Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Full Table of Contents Tribute to Evi Preface Foreword Acknowledgments Where to Start
1.1 Essential duties of a system administrator 1.2 Suggested background 1.3 Linux distributions 1.4 Example systems used in this book 1.5 Notation and typographical conventions 1.6 Units 1.7 Man pages and other on-line documentation 1.8 Other authoritative documentation 1.9 Other sources of information 1.10 Ways to find and install software 1.11 Where to host 1.12 Specialization and adjacent disciplines 1.13 Recommended reading
Booting and System Management Daemons
2.1 Boot process overview 2.2 System firmware 2.3 Boot loaders 2.4 GRUB: the GRand Unified Boot loader 2.5 The FreeBSD boot process 2.6 System management daemons 2.7 systemd in detail 2.8 FreeBSD init and startup scripts 2.9 Reboot and shutdown procedures 2.10 Stratagems for a nonbooting system
Access Control and Rootly Powers
3.1 Standard UNIX access control 3.2 Management of the root account 3.3 Extensions to the standard access control model 3.4 Modern access control 3.5 Recommended reading
Process Control
4.1 Components of a process 4.2 The life cycle of a process 4.3 ps: monitor processes 4.4 Interactive monitoring with top 4.5 nice and renice: influence scheduling priority 4.6 The /proc filesystem 4.7 strace and truss: trace signals and system calls 4.8 Runaway processes 4.9 Periodic processes
The Filesystem
5.1 Pathnames 5.2 Filesystem mounting and unmounting 5.3 Organization of the file tree 5.4 File types 5.5 File attributes 5.6 Access control lists
Software Installation and Management
6.1 Operating system installation 6.2 Managing packages 6.3 Linux package management systems 6.4 High-level Linux package management systems 6.5 FreeBSD software management 6.6 Software localization and configuration 6.7 Recommended reading
Scripting and the Shell
7.1 Scripting philosophy 7.2 Shell basics 7.3 sh scripting 7.4 Regular expressions 7.5 Python programming 7.6 Ruby programming 7.7 Library and environment management for Python and Ruby 7.8 Revision control with Git 7.9 Recommended reading
User Management
8.1 Account mechanics 8.2 The /etc/passwd file 8.3 The Linux /etc/shadow file 8.4 FreeBSD's /etc/master.passwd and /etc/login.conf files 8.5 The /etc/group file 8.6 Manual steps for adding users 8.7 Scripts for adding users: useradd, adduser, and newusers 8.8 Safe removal of a user’s account and files 8.9 User login lockout 8.10 Risk reduction with PAM 8.11 Centralized account management
Cloud Computing
9.1 The cloud in context 9.2 Cloud platform choices 9.3 Cloud service fundamentals 9.4 Clouds: VPS quick start by platform 9.5 Cost control 9.6 Recommended Reading
Logging
10.1 Log locations 10.2 The systemd journal 10.3 Syslog 10.4 Kernel and boot-time logging 10.5 Management and rotation of log files 10.6 Management of logs at scale 10.7 Logging policies
Drivers and the Kernel
11.1 Kernel chores for system administrators 11.2 Kernel version numbering 11.3 Devices and their drivers 11.4 Linux kernel configuration 11.5 FreeBSD kernel configuration 11.6 Loadable kernel modules 11.7 Booting 11.8 Booting alternate kernels in the cloud 11.9 Kernel errors 11.10 Recommended reading
Printing
12.1 CUPS printing 12.2 CUPS server administration 12.3 Troubleshooting tips 12.4 Recommended reading
TCP/IP Networking
13.1 TCP/IP and its relationship to the Internet 13.2 Networking basics 13.3 Packet addressing 13.4 IP addresses: the gory details 13.5 Routing 13.6 IPv4 ARP and IPv6 neighbor discovery 13.7 DHCP: the Dynamic Host Configuration Protocol 13.8 Security issues 13.9 Basic network configuration 13.10 Linux networking 13.11 FreeBSD networking 13.12 Network troubleshooting 13.13 Network monitoring 13.14 Firewalls and NAT 13.15 Cloud networking 13.16 Recommended reading
Physical Networking
14.1 Ethernet: the Swiss Army knife of networking 14.2 Wireless: Ethernet for nomads 14.3 SDN: software-defined networking 14.4 Network testing and debugging 14.5 Building wiring 14.6 Network design issues 14.7 Management issues 14.8 Recommended vendors 14.9 Recommended reading
IP Routing
15.1 Packet forwarding: a closer look 15.2 Routing daemons and routing protocols 15.3 Protocols on parade 15.4 Routing protocol multicast coordination 15.5 Routing strategy selection criteria 15.6 Routing daemons 15.7 Cisco routers 15.8 Recommended reading
DNS: The Domain Name System
