Example: tourism industry

Red Hat Enterprise Linux 7 System Administrator’s Guide

Red Hat Enterprise Linux 7 System administrator s GuideDeployment, configuration, and administration of RHEL 7 Last Updated: 2022-01-31 Red Hat Enterprise Linux 7 System administrator s GuideDeployment, configuration, and administration of RHEL 7 Legal NoticeCopyright 2022 Red Hat, text of and illustrations in this document are licensed by Red Hat under a Creative CommonsAttribution Share Alike Unported license ("CC-BY-SA"). An explanation of CC-BY-SA isavailable In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you mustprovide the URL for the original Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert,Section 4d of CC-BY-SA to the fullest extent permitted by applicable Hat, Red Hat Enterprise Linux , the Shadowm

courses. If you want to use Red Hat Enterprise Linux 7 with the Linux Containers functionality, see Product Documentation for Red Hat Enterprise Linux Atomic Host. For an overview of general Linux Containers concept and their current capabilities implemented in Red Hat Enterprise Linux 7, see

Tags:

  Guide, Linux, System, Enterprise, Administrator, Red hat enterprise linux, System administrator s guide

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Red Hat Enterprise Linux 7 System Administrator’s Guide

1 Red Hat Enterprise Linux 7 System administrator s GuideDeployment, configuration, and administration of RHEL 7 Last Updated: 2022-01-31 Red Hat Enterprise Linux 7 System administrator s GuideDeployment, configuration, and administration of RHEL 7 Legal NoticeCopyright 2022 Red Hat, text of and illustrations in this document are licensed by Red Hat under a Creative CommonsAttribution Share Alike Unported license ("CC-BY-SA"). An explanation of CC-BY-SA isavailable In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you mustprovide the URL for the original Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert,Section 4d of CC-BY-SA to the fullest extent permitted by applicable Hat, Red Hat Enterprise Linux , the Shadowman logo, the Red Hat logo, JBoss, OpenShift,Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc.

2 , registered in the United Statesand other is the registered trademark of Linus Torvalds in the United States and other is a registered trademark of Oracle and/or its is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United Statesand/or other is a registered trademark of MySQL AB in the United States, the European Union andother is an official trademark of Joyent. Red Hat is not formally related to or endorsed by theofficial Joyent open source or commercial OpenStack Word Mark and OpenStack logo are either registered trademarks/service marksor trademarks/service marks of the OpenStack Foundation, in the United States and othercountries and are used with the OpenStack Foundation's permission.

3 We are not affiliated with,endorsed or sponsored by the OpenStack Foundation, or the OpenStack other trademarks are the property of their respective System administrator 's Guide documents relevant information regarding the deployment,configuration, and administration of Red Hat Enterprise Linux 7. It is oriented towards systemadministrators with a basic understanding of the System . To expand your expertise, you might alsobe interested in the Red Hat System Administration I (RH124), Red Hat System Administration II(RH134), Red Hat System Administration III (RH254), or RHCSA Rapid Track (RH199) trainingcourses.

4 If you want to use Red Hat Enterprise Linux 7 with the Linux Containers functionality, seeProduct Documentation for Red Hat Enterprise Linux Atomic Host. For an overview of general LinuxContainers concept and their current capabilities implemented in Red Hat Enterprise Linux 7, seeOverview of Containers in Red Hat Systems. The topics related to containers management andadministration are described in the Red Hat Enterprise Linux Atomic Host 7 Managing ..Table of ContentsPART I. BASIC System CONFIGURATIONCHAPTER 1. GETTING STARTEDWhat Cockpit Is and Which Tasks It Can Be Used BASIC CONFIGURATION OF THE Introduction to Configuring the Date and TimeDisplaying the Current Date and Introduction to Configuring the System Introduction to Configuring the Keyboard CONFIGURING AND INSPECTING NETWORK Configuring Network Access During the Installation Managing Network Connections After the Installation Process Using Managing Network Connections After the Installation Process Using Managing Networking in THE BASICS OF REGISTERING THE

5 System AND MANAGING What Red Hat Subscriptions Are and Which Tasks They Can Be Used Registering the System During the Registering the System after the Registering a System to EUS Registering a System to E4S INSTALLING Prerequisites for Software Introduction to the System of Software Packaging and Software Managing Basic Software Installation Tasks with Subscription Manager and MAKING SYSTEMD SERVICES START AT BOOT Enabling or Disabling the Managing Services in Additional Resources on systemd ENHANCING System SECURITY WITH A FIREWALL.

6 SELINUX AND SSH Ensuring the Firewall Is Enabled and What a Firewall Is and How It Enhances System Re-enabling the firewalld Ensuring the Appropriate State of What SELinux Is and How It Enhances System SecuritySELinux StatesSELinux Ensuring the Required State of Managing SELinux in Using SSH-based What SSH-based Authentication Is and How It Enhances System Establishing an SSH Disabling SSH Root THE BASICS OF MANAGING USER ACCOUNTSN ormal and System AccountsWhat Groups Are and Which Purposes They Can Be Used The Most Basic Command-Line Tools to Manage User Accounts and Managing User Accounts in DUMPING THE CRASHED KERNEL USING THE KDUMP What kdump Is and Which Tasks It Can Be Used Enabling and Activating kdump During the Installation Ensuring That kdump Is Installed and Enabled after the Installation Process212222232323242424252526262626272 7282930303131323233333333343434343434353 636363637373738383939394040 Table of Contents1.

7 Configuring kdump in Additional Resources on PERFORMING System RESCUE AND CREATING System BACKUP WITH What ReaR Is and Which Tasks It Can Be Used Quickstart to Installation and Configuration of Quickstart to Creation of the Rescue System with Quickstart to Configuration of ReaR with the Backup USING THE LOG FILES TO TROUBLESHOOT Services Handling the syslog Subdirectories Storing the syslog ACCESSING RED HAT Obtaining Red Hat Support Through Red Hat Customer What the Red Hat Support Tool Is and Which Tasks It Can Be Used Using the SOS Report to Troubleshoot ProblemsCHAPTER 2.

8 System LOCALE AND KEYBOARD SETTING THE System Displaying the Current Listing Available Setting the Making System Locale Settings Permanent when Installing with CHANGING THE KEYBOARD Displaying the Current Listing Available Setting the ADDITIONAL RESOURCESI nstalled DocumentationSee AlsoCHAPTER 3. CONFIGURING THE DATE AND USING THE TIMEDATECTL Displaying the Current Date and Changing the Current Changing the Current Changing the Time Synchronizing the System Clock with a Remote USING THE DATE Displaying the Current Date and Changing the Current Changing the Current USING THE HWCLOCK Displaying the Current Date and Setting the Date and Synchronizing the Date and ADDITIONAL RESOURCESI nstalled DocumentationSee AlsoCHAPTER 4.

9 MANAGING USERS AND INTRODUCTION TO USERS AND GROUPSR eserved User and Group User Private Shadow MANAGING USERS IN A GRAPHICAL ENVIRONMENT40414141414242424243434343444 5454546464747484848494949515151525253535 454555656575757585858606060606161 Red Hat Enterprise Linux 7 System administrator s Guide2.. Using the Users Settings USING COMMAND-LINE Adding a New Adding a New Adding an Existing User to an Existing Creating Group Setting Default Permissions for New Files Using umaskWhat umask consists ofHow umask Managing umask in ShellsDisplaying the current maskSetting mask in shell using umaskWorking with the default shell umaskWorking with the default shell umask of a specific userSetting default permissions for newly created home ADDITIONAL RESOURCESI nstalled DocumentationOnline DocumentationSee AlsoCHAPTER 5.

10 ACCESS CONTROL MOUNTING FILE SETTING ACCESS SETTING DEFAULT RETRIEVING ARCHIVING FILE SYSTEMS WITH COMPATIBILITY WITH OLDER ACL REFERENCESCHAPTER 6. GAINING CONFIGURING ADMINISTRATIVE ACCESS USING THE SU CONFIGURING ADMINISTRATIVE ACCESS USING THE SUDO ADDITIONAL RESOURCESI nstalled DocumentationOnline DocumentationSee AlsoPART II. SUBSCRIPTION AND SUPPORTCHAPTER 7. REGISTERING THE System AND MANAGING REGISTERING THE System AND ATTACHING MANAGING SOFTWARE REMOVING ADDITIONAL RESOURCESI nstalled DocumentationRelated BooksSee AlsoCHAPTER 8.


Related search queries