|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
Create high availability clusters to enhance system performance
using CentOS 7 About This Book * Master the concepts of high
performance and high availability to eliminate performance
bottlenecks * Maximize the uptime of services running in a CentOS 7
cluster * A step-by-step guide that will provide knowledge of
methods and approaches to optimize the performance of CentOS
clusters Who This Book Is For This book is targeted at system
administrators: those who want a detailed, step-by-step guide to
learn how to set up a high-availability CentOS 7 cluster, and those
who are looking for a reference book to help them learn or refresh
the necessary skills to ensure their systems and respective
resources are utilized optimally. No previous knowledge of
high-availability systems is needed, though the reader is expected
to have at least some degree of familiarity with any spin-off of
the Fedora family of Linux distributions, preferably CentOS. What
You Will Learn * Install a CentOS 7 cluster and network
infrastructure * Configure firewall, networking, and clustering
services and settings * Set up and test a HAC (high-availability
cluster) to host an Apache web server and a MariaDB database server
* Monitor performance and availability * Identify bottlenecks and
troubleshoot issues * Improve performance and ensure high
availability In Detail CentOS is the enterprise level Linux OS,
which is 100% binary compatible to Red Hat Enterprise Linux (RHEL).
It acts as a free alternative to RedHat's commercial Linux
offering, with only a change in the branding. A high performance
cluster consists in a group of computers that work together as one
set parallel, hence minimizing or eliminating the downtime of
critical services and enhancing the performance of the application.
Starting with the basic principles of clustering, you will learn
the necessary steps to install a cluster with two CentOS 7 servers.
We will then set up and configure the basic required network
infrastructure and clustering services. Further, you will learn how
to take a proactive approach to the split-brain issue by
configuring the failover and fencing of the cluster as a whole and
the quorum of each node individually. Further, we will be setting
up HAC and HPC clusters as a web server and a database server. You
will also master the art of monitoring performance and
availability, identifying bottlenecks, and exploring
troubleshooting techniques. At the end of the book, you'll review
performance-tuning techniques for the recently installed cluster,
test performance using a payload simulation, and learn the
necessary skills to ensure that the systems, and the corresponding
resources and services, are being utilized to their best capacity.
Style and approach An easy-to-follow and step-by-step guide with
hands-on instructions to set up real-world simple cluster scenarios
that will start you on the path to building more complex
applications on your own.
Get acquainted with the world of LXC About This Book * Get the most
practical and up-to-date resource on LXC and take full advantage of
what Linux containers can offer in the day-to-day operations of
large-scale applications * Learn how to deploy and administer
various workloads such as web applications inside LXC * Save your
organization time and money by building robust and secure
containers and by speeding the deployment process of your software
Who This Book Is For This book is for Linux engineers and software
developers who are looking to deploy applications in a fast,
secure, and scalable way for use in testing and production. What
You Will Learn * Deep dive into the foundations of Linux containers
with kernel namespaces and cgroups * Install, configure, and
administer Linux containers with LXC and libvirt * Begin writing
applications using Python libvirt bindings * Take an in-depth look
at container networking * Set up monitoring and security with LXC *
Build and deploy a highly available application with LXC in the
cloud In Detail In recent years, containers have gained wide
adoption by businesses running a variety of application loads. This
became possible largely due to the advent of kernel namespaces and
better resource management with control groups (cgroups). Linux
containers (LXC) are a direct implementation of those kernel
features that provide operating system level virtualization without
the overhead of a hypervisor layer. This book starts by introducing
the foundational concepts behind the implementation of LXC, then
moves into the practical aspects of installing and configuring LXC
containers. Moving on, you will explore container networking,
security, and backups. You will also learn how to deploy LXC with
technologies like Open Stack and Vagrant. By the end of the book,
you will have a solid grasp of how LXC is implemented and how to
run production applications in a highly available and scalable way.
Style and approach A practical guide that introduces the core
technologies behind Linux containers and provides a deep dive into
installation, configuration, and operations of LXC.
Master the Powerful Management Tools of Oracle Solaris 11.2 Govern
a reliable and secure enterprise cloud computing infrastructure
using the detailed information contained in this Oracle Press
guide. Oracle Solaris 11 System Administration Handbook offers
end-to-end deployment, configuration, and management instruction.
Find out how to install and update Oracle Solaris 11.2, migrate
data and applications, build bare-metal and virtual networks, and
tune performance. This comprehensive resource fully explains new
features, including OpenStack cloud support, Unified Archive
provisioning, and Oracle Solaris Zones. * Install Oracle Solaris
11.2 on SPARC and x86 systems * Virtualize and sandbox applications
with Oracle Solaris Zones * Handle the complete software lifecycle
to ensure systems are appropriately patched * Create both physical
and virtual networks and control bandwidth * Implement reliable,
secure infrastructure with automated compliance reporting * Install
software from pre-configured Unified Archives or custom IPS
repositories * Manage configuration on a large scale with SMF,
Puppet, and RAD * Administer cloud-based compute, storage, and
networking resources using OpenStack
Unleash the power of shell scripts to solve real-world problems by
breaking through the practice of writing tedious code About This
Book * Learn how to efficiently and effectively build shell scripts
and develop advanced applications with this handy book * Develop
high quality and efficient solutions by writing professional and
real-world scripts, and debug scripts by checking and shell tracing
* A step-by-step tutorial to automate routine tasks by developing
scripts from a basic level to very advanced functionality Who This
Book Is For This book is ideal for those who are proficient at
working with Linux and who want to learn about shell scripting to
improve their efficiency and practical skills. By the end of this
book, you will be able to confidently use your own shell scripts in
the real world. What You Will Learn * Familiarize yourself with the
various text filtering tools available in Linux * Combine the
fundamental text and file processing commands to process data and
automate repetitive tasks * Understand expressions and variables
and how to use them practically * Automate decision-making and save
a lot of time and effort of revisiting code * Get to grips with
advanced functionality such as using traps and signals and using
dialogs to develop screens * Start up a system and customize a
Linux system * Take an in-depth look at regular expressions and
pattern matching to understand the capabilities of scripting In
Detail Linux is the one of the most powerful and universally
adopted OSes. Shell is a program that gives the user direct
interaction with the operating system. Scripts are collections of
commands that are stored in a file. The shell can read this file
and act on the commands as if they were typed on the keyboard.
Shell scripting is used to automate day-to-day administration, and
for testing or product development tasks. This book covers Bash,
GNU Bourne Again SHell, preparing you to work in the exciting world
of Linux shell scripting. We start with an introduction to the
Shell environment and explain basic commands used in Shell. Next we
move on to check, kill, and control the execution of processes in
Linux OS. Further, we teach you about the filter tools available in
Linux and explain standard output and standard errors devices. Then
we will ensure you understand Shell's interpretation of commands
and get a firmer grasp so you use them in practice. Next, you'll
experience some real-world essentials such as debugging and perform
Shell arithmetic fluently. Then you'll take a step ahead and learn
new and advanced topics in Shell scripting, such as starting up a
system and customizing a Linux system. Finally, you'll get to
understand the capabilities of scripting and learn about Grep,
Stream Editor, and Awk. Style and approach This practical book will
go from the very basics of shell scripting to complex, customized
automation. The idea behind this book is to be as practical as
possible and give you the look and feel of what real-world
scripting is like.
Acquire skills to manage your IT infrastructure effectively with
Puppet About This Book * Breeze through Puppet 4's key features and
performance improvements to bring real advantage to your IT
infrastructure * Discover Puppet best practices to help you avoid
common mistakes and pitfalls * Blitz through easy-to-follow
examples to get to grips with Puppet and succeed with everyday IT
automation Who This Book Is For If you're an experienced IT
professional and a new Puppet user, this book will provide you with
all you need to know to go from installation to advanced automation
in no time at all. Get a rapid introduction to the essential topics
and then tackle Puppet for advanced automation. What You Will Learn
* Write and employ individual Puppet manifests * Understand how
Puppet implements system abstraction * Deploy the Puppet master and
agents * Leverage and extend Facter to summarize your systems *
Create modular and reusable Puppet code * Extend your code base
with publicly available Puppet modules * Use the modern features of
Puppet 4 * Separate logic from data using Hiera In Detail Puppet is
a configuration management tool that allows you to automate all
your IT configurations, giving you control over what you do to each
Puppet Agent in a network, and when and how you do it. In this age
of digital delivery and ubiquitous Internet presence, it's becoming
increasingly important to implement scalable and portable
solutions, not only in terms of software, but also the systems that
run it. The free Ruby-based tool Puppet has established itself as
the most successful solution to manage any IT infrastructure.
Ranging from local development environments through complex data
center setups to scalable cloud implementations, Puppet allows you
to handle them all with a unified approach. Puppet 4 Essentials,
Second Edition gets you started rapidly and intuitively as you'll
put Puppet's tools to work right away. It will also highlight the
changes associated with performance improvements as well as the new
language features in Puppet 4. We'll start with a quick
introduction to Puppet to get you managing your IT systems quickly.
You will then learn about the Puppet Agent that comes with an
all-in-one (AIO) package and can run on multiple systems. Next,
we'll show you the Puppet Server for high-performance communication
and passenger packages. As you progress through the book, the
innovative structure and approach of Puppet will be explained with
powerful use cases. The difficulties that are inherent to a complex
and powerful tool will no longer be a problem for you as you
discover Puppet's fascinating intricacies. By the end of the book,
you will not only know how to use Puppet, but also its companion
tools Facter and Hiera, and will be able to leverage the
flexibility and expressive power implemented by their tool chain.
Style and approach This quick learning guide for Puppet follows a
practical approach, starting with some basic commands that you can
use from the shell right away. It comprises a series of examples
that will get you familiar with the most important aspects of
Puppet in a flash.
Learn shell scripting to solve complex shell-related problems and
to efficiently automate your day-to-day tasks About This Book *
Familiarize yourself with the terminal by learning about powerful
shell features * Automate tasks by writing shell scripts for
repetitive work * Packed with easy-to-follow, hands-on examples to
help you write any type of shell script with confidence Who This
Book Is For This book is aimed at administrators and those who have
a basic knowledge of shell scripting and who want to learn how to
get the most out of writing shell scripts. What You Will Learn *
Write effective shell scripts easily * Perform search operations
and manipulate large text data with a single shell command *
Modularize reusable shell scripts by creating shell libraries *
Redirect input, output, and errors of a command or script execution
to other streams * Debug code with different shell debugging
techniques to make your scripts bug-free * Manage processes, along
with the environment variables needed to execute them properly *
Execute and embed other languages in your scripts * Manage
creation, deletion, and search operations in files In Detail Shell
scripting is a quick method to prototype complex applications or
problems. Shell scripts are a collection of commands to automate
tasks, usually those for which the user has a repeated need, when
working on Linux-based systems. Using simple commands or a
combination of them in a shell can solve complex problems easily.
This book starts with the basics, including essential commands that
can be executed on Linux systems to perform tasks within a few
nanoseconds. You'll learn to use outputs from commands and
transform them to show the data you require. Discover how to write
shell scripts easily, execute script files, debug, and handle
errors. Next, you'll explore environment variables in shell
programming and learn how to customize them and add a new
environment. Finally, the book walks you through processes and how
these interact with your shell scripts, along with how to use
scripts to automate tasks and how to embed other languages and
execute them. Style and approach This book is a pragmatic guide to
writing efficient shell programs, complete with hands-on examples
and tips.
Shell scripts are an efficient way to interact with your machine
and manage your files and system operations. With just a few lines
of code, your computer will do exactly what you want it to do. But
you can also use shell scripts for many other essential (and
not-so-essential) tasks. This second edition of Wicked Cool Shell
Scripts offers a collection of useful, customizable, and fun shell
scripts for solving common problems and personalizing your
computing environment. Each chapter contains ready-to-use scripts
and explanations of how they work, why you'd want to use them, and
suggestions for changing and expanding them. You'll find a mix of
classic favorites, like a disk backup utility that keeps your files
safe when your system crashes, a password manager, a weather
tracker, and several games, as well as 23 brand-new scripts,
including: ZIP code lookup tool that reports the city and state
Bitcoin address information retriever suite of tools for working
with cloud services lik
Make life at the office easier for server administrators by helping
them build resilient Ubuntu server systems About This Book * Tackle
the issues you come across in keeping your Ubuntu server up and
running * Build server machines and troubleshoot cloud computing
related issues using Open Stack * Discover tips and best practices
to be followed for minimum maintenance of Ubuntu Server 3 Who This
Book Is For This book is for a vast audience of Linux system
administrators who primarily work on Debian-based systems and spend
long hours trying fix issues with the enterprise server. Ubuntu is
already one of the most popular OSes and this book targets the most
common issues that most administrators have to deal with. With the
right tools and definite solutions, you will be able to keep your
Ubuntu servers in the pink of health. What You Will Learn * Deploy
packages and their dependencies with repositories * Set up your own
DNS and network for Ubuntu Server * Authenticate and validate users
and their access to various systems and services * Maintain,
monitor, and optimize your server resources and avoid tremendous
load * Get to know about processes, assigning and changing
priorities, and running processes in background * Optimize your
shell with tools and provide users with an improved shell
experience * Set up separate environments for various services and
run them safely in isolation * Understand, build, and deploy
OpenStack on your Ubuntu Server In Detail Ubuntu is becoming one of
the favorite Linux flavors for many enterprises and is being
adopted to a large extent. It supports a wide variety of common
network systems and the use of standard Internet services including
file serving, e-mail, Web, DNS, and database management. A large
scale use and implementation of Ubuntu on servers has given rise to
a vast army of Linux administrators who battle it out day in and
day out to make sure the systems are in the right frame of
operation and pre-empt any untoward incidents that may result in
catastrophes for the businesses using it. Despite all these
efforts, glitches and bugs occur that affect Ubuntu server's
network, memory, application, and hardware and also generate cloud
computing related issues using OpenStack. This book will help you
end to end. Right from setting up your new Ubuntu Server to
learning the best practices to host OpenStack without any hassles.
You will be able to control the priority of jobs, restrict or allow
access users to certain services, deploy packages, tackle issues
related to server effectively, and reduce downtime. Also, you will
learn to set up OpenStack, and manage and monitor its services
while tuning the machine with best practices. You will also get to
know about Virtualization to make services serve users better.
Chapter by chapter, you will learn to add new features and
functionalities and make your Ubuntu server a full-fledged,
production-ready system. Style and approach This book contains
topic-by-topic discussion in an easy-to-understand language with
loads of examples to help you take care of Ubuntu Server. Plenty of
screenshots will guide you through a step-by-step approach.
Kali Linux: a complete pentesting toolkit facilitating smooth
backtracking for working hackers About This Book * Conduct network
testing, surveillance, pen testing and forensics on MS Windows
using Kali Linux * Footprint, monitor, and audit your network and
investigate any ongoing infestations * Customize Kali Linux with
this professional guide so it becomes your pen testing toolkit Who
This Book Is For If you are a working ethical hacker who is looking
to expand the offensive skillset with a thorough understanding of
Kali Linux, then this is the book for you. Prior knowledge about
Linux operating systems and the BASH terminal emulator along with
Windows desktop and command line would be highly beneficial. What
You Will Learn * Set up Kali Linux for pen testing * Map and
enumerate your Windows network * Exploit several common Windows
network vulnerabilities * Attack and defeat password schemes on
Windows * Debug and reverse-engineer Windows programs * Recover
lost files, investigate successful hacks and discover hidden data
in innocent-looking files * Catch and hold admin rights on the
network, and maintain backdoors on the network after your initial
testing is done In Detail Microsoft Windows is one of the two most
common OS and managing its security has spawned the discipline of
IT security. Kali Linux is the premier platform for testing and
maintaining Windows security. Kali is built on the Debian
distribution of Linux and shares the legendary stability of that
OS. This lets you focus on using the network penetration, password
cracking, forensics tools and not the OS. This book has the most
advanced tools and techniques to reproduce the methods used by
sophisticated hackers to make you an expert in Kali Linux
penetration testing. First, you are introduced to Kali's top ten
tools and other useful reporting tools. Then, you will find your
way around your target network and determine known vulnerabilities
to be able to exploit a system remotely. Next, you will prove that
the vulnerabilities you have found are real and exploitable. You
will learn to use tools in seven categories of exploitation tools.
Further, you perform web access exploits using tools like websploit
and more. Security is only as strong as the weakest link in the
chain. Passwords are often that weak link. Thus, you learn about
password attacks that can be used in concert with other approaches
to break into and own a network. Moreover, you come to terms with
network sniffing, which helps you understand which users are using
services you can exploit, and IP spoofing, which can be used to
poison a system's DNS cache. Once you gain access to a machine or
network, maintaining access is important. Thus, you not only learn
penetrating in the machine you also learn Windows privilege's
escalations. With easy to follow step-by-step instructions and
support images, you will be able to quickly pen test your system
and network. Style and approach This book is a hands-on guide for
Kali Linux pen testing. This book will provide all the practical
knowledge needed to test your network's security using a proven
hacker's methodology. The book uses easy-to-understand yet
professional language for explaining concepts.
Build your defense against web attacks with Kali Linux 2.0 About
This Book * Gain a deep understanding of the flaws in web
applications and exploit them in a practical manner * Get hands-on
web application hacking experience with a range of tools in Kali
Linux 2.0 * Develop the practical skills required to master
multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For
If you are already working as a network penetration tester and want
to expand your knowledge of web application hacking, then this book
tailored for you. Those who are interested in learning more about
the Kali Sana tools that are used to test web applications will
find this book a thoroughly useful and interesting guide. What You
Will Learn * Set up your lab with Kali Linux 2.0 * Identify the
difference between hacking a web application and network hacking *
Understand the different techniques used to identify the flavor of
web applications * Expose vulnerabilities present in web servers
and their applications using server-side attacks * Use SQL and
cross-site scripting (XSS) attacks * Check for XSS flaws using the
burp suite proxy * Find out about the mitigation techniques used to
negate the effects of the Injection and Blind SQL attacks In Detail
Kali Linux 2.0 is the new generation of the industry-leading
BackTrack Linux penetration testing and security auditing Linux
distribution. It contains several hundred tools aimed at various
information security tasks such as penetration testing, forensics,
and reverse engineering. At the beginning of the book, you will be
introduced to the concepts of hacking and penetration testing and
will get to know about the tools used in Kali Linux 2.0 that relate
to web application hacking. Then, you will gain a deep
understanding of SQL and command injection flaws and ways to
exploit the flaws. Moving on, you will get to know more about
scripting and input validation flaws, AJAX, and the security issues
related to AJAX. At the end of the book, you will use an automated
technique called fuzzing to be able to identify flaws in a web
application. Finally, you will understand the web application
vulnerabilities and the ways in which they can be exploited using
the tools in Kali Linux 2.0. Style and approach This step-by-step
guide covers each topic with detailed practical examples. Every
concept is explained with the help of illustrations using the tools
available in Kali Linux 2.0.
|
|