Oracle Solaris 11 Advanced System Administration Ed 3 (Student Guide Volume 2)
User Manual:
Open the PDF directly: View PDF
Page Count: 390 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Oracle Solaris 11 Advanced System Administration - Student Guide - Volume II
- Table of Contents
- Lesson 7: Managing Services and Service Properties
- Objectives
- Workflow Orientation
- Lesson Agenda
- Planning for Services Configuration
- SMF Advanced Features
- SMF Profiles
- SMF Profile: Example
- When SMF Profiles Are Applied
- SMF Manifests
- SMF Manifest: Example
- Service Configuration Repository
- SMF Administrative Layers
- Introducing SMF Repository Backups
- Introducing SMF Repository Snapshots
- Creating New Service Scripts
- Implementing the Services Administration Plan
- Quiz
- Lesson Agenda
- Configuring SMF Services
- Creating and Exporting a Service
- Creating and Exporting a Service: Example
- Creating and Importing a Service: Example
- Creating and Exporting a Service: Example
- Modifying a Service’s Manifest
- Modifying a Service’s Manifest: Example
- Changing an Environment Variable for a Service
- Changing an Environment Variable for a Service: Example
- Changing a Property for an inetd-Controlled Service
- Changing a Property for an inetd-Controlled Service: Example
- Creating and Applying an SMF Profile
- Creating and Applying an SMF Profile: Example
- Changing Services and Their Configurations by Using the netservices Command
- Practice 7-1 and Practice 7-2 Overview: Configuring SMF Services and Working with Service Profiles
- Lesson Agenda
- Troubleshooting SMF Services
- Debugging a Service That Is Not Starting
- Restoring a Service in Maintenance State
- Restoring a Service in Maintenance State: Example
- Reverting to an SMF Snapshot
- Reverting to an SMF Snapshot: Example
- Configuration Repository Failed Integrity Check Process
- Repairing a Corrupt Repository
- Repairing a Corrupt Repository: Example
- Debugging the Services During a System Boot
- Addressing system/filesystem/local:default Service Failures During Boot
- Practice 7-3 Overview: Restoring and Recovering a Service
- Summary
- Lesson 8: Configuring Privileges and Role-Based Access Control
- Objectives
- Workflow Orientation
- Lesson Agenda
- Planning for User Privileges and Roles Assignments
- Process Rights Management and Privileges
- Displaying Privilege Descriptions
- Implementing Privileges
- Role-Based Access Control (RBAC)
- Roles
- Rights Profile
- Basic Solaris User Rights Profile
- Interpreting the /etc/security/policy.conf File
- Authorizations and Privileges
- Security Attributes
- Key RBAC Files
- Interpreting the user_attr File
- Interpreting the auth_attr File
- Interpreting the exec_attr File
- Interpreting the prof_attr File
- Relationship Among the Four RBAC Files
- Profile Shells
- Implementing the Assigning User Privileges and Roles Plan
- Quiz
- Lesson Agenda
- Configuring and Managing Privileges
- Examining Process Privileges
- Determining the Privileges Available to the Shell
- Determining the Process Privileges to a Shell
- Determining the Privileges on a Process
- Displaying the Description of a Privilege
- Managing User Privileges
- Determining the Privileges Directly Assigned to You
- Determining the Privileged Commands That You Can Use
- Assigning Privileges to a User or Role
- Limiting Privileges of a User or Role
- Determining Privileges Needed by a Program Using the ppriv Debugging Command
- Using the ppriv Debugging Command to Examine Privilege Use in a Profile Shell
- Using the truss Command to Examine Privilege Use in a Regular Shell
- Practice 8-1 Overview: Delegating Privileges to Users and Processes
- Lesson Agenda
- Configuring and Using RBAC
- Creating a Role
- Creating a Rights Profile
- Creating a Rights Profile: Example
- Cloning and Modifying a Rights Profile
- Creating or Changing a Rights Profile: Example
- Assigning a Rights Profile to a Role
- Assigning a Role to a User
- Assigning a Role to a User: Example
- Assuming a Role
- Restricting an Administrator to Explicitly Assigned Rights
- Assigning the Rights Profile to a User
- Delegating an Authorization to a User
- Delegating an Authorization to a User: Example
- Assigning Authorization to a Role
- Modifying a System-wide RBAC Policy
- Practice 8-2 Overview: Configuring Role-Based Access Control
- Summary
- Lesson 9: Securing System Resources by Using Oracle Solaris Auditing
- Objectives
- Workflow Orientation
- Lesson Agenda
- Planning for Oracle Solaris Auditing
- Oracle Solaris Auditing
- Interpreting the /etc/security/audit_event File
- Event Types
- Interpreting the /etc/security/audit_class File
- Displaying the /etc/security/audit_class File
- Audit Class Preselection
- Audit Records and Audit Tokens
- Audit Plug-in Modules
- Storing and Managing the Audit Trail
- Audit Remote Server (ARS)
- Audit Policies
- Implementing the Oracle Solaris Auditing Plan
- Quiz
- Lesson Agenda
- Configuring Oracle Solaris Auditing
- Configuring the Audit Service
- Determining Audit Service Defaults
- Determining Audit Service Defaults: Example
- Preselecting Audit Classes
- Configuring a User’s Audit Characteristics
- Modifying the Audit Policy
- Modifying the Audit Policy: Example
- Specifying the Audit Warning Destination Email
- Adding an Audit Class
- Changing an Audit Event’s Class Membership
- Configuring Audit Logs
- Creating ZFS File Systems for Audit Files
- Allocating Audit Space for the Audit Trail
- Sending Audit Files to a Remote Repository
- Configuring the System Log as the Audit Message Destination
- Configuring the Audit Service in Zones
- Configuring All Zones Identically for Auditing
- Configuring All Zones Identically for Auditing: Example
- Specifying Per-Zone Auditing
- Specifying Per-Zone Auditing: Example
- Lesson Agenda
- Administering the Audit Service
- Enabling the Audit Service
- Disabling the Audit Service
- Refreshing the Audit Service
- Practice 9-1 Overview: Configuring and Administering Oracle Solaris Auditing
- Lesson Agenda
- Managing Audit Records on Local Systems
- Displaying Audit Record Definitions
- Merging Audit Files
- Selecting Audit Events to Examine
- Viewing Contents of Binary Audit Files
- Practice 9-2 Overview: Managing Audit Records on Local Systems
- Summary
- Lesson 10: Managing Processes and Priorities
- Objectives
- Workflow Orientation
- Lesson Agenda
- Planning Process Execution in an Appropriate Scheduling Class
- Process Scheduler
- Process Priority
- Process Scheduling Classes
- Priority Ranges for Scheduling Classes
- Combining FSS with Other Scheduling Classes
- Using CPU Shares with the FSS
- Scheduling Class on a System with Zones Installed
- Implementing the Process Execution in an Appropriate Scheduling Class Plan
- Quiz
- Lesson Agenda
- Managing Process Scheduling Priority
- Displaying Processes with the top Command
- Displaying Process Class Information
- Determining the Global Priority of a Process
- Designating a Process Priority
- Modifying a Process Priority
- Lesson Agenda
- Configuring the Fair Share Scheduler (FSS)
- Making FSS the Default Scheduling Class
- Manually Moving Processes from Other Classes into the FSS Class
- Manually Moving the init Process into the FSS Class
- Manually Moving a Project’s Processes into the FSS Class
- Tuning Scheduler Parameters
- Practice 10-1 Overview: Modifying Process Scheduling Priority
- Lesson Agenda
- Managing the Scheduling Class of Zones
- Configuring CPU Shares Configuration in a Non-Global Zone
- Configuring CPU Shares in a Non-Global Zone: Example
- Measuring CPU Performance in the Zones
- Assigning CPU Shares to the Global Zone
