Difference between revisions of "RHEL Essentials - Introduction"

From Techotopia
Jump to: navigation, search
(Created page with "hello")
 
Line 1: Line 1:
hello
+
<table border="0" cellspacing="0" width="100%"><tr>
 +
<td width="20%">[[Red Hat Enterprise Linux Essentials|Previous]]<td align="center">[[Red Hat Enterprise Linux Essentials|Table of Contents]]<td width="20%" align="right">[[The History of Red Hat Linux|Next]]</td>
 +
<tr>
 +
<td width="20%"><td align="center"><td width="20%" align="right"></td>
 +
</table>
 +
<hr>
 +
 
 +
 
 +
<htmlet>rhel8</htmlet>
 +
 
 +
 +
Arguably one of the most highly regarded and widely used enterprise level operating systems available today is the Red Hat Enterprise Linux (typically shortened to RHEL and pronounced ''rell'') distribution. Not only is it considered to be among the most stable and reliable operating systems, it is also backed by the considerable resources and technical skills of Red Hat, Inc.
 +
 +
RHEL 8 Essentials is designed to provide detailed information on the installation, use and administration of the Red Hat Enterprise Linux 8 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers and installing packages and system updates using App Streams. Additional installation topics such as dual booting with Microsoft Windows are also covered, together with all important security topics such as configuring a firewall and user and group administration.
 +
 +
For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system.
 +
 +
== Superuser Conventions ==
 +
 
 +
RHEL 8, in common with Linux in general, has two types of user account, one being a standard user account with restricted access to many of the administrative files and features of the operating system, and the other a superuser (''su - ''command:
 +
 
 +
<pre>
 +
[neil@rhel8-demo ~]$ su -
 +
Password:
 +
[root@rhel8-demo ~]#
 +
</pre>
 +
 +
Note that the command prompt for a regular user ends with a $ sign while the root user has a # character. When working with the command-line, this is a useful indication as to whether or not you are currently issuing commands as the root user.
 +
 +
Alternatively, a single command requiring root privileges may be executed by a non-root user via the ''sudo'' command. Consider the following attempt to update the operating system with the latest patches and packages:
 +
 
 +
<pre>
 +
[neil@rhel8-demo ~]$ dnf update
 +
Not root, Subscription Management repositories not updated
 +
Error: This command has to be run under the root user.
 +
</pre>
 +
 +
Optionally, user accounts may be configured so that they have access to root level privileges. Instead of using the ''su -'' command to first gain root access, user accounts with administration privileges are able to run otherwise restricted commands using ''sudo''.
 +
 
 +
<pre>
 +
[neil@rhel8-demo]$ sudo dnf update
 +
&#160;
 +
We trust you have received the usual lecture from the local System
 +
Administrator. It usually boils down to these three things:
 +
&#160;
 +
    #1) Respect the privacy of others.
 +
    #2) Think before you type.
 +
    #3) With great power comes great responsibility.
 +
&#160;
 +
[sudo] password for neil:
 +
Updating Subscription Management repositories.
 +
.
 +
.
 +
</pre>
 +
 +
The reason for raising this issue so early in the book is that many of the command-line examples outlined in this book will require root privileges. Rather than repetitively preface every command-line example with directions to run the command as root, the command prompt at the start of the line will be used to indicate whether or not the command needs to be performed as root. If the command can be run as a regular user, the command will be prefixed with a $ command prompt as follows:
 +
 
 +
<pre>
 +
$ date
 +
</pre>
 +
 +
If, on the other hand, the command requires root privileges, the command will be preceded by a # command prompt:
 +
 
 +
<pre>
 +
# dnf install openssh
 +
</pre>
 +
 +
== Errata ==
 +
 
 +
While we make every effort to ensure the accuracy of the content of this book, it is inevitable that a book covering a subject area of this size and complexity may include some errors and oversights. Any known issues with the book will be outlined, together with solutions, at the following URL:
 +
 +
https://www.ebookfrenzy.com/errata/rhel8.html
 +
 
 +
 
 +
<htmlet>rhel8</htmlet>
 +
 
 +
 
 +
<hr>
 +
<table border="0" cellspacing="0" width="100%"><tr>
 +
<td width="20%">[[Red Hat Enterprise Linux Essentials|Previous]]<td align="center">[[Red Hat Enterprise Linux Essentials|Table of Contents]]<td width="20%" align="right">[[The History of Red Hat Linux|Next]]</td>
 +
<tr>
 +
<td width="20%"><td align="center"><td width="20%" align="right"></td>
 +
</table>

Revision as of 18:19, 9 June 2019

PreviousTable of ContentsNext


You are reading a sample chapter from the Red Hat Enterprise Linux 8 (RHEL 8) Essentials book.

Purchase a full copy of Red Hat Enterprise Linux 8 (RHEL 8) Essentials in eBook ($9.99) or Print ($36.99) format

Red Hat Enterprise Linux 8 Essentials Print and eBook (ePub/PDF/Kindle) editions contain 31 chapters and over 250 pages

Buy Print Preview Book


Arguably one of the most highly regarded and widely used enterprise level operating systems available today is the Red Hat Enterprise Linux (typically shortened to RHEL and pronounced rell) distribution. Not only is it considered to be among the most stable and reliable operating systems, it is also backed by the considerable resources and technical skills of Red Hat, Inc.

RHEL 8 Essentials is designed to provide detailed information on the installation, use and administration of the Red Hat Enterprise Linux 8 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers and installing packages and system updates using App Streams. Additional installation topics such as dual booting with Microsoft Windows are also covered, together with all important security topics such as configuring a firewall and user and group administration.

For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system.

Superuser Conventions

RHEL 8, in common with Linux in general, has two types of user account, one being a standard user account with restricted access to many of the administrative files and features of the operating system, and the other a superuser (su - command:

[neil@rhel8-demo ~]$ su -
Password: 
[root@rhel8-demo ~]#

Note that the command prompt for a regular user ends with a $ sign while the root user has a # character. When working with the command-line, this is a useful indication as to whether or not you are currently issuing commands as the root user.

Alternatively, a single command requiring root privileges may be executed by a non-root user via the sudo command. Consider the following attempt to update the operating system with the latest patches and packages:

[neil@rhel8-demo ~]$ dnf update
Not root, Subscription Management repositories not updated
Error: This command has to be run under the root user.

Optionally, user accounts may be configured so that they have access to root level privileges. Instead of using the su - command to first gain root access, user accounts with administration privileges are able to run otherwise restricted commands using sudo.

[neil@rhel8-demo]$ sudo dnf update
 
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:
 
    #1) Respect the privacy of others.
    #2) Think before you type.
    #3) With great power comes great responsibility.
 
[sudo] password for neil:
Updating Subscription Management repositories.
.
.

The reason for raising this issue so early in the book is that many of the command-line examples outlined in this book will require root privileges. Rather than repetitively preface every command-line example with directions to run the command as root, the command prompt at the start of the line will be used to indicate whether or not the command needs to be performed as root. If the command can be run as a regular user, the command will be prefixed with a $ command prompt as follows:

$ date

If, on the other hand, the command requires root privileges, the command will be preceded by a # command prompt:

# dnf install openssh

Errata

While we make every effort to ensure the accuracy of the content of this book, it is inevitable that a book covering a subject area of this size and complexity may include some errors and oversights. Any known issues with the book will be outlined, together with solutions, at the following URL:

https://www.ebookfrenzy.com/errata/rhel8.html


You are reading a sample chapter from the Red Hat Enterprise Linux 8 (RHEL 8) Essentials book.

Purchase a full copy of Red Hat Enterprise Linux 8 (RHEL 8) Essentials in eBook ($9.99) or Print ($36.99) format

Red Hat Enterprise Linux 8 Essentials Print and eBook (ePub/PDF/Kindle) editions contain 31 chapters and over 250 pages

Buy Print Preview Book



PreviousTable of ContentsNext