16.1 DNS architecture 16.2 DNS for lookups 16.3 The DNS namespace 16.4 How DNS works 16.5 The DNS database 16.6 The BIND software 16.7 Split DNS and the view statement 16.8 BIND configuration examples 16.9 Zone file updating 16.10 DNS security issues 16.11 BIND debugging 16.12 Recommended reading
Single Sign-On
17.1 Core SSO elements 17.2 LDAP: “lightweight” directory services 17.3 Using directory services for login 17.4 Alternative approaches 17.5 Recommended reading
Electronic Mail
18.1 Mail system architecture 18.2 Anatomy of a mail message 18.3 The SMTP protocol 18.4 Spam and malware 18.5 Message privacy and encryption 18.6 Mail aliases 18.7 Email configuration 18.8 sendmail 18.9 Exim 18.10 Postfix 18.11 Recommended reading
Web Hosting
19.1 HTTP: the Hypertext Transfer Protocol 19.2 Web software basics 19.3 Web hosting in the cloud 19.4 Apache httpd 19.5 NGINX 19.6 HAProxy 19.7 Recommended reading
Storage
20.1 I just want to add a disk! 20.2 Storage hardware 20.3 Storage hardware interfaces 20.4 Attachment and low-level management of drives 20.5 The software side of storage: peeling the onion 20.6 Disk partitioning 20.7 Logical volume management 20.8 RAID: redundant arrays of inexpensive disks 20.9 Filesystems 20.10 Traditional filesystems: UFS, ext4, and XFS 20.11 Next-generation filesystems: ZFS and Btrfs 20.12 ZFS: all your storage problems solved 20.13 Btrfs: “ZFS lite” for Linux 20.14 Data backup strategy 20.15 Recommended reading
The Network File System
21.1 Meet network file services 21.2 The NFS approach 21.3 Server-side NFS 21.4 Client-side NFS 21.5 Identity mapping for NFS version 4 21.6 nfsstat: dump NFS statistics 21.7 Dedicated NFS file servers 21.8 Automatic mounting 21.9 Recommended reading
SMB
22.1 Samba: SMB server for UNIX 22.2 Installing and configuring Samba 22.3 Mounting SMB file shares 22.4 Browsing SMB file shares 22.5 Ensuring Samba security 22.6 Debugging Samba 22.7 Recommended reading
Configuration Management
23.1 Configuration management in a nutshell 23.2 Dangers of configuration management 23.3 Elements of configuration management 23.4 Popular CM systems compared 23.5 Introduction to Ansible 23.6 Introduction to Salt 23.7 Ansible and Salt compared 23.8 Best practices 23.9 Recommended reading
Virtualization
24.1 Virtual vernacular 24.2 Virtualization with Linux 24.3 FreeBSD bhyve 24.4 VMware 24.5 VirtualBox 24.6 Packer 24.7 Vagrant 24.8 Recommended reading
Containers
25.1 Background and core concepts 25.2 Docker: the open source container engine 25.3 Containers in practice 25.4 Container clustering and management 25.5 Recommended reading
Continuous Integration and Delivery
26.1 CI/CD essentials 26.2 Pipelines 26.3 Jenkins: the open source automation server 26.4 CI/CD in practice 26.5 Containers and CI/CD 26.6 Recommended reading
Security
27.1 Elements of security 27.2 How security is compromised 27.3 Basic security measures 27.4 Passwords and user accounts 27.5 Security power tools 27.6 Cryptography primer 27.7 SSH, the Secure SHell 27.8 Firewalls 27.9 Virtual private networks (VPNs) 27.10 Certifications and standards 27.11 Sources of security information 27.12 When your site has been attacked 27.13 Recommended reading
Monitoring
28.1 An overview of monitoring 28.2 The monitoring culture 28.3 The monitoring platforms 28.4 Data collection 28.5 Network monitoring 28.6 Systems monitoring 28.7 Application monitoring 28.8 Security monitoring 28.9 SNMP: the Simple Network Management Protocol 28.10 Tips and tricks for monitoring 28.11 Recommended reading
Performance Analysis
29.1 Performance tuning philosophy 29.2 Ways to improve performance 29.3 Factors that affect performance 29.4 Stolen CPU cycles 29.5 Analysis of performance problems 29.6 System performance checkup 29.7 Help! My server just got really slow! 29.8 Recommended reading
Data Center Basics
30.1 Racks 30.2 Power 30.3 Cooling and environment 30.4 Data center reliability tiers 30.5 Data center security 30.6 Tools 30.7 Recommended reading
Methodology, Policy, and Politics
31.1 The grand unified theory: DevOps 31.2 Ticketing and task management systems 31.3 Local documentation maintenance 31.4 Environment separation 31.5 Disaster management 31.6 IT policies and procedures 31.7 Service level agreements 31.8 Compliance: regulations and standards 31.9 Legal issues 31.10 Organizations, conferences, and other resources 31.11 Recommended reading
A Brief History of System Administration Colophon About the Contributors About the Authors Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion