m (moved System Administration Study Guide to SysadminSG RHCSA Study Guide: Separating the RHCSA and RHCE guides so we can have more focused study sessions, if desired.) |
(initial data) |
||
Line 1: | Line 1: | ||
The Fedora Project is in constant need for administrators with better skills. In a yet-to-be-named initiative, the Fedora Project wishes to help as many contributors as possible improve their basic system administration skills. This study guide is to help those pursuing additional goals, including higher-pay, certifications and more. | The Fedora Project is in constant need for administrators with better skills. In a yet-to-be-named initiative, the Fedora Project wishes to help as many contributors as possible improve their basic system administration skills. This study guide is to help those pursuing additional goals, including higher-pay, certifications and more. | ||
The study guide | The study guide is intended to be printed by those who wish to study common tasks performed by many system administrators. This study guide is based upon the [https://www.redhat.com/certification/rhcsa/objectives/ Red Hat Certified System Administrator Exam Objectives]. Other useful study components will be added here. Community contributions are always welcome. | ||
=== Understand and Use Essential Tools === | |||
Access a shell prompt and issue commands with correct syntax | |||
Line 24: | Line 20: | ||
Use input-output redirection (>, >>, |, 2>, etc.) | |||
Line 42: | Line 38: | ||
Use grep and regular expressions to analyze text | |||
Line 57: | Line 53: | ||
Access remote systems using ssh and VNC | |||
Line 72: | Line 68: | ||
Log in and switch users in multi-user runlevels | |||
Line 78: | Line 75: | ||
Line 88: | Line 84: | ||
Archive, compress, unpack and uncompress files using tar, star, gzip, and bzip2 | |||
Line 97: | Line 94: | ||
Line 104: | Line 100: | ||
Create and edit text files | |||
Line 116: | Line 113: | ||
Create, delete, copy and move files and directories | |||
Line 133: | Line 130: | ||
Create hard and soft links | |||
Line 150: | Line 147: | ||
List, set and change standard ugo/rwx permissions | |||
Line 167: | Line 164: | ||
Locate, read and use system documentation including man, info, and files in /usr/share/doc . | |||
Line 184: | Line 181: | ||
=== Operate Running Systems === | |||
Boot, reboot, and shut down a system normally | |||
Line 201: | Line 198: | ||
Boot systems into different runlevels manually | |||
Line 218: | Line 214: | ||
Use single-user mode to gain access to a system | |||
Line 234: | Line 230: | ||
Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes | |||
Line 251: | Line 247: | ||
Locate and interpret system log files | |||
Line 267: | Line 263: | ||
Access a virtual machine's console | |||
Line 286: | Line 282: | ||
Start and stop virtual machines | |||
Line 302: | Line 298: | ||
Start, stop and check the status of network services | |||
Line 318: | Line 314: | ||
=== Configure Local Storage === | |||
List, create, delete and set partition type for primary, extended, and logical partitions | |||
Line 335: | Line 332: | ||
Create and remove physical volumes, assign physical volumes to volume groups, create and delete logical volumes | |||
Line 341: | Line 339: | ||
Line 352: | Line 348: | ||
Create and configure LUKS-encrypted partitions and logical volumes to prompt for password and mount a decrypted file system at boot | |||
Line 361: | Line 358: | ||
Line 369: | Line 365: | ||
Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label | |||
Line 380: | Line 377: | ||
Add new partitions, logical volumes and swap to a system non-destructively | |||
Line 398: | Line 395: | ||
=== Create and Configure File Systems === | |||
Create, mount, unmount and use ext2, ext3 and ext4 file systems | |||
Line 416: | Line 414: | ||
Mount, unmount and use LUKS-encrypted file systems | |||
Line 433: | Line 431: | ||
Mount and unmount CIFS and NFS network file systems | |||
Line 450: | Line 447: | ||
Configure systems to mount ext4, LUKS-encrypted and network file systems automatically | |||
Line 455: | Line 453: | ||
Line 466: | Line 463: | ||
Extend existing unencrypted ext4-formatted logical volumes | |||
Line 472: | Line 470: | ||
Line 484: | Line 481: | ||
Create and configure set-GID directories for collaboration | |||
Line 490: | Line 488: | ||
Line 500: | Line 497: | ||
Create and manage Access Control Lists (ACLs) | |||
Line 507: | Line 505: | ||
Line 517: | Line 514: | ||
Diagnose and correct file permission problems | |||
Line 525: | Line 523: | ||
Line 533: | Line 530: | ||
=== Deploy, Configure and Maintain Systems === | |||
Configure networking and hostname resolution statically or dynamically | |||
Line 543: | Line 542: | ||
Line 550: | Line 548: | ||
Schedule tasks using cron | |||
Line 563: | Line 562: | ||
Configure systems to boot into a specific runlevel automatically | |||
Line 581: | Line 580: | ||
Install Red Hat Enterprise Linux automatically using Kickstart | |||
Line 599: | Line 597: | ||
Configure a physical machine to host virtual guests | |||
Line 616: | Line 614: | ||
Install Red Hat Enterprise Linux systems as virtual guests | |||
Line 634: | Line 632: | ||
Configure systems to launch virtual machines at boot | |||
Line 639: | Line 638: | ||
Line 651: | Line 649: | ||
Configure network services to start automatically at boot | |||
Line 659: | Line 658: | ||
Line 667: | Line 665: | ||
Configure a system to run a default configuration HTTP server | |||
Line 679: | Line 678: | ||
Configure a system to run a default configuration FTP server | |||
Line 698: | Line 697: | ||
Install and update software packages from a remote repository, or from the local filesystem | |||
Line 714: | Line 713: | ||
Update the kernel package appropriately to ensure a bootable system | |||
Line 719: | Line 719: | ||
Line 730: | Line 729: | ||
Modify the system bootloader | |||
Line 740: | Line 740: | ||
Line 746: | Line 745: | ||
Configure a system to run a default configuration NTP server and synchronize time using other NTP peers | |||
Line 844: | Line 763: | ||
=== Manage Users and Groups === | === Manage Users and Groups === | ||
Create, delete, and modify local user accounts | |||
Line 865: | Line 779: | ||
Change passwords and adjust password aging for local user accounts | |||
Line 881: | Line 795: | ||
Create, delete and modify local groups and group memberships | |||
Line 897: | Line 811: | ||
Configure a system to use an existing LDAP directory service for user and group information | |||
Line 926: | Line 829: | ||
=== Manage Security === | === Manage Security === | ||
Configure firewall settings using system-config-firewall or iptables | |||
Line 1,493: | Line 844: | ||
Set enforcing and permissive modes for SELinux | |||
Line 1,512: | Line 862: | ||
List and identify SELinux file and process context | |||
Line 1,528: | Line 878: | ||
Restore default file contexts | |||
Line 1,546: | Line 895: | ||
Use boolean settings to modify system SELinux settings | |||
Line 1,566: | Line 914: | ||
Diagnose and address routine SELinux policy violations |
Revision as of 19:52, 10 January 2012
The Fedora Project is in constant need for administrators with better skills. In a yet-to-be-named initiative, the Fedora Project wishes to help as many contributors as possible improve their basic system administration skills. This study guide is to help those pursuing additional goals, including higher-pay, certifications and more.
The study guide is intended to be printed by those who wish to study common tasks performed by many system administrators. This study guide is based upon the Red Hat Certified System Administrator Exam Objectives. Other useful study components will be added here. Community contributions are always welcome.
Understand and Use Essential Tools
Access a shell prompt and issue commands with correct syntax
Use input-output redirection (>, >>, |, 2>, etc.)
Use grep and regular expressions to analyze text
Access remote systems using ssh and VNC
Log in and switch users in multi-user runlevels
Archive, compress, unpack and uncompress files using tar, star, gzip, and bzip2
Create and edit text files
Create, delete, copy and move files and directories
Create hard and soft links
List, set and change standard ugo/rwx permissions
Locate, read and use system documentation including man, info, and files in /usr/share/doc .
Operate Running Systems
Boot, reboot, and shut down a system normally
Boot systems into different runlevels manually
Use single-user mode to gain access to a system
Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes
Locate and interpret system log files
Access a virtual machine's console
Start and stop virtual machines
Start, stop and check the status of network services
Configure Local Storage
List, create, delete and set partition type for primary, extended, and logical partitions
Create and remove physical volumes, assign physical volumes to volume groups, create and delete logical volumes
Create and configure LUKS-encrypted partitions and logical volumes to prompt for password and mount a decrypted file system at boot
Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
Add new partitions, logical volumes and swap to a system non-destructively
Create and Configure File Systems
Create, mount, unmount and use ext2, ext3 and ext4 file systems
Mount, unmount and use LUKS-encrypted file systems
Mount and unmount CIFS and NFS network file systems
Configure systems to mount ext4, LUKS-encrypted and network file systems automatically
Extend existing unencrypted ext4-formatted logical volumes
Create and configure set-GID directories for collaboration
Create and manage Access Control Lists (ACLs)
Diagnose and correct file permission problems
Deploy, Configure and Maintain Systems
Configure networking and hostname resolution statically or dynamically
Schedule tasks using cron
Configure systems to boot into a specific runlevel automatically
Install Red Hat Enterprise Linux automatically using Kickstart
Configure a physical machine to host virtual guests
Install Red Hat Enterprise Linux systems as virtual guests
Configure systems to launch virtual machines at boot
Configure network services to start automatically at boot
Configure a system to run a default configuration HTTP server
Configure a system to run a default configuration FTP server
Install and update software packages from a remote repository, or from the local filesystem
Update the kernel package appropriately to ensure a bootable system
Modify the system bootloader
Configure a system to run a default configuration NTP server and synchronize time using other NTP peers
Manage Users and Groups
Create, delete, and modify local user accounts
Change passwords and adjust password aging for local user accounts
Create, delete and modify local groups and group memberships
Configure a system to use an existing LDAP directory service for user and group information
Manage Security
Configure firewall settings using system-config-firewall or iptables
Set enforcing and permissive modes for SELinux
List and identify SELinux file and process context
Restore default file contexts
Use boolean settings to modify system SELinux settings
Diagnose and address routine SELinux policy violations