Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
1Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Introduction to System Administration

Introduction to System Administration

Ratings: (0)|Views: 3,518|Likes:
Published by Ali Sani
The Red Hat Enterprise Linux Introduction to System Administration contains introductory informa-
tion for new Red Hat Enterprise Linux system administrators. It does not teach you how to perform a
particular task under Red Hat Enterprise Linux; rather, it provides you with the background knowledge
that more experienced system administrators have learned over time.
The Red Hat Enterprise Linux Introduction to System Administration contains introductory informa-
tion for new Red Hat Enterprise Linux system administrators. It does not teach you how to perform a
particular task under Red Hat Enterprise Linux; rather, it provides you with the background knowledge
that more experienced system administrators have learned over time.

More info:

Published by: Ali Sani on Jan 04, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/11/2011

pdf

text

original

 
Red Hat Enterprise Linux 4 
Introduction to SystemAdministration
 
Red Hat Enterprise Linux 4: Introduction to System Administration
Copyright © 2005 Red Hat, Inc.
Red Hat, Inc.1801 Varsity DriveRaleigh NC 27606-2072USAPhone:+1 919 754 3700Phone:888 733 4281Fax: +1 919 754 3701PO Box 13588Research Triangle Park NC 27709 USArhel-isa(EN)-4-Print-RHI(2004-08-25T17:11)Copyright © 2005 by Red Hat, Inc. This material may be distributedonly subject to the terms and conditionsset forth in theOpen PublicationLicense, V1.0 or later (the latest version is presentlyavailableat http://www.opencontent.org/openpub/).Distributionof substantivelymodified versions of this document is prohibitedwithout the explicit permissionof the copyrightholder.Distributionof the work or derivativeof the work in any standard(paper) book form for commercial purposesis prohibitedunless prior permissionis obtainedfrom the copyrightholder.Red Hat and the Red Hat "Shadow Man" logo are registeredtrademarksof Red Hat, Inc. in the United States and othercountries.All other trademarksreferencedherein are the propertyof their respectiveowners.The GPG fingerprintof the security@redhat.comkey is:CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E
 
Table of Contents
Introduction..........................................................................................................................................i
1. Architecture-specific Information..........................................................................................i2. Document Conventions..........................................................................................................i3. Activate Your Subscription..................................................................................................iv3.1. Provide a Red Hat Login.......................................................................................iv3.2. Provide Your Subscription Number.......................................................................v3.3. Connect Your System.............................................................................................v4. More to Come.......................................................................................................................v4.1. Send in Your Feedback ..........................................................................................v
1. The Philosophy of System Administration...................................................................................1
1.1. Automate Everything.........................................................................................................11.2. Document Everything........................................................................................................21.3. Communicate as Much as Possible....................................................................................31.3.1. Tell Your Users What You Are Going to Do......................................................31.3.2. Tell Your Users What You Are Doing................................................................41.3.3. Tell Your Users What You Have Done...............................................................41.4. Know Your Resources........................................................................................................51.5. Know Your Users...............................................................................................................61.6. Know Your Business..........................................................................................................61.7. Security Cannot be an Afterthought..................................................................................61.7.1. The Risks of Social Engineering.........................................................................71.8. Plan Ahead.........................................................................................................................71.9. Expect the Unexpected......................................................................................................81.10. Red Hat Enterprise Linux-Specific Information..............................................................81.10.1. Automation.......................................................................................................81.10.2. Documentation and Communication................................................................91.10.3. Security...........................................................................................................101.11. Additional Resources.....................................................................................................101.11.1. Installed Documentation.................................................................................101.11.2. Useful Websites..............................................................................................111.11.3. Related Books.................................................................................................11
2. Resource Monitoring....................................................................................................................13
2.1. Basic Concepts.................................................................................................................132.2. System Performance Monitoring.....................................................................................132.3. Monitoring System Capacity...........................................................................................142.4. What to Monitor?.............................................................................................................142.4.1. Monitoring CPU Power....................................................................................152.4.2. Monitoring Bandwidth......................................................................................162.4.3. Monitoring Memory..........................................................................................162.4.4. Monitoring Storage...........................................................................................172.5. Red Hat Enterprise Linux-Specific Information..............................................................182.5.1.
..................................................................................................................182.5.2.
....................................................................................................................192.5.3.
..............................................................................................................202.5.4. The Sysstat Suite of Resource Monitoring Tools.............................................222.5.5. OProfile.............................................................................................................242.6. Additional Resources.......................................................................................................282.6.1. Installed Documentation...................................................................................282.6.2. Useful Websites................................................................................................282.6.3. Related Books...................................................................................................29

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->