Showing posts with label RHCE Institute. Show all posts
Showing posts with label RHCE Institute. Show all posts

Monday, 19 September 2016

Important Linux Commands

This section gives insight into the most important commands of your SuSE Linux system. Along with the individual commands, parameters are listed and, where appropriate, a typical sample application is introduced. To learn more about the various commands, it is usually possible to get additional information with the man program followed by the name of the command, for example, man ls.
In these manual pages, move up and down with PgUp and PgDn and move between the beginning and the end of a document with Home and End. End this viewing mode by pressing Q. Learn more about the man command itself with man.

There are many more commands than listed in this blog. For information about other commands or more detailed information, we recommend the O'Reilly publication RHCE Training in Jaipur in a Nutshell. In the following overview, the individual command elements are written in different typefaces.
  • The actual command is always printed as command. Without this, nothing can function.
  • Options without which the respective program cannot function are printed in italics.
  • Further details, like file names, which must be passed to a command for correct functioning, are written in the Courier font.
  • Specifications or parameters that are not required are placed in [brackets].
Adjust possible specifications to your needs. It makes no sense to write ls file(s), if no file named file(s) actually exists. You can usually combine several parameters, for example, by writing ls -la instead of ls -l -a.

File Commands

File Administration

ls [option(s)] [file(s)]
If you run ls without any additional parameters, the program will list the contents of the current directory in short form.
-l
detailed list
-a
displays hidden files
cp [option(s)] sourcefile targetfile
Copies sourcefile to targetfile.
-i
Waits for confirmation, if necessary, before an existing targetfile is overwritten
-r
Copies recursively (includes subdirectories)
mv [option(s)] sourcefile targetfile
Copies sourcefile to targetfile then deletes the original sourcefile.
-b
Creates a backup copy of the sourcefile before moving
-i
Waits for confirmation, if necessary, before an existing targetfile is overwritten
rm [option(s)] file(s)
Removes the specified files from the file system. Directories are not removed by rm unless the option -r is used.
-r
Deletes any existing subdirectories
-i
Waits for confirmation before deleting each file.
ln [option(s)] sourcefile targetfile
Creates an internal link from the sourcefile to the targetfile, under a different name. Normally, such a link points directly to the sourcefile on one and the same file system. However, ifln is executed with the -s option, it creates a symbolic link that only points to the directory where the sourcefile is located, thus enabling linking across file systems.
-s
Creates a symbolic link
cd [options(s)] [directory]
Changes the current directory. cd without any parameters changes to the user's home directory.
mkdir [option(s)] directoryname
Creates a new directory.
rmdir [option(s)] directoryname
Deletes the specified directory, provided it is already empty.
chown [option(s)] username.group file(s)
Transfers the ownership of a file to the user with the specified user name.
-R
Changes files and directories in all subdirectories.
chgrp [option(s)] groupname file(s)
Transfers the group ownership of a given file to the group with the specified group name. The file owner can only change group ownership if a member of both the existing and the new group.
chmod [options] mode file(s)
Changes the access permissions.
The mode parameter has three parts: groupaccess, and access typegroup accepts the following characters:
u
user
g
group
o
others
For access, access is granted by the + symbol and denied by the - symbol.
The access type is controlled by the following options:
r
read
w
write
x
eXecute — executing files or changing to the directory.
s
Set uid bit — the application or program is started as if it were started by the owner of the file.
gzip [parameters] file(s)
This program compresses the contents of files, using complex mathematical algorithms. Files compressed in this way are given the extension .gz and need to be uncompressed before they can be used. To compress several files or even entire directories, use the tar command.
-d
decompresses the packed gzip files so they return to their original size and can be processed normally (like the command gunzip).
tar options archive file(s)
The tar puts one file or (usually) several files into an archive. Compression is optional.
tar is a quite complex command with a number of options available. The most frequently used options are:
-f
Writes the output to a file and not to the screen as is usually the case
-c
Creates a new tar archive
-r
Adds files to an existing archive
-t
Outputs the contents of an archive
-u
Adds files, but only if they are newer than the files already contained in the archive
-x
Unpacks files from an archive (extraction)
-z
Packs the resulting archive with gzip
-j
Compresses the resulting archive with bzip2
-v
Lists files processed
The archive files created by tar end with .tar. If the tar archive was also compressed using gzip, the ending is .tgz or .tar.gz. If it was compressed using bzip2.tar.bz2.
Application examples can be found in Section “Archives and Data Compression”.
locate pattern(s)
The locate command can find in which directory a specified file is located. If desired, use wild cards to specify file names. The program is very speedy, as it uses a database specifically created for the purpose (rather than searching through the entire file system). This very fact, however, also results in a major drawback: locate is unable to find any files created after the latest update of its database.
The database can be generated by root with updatedb.
updatedb [options(s)]
This command performs an update of the database used by locate. To include files in all existing directories, run the program as root. It also makes sense to place it in the background by appending an ampersand (&), so you can immediately continue working on the same command line (updatedb &).
find [option(s)]
The find command allows you to search for a file in a given directory. The first argument specifies the directory in which to start the search. The option -name must be followed by a search string, which may also include wild cards. Unlike locate, which uses a database, find scans the actual directory.

Commands to Access File Contents

cat [option(s)] file(s)
The cat command displays the contents of a file, printing the entire contents to the screen without interruption.
-n
Numbers the output on the left margin
less [option(s)] file(s)
This command can be used to browse the contents of the specified file. Scroll half a screen page up or down with PgUp and PgDn or a full screen page down with Space. Jump to the beginning or end of a file using Home and End. Press Q to exit the program.
grep [option(s)] searchstring filenames
The grep command finds a specific searchstring in the specified file(s). If the search string is found, the command displays the line in which the searchstring was found along with the file name.
-i
Ignores case
-l
Only displays the names of the respective files, but not the text lines
-n
Additionally displays the numbers of the lines in which it found a hit
-l
Only lists the files in which searchstring does not occur
diff [option(s)] file1 file2
The diff command compares the contents of any two files. The output produced by the program lists all lines that do not match.
This is frequently used by programmers who need only send their program alterations and not the entire source code.
-q
Only reports whether the two given files differ

File Systems

mount [option(s)] [<device>] mountpoint
This command can be used to mount any data media, such as hard disks, CD-ROM drives, and other drives, to a directory of the Linux file system.
-r
mount read-only
-t filesystem
Specifies the file system. The most common are ext2 for Linux hard disks, msdos for MS-DOS media, vfat for the Windows file system, and iso9660 for CDs.
For hard disks not defined in the file /etc/fstab, the device type must also be specified. In this case, only root can mount. If the file system should also be mounted by other users, enter the option user in the appropriate line in the /etc/fstab file (separated by commas) and save this change. Further information is available in mount.
umount [option(s)] mountpoint
This command unmounts a mounted drive from the file system. To prevent data loss, run this command before taking a removable data medium from its drive. Normally, only root is allowed to run the commands mount and umount. To enable other users to run these commands, edit the /etc/fstab file to specify the option user for the respective drive.

System Commands

System Information

df [option(s)] [directory]
The df (disk free) command, when used without any options, displays information about the total disk space, the disk space currently in use, and the free space on all the mounted drives. If a directory is specified, the information is limited to the drive on which that directory is located.
-H
shows the number of occupied blocks in gigabytes, megabytes, or kilobytes — in human-readable format
-t
Type of file system (ext2, nfs, etc.)
du [option(s)] [path]
This command, when executed without any parameters, shows the total disk space occupied by files and subdirectories in the current directory.
-a
Displays the size of each individual file
-h
Output in human-readable form
-s
Displays only the calculated total size
free [option(s)]
The command free displays information about RAM and swap space usage, showing the total and the used amount in both categories.
-b
Output in bytes
-k
Output in kilobytes
-m
Output in megabytes
date [option(s)]
This simple program displays the current system time. If run as root, it can also be used to change the system time. Details about the program are available in date.

Processes

top [options(s)]
top provides a quick overview of the currently running processes. Press H to access a page that briefly explains the main options to customize the program.
ps [option(s)] [process ID]
If run without any options, this command displays a table of all your own programs or processes — those you started. The options for this command are not preceded by hyphen.
aux
Displays a detailed list of all processes, independent of the owner.
kill [option(s)] process ID
Unfortunately, sometimes a program cannot be terminated in the normal way. However, in most cases, you should still be able to stop such a runaway program by executing the killcommand, specifying the respective process ID (see top and ps).
kill sends a TERM signal that instructs the program to shut itself down. If this does not help, the following parameter can be used:
-9
Sends a KILL signal instead of a TERM signal, with which the process really is annihilated by the operating system. This brings the specific processes to an end in almost all cases.
killall [option(s)] processname
This command is similar to kill, but uses the process name (instead of the process ID) as an argument, causing all processes with that name to be killed.

Network

ping [option(s)] host name|IP address
The ping command is the standard tool for testing the basic functionality of TCP/IP networks. It sends a small data packet to the destination host, requesting an immediate reply. If this works, ping displays a message to that effect, which indicates that the network link is basically functioning.
-c
number Determines the total number of packages to send and ends after they have been dispatched. By default, there is no limitation set.
-f
flood ping: sends as many data packages as possible. A popular means, reserved to root, to test networks.
-i
value Specifies the interval between two data packages in seconds. Default: one second
nslookup
The Domain Name System resolves domain names to IP addresses. With this tool, send queries to information servers (DNS servers).
telnet [option(s)] host name or IP address
Telnet is actually an Internet protocol that enables you to work on remote hosts across a network. telnet is also the name of a Linux program that uses this protocol to enable operations on remote computers.  not use telnet over a network on which third parties can eavesdrop. Particularly on the Internet, use encrypted transfer methods, such as ssh, to avoid the risk of malicious misuse of a password (see the man page for ssh).

Miscellaneous

passwd [option(s)] [username]
Users may change their own passwords at any time using this command. Furthermore, the administrator root can use the command to change the password of any user on the system.
su [option(s)] [username]
The su command makes it possible to log in under a different user name from a running session. When using the command without specifying a user name, you will be prompted for theroot password. Specify a user name and the corresponding password to use the environment of the respective user. The password is not required from root, as root is authorized to assume the identity of any user.
halt [option(s)]
To avoid loss of data, you should always use this program to shut down your system.
reboot [option(s)]
Does the same as halt with the difference that the system performs an immediate reboot.
clear
This command cleans up the visible area of the console. It has no options.

Sunday, 5 July 2015

Linux - Open Source Operating System

At the heart of all software is source code - the programs that perform basic functions. With open source software, this code is protected by a special license that ensures everyone has access to that code. That means no one company can fully own it. Freedom means choice. Choice means power.

That's why we believe open source is inevitable. It returns control to the customer. You can see the code, change it, and learn from it. Bugs are quickly found and quickly fixed. And when customers don't like how one vendor is serving them, they can choose another without overhauling their infrastructure. No more technology lock-in. No more monopolies.

We believe the open source model builds higher quality, more secure, more easily integrated software. And it does it at a vastly accelerated pace - often at a lower cost.

Open source spans platforms, middleware and applications. From data center to desktop. We help enterprises take full advantage of the capability and cost savings of open source-letting them do more with the technology they already have.

The subscription model allows Red Hat to have a mutually beneficial, cyclical relationship with customers:
Deliver new technology as soon as it's available.

Provide unlimited support at no additional cost.
And finally, the feedback we get from regularly working with you helps us deliver better technology tomorrow.

The benefits of choosing Red Hat
Red Hat is a leading contributor to the development of open source software. In fact, as noted by a couple of recent surveys, Red Hat is the leading corporate contributor to the most important open source project of all, the Linux kernel. Because Red Hat is the largest corporate contributor to the kernel, and able to influence features and strategy, this is an area where Red Hat is well-positioned.

A huge ecosystem of hardware and software partners offers both services and certified solutions, in collaboration with the industry leader. This powerful combination provides:

Thousands of certified applications from Independent Software Vendors (ISVs)
  Hundreds of certified hardware systems and peripherals from leading OEM vendors, spanning multiple processor architectures

Comprehensive service offerings with up to 24x7 support and a 1-hour response time, available from Red Hat and selected ISV/OEM partners

Excellent performance, security, scalability, and availability, with audited industry benchmarks
Open source technologies that are rigorously tested and matured through the Red Hat-sponsored Fedora project.

Quantum is proud to announce its partnership with Red Hat for much in demand RedHat certified Engineer (RHCE) and RedHat certified System Administrator (RHCSA) programs. These certifications provide demonstrated knowledge, skill and ability required to handle the Red Hat Enterprise Linux systems.

Thursday, 11 December 2014

Tips For Restoring Permissions and ownership of Files in Redhat 6/7

Problem:
=======
Permissions and Ownership on critical system files (in /etc/) directory modified. This may cause the system to not boot, lots of errors and Kernel Panic.
cause:
=====
Someone accidentally typed chmod -R 777 /etc
Solution:
=========
The RPM package manager maintains a database for all files that it installs onto the system. This includes information such as the filename, installation path, owning package and the file system ownership and permissions (including SELinux file context information). In the event that ownership or permissions are inadvertently changed, for example, through accidental misuse of the chown or chmod commands, it is possible to revert these to their values as stored in the database.
1. To re-set ownership and permissions for all packages on the system:
root@ubuntu12:~# rpm –setperms -a
root@ubuntu12:~# rpm –setugids -a
2. To re-set ownership and permissions for a specific package on the system
root@ubuntu12:~# rpm –setperms <package name>
root@ubuntu12:~# rpm –setugids <package name>
……………….OR …………..
1) To reset uids and gids on files and directories :
root@ubuntu~:# for u in $(rpm -qa); do rpm –setugids $u; done
2) To permissions on files and directories
root@ubuntu12:~# for p in $(rpm -qa); do rpm –setperms $p; done

Article Source - http://www.rhce.co.in/tips-for-restoring-permissions-and-ownership-of-files-in-redhat-67/

Friday, 28 November 2014

Commandments of RHEL 7

 RedHat breathed new life to the Red Hat Enterprise Linux Operating system there by giving birth to enthralling RHEL 7 which transcends the boundaries of an OS with vessels for containerized applications. Hence RHEL 7 is no longer just a simple OS but an abstracted component in the larger RedHat ecosystem. For a flawless understanding of the significant features of RHEL 7 it would be better to go through the following 10 Red commandments 
• RHEL 7 offers an increased support for hosting Virtualized Windows server Edition than RHEL 6 and with an updated SAMBA 4, RHEL 7 is almost a member of Microsoft network 
• RHEL 7 has the responsibility of an OS subscription model which is tuned for a stable business deployment. It prevents instance of being out of support or highly re configured.
• RHEL 7 is a huge pile of code, running 4.3GB in the DVD ISO 
• Red Hat’s support of Linux containers (LXC) which helps the users to deploy Type-2, OS-based virtualization, rather than Type-1 bare metal hypervisors. LXC allows the container to be both lightweight and highly isolating.
• RHEL 7 support project atomic which allows moving a workload from one OS to another as transparent to workload. This becomes the job of relationship stack components especially open stack. Thus once an app tests successfully as an isolatable container instance, it can become a package, much as software appliances are found and deployed.
• RHEL 7 now uses the xfs file system instead of ext4 by default. This means that RHEL can handle extremely large file systems, as much as 8 exbabyte.
• RHEL 7 offers a tighter link to Active Directory. Hence those looking for a cross platform compatibility with Windows active directory receive new Kerberos support that allow them to do this.
• RHEL 7 is easier to install and deploy: The RHEL 7 kernel update to 3.20 is similar to Canonical’s implementation. In terms of distribution RHEL7 slightly easier to deploy on bare metal, and about the same on VMware, Hyper-V, and Citrix XenServer. 
• RHEL 7 is built for business environment at the installation time one should choose from several type of base environment like minimal, infrastructure server, file and print server, basic web server, virtualization host etc.
• RHEL 7 in peppy in terms of performance Gnome is very dynamic. And optimization of varying roles could be well documented. RedHat can increase output through a new feature of network port teaming.

Thursday, 20 November 2014

Red Hat Cloud Infrastructure 5 Now Available

Gordon Tillmore, Red Hat
Earlier this week, we announced the release of Red Hat Cloud Infrastructure 5.  Customers can use  this recent release to move towards open hybrid cloud working alongside existing infrastructure investments, and allowing for workload portability from a customer’s private cloud to Amazon EC2, or the reverse, if desired.   The product is our Infrastructure-as-a-Service solution providing:
  • a flexible and open solution to build out a centrally managed heterogeneous virtualization environment,
  • a private cloud for traditional workloads based on virtualization technologies, and
  • a massively scalable OpenStack-based cloud for cloud-enabled workloads
Version 5 -an important release for Red Hat Cloud Infrastructure
Version 4 already included three tightly integrated Red Hat technologies: Red Hat CloudForms, an award winning Cloud Management Platform (CMP), Red Hat Enterprise Virtualization, a full-featured enterprise virtualization solution, and Red Hat Enterprise Linux OpenStack Platform, our fully supported, enterprise grade OpenStack offering.  Red Hat Enterprise Linux has also been a key ingredient, serving as the basis for Red Hat Enterprise Virtualization and Red Hat Enterprise Linux OpenStack Platform, as well as a guest operating system at the tenant layer. And now, with Red Hat Cloud Infrastructure 5, Red Hat is introducing Satellite 6 to it’s award winning cloud infrastructure. Satellite 6 is accessible with no extra cost, to help organizations better manage the lifecycle of their cloud infrastructure.

To More RHCA Training please Visit on - www.rhce.co.in

With Red Hat Satellite  customers will have a lifecycle management solution that can significantly simplify and reduce the cost of managing virtual or private cloud infrastructures. Satellite provides systems lifecycle management  from the physical infrastructure itself to tenant workloads.  It can provision, update, and if necessary retire Red Hat Enterprise Virtualization and Red Hat Enterprise Linux OpenStack Platform hosts.  It can also deploy and configure Red Hat Enterprise Linux guests as opposed to simply provisioning empty virtual machines.

If you have RPM-based workloads, Satellite can be used to provision a virtual machine or instance containing your application to Red Hat Enterprise Virtualization, VMware vSphere,  Red Hat Enterprise Linux OpenStack Platform, or even Amazon EC2.  The inclusion of Satellite 6 in RHCI gives cloud operators and virtual infrastructure administrators greater control of their hosts and provides greater levels of automation for guest virtual machines and instances for tenants.

Satellite provides a variety of other lifecycle related benefits as well including the ability to work with CloudForms to recognize an out of date machine and automatically patch and update it as well as the ability to manage drift using the Puppet configuration management engine.  It can also be leveraged with the Red Hat Enterprise Linux OpenStack Platform Installer for faster deployments and controlled updates to Red Hat Enterprise Linux OpenStack Platform, and detailed inventory and Red Hat Enterprise Linux subscription reporting.
To learn more, we invite you to attend a webinar on November 19 entitled “Building and Managing a Hybrid Cloud with Red Hat Cloud Infrastructure.”  The webcast will feature IDC Senior Analyst Gary Chen and Red Hat Product Manager James Labocki.

Wednesday, 5 November 2014

Prepare for the Red Hat Certified Engineer exam (EX300)

During the 4-day course, students will work at their own pace through the complete set of labs from both the RHCSA (Red Hat Certified System Administrator) Rapid Track course (RH199) and Red Hat System Administration III (RH254). The RHCE Certification Lab course includes a few instructor lectures designed to review key technologies such as systemd, firewalld, and IPv6. For the classroom and virtual classroom versions of this course, an instructor will be available throughout the week to assist students as they work through the labs.
Note: This version of the course includes the Red Hat Certified System Administrator (RHCSA) EX200 and Red Hat Certified Engineer (RHCE) EX300 exams on the final day of the course.

Course content summary

  • Managing and troubleshooting systemd services during the boot process
  • Network configuration and basic troubleshooting
  • Managing local storage, creating and using file systems
  • Firewall management with firewalld
  • Automating installation of Red Hat Enterprise Linux® using kickstart
  • Manage SELinux settings
  • Using NFS and Samba shared filesystems
  • Network port security and link aggregation
  • iSCSI initiator and target configuration
  • Domain Name System (DNS) troubleshooting and caching name server
  • Providing Network File System (NFS) and Server Message Block (SMB) file servers
  • Apache HTTPD web server management
  • MariaDB SQL datbase configuration
  • Postfix Simple Mail Transfer Protocol (SMTP) nullclient for servers
  • Bash scripting for automation

Friday, 10 October 2014

RHCSA: A New Base Level Certification From Red Hat

The new version of Red Hat Enterprise Linux 7 is now released and with this new arrival, certifications under RHEL 6will no longer be current. Red Hat Certified Technician (RHCT) exam is no longer offered by Red Hat. RHCT exam is now replaced by RHCSA (Red Hat Certified System Administrator). This article attempts to provide a clear picture about new changes in RHCE certification.

RHCSA is the new addition to the performance based certifications, to strengthen IT professionals with superior training and performance based assessments in the IT industry. The certification title itself indicates more precise description of the duties held by people with this certification. More over RHCSA is built with thorough analysis of the knowledge and skills needed for modern system administrators. This is an outcome of technical survey, task analysis and feed backs from professionals world wide. In effect RHCSA is similar to RHCT except with some additions to include the result of feed backs from professionals.

RHCSA is the base system administration certification. Now onwards those wishing to earn RHCE on RHEL 7 must get RHCSA and write separate exam for RHCE. RHCE is now upgraded as a higher level system administration certification. A current RHCE will remain as prerequisite for advanced level certifications from Red Hat.

The main changes with RHCE exam on RHEL 7 is that previous RHCE Exam will be replaced by RHCSA Exam  and updated RHCE Exam . These two exams are now separate and RHCSA is not embedded with RHCE as RHCT was earlier. It is not necessary that one must get RHCSA first, before being eligible to write RHCE exam. If one passes RHCE exam first, then their record will be retained and when they passes RHCSA the earlier RHCE will be clubbed and person will be then RHCSA and RHCE. RHCSA exam is also performance based which evaluates skills through hands-on lab based system.

Certifications from Red Hat provide validation of a professional's technical expertise and knowledge. Nowadays enterprises looking for employees can give more preference to certifications as an input into hiring, promotions and other allowances, as these certifications are obtained from performance based exams.

Monday, 8 September 2014

Overview and Benefits of Red Hat Certifications

Red Hat is a company in the free and open source software sector, and a major Linux distribution vendor. It is based in California, and caters to worldwide operations. It is not only respected for its technical proficiency, but also for the social initiatives taken by it. RHCE engineers are part of the "One laptop per child" initiative. It is one of the few rare companies to involve itself in the dissemination of technology and information - worldwide, and at all economic levels and social orders.

Alongside this, Red Hat has always managed to be at the forefront of interactive media - by making it appeal to the target audience in the best way possible.

Benefits of Red Hat Certification Programs:
Red Hat certifications are among the most respected credentials in IT. They are a judge of whether the candidate can perform real world tasks based on his knowledge and experience. So it requires one to be an expert in all the RHCE products. And this is what the certification does - prove that you are an expert in the handling of RHCE products, and can be relied on for any technical assistance.

The program is flexible and works on a hierarchical model. Choosing the right certification depends on your background, job role and goals. It also depends on the amount and type of experience you have in handling and working with RHCE products.

You can work in a number of roles, from a technician, to an engineer and even an architect of the products, depending on what you choose for yourself. This gives you the power to ascertain for yourself how little or how much you want to get immersed in the product development and management.
In the IT sector, it is one of the best opportunities to be recognised for your skills and knowledge.

To know more about Hot RHCE certification training and resources for RHCT certification training, feel free to ask me or visit my site. Thank you.