Configuring SUSE Linux Enterprise
Linux Training Architect II
This course and the rest of the series follow and more than cover the objectives for the SUSE Certified Administrator in Enterprise Linux 15 exam, #
In this second course of the series, we'll take a look at the practice of Remote Administration with SSH and VNC, including configuring the SSH client and server. We'll then dive deep into how SUSE Linux Enterprise Server systems boot, run and manage services via
systemd. We'll then learn all about processes on SUSE Linux Enterprise, managing them, backgrounding them and scheduling processes.
We'll finish up this course with a great section on managing users and groups, all about filesystem permissions and Access Control Lists and ending with privilege elevation/delegation via
We'll then recommend the next steps for those pursuing the full SUSE Certified Administrator in Enterprise Linux 15 exam and certification.
This course is the second in a five-part series of courses covering the SUSE Linux Enterprise Administrator for SLES 15 objectives and exam. In this video, we provide an overview of the Configuring SUSE Linux Enterprise course topics, labs, and what's next in the series.
About the Training Architect
This video provides an introduction to the course's author: Ross Brunson, Linux Training Architect II at Linux Academy.
Understanding Remote Administration with OpenSSH
In this first of a two-part lesson, we'll introduce the concept of remote administration, particularly via SSH, including how it works, and then explore with the most common SSH utilities to set your basic knowledge. This includes ssh, scp, and sftp. We'll continue with the lesser-used utilities for creating keys and scanning systems in the next part of the lesson.
Using the SSH Utilities
In this lesson we'll continue the of the SSH Client Utilities, use the ssh-keyscan utility to gather the remote key(s) from systems, verify them by eye, and then automate the verification process via a script and some helper files, all shown and explained fully. Additionally, we'll show how to use the ssh-keygen command to generate a key pair, where they go and what they are useful for.
In this lesson, we'll discuss the various options for the SSH client configuration, including
StrictHostKeyChecking and its available keywords for remote host key storage. We'll also cover a few of the options for the SSH daemon, including the choice of the protocol version, allow and deny users, and groups and the presence of other options for the daemon's configuration.
Additionally, we'll cover the steps for enabling password-less (passphrase) authentication between systems, including the
ssh-agent commands and how they work together to wrap your account/session in the appropriate identity to answer SSH-related authentication requests.
Understanding Remote Administration with VNC
Graphical-based remote administration is possible for SUSE Linux Enterprise systems using the VNC (virtual network connection) protocol and its included tools. In this lesson, we'll show you the way to configure the target system for the various types of connections and the different client options, either via an application or through a browser. Note: We use VNC to connect to our lesson and lab servers for a GUI desktop, so while we will talk through the configuration changes, we can't commit those changes or the access to the systems will cease to function.
Understanding the Boot Process
Getting systems to an operational state requires an understanding of the necessary steps, files, and directories. It's important to know how to change the system from one state of operation to another while providing the uptime and availability required by your organization's computing needs. In this lesson, we'll cover the basics of how a system boots, finds its hardware and any special drivers needed, and progress through the steps needed to become a fully functioning system.
Understanding the GRUB2 Bootloader
In this lesson, we'll familiarize you with the differences between the original GRUB and GRUB2, as well as what those differences mean. We'll take you through a brief walkthrough of the various configuration files and opportunities to customize the GRUB2 theme. Additionally, we'll show how the YaST system tool allows for the complete configuration of the GRUB2 boot environment, as well as how to edit the GRUB2 boot menu on system boot.
Defining and Describing `systemd`: Part 1
In part one of this two-part lesson, we'll walk you through what systemd is, how it differs from the SysV style, and how the systemd development team has explicitly tried to make the transition to systemd as painless as possible. We'll define and dissect systemd units, targets, and how to map SysV runlevels to their corresponding systemd targets. Additionally, in part two, we'll show how to query, manage, and maintain systemd service units with a variety of commands, including legacy tools that still work on systemd. We will also cover CPU control groups used by systemd, how to query and view their contents, and see what control groups and processes are doing to your system resources.
Defining and Describing `systemd`: Part 2
In part two of this lesson, we'll show how to query, manage, and maintain systemd service units with a variety of commands, including legacy tools that still work on systemd. We will also cover CPU control groups used by systemd, how to query and view their contents, and see what control groups and processes are doing to your system resources.
Understanding Process Administration: Part 1
Process administration is a key part of being a system operator. Invoking processes, querying the various sources for process-related information, and acting on the information found is sometimes a daily part of the duties of system administration. In this lesson (part one of two), we define processes and their relationships with each other, and discover how to find process information, as well as how to query, view, and filter this information. In part two, we'll show how to act on the information found by sending controlling signals to processes to affect their behavior.
Understanding Process Administration: Part 2
In this lesson, we continue our exploration of processes, the signals that can control our processes, and the tools we use to send those signals to the processes. Additionally, we define system priorities, how to change them, and what to do if processes are taking up too many resources, or not processing fast enough. We'll include how to invoke them with altered priorities and how to remediate misbehaving processes.
Understanding Background Processes
Process management can take many forms, but a critical one is being able to use a single terminal or SSH connection to your advantage by turning processes into jobs and acting on them with the various job utilities.
Additionally, we show how to use the
screen command to manage your processes by putting them into sessions and windows in those sessions. By doing this, you can run processes in full-screen, as if each process had its own terminal, but it's manageable over a single terminal instance or SSH connection.
Understanding Process Scheduling
Scheduling processes to run either an ad hoc or on a stringent schedule is a large part of automating responsibilities in the enterprise environment. To set processes or tasks to run without having to invoke them is an important skill to possess. In this lesson, we'll cover several ways to schedule tasks, the process of creating those schedules, and the commands needed to create, list, manage, and troubleshoot.
Identity and Security
Understanding User Management
The creation, management, modification, and removal of users and groups on Linux systems is sometimes a much more frequent duty that must be performed correctly. Today's system administrators must properly create and troubleshoot issues with individuals or groups of users who access system resources. In this lesson, we'll define the users and groups on a Linux system and explore how to view related files that contain these entries. We'll show you how to use the command line tools to create, modify, and delete while displaying the YaST tool's options for graphical user and group management.
Understanding Filesystem Permissions: Part 1
This is part one of a two-part lesson, where we'll cover the standard filesystem permissions, ownership, and demystify the special bit permissions. We'll show how to set and alter permissions, as well as set and change a user's or group's ownership of files and directories. Additionally, we'll cover default file and directory permissions and what happens when a umask is set. We'll touch on how the permissions are interpreted or altered while discovering how to calculate effective permissions when setting the umask.
Understanding Filesystem Permissions: Part 2
This is part two of a two-part lesson where we'll cover the concept of access control lists (ACLs). We'll define ACLs, describe the types of ACLs, and explain how they can provide flexible access to files and directories for collaboration and sharing. We'll cover default ACLs and how they help with inheritance issues. We'll also discuss ACL masks, including how they perform as a safety measure or upper limit on ACL permissions. Additionally, we'll set, modify, add, and delete ACLs on files and directories to grant, change, and remove access to objects.
Understanding Privilege Delegation
In this lesson, we'll cover the traditional methods of providing access to higher-than-regular user tools and capabilities, and then quickly move on to more advanced methods of elevating privilege and delegating responsibility via
sudo. We'll show the defaults and examples of how configurations are made to enable non-
root users to have access to
root-level commands without jeopardizing the
Additionally, we'll cover how to use more advanced features of
sudo, such as user, command, and other aliases to effectively grant, control, and maintain appropriate access without having to configure each instance with a custom entry in the
Where do I go from here?
This is a short video that shows you what is up next, which will be the Course 454 - Managing SUSE Linux Enterprise.
Take this course and learn a new skill today.
Transform your learning with our all access plan.Start 7-Day Free Trial