Jump to content

Search the Community

Showing results for tags 'redhat'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


    • LINUX
    • ORACLE
    • GNS3

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Found 32 results

  1. Hello All, Please find the exam questions for the RHEL7 certification. These are the confirm questions. 2 batches have given this exam and even me. Enjoy ! Don't forget to thanks ! Regards, certbreaker RHEL7_RHCE_Questions.txt RHEL7_RHCSA_Questions.txt
  2. Udemy - Linux Academy Red Hat Certified Engineer Prep Course [hide][Hidden Content]]
  3. Openshift Student Guide DO180 and DO280 (v3.9) [Hidden Content] DO180 (v4.2) [Hidden Content] PS. Mediafire - Unregistered accounts may be considered abandoned after 14 days of inactivity
  4. Linux Troubleshooting Red Hat EX342 + scripts + studentBook - enjoy [hide][Hidden Content] rn-baNYhhzMa8Z1PptUGWQ ebook : [Hidden Content]]
  5. Pearson - Red Hat RHCE 8 (EX294) Cert Guide, by Sander van Vugt [hide][Hidden Content]] Key: Cc-RglTTma7wdt9UusCE5oJB0UgN8FIuSLi_cl6zQhM
  6. Hello, can someone share with me Redhat Ceph Storage Administration EX125 student book, i can pay for this ? Thanks
  7. RH124-RHEL8.0 RH134-RHEL8.0 [Hidden Content]
  8. Check this out: [Hidden Content] Get it here: [Hidden Content]
  9. I just found those questions helpful so i thought to share them with all of you, below questions are based on RHEL 6 and i believe we should consider below points too with it : Firewall, ipv6, link aggregation, mail, two shell scripts, complete client and server configuration of NFS samba iscsi, secured and dynamic web server setup, mariaDB setup, Port forwarding using RICH rule are part of exam. Question 1 In accordance with the following requirements to deploy ssh login service: (1) harry belongs to example.com which can remote login your systems. (2) However, users of remote.test can not use ssh login to your machine. Answer: [[email protected] ~]# grep sshd /etc/hosts.allow sshd:.example.com [[email protected] ~]# grep sshd /etc/hosts.deny sshd:.remote.test Notice: tcp_wrappers has two configuration files and their priority level is /etc/hosts.allow->/etc/hosts.deny Question 2 Via nfs service share the /common directory in your system, just doine ONE share in example.com domain. Answer: [[email protected] ~]# grep common /etc/exports /common *.example.com(ro,sync) Question 3 According to the following requirements, deploying your ftp login rule: (1) Users in example.com domain must be able to login to your ftp server as an anonymous user. (2) But users outside the example.com domain are unable to login to your server Answer: [[email protected] ~]# grep vsftpd /etc/hosts.deny vsftpd:.example.com [[email protected] ~]# grep vsftpd /etc/hosts.deny vsftpd:ALL /etc/vsftpd/vsftpd.conf: anonymous_enable=YES Question 4 Deploying your exam system: linking to the iscsi target in the instructor.example.com and distinguish it well, then formatted as ext3 file system. You must can be able to mout the file system of the iscsi target to the /mnt/iscsi directory in your own system and make this file system can automatically mount (permanently mount) after system restart. Answer: [[email protected] ~]# iscsiadm –mode discoverydb –type sendtargets –portal instructor.example.com –discover,1 iqn.2010-09.com.example:rdisks.server1 [[email protected] ~]# iscsiadm –mode node -targetname iqn.2010-09.com.example:rdisks.server1 –portal instructor.example.com –login Logging in to [iface: default, target: iqn.2010-09.com.example:rdisks.server1, portal:,3260] (multiple) Login to [iface: default, target: iqn.2010-09.com.example:rdisks.server1, portal:,3260] successful. Note: This part also need to be formatted and modify /etc/fstab mount Question 5 In accordance with the following requirements, sharing /common directory through smb service. – your sub service must be in the SAMBA working-set – the shared name of common is common – the common share just can be shared by the customers in the example.com domain – the common must can be available for browsing – mary must cann login to the smb share and for read operation, “password”is the secret code if it need to be verified. Answer: [[email protected] iscsi]# grep -v “^\s*#” /etc/samba/smb.conf | grep -v “^\s*;” | grep -v “^\s*$” [global] workgroup = SAMBA server string = Samba Server Version %v hosts allow = 127. 192.168.0. security = user passdb backend = tdbsam [common] comment = Public Stuff path = /common public = no browseable = yes printable = no read only = mary Add SMB Mary users smbpasswd -a mary Modify the security context of /common directory chcon -R -t samba_share_t /common Question 6 Arrange a web service address is: [Hidden Content], X is the number of your exam machine. Deploy it in accordance with the following requirements: — Download ftp://instructor.example.com/pub/rhce/server.html — Can not do any modification to file documwent server.html — Rename file document server.html as index.html — Copy the file document server.html to DocumentRoot Answer: [[email protected] common]# cd /var/www/html/ [[email protected] html]# lftp instructor.example.com lftp instructor.example.com:~> cd pub/rhce cd ok, cwd=/pub/rhce lftp instructor.example.com:/pub/rhce> get server.html 20 bytes transferred [[email protected] html]# mv server.html index.html [[email protected] html]# restorecon -Rv /var/www/html/ [[email protected] html]# /etc/init.d/httpd restart Stopping httpd: [ OK ] Starting httpd: [ OK ] [[email protected] html]# chkconfig httpd on Question 7 Expand your web service including a virtual hosting, address is:[Hidden Content], X is the number of your exam machine. However, requiring you do as the following: – Set up the DocumentRoot of this virtual hosting as /var/http/virtual – Download ftp://instructor.example.com/pub/rhce/www.html – Rename www.html file document as index.html – Move this file document to this virtual hosting’s DocumentRoot – Don’t do any changes to this document – Making sure that harry users are able to creat project in /var/http/virtual Attention: Original web address is [Hidden Content] must also can be browsed. The DNS of the Server instructor.example.com has already been analyzed as the domain wwwX.example.com. Answer: [[email protected] html]# mkdir -p /var/http/virtual [[email protected] html]# cd /var/http/virtual/ [[email protected] virtual]# lftp instructor.example.com lftp instructor.example.com:~> cd pub/rhce lftp instructor.example.com:/pub/rhce> get www.html 17 bytes transferred lftp instructor.example.com:/pub/rhce> quit [[email protected] virtual]# mv www.html index.html [[email protected] virtual]# useradd harry [[email protected] virtual]# chgrp harry . [[email protected] virtual]# chmod 775. Edit /etc/httpd/conf/httpd.conf, add the follow content: NameVirtualHost *:80 <VirtualHost *:80> DocumentRoot /var/http/virtual ServerName www1.example.com <Directory /var/http/virtual/limited> Options Indexes MultiViews FollowSymlinks order deny,allow deny from all allow from 192.168.0. </Directory> </VirtualHost> <VirtualHost *:80> DocumentRoot /var/www/html/ ServerName server1.example.com Notice: The priority level of order deny,allow is deployed: The back is higher than in front of the priority. It means allow -> deny Question 8 Creating a directory /var/http/virtual/limited, Just limiting the local user to enter and browse the shared web page in this directory and users can’t access this webpage if they are not the local user. Answer: The deploy of <Directory> in the seventh question has been done. Question 9 Deploy your SMTP mail service and complete it by the following requirements: – Your mail service must can receive the local and remote mails – harry must can receive the remote mail – The mail which is delivered to mary should be put into the mail /var/spool/mail/mary Answer: Modify /etc/postfix/main.cf, open the following parameters: inet_interfaces = all [[email protected] virtual]# /etc/init.d/postfix restart Shutting down postfix: [ OK ] Starting postfix: [ OK ] [[email protected] virtual]# chkconfig postfix on Question 10 Configure a mail alias to your MTA, for example, send emails to harry but mary actually is receiving emails. Answer: Modify /etc/aliases,add: harry: mary harry After completing modification: [[email protected] virtual]# newaliases Notice: This problem is a trap.The ninth questions require harry must be able to receive remote emails but the tenth problems requires mary to receive harry’s emails. So harry msut be added when you are deploying aliaes. Question 11 Create a Shell script /root/program: — The shell script will come back to “user” parameter when you are entering“kernel” parameter. — The shell script will come back to “kernel” when you are entering “user” parameter. — It will output the standard error when this script“usage:/root/program kernel|user” don’t input any parameter or the parameter you inputted is entered as the requirements. Answer: [[email protected] virtual]# cat /root/program #!/bin/bash param1=”$1″ if [ “$param1″ == “kernel” ]; then echo “user” elif [ “$param1″ == “user” ]; then echo “kernel” else echo “usage:/root/program kernel|user” fi [[email protected] ~]# chmod +x /root/program Question 12 Given the kernel of a permanent kernel parameters: sysctl=1. It can be shown on cmdline after restarting the system. Kernel of /boot/grub/grub.conf should be added finally, as: Answer: Kernel of /boot/grub/grub.conf should be added finally, as: kernel /vmlinuz-2.6.32-279.1.1.el6.x86_64 ro root=/dev/mapper/vgsrv-root rd_LVM_LV=vgsrv/root rd_NO_LUKS LANG=en_US.UTF-8 rd_LVM_LV=vgsrv/swap rd_NO_MD SYSFONT=latarcyrheb-sun16 crashkernel=auto KEYBOARDTYPE=pc KEYTABLE=us rd_NO_DM rhgb quiet rhgb quiet sysctl=1 Question 13 Forbidden the Mary user configuration tasks in your system. Answer: Modify the /etc/cron.deny, add: [[email protected] ~]# cat /etc/cron.deny mary Conclusions: 1. I find that it is common to add various service access limits in the exam RHCE. The exercises like: require one network segment can be accessed another network segments can not be accessed,the following are some conclusions for various service: tcp_wrappers:/etc/hosts.allow,/etc/hosts.deny tcp_wrappers can filter the TCP’s accessing service. TCP whether has the filtering function which depends on this service whether use the function library of tcp_wrappers, or this service whether has the xinetd process of starting function of tcp_wrappers. tcp_wrappers’s main configuration file is /etc/hosts.allow,/etc/hosts.deny. And the priority of the documents in hosts.allow is higher than hosts.deny. Visit will be passed if no match was found. sshd,vsftpd can use the filtering service of tcp_wrappers. Configuration example: sshd:.example.com 192.168.0. 150.203. EXCEPT Notice: The two configuration files’ syntax can refer to hosts_access(5) and hosts_options(5) sshd_config There are four parameters in this configuration file: DenyUsers, AllowUsers, DenyGroups, AllowGroups, they are used to limit some users or user groups to proceed Remote Login through the SSH. These parameters’ priority level is DenyUsers->AllowUsers->DenyGroups->AllowGroups Configuration example: AllowUsers tim [email protected] [email protected]*.example.com httpd Service Through the /etc/httpd/conf/httpd.conf in parameters, can add <Directory> to control the url access. Just as: <VirtualHost *:80> DocumentRoot /var/http/virtual ServerName www1.example.com <Directory /var/http/virtual/limited> Options Indexes MultiViews FollowSymlinks order deny,allow deny from all allow from 192.168.0. </Directory> </VirtualHost> Notice: So pay attention, deny’s and allow’s priority level in order deny,allow is: the backer has the higher priority level. But here, allow’s priority has a higher priority level. nfs Service nfs service directly control the visits through file /etc/exports, just as: /common *.example.com(rw,sync),sync) samba Service Parameter hosts allow in /etc/samba/smb.conf which is used as Access Control,just as: hosts allow = 192.168.0. .example.com 2. Paying attention to use Mount parameters: _netdev,defaults when you are mounting ISCSI disk. 3. Stop the NetworkManager /etc/init.d/NetworkManager stop chkconfig NetworkManager off 4. When you are deploying ifcfg-ethX, add parameters: PEERDNS=no 5. Empty the firewall in RHCSA、RHCE: iptables -F iptables -X iptables -Z /etc/init.d/iptables save 6. Narrow lv steps: 1.umount /dev/mapper/lv 2.e2fsck -f /dev/mapper/lv 3.resize2fs /dev/mapper/lv 100M 4.lvreduce -L 50M /dev/mapper/lv 5.mount -a 7. Mount the using command – swap which is newly added in /etc/fstab 8. If Verification is not passed when you are installing software, can import public key: rpm -import /etc/pki/rpm…/…release and so on. In yum.repo, you also can deploy gpgkey, for example, gpgkey=/etc/pki/rpm…/…release 9. When you are using “Find” command to search and keep these files, paying attention to use cp -a to copy files if you use user name and authority as your searching methods. Part 2 Question 14 Please set the selinux status as enforcing. Answer: # getenforce 1 # vim /etc/sysconfig/selinux SELINUX=enforcing Question 15 Please open the ip_forward, and take effect permanently. Answer: # vim /etc/sysctl.conf net.ipv4.ip_forward = 1 # sysctl -w (takes effect immediately) If no “sysctl.conf” option, use these commands: # sysctl -a |grep net.ipv4 # sysctl -P net.ipv4.ip_forward = 1 # sysctl –w Question 16 Configure ssh to allow user harry to access, reject the domain t3gg.com ( to access. Answer: # yum install -y sshd # chkconfig sshd on # vim /etc/hosts.deny sshd: # service sshd restart Use iptables: # chkconfig iptables on # iptables -F # iptables -X # iptables -Z # iptables -nvL # iptables -A INPUT -s -p tcp –dport 22 -j REJECT # services iptables save # iptables -nvL # cat /etc/services (check port) Question 17 Configure the ftp to allow anonymously download the directory /var/ftp/pub, and reject the domain t3gg.com to access. Answer: # yum install -y vsftpd # chkconfig vsftpd on # services vsftpd start # vim /etc/hosts.deny vsftpd: OR # iptables -A INPUT -s -p tcp -dport 20:21 -j REJECT # services iptables save Question 18 Shutdown the /root/cdrom.iso under /opt/data, and set as boot automatically mount. Answer: # cd /opt/ # mkdir data # mount -t iso9660 -o loop /root/cdrom.iso /opt/data # vim /etc/fstab /root/cdrom.iso /opt/data iso9660 defaults,loop 0 0 # mount -a # mount Question 19 Configure the web server, which can be accessed by [Hidden Content]. Answer: # yum install -y httpd # chkconfig httpd on # cd /etc/httpd/conf/ # vim httpd.conf NameVirtualHost <VirtualHost> DocumentRoot /var/www/html/ ServerName tation.domain30.example.com </VirtualHost> # service httpd restart Question 20 Configure the web server, and implement the virtual host. [Hidden Content] can access the pages under the directory: [Hidden Content]. And make sure, [Hidden Content] can also access the previous content. Answer: # mkdir -p /www/virtual # cd /www/virtual # wget [Hidden Content] # cp example.com index.html # se manage fcontext -a -t httpd_sys_content_t ‘/www(/.*)?’ restorecon -vRF /www # vim /etc/httpd/conf/httpd.conf (Add new VirtualHost) <VirtualHost> DocumentRoot /www/virtual/ ServerName www.domain30.example.com </VirtualHost> # chcon -R –reference=/var/www/html/ /www/ # service httpd restart Use elinks to test. OR # mkdir -p /www/virtual # cd /www/virtual # wget [Hidden Content] # mv example.html index.html # chcon -R –reference=/var/www/html/ /www/ # ls -ldZ /www/virtual # vim /etc/httpd/conf/httpd.conf NameVirtualHost *:80 <VirtualHost *:80> DocumentRoot /var/www/html/ ServerName station.domain30.example.com </VirtualHost> <VirtualHost *:80> DocumentRoot /www/virtual/ ServerName www.domain30.example.com </VirtualHost> # service httpd restart Question 21 Download file from [Hidden Content], and the local user harry can access it by[Hidden Content]/restircted.html, and cannot be accessed by t3gg.com. Answer: # cd /var/www/html # wget [Hidden Content] # iptables -A INPUT -s -p tcp -dport 80 -j REJECT # service iptables save OR # yum install httpd # service httpd restart # chkconfig httpd on # cd /var/www/html # wget [Hidden Content] # iptables -A INPUT -p tcp –dport 80 -j REJECT # service iptables save # service iptables restart # elinks [Hidden Content]/restricted.html Question 22 Configure the nfs server, share the /common directory to domain30.example.com, and allow client to have the root user right when access as root user Answer: # yum install -y nfs # chkconfig nfs on # chkconfig rpcbind on # vim /etc/exports /common,no_root_squash) # showmount -e # mount -t nfs /mnt (Test) Question 23 Configure the samba server, share /common, which can be browsed. The user harry can only read it. If it is needed, the password for harry is harryuser. Answer: # yum install -y samba samba-common samba-client # chkconfig smb on # chkconfig nmb on (nmb is a dependency of smb to resolve netbios) # service smb start # service nmb start # useradd harry # smbpasswd -a harry # mkdir /common # vim /etc/samba/smb.conf [common] comment = common path = /common browseable = yes valid user = harry read only = yes testparm # getsebool -a |grep samba_share_nfs # setsebool -P samba_share_nfs=1 # chcon -R –reference=/var/spool/samba/ /common/ # services smb restart # mount -t cifs // /mnt -o username=harry,password=harryuser # smbclient // -U harry Question 24 Configure an email server domian30.example.com, and it requests to send and receive emails from the local server or the user harry can send or receive emails from network. The email of user harry is /var/spool/mail/harry. Please note: the DNS server has already been MX record analyzed. Answer: # yum install -y postfix # service postfix restart # chkconfig postfix on # vim /etc/postfix/main.cf inet_interfaces = all mydestination = example.com, domain30.example.com, localhost mynetworks =, # services postfix restart Test: # netstat -tulnp |grep 25 # hostname # echo hello |mail -s “test”[email protected] # cat /var/spool/mai/harry Question 25 Connect to the email server and send email to admin, and it can be received by harry. Answer: # vim /etc/aliases admin: harry # newaliases Question 26 Configure the kernel parameters: rhelblq=1, and it is requested that your kernel parameters can be verified through /proc/cmdline. Answer: # vim /boot/grub/grub.conf rhelblq=1 (Add to end of the line “kernel….) Restart # cat /proc/cimline Question 27 Configure cron and don’t allow the user tom to use. Answer: # useradd tom # vim /etc/cron.deny tom Question 28 Write a script /root/program. The request is when input the kernel parameters for script, the script should return to user. When input the user parameters, the script should return to kernel. And when the script has no parameters or the parameters are wrong, the standard error output should be “usage:/root/program kernel|user”. Answer: # vim /root/program # !/bin/bash if [ $# -ne 1 ];then echo “usage:/root/program kernel|user” else if [ “$1″ -eq “kernel”];then echo “user” elif [“$1″ -eq “user”];then echo “kernel” else echo “usage:/root/program kernel|user” fi fi Test: # chmod a+x /root/program .root/program kernel ./root/program user ./root/program lll Question 29 You access the iscsi shared storage. The storage server ip is Separate of 1500M space, format as ext3 file system, mount under /mnt/data, and make sure the root-start automatically mount. Answer: # yum install -y iscsi* # chkconfig iscsid on # iscsiadm -m discovery -t st -p # iscsiadm -m node -T iqn.2011 -p -l # dmesg|tail # fdisk /dev/sdb9 …… # mkfs.ext3 /dev/sdb9 # cd /mnt # mkdir data # blkid /dev/sdb1 (Check UUID number) # vim /etc/fstab UUID=xxxxxxxxxxxxxxxxxxxx /mnt/data ext3 _netdev,defaults 0 0 # mount -a # mount OR # vim /dev/fstab UUID=xxxxxxxxxxxxxxxxxxxx /mnt/data ext3 defaults 0 0 # chkconfig netfs2 on Part 3 Question 30 There are two different networks and Where and IP Address are assigned on Server. Verify your network settings by pinging Network’s Host. Answer: 1. vi /etc/sysconfing/network NETWORKING=yes HOSTNAME=station?.example.com GATEWAY= 2. service network restart Or 1. vi /etc/sysconfig/network-scripts/ifcfg-eth0 DEVICE=eth0 ONBOOT=yes BOOTPROTO=static IPADDR=X.X.X.X NETMASK=X.X.X.X GATEWAY= 2. ifdown eth0 3. ifup eth0
  10. Red Hat Certified System Administrator (RHCSA) Complete Video Course: Red Hat Enterprise Linux 7 English | Oct 1, 2014 | ISBN: 0789755947 | mp4 | H264 1280x720 | AAC 2 ch 95 kbps | 13 hrs 10 min | 2.91 GB eLearning 12+ Hours of Video Instruction Red Hat Certified System Administrator (RHCSA) Complete Video Course is an engaging self-paced video training solution that provides learners with more than 16 hours of personal visual instruction from an RHCSA and RHCE certified expert with more than 20 years of practical Linux teaching experience. Through the use of topic-focused instructional videos you will gain an in-depth understanding of the Red Hat Certified Administrator (RHCSA) exam as well as a deeper understanding of Red Hat Enterprise Linux so you master the key foundational principles of systems administration. Included with the product are dynamic and interactive hands-on exercises and quizzes designed to test your knowledge while you study. The course includes 100% coverage of exam objectives, hands-on exercises included with each lesson so you can practice what you learned in a real CLI environment, multiple-choice quizzes to help you test your knowledge, and hands-on exercises to give you the extra edge you need to excel on the exam. Description Red Hat Certified System Administrator (RHCSA) Complete Video Course contains more than 12 hours of training with content divided into 4 modules with 26 video lessons. The videos consist of live trainer discussions, CLI presentations, live demos, and practice exam exercise walk-throughs. The video lessons in this course review each exam objective so you can use this course as a complete study tool for taking the Red Hat Certified System Administrator (RHCSA) Complete Video Course. Instruction throughout offers detailed explanations, demos, tips, and more. This Complete Video Course includes interactive hands-on exercises for each lesson with thorough video explanations. The streaming site also includes module quizzes and exercises so you can test your knowledge every step of the way. Major topics include Module 1: Performing Basic System Management Tasks 1: Installing Red Hat Enterprise Linux Server 2: Using Essential Tools 3: Essential File Management Tools 4: Working with Text Files 5: Connecting to a RHEL Server 6: Managing Users and Groups 7: Connecting to an LDAP Server 8: Managing Permissions 9: Configuring Networking Module 2: Operating Red Hat Enterprise Linux Servers 10: Managing Processes 11: Managing Software 12: Working with Virtual Machines 13: Scheduling Tasks 14: Configuring Logging 15: Managing Partitions 16: Managing LVM Logical Volumes Module 3: Performing Advanced System Administration Tasks 17: Managing the Kernel 18: Using Kickstart 19: Managing and Understanding the Boot Procedure 20: Applying Essential Troubleshooting Skills Module 4: Managing Network Services: 21: Managing HTTP Services 22: Managing SELinux 23: Configuring a Firewall 24: Configuring FTP Services 25: Configuring Time Services 26: Configuring VNC Access Skill Level * Beginning to intermediate What You Will Learn - Key concepts for all the objectives on the Red Hat Certified Administrator (RHCSA) exam - Information on the new RHEL 7 exam Who Should Take This Course Primary audience: Red Hat Certified Administrator (RHCSA) certification candidates Secondary audience: - Anyone interested in learning about Red Hat from the ground up - Linux engineers who are interested in learning more about Red Hat Enterprise Linux - Junior system administrators who want to deepen their skills - Administrators currently administering UNIX systems and developers who write software for Linux Course Requirements The ideal target student has some preliminary Linux knowledge already, because this course focuses on Linux administration rather than on basic Linux usage. Table of Contents I Introduction II What to Expect on the RHCSA Exam III Preparing an Environment for Doing Exercises Module 1 Performing Basic System Management Tasks 1 Installing Red Hat Enterprise Linux Server Learning Objectives 1.1 What You Need on Your Server 1.2 Installing Red Hat Enterprise Linux Server Exercise 1 Summary 2 Using Essential Tools Learning Objectives 2.1 Using man 2.2 Understanding vim 2.3 Editing Text Files with vim 2.4 Understanding Globbing and Wildcards 2.5 Using Globbing and Wildcards 2.6 Understanding I/O Redirection and Pipes 2.7 Using I/O Redirection and Pipes Exercise 2 Explanation to Exercise 2 Summary 3 Essential File Management Tools Learning Objectives 3.1 Understanding Linux File System Layout 3.2 Essential File Management Tasks 3.3 Finding Files 3.4 Understanding Links 3.5 Working with Links 3.6 Working with tar Exercise 3 Explanation to Exercise 3 Summary 4 Working with Text Files Learning Objectives 4.1 Understanding Regular Expressions 4.2 Using Common Text Tools (tail, head, tr, cut, sort) 4.3 Working with grep 4.4 sed and awk Basics Explanation to Exercise 4 Summary Lesson 4 Interactive Exercise 5 Connecting to a RHEL Server Learning Objectives 5.1 Opening Local Shells (Including Virtual Consoles) 5.2 Connecting to a Server with SSH 5.3 Understanding SSH Keys 5.4 Using SSH Keys Exercise 5 Explanation to Exercise 5 Summary Lesson 5 Interactive Exercise 6 Managing Users and Groups Learning Objectives 6.1 Understanding the Need for Users 6.2 Understanding User Properties 6.3 Creating and Managing Users 6.4 Understanding Group Membership 6.5 Creating and Managing Groups 6.6 User and Group Configuration Files 6.7 Managing Password Properties Exercise 6 Explanation to Exercise 6 Summary 7 Connecting to an LDAP Server Learning Objectives 7.1 Understanding LDAP 7.2 Telling Your Server Where to Find the LDAP Server 7.3 Understanding Automount 7.4 Understanding sssd 7.5 Modifying sssd Configuration Exercise Explanation to Exercise 7 Summary 8 Managing Permissions Learning Objectives 8.1 Understanding Ownership: Users, Groups,, and Others 8.2 Changing File Ownership 8.3 Understanding Basic Permissions 8.4 Managing Basic Permissions 8.5 Understanding Special Permissions 8.6 Managing Special Permissions 8.7 Understanding ACLs 8.8 Managing ACLs Exercise 8 Explanation to Exercise 8 Summary Lesson 8 Interactive Exercise 9 Configuring Networking Learning Objectives 9.1 Understanding NIC Naming 9.2 Managing NIC Configuration with the ip Command 9.3 Storing Network Configuration Persistently 9.4 Understanding Network Manager 9.5 Using Network Manager Utilities (nmcli, nm-tool) 9.6 Understanding Routing and DNS 9.7 Configuring Routing and DNS 9.8 Understanding Network Analysis Tools 9.9 Using Network Analysis Tools Exercise 9 Explanation to Exercise 9 Summary Module 1 Quiz Module 2 Operating Red Hat Enterprise Linux Servers 10 Managing Processes Learning Objectives 10.1 Understanding Jobs and Processes 10.2 Managing Shell Jobs 10.3 Getting Process Information with ps 10.4 Understanding Memory Usage 10.5 Understanding Performance Load 10.6 Monitoring System Activity with top 10.7 Sending Signals to Processes 10.8 Understanding Priorities and Niceness 10.9 Changing Process Nice Values Exercise 10 Explanation to Exercise 10 Summary Lesson 10 Interactive Exercise 11 Managing Software Learning Objectives 11.1 Understanding Meta Package Handlers 11.2 Setting Up Yum Repositories 11.4 Using rpm Queries Exercise 11 Explanation to Exercise 11 Summary Lesson 11 Interactive Exercise 12 Working with Virtual Machines Learning Objectives 12.1 Introducing KVM Virtualization 12.2 Managing Libvirt and KVM 12.3 Using virsh 12.4 Using virt-manager Exercise 12 Explanation to Exercise 12 Summary 13 Scheduling Tasks Learning Objectives 13.1 Cron Versus at 13.2 Understanding Cron Configuration Files and Execution Times 13.3 Scheduling with Cron 13.4 Using at Exercise 13 Explanation to Exercise 13 Summary 14 Configuring Logging Learning Objectives 14.1 Understanding Rsyslogd and Journald Logging 14.2 Integrating Rsyslogd and Journald 14.3 Configuring Rsyslog Logging 14.4 Working with Journald 14.6 Configuring logrotate Exercise 14 Explanation to Exercise 14 Summary Lesson 14 Interactive Exercise 15 Managing Partitions Learning Objectives 15.1 Understanding Disk Layout 15.2 Creating Partitions 15.3 Understanding File System Differences 15.4 Making the File System 15.5 Mounting the Partition Manually 15.6 Understanding /etc/fstab 15.7 Mounting Partitions via /etc/fstab 15.8 Understanding Encrypted Partitions 15.9 Creating a LUKS Encrypted Partition 15.10 Dealing with "Enter root password for maintenance mode" Exercise 15 Explanation to Exercise 15 Summary Lesson 15 Interactive Exercise 16 Managing LVM Logical Volumes Learning Objectives 16.1 Why use LVM 16.2 Understanding LVM Setup 16.3 Creating an LVM Logical Volume 16.4 Understanding Device Mapper and LVM Device Names 16.5 Understanding LVM Resize Operations 16.6 Growing an LVM Logical Volume 16.7 Shrinking an LVM Logical Volume Exercise 16 Explanation to Exercise 16 Summary Lesson 16 Interactive Exercise Module 2 Quiz Module 3 Performing Advanced System Administration Tasks 17 Managing the Kernel Learning Objectives 17.1 Understanding the Modular Structure of the Kernel 17.2 Working with Kernel Modules 17.3 Modifying Kernel Module Behavior Through modprobe 17.4 Tuning Kernel Behavior Through /proc 17.5 Using sysctl 17.6 Updating the Kernel Exercise 17 Explanation to Exercise 17 Summary Lesson 17 Interactive Exercise 18 Using Kickstart Learning Objectives 18.1 Understanding Kickstart Usage 18.2 Creating a Kickstart File 18.3 Using the Kickstart File for Automatic Installations 18.4 Using Kickstart Files in Fully Automated Datacenters Exercise 18 Explanation to Exercise 18 Summary 19 Managing and Understanding the Boot Procedure Learning Objectives 19.1 Boot Procedure Generic Overview 19.2 Understanding Grub2 19.3 Modifying Grub2 Parameters 19.4 Understanding systemd 19.5 Managing Services in a systemd Environment 19.6 Understanding systemd Targets 19.7 Switching Between systemd Targets 19.8 Managing File System Mounts in a systemd Environment 19.9 Managing Automount in a systemd Environment Exercise 19 Explanation to Exercise 19 Summary 20 Applying Essential Troubleshooting Skills Learning Objectives 20.1 Changing Grub Parameters on Boot 20.2 Making Grub Changes Persistent 20.3 Starting the rescue.target Mode 20.4 Changing the Root Password Exercise 20 Explanation to Exercise 20 Summary Module 3 Quiz Module 4 Managing Network Services 21 Managing HTTP Services 21.1 Understanding Apache Configuration 21.2 Creating a Basic Website Exercise 21 Explanation to Exercise 21 Summary 22 Managing SELinux Learning Objectives 22.1 Understanding the Need for SELinux 22.2 Understanding SELinux Modes and Policy 22.3 Understanding SELinux Labels and Booleans 22.4 Using File System Labels 22.5 Understanding semanage fcontext and chcon Differences 22.6 Using Booleans 22.7 Configuring SELinux for Apache Exercise 22 Explanation to Exercise 22 Summary Lesson 22 Interactive Exercise 23 Configuring a Firewall Learning Objectives 23.1 Understanding Firewall Configuration 23.2 Using Firewalld Exercise 23 Explanation to Exercise 23 Summary 24 Configuring FTP Services Learning Objectives 24.1 Understanding FTP Configuration 24.2 Configuring an FTP Server for Anonymous Downloads Exercise 24 Explanation to Exercise 24 Summary 25 Configuring Time Services Learning Objectives 25.1 Understanding Time on Linux 25.2 Setting Up a Chrony Time Server Exercise 25 Explanation to Exercise 25 Summary 26 Configuring VNC Access Learning Objectives 26.1 Understanding VNC 26.2 Configuring a VNC Server 26.3 Connecting to a VNC Server Exercise 26 Explanation to Exercise 26 Summary Course Interactive Exercise Module 4 Quiz Course Intro This session introduces the course and explains what students can expect of it. What to expect on the RHCSA exam This session explains what participants can expect on the RHCSA exam. Preparing an Environment for Doing Exercises This session explains how participants can set up an environment in which they can do hands-on practice. Module 1: Performing Basic System Management Tasks Lesson 1: Installing Red Hat Enterprise Linux Server In this lesson, the participant learns how to install Red Hat Enterprise Linux Server. In this important lesson the student sets up the environment he can use for further practice during the rest of this course. Lesson 2: Using Essential Tools This lesson revises basic shell skills, such as editing text files, using commands, and finding help. It also discusses input/output redirection. Lesson 3: Essential File Management Tools This lesson revises how to use essential file management tools that enable administrators to list, copy, move, and delete files and to create hard and symbolic links. It also discusses how to compress and archive files and how to find files. Lesson 4: Working with Text Files In this lesson, the student learns how to process text files. Regular expressions as well as common tools such as grep, cut, and tail, are discussed. Lesson 5: Connecting to a RHEL Server This lesson teaches how to connect to a RHEL Server. It includes local connection methods such as virtual consoles, but also discusses how to connect to a server using SSH and VNC. Lesson 6: Managing Users and Groups In this lesson, the student learns how to create and manage user and group accounts. It also covers authentication against an LDAP Directory server. Lesson 7: Connecting to an LDAP Server In this lesson, students learn how to connect Red Hat Enterprise Server to an LDAP Server to handle authentication. Lesson 8: Managing Permissions This lesson teaches how to manage file permissions and Access Control Lists. Lesson 9: Configuring Networking This lesson discusses how to set up networking on Red Hat Enterprise Linux. Module 2: Operating Red Hat Enterprise Linux Servers Lesson 10: Managing Processes This lesson shows how tasks and processes are managed. It explains how to interpret information from the top utility and shows how to terminate processes and change process priority. Lesson 11: Managing Software This lesson explains how to install and manage software. It explains how to refer to repositories and how to use the yum tool to install software from the repositories. It also teaches how to perform queries on installed software using the rpm tool. Lesson 12: Working with Virtual Machines This lesson explains how to work with virtual machines in a KVM environment. It explains how to use the role of libvirt, and how to work with the virsh and virt-manager tools. Lesson 13: Scheduling Tasks In this lesson, the student learns how to use Cron and atd to schedule a task for regular execution, or one-time-only execution at a specific time. Lesson 14: Configuring Logging This lesson shows how to configure an rsyslog server for local log handling. Lesson 15: Managing Partitions In this lesson, the student learns how to organize storage. Creation of partitions is covered, as well as formatting these partitions with the XFS or ext4 file systems. Lesson 16: Managing LVM Logical Volumes This lesson explains how to work with logical volumes. It explains how to set up a server with logical volumes. Module 3: Performing Advanced System Administration Tasks Lesson 17: Managing the Kernel This lesson discusses how to perform basic kernel management tasks. It discusses how to update the kernel and how kernel modules are used to manage hardware on a server system. Lesson 18: Using Kickstart This lesson discusses how to use Kickstart for an automated installation of Red Hat Enterprise Linux. Lesson 19: Managing and Understanding the Boot Procedure This lesson discusses the boot procedure from the Grub2 boot loader up to starting services with systemd. Lesson 20: Applying Essential Troubleshooting Skills This lesson explains how to resolve common problems that can occur during the boot procedure. Module 4: Managing Network Services Lesson 21: Managing HTTP Services This lesson discusses how to set up a basic HTTP server. Lesson 22: Managing SELinux This lesson discusses how SELinux is used to protect services on a Red Hat Enterprise Linux Server. It introduces some of the most common SELinux management tasks and explains how to deal with common SELinux-related problems. Lesson 23: Configuring a Firewall This lesson explains how to use system-config-firewall to set up a firewall. Lesson 24: Configuring FTP Services In this lesson, students learn how to set up an FTP service for anonymous file downloads. Lesson 25: Configuring Time Services In this lesson, the participant learns how to set up the NTP service to get time from an NTP server. Lesson 26: Configuring VNC Access In this lesson, students learn how to configure Red Hat Enterprise Linux for VNC access. This includes the configuration of a VNC Server as well as connecting RHEL 7 to an external VNC Server. [Hidden Content]
  11. Hi, I'm new in redhat exam I don't know how to register for exam? Do I have to register in vue? Help please
  12. Hi all, I prepare the exam EX210 on Openstack 6, I would like to know what is the best method to install OpenStack for this exam? Is it necessary to know everything for a manual installation or just to know how to use packstack? I am trying to learn every step for a manual installation but it's very long especially for the networking part. All advises are welcome. I am sorry for my poor english Ty in advance for your help.
  13. Hi all, Actually, I have a Red Hat Certified System Administrator (RHCSA) Exam (EX200), It covers 100% discount on Red Hat Certified System Administrator (RHCSA) Exam (EX200). I am willing to sell it for $320 actual price is 400$. Only serious candidates please pm me. thanks for interesting.
  14. [Hidden Content] [Hidden Content] [Hidden Content] anyone has the training material for CL280R or CL210, OR RH413 I have RH333 (incomplete), RH318, RH423, RH436, RH401, RH442 and bunch of vmware VCP stuff
  15. Hi All, If I take RHCE exam within this month, will it be using RHEL7 or RHEL6? I need you advise on this, pretty please? Thank you.
  16. vishakkv

    What is Docker?

    Any one who know about docker, please give detailes descripition and also provide tutorials especially videos regarding the dockers
  17. Hi there I am having problem installing applications using yum once I install redhat and I go to /etc/yum.repos.d - there are no repo files there and I want to install packages from the DVD if I try using 'yum -y install PACKAGENAME' it doesn't work & I get error message "can't retrive repository metadata repomd.xml" so here is what I did 1- copy all package files to HD 2- create repo database 3- create repo file at /etc/yum.repos.d [server1] name=server1 baseurl=file://home/sh/Packages/ enable=1 even this isn't good enough and I am able to install just once using this repo file then a random repo file will be ceated at the directory and take precedence and I should delete that file to do other installs what should I do ?
  18. hi all, when we implement the REDHAT based servers, when we dont have the proper license we will be facing a lot of issues for installing the softwares. So to overcome the issue we need to setup the LOCAL REPOSITORY server. this will eliminate the installation issues.Below i have explained how to setup the repo server step-by-step. SETTING UP LOCAL REPOSITORY SERVER IN YOUR REDHAT/CENTOS: PREREQUISITES: 1.HTTPD SERVER 2.CREATEREPO RPM 1. Create a new file under /var/www/html CMD: mkdir -p /var/www/html/REPO/RH5 2.Copy all the contents from the DVD to RH5 folder ,which we created. CMD: cp -v /media/RHEL5/Server/*.rpm /var/www/html/REPO/RH5 3.after completing the copy operation install the createrepo rpm. CMD: rpm -ivh createrepo.<version> 4.then execute the following command CMD: createrepo -v /var/www/html/REPO/RH5 5.When createrepo operation finished go to /etc folder CMD: cd /etc 6.then edit the yum.conf file through vi/vim editor CMD: vi yum.conf 7.place the following lines into your client machine yum.conf file. [my_localrepo] baseurl=[Hidden Content] address>/REPO/RH5 8.Check whether HTTPD daemon running by issuing the following command CMD: service httpd status ( if not running) CMD: service httpd start 9.To permanently make effect run the following command CMD: chkconfig --level 35 httpd on 10.to check the repository issue the following command CMD: yum install <your package name> if not happening clean all the yum repository cache CMD: yum clean all and also don't forget to import the GPG keys CMD: rpm --import <GPG-KEYS-LOCATION>
  19. [Hidden Content] [Hidden Content] [Hidden Content] Can anyone help me with these please?
  20. i am creating a small skype group to focus on unique redhat exams and study. im looking for 5-10 peers who are really interested to take redhat RHCSA,RHCE :Devops, openstack exams. if anyone interested comment below. thanks
  21. dsgb


    Has anybody taken the EX342 lately?
  22. Hello, this is my litlle contribution, how install redhat 6.4 text install in virtualbox [Hidden Content] best regards
  23. Hi guys its nice to meet everyone here i'm Linux user, fraichely certified RHCSA, i want to share my experience with this community. Best regards
  24. hello i have pass ex200 examen and got it whit 260point/300 in April 2014 this is some question: --configuration hostname --configuration ip addresse; DNS; Gateway --configuration yum repository for instructor --LVM create PV ... --Extend LV --create extention for SWAP and automount --install web serveur, ftp serveur --AutoFS ...Good luck
  25. I am a beginner at Red Hat and linux overall, I was trying to follow CBT series where the instructor tried to install a really old 90s program that displays images, I did just the same, except I found missing dependencies error, and I looked up the dependencies and downloaded them, when I install them I get another error, sometihng like transaction error, I'm sorry for being a beginner and having not so good English, isn't my first language Can anyone help me? I'm running it on vmware, could that be the problem?
  • Create New...