using dynamic programming languages
  25. Configuring and using database servers
  26. Managing, monitoring, and updating the kernel
  27. Monitoring and managing system status and performance
  28. Getting started with the GNOME desktop environment
  29. Administering the system using the GNOME desktop environment
  30. Customizing the GNOME desktop environment
  31. Security
  32. Managing and monitoring security updates
  33. Security hardening
  34. Using SELinux
  35. Securing networks
  36. Configuring firewalls and packet filters
  37. Networking
  38. Configuring and managing networking
  39. Configuring InfiniBand and RDMA networks
  40. Identity Management
  41. Migrating to Identity Management on RHEL 9
  42. Planning Identity Management
  43. Installing Identity Management
  44. Accessing Identity Management services
  45. Configuring authentication and authorization in RHEL
  46. Preparing for disaster recovery with Identity Management
  47. Managing IdM users, groups, hosts, and access control rules
  48. Managing certificates in IdM
  49. Managing replication in Identity Management
  50. Using Ansible to install and manage Identity Management
  51. Working with vaults in Identity Management
  52. Working with DNS in Identity Management
  53. Tuning performance in Identity Management
  54. Using IdM Healthcheck to monitor your IdM environment
  55. Installing trust between IdM and AD
  56. Managing smart card authentication
  57. Integrating RHEL systems directly with Windows Active Directory
  58. Using external Red Hat utilities with Identity Management
  59. Performing disaster recovery with Identity Management
  60. Storage
  61. Managing file systems
  62. Configuring and using network file services
  63. Managing storage devices
  64. Configuring and managing logical volumes
  65. Configuring device mapper multipath
  66. Deduplicating and compressing logical volumes on RHEL
  67. Clusters
  68. Configuring GFS2 file systems
  69. Configuring and managing high availability clusters
  70. Virtualization
  71. Building, running, and managing containers
  72. Configuring and managing virtualization
  73. Cloud
  74. Configuring and managing cloud-init for RHEL 9
  75. Deploying RHEL 9 on Amazon Web Services
  76. Deploying RHEL 9 on Google Cloud Platform
  77. Deploying RHEL 9 on Microsoft Azure
  78. Configuring a Red Hat High Availability cluster on Red Hat OpenStack Platform
  79. Developing applications
  80. Developing C and C++ applications in RHEL 9
  81. Installing, updating, and configuring OpenJDK on RHEL 9
  82. Developing .NET applications in RHEL 9
  83. Red Hat Enterprise Linux cheat sheets for system administrators
  84. Product Documentation for Red Hat Enterprise Linux 8
  85. Considerations in adopting RHEL 8
  86. Generating sos reports for technical support
  87. Package manifest
  88. Installing RHEL
  89. Performing a standard RHEL 8 installation
  90. Performing an advanced RHEL 8 installation
  91. Installing, managing, and removing user-space components
  92. Customizing Anaconda
  93. Upgrading and converting to RHEL
  94. Upgrading from RHEL 7 to RHEL 8
  95. Upgrading from RHEL 6 to RHEL 8
  96. Converting from an RPM-based Linux distribution to RHEL
  97. Composing RHEL images using Image Builder
  98. Composing a customized RHEL system image
  99. Composing, installing, and managing RHEL for Edge images
  100. Composing RHEL images using the Image Builder Service
  101. Creating customized images by using Insights image builder
  102. System Administration
  103. Configuring basic system settings
  104. Automating system administration by using RHEL System Roles
  105. Managing systems using the RHEL 8 web console
  106. Configuring a Red Hat High Availability cluster on Red Hat OpenStack Platform
  107. Using the desktop environment in RHEL 8
  108. Managing networking infrastructure services
  109. Deploying different types of servers
  110. Managing, monitoring, and updating the kernel
  111. Recording sessions
  112. Monitoring and managing system status and performance
  113. Security
  114. Managing and monitoring security updates
  115. Security hardening
  116. Using SELinux
  117. Securing networks
  118. Networking
  119. Configuring and managing networking
  120. Configuring InfiniBand and RDMA networks
  121. Identity Management
  122. Migrating to Identity Management on RHEL 8
  123. Planning Identity Management
  124. Installing Identity Management
  125. Accessing Identity Management services
  126. Configuring authentication and authorization in RHEL
  127. Preparing for disaster recovery with Identity Management
  128. Managing IdM users, groups, hosts, and access control rules
  129. Managing certificates in IdM
  130. Configuring and managing Identity Management
  131. Using Ansible to install and manage Identity Management
  132. Working with vaults in Identity Management
  133. Working with DNS in Identity Management
  134. Tuning performance in Identity Management
  135. Using IdM Healthcheck to monitor your IdM environment
  136. Managing smart card authentication
  137. Integrating RHEL systems directly with Windows Active Directory
  138. Performing disaster recovery with Identity Management
  139. Storage
  140. Managing file systems
  141. Managing storage devices
  142. Configuring and managing logical volumes
  143. Configuring device mapper multipath
  144. Deduplicating and compressing storage
  145. Deduplicating and compressing logical volumes on RHEL
  146. Clusters
  147. Configuring GFS2 file systems
  148. Configuring and managing high availability clusters
  149. Virtualization
  150. Building, running, and managing containers
  151. Configuring and managing virtualization
  152. Cloud
  153. Configuring and managing cloud-init for RHEL 8
  154. Deploying RHEL 8 on Amazon Web Services
  155. Deploying RHEL 8 on Google Cloud Platform
  156. Deploying RHEL 8 on Microsoft Azure
  157. RHEL for SAP on AWS
  158. Developing applications
  159. Developing C and C++ applications in RHEL 8
  160. Installing, updating, and configuring OpenJDK on RHEL 8
  161. Developing .NET applications in RHEL 8
  162. Installing and running .NET 5.0 on RHEL and OpenShift Container Platform
Читайте также:  Folder open command in linux

Product Documentation for Red Hat Enterprise Linux 9

Important planning recommendations and guidance to review before deploying.

Considerations in adopting RHEL 9

Getting the most from your Support experience

Package manifest

Installing RHEL

Performing a standard RHEL 9 installation

Performing an advanced RHEL 9 installation

Boot options for RHEL Installer

Customizing Anaconda

Upgrading RHEL

Upgrading from RHEL 8 to RHEL 9

Composing RHEL images using Image Builder

Composing a customized RHEL system image

Composing, installing, and managing RHEL for Edge images

System Administration

Deployment, administration, and tuning

Configuring basic system settings

Managing systems using the RHEL 9 web console

Configuring and using a CUPS printing server

Configure your system to operate as a CUPS server and manage printers, print queues and your printing environment

Managing software with the DNF tool

Automating system administration by using RHEL System Roles

Consistent and repeatable configuration of RHEL deployments across multiple hosts with Red Hat Ansible Automation Platform playbooks

Managing networking infrastructure services

Deploying mail servers

Deploying web servers and reverse proxies

Installing and using dynamic programming languages

Configuring and using database servers

Managing, monitoring, and updating the kernel

Monitoring and managing system status and performance

Getting started with the GNOME desktop environment

Administering the system using the GNOME desktop environment

Customizing the GNOME desktop environment

Security

Managing and monitoring security updates

Security hardening

Using SELinux

Prevent users and processes from performing unauthorized interactions with files and devices by using Security-Enhanced Linux (SELinux)

Securing networks

Configuring firewalls and packet filters

Networking

Configuring and managing networking

Configuring InfiniBand and RDMA networks

Identity Management

Identity management and policy

Migrating to Identity Management on RHEL 9

Planning Identity Management

Installing Identity Management

Accessing Identity Management services

Configuring authentication and authorization in RHEL

Preparing for disaster recovery with Identity Management

Managing IdM users, groups, hosts, and access control rules

Configuring users and hosts, managing them in groups, and controlling access with host-based and role-based access control rules

Managing certificates in IdM

Issuing certificates, configuring certificate-based authentication, and controlling certificate validity

Managing replication in Identity Management

Using Ansible to install and manage Identity Management

Working with vaults in Identity Management

Working with DNS in Identity Management

Tuning performance in Identity Management

Using IdM Healthcheck to monitor your IdM environment

Installing trust between IdM and AD

Managing smart card authentication

Integrating RHEL systems directly with Windows Active Directory

Using external Red Hat utilities with Identity Management

Performing disaster recovery with Identity Management

Storage

Managing file systems

Configuring and using network file services

Managing storage devices

Configuring and managing logical volumes

Configuring device mapper multipath

Deduplicating and compressing logical volumes on RHEL

Clusters

Configuring GFS2 file systems

Planning, administering, troubleshooting, and configuring GFS2 file systems in a high availability cluster

Читайте также:  Изменение разрешения монитора linux

Configuring and managing high availability clusters

Virtualization

Deployment, administration, and tuning of virtual machines

Building, running, and managing containers

Configuring and managing virtualization

Setting up your host, creating and administering virtual machines, and understanding virtualization features

Cloud

Configuring and managing cloud-init for RHEL 9

Deploying RHEL 9 on Amazon Web Services

Deploying RHEL 9 on Google Cloud Platform

Deploying RHEL 9 on Microsoft Azure

Configuring a Red Hat High Availability cluster on Red Hat OpenStack Platform

Developing applications

Developing C and C++ applications in RHEL 9

Setting up a developer workstation, and developing and debugging C and C++ applications in Red Hat Enterprise Linux 9

Installing, updating, and configuring OpenJDK on RHEL 9

Developing .NET applications in RHEL 9

Источник

Red Hat Enterprise Linux cheat sheets for system administrators

Red Hat Enterprise Linux (RHEL) comes with a variety of different tools to manage and configure operating system services and included applications — but the scope of tools and services can be overwhelming. In real life, most administrators are going to use the same types of commands to perform routine tasks, so you don’t need to know all the thousands of potential commands and services. When you master the basics, you can manage your infrastructure for most required tasks.

These cheat sheets work to simplify and clarify managing RHEL systems by showing common commands for common scenarios. These are references (not manuals or how-tos), but they can be handy tools when you need to try a new command or remember how to do something. And if you want other tools for using RHEL, check out RHEL Discover More Page.

Topic Description RHEL Versions
RHEL interactive lab cheatsheets A references of the step-by-step commands in different RHEL interactive demos, including podman, buildah, stratis, VDO, and bcc. RHEL 8
ip commands Using the ip command to manage networking confoiguration such as addresses and routing. RHEL 7
RHEL 8 commands Basic administrative commands, including yum RHEL 8
Basic Linux commands A range of basic to advanced commands; screenshots of command output; tips from cat to tar -xf somefile.tar.gz. All
Advanced Linux commands Get started developing a web application on Red Hat Enterprise Linux 7; set up a SELinux boolean; run a program in the background in your shell; use Java instead of PHP RHEL 7
systemd A quick reference to the systemd systemctl and journalctl commands, options, and tasks for managing boot process, system services, and runlevels. RHEL 7 and 8
podman All commands related to images, containers, and container resources. RHEL 7.6+ and RHEL 8
.NET Core 2.0 on Linux The basics on installing .NET Core 2.0 on Red Hat Enterprise Linux; getting to Hello World; how to get a simple program running; running your .NET code in a Linux container RHEL 7

Источник

Product Documentation for Red Hat Enterprise Linux 8

Important planning recommendations and guidance to review before deploying.

Considerations in adopting RHEL 8

Generating sos reports for technical support

Package manifest

Installing RHEL

Performing a standard RHEL 8 installation

Performing an advanced RHEL 8 installation

Installing, managing, and removing user-space components

Customizing Anaconda

Upgrading and converting to RHEL

Upgrading from RHEL 7 to RHEL 8

Upgrading from RHEL 6 to RHEL 8

Converting from an RPM-based Linux distribution to RHEL

Instructions for a conversion from CentOS Linux or Oracle Linux to Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8

Читайте также:  Ksc 13 linux install

Composing RHEL images using Image Builder

Composing a customized RHEL system image

Composing, installing, and managing RHEL for Edge images

Composing RHEL images using the Image Builder Service

Creating customized images by using Insights image builder

Creating customized system images with Insights image builder and uploading them to cloud environments

System Administration

Deployment, administration, and tuning

Configuring basic system settings

Automating system administration by using RHEL System Roles

Consistent and repeatable configuration of RHEL deployments across multiple hosts with Red Hat Ansible Automation Platform playbooks

Managing systems using the RHEL 8 web console

Configuring a Red Hat High Availability cluster on Red Hat OpenStack Platform

Using the desktop environment in RHEL 8

Managing networking infrastructure services

Deploying different types of servers

Setting up and configuring web servers and reverse proxies, network file services, database servers, mail transport agents, and printers

Managing, monitoring, and updating the kernel

Recording sessions

Monitoring and managing system status and performance

Security

Managing and monitoring security updates

Security hardening

Using SELinux

Prevent users and processes from performing unauthorized interactions with files and devices by using Security-Enhanced Linux (SELinux)

Securing networks

Networking

Configuring and managing networking

Configuring InfiniBand and RDMA networks

Identity Management

Identity management and policy

Migrating to Identity Management on RHEL 8

Upgrading a RHEL 7 IdM environment to RHEL 8 and migrating FreeIPA or external LDAP solutions to IdM

Planning Identity Management

Installing Identity Management

Accessing Identity Management services

Configuring authentication and authorization in RHEL

Preparing for disaster recovery with Identity Management

Managing IdM users, groups, hosts, and access control rules

Configuring users and hosts, managing them in groups, and controlling access with host-based and role-based access control rules

Managing certificates in IdM

Issuing certificates, configuring certificate-based authentication, and controlling certificate validity

Configuring and managing Identity Management

Logging in to IdM and managing services, users, hosts, groups, access control rules, and certificates.

Using Ansible to install and manage Identity Management

Working with vaults in Identity Management

Working with DNS in Identity Management

Managing the Domain Name Service (DNS) integrated with Identity Management in Red Hat Enterprise Linux 8

Tuning performance in Identity Management

Using IdM Healthcheck to monitor your IdM environment

Managing smart card authentication

Integrating RHEL systems directly with Windows Active Directory

Performing disaster recovery with Identity Management

Storage

Managing file systems

Managing storage devices

Configuring and managing logical volumes

Configuring device mapper multipath

Deduplicating and compressing storage

Deduplicating and compressing logical volumes on RHEL

Clusters

Configuring GFS2 file systems

Planning, administering, troubleshooting, and configuring GFS2 file systems in a high availability cluster

Configuring and managing high availability clusters

Virtualization

Deployment, administration, and tuning of virtual machines

Building, running, and managing containers

Configuring and managing virtualization

Setting up your host, creating and administering virtual machines, and understanding virtualization features in Red Hat Enterprise Linux 8

Cloud

Configuring and managing cloud-init for RHEL 8

Deploying RHEL 8 on Amazon Web Services

Deploying RHEL 8 on Google Cloud Platform

Deploying RHEL 8 on Microsoft Azure

RHEL for SAP on AWS

Developing applications

Developing C and C++ applications in RHEL 8

Setting up a developer workstation, and developing and debugging C and C++ applications in Red Hat Enterprise Linux 8

Installing, updating, and configuring OpenJDK on RHEL 8

Developing .NET applications in RHEL 8

Installing and running .NET 5.0 on RHEL and OpenShift Container Platform

Источник

Оцените статью
Adblock
detector