- Removing the CPU Shares Configuration from a Zone
- Removing the CPU Shares Configuration from a Zone: Example
- Practice 10-2 Overview: Configuring FSS in an Oracle Solaris Zone
- Summary
- Lesson 11: Evaluating System Resources
- Objectives
- Workflow Orientation
- Lesson Agenda
- Planning for Resource Allocation and System Performance Evaluation
- Resource Management
- Resource Management Control Mechanisms
- Projects and Tasks
- Project/Task/Process Relationship
- Resource Controls
- Resource Control Values
- Privilege Levels of Resource Controls
- Enforcing Multiple Resource Controls
- Setting Resource Controls
- Default /etc/project File
- Setting Zone-Wide Resource Controls
- Monitoring Resource Consumption
- Implementing the Resource Allocation and System Performance Evaluation Plan
- Quiz
- Lesson Agenda
- Configuring and Administering System Resources
- Administering Projects and Tasks
- Displaying the Default Projects in the System
- Default /etc/project File
- Defining a Project
- Obtaining Project Membership Information
- Modifying a Project
- Adding Attributes and Attribute Values to a Project
- Substituting Attributes and Attribute Values for a Project
- Removing Attributes or Attribute Values from a Project
- Displaying Currently Running Processes and Projects
- Creating a New Task
- Moving a Running Process into a New Task
- Deleting a Project
- Administering Resource Controls and Attributes
- Displaying the Default Resource Controls
- Displaying Current Resource Control Settings
- Displaying Information About a Given Resource Control
- Enabling Global Resource Control Monitoring
- Practice 11-1 Overview: Managing Resource Controls in Global and Non-Global Zones
- Lesson Agenda
- Monitoring System Performance
- Displaying Virtual Memory Statistics and Information
- Displaying Virtual Memory Statistics
- Displaying System Event Information
- Displaying Swapping Statistics
- Displaying Disk Usage Information
- Displaying General Disk Usage Information
- Displaying Disk Space Information
- Monitoring System Activities
- Checking File Access Operation Statistics
- Checking Buffer Activity
- Checking System Call Statistics
- Checking Disk Activity
- Checking Unused Memory
- Setting Up Automatic Data Collection
- System Monitoring Commands: Summary
- Practice 11-2 Overview: Evaluating System Performance Levels
- Summary
- Lesson 12: Monitoring and Troubleshooting Software Failures
- Objectives
- Workflow Orientation
- Lesson Agenda
- Planning System Messaging and Diagnostic Facilities Implementation
- Configuring the /etc/syslog.conf File
- Stopping and Starting the syslogd Daemon
- TCP Tracing
- TCP Tracing: Example
- Logger Command
- /etc/dumpadm.conf File
- /etc/coreadm.conf File
- Core File Paths
- Implementing the System Messaging and Diagnostic Facilities Implementation Plan
- Quiz
- Lesson Agenda
- Configuring System Messaging
- Setting Up Message Routing
- Setting Up Message Routing: Example
- Logging a Message by Using TCP Trace
- Monitoring a syslog File in Real Time
- Practice 12-1 Overview: Setting Up System Messaging
- Lesson Agenda
- Configuring System Crash Facilities
- Displaying the Current Crash Dump Configuration
- Modifying the Crash Dump Configuration
- Saving the Crash Dump File
- Uncompressing the Crash Dump File
- Displaying the Crash Dump File Contents
- Displaying the Crash Dump File Contents: Example
- Lesson Agenda
- Configuring Dump Facilities for Business Application Failure
- Displaying the Current Core Dump Configuration
- Modifying the Core Dump Configuration
- Setting a Core File Name Pattern
- Enabling a Core File Path
- Displaying the Contents of the Core Dump File
- Displaying the Core Dump File Contents: Example
- Practice 12-2 Overview: Configuring System and Application Crash Facilities
- Summary