Index
Symbols
- /etc/cups/,
Red Hat Linux-Specific Information
- /etc/fstab file
- mounting file systems with,
Mounting File Systems Automatically with /etc/fstab
- updating,
Updating /etc/fstab
- /etc/group file
- group, role in,
/etc/group
- user account, role in,
/etc/group
- /etc/gshadow file
- group, role in,
/etc/gshadow
- user account, role in,
/etc/gshadow
- /etc/mtab file,
Viewing /etc/mtab
- /etc/passwd file
- group, role in,
/etc/passwd
- user account, role in,
/etc/passwd
- /etc/printcap,
Red Hat Linux-Specific Information
- /etc/printcap.local,
Red Hat Linux-Specific Information
- /etc/shadow file
- group, role in,
/etc/shadow
- user account, role in,
/etc/shadow
- /proc/mdstat file,
Checking Array Status With /proc/mdstat
- /proc/mounts file,
Viewing /proc/mounts
B
- backups
- AMANDA backup software,
The Advanced Maryland Automatic Network Disk Archiver (AMANDA)
- building software,
Backup Software: Buy Versus Build
- buying software,
Backup Software: Buy Versus Build
- data-related issues surrounding,
Different Data: Different Backup Needs
- introduction to,
Backups
- media types,
Backup Media
- disk,
Disk
- network,
Network
- tape,
Tape
- restoration issues,
Restoration Issues
- bare metal restorations,
Restoring From Bare Metal
- testing restoration,
Testing Backups
- schedule, modifying,
Modifying the Backup Schedule
- storage of,
Storage of Backups
- technologies used,
Backup Technologies
- cpio,
cpio
- dump,
dump/restore: Not Recommended!
- tar,
tar
- types of,
Types of Backups
- differential backups,
Differential Backups
- full backups,
Full Backups
- incremental backups,
Incremental Backups
- bandwidth-related resources
- See resources, system, bandwidth
- bash shell, automation and,
Automation
- business, knowledge of,
Know Your Business
C
- cache memory,
Cache Memory
- capacity planning,
Monitoring System Capacity
- CD-ROM
- file system
- See ISO 9660 file system
- centralized home directory,
Home Directories
- chage command,
User Account and Group Applications
- change control,
Change Control
- chfn command,
User Account and Group Applications
- chgrp command,
File Permission Applications
- chmod command,
File Permission Applications
- chown command,
File Permission Applications
- chpasswd command,
User Account and Group Applications
- color laser printers,
Color Laser Printers
- communication
- necessity of,
Communicate as Much as Possible
- Red Hat Linux-specific information,
Documentation and Communication
- conventions
- document,
Document Conventions
- CPU power
- See resources, system, processing power
- CUPS,
Red Hat Linux-Specific Information
D
- daisy-wheel printers
- See impact printers
- data
- shared access to,
Who Can Access Shared Data,
Where Users Access Shared Data
- global ownership issues,
Global Ownership Issues
- device
- file names,
Device Files
- naming convention,
Device Naming Conventions
- partition,
Partition
- type,
Device Type
- unit,
Unit
- whole-device access,
Whole-Device Access
- df command,
The df Command,
Manual Monitoring Using df
- disaster planning,
Planning for Disaster
- power, backup,
Backup Power
- generator,
Providing Power For the Next Few Hours (and Beyond)
- motor-generator set,
Providing Power For the Next Few Seconds
- outages, extended,
Planning for Extended Outages
- UPS,
Providing Power For the Next Few Minutes
- types of disasters,
Types of Disasters
- air conditioning,
Heating, Ventilation, and Air Conditioning
- application failures,
Application Failures
- building integrity,
Building Integrity
- electrical,
Electricity
- electricity, quality of,
Power Quality
- electricity, security of,
The Security of Your Power
- environmental failures,
Environmental Failures
- hardware failures,
Hardware Failures
- heating,
Heating, Ventilation, and Air Conditioning
- human errors,
Human Errors
- HVAC,
Heating, Ventilation, and Air Conditioning
- improper repairs,
Improperly-Repaired Hardware
- improperly-used applications,
Improper Use of Applications
- maintenance-related errors,
Mistakes Made During Maintenance
- misconfiguration errors,
Misconfiguration Errors
- mistakes during procedures,
Mistakes Made During Procedures
- operating system crashes,
Crashes
- operating system failures,
Operating System Failures
- operating system hangs,
Hangs
- operator errors,
Operations Personnel Errors
- procedural errors,
Failure to Follow Procedures
- service technician errors,
Service Technician Errors
- software failures,
Software Failures
- system administrator errors,
System Administrator Errors
- user errors,
End-User Errors
- ventilation,
Heating, Ventilation, and Air Conditioning
- weather-related,
Weather and the Outside World
- disaster recovery
- backup site,
Backup Sites: Cold, Warm, and Hot
- network connectivity to,
Network Connectivity to the Backup Site
- staffing of,
Backup Site Staffing
- backups, availability of,
Availability of Backups
- end of,
Moving Back Toward Normalcy
- hardware availability,
Hardware and Software Availability
- introduction to,
Disaster Recovery
- plan, creating, testing, implementing,
Creating, Testing, and Implementing a Disaster Recovery Plan
- software availability,
Hardware and Software Availability
- disk drives,
Hard Drives
- disk quotas
- enabling,
Enabling Disk Quotas
- introduction to,
Implementing Disk Quotas
- management of,
Managing Disk Quotas
- overview of,
Some Background on Disk Quotas
- block usage tracking,
Tracks Disk Block Usage
- file-system specific,
Per-File-System Implementation
- grace period,
Grace Periods
- group specific,
Per-Group Space Accounting
- hard limits,
Hard Limits
- inode usage tracking,
Tracks Disk Inode Usage
- soft limits,
Soft Limits
- user specific,
Per-User Space Accounting
- disk space
- See storage
- diskcheck command,
Automated Montoring Using diskcheck
- documentation
- Red Hat Linux-specific information,
Documentation and Communication
- documentation, necessity of,
Document Everything
- dot-matrix printers
- See impact printers
G
- GID,
Usernames and UIDs, Groups and GIDs
- gnome-system-monitor command,
The GNOME System Monitor — A Graphical top
- gpasswd command,
User Account and Group Applications
- group
- files controlling,
Files Controlling User Accounts and Groups
- /etc/group,
/etc/group
- /etc/gshadow,
/etc/gshadow
- /etc/passwd,
/etc/passwd
- /etc/shadow,
/etc/shadow
- GID,
Usernames and UIDs, Groups and GIDs
- management of,
Managing User Accounts and Resource Access
- permissions related to,
User Accounts, Groups, and Permissions
- execute,
User Accounts, Groups, and Permissions
- read,
User Accounts, Groups, and Permissions
- setgid,
User Accounts, Groups, and Permissions
- setuid,
User Accounts, Groups, and Permissions
- sticky bit,
User Accounts, Groups, and Permissions
- write,
User Accounts, Groups, and Permissions
- shared data access using,
Shared Groups and Data
- structure, determining,
Determining Group Structure
- system GIDs,
Usernames and UIDs, Groups and GIDs
- system UIDs,
Usernames and UIDs, Groups and GIDs
- tools for managing,
User Account and Group Applications
- gpasswd command,
User Account and Group Applications
- groupadd command,
User Account and Group Applications
- groupdel command,
User Account and Group Applications
- groupmod command,
User Account and Group Applications
- grpck command,
User Account and Group Applications
- UID,
Usernames and UIDs, Groups and GIDs
- group ID
- See GID
- groupadd command,
User Account and Group Applications
- groupdel command,
User Account and Group Applications
- groupmod command,
User Account and Group Applications
- grpck command,
User Account and Group Applications
H
- hard drives,
Hard Drives
- hardware
- failures of,
Hardware Failures
- service contracts,
Service Contracts
- availability of parts,
Parts Availability
- budget for,
Available Budget
- coverage hours,
Hours of Coverage
- depot service,
Depot Service
- drop-off service,
Depot Service
- hardware covered,
Hardware to be Covered
- on-site technician,
Zero Response Time — Having an On-Site Technician
- response time,
Response Time
- walk-in service,
Depot Service
- skills necessary to repair,
Having the Skills
- spares
- keeping,
Keeping Spare Hardware
- stock, quantities,
How Much to Stock?
- stock, selection of,
What to Stock?
- swapping hardware,
Spares That Are Not Spares
- home directory
- centralized,
Home Directories
I
- IDE interface
- overview of,
IDE/ATA
- impact printers,
Impact Printers
- consumables,
Impact Printer Consumables
- daisy-wheel,
Impact Printers
- dot-matrix,
Impact Printers
- line,
Impact Printers
- inkjet printers,
Inkjet Printers
- consumables,
Inkjet Consumables
- intrusion detection systems,
Security
- iostat command,
The Sysstat Suite of Resource Monitoring Tools,
Monitoring Bandwidth on Red Hat Linux
- ISO 9660 file system,
ISO 9660
M
- managing
- printers,
Printers and Printing
- memory
- monitoring of,
Monitoring Memory
- resource utilization of,
Physical and Virtual Memory
- virtual memory,
Basic Virtual Memory Concepts
- backing store,
Backing Store — the Central Tenet of Virtual Memory
- overview of,
Virtual Memory in Simple Terms
- page faults,
Page Faults
- performance of,
Virtual Memory Performance Implications
- performance, best case,
Best Case Performance Scenario
- performance, worst case,
Worst Case Performance Scenario
- swapping,
Swapping
- virtual address space,
Virtual Memory: the Details
- working set,
The Working Set
- monitoring
- resources,
Resource Monitoring
- system performance,
System Performance Monitoring
- monitoring statistics
- bandwidth-related,
Monitoring Bandwidth
- CPU-related,
Monitoring CPU Power
- memory-related,
Monitoring Memory
- selection of,
What to Monitor?
- storage-related,
Monitoring Storage
- mount points
- See storage, file system, mount point
- mounting file systems
- See storage, file system, mounting
- mpstat command,
The Sysstat Suite of Resource Monitoring Tools
- MSDOS file system,
MSDOS
P
- page faults,
Page Faults
- PAM,
Security
- partition,
Partition
- attributes of,
Partition Attributes
- geometry,
Geometry
- type,
Partition Type
- type field,
Partition Type Field
- creation of,
Partitioning,
Partitioning
- extended,
Extended Partitions
- logical,
Logical Partitions
- overview of,
Partitions/Slices
- primary,
Primary Partitions
- passwd command,
User Account and Group Applications
- password,
Passwords
- aging,
Password Aging
- big character set used in,
Expanded Character Set
- longer,
Longer Passwords
- memorable,
Memorable
- personal info used in,
Personal Information
- repeatedly used,
The Same Password for Multiple Systems
- shortness of,
Short Passwords
- small character set used in,
Limited Character Set
- strong,
Strong Passwords
- weak,
Weak Passwords
- word tricks used in,
Simple Word Tricks
- words used in,
Recognizable Words
- written,
Passwords on Paper
- perl, automation and,
Automation
- permissions,
User Accounts, Groups, and Permissions
- tools for managing
- chgrp command,
File Permission Applications
- chmod command,
File Permission Applications
- chown command,
File Permission Applications
- philosophy of system administration,
The Philosophy of System Administration
- physical memory
- See memory
- planning, importance of,
Plan Ahead
- Pluggable Authentication Modules
- See PAM
- printconf
- See printer configuration
- printer configuration,
Red Hat Linux-Specific Information
- CUPS,
Red Hat Linux-Specific Information
- text-based application,
Red Hat Linux-Specific Information
- Printer Configuration Tool
- See printer configuration
- printer description languages (PDL),
Printer Languages and Technologies
- Interpress,
Printer Languages and Technologies
- PCL,
Printer Languages and Technologies
- PostScript,
Printer Languages and Technologies
- printers
- additional resources,
Additional Resources
- color,
Inkjet Printers
- CMYK,
Inkjet Printers
- inkjet,
Inkjet Printers
- laser,
Color Laser Printers
- considerations,
Printing Considerations
- duplex,
Function
- languages
- See printer description languages (PDL)
- local,
Networked Versus Local Printers
- managing,
Printers and Printing
- networked,
Networked Versus Local Printers
- types,
Types of Printers
- color laser,
Color Laser Printers
- daisy-wheel,
Impact Printers
- dot-matrix,
Impact Printers
- dye-sublimation,
Other Printer Types
- impact,
Impact Printers
- inkjet,
Inkjet Printers
- laser,
Laser Printers
- line,
Impact Printers
- solid ink,
Other Printer Types
- thermal wax,
Other Printer Types
- printtool
- See printer configuration
- processing power, resources related to
- See resources, system, processing power
Q
- quota, disk
- See disk quotas
R
- RAID
- arrays
- management of,
Day to Day Management of RAID Arrays
- raidhotadd command, use of,
Rebuilding a RAID array with raidhotadd
- rebuilding,
Rebuilding a RAID array with raidhotadd
- status, checking,
Checking Array Status With /proc/mdstat
- arrays, creating,
Creating RAID Arrays
- after installation time,
After Red Hat Linux Has Been Installed
- at installation time,
While Installing Red Hat Linux
- creating arrays
- See RAID, arrays, creating
- implementations of,
RAID Implementations
- hardware RAID,
Hardware RAID
- software RAID,
Software RAID
- introduction to,
RAID-Based Storage
- levels of,
RAID Levels
- nested RAID,
Nested RAID Levels
- RAID 0,
RAID 0
- RAID 0, advantages of,
RAID 0
- RAID 0, disadvantages of,
RAID 0
- RAID 1,
RAID 1
- RAID 1, advantages of,
RAID 1
- RAID 1, disadvantages of,
RAID 1
- RAID 5,
RAID 5
- RAID 5, advantages of,
RAID 5
- RAID 5, disadvantages of,
RAID 5
- nested RAID,
Nested RAID Levels
- overview of,
Basic Concepts
- raidhotadd command, use of,
Rebuilding a RAID array with raidhotadd
- RAM,
Main Memory — RAM
- read permission,
User Accounts, Groups, and Permissions
- recursion
- See recursion
- Red Hat Linux-specific information
- automation,
Automation
- backup technologies
- AMANDA,
The Advanced Maryland Automatic Network Disk Archiver (AMANDA)
- cpio,
cpio
- dump,
dump/restore: Not Recommended!
- tar,
tar
- backups technologies
- overview of,
Backup Technologies
- bash shell,
Automation
- communication,
Documentation and Communication
- disaster recovery,
Red Hat Linux-Specific Information
- documentation,
Documentation and Communication
- intrusion detection systems,
Security
- PAM,
Security
- perl,
Automation
- resource monitoring
- bandwidth,
Red Hat Linux-Specific Information
- CPU power,
Red Hat Linux-Specific Information
- memory,
Red Hat Linux-Specific Information
- resource monitoring tools,
Red Hat Linux-Specific Information
- free,
Red Hat Linux-Specific Information,
Red Hat Linux-Specific Information
- iostat,
Monitoring Bandwidth on Red Hat Linux
- sar,
Monitoring Bandwidth on Red Hat Linux,
Monitoring CPU Utilization on Red Hat Linux,
Red Hat Linux-Specific Information
- Sysstat,
Red Hat Linux-Specific Information
- top,
Red Hat Linux-Specific Information,
Monitoring CPU Utilization on Red Hat Linux
- vmstat,
Red Hat Linux-Specific Information,
Monitoring Bandwidth on Red Hat Linux,
Monitoring CPU Utilization on Red Hat Linux,
Red Hat Linux-Specific Information
- RPM,
Security
- security,
Security
- shell scripts,
Automation
- software support,
Software Support
- support, software,
Software Support
- Tripwire,
Security
- redhat-config-printer
- See printer configuration
- resource abuse,
What Barriers Are in Place To Prevent Abuse of Resources
- resource monitoring,
Resource Monitoring
- bandwidth,
Monitoring Bandwidth
- capacity planning,
Monitoring System Capacity
- concepts behind,
Basic Concepts
- CPU power,
Monitoring CPU Power
- memory,
Monitoring Memory
- storage,
Monitoring Storage
- system capacity,
Monitoring System Capacity
- system performance,
System Performance Monitoring
- tools
- free,
free
- GNOME System Monitor,
The GNOME System Monitor — A Graphical top
- iostat,
The Sysstat Suite of Resource Monitoring Tools
- mpstat,
The Sysstat Suite of Resource Monitoring Tools
- sa1,
The Sysstat Suite of Resource Monitoring Tools
- sa2,
The Sysstat Suite of Resource Monitoring Tools
- sadc,
The Sysstat Suite of Resource Monitoring Tools
- sar,
The Sysstat Suite of Resource Monitoring Tools,
The sar command
- Sysstat,
The Sysstat Suite of Resource Monitoring Tools
- top,
top
- vmstat,
vmstat
- tools used,
Red Hat Linux-Specific Information
- what to monitor,
What to Monitor?
- resources, importance of,
Know Your Resources
- resources, system
- bandwidth,
Bandwidth and Processing Power
- buses role in,
Buses
- buses, examples of,
Examples of Buses
- capacity, increasing,
Increase the Capacity
- datapaths, examples of,
Examples of Datapaths
- datapaths, role in,
Datapaths
- load, reducing,
Reduce the Load
- load, spreading,
Spread the Load
- monitoring of,
Monitoring Bandwidth
- overview of,
Bandwidth
- problems related to,
Potential Bandwidth-Related Problems
- solutions to problems with,
Potential Bandwidth-related Solutions
- memory
- See memory
- processing power,
Bandwidth and Processing Power
- application overhead, reducing,
Reducing Application Overhead
- application use of,
Applications
- applications, eliminating,
Eliminating Applications Entirely
- capacity, increasing,
Increasing the Capacity
- consumers of,
Consumers of Processing Power
- CPU, upgrading,
Upgrading the CPU
- facts related to,
Facts About Processing Power
- load, reducing,
Reducing the Load
- monitoring of,
Monitoring CPU Power
- O/S overhead, reducing,
Reducing Operating System Overhead
- operating system use of,
The Operating System
- overview of,
Processing Power
- shortage of, improving,
Improving a CPU Shortage
- SMP,
Is Symmetric Multiprocessing Right for You?
- symmetric multiprocessing,
Is Symmetric Multiprocessing Right for You?
- upgrading,
Upgrading the CPU
- storage
- See storage
- RPM,
Security
- RPM Package Manager
- See RPM
S
- sa1 command,
The Sysstat Suite of Resource Monitoring Tools
- sa2 command,
The Sysstat Suite of Resource Monitoring Tools
- sadc command,
The Sysstat Suite of Resource Monitoring Tools
- sar command,
The Sysstat Suite of Resource Monitoring Tools,
The sar command,
Monitoring Bandwidth on Red Hat Linux,
Monitoring CPU Utilization on Red Hat Linux,
Red Hat Linux-Specific Information
- reports, reading,
Reading sar Reports
- SCSI disk drive
- adding,
Adding SCSI Disk Drives
- SCSI interface
- overview of,
SCSI
- security
- importance of,
Security Cannot be an Afterthought
- Red Hat Linux-specific information,
Security
- setgid permission,
Security,
User Accounts, Groups, and Permissions
- setuid permission,
Security,
User Accounts, Groups, and Permissions
- shell scripts,
Automation
- SMB,
SMB
- SMP,
Is Symmetric Multiprocessing Right for You?
- social engineering, risks of,
The Risks of Social Engineering
- software
- support for
- documentation,
Documentation
- email support,
Web or Email Support
- on-site support,
On-Site Support
- overview,
Getting Help — Software Support
- self support,
Self Support
- telephone support,
Telephone Support
- Web support,
Web or Email Support
- sticky bit permission,
User Accounts, Groups, and Permissions
- storage
- adding,
Adding Storage,
Adding Storage
- /etc/fstab, updating,
Updating /etc/fstab
- ATA disk drive,
Adding ATA Disk Drives
- backup schedule, modifying,
Modifying the Backup Schedule
- configuration, updating,
Updating System Configuration
- formatting,
Formatting the Partition(s),
Formatting the Partition(s)
- hardware, installing,
Installing the Hardware
- partitioning,
Partitioning,
Partitioning
- SCSI disk drive,
Adding SCSI Disk Drives
- deploying,
Making the Storage Usable
- disk quotas,
Disk Quota Issues
- See disk quotas
- file system,
File Systems,
File System Basics
- /etc/mtab file,
Viewing /etc/mtab
- /proc/mounts file,
Viewing /proc/mounts
- access control,
Access Control
- access times,
Tracking of File Creation, Access, Modification Times
- accounting, space,
Accounting of Space Utilized
- creation times,
Tracking of File Creation, Access, Modification Times
- df command, using,
The df Command
- directories,
Hierarchical Directory Structure
- display of mounted,
Seeing What is Mounted
- enabling access to,
Enabling Storage Access
- EXT2,
EXT2
- EXT3,
EXT3
- file-based,
File-Based Storage
- hierarchical directory,
Hierarchical Directory Structure
- ISO 9660,
ISO 9660
- modification times,
Tracking of File Creation, Access, Modification Times
- mount point,
Mount Points
- mounting,
Mounting File Systems
- mounting with /etc/fstab file,
Mounting File Systems Automatically with /etc/fstab
- MSDOS,
MSDOS
- space accounting,
Accounting of Space Utilized
- structure, directory,
Directory Structure
- VFAT,
VFAT
- file-related issues,
File-Related Issues
- file access,
File Access
- file sharing,
File Sharing
- management of,
Managing Storage,
Storage Management Day-to-Day
- application usage,
Excessive Usage by an Application
- excessive use of,
Excessive Usage by a User
- free space monitoring,
Monitoring Free Space
- growth, normal,
Normal Growth in Usage
- user issues,
Handling a User's Excessive Usage
- mass-storage devices
- access arm movement,
Access Arm Movement
- access arms,
Access Arms
- addressing concepts,
Storage Addressing Concepts
- addressing, block-based,
Block-Based Addressing
- addressing, geometry-based,
Geometry-Based Addressing
- block-based addressing,
Block-Based Addressing
- command processing,
Command Processing Time
- cylinder,
Cylinder
- disk platters,
Disk Platters
- electrical limitations of,
Mechanical/Electrical Limitations
- geometry, problems with,
Problems with Geometry-Based Addressing
- geometry-based addressing,
Geometry-Based Addressing
- head,
Head
- heads,
Data reading/writing device
- heads reading,
Heads Reading/Writing Data
- heads writing,
Heads Reading/Writing Data
- I/O loads, performance,
I/O Loads and Performance
- I/O loads, reads,
Reads Versus Writes
- I/O loads, writes,
Reads Versus Writes
- I/O locality,
Locality of Reads/Writes
- IDE interface,
IDE/ATA
- industry-standard interfaces,
Present-Day Industry-Standard Interfaces
- interfaces for,
Mass Storage Device Interfaces
- interfaces, historical,
Historical Background
- interfaces, industry-standard,
Present-Day Industry-Standard Interfaces
- latency, rotational,
Rotational Latency
- mechanical limitations of,
Mechanical/Electrical Limitations
- movement, access arm,
Access Arm Movement
- overview of,
An Overview of Storage Hardware
- performance of,
Hard Drive Performance Characteristics
- platters, disk,
Disk Platters
- processing, command,
Command Processing Time
- readers versus writers,
Multiple Readers/Writers
- rotational latency,
Rotational Latency
- SCSI interface,
SCSI
- sector,
Sector
- monitoring,
Monitoring Disk Space
- df command, using,
Manual Monitoring Using df
- diskcheck command, using,
Automated Montoring Using diskcheck
- monitoring of,
Monitoring Storage
- network-accessible,
Network-Accessible Storage,
Network-Accessible Storage Under Red Hat Linux
- NFS,
NFS
- SMB,
SMB
- partition
- attributes of,
Partition Attributes
- extended,
Extended Partitions
- geometry of,
Geometry
- logical,
Logical Partitions
- overview of,
Partitions/Slices
- primary,
Primary Partitions
- type field,
Partition Type Field
- type of,
Partition Type
- patterns of access,
Storage Access Patterns
- RAID-based
- See RAID
- removing,
Removing Storage,
Removing Storage
- /etc/fstab, removing from,
Remove the Disk Drive's Partitions From /etc/fstab
- data, removing,
Moving Data Off the Disk Drive
- erasing contents,
Erase the Contents of the Disk Drive,
Erase the Contents of the Disk Drive
- unmount command, use of,
Terminating Access With unmount
- technologies,
The Storage Spectrum
- backup storage,
Off-Line Backup Storage
- cache memory,
Cache Memory
- CPU registers,
CPU Registers
- disk drive,
Hard Drives
- hard drive,
Hard Drives
- L1 cache,
Cache Levels
- L2 cache,
Cache Levels
- main memory,
Main Memory — RAM
- off-line storage,
Off-Line Backup Storage
- RAM,
Main Memory — RAM
- technologies, advanced,
Advanced Storage Technologies
- swapping,
Swapping
- symmetric multiprocessing,
Is Symmetric Multiprocessing Right for You?
- Sysstat,
Red Hat Linux-Specific Information,
The Sysstat Suite of Resource Monitoring Tools
- system administration
- philosophy of,
The Philosophy of System Administration
- automation,
Automate Everything
- business,
Know Your Business
- communication,
Communicate as Much as Possible
- documentation,
Document Everything
- planning,
Plan Ahead
- resources,
Know Your Resources
- security,
Security Cannot be an Afterthought
- social engineering, risks of,
The Risks of Social Engineering
- unexpected occurrences,
Expect the Unexpected
- users,
Know Your Users
- system performance monitoring,
System Performance Monitoring
- system resources
- See resources, system
T
- tools
- groups, managing
- See group, tools for managing
- resource monitoring,
Red Hat Linux-Specific Information
- free,
free
- GNOME System Monitor,
The GNOME System Monitor — A Graphical top
- iostat,
The Sysstat Suite of Resource Monitoring Tools
- mpstat,
The Sysstat Suite of Resource Monitoring Tools
- sa1,
The Sysstat Suite of Resource Monitoring Tools
- sa2,
The Sysstat Suite of Resource Monitoring Tools
- sadc,
The Sysstat Suite of Resource Monitoring Tools
- sar,
The Sysstat Suite of Resource Monitoring Tools,
The sar command
- Sysstat,
The Sysstat Suite of Resource Monitoring Tools
- top,
top
- vmstat,
vmstat
- user accounts, managing
- See user account, tools for managing
- top command,
Red Hat Linux-Specific Information,
top,
Monitoring CPU Utilization on Red Hat Linux
- Tripwire,
Security
U
- UID,
Usernames and UIDs, Groups and GIDs
- unexpected, preparation for,
Expect the Unexpected
- user account
- access control,
Access Control Information
- files controlling,
Files Controlling User Accounts and Groups
- /etc/group,
/etc/group
- /etc/gshadow,
/etc/gshadow
- /etc/passwd,
/etc/passwd
- /etc/shadow,
/etc/shadow
- GID,
Usernames and UIDs, Groups and GIDs
- home directory
- centralized,
Home Directories
- management of,
Managing User Accounts and Resource Access,
Managing User Accounts,
Managing Accounts and Resource Access Day-to-Day
- job changes,
Job Changes
- new hires,
New Hires
- terminations,
Terminations
- password,
Passwords
- aging,
Password Aging
- big character set used in,
Expanded Character Set
- longer,
Longer Passwords
- memorable,
Memorable
- personal information used in,
Personal Information
- repeatedly used,
The Same Password for Multiple Systems
- shortness of,
Short Passwords
- small character set used in,
Limited Character Set
- strong,
Strong Passwords
- weak,
Weak Passwords
- word tricks used in,
Simple Word Tricks
- words used in,
Recognizable Words
- written,
Passwords on Paper
- permissions related to,
User Accounts, Groups, and Permissions
- execute,
User Accounts, Groups, and Permissions
- read,
User Accounts, Groups, and Permissions
- setgid,
User Accounts, Groups, and Permissions
- setuid,
User Accounts, Groups, and Permissions
- sticky bit,
User Accounts, Groups, and Permissions
- write,
User Accounts, Groups, and Permissions
- resources, management of,
Managing User Resources
- shared data access,
Who Can Access Shared Data
- system GIDs,
Usernames and UIDs, Groups and GIDs
- system UIDs,
Usernames and UIDs, Groups and GIDs
- tools for managing,
User Account and Group Applications
- chage command,
User Account and Group Applications
- chfn command,
User Account and Group Applications
- chpasswd command,
User Account and Group Applications
- passwd command,
User Account and Group Applications
- useradd command,
User Account and Group Applications
- userdel command,
User Account and Group Applications
- usermod command,
User Account and Group Applications
- UID,
Usernames and UIDs, Groups and GIDs
- username,
The Username
- changes to,
Dealing with Name Changes
- collisions in naming,
Dealing with Collisions
- naming convention,
Naming Conventions
- user ID
- See UID
- useradd command,
User Account and Group Applications
- userdel command,
User Account and Group Applications
- usermod command,
User Account and Group Applications
- username,
The Username
- changing,
Dealing with Name Changes
- collisions between,
Dealing with Collisions
- naming convention,
Naming Conventions
- users
- importance of,
Know Your Users