Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by Kirk Bauer, Nate Campi
Automating Linux and Unix System Administration, Second Edition
Title Page
Dedication
Contents at a Glance
Contents
About the Authors
About the Technical Reviewer
Acknowledgments
Introduction
Who This Book Is For
How This Book Is Structured
Downloading the Code
Contacting the Authors
CHAPTER 1: Introducing the Basics of Automation
Do You Need Automation?
What Will You Gain?
What Do System Administrators Do?
Methodology: Get It Right from the Start!
Dealing with Users and Administrators
Who Owns the Systems?
Defining Policy
CHAPTER 2: Applying Practical Automation
Seeing Everything As a File
Understanding the Procedure Before Automating It
Exploring an Example Automation
CHAPTER 3: Using SSH to Automate System Administration Securely
Learning the Basics of Using SSH
Enhancing Security with SSH
Using Public-Key Authentication
Using ssh-agent
Restricting RSA Authentication
Using SSH for Common Accounts
CHAPTER 4: Configuring Systems with cfengine
Getting an Overview of cfengine
Learning the Basic Setup
Debugging cfengine
Creating Sections in cfagent.conf
Using cfrun
Looking Forward to Cfengine 3
Using cfengine in the Real World
CHAPTER 5: Bootstrapping a New Infrastructure
Installing the Central cfengine Host
Setting Up the cfengine Master Repository
Creating the cfengine Config Files
Ready for Action
CHAPTER 6: Setting Up Automated Installation
Introducing the Example Environment
The Proper Foundation
CHAPTER 7: Automating a New System Infrastructure
Implementing Time Synchronization
Incorporating DNS
Taking Control of User Account Files
Routing Mail
Looking Back
CHAPTER 8: Deploying Your First Application
Deploying and Configuring the Apache Web Server
Sharing Data Between Systems
NFS and rsync and cfengine, Oh My!
CHAPTER 9: Generating Reports and Analyzing Logs
Reporting on cfengine Status
Doing General Syslog Log Analysis
Seeing the Light
CHAPTER 10: Monitoring
Nagios
Ganglia
Now You Can Rest Easy
CHAPTER 11: Infrastructure Enhancement
Cfengine Version Control with Subversion
Backups
Enhancement Is an Understatement
CHAPTER 12: Improving System Security
Security Enhancement with cfengine
Using the Lightweight Directory Access Protocol
Security with Kerberos
Implementing Host-Based Firewalls
Enabling Sudo at Our Example Site
Security Is a Journey, Not a Destination
APPENDIX A: Introducing the Basic Tools
The Bash Shell
Perl
Basic Regular Expressions
grep
The sed Stream Editor
AWK
APPENDIX B: Writing cfengine Modules
Requirements for Using Modules
Defining Custom Classes Without Modules
Creating Your First cfengine Module
Using Modules in Place of shellcommands
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset