Home  >  Article  >  Backend Development  >  The second edition of 'Step-by-Step Linux' will be published soon (with cover)_PHP Tutorial

The second edition of 'Step-by-Step Linux' will be published soon (with cover)_PHP Tutorial

WBOY
WBOYOriginal
2016-07-12 09:03:13991browse

The second edition of "Step-by-Step Linux" is about to be published (with cover)


It has been nearly 6 years since the first edition of "Step-by-Step Linux" was released. Over time, technology has changed a lot. The kernel version of the Linux system has been updated from 2.6.9 (RHEL4.x) to the current 3.10 (Centos7.x). Some of the content in the first version has become obsolete, and some parts of the Linux system are running The mechanism has also undergone great changes. In order to adapt to the trend of technological development and for all readers who support this book, I decided to revise this book and launch the second edition of "Step-by-Step Linux".
The second edition basically inherits the content structure of the first edition, and basically introduces the two Linux distributions Redhat Linux and Centos. The specific version used is Centos7.x/RHEL7.x; it will be discussed in the chapters. It will focus more on the key points, combine theory with practice, and increase the number of enterprise cases and practical applications;

In the basic knowledge section, it briefly introduces the current application fields of Linux, and then introduces some methods and techniques for mastering Linux learning, and then starts Introduces the installation and system structure of Linux. Of course, it also introduces commonly used commands and usage techniques under Linux, as well as the installation methods of software under Linux.

In the server setup chapter, in addition to the original content, the content of Mysql database is also added, which mainly introduces the application of high-performance Mysql database. It also adds the establishment of LAMP service environment, and then discusses server security strategies and faults. A lot of experience and technical summaries have been added to the investigation, which is worth reading.

In the system management chapter, this part of the content has basically not changed. It mainly revised some content on file system management and memory management, and added some of the latest Linux technical features.

In the performance tuning chapter, system optimization cases are added based on the original theory, and system optimization experience is introduced through a combination of theory and practice.

In the virtualization and cluster application chapter, this part is the highlight of the book. It has basically completely revised the original content. The three chapters introduce the proxmox VE virtualization platform and the high-availability software Keepalived respectively. The load balancing software LVS and HAproxy are introduced from the shallower to the deeper. The software application is introduced at the beginning, and the following two high-availability cluster application cases commonly used in the enterprise environment are introduced from the perspective of production application through specific enterprise cases. It can also be said that this article This chapter is the comprehensive application part of the book, which comprehensively introduces the construction and maintenance process of an enterprise's high-availability cluster environment from an application perspective.


Cover photo



Step-by-step Linux second edition table of contents

Part 1 Basic Knowledge

Chapter 1 Experience and skills in learning Linux

1.1 Current status and trends of Linux development in various fields
1.1.1 Linux and open source software
1.1.2 Development of Linux in the server field
1.1 .3 The development of Linux in the desktop field
1.1.4 The development of Linux in the mobile embedded field
1.1.5 The development of Linux in the cloud computing/big data field
1.2 Choose a Linux distribution that suits you
1.2.1 Common Linux distributions
1.2.2 The first choice for beginners - Centos series
1.2.3 The first choice for desktop platforms - Ubuntu Linux
1.2.4 The first choice for enterprise applications - Red Hat/Centos series
1.3 Develop good Linux operating habits
1.3.1 Be sure to get used to the command line method
1.3.2 Combine theory with practice
1.3.3 Learn to use Linux online help
1.3.4 Learn to think and solve problems independently
1.3.5 Learn professional English
1.3.6 Linux learning roadmap
1.4 Use virtualization technology to learn Linux
1.4.1 What is virtual machine software
1.4.2 Benefits of using virtual machine technology
1.4.3 Virtual machine operating environment and hardware requirements
1.4.4 Installation and use of virtual machines
1.5 Linux learning resources
1.5. 1 Internet resources, search engines, forums
1.5.2 Have this book by your side

Chapter 2 Various ways to install Linux system

2.1 Installation requirements
2.2 Several aspects of Linux Installation methods
2.2.1 Hard disk installation method
2.2.2 U disk installation method
2.2.3 Network installation method
2.2.4 Optical drive installation method
2.3 Optical drive installation process
2.3 .1 Partition naming scheme
2.3.2 Start the installation
2.4 U disk installation process

Chapter 3 Basic Structure of Linux System

3.1 Use of Linux Console
3.2 System and Hardware
3.2.1 Linux Hardware Resource Management
3.2.2 Use of Linux External Devices
3.3 Introduction to File System Structure
3.3.1 Directory Structure
3.3.2 System Core Composition
3.4 Introduction to the operating mechanism
3.4.1 Linux initialization init system
3.4.2 Change of runlevel to target
3.4.3 System shutdown process
3.5 System service management tool systemd
3.5.1 Startup, Stop and restart services
3.5.2 View, disable, and enable services
3.5.3 Comparison of systemd command and sysvinit command
3.6 Linux and SecureCRT
3.6.1 Overview of SecureCRT
3.6.2 SecureCR Installation and use
3.6.3 Linux commands related to SecureCRT

Chapter 4 Common Linux commands and usage techniques

4.1 Introduction to shell under Linux
4.1.1 What is shell
4.1.2 Shell command Syntax analysis
4.2 System management and maintenance
4.2.1 Command to display the contents of the specified working directory ls
4.2.2 Command to display the current working directory pwd
4.2.3 Command to change the current working directory cd
4.2.4 Command to display or modify system time and date date
4.2.5 Command to set user password passwd
4.2.6 Command to change identity su
4.2.7 Clear screen information Command clear
4.2.8 The command man
that displays the help information of the specified command 4.2.9 The command who
that displays the user information currently logged in to the system 4.2.10 The command w
4.2.11 Command to display operating system related information uname
4.2.12 Command to output system task queue information uptime
4.2.13 Command to list current information related to users who have logged in to the system in the past
4.2.14 The command to display boot information dmesg
4.2.15 The command to display the system memory status free
4.2.16 The command to display the instantaneous running dynamics of the system process ps
4.2.17 Real-time monitoring of the system processor status The command top
4.3 File management and editing
4.3.1 The command to create a directory mkdir
4.3.2 The command to display the content screen by screen more
4.3.3 Print the content of the file to the standard output Command cat
4.3.4 Command to compare files diff
4.3.5 Command to filter text grep
4.3.6 Command to delete a directory and all its files and subdirectories rm
4.3 .7 The command touch
to change the access time and modification time of a specified file 4.3.8 The ln
command to create a link between files or directories 4.3.9 The command file
to display the file type 4.3.10 Copy The command cp
for a file or directory 4.3.11 The command find
to find a specified file in a specified path 4.3.12 The command split
to split a document 4.3.13 The command to rename a file/directory or change its storage location mv
4.4 Compression and decompression
4.4.1 Commands to compress/decompress files or directories zip/unzip
4.4.2 Commands to compress/decompress files gzip/gunzip
4.4.3 Compression/ The command to decompress files bzip2/bunzip2
4.4.4 The command to package and archive files or directories tar
4.4.5 The command to convert or copy files dd
4.4.6 Redirection method to package backup, restore and restore File command cpio
4.5 Disk management and maintenance
4.5.1 Command to check disk space usage df
4.5.2 Command to display the disk space occupied by a file or directory du
4.5.3 Check the file system and try to fix the error. The command fsck
4.5.4 The command to force the data in the memory to be written back to the hard disk sync
4.5.5 The command to exit the removable device eject
4.5.6 Mount/ The command to unmount the specified file system mount/umount
4.6 Network settings and maintenance
4.6.1 The command to configure the network or display the current network interface status ifconfig
4.6.2 Copy the file or directory to another Linux The system command scp
4.6.3 The command netstat
that displays the local network connection, operating port, routing table and other information 4.6.4 The command traceroute
4.6 that displays the path information of network packet transmission to the specified host .5 Communicate with the remote host or obtain the information of the corresponding port of the remote host. Command telnet
4.6.6 Command to download software from the network wget
4.7 Text editing tool vi

Chapter 5 Chapter Installation and management of software under Linux

5.1 Source code installation method
5.1.1 Download and decompress the source code
5.1.2 Analyze the installation platform environment
5.1.3 Compile and install the software
5.1.4 Source code Install Apache Http server
5.2 RPM tool installation method
5.2.1 Introduction to RPM package management tools
5.2.2 RPM package types and commands
5.2.3 Use of RPM tools
5.3 yum installation method
5.3.1 Installation and configuration of yum
5.3.2 Features and basic usage of yum
5.3.3 Several good yum sources
5.4 Binary package installation method
5.4.1 Installation "* .tar.gz", "*.bz2" binary software package
5.4.2 Software package providing installation program
Part 2 Server Setup

Chapter 6 Linux Server Network Management

6.1 Installation of network card driver
6.1.1 General ideas for network card driver installation
6.1.2 Compile and install network card
6.2 Configure Linux network
6.2.1 Network configuration files of different Linux distributions
6.2.2 Detailed explanation of network configuration files
6.3 Linux network applications
6.3.1 IP Alias ​​function under Linux
6.3.2 Enable Linux proxy forwarding function
6.3.3 Concept and configuration of routing
6.3.4 Setting up a Linux router

Chapter 7 Setting up commonly used servers under Linux

7.1 Using OpenSSH to remotely manage Linux servers
7.2 Setting up a Web server
7.2.1 apache and The necessity of tomcat integration
7.2.2 Apache and Tomcat connector
7.2.3 Installation of Apache, tomcat and JK module
7.2.4 Apache and tomcat integration configuration
7.3 Construction of LAMP server
7.3.1 Overview of LAMP and WordPress
7.3.2 Building the LAMP service environment
7.3.3 Testing the correctness of the LAMP environment installation
7.4 Building the DNS server
7.4.1 DNS service overview
7.4.2 Building the DNS service
7.5 Building a Samba server
7.5.1 Concepts and functions of Samba
7.5.2 Installation and configuration of Samba

Chapter 8 Building a high-performance Mysql database system

8.1 MySQL and MariaDB
8.2 Common high-availability MySQL solutions
8.1.1 Master-slave replication solution
8.1.2 MMM high-availability solution
8.1.3 Heartbeat/SAN high-availability solution
8.1.4 Heartbeat/ DRBD high-availability solution
8.1.5 MySQL Cluster high-availability solution
8.2 Build a MySQL dual-master mode high-availability cluster system through KeepAlived
8.2.1 Introduction to MySQL Replication
8.2.2 MySQL Replication Implementation principle
8.2.3 Common architecture of MySQL Replication
8.2.4 MySQL master-active and mutual-standby mode architecture diagram
8.2.5 MySQL master-active and mutual-standby mode configuration
8.2.6 Configure KeepAlived to implement MySQL dual Master high availability
8.2.7 Test the MySQL master-slave synchronization function
8.2.8 Test KeepAlived to implement MySQL failover
8.3 Build a MySQL high availability cluster system through MMM
8.3.1 MMM high availability MySQL solution Introduction
8.3.2 MMM typical application solutions
8.3.3 MMM high-availability MySQL solution architecture diagram
8.3.4 MMM installation and configuration
8.3.5 MMM management
8.3.6 Test MMM to achieve MySQL high availability function
8.4 MySQL read-write separation solution
8.4.1 Common MySQL read-write separation solutions
8.4.2 Implement MySQL read-write separation through Amoeba

Chapter Chapter 9 Linux Server Security Strategies

9.1 Overview of Network Security
9.1.1 Common Attack Types
9.1.2 Attack Prevention Strategies
9.2 Common Security Strategies for Operating Systems
9.2.1 Software Upgrade
9.2.2 Ports and services
9.2.3 Password login security
9.2.4 Other security settings
9.3 Linux software firewall iptables
9.3.1 Usage environment of iptables
9.3.2 iptables Usage specifications and syntax
9.4 Backup of Linux system
9.4.1 Why to back up Linux system
9.4.2 Data that Linux system needs to back up
9.4.3 Backup media and methods
9.4. 4 Develop a backup strategy
9.4.5 Selection of backup tools

Chapter 10 Linux troubleshooting ideas and cases

10.1 Handling of common system faults under Linux
10.1.1 Processing Thoughts on Linux system failures
10.1.2 Forgot Linux root password
10.1.3 Solutions to Linux system failure to start
10.2 Common network troubleshooting under Linux
10.3 Common Linux server troubleshooting cases
10.3 "Read-onlyfile system" error and solution case
10.4 Confusion caused by su command to switch users
10.5 Linux system recovery case caused by NAS storage failure
10.5.1 Fault phenomenon description
10.5 .2 Problem judgment ideas
10.5.3 Problem handling process
10.5.4 Problem solving

Part 3 System Management

Chapter 11 Linux User Rights Management

11.1 Overview of user and user group management
11.1.1 Concepts of users and groups
11.1.2 Overview of user profiles
11.2 Introduction to user management tools
11.2.1 Add, switch and delete User group command groupadd/newgrp/groupdel
11.2.2 Add, modify and delete user command useradd/usermod/userdel
11.3 Setting files and permissions
11.3.1 View permission attributes of files
11.3.2 Use chown to change the owner and group
11.3.3 Use chmod to change access permissions

Chapter 12 Linux Disk Storage Management

12.1 Basic Concepts of Disk Management
12.1.1 Representation of disk devices in Linux
12.1.2 Mounting and use of devices
12.1.3 Disk partitioning standards
12.2 Use the fdisk tool to divide disk partitions
12.2.1 Introduction to the meaning of fdisk parameters
12.2.2 Explanation of fdisk examples
12.3 Use parted tool to plan disk partitions
12.3.1 Introduction to parted
12.3.2 How to use parted
12.3.3 Application examples of parted
12.4 LVM (Logical Volume Management)
12.4.1 Basic concepts of LVM
12.4.2 Terminology of LVM
12.4.3 Installing LVM tools
12.4.4 Creation and management of LVM

Chapter 13 Linux File System Management

13.1 Overview of File System
13.1.1 What is a File System
13.1.2 Why Use a File System
13.1.3 Usage of a File System Process
13.2 Introduction to commonly used file systems under Linux
12.2.1 ext3 and ext4 file systems
13.2.2 Reiserfs file system
13.2.3 XFS file system
13.3 Criteria for selecting file systems
13.4 Use of Network File System (NFS)
13.4.1 Introduction to NFS
13.4.2 Implementation principle of NFS
13.4.3 Installation and configuration of NFS
13.5 Recovery of accidental deletion on ext3/ext4 file system File
13.5.1 How to use the “rm -rf” command
13.5.2 The similarities and differences between extundelete and ext3grep
13.5.3 The recovery principle of extundelete
13.5.4 Installing extundelete
13.5.5 Detailed explanation of extundelete usage
13.5.6 Practical combat: The process of data recovery with extundelete

Chapter 14 Linux Memory Management

14.1 Physical Memory and Virtual Memory
14.2 Memory Monitoring
14.3 Use of swap space
14.4 Check the memory occupied by the process

Chapter Chapter 15 Linux system process management

15.1 Concept and classification of processes
15.2 Monitoring and management of processes
15.2.1 Use ps command to monitor system processes
15.2.2 Use pstree to monitor system processes
15.2.3 Use top to monitor system processes
15.2.4 Use lsof to monitor system processes and programs
15.2.5 Use pgrep to query process IDs
15.3 Use of crond for task scheduling processes
15.3.1 Introduction to crond
15.3.2 Use of the crontab tool
15.3.3 Precautions for using the crontab tool
15.4 Close the process
15.4.1 Use kill to terminate a process
15.4.2 Use killall to terminate a group of processes

Part 4 Performance Tuning

Chapter 16 Principles of Linux System Performance Optimization

16.1 Overview of Performance Issues
16.2 Factors Affecting Linux Performance
16.2.1 System Hardware Resources
16.2.2 Operating system related resources
16.2.3 Application software resources
16.3 Personnel involved in analyzing system performance
16.3.1 Linux operation and maintenance personnel
16.3.2 System architecture design Personnel
16.3.3 Software developers
16.4 System performance analysis tools
16.5 System performance analysis standards
16.6 Summary of this chapter

Chapter 17 Linux system performance evaluation and optimization cases

17.1 CPU performance evaluation
17.2 Memory performance evaluation
17.3 Disk I/O performance evaluation
17.4 Network performance evaluation
17.4.1 Detect network connectivity through ping command
17.4.2 Passed Use the netstat -i combination to detect the network interface status
17.4.3 Use the netstat -r combination to detect the routing table information of the system
17.4.4 Use the sar -n combination to display the network operating status of the system
17.4.5 This section Summary
17.5 Performance analysis and optimization cases based on web applications
17.5.1 Website optimization cases based on dynamic content
17.5.2 Website optimization cases based on a combination of dynamic and static content

Part Five: Virtualization and Cluster Applications

Chapter 18 Virtualization Cloud Computing Platform Proxmox VE

18.1 Introduction to OpenVZ
18.2 Introduction to KVM
18.3 Introduction to ProxmoxVE
18.4 Installing Proxmox VE
18.5 Use of ProxmoxVE
18.5.1 Description of Proxmox VE function options
18.5.2 Create openVZ virtual machine
18.5.3 Create KVM virtual machine

Chapter 19 High Performance Cluster software Keepalived

19.1 Definition of cluster
19.2 Characteristics and functions of cluster
19.2.1 High availability and scalability
19.2.2 Load balancing and error recovery
19.2.3 Heartbeat detection and drifting IP
19.3 Classification of clusters
19.3.1 High availability cluster
19.3.2 Load balancing cluster
19.3.3 Scientific computing cluster
19.4 Related terms in HA cluster
19.5 Introduction to Keepalived
19.5.1 Purpose of Keepalived
19.5.2 VRRP protocol and working principle
19.5.3 Working principle of Keepalived
19.5.4 Architecture of Keepalived
19.6 Installation and configuration of Keepalived
19.6.1 Keepalived installation process
19.6.2 Keepalived global configuration
19.6.3 Keepalived VRRPD configuration
19.6.4 Keepalived LVS configuration
19.7 Keepalived basic function application examples
19.7.1 Demonstration of basic HA functions of Keepalived
19.7.2 Monitoring cluster resources through vrrp_script
19.7.3 Master and Backup role election strategy in Keepalived cluster

Chapter 20 Load Balancing Cluster LVS and Haproxy

20.1 Introduction to LVS
20.2 LVS architecture
20.3 Characteristics of LVS cluster
20.4 Installation and use of LVS
20.4.1 Install IPVS management software
20.4.2 Usage of ipvsadm
20.5 Build LVS high availability cluster system through Keepalived
20.5.1 Instance environment
20.5.2 Configure Keepalived
20.5.3 Configure Real server node
20.5.4 Start Keepalived LVS Cluster system
20.6 Test high availability LVS load balancing cluster system
20.6.1 High availability function test
20.6.2 Load balancing test
20.6.3 Failover test
20.7 High performance load balancing Software HAProxy
20.7.1 Introduction to HAProxy
20.7.2 The difference between four-layer and seven-layer load balancing
20.7.3 Similarities and differences between HAProxy and LVS
20.8 HAProxy basic configuration and application examples
20.8 .1 Quickly install HAProxy cluster software
20.8.2 Detailed explanation of HAProxy basic configuration file
20.8.3 Intelligent load balancing through HAProxy ACL rules
20.8.4 Management and maintenance of HAProxy
20.8.5 Use HAProxy's Web monitoring platform
20.9 Build HAproxy KeepAlived high-availability load balancing system
20.9.1 Build environment description
20.9.2 Configure HAproxy load balancing server
20.9.3 Configure the primary and backup KeepAlived servers
20.10 Test the HAproxy KeepAlived high-availability load balancing cluster
20.10.1 Test the high-availability function of KeepAlived
20.10.2 Test the load balancing function

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/1084016.htmlTechArticleThe second edition of "Step-by-step Linux" will be published soon (with cover) From the first edition of "Step-by-step Linux", It has been nearly 6 years now. In 6 years, technology has changed a lot...
Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn