Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Red Hat Enterprise Linux Server Cookbook

Buy

Key Features

  • Create fully unattended installations and deploy configurations without breaking a sweat
  • Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management
  • Be guided by an experienced RHEL expert who is a certified Linux engineer with a passion for open source and open standards

Book Description

Dominating the server market, the Red Hat Enterprise Linux operating system gives you the support you need to modernize your infrastructure and boost your organization's efficiency. Combining both stability and flexibility, RHEL helps you meet the challenges of today and adapt to the demands of tomorrow.

This practical Cookbook guide will help you get to grips with RHEL 7 Server and automating its installation. Designed to provide targeted assistance through hands-on recipe guidance, it will introduce you to everything you need to know about KVM guests and deploying multiple standardized RHEL systems effortlessly. Get practical reference advice that will make complex networks setups look like child's play, and dive into in-depth coverage of configuring a RHEL system. Also including full recipe coverage of how to set up, configuring, and troubleshoot SELinux, you'll also discover how secure your operating system, as well as how to monitor it.

What you will learn

  • Set up and configure RHEL 7 Server
  • Use NetworkManager to configure all aspects of your network
  • Manage virtual environments using libvirt
  • Set up software repositories
  • Secure and monitor your RHEL environment
  • Configure SELinux, and create and apply its policies
  • Create kickstart scripts to automatically deploy RHEL 7 systems
  • Use Orchestration and configuration management tools to manage your environment

About the Author

William Leemans has over 20 years of experience in the IT industry in various positions and supporting several environments.

In 2005, he started his own consulting company, Critter BVBA, in the hope of offering open source solutions to his customers, who are mainly enterprises.

In 2010, William started supporting Red Hat products full time with the Federal Police, Belgium. Since then, he has moved on to support Red Hat products at Proximus and now Euroclear.

William is a strong open source supporter and contributes where he can. He has a couple of projects running at GitHub (https://github.com/bushvin). During the course of writing this book, William recertified himself as a Red Hat Certified Engineer, hoping to one day become a Red Hat Certified Architect.

When he's not tapping away at the keyboard of his laptop, William likes to play around with his two young children, listen to rock music (Foo Fighters, AC/DC, and Queens of the Stone Age are some of his favorites), and devising complicated and intricate plots for the stories that he runs at his biweekly roleplaying sessions with his friends.

Table of Contents

  1. Working with KVM Guests
  2. Deploying RHEL "En Masse"
  3. Configuring Your Network
  4. Configuring Your New System
  5. Using SELinux
  6. Orchestrating with Ansible
  7. Puppet Configuration Management
  8. Yum and Repositories
  9. Securing RHEL 7
  10. Monitoring and Performance Tuning
(HTML tags aren't allowed.)

Learn Python Visually
Learn Python Visually

Learn Python Visually is a modern breakthrough that makes learning programming more intuitive, easier, and fun. Using the most basic approach to learning that we all inherently know from childhood, "Learn Python VISUALLY" solves the comprehension problem that so many other books cannot seem to bridge. Visual learners retain...

Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...


Splunk Operational Intelligence Cookbook
Splunk Operational Intelligence Cookbook

Over 70 practical recipes to gain operational data intelligence with Splunk Enterprise

About This Book

  • Learn how to use Splunk to effectively gather, analyze, and report on the operational data across your environment
  • Expedite your operational intelligence reporting, be empowered to...
Building Maintainable Software, C# Edition: Ten Guidelines for Future-Proof Code
Building Maintainable Software, C# Edition: Ten Guidelines for Future-Proof Code

Have you ever felt frustrated working with someone else’s code? Difficult-to-maintain source code is a big problem in software development today, leading to costly delays and defects. Be part of the solution. With this practical book, you’ll learn 10 easy-to-follow guidelines for delivering C# software that’s easy...

Advanced Analytics with Spark: Patterns for Learning from Data at Scale
Advanced Analytics with Spark: Patterns for Learning from Data at Scale

In this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example.

You’ll start with an...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy