Foreword |
|
xv | |
About the Author |
|
xvii | |
About the Technical Reviewer |
|
xix | |
Introduction |
|
xxi | |
|
Performing an Advanced Ubuntu Server Installation |
|
|
1 | (28) |
|
What's So Special About an Enterprise Installation? |
|
|
1 | (2) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
Preparing for the Installation in a Network |
|
|
3 | (4) |
|
|
4 | (1) |
|
|
5 | (2) |
|
|
7 | (17) |
|
Starting the Installation |
|
|
8 | (1) |
|
Creating a Software-Based RAID Solution |
|
|
9 | (7) |
|
Creating LVM Logical Volumes on Top of a Software RAID Device |
|
|
16 | (6) |
|
Completing the Installation |
|
|
22 | (2) |
|
|
24 | (4) |
|
|
24 | (2) |
|
|
26 | (2) |
|
|
28 | (1) |
|
Using Ubuntu Server for System Imaging |
|
|
29 | (16) |
|
Setting Up a Clonezilla Imaging Server |
|
|
29 | (1) |
|
Setting Up Diskless Remote Boot in Linux |
|
|
30 | (3) |
|
Installing the DRBL Software |
|
|
31 | (1) |
|
Configuring the DRBL Software |
|
|
32 | (1) |
|
Setting Up the DHCP Server |
|
|
33 | (2) |
|
Completing Clonezilla Configuration |
|
|
35 | (1) |
|
Configuring the Clients for Cloning |
|
|
36 | (7) |
|
Setting Up the Server for Cloning |
|
|
37 | (2) |
|
|
39 | (4) |
|
|
43 | (2) |
|
|
45 | (38) |
|
Interpreting What Your Computer Is Doing: top |
|
|
45 | (6) |
|
|
46 | (2) |
|
CPU Performance Monitoring |
|
|
48 | (1) |
|
Memory Monitoring with top |
|
|
49 | (1) |
|
Process Monitoring with top |
|
|
50 | (1) |
|
Analyzing CPU Performance |
|
|
51 | (6) |
|
|
57 | (8) |
|
Monitoring Storage Performance |
|
|
65 | (7) |
|
Monitoring Network Performance |
|
|
72 | (8) |
|
|
80 | (1) |
|
|
81 | (2) |
|
|
83 | (26) |
|
Strategies for Optimizing Performance |
|
|
83 | (4) |
|
|
83 | (2) |
|
|
85 | (2) |
|
|
87 | (4) |
|
Understanding CPU Performance |
|
|
87 | (1) |
|
Optimizing CPU Performance |
|
|
88 | (3) |
|
|
91 | (5) |
|
Understanding Memory Performance |
|
|
91 | (1) |
|
|
92 | (4) |
|
Tuning Storage Performance |
|
|
96 | (2) |
|
Understanding Storage Performance |
|
|
96 | (1) |
|
Optimizing the I/O Scheduler |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (9) |
|
|
98 | (2) |
|
|
100 | (5) |
|
Some Hints on Samba and NFS Performance Optimization |
|
|
105 | (1) |
|
Generic Network Performance Optimization Tips |
|
|
106 | (1) |
|
|
107 | (2) |
|
Advanced File System Management |
|
|
109 | (22) |
|
Understanding File Systems |
|
|
109 | (7) |
|
|
110 | (2) |
|
Superblocks, Inode Bitmaps, and Block Bitmaps |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (14) |
|
|
116 | (8) |
|
|
124 | (4) |
|
|
128 | (2) |
|
|
130 | (1) |
|
|
131 | (30) |
|
|
131 | (4) |
|
|
135 | (17) |
|
Location of the Configuration Files |
|
|
135 | (1) |
|
The Master Configuration File: nagios.cfg |
|
|
136 | (2) |
|
Creating Essential Nagios Configuration Files |
|
|
138 | (14) |
|
|
152 | (3) |
|
Configuring NRPE on the Monitored Server |
|
|
152 | (2) |
|
Configuring the Nagios Server to Use NRPE |
|
|
154 | (1) |
|
|
155 | (4) |
|
|
159 | (2) |
|
Creating an Open Source SAN |
|
|
161 | (36) |
|
Preparing Your Open Source SAN |
|
|
163 | (1) |
|
|
163 | (1) |
|
Installing Required Software |
|
|
163 | (1) |
|
Setting Up the Distributed Replicated Block Device |
|
|
164 | (5) |
|
Accessing the SAN with iSCSI |
|
|
169 | (6) |
|
Configuring the iSCSI Target |
|
|
169 | (4) |
|
Configuring the iSCSI Initiator |
|
|
173 | (2) |
|
|
175 | (19) |
|
Setting Up the Base Cluster from /etc/ha.d/ha.cf |
|
|
175 | (5) |
|
Configuring Cluster Resources |
|
|
180 | (7) |
|
Backing Up the Cluster Configuration |
|
|
187 | (4) |
|
|
191 | (3) |
|
Heartbeat Beyond the Open Source SAN |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | (34) |
|
|
197 | (4) |
|
|
201 | (1) |
|
|
202 | (18) |
|
|
202 | (1) |
|
|
203 | (12) |
|
Adding Information to the LDAP Database |
|
|
215 | (2) |
|
Using Idapsearch to Verify Your Configuration |
|
|
217 | (3) |
|
Using LDAP Management Commands |
|
|
220 | (3) |
|
Modifying Entries in the LDAP Database |
|
|
221 | (1) |
|
Deleting Entries from the LDAP Database |
|
|
222 | (1) |
|
|
222 | (1) |
|
Logging In to an LDAP Server |
|
|
223 | (7) |
|
Configuring PAM for LDAP Authentication |
|
|
223 | (5) |
|
Setting Up nsswitch.conf to Find LDAP Services |
|
|
228 | (2) |
|
Testing LDAP Client Connectivity |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (18) |
|
Setting Up Samba the Easy Way |
|
|
231 | (5) |
|
Creating a Local Directory to Share |
|
|
232 | (1) |
|
Applying Permissions to the Local Directory |
|
|
232 | (1) |
|
|
232 | (3) |
|
Creating a Samba User Account |
|
|
235 | (1) |
|
Testing Access to the Share |
|
|
235 | (1) |
|
Integrating Samba with LDAP |
|
|
236 | (5) |
|
Preparing Samba to Talk to LDAP |
|
|
236 | (1) |
|
Preparing LDAP to Work with Samba |
|
|
237 | (1) |
|
Telling Samba to Use LDAP |
|
|
238 | (3) |
|
Using Samba As a Primary Domain Controller |
|
|
241 | (3) |
|
Changing the Samba Configuration File |
|
|
241 | (2) |
|
Creating Workstation Accounts |
|
|
243 | (1) |
|
Integrating Samba in Active Directory |
|
|
244 | (1) |
|
Making Samba a Member of the Active Directory Domain |
|
|
244 | (1) |
|
Using Kerberos to Make Samba a Member of Active Directory |
|
|
245 | (1) |
|
Authenticating Linux Users on Windows with Winbind |
|
|
245 | (2) |
|
|
247 | (2) |
|
Configuring Ubuntu Server As a Mail Server |
|
|
249 | (32) |
|
Understanding the Components of a Mail Solution |
|
|
249 | (1) |
|
Configuring the Postfix MTA |
|
|
250 | (24) |
|
Handling Inbound and Outbound Mail |
|
|
251 | (5) |
|
Installing Postfix and Configuring the Initial Settings |
|
|
256 | (1) |
|
Configuring Postfix Further |
|
|
257 | (5) |
|
Managing Postfix Components |
|
|
262 | (1) |
|
Configuring the Master Daemon |
|
|
263 | (1) |
|
Configuring Global Settings |
|
|
264 | (3) |
|
Configuring a Simple Postfix Mail Server |
|
|
267 | (2) |
|
Tuning Postfix with Lookup Tables |
|
|
269 | (4) |
|
Using Postfix Management Tools |
|
|
273 | (1) |
|
Receiving E-mail Using IMAP or POP3 |
|
|
274 | (6) |
|
Fetching E-mail Using Cyrus IMAPd |
|
|
275 | (3) |
|
Filtering Incoming E-mail with procmail |
|
|
278 | (1) |
|
Getting E-mail with POP3 Using Qpopper |
|
|
279 | (1) |
|
|
280 | (1) |
|
Managing Ubuntu Server Security |
|
|
281 | (22) |
|
|
281 | (9) |
|
|
282 | (1) |
|
|
282 | (1) |
|
The Need for a Certificate Authority |
|
|
283 | (1) |
|
Creating a Certificate Authority and Server Certificates |
|
|
284 | (6) |
|
Securing Applications with AppArmor |
|
|
290 | (12) |
|
|
290 | (3) |
|
Installing and Starting AppArmor |
|
|
293 | (1) |
|
Creating and Managing AppArmor Profiles |
|
|
294 | (5) |
|
|
299 | (1) |
|
Monitoring AppArmor's Status |
|
|
299 | (3) |
|
|
302 | (1) |
|
Configuring Ubuntu Server As a VPN Server |
|
|
303 | (18) |
|
Installing and Configuring OpenVPN |
|
|
303 | (10) |
|
|
304 | (1) |
|
|
305 | (8) |
|
Configuring the VPN Server |
|
|
313 | (3) |
|
Configuring a Linux VPN Client |
|
|
316 | (4) |
|
Configuring Windows Clients |
|
|
320 | (1) |
|
|
320 | (1) |
|
Configuring Kerberos and NTP on Ubuntu Server |
|
|
321 | (22) |
|
Configuring an NTP Time Server |
|
|
321 | (8) |
|
|
322 | (5) |
|
Customizing Your NTP Server |
|
|
327 | (2) |
|
|
329 | (1) |
|
Installing and Configuring Kerberos |
|
|
330 | (2) |
|
Configuring the Kerberos Server |
|
|
332 | (7) |
|
Configuring Generic Kerberos Settings |
|
|
332 | (3) |
|
Configuring the KDC Settings |
|
|
335 | (4) |
|
Configuring the Kerberos Client |
|
|
339 | (2) |
|
Configuring Simple Kerberos Applications |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (2) |
|
Ubuntu Server Troubleshooting |
|
|
343 | (40) |
|
|
344 | (7) |
|
|
351 | (9) |
|
Working with init=/bin/bash |
|
|
351 | (2) |
|
|
353 | (4) |
|
Working with a Knoppix Rescue CD |
|
|
357 | (3) |
|
Common Problems and How to Fix Them |
|
|
360 | (21) |
|
|
361 | (3) |
|
|
364 | (1) |
|
|
365 | (3) |
|
LVM Logical Volume Problems |
|
|
368 | (7) |
|
|
375 | (3) |
|
|
378 | (2) |
|
Lost Administrator Password |
|
|
380 | (1) |
|
|
381 | (2) |
Index |
|
383 | |