Gl615 Linux for Unix Administrators Rhel7 Sles12

Total Page:16

File Type:pdf, Size:1020Kb

Gl615 Linux for Unix Administrators Rhel7 Sles12 EVALUATION COPY Unauthorized Reproduction or Distribution Linux for Unix AdministratorsProhibited Student Workbook EVALUATION COPY Unauthorized Reproduction GL615 LINUX FOR UNIX ADMINISTRATORS RHEL7 SLES12 or Distribution The contents of this course and all its modules and related materials, including handouts to audience members, are copyright ©2017 Guru Labs L.C. No part of this publication may be stored in a retrieval system, transmitted or reproduced in any way, including, but not limited to, photocopy, photograph, magnetic, electronic or other record, without the prior written permission of Guru Labs. This curriculum contains proprietary information which is for the exclusive use of customers of Guru Labs L.C., and is not to be shared with personnel other than those in attendance at this course. This instructional program, including all material provided herein, is supplied without any guarantees from Guru Labs L.C. Guru Labs L.C. assumes no liability for damages or legal action arising from Prohibited the use or misuse of contents or details contained herein. Photocopying any part of this manual without prior written consent of Guru Labs L.C. is a violation of federal law. This manual should not appear to be a photocopy. If you believe that Guru Labs training materials are being photocopied without permission, please email [email protected] or call 1-801-298-5227. Guru Labs L.C. accepts no liability for any claims, demands, losses, damages, costs or expenses suffered or incurred howsoever arising from or in connection with the use of this courseware. All trademarks are the property of their respective owners. Version: GL615S-R7S12-O04 EVALUATION COPY Unauthorized Reproduction or Distribution Prohibited Table of Contents Chapter 1 EVALUATIONSystem Boot COPY Method Overview 2 LINUX ORIENTATION 1 systemd System and Service Manager 3 FSF and GNU 2 Modifying systemd services 5 GPL – General PublicUnauthorized License 3 Systemd Service Sandboxing Features 6 Linux Kernel and Versioning 4 systemd Targets 7 Components of a Distribution 6 Using systemd 8 Red Hat Linux Products 7 Linux Runlevels Aliases 10 SUSE Linux Products 9 Legacy Support for SysV init 11 Lab Tasks 12 Chapter 2 1. Managing Services With Systemd's systemctl 13 LINUX KERNEL & HARDWARE 1 2. Creating a systemd unit file 19 Hardware Discovery Tools 2 Configuring New Hardware with hwinfo 3 Chapter 4 Hardware and System Clock Reproduction 4 GRUB2/SYSTEMD BOOT PROCESS 1 Console 6 Booting Linux on PCs 2 Virtual Terminals 8 GRUB 2 4 Keyboard & locale configuration 10 GRUB 2 Configuration 6 Serial Ports 12 GRUB 2 Security 8 SCSI Devices 13 Boot Parameters 10 USB Architecture 15 Initial RAM Filesystem 12 Defining a Printer 17 init 15 Tape Libraries 18 Systemd local-fs.target and sysinit.target 16 Managing Linux Device Files 20or Systemd basic.target and multi-user.target 18 Kernel Hardware Info – /sys/ 23 DistributionLegacy local bootup script support 20 /sys/ Structure 24 System Configuration Files 21 udev 25 RHEL7 Configuration Utilities 22 Kernel Modules 27 SLES12 Configuration Utilities 23 Configuring Kernel Components and Modules 29 Shutdown and Reboot 24 Handling Module Dependencies 30 Lab Tasks 25 Configuring the Kernel via /proc/ 31 1. Boot Process 26 Random Numbers and /dev/random 33 2. Booting directly to a bash shell 30 System Tools 35 3. GRUB CommandProhibited Line 33 Lab Tasks 36 4. Basic GRUB Security 36 1. Adjusting Kernel Options 37 5. Troubleshooting Practice: Boot Process 39 2. Linux Kernel Driver Compilation 43 3. Configuring Print Queues 47 Chapter 5 4. Introduction to Troubleshooting Labs 51 SOFTWARE MAINTENANCE 1 5. Troubleshooting Practice: Kernel Modules 56 RPM Architecture 2 Working With RPMs 3 Chapter 3 Querying and Verifying with RPM 4 SYSTEMD OVERVIEW 1 Updating the Kernel RPM 6 ii Using the Yum command 7 Changing LVM Components 8 Using the Zypper command 10 Advanced LVM Overview 10 YUM package groupsEVALUATION12 Advanced COPY LVM: Components & Object Tags 11 Zypper Services and Catalogs 13 Advanced LVM: Automated Storage Tiering 12 Configuring Yum 15 Advanced LVM: Thin Provisioning 14 YUM RepositoriesUnauthorized 17 Advanced LVM: Striping & Mirroring 16 Rebuilding Source RPM Packages 18 Advanced LVM: RAID Volumes 17 Software Tools Comparison Matrix 20 SLES Graphical Disk Tool 18 Lab Tasks 21 RAID Concepts 19 1. Managing Software with RPM 22 Array Creation with mdadm 20 2. Creating a Custom RPM Repository 26 Software RAID Monitoring 21 3. Querying the RPM Database 30 Software RAID Control and Display 22 4. Installing Software via RPM & Source and Rebuilding LVM and RAID: Unix Tool Comparison 23 SRPMs 34 Lab Tasks 24 5. Using Yum [R7] Reproduction 38 1. Creating and Managing LVM Volumes 25 6. Using Zypper [S12] 45 2. Creating LVM Thin Volumes 35 3. Creating and Managing a RAID-5 Array 42 Chapter 6 LOCAL STORAGE ADMINISTRATION 1 Chapter 8 Partitioning Disks with fdisk & gdisk 2 REMOTE STORAGE ADMINISTRATION 1 Resizing a GPT Partition with gdisk 5 Remote Storage Overview 2 Partitioning Disks with parted 8 Remote Filesystem Protocols 4 Non-Interactive Disk Partitioning with sfdisk 9 Remote Block Device Protocols 5 Filesystem Creation or10 NFS Clients 7 Mounting Filesystems 11 NFS Server Configuration 8 Filesystem Maintenance 13DistributionImplementing NFSv4 10 Resizing Filesystems 16 AutoFS 12 Managing an XFS Filesystem 17 AutoFS Configuration 13 Swap 19 SAN Multipathing 15 Filesystem Attributes 20 Multipath Configuration 16 Filesystem Creation and Management 21 Multipathing Best Practices 18 Lab Tasks 22 iSCSI Architecture 20 1. Creating and Managing Filesystems 23 Open-iSCSI Initiator Implementation 23 2. Hot Adding Swap 30 iSCSI InitiatorProhibited Discovery 25 iSCSI Initiator Node Administration 27 Chapter 7 Mounting iSCSI Targets at Boot 29 LVM & RAID 1 iSCSI Multipathing Considerations 30 Logical Volume Management 2 Lab Tasks 32 Implementing LVM 3 1. Using autofs 33 Creating Logical Volumes 4 2. NFS Server Configuration 38 Activating LVM VGs 5 3. iSCSI Initiator Configuration 43 Exporting and Importing a VG 6 Examining LVM Components 7 iii Chapter 9 SUSE Basic Firewall Configuration 22 USER/GROUP ADMINISTRATION 1 Netfilter Concepts 23 Approaches to StoringEVALUATION User Accounts 2 Using the iptablesCOPY Command 24 User and Group Concepts 3 Common match_specs 26 User Administration 4 Extended Packet Matching Modules 27 Modifying AccountsUnauthorized 6 Connection Tracking 29 Group Administration 7 AppArmor 30 Password Aging 9 SELinux Security Framework 31 Default User Files 11 SELinux Modes 33 Controlling Login Sessions 12 SELinux Commands 35 RHEL DS Client Configuration 14 Choosing an SELinux Policy 36 SLES DS Client Configuration 16 SELinux Booleans 38 PAM Overview 18 SELinux Policy Tools 39 PAM Module Types 19 (X)INETD and Firewalls 41 PAM Order of Processing Reproduction 20 Lab Tasks 42 PAM Control Statements 22 1. User Private Groups 44 pam_wheel.so 23 2. Using Filesystem ACLs 49 pam_limits.so 24 3. Securing xinetd Services 58 User/Group Administration Comparison Matrix 25 4. Enforcing Security Policy with xinetd 62 Lab Tasks 26 5. Securing Services with TCP Wrappers 65 1. User and Group Administration 27 6. Securing Services with SuSEfirewall2 [S12] 69 2. Using LDAP for Centralized User Accounts 30 7. Securing Services with Netfilter 73 3. Troubleshooting Practice: Account Management 36 8. Exploring SELinux Modes 79 4. Restricting superuser access to wheel group membership 37or 9. SELinux File Contexts [R7] 85 5. Setting Limits with the pam_limits Modules 39 6. Using pam_limits to Restrict Simultaneous Logins 43 DistributionChapter 11 PROCESS ADMINISTRATION 1 Chapter 10 at & cron Usage 2 SECURITY ADMINISTRATION 1 Anacron 3 Security Concepts 2 Viewing Processes 5 Tightening Default Security 4 Managing Processes 7 Security Advisories 6 Tuning Process Scheduling 8 Fine Grained Authorizations with Polkit 7 Process Accounting 10 File Access Control Lists 9 Setting ResourceProhibited Limits via ulimit 12 Manipulating FACLs 10 Lab Tasks 13 Viewing FACLs 11 1. Creating and Managing User Cron Jobs 14 Backing Up FACLs 12 2. Adding System cron Jobs 17 File Creation Permissions with umask 13 User Private Group Scheme 15 Chapter 12 Alternatives to UPG 17 NETWORKING 1 TCP Wrappers Concepts 18 Linux Network Interfaces 2 TCP Wrappers Concepts 19 Ethernet Hardware Tools 4 Xinetd 20 Network Configuration with ip Command 6 iv Configuring Routing Tables 7 Log Anomaly Detector 28 IP to MAC Address Mapping with ARP 10 strace and ltrace 29 Starting and StoppingEVALUATION Interfaces 11 Troubleshooting COPY Incorrect File Permissions 31 NetworkManager 13 Inability to Boot 32 DNS Clients 15 Typos in Configuration Files 33 DHCP Clients Unauthorized 17 Corrupt Filesystems 34 Network Diagnostics 19 RHEL7 Rescue Environment 35 Information from ss and netstat 22 SUSE Rescue Environment 37 Managing Network-Wide Time 24 Process Tools 39 Continual Time Sync with NTP 26 Lab Tasks 40 Configuring NTP Clients 27 1. Using the systemd Journal 41 Multiple IP Addresses 29 2. Setting up a Full Debug Logfile 46 IPv6 31 3. Remote Syslog Configuration 48 Interface Aggregation 33 4. Remote Rsyslog TLS Configuration 54 Interface Bonding Reproduction 34 5. Recovering Damaged MBR 61 Network Teaming 36 Interface Bridging 40 Chapter 14 802.1q VLANS 42 BIND DNS 1 Network Configuration Tools 44 The Domain Name Space 2 Lab Tasks 45 Delegation and Zones 4 1. Network Discovery 46 Server Roles 5 2. Basic Client Networking 49 Resolving Names 6 3. NTP Client Configuration 53 Resolving IP Addresses 8 4. Multiple IP Addresses
Recommended publications
  • Storage Administration Guide Storage Administration Guide SUSE Linux Enterprise Server 12 SP4
    SUSE Linux Enterprise Server 12 SP4 Storage Administration Guide Storage Administration Guide SUSE Linux Enterprise Server 12 SP4 Provides information about how to manage storage devices on a SUSE Linux Enterprise Server. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xii 2 Giving Feedback xiv 3 Documentation Conventions xiv 4 Product Life Cycle and Support xvi Support Statement for SUSE Linux Enterprise Server xvii • Technology Previews xviii I FILE SYSTEMS AND MOUNTING 1 1 Overview
    [Show full text]
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • NVIDIA Magnum IO Gpudirect Storage
    NVIDIA Magnum IO GPUDirect Storage Installation and Troubleshooting Guide TB-10112-001_v1.0.0 | August 2021 Table of Contents Chapter 1. Introduction........................................................................................................ 1 Chapter 2. Installing GPUDirect Storage.............................................................................2 2.1. Before You Install GDS.............................................................................................................2 2.2. Installing GDS............................................................................................................................3 2.2.1. Removal of Prior GDS Installation on Ubuntu Systems...................................................3 2.2.2. Preparing the OS................................................................................................................3 2.2.3. GDS Package Installation.................................................................................................. 4 2.2.4. Verifying the Package Installation.....................................................................................4 2.2.5. Verifying a Successful GDS Installation............................................................................5 2.3. Installed GDS Libraries and Tools...........................................................................................6 2.4. Uninstalling GPUDirect Storage...............................................................................................7 2.5. Environment
    [Show full text]
  • The GNOME Census: Who Writes GNOME?
    The GNOME Census: Who writes GNOME? Dave Neary & Vanessa David, Neary Consulting © Neary Consulting 2010: Some rights reserved Table of Contents Introduction.........................................................................................3 What is GNOME?.............................................................................3 Project governance...........................................................................3 Why survey GNOME?.......................................................................4 Scope and methodology...................................................................5 Tools and Observations on Data Quality..........................................7 Results and analysis...........................................................................10 GNOME Project size.......................................................................10 The Long Tail..................................................................................11 Effects of commercialisation..........................................................14 Who does the work?.......................................................................15 Who maintains GNOME?................................................................17 Conclusions........................................................................................22 References.........................................................................................24 Appendix 1: Modules included in survey...........................................25 2 Introduction What
    [Show full text]
  • 1. D-Bus a D-Bus FAQ Szerint D-Bus Egy Interprocessz-Kommunikációs Protokoll, És Annak Referenciamegvalósítása
    Az Udev / D-Bus rendszer - a modern asztali Linuxok alapja A D-Bus rendszer minden modern Linux disztribúcióban jelen van, sőt mára már a Linux, és más UNIX jellegű, sőt nem UNIX rendszerek (különösen a desktopon futó változatok) egyik legalapvetőbb technológiája, és az ismerete a rendszergazdák számára lehetővé tesz néhány rendkívül hasznos trükköt, az alkalmazásfejlesztőknek pedig egyszerűen KÖTELEZŐ ismerniük. Miért ilyen fontos a D-Bus? Mit csinál? D-Bus alapú technológiát teszik lehetővé többek között azt, hogy közönséges felhasználóként a kedvenc asztali környezetünkbe bejelentkezve olyan feladatokat hajtsunk végre, amiket a kernel csak a root felasználónak engedne meg. Felmountolunk egy USB meghajtót? NetworkManagerrel konfiguráljuk a WiFi-t, a 3G internetet vagy bármilyen más hálózati csatolót, és kapcsolódunk egy hálózathoz? Figyelmeztetést kapunk a rendszertől, hogy új szoftverfrissítések érkeztek, majd telepítjük ezeket? Hibernáljuk, felfüggesztjük a gépet? A legtöbb esetben ma már D-Bus alapú technológiát használunk ilyen esetben. A D-Bus lehetővé teszi, hogy egymástól függetlenül, jellemzően más UID alatt indított szoftverösszetevők szabványos és biztonságos módon igénybe vegyék egymás szolgáltatásait. Ha valaha lesz a Linuxhoz professzionális desktop tűzfal vagy vírusirtó megoldás, a dolgok jelenlegi állasa szerint annak is D- Bus technológiát kell használnia. A D-Bus technológia legfontosabb ihletője a KDE DCOP rendszere volt, és mára a D-Bus leváltotta a DCOP-ot, csakúgy, mint a Gnome Bonobo technológiáját. 1. D-Bus A D-Bus FAQ szerint D-Bus egy interprocessz-kommunikációs protokoll, és annak referenciamegvalósítása. Ezen referenciamegvalósítás egyik összetevője, a libdbus könyvtár a D- Bus szabványnak megfelelő kommunikáció megvalósítását segíti. Egy másik összetevő, a dbus- daemon a D-Bus üzenetek routolásáért, szórásáért felelős.
    [Show full text]
  • Operating System User's Mannal ~Zilog 03-0072-01 Revision a September 1978
    t_ .' Operating System User's Mannal ~Zilog 03-0072-01 Revision A September 1978 Copyright © 1978 by Zilog, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Zilog. Zilog assumes no responsibility for the use of any circuitry other than circuitry embodied in a Zilog product. No other circuit patent licenses are implied. zaO-RIO Operating System User's Manual September 1978 TABLE OF CONTENTS CHAPTER 1 - INTRODUCTION AND OVERVIEW • 1 1.1 INTRODUCTION •• 1 1.2 SYSTEM OVERVIEW 3 1.2.1 Hardware Configuration • • • • • • 3 1.2.2 File Systems • • • • • • • . • • 3 1.2.3 System Initialization •••.••• 6 1.2.4 Commands • • .• .•..••• 7 1.2.5 I/O • • • . • • • • • . • • • • • . 7 CHAPTER 2 - RIO EXECUTIVE 9 2.1 SYSTEM INITIALIZATION 9 2.2 FILE NAME CONVENTIONS · 10 2.3 MEMORY MANAGEMENT . • • . 12 2.3.1 MEMMGR • . 13 2.4 COMMAND STRING INTERPRETATION · 13 2.5 ERROR HANDLING • • . 15 2.6 PROGRAM EXECUTION OF COMMANDS · 15 CHAPTER 3 - 1/0 STRUCTURE • · 16 3.1 OVERVIEW . • · 16 3.2 I/O REQUESTS - SYSTEM CALLS · 17 3.3 THE 'ASSIGN' I/O REQUEST ••• • 19 - i - 3.4 STANDARD RIO I/O DEVICES • • • 21 3.4.1 ZDOS . • • • . 21 3.4.2 DFS . 21 3.4.3 NULL . • • • . 21 3.4.4 CON . • • • . • • • • • 22 3.4.5 PCON • 27 3.4.6 FLOPPY • • • • • • • • • • 27 3.4.7 DISK • • • • • • 27 CHAPTER 4 - PROGRAM INTERFACE • • 28 4.1 PROGRAM LOCATION • • • • • 28 4.2 PARAMETER STRING ADDRESS · 29 4.3 PROGRAM STACK SPACE • • • 29 4.4 PROGRAM TERMINATION - ERROR HANDLING ••.
    [Show full text]
  • IODF Explorer
    The Input/Output Definition File (IODF) is a critical Control Point in the management of the IBM z/Series Platform. IODF Explorer Release 4.0 USER GUIDE Contact us for additional information: NewEra Software Technical Support 800-421-5035 [email protected] www.newera.com Rev: 2009-04-24 IODF Explorer 4.0 ¾ Copyright, Trademark and Legal Notices Copyrights This Getting Started Guide and the related Software Product(s) are protected under a Copyright dated 2009 by NewEra Software, Inc. All rights are reserved. License Agreement This Getting Started Guide describes the installation and operation of Image FOCUS, its environment and applications. It is made available only under the terms of a license agreement between the licensee and NewEra Software Inc. No part of this Guide or the related Software Product(s) may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of NewEra Software, Inc. Trademarks and Copyrights of Others The following products and/or registered trademarks of International Business Machines Corporation are referenced in this document: MVS, VM, RACF, z/OS, SYSPLEX, JES, VTAM, TSO, ISPF, ICKDSF, DFSMSdss, DF/DSS, and others. 2 NewEra Software, Inc. ‐ Image Control Environment (ICE) Applications IODF Explorer 4.0 ¾ Technical Support Information NewEra Software is dedicated to providing the highest level of technical Around-the-clock- support support to meet our customers’ growing needs. In order to meet these needs, NewEra provides around‐the‐clock technical support, 7 days a week, 24 hours a day.
    [Show full text]
  • Titans and Trolls of the Open Source Arena
    Titans and Trolls Enter the Open-Source Arena * by DEBRA BRUBAKER BURNS I. Introduction .................................................................................... 34 II. Legal Theories for Open Source Software License Enforcement ................................................................................... 38 A. OSS Licensing .......................................................................... 38 B. Legal Theories and Remedies for OSS Claims .................... 40 1. Legal Protections for OSS under Copyright and Contract Law ..................................................................... 40 Stronger Protections for OSS License under Copyright Law ................................................................... 40 2. Copyright-Ownership Challenges in OSS ....................... 42 3. Potential Legal Minefields for OSS under Patent Law ...................................................................................... 45 4. Added Legal Protection for OSS under Trademark Law ...................................................................................... 46 5. ITC 337 Action as Uncommon Legal Protection for OSS ..................................................................................... 49 III. Enforcement Within the OSS Community .................................. 49 A. Software Freedom Law Center Enforces OSS Licenses .... 50 B. Federal Circuit Finds OSS License Enforceable Under Copyright Law ......................................................................... 53 C. Commercial OSS
    [Show full text]
  • Dell™ Gigaos 6.5 Release Notes July 2015
    Dell™ GigaOS 6.5 Release Notes July 2015 These release notes provide information about the Dell™ GigaOS release. • About Dell GigaOS 6.5 • System requirements • Product licensing • Third-party contributions • About Dell About Dell GigaOS 6.5 For complete product documentation, visit http://software.dell.com/support/. System requirements Not applicable. Product licensing Not applicable. Third-party contributions Source code is available for this component on http://opensource.dell.com/releases/Dell_Software. Dell will ship the source code to this component for a modest fee in response to a request emailed to [email protected]. This product contains the following third-party components. For third-party license information, go to http://software.dell.com/legal/license-agreements.aspx. Source code for components marked with an asterisk (*) is available at http://opensource.dell.com. Dell GigaOS 6.5 1 Release Notes Table 1. List of third-party contributions Component License or acknowledgment abyssinica-fonts 1.0 SIL Open Font License 1.1 ©2003-2013 SIL International, all rights reserved acl 2.2.49 GPL (GNU General Public License) 2.0 acpid 1.0.10 GPL (GNU General Public License) 2.0 alsa-lib 1.0.22 GNU Lesser General Public License 2.1 alsa-plugins 1.0.21 GNU Lesser General Public License 2.1 alsa-utils 1.0.22 GNU Lesser General Public License 2.1 at 3.1.10 GPL (GNU General Public License) 2.0 atk 1.30.0 LGPL (GNU Lesser General Public License) 2.1 attr 2.4.44 GPL (GNU General Public License) 2.0 audit 2.2 GPL (GNU General Public License) 2.0 authconfig 6.1.12 GPL (GNU General Public License) 2.0 avahi 0.6.25 GNU Lesser General Public License 2.1 b43-fwcutter 012 GNU General Public License 2.0 basesystem 10.0 GPL (GNU General Public License) 3 bash 4.1.2-15 GPL (GNU General Public License) 3 bc 1.06.95 GPL (GNU General Public License) 2.0 bind 9.8.2 ISC 1995-2011.
    [Show full text]
  • Hardware Configuration Definition User's Guide
    z/OS Version 2 Release 3 Hardware Configuration Definition User's Guide IBM SC34-2669-30 Note Before using this information and the product it supports, read the information in “Notices” on page 443. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1994, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures..................................................................................................... xiii List of Tables.....................................................................................................xxiii About this document.......................................................................................... xxv Who this document is for..........................................................................................................................xxv Related information.................................................................................................................................. xxv How to use this document.......................................................................................................................xxvi How this document is organized............................................................................................................. xxvi How to read syntax diagrams................................................................................................................
    [Show full text]
  • How Netflix Tunes EC2 Instances for Performance
    CMP325 How Netflix Tunes EC2 Instances for Performance Brendan Gregg, Performance and OS Engineering Team November 28, 2017 © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Netflix performance and operating systems team • Evaluate technology - Instance types, Amazon Elastic Compute Cloud (EC2) options • Recommendations and best practices - Instance kernel tuning, assist app tuning • Develop performance tools - Develop tools for observability and analysis • Project support - New database, programming language, software change • Incident response - Performance issues, scalability issues © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda 1. Instance selection 2. Amazon EC2 features 3. Kernel tuning 4. Methodologies 5. Observability © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Warnings • This is what’s in our medicine cabinet • Consider these “best before: 2018” • Take only if prescribed by a performance engineer © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 1. Instance selection © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The Netflix cloud Many application workloads: Compute, storage, caching… EC2 Applications (services) S3 ELB Elasticsearch Cassandra EVCache SES SQS © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Netflix AWS environment • Elastic Load Balancing ASG Cluster allows real load testing prod1 ELB 1. Single instance canary, then, Canary 2. Auto scaling group • Much better than micro- ASG-v010 ASG-v011 benchmarking alone, which … … is error prone Instance Instance Instance Instance Instance Instance Instance Instance Instance Instance © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
    [Show full text]
  • Safeguarding the Future of Linux Through Standards
    Safeguarding the Future of Linux Through Standards “ Through the defi nition and testing of operating system interfaces, the LSB creates a stable platform that benefi ts Safeguarding Key Facts the Future of bo th developers and users.” - Linus Torvalds Linux Through Standards • The FSG is a non-profi t organization devoted to the ongoing success of Linux The Free Standards Group is an independent nonprofi t organization dedicated to accelerating the use and acceptance of free and open source • Growing membership includes all leading Linux vendors software by developing and promoting standards. Supported by leaders and many infl uential non-profi ts in the IT industry as well as the open source development community, the in the Linux community Free Standards Group fulfi lls a critical need to have common behavioral • Workgroups cover key specifi cations, tools and ABIs across Linux platforms. The Linux Standard Base Linux standards issues such as a binary standard and offers an answer to the most pressing issue facing Linux today: fragmentation. internationalization • Board members include an A well supported standard for Linux is the neccesary component to Linux’s assortment of Linux experts continued success. Without a commonly adopted standard, Linux will fragment, and senior representatives of the Linux community thus proving costly for ISVs to port their applications to the operating system and making it diffi cult for end users and Linux vendors alike. By adopting the • Headquartered in San Francisco Linux Standard Base, the Linux community provides this crucial portability so that applications can be used on more than one distribution of Linux with little or no change.
    [Show full text]