■ INDEX■KKerberoswith Apache for securing web sites, 169—170authenticating LDAP with, 32—35client setup, 24—26database setup, 24—26databases, backing up, 103—104Kerberizing ssh setup, 143—144MIT version of, 22overview, 21replication, setting up, 47—49server installation and configuration, 22—24setting/enforcing password policy with,144—146workings of, 21—22Kerberos SSH and logonsetting up, 26—28troubleshooting, 28key distribution center (KDC), 21—22keyboard keys, linking to programs, 204—205keychains, managing SSH keys with, 137—138keymaps, changing in X, 203—204keyword shortcuts, bash, 171—174Knoppix, 113krb5-kdc.schema, 30KrbAuthRealm, 170■Llabeling disks with tune2fs command, 122labels, adding to log messages (Subversion), 11laptop backups, anacron for, 112—113LDAP (Lightweight Directory Access Protocol)adding custom fields to, 57—58authenticating with Kerberos, 32—35client, setting up, 38—40commands, 40database, populating, 35—38databases, backing up, 103—104defining nodes in, 86—88ldapadd command, 41ldapdelete, 42ldapmodify command, 41—42ldapsearch command, 40—41new users, adding with scripts, 49—52OpenSSL and, 29—30overview, 28—29querying with scripts, 55—57scripts, modifying/deleting entries with, 52—55server setup, 30—32slave server. See slave LDAP serverLDIF format, 49less text pager, 185—187LESSOPEN environment variable, 186lesspipe helper application, 187Limoncelli, Thomas A., 233locate command, 179lock-tables option, 102logginglog data, plotting, 214log messages, adding labels to (Subversion),11with syslog, 226with syslogd, 223—228loginremote with gdm, 209—210remote with ssh -X, 208—209remote with VNC, 210—211lpadmin, automating printer setup with, 205—207ltrace, library calls and, 221—223■MMacs, connecting to NFS servers, 60magicrescue, 116-maxdepth option (find command ), 179mdadm, managing RAID with, 129—130MediaWiki, installing, 3—7, 100MEMORY tables, 102merging repositories (Subversion), 16Mirrored RAID, 95mirroring (RAID arrays), 128—129MIT version of Kerberos, 22mod_auth_kerb module, 169mod_authnz_ldap module, 169modules, Apache2, 160—162monitoring, centralized setup with Nagios, 63—66more text pager, 185-mount option (find command ), 179MyISAM tables, 102MySQLdatabases, backing up, 102—103mysqldump command, 102mysqlhotcopy utility, 102256Download at WoweBook.Com
■ INDEX■NNagiosadding hosts to, 67alerts, setting up, 69—70commands, defining, 71enabling external commands in, 76—77plug-ins, writing, 71—73setting up centralized monitoring with, 63—66setting up NRPE plug-in for, 73—76using hostgroups and services in, 68—69using templates in, 67—68network total disk size, calculating, 96—99new users, adding to LDAP with scripts, 49—52NFS (Network File <strong>System</strong>)automount and, 59—60performance, improving, 60—61server, connecting Macs to, 60NoAuth sections (RT), 241nodesdefining in LDAP, 86—88setting up in Puppet, 85—86-noleaf option (find command), 179NOPASSWD tag, 150notebooks for documentation, 3NRPE plug-in, 73—76■Oobject identifier (OID), 58■Ppackages, Puppet and, 84pam_cracklib (PAM module), 146—147partitions, resizing on the fly, 123—128password policychecking, 147—148setting/enforcing with Kerberos, 144—146setting/enforcing with pam_cracklib, 146—147password usage options (sudo), 149—150Perlmanipulating file contents with, 193—195modules from CPAN, 18, 247—248perl-ldap, 49SWITCH statements and, 252syntax notes, 251—252useful modules, 248—251variables in, 7—9pkill tool, 192plotting log data, 226—229plug-ins, writing (Nagios), 71—73PostScript files, 208principal, defined (Kerberos), 24printingautomating printer setup with lpadmin,205—207readable text files, 207—208to screen for debugging, 9Pro Nagios 2.0 (Apress), 63programmable completion with bash, 176—178programs, linking keyboard keys to, 204—205PROMPT_COMMAND setting, 2ps -A, running, 216Pulling Strings with Puppet-ConfigurationManagement Made Easy (Apress), 83Puppetdefining nodes in LDAP, 86—88managing various types with, 83—84Pulling Strings with Puppet-ConfigurationManagement Made Easy (Apress), 83Puppet and resource dependencies,creating, 83setting up, 79—83setting up nodes in, 85—86using Facter and templates, 88—91■Qquerying LDAP with scripts, 55—57■Rrepositories (Subversion)branching, 15—16dividing, 14—15merging, 16Request Tracker (RT) ticketing system. See RT(Request Tracker) ticketing systemrequire dependency (Puppet), 83resizing partitions on the fly, 123—128resource dependencies (Puppet), 83resources (Puppet), 79restoration of data with rsync, 104—108rights system (RT), 238—239root setup, synchronizing, 78—79RRDTool, 226RSA keys, 135rsnapshot, 130—132rsync257Download at WoweBook.Com
- Page 2:
Download at WoweBook.Com
- Page 5 and 6:
Download at WoweBook.Comiii
- Page 7 and 8:
Contents■About the Author .......
- Page 9 and 10:
■ CONTENTS3-7. Writing a Nagios P
- Page 11 and 12:
■ CONTENTS■Chapter 8: Using the
- Page 13 and 14:
■ CONTENTSAbout the Author■Juli
- Page 15 and 16:
■ CONTENTSAcknowledgmentsMany tha
- Page 17 and 18:
■ CONTENTSIntroductionThis book i
- Page 19 and 20:
■ INTRODUCTIONDownloading the Cod
- Page 21 and 22:
C H A P T E R 1■ ■ ■Saving Yo
- Page 23 and 24:
CHAPTER 1 ■ SAVING YOURSELF EFFOR
- Page 25 and 26:
CHAPTER 1 ■ SAVING YOURSELF EFFOR
- Page 27 and 28:
CHAPTER 1 ■ SAVING YOURSELF EFFOR
- Page 29 and 30:
CHAPTER 1 ■ SAVING YOURSELF EFFOR
- Page 31 and 32:
CHAPTER 1 ■ SAVING YOURSELF EFFOR
- Page 33 and 34:
CHAPTER 1 ■ SAVING YOURSELF EFFOR
- Page 35 and 36:
CHAPTER 1 ■ SAVING YOURSