CentOS 7 Server Deployment Cookbook

Deploy and manage today's essential services on an enterprise-class, open operating system
Preview in Mapt
Code Files

CentOS 7 Server Deployment Cookbook

Timothy Boronczyk

2 customer reviews
Deploy and manage today's essential services on an enterprise-class, open operating system

Quick links: > What will you learn?> Table of content> Product reviews

Mapt Subscription
FREE
$29.99/m after trial
eBook
$28.00
RRP $39.99
Save 29%
Print + eBook
$49.99
RRP $49.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$28.00
$49.99
$29.99 p/m after trial
RRP $39.99
RRP $49.99
Subscription
eBook
Print + eBook
Start 14 Day Trial

Frequently bought together


CentOS 7 Server Deployment Cookbook Book Cover
CentOS 7 Server Deployment Cookbook
$ 39.99
$ 28.00
CentOS 7 Linux Server Cookbook - Second Edition Book Cover
CentOS 7 Linux Server Cookbook - Second Edition
$ 39.99
$ 28.00
Buy 2 for $35.00
Save $44.98
Add to Cart

Book Details

ISBN 139781783288885
Paperback406 pages

Book Description

CentOS is derived from Red Hat Enterprise Linux (RHEL) sources and is widely used as a Linux server. This book will help you to better configure and manage Linux servers in varying scenarios and business requirements.

Starting with installing CentOS, this book will walk you through the networking aspects of CentOS. You will then learn how to manage users and their permissions, software installs, disks, filesystems, and so on. You’ll then see how to secure connection to remotely access a desktop and work with databases. Toward the end, you will find out how to manage DNS, e-mails, web servers, and more. You will also learn to detect threats by monitoring network intrusion. Finally, the book will cover virtualization techniques that will help you make the most of CentOS.

Table of Contents

Chapter 1: Getting Started with CentOS
Introduction
Installing CentOS using Anaconda in graphics mode
Installing CentOS using Anaconda in text mode
Coordinating multiple installations using Kickstart
Running a cloud image with Amazon Web Services' EC2
Installing a container image from the Docker Registry
Installing the GNOME desktop
Installing the KDE Plasma desktop
Chapter 2: Networking
Introduction
Setting a static IP address
Binding multiple addresses to a single Ethernet device
Bonding two Ethernet devices
Configuring the network firewall with FirewallD
Configuring the network firewall using iptables
Installing a DHCP server
Configuring an NFS server to share a filesystem
Configuring an NFS client to use a shared filesystem
Serving Windows shares with Samba
Chapter 3: User and Permission Management
Introduction
Escalating privileges with sudo
Enforcing password restrictions
Setting default permissions for new files and directories
Running binaries as a different user
Working with SELinux for greater security
Chapter 4: Software Installation Management
Introduction
Registering the EPEL and Remi repositories
Prioritizing repositories using the Priorities plugin
Automating software updates with yum-cron
Verifying installed RPM packages
Compiling a program from source
Chapter 5: Managing Filesystems and Storage
Introduction
Viewing the size of files and available storage
Setting storage limits for users and groups
Creating a RAM disk
Creating a RAID
Replacing a device in a RAID
Creating a new LVM volume
Removing an existing LVM volume
Adding storage and growing an LVM volume
Working with LVM snapshots
Chapter 6: Allowing Remote Access
Introduction
Running commands remotely through SSH
Configuring a more secure SSH login
Securely connecting to SSH without a password
Restricting SSH access by user or group
Protecting SSH with Fail2ban
Confining sessions to a chroot jail
Configuring TigerVNC
Tunneling VNC connections through SSH
Chapter 7: Working with Databases
Introduction
Setting up a MySQL database
Backing up and restoring a MySQL database
Configuring MySQL replication
Standing up a MySQL cluster
Setting up a MongoDB database
Backing up and restoring a MongoDB database
Configuring a MongoDB replica set
Setting up an OpenLDAP directory
Backing up and restoring an OpenLDAP database
Chapter 8: Managing Domains and DNS
Introduction
Setting up BIND as a resolving DNS server
Configuring BIND as an authoritative DNS server
Writing a reverse lookup zone file
Setting up a slave DNS server
Configuring rndc to control BIND
Chapter 9: Managing E-mails
Introduction
Configuring Postfix to provide SMTP services
Adding SASL to Postfix with Dovecot
Configuring Postfix to use TLS
Configuring Dovecot for secure POP3 and IMAP access
Targeting spam with SpamAssassin
Routing messages with Procmail
Chapter 10: Managing Web Servers
Introduction
Installing Apache HTTP Server and PHP
Configuring name-based virtual hosting
Configuring Apache to serve pages over HTTPS
Enabling overrides and performing URL rewriting
Installing NGINX as a load balancer
Chapter 11: Safeguarding Against Threats
Introduction
Sending messages to Syslog
Rotating log files with logrotate
Using Tripwire to detect modified files
Using ClamAV to fight viruses
Checking for rootkits with chkrootkit
Using Bacula for network backups
Chapter 12: Virtualization
Introduction
Creating a new virtual machine
Cloning a virtual machine
Adding storage to a virtual machine
Connecting USB peripherals to a guest system
Configuring a guest's network interface

What You Will Learn

  • See how to deploy CentOS easily and painlessly, even in multi-server environments
  • Configure various methods of remote access to the server so you don’t always have to be in the data center
  • Make changes to the default configuration of many services to harden them and increase the security of the system
  • Learn to manage DNS, emails and web servers
  • Protect yourself from threats by monitoring and logging network intrusion and system intrusion attempts, rootkits, and viruses
  • Take advantage of today’s powerful hardware by running multiple systems using virtualization

Authors

Table of Contents

Chapter 1: Getting Started with CentOS
Introduction
Installing CentOS using Anaconda in graphics mode
Installing CentOS using Anaconda in text mode
Coordinating multiple installations using Kickstart
Running a cloud image with Amazon Web Services' EC2
Installing a container image from the Docker Registry
Installing the GNOME desktop
Installing the KDE Plasma desktop
Chapter 2: Networking
Introduction
Setting a static IP address
Binding multiple addresses to a single Ethernet device
Bonding two Ethernet devices
Configuring the network firewall with FirewallD
Configuring the network firewall using iptables
Installing a DHCP server
Configuring an NFS server to share a filesystem
Configuring an NFS client to use a shared filesystem
Serving Windows shares with Samba
Chapter 3: User and Permission Management
Introduction
Escalating privileges with sudo
Enforcing password restrictions
Setting default permissions for new files and directories
Running binaries as a different user
Working with SELinux for greater security
Chapter 4: Software Installation Management
Introduction
Registering the EPEL and Remi repositories
Prioritizing repositories using the Priorities plugin
Automating software updates with yum-cron
Verifying installed RPM packages
Compiling a program from source
Chapter 5: Managing Filesystems and Storage
Introduction
Viewing the size of files and available storage
Setting storage limits for users and groups
Creating a RAM disk
Creating a RAID
Replacing a device in a RAID
Creating a new LVM volume
Removing an existing LVM volume
Adding storage and growing an LVM volume
Working with LVM snapshots
Chapter 6: Allowing Remote Access
Introduction
Running commands remotely through SSH
Configuring a more secure SSH login
Securely connecting to SSH without a password
Restricting SSH access by user or group
Protecting SSH with Fail2ban
Confining sessions to a chroot jail
Configuring TigerVNC
Tunneling VNC connections through SSH
Chapter 7: Working with Databases
Introduction
Setting up a MySQL database
Backing up and restoring a MySQL database
Configuring MySQL replication
Standing up a MySQL cluster
Setting up a MongoDB database
Backing up and restoring a MongoDB database
Configuring a MongoDB replica set
Setting up an OpenLDAP directory
Backing up and restoring an OpenLDAP database
Chapter 8: Managing Domains and DNS
Introduction
Setting up BIND as a resolving DNS server
Configuring BIND as an authoritative DNS server
Writing a reverse lookup zone file
Setting up a slave DNS server
Configuring rndc to control BIND
Chapter 9: Managing E-mails
Introduction
Configuring Postfix to provide SMTP services
Adding SASL to Postfix with Dovecot
Configuring Postfix to use TLS
Configuring Dovecot for secure POP3 and IMAP access
Targeting spam with SpamAssassin
Routing messages with Procmail
Chapter 10: Managing Web Servers
Introduction
Installing Apache HTTP Server and PHP
Configuring name-based virtual hosting
Configuring Apache to serve pages over HTTPS
Enabling overrides and performing URL rewriting
Installing NGINX as a load balancer
Chapter 11: Safeguarding Against Threats
Introduction
Sending messages to Syslog
Rotating log files with logrotate
Using Tripwire to detect modified files
Using ClamAV to fight viruses
Checking for rootkits with chkrootkit
Using Bacula for network backups
Chapter 12: Virtualization
Introduction
Creating a new virtual machine
Cloning a virtual machine
Adding storage to a virtual machine
Connecting USB peripherals to a guest system
Configuring a guest's network interface

Book Details

ISBN 139781783288885
Paperback406 pages
Read More
From 2 reviews

Read More Reviews

Recommended for You

CentOS 7 Linux Server Cookbook - Second Edition Book Cover
CentOS 7 Linux Server Cookbook - Second Edition
$ 39.99
$ 28.00
Mastering CentOS 7 Linux Server Book Cover
Mastering CentOS 7 Linux Server
$ 39.99
$ 28.00
Linux: Powerful Server Administration Book Cover
Linux: Powerful Server Administration
$ 79.99
$ 56.00
SELinux System Administration - Second Edition Book Cover
SELinux System Administration - Second Edition
$ 39.99
$ 28.00
Troubleshooting CentOS Book Cover
Troubleshooting CentOS
$ 23.99
$ 16.80
Mastering Linux Network Administration Book Cover
Mastering Linux Network Administration
$ 39.99
$ 28.00