Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)

Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer. Automating Linux and Unix System Administration, Second Edition is unique in its focus on how to make the system administrator’s job easier and more efficient: instead of just managing the system administrator’s time, the book explains the technology to automate repetitive tasks and the methodology to automate successfully.

  • Both new and seasoned professionals will profit from industry–leading insights into the automation process.
  • System administrators will attain a thorough grasp of cfengine, kickstart, and shell scripting for automation.
  • After reading all chapters and following all exercises in this book, the reader will be able to set up anything from a Linux datacenter to a small office network.

What you’ll learn

See how to make changes on many UNIX and Linux hosts at once in a reliable and repeatable manner.

  • Learn how to automate things correctly so you only have to do it once, by leveraging the authors’ experience in setting up small, medium, and large networks.
  • Set up a Linux datacenter or a network correctly.
  • Explore handling real–world environments where not all hosts are configured alike via a case study of a fictional new datacenter buildout.
  • Examine real–world examples for core infrastructure services (DNS, mail, monitoring, log analysis, security, cfengine, imaging) to build on in your environment.
  • Understand core system administration best practices, which are a key part of how cfengine and automations deployments are outlined in the book.
  • Learn how to make changes reversible, repeatable, and correct the first time through interaction with product/application stakeholders (programmers, product managers, customers, etc.).

Who is this book for?

This book is for Linux system administrators who want to learn about the software and methodology to automate repetitive tasks—regardless of network or datacenter size—in one place. System managers will also find it much easier to think about network technology and automation projects if they read this book. This book is also for anyone who is interested in repeatable and secure infrastructure.

About the Author

Kirk Bauer has been involved in computer programming since  1985. He has been using and administering UNIX systems since 1994.  Although his personal favorite UNIX variant is Linux, he has administered and developed on everything from FreeBSD to Solaris, AIX, and HP–UX. He is the author of various open source solutions such as Logwatch.

Kirk has been involved with software development and system/network administration since his first year at the Georgia Institute of Technology. He has done work for the Georgia Tech Research Institute, Fermi National Accelerator Laboratory, and DHL. In 2000, Kirk was one of the founders and the chief
technology officer of TogetherWeb, which was purchased in 2003 by Proficient Systems. Kirk is now a systems engineer with F5 Networks.

Kirk graduated from Georgia Tech in 2001 with a bachelor’s degree in computer engineering and is currently pursuing his MBA at Arizona State University. He lives in Peoria, Arizona, with his two dogs, and is looking forward to getting married to his lovely fiancé, Rachel.

(HTML tags aren't allowed.)

Mastering Clojure Data Analysis
Mastering Clojure Data Analysis

Leverage the power and fl exibility of Clojure through this practical guide to data analysis

About This Book

  • Explore the concept of data analysis using established scientific methods combined with the powerful Clojure language
  • Master Naive Bayesian Classification, Benford's Law, and...
Microsoft IIS 6.0: Administrator's Pocket Consultant
Microsoft IIS 6.0: Administrator's Pocket Consultant

This precise pocket-sized guide delivers immediate answers for the day-to-day administration of Web servers running Microsoft Information Services (IIS) 6.0. Zero in on core IIS support procedures and everyday tasks using quick-reference tables, step-by-step instructions, and lists. You get the focused, streamlined information you need to...

Microsoft Exchange Server 2007 Unleashed
Microsoft Exchange Server 2007 Unleashed
This is the ultimate guide to the design, migration, implementation, administration, management, and support of an Exchange Server 2007 environment. The recommendations, tips, and tricks covered are based on more than two years of early adopter implementations of Exchange 2007. The authors highlight the features and functions that organizations...

Joomla! 3 Beginner's Guide
Joomla! 3 Beginner's Guide

Even if you've never even begun to build a website, this guide will have you completing one within an hour. It's a fast, practical, fun introduction to Joomla! and content managed website creation.


  • Create a Joomla! website in an hour with the help of easy-to-follow steps and...
OSPF Network Design Solutions
OSPF Network Design Solutions

Network routing protocols have emerged as key enabling technologies in a computing world now dominated by connectivity. From a very high-level perspective, these routing protocols can be split into interior gateway protocols (IGPs) and exterior gateway protocols (EGPs). In general, the routing techniques used by IGPs are based on either...

Web Archiving
Web Archiving
The public information available on the Web today is larger than information distributed on any other media. The raw nature of Web content, the unpredictable remote changes that can affect it, the wide variety of formats concerned, and the growth in data-driven websites make the preservation of this material a challenging task, requiring specific...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy