|
NOTE: CentOS Enterprise Linux is built from the Red Hat Enterprise Linux source code. Other than logo and name changes CentOS Enterprise Linux is compatible with the equivalent Red Hat version. This document applies equally to both Red Hat and CentOS Enterprise Linux.
Index
- /etc/cups/, Red Hat
Enterprise Linux-Specific Information
- /etc/fstab file
-
- mounting file systems with, Mounting File
Systems Automatically with /etc/fstab
- updating, Updating
/etc/fstab
- /etc/group file
-
- group, role in, /etc/group
- user account, role in, /etc/group
- /etc/gshadow file
-
- group, role in, /etc/gshadow
- user account, role in, /etc/gshadow
- /etc/mtab file, Viewing
/etc/mtab
- /etc/passwd file
-
- group, role in, /etc/passwd
- user account, role in, /etc/passwd
- /etc/printcap, Red Hat
Enterprise Linux-Specific Information
- /etc/shadow file
-
- group, role in, /etc/shadow
- user account, role in, /etc/shadow
- /proc/mdstat file, Checking
Array Status With /proc/mdstat
- /proc/mounts file, Viewing
/proc/mounts
- backups
-
- AMANDA backup software, The
Advanced Maryland Automatic Network Disk Archiver (AMANDA)
- building software, Backup
Software: Buy Versus Build
- buying software, Backup
Software: Buy Versus Build
- data-related issues surrounding, Different
Data: Different Backup Needs
- introduction to, Backups
- media types, Backup
Media
-
- disk, Disk
- network, Network
- tape, Tape
- restoration issues, Restoration
Issues
-
- bare metal restorations, Restoring
From Bare Metal
- testing restoration, Testing
Backups
- schedule, modifying, Modifying the
Backup Schedule
- storage of, Storage of
Backups
- technologies used, Backup
Technologies
-
- cpio, cpio
- dump, dump/restore:
Not Recommended for Mounted File Systems!
- tar, tar
- types of, Types of
Backups
-
- differential backups, Differential
Backups
- full backups, Full
Backups
- incremental backups, Incremental
Backups
- bandwidth-related resources
-
- see resources, system, bandwidth
- bash shell, automation and, Automation
- business, knowledge of, Know Your Business
- cache memory, Cache Memory
- capacity planning, Monitoring System Capacity
- CD-ROM
-
- file system
-
- see ISO 9660 file system
- centralized home directory, Home
Directories
- chage command, User Account and
Group Applications
- change control, Change
Control
- chfn command, User Account and
Group Applications
- chgrp command, File Permission
Applications
- chmod command, File Permission
Applications
- chown command, File Permission
Applications
- chpasswd command, User Account and
Group Applications
- color laser printers, Color Laser
Printers
- communication
-
- necessity of, Communicate as Much as
Possible
- Red Hat Enterprise Linux-specific information, Documentation
and Communication
- conventions
-
- document, Document
Conventions
- CPU power
-
- see resources, system, processing power
- CUPS, Red Hat Enterprise
Linux-Specific Information
- daisy-wheel printers
-
- see impact printers
- data
-
- shared access to, Who Can Access Shared
Data, Where Users Access
Shared Data
-
- global ownership issues, Global Ownership
Issues
- device
-
- alternative to device names, Alternatives to
Device File Names
- device names, alternatives to, Alternatives to
Device File Names
- devlabel, naming with, Using
devlabel
- file names, Device
Files
- file system labels, File System
Labels
- labels, file system, File System
Labels
- naming convention, Device Naming
Conventions
- naming with devlabel, Using
devlabel
- partition, Partition
- type, Device
Type
- unit, Unit
- whole-device access, Whole-Device
Access
- devlabel, Using
devlabel
- df command, Issuing the df
Command
- disaster planning, Planning for
Disaster
-
- power, backup, Backup
Power
-
- generator, Providing
Power For the Next Few Hours (and Beyond)
- motor-generator set, Providing
Power For the Next Few Seconds
- outages, extended, Planning for
Extended Outages
- UPS, Providing
Power For the Next Few Minutes
- types of disasters, Types of Disasters
-
- air conditioning, Heating, Ventilation,
and Air Conditioning
- application failures, Application
Failures
- building integrity, Building
Integrity
- electrical, Electricity
- electricity, quality of, Power
Quality
- electricity, security of, The
Security of Your Power
- environmental failures, Environmental
Failures
- hardware failures, Hardware
Failures
- heating, Heating, Ventilation,
and Air Conditioning
- human errors, Human Errors
- HVAC, Heating, Ventilation,
and Air Conditioning
- improper repairs, Improperly-Repaired
Hardware
- improperly-used applications, Improper Use
of Applications
- maintenance-related errors, Mistakes
Made During Maintenance
- misconfiguration errors, Misconfiguration
Errors
- mistakes during procedures, Mistakes
Made During Procedures
- operating system crashes, Crashes
- operating system failures, Operating System
Failures
- operating system hangs, Hangs
- operator errors, Operations Personnel
Errors
- procedural errors, Failure to
Follow Procedures
- service technician errors, Service Technician
Errors
- software failures, Software
Failures
- system administrator errors, System
Administrator Errors
- user errors, End-User
Errors
- ventilation, Heating, Ventilation,
and Air Conditioning
- weather-related, Weather and the
Outside World
- disaster recovery
-
- backup site, Backup
Sites: Cold, Warm, and Hot
-
- network connectivity to, Network
Connectivity to the Backup Site
- staffing of, Backup
Site Staffing
- backups, availability of, Availability
of Backups
- end of, Moving
Back Toward Normalcy
- hardware availability, Hardware
and Software Availability
- introduction to, Disaster
Recovery
- plan, creating, testing, implementing, Creating,
Testing, and Implementing a Disaster Recovery Plan
- software availability, Hardware
and Software Availability
- disk drives, Hard Drives
- disk quotas
-
- enabling, Enabling Disk
Quotas
- introduction to, Implementing Disk
Quotas
- management of, Managing Disk
Quotas
- overview of, Some
Background on Disk Quotas
-
- block usage tracking, Tracks
Disk Block Usage
- file-system specific, Per-File-System
Implementation
- grace period, Grace
Periods
- group specific, Per-Group
Space Accounting
- hard limits, Hard
Limits
- inode usage tracking, Tracks
Disk Inode Usage
- soft limits, Soft
Limits
- user specific, Per-User
Space Accounting
- disk space
-
- see storage
- documentation
-
- Red Hat Enterprise Linux-specific information, Documentation
and Communication
- documentation, necessity of, Document Everything
- dot-matrix printers
-
- see impact printers
- GID, Usernames and
UIDs, Groups and GIDs
- gnome-system-monitor command, The GNOME
System Monitor — A Graphical top
- gpasswd command, User Account and
Group Applications
- group
-
- files controlling, Files Controlling
User Accounts and Groups
-
- /etc/group, /etc/group
- /etc/gshadow, /etc/gshadow
- /etc/passwd, /etc/passwd
- /etc/shadow, /etc/shadow
- GID, Usernames and
UIDs, Groups and GIDs
- management of, Managing User
Accounts and Resource Access
- permissions related to, User Accounts,
Groups, and Permissions
-
- execute, User Accounts,
Groups, and Permissions
- read, User Accounts,
Groups, and Permissions
- setgid, User Accounts,
Groups, and Permissions
- setuid, User Accounts,
Groups, and Permissions
- sticky bit, User Accounts,
Groups, and Permissions
- write, User Accounts,
Groups, and Permissions
- shared data access using, Shared Groups
and Data
- structure, determining, Determining
Group Structure
- system GIDs, Usernames and
UIDs, Groups and GIDs
- system UIDs, Usernames and
UIDs, Groups and GIDs
- tools for managing, User Account and
Group Applications
-
- gpasswd command, User Account and
Group Applications
- groupadd command, User Account and
Group Applications
- groupdel command, User Account and
Group Applications
- groupmod command, User Account and
Group Applications
- grpck command, User Account and
Group Applications
- UID, Usernames and
UIDs, Groups and GIDs
- group ID
-
- see GID
- groupadd command, User Account and
Group Applications
- groupdel command, User Account and
Group Applications
- groupmod command, User Account and
Group Applications
- grpck command, User Account and
Group Applications
- hard drives, Hard Drives
- hardware
-
- failures of, Hardware
Failures
- service contracts, Service
Contracts
-
- availability of parts, Parts
Availability
- budget for, Available
Budget
- coverage hours, Hours of
Coverage
- depot service, Depot
Service
- drop-off service, Depot
Service
- hardware covered, Hardware
to be Covered
- on-site technician, Zero
Response Time — Having an On-Site Technician
- response time, Response
Time
- walk-in service, Depot
Service
- skills necessary to repair, Having the
Skills
- spares
-
- keeping, Keeping Spare
Hardware
- stock, quantities, How Much to
Stock?
- stock, selection of, What to
Stock?
- swapping hardware, Spares That
Are Not Spares
- home directory
-
- centralized, Home
Directories
- IDE interface
-
- overview of, IDE/ATA
- impact printers, Impact
Printers
-
- consumables, Impact
Printer Consumables
- daisy-wheel, Impact
Printers
- dot-matrix, Impact
Printers
- line, Impact
Printers
- inkjet printers, Inkjet
Printers
-
- consumables, Inkjet
Consumables
- intrusion detection systems, Security
- iostat command, The Sysstat Suite
of Resource Monitoring Tools, Monitoring
Bandwidth on Red Hat Enterprise Linux
- ISO 9660 file system, ISO 9660
- laser printers, Laser
Printers
-
- color, Color Laser
Printers
- consumables, Laser
Printer Consumables
- line printers
-
- see impact printers
- logical volume management
-
- see LVM
- lpd, Red Hat Enterprise
Linux-Specific Information
- LVM
-
- contrasted with RAID, With LVM, Why Use
RAID?
- data migration, Data
Migration
- logical volume resizing, Logical Volume
Resizing
- migration, data, Data
Migration
- overview of, Logical Volume
Management
- resizing, logical volume, Logical Volume
Resizing
- storage grouping, Physical Storage
Grouping
- managing
-
- printers, Printers and
Printing
- memory
-
- monitoring of,
Monitoring Memory
- resource utilization of, Physical and
Virtual Memory
- virtual memory, Basic Virtual
Memory Concepts
-
- backing store, Backing Store
— the Central Tenet of Virtual Memory
- overview of, Virtual Memory in
Simple Terms
- page faults, Page
Faults
- performance of, Virtual
Memory Performance Implications
- performance, best case, Best Case
Performance Scenario
- performance, worst case, Worst Case
Performance Scenario
- swapping, Swapping
- virtual address space, Virtual Memory: The Details
- working set, The Working
Set
- monitoring
-
- resources, Resource
Monitoring
- system performance, System
Performance Monitoring
- monitoring statistics
-
- bandwidth-related,
Monitoring Bandwidth
- CPU-related, Monitoring
CPU Power
- memory-related,
Monitoring Memory
- selection of, What
to Monitor?
- storage-related,
Monitoring Storage
- mount points
-
- see storage, file system, mount point
- mounting file systems
-
- see storage, file system, mounting
- mpstat command, The Sysstat Suite
of Resource Monitoring Tools
- MSDOS file system, MSDOS
- page description languages (PDL), Printer Languages and Technologies
-
- Interpress, Printer Languages
and Technologies
- PCL, Printer Languages and
Technologies
- PostScript, Printer Languages
and Technologies
- page faults, Page
Faults
- PAM, Security
- partition, Partition
-
- attributes of, Partition
Attributes
-
- geometry, Geometry
- type, Partition
Type
- type field, Partition
Type Field
- creation of, Partitioning,
Partitioning
- extended, Extended
Partitions
- logical, Logical
Partitions
- overview of, Partitions/Slices
- primary, Primary
Partitions
- passwd command, User Account and
Group Applications
- password, Passwords
-
- aging, Password Aging
- big character set used in, Expanded
Character Set
- longer, Longer
Passwords
- memorable, Memorable
- personal info used in, Personal
Information
- repeatedly used, The Same Password
for Multiple Systems
- shortness of, Short
Passwords
- small character set used in, Limited
Character Set
- strong, Strong
Passwords
- weak, Weak
Passwords
- word tricks used in, Simple Word
Tricks
- words used in, Recognizable
Words
- written, Passwords on
Paper
- perl, automation and, Automation
- permissions, User Accounts,
Groups, and Permissions
-
- tools for managing
-
- chgrp command, File Permission
Applications
- chmod command, File Permission
Applications
- chown command, File Permission
Applications
- philosophy of system administration, The Philosophy of System
Administration
- physical memory
-
- see memory
- planning, importance of, Plan Ahead
- Pluggable Authentication Modules
-
- see PAM
- printconf
-
- see printer configuration
- printer configuration, Red
Hat Enterprise Linux-Specific Information
-
- CUPS, Red Hat Enterprise
Linux-Specific Information
- text-based application, Red
Hat Enterprise Linux-Specific Information
- Printer Configuration Tool
-
- see printer configuration
- printers
-
- additional resources, Additional Resources
- color, Inkjet
Printers
-
- CMYK, Inkjet
Printers
- inkjet, Inkjet
Printers
- laser, Color Laser
Printers
- considerations, Printing
Considerations
- duplex, Function
- languages
-
- see page description languages (PDL)
- local, Networked
Versus Local Printers
- managing, Printers and
Printing
- networked, Networked
Versus Local Printers
- types, Types of
Printers
-
- color laser, Color Laser
Printers
- daisy-wheel, Impact
Printers
- dot-matrix, Impact
Printers
- dye-sublimation, Other
Printer Types
- impact, Impact
Printers
- inkjet, Inkjet
Printers
- laser, Laser
Printers
- line, Impact
Printers
- solid ink, Other Printer
Types
- thermal wax, Other
Printer Types
- printtool
-
- see printer configuration
- processing power, resources related to
-
- see resources, system, processing power
- quota, disk
-
- see disk quotas
- RAID
-
- arrays
-
- management of, Day to Day
Management of RAID Arrays
- raidhotadd command, use of, Rebuilding a
RAID array with raidhotadd
- rebuilding, Rebuilding a
RAID array with raidhotadd
- status, checking, Checking
Array Status With /proc/mdstat
- arrays, creating, Creating RAID
Arrays
-
- after installation time, After Red
Hat Enterprise Linux Has Been Installed
- at installation time, While
Installing Red Hat Enterprise Linux
- contrasted with LVM, With LVM, Why Use
RAID?
- creating arrays
-
- see RAID, arrays, creating
- implementations of, RAID
Implementations
-
- hardware RAID, Hardware
RAID
- software RAID, Software
RAID
- introduction to, RAID-Based
Storage
- levels of, RAID
Levels
-
- nested RAID, Nested RAID
Levels
- RAID 0, RAID 0
- RAID 0, advantages of, RAID 0
- RAID 0, disadvantages of, RAID 0
- RAID 1, RAID 1
- RAID 1, advantages of, RAID 1
- RAID 1, disadvantages of, RAID 1
- RAID 5, RAID 5
- RAID 5, advantages of, RAID 5
- RAID 5, disadvantages of, RAID 5
- nested RAID, Nested RAID
Levels
- overview of, Basic
Concepts
- raidhotadd command, use of, Rebuilding a
RAID array with raidhotadd
- RAM, Main
Memory — RAM
- read permission, User Accounts,
Groups, and Permissions
- recursion
-
- see recursion
- Red Hat Enterprise Linux-specific information
-
- automation, Automation
- backup technologies
-
- AMANDA, The
Advanced Maryland Automatic Network Disk Archiver (AMANDA)
- cpio, cpio
- dump, dump/restore:
Not Recommended for Mounted File Systems!
- tar, tar
- backups technologies
-
- overview of, Backup
Technologies
- bash shell, Automation
- communication, Documentation
and Communication
- disaster recovery, Red Hat
Enterprise Linux-Specific Information
- documentation, Documentation
and Communication
- intrusion detection systems, Security
- PAM, Security
- perl, Automation
- resource monitoring
-
- bandwidth, Red Hat
Enterprise Linux-Specific Information
- CPU power, Red Hat
Enterprise Linux-Specific Information
- memory, Red Hat Enterprise
Linux-Specific Information
- resource monitoring tools, Red Hat Enterprise Linux-Specific
Information
-
- free, Red Hat Enterprise
Linux-Specific Information, Red Hat Enterprise Linux-Specific
Information
- iostat, Monitoring
Bandwidth on Red Hat Enterprise Linux
- OProfile, Red Hat Enterprise
Linux-Specific Information
- sar, Monitoring
Bandwidth on Red Hat Enterprise Linux, Monitoring CPU
Utilization on Red Hat Enterprise Linux, Red Hat Enterprise Linux-Specific
Information
- Sysstat, Red Hat Enterprise
Linux-Specific Information
- top, Red Hat Enterprise
Linux-Specific Information, Monitoring CPU
Utilization on Red Hat Enterprise Linux
- vmstat, Red Hat Enterprise
Linux-Specific Information, Monitoring
Bandwidth on Red Hat Enterprise Linux, Monitoring CPU
Utilization on Red Hat Enterprise Linux, Red Hat Enterprise Linux-Specific
Information
- RPM, Security
- security, Security
- shell scripts, Automation
- software support, Software
Support
- support, software, Software
Support
- registering your subscription, Activate Your Subscription
- resource abuse, What Barriers Are in
Place To Prevent Abuse of Resources
- resource monitoring, Resource
Monitoring
-
- bandwidth,
Monitoring Bandwidth
- capacity planning, Monitoring System Capacity
- concepts behind, Basic Concepts
- CPU power, Monitoring
CPU Power
- memory,
Monitoring Memory
- storage,
Monitoring Storage
- system capacity, Monitoring
System Capacity
- system performance, System
Performance Monitoring
- tools
-
- free, free
- GNOME System Monitor, The GNOME
System Monitor — A Graphical top
- iostat, The Sysstat Suite
of Resource Monitoring Tools
- mpstat, The Sysstat Suite
of Resource Monitoring Tools
- OProfile, OProfile
- sa1, The Sysstat Suite
of Resource Monitoring Tools
- sa2, The Sysstat Suite
of Resource Monitoring Tools
- sadc, The Sysstat Suite
of Resource Monitoring Tools
- sar, The Sysstat Suite
of Resource Monitoring Tools, The sar
command
- Sysstat, The Sysstat Suite
of Resource Monitoring Tools
- top, top
- vmstat, vmstat
- tools used, Red Hat
Enterprise Linux-Specific Information
- what to monitor, What to Monitor?
- resources, importance of, Know Your Resources
- resources, system
-
- bandwidth, Bandwidth and Processing
Power
-
- buses role in, Buses
- buses, examples of, Examples of
Buses
- capacity, increasing, Increase the
Capacity
- datapaths, examples of, Examples of
Datapaths
- datapaths, role in, Datapaths
- load, reducing, Reduce the
Load
- load, spreading, Spread the
Load
- monitoring of,
Monitoring Bandwidth
- overview of, Bandwidth
- problems related to, Potential
Bandwidth-Related Problems
- solutions to problems with, Potential
Bandwidth-Related Solutions
- memory
-
- see memory
- processing power, Bandwidth and
Processing Power
-
- application overhead, reducing,
Reducing Application Overhead
- application use of,
Applications
- applications, eliminating,
Eliminating Applications Entirely
- capacity, increasing,
Increasing the Capacity
- consumers of, Consumers
of Processing Power
- CPU, upgrading,
Upgrading the CPU
- facts related to, Facts
About Processing Power
- load, reducing,
Reducing the Load
- monitoring of, Monitoring
CPU Power
- O/S overhead, reducing,
Reducing Operating System Overhead
- operating system use of,
The Operating System
- overview of, Processing
Power
- shortage of, improving, Improving
a CPU Shortage
- SMP,
Is Symmetric Multiprocessing Right for You?
- symmetric multiprocessing,
Is Symmetric Multiprocessing Right for You?
- upgrading,
Upgrading the CPU
- storage
-
- see storage
- RPM, Security
- RPM Package Manager
-
- see RPM
- sa1 command, The Sysstat Suite
of Resource Monitoring Tools
- sa2 command, The Sysstat Suite
of Resource Monitoring Tools
- sadc command, The Sysstat Suite
of Resource Monitoring Tools
- sar command, The Sysstat Suite
of Resource Monitoring Tools, The sar
command, Monitoring
Bandwidth on Red Hat Enterprise Linux, Monitoring CPU
Utilization on Red Hat Enterprise Linux, Red Hat Enterprise Linux-Specific
Information
-
- reports, reading, Reading
sar Reports
- SCSI disk drive
-
- adding, Adding
SCSI Disk Drives
- SCSI interface
-
- overview of, SCSI
- security
-
- importance of, Security
Cannot be an Afterthought
- Red Hat Enterprise Linux-specific information, Security
- setgid permission, Security,
User
Accounts, Groups, and Permissions
- setuid permission, Security,
User
Accounts, Groups, and Permissions
- shell scripts, Automation
- SMB, SMB
- SMP,
Is Symmetric Multiprocessing Right for You?
- social engineering, risks of, The
Risks of Social Engineering
- software
-
- support for
-
- documentation, Documentation
- email support, Web
or Email Support
- on-site support, On-Site
Support
- overview, Getting Help
— Software Support
- self support, Self
Support
- telephone support, Telephone
Support
- Web support, Web
or Email Support
- sticky bit permission, User Accounts,
Groups, and Permissions
- storage
-
- adding, Adding Storage,
Adding
Storage
-
- /etc/fstab, updating, Updating
/etc/fstab
- ATA disk drive, Adding ATA
Disk Drives
- backup schedule, modifying, Modifying the
Backup Schedule
- configuration, updating, Updating System
Configuration
- formatting, Formatting
the Partition(s), Formatting
the Partition(s)
- hardware, installing, Installing the
Hardware
- partitioning, Partitioning,
Partitioning
- SCSI disk drive, Adding
SCSI Disk Drives
- deploying, Making the Storage
Usable
- disk quotas, Disk Quota
Issues
-
- see disk quotas
- file system, File Systems,
File System
Basics
-
- /etc/mtab file, Viewing
/etc/mtab
- /proc/mounts file, Viewing
/proc/mounts
- access control, Access
Control
- access times, Tracking of
File Creation, Access, Modification Times
- accounting, space, Accounting of
Space Utilized
- creation times, Tracking of
File Creation, Access, Modification Times
- df command, using, Issuing the df
Command
- directories, Hierarchical
Directory Structure
- display of mounted, Seeing What
is Mounted
- enabling access to, Enabling Storage
Access
- EXT2, EXT2
- EXT3, EXT3
- file-based, File-Based
Storage
- hierarchical directory, Hierarchical
Directory Structure
- ISO 9660, ISO 9660
- modification times, Tracking of
File Creation, Access, Modification Times
- mount point, Mount
Points
- mounting, Mounting File
Systems
- mounting with /etc/fstab file, Mounting File
Systems Automatically with /etc/fstab
- MSDOS, MSDOS
- space accounting, Accounting of
Space Utilized
- structure, directory, Directory
Structure
- VFAT, VFAT
- file-related issues, File-Related
Issues
-
- file access, File
Access
- file sharing, File
Sharing
- management of, Managing Storage,
Storage Management
Day-to-Day
-
- application usage, Excessive Usage by
an Application
- excessive use of, Excessive Usage by
a User
- free space monitoring, Monitoring Free
Space
- growth, normal, Normal Growth in
Usage
- user issues, Handling a
User's Excessive Usage
- mass-storage devices
-
- access arm movement, Access Arm
Movement
- access arms, Access Arms
- addressing concepts, Storage Addressing Concepts
- addressing, block-based, Block-Based
Addressing
- addressing, geometry-based, Geometry-Based
Addressing
- block-based addressing, Block-Based
Addressing
- command processing, Command Processing
Time
- cylinder, Cylinder
- disk platters, Disk
Platters
- electrical limitations of, Mechanical/Electrical
Limitations
- geometry, problems with, Problems
with Geometry-Based Addressing
- geometry-based addressing, Geometry-Based
Addressing
- head, Head
- heads, Data
reading/writing device
- heads reading, Heads
Reading/Writing Data
- heads writing, Heads
Reading/Writing Data
- I/O loads, performance, I/O Loads and
Performance
- I/O loads, reads, Reads Versus
Writes
- I/O loads, writes, Reads Versus
Writes
- I/O locality, Locality of
Reads/Writes
- IDE interface, IDE/ATA
- industry-standard interfaces, Present-Day
Industry-Standard Interfaces
- interfaces for, Mass
Storage Device Interfaces
- interfaces, historical, Historical
Background
- interfaces, industry-standard, Present-Day
Industry-Standard Interfaces
- latency, rotational, Rotational
Latency
- mechanical limitations of, Mechanical/Electrical
Limitations
- movement, access arm, Access Arm
Movement
- overview of, An
Overview of Storage Hardware
- performance of, Hard Drive
Performance Characteristics
- platters, disk, Disk
Platters
- processing, command, Command Processing
Time
- readers versus writers, Multiple
Readers/Writers
- rotational latency, Rotational
Latency
- SCSI interface, SCSI
- sector, Sector
- monitoring of,
Monitoring Storage
- network-accessible, Network-Accessible
Storage, Network-Accessible Storage
Under Red Hat Enterprise Linux
-
- NFS, NFS
- SMB, SMB
- partition
-
- attributes of, Partition
Attributes
- extended, Extended
Partitions
- geometry of, Geometry
- logical, Logical
Partitions
- overview of, Partitions/Slices
- primary, Primary
Partitions
- type field, Partition
Type Field
- type of, Partition
Type
- patterns of access, Storage Access
Patterns
- RAID-based
-
- see RAID
- removing, Removing Storage,
Removing
Storage
-
- /etc/fstab, removing from, Remove the Disk
Drive's Partitions From /etc/fstab
- data, removing, Moving Data Off the
Disk Drive
- erasing contents, Erase the Contents of
the Disk Drive, Erase the Contents of
the Disk Drive
- umount command, use of, Terminating Access
With umount
- technologies, The Storage
Spectrum
-
- backup storage, Off-Line Backup
Storage
- cache memory, Cache Memory
- CPU registers, CPU
Registers
- disk drive, Hard Drives
- hard drive, Hard Drives
- L1 cache, Cache
Levels
- L2 cache, Cache
Levels
- main memory, Main Memory —
RAM
- off-line storage, Off-Line Backup
Storage
- RAM, Main
Memory — RAM
- technologies, advanced, Advanced
Storage Technologies
- subscription registration, Activate Your Subscription
- swapping, Swapping
- symmetric multiprocessing,
Is Symmetric Multiprocessing Right for You?
- Sysstat, Red Hat Enterprise
Linux-Specific Information, The Sysstat Suite
of Resource Monitoring Tools
- system administration
-
- philosophy of, The Philosophy of
System Administration
-
- automation, Automate
Everything
- business, Know Your
Business
- communication, Communicate as Much as
Possible
- documentation, Document
Everything
- planning, Plan
Ahead
- resources, Know Your
Resources
- security, Security Cannot
be an Afterthought
- social engineering, risks of, The
Risks of Social Engineering
- unexpected occurrences, Expect the Unexpected
- users, Know Your
Users
- system performance monitoring, System Performance Monitoring
- system resources
-
- see resources, system
- system-config-printer
-
- see printer configuration
- tools
-
- groups, managing
-
- see group, tools for managing
- resource monitoring, Red Hat
Enterprise Linux-Specific Information
-
- free, free
- GNOME System Monitor, The GNOME
System Monitor — A Graphical top
- iostat, The Sysstat Suite
of Resource Monitoring Tools
- mpstat, The Sysstat Suite
of Resource Monitoring Tools
- OProfile, OProfile
- sa1, The Sysstat Suite
of Resource Monitoring Tools
- sa2, The Sysstat Suite
of Resource Monitoring Tools
- sadc, The Sysstat Suite
of Resource Monitoring Tools
- sar, The Sysstat Suite
of Resource Monitoring Tools, The sar
command
- Sysstat, The Sysstat Suite
of Resource Monitoring Tools
- top, top
- vmstat, vmstat
- user accounts, managing
-
- see user account, tools for managing
- top command, Red Hat
Enterprise Linux-Specific Information, top, Monitoring CPU
Utilization on Red Hat Enterprise Linux
- UID, Usernames and
UIDs, Groups and GIDs
- unexpected, preparation for, Expect the Unexpected
- user account
-
- access control, Access Control
Information
- files controlling, Files Controlling
User Accounts and Groups
-
- /etc/group, /etc/group
- /etc/gshadow, /etc/gshadow
- /etc/passwd, /etc/passwd
- /etc/shadow, /etc/shadow
- GID, Usernames and
UIDs, Groups and GIDs
- home directory
-
- centralized, Home
Directories
- management of, Managing User
Accounts and Resource Access, Managing User Accounts,
Managing
Accounts and Resource Access Day-to-Day
-
- job changes, Job
Changes
- new hires, New
Hires
- terminations, Terminations
- password, Passwords
-
- aging, Password Aging
- big character set used in, Expanded
Character Set
- longer, Longer
Passwords
- memorable, Memorable
- personal information used in, Personal
Information
- repeatedly used, The Same Password
for Multiple Systems
- shortness of, Short
Passwords
- small character set used in, Limited
Character Set
- strong, Strong
Passwords
- weak, Weak
Passwords
- word tricks used in, Simple Word
Tricks
- words used in, Recognizable
Words
- written, Passwords on
Paper
- permissions related to, User Accounts,
Groups, and Permissions
-
- execute, User Accounts,
Groups, and Permissions
- read, User Accounts,
Groups, and Permissions
- setgid, User Accounts,
Groups, and Permissions
- setuid, User Accounts,
Groups, and Permissions
- sticky bit, User Accounts,
Groups, and Permissions
- write, User Accounts,
Groups, and Permissions
- resources, management of, Managing User Resources
- shared data access, Who Can Access Shared
Data
- system GIDs, Usernames and
UIDs, Groups and GIDs
- system UIDs, Usernames and
UIDs, Groups and GIDs
- tools for managing, User Account and
Group Applications
-
- chage command, User Account and
Group Applications
- chfn command, User Account and
Group Applications
- chpasswd command, User Account and
Group Applications
- passwd command, User Account and
Group Applications
- useradd command, User Account and
Group Applications
- userdel command, User Account and
Group Applications
- usermod command, User Account and
Group Applications
- UID, Usernames and
UIDs, Groups and GIDs
- username, The
Username
-
- changes to, Dealing
with Name Changes
- collisions in naming, Dealing
with Collisions
- naming convention, Naming
Conventions
- user ID
-
- see UID
- useradd command, User Account and
Group Applications
- userdel command, User Account and
Group Applications
- usermod command, User Account and
Group Applications
- username, The
Username
-
- changing, Dealing
with Name Changes
- collisions between, Dealing
with Collisions
- naming convention, Naming
Conventions
- users
-
- importance of, Know Your
Users
|
|