Red Hat Enterprise System Administration
Jump to: Level One / Level Two / Kubernetes / Docker
RED HAT ENTERPRISE SYSTEM ADMINISTRATION – LEVEL ONE COURSE OUTLINE
COURSE DURATION: 5 DAYS
The topics covered include essential command line tools, installing RHEL, remote administration techniques, managing local storage, system monitoring, basic user and security, administration, connecting to a network and deploying FTP and Web servers.
Prerequisites:
Students must be proficient in general computing skills but not necessarily experienced with Linux or Unix.
Supported Distributions:
Red Hat Enterprise Linux 8
Course Outline:
1. ACCESS THE COMMAND LINE
1. Components of a Distribution
2. Red Hat Linux Products
3. Logging In
4. Running Programs
5. Interacting with Command Line
6. Desktop Environments
7. GNOME
8. got root?
9. Switching User Contexts
10. sudo
11. Login and Discovery
12. Switching Users With su
2. MANAGE FILES FROM THE COMMAND LINE
1. Managing Files Graphically
2. Drag and drop with Nautilus
3. Physical Unix File Structure
4. Unix/Linux Filesystem Features
5. Navigating the Filesystem
6. Displaying Directory Contents
7. Directory Manipulation
8. File Manipulation
9. Deleting and Creating Files
10. Filesystem Links
11. Navigating Directories and Listing Files
12. Manipulating Files and Directories
3. GET HELP IN A TEXTUAL ENVIRONMENT
1. Gathering Login Session Info
2. Red Hat Online Documentation
3. Getting Help Within the Graphical Desktop
4. Gathering System Info
5. Help from Commands and Documentation
6. Getting Help with man & info
7. $MANPATH, whatis and apropos
8. Help with Commands
4. CREATE, VIEW, AND EDIT TEXT FILES
1. The gedit Text Editor
2. Pico/GNU Nano
3. Pico/Nano Interface
4. Nano configuration
5. Pico/Nano Shortcuts
6. Communication Channels
7. File Redirection
8. Piping Commands Together
9. The Streaming Editor
10. Text Processing with Awk
11. Producing File Statistics
12. Replacing Text Characters
13. Text Sorting
14. Duplicate Removal Utility
15. Extracting Columns of Text
16. Combining Files and Merging Text
17. Comparing File Changes
18. Text Editing with Nano
19. Text Processing
5. MANAGE LOCAL LINUX USERS AND GROUPS
1. User and Group Concepts
2. User Administration
3. Modifying Accounts
4. Group Administration
5. User Private Group Scheme
6. Password Aging
7. User and Group Administration
8. User Private Groups
6. CONTROL ACCESS TO FILES WITH LINUX FILE SYSTEM PERMISSIONS
1. File Ownership
2. File and Directory Permissions
3. SUID and SGID on files
4. SGID and Sticky Bit on Directories
5. Changing File Permissions
6. File and Directory Ownership and Permissions
7. MONITOR AND MANAGE LINUX PROCESSES
1. What is a Process?
2. Process States
3. Viewing Processes
4. System Status – CPU
5. System Status – Memory
6. Signals
7. Tools to Send Signals
8. Managing Processes
9. Tuning Process Scheduling
10. Job Control Overview
11. Job Control Commands
12. Job Control Basics
13. Process Management Basics
8. CONTROL SERVICES AND DAEMONS
1. init
2. Linux Runlevels Aliases
3. systemd System and Service Manager
4. systemd Targets
5. Using systemd
6. Legacy Support for SysV init
7. Managing Services With Systemd's systemctl
8. Creating a systemd unit file
9. CONFIGURE AND SECURE OPENSSH SERVICE
1. Secure Shell
2. OpenSSH Client & Server Configuration
3. Accessing Remote Shells
4. Transferring Files
5. Alternative sftp Clients
6. SSH Key Management
7. ssh-agent
8. Introduction to ssh and scp
9. SSH Key-based User Authentication
10. Using ssh-agent
10. ANALYZING AND STORING LOGS
1. System Logging
2. systemd Journal
3. systemd Journal's journalctl
4. Secure Logging with Journal's Log Sealing
5. Cockpit - Logs
6. Syslog-ng
7. Rsyslog
8. /etc/rsyslog.conf
9. Log Management
10. Log Anomaly Detector
11. Hardware and System Clock
12. Time Synchronization with Chronyd
13. Using the systemd Journal
14. Setting up a Full Debug Logfile
15. Remote Syslog Configuration
11. MANAGE RED HAT ENTERPRISE LINUX NETWORKING
1. IPv4 Fundamentals
2. TCP/UDP Fundamentals
3. IPv6
4. Linux Network Interfaces
5. Ethernet Hardware Tools
6. Network Configuration with ip Command
7. Starting and Stopping Interfaces
8. Configuring Routing Tables
9. IP to MAC Address Mapping with ARP
10. DNS Clients
11. DHCP Clients
12. Continual Time Sync with NTP
13. Network Diagnostics
14. NetworkManager
15. Network Discovery
16. Basic Client Networking
17. Introduction to Troubleshooting Labs
18. Troubleshooting Practice: Networking
12. ARCHIVE AND COPY FILES BETWEEN SYSTEMS
1. Archives with tar
2. Archives with cpio
3. The gzip Compression Utility
4. The bzip2 Compression Utility
5. The XZ Compression Utility
6. The PKZIP Archiving/Compression format
7. Archiving and Compression
8. Using rsync and ssh for Backups
13. INSTALL AND UPDATE SOFTWARE PACKAGES
1. Managing Software
2. RPM Features
3. RPM Architecture
4. RPM Package Files
5. Working With RPMs
6. Querying and Verifying with RPM
7. Managing Software Dependencies
8. Using the Yum & DNF commands
9. Yum package groups
10. Updating the Kernel RPM
11. Dealing With RPM & Yum Digest Changes
12. DNF Repositories
13. DNF Repository Groups
14. DNF Plugins & RHSM Subscription Manager
15. DNF Version Lock Plugin
16. Managing Software with RPM
17. Querying the RPM Database
18. Using Yum
14. ACCESS LINUX FILE SYSTEMS
1. Filesystem Creation
2. Mounting Filesystems
3. Mounting Filesystems
4. Filesystem Maintenance
5. Managing an XFS Filesystem
6. Persistent Block Devices
7. Filesystem Structures
8. Determining Disk Usage With df and du
9. Filesystem Table (/etc/fstab)
10. Creating and Managing Filesystems
15. MANAGE VIRTUAL MACHINES
1. Introducing libvirt
2. libvirt: Basic Concepts
3. libvirt: Storage Architecture
4. libvirt: Network Architecture
5. libvirt: Graphical Tools
6. libvirt: Command Line Tools
7. virsh: Basics
8. virsh: Common Tasks
9. virt-install
10. Virtual Machine Guest Tools & Drivers
11. libguestfs and guestfish
12. Installing a Virtual Machine
16. COMPREHENSIVE REVIEW
1. System Administration I
2. Understand And Use Essential Tools
3. Operate Running Systems
4. Users, Groups, and File Permissions
RED HAT ENTERPRISE SYSTEM ADMINISTRATION – LEVEL TWO COURSE OUTLINE
COURSE DURATION: 5 DAYS
The topics covered include automating installation with Kickstart, intermediate and advanced level command line building blocks and tools, troubleshooting, network file sharing server configuration, connecting to a directory service, managing advanced security settings, maintenance tasks, and kernel tuning.
Note: This course, along with Red Hat System Administration Level One, prepares students for the RHCSA Red Hat Certified System Administrator exam EX-200.
Prerequisites:
Red Hat System Administration Level One or equivalent industry experience.
Course Outline:
1. AUTOMATED INSTALLATION WITH KICKSTART
1. Kickstart
2. Anaconda: An Overview
3. Anaconda: Booting the System
4. Anaconda: Common Boot Options
5. Anaconda: Loading Anaconda and Packages
6. Anaconda: Storage Options
7. Anaconda: Troubleshooting
8. Linux Installation
9. Automating Installation with Kickstart
2. USE REGULAR EXPRESSIONS WITH GREP
1. Searching Inside Files
2. The Streaming Editor
3. Regular Expression Overview
4. Regular Expression Implementations
5. Regular Expressions
6. RE Character Classes
7. Regex Quantifiers
8. RE Parenthesis
9. Pattern Matching with Regular Expressions
10. Extended Regular Expressions
11. Using Regular Expressions With sed
3. CREATE AND EDIT TEXT FILES WITH VIM
1. Text Editing
2. vi and Vim
3. Learning Vim
4. Basic vi
5. Intermediate vi
6. Text Editing with Vim
4. SCHEDULE FUTURE LINUX TASKS
1. Automating Tasks
2. at/batch
3. cron
4. The crontab Command
5. crontab Format
6. /etc/cron.*/ Directories
7. Anacron
8. Systemd Timers
9. Creating and Managing User Cron Jobs
10. Adding System cron Jobs
5. MANAGE PRIORITY OF LINUX PROCESSES
1. Viewing Processes
2. Managing Processes
3. Tuning Process Scheduling
4. Process Management Basics
6. CONTROL ACCESS TO FILES WITH ACCESS CONTROL LISTS (ACL)
1. File and Directory Permissions
2. File Access Control Lists
3. Manipulating FACLs
4. Viewing FACLs
5. Backing Up FACLs
6. Using Filesystem ACLs
7. MANAGE SELINUX SECURITY
1. SELinux Security Framework
2. SELinux Modes
3. SELinux Commands
4. Choosing an SELinux Policy
5. SELinux Booleans
6. Permissive Domains
7. SELinux Policy Tools
8. SELinux Troubleshooting
9. SELinux Troubleshooting Continued
10. Exploring SELinux Modes
11. SELinux File Contexts
8. CONNECT TO NETWORK-DEFINED USERS AND GROUPS
1. RHEL DS Client Configuration
2. System Security Services Daemon (SSSD)
3. Using LDAP for Centralized User Accounts
9. ADD DISKS, PARTITIONS, AND FILE SYSTEMS TO A LINUX SYSTEM
1. Partitioning Disks with fdisk & gdisk
2. Resizing a GPT Partition with gdisk
3. Partitioning Disks with parted
4. Non-Interactive Disk Partitioning with sfdisk
5. Filesystem Creation
6. Filesystem Maintenance
7. Managing an XFS Filesystem
8. Swap
9. Creating and Managing Filesystems
10. Hot Adding Swap
10. MANAGE LOGICAL VOLUME MANAGEMENT (LVM) STORAGE
1. Logical Volume Management
2. Implementing LVM
3. Creating Logical Volumes
4. Activating LVM VGs
5. Exporting and Importing a VG
6. Examining LVM Components
7. Changing LVM Components
8. Advanced LVM Overview
9. Advanced LVM: Components & Object Tags
10. Advanced LVM: Automated Storage Tiering
11. Advanced LVM: Thin Provisioning
12. Advanced LVM: Striping & Mirroring
13. Advanced LVM: RAID Volumes
14. Creating and Managing LVM Volumes
11. ACCESS NETWORKED ATTACHED STORAGE WITH NETWORK FILE SYSTEM (NFS)
1. File Sharing via NFS
2. NFSv4+
3. NFS Clients
4. NFS
5. NFS Server Configuration
6. NFS Server Configuration
12. ACCESS NETWORKED ATTACHED STORAGE WITH SMB
1. Accessing Windows/Samba Shares from Linux
2. AutoFS
3. AutoFS Configuration
4. Using autofs
13. CONTROL AND TROUBLESHOOT THE RED HAT ENTERPRISE LINUX BOOT PROCESS
1. System Boot Method Overview
2. systemd System and Service Manager
3. Modifying systemd services
4. Systemd Service Sandboxing Features
5. systemd Targets
6. Using systemd
7. Legacy Support for SysV init
8. Booting Linux on PCs
9. GRUB 2
10. GRUB 2 Configuration
11. The Boot Loader Specification
12. GRUB 2 Security
13. Boot Parameters
14. Initial RAM Filesystem
15. init
16. Linux Runlevels Aliases
17. Systemd local-fs.target and sysinit.target
18. Systemd basic.target and multi-user.target
19. Legacy local bootup script support
20. System Configuration Files
21. RHEL8 Configuration Utilities
22. Shutdown and Reboot
23. Boot Process
24. Booting directly to a bash shell
25. GRUB Command Line
26. Basic GRUB Security
27. Managing Services With Systemd's systemctl
28. Creating a systemd unit file
29. Troubleshooting Practice: Boot Process
14. LINUX NETWORK COMMUNICATION WITH FIREWALL
1. Netfilter: Stateful Packet Filter Firewall
2. Netfilter Concepts
3. Using the iptables Command
4. Netfilter Rule Syntax
5. Targets
6. Common match_specs
7. Extended Packet Matching Modules
8. Connection Tracking
9. FirewallD
10. Securing Services with Netfilter
11. FirewallD
15. CONTAINER TECHNOLOGY OVERVIEW
1. Container Fundamentals
2. Daemonless Containers
3. Podman
4. Podman Configuration
5. Podman Images
6. Podman Volumes
7. Podman Networking
8. Rootless Podman
9. Podman and Pods
10. Building Images with Buildah
11. Managing Images with Skopeo
12. Podman
13. Podman Networking
14. Podman and Pods
16. COMPREHENSIVE REVIEW
1. System Administration II
2. Understand And Use Essential Tools
3. Operate Running Systems
4. Configure Local Storage and Filesystems
5. Users, Groups, and File Permissions
6. Maintenance and Recovery
Kubernetes for App Developers
3 days
This course presents the components that are used when building applications to run in a Kubernetes cluster, running on both on-premise systems and in the AWS Elastic Kubernetes Service (EKS). Monitoring resource usage and troubleshooting these types of applications will also be covered.
What you will learn:
- How to use a Linux system (configure and run Kubernetes tools)
- Architecture of Kubernetes clusters
- Components of Kubernetes clusters
- How to build Kubernetes clusters: Terraform, Rancher, Ansible
- Application considerations for execution in Kubernetes
- How to package, distribute and manage applications via Helm charts
Course Outline
Linux System Administration Essentials
- Using the root account
- Managing RHEL software
- rpm command
- dnf command
- systemd service controls
Container Operations Review
Docker
- components and operations
- build (and hosting a local repository)
- run
- detach, attach, stop
- networking
- security considerations and features
Podman
- architecture
- retrieving and building image
- persistent storage
- automating container startup with systemd
- multi-container pods
- sidecar and adapter type containers
- managing resource usage
- liveness and readiness probes
Kubernetes - Part 1
- containers management
- cluster management
- Kubernetes history
- Kubernetes capabilities
- Kubernetes architecture
- Kubernetes architecture - control plane
- Kubernetes architecture - nodes
- Kubernetes architecture - pods
Kubernetes - Part 2
- design
- multi-container pods
- sidecar container
- adapter container
- ambassador
Kubernetes cluster (on-premise)
- installation overview
- kubectl installation - binary
- cluster components installation
- control plane initialization
- worker node initialization
Rancher
Kubernetes cluster (cloud)
- Terraform
- AWS EKS cluster creation
- worker nodes
- Ansible
- AWS EKS cluster creation
- worker nodes
Using Kubernetes (deployments)
- pods
- namespaces
- volumes
- sharing
- persistent
- secrets
- dashboard
- rollbacks
Helm Charts
- charts overview
- charts operations
- creation
- execution
Security
- authentication and authorization
- RBAC
- network policies
Troubleshooting
- basic steps
- flow
- pods
- nodes (and access)
- monitoring
- logs
Docker with Kubernetes Administration
5 days
Docker is a software platform that allows you to build, test, and deploy applications quickly. Docker packages software into standardized containers that have everything the software needs to run including libraries, system tools, code, and runtime. Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. You learn about the parts of the Kubernetes system and the abstractions Kubernetes uses to represent your cluster, and helps you obtain a deeper understanding of how Kubernetes works. This combined Docker/Kubernetes hands-on class will not include any exam prep or certification exam.
What you will learn:
- How to create and manage containers with Docker (and Podman)
- How to create and manage Kubernetes clusters, both on-premise and cloud-based
- How to manage Kubernetes with K9s and Rancher (products)
Course Outline
Introduction to Containers
Introduction to Docker
- traditional kernel-based O/S
- virtualized O/S
- container concepts
- container terminology
- container usage
Docker components
Docker repository information
Installing Docker components
Docker components operations
Docker operations overview
- Docker - build
- Docker - run
- Docker - detach, attach, stop
- networking
Docker Compose
Data Persistence
Using Red Hat Podman
- Podman architecture
- Podman- retrieving an image
- persistent storage
- automating container startup with systemd
Introduction to Kubernetes
- containers management
- cluster management
- Kubernetes history
- Kubernetes capabilities
- Kubernetes architecture
- Kubernetes architecture - control plane
- Kubernetes architecture - nodes
- Kubernetes architecture - pods
Installing Kubernetes (on-premise)
Kubernetes operating system support
Kubernetes installation overview
- Kubernetes kubectl installation - binary
- Kubernetes cluster components installation
- Kubernetes control plane initialization
- Kubernetes worker node initialization
Using Kubernetes
- Kubernetes - pods
- Kubernetes - namespaces
- Kubernetes – dashboard
Using Kubernetes K9s
- open source tool installation
- using the provided TUI to manage clusters / pods
Introduction to Rancher
- Rancher cluster creation methods
- Installing and Using Rancher (on-premise)
- Kubernetes installation methods from Rancher
Managed Kubernetes Services (cloud)
- unmanaged vs managed services
- benefits of managed services
Leading managed Kubernetes services
- Amazon EKS
- Terraform
- Azure AKS
- BoxBoat BoxOps
- Ansible
Terraform and AWS EKS
- Terraform components - required_providers
- Terraform components - resources
- Terraform components - providers
- Terraform installation overview
- Terraform installation - binary
- Terraform components
- Terraform lifecycle
- Terraform commands
AWS provider for Terraform
- basic networking
- VPC setup
Introduction to CaC - Ansible
Ansible configuration management
- playbooks - syntax
- Ansible common account
- AWS EKS interface modules
- Terraform modules
Rancher Kubernetes Cluster (cloud)
- RKE Government
- Amazon EKS
- Azure AKS
- Google GKE
- Introduction to Helm
- architecture and ecosystem
Helm Components
- templates
- default templates
- Go templates
- charts
- chart repositories (local and commercial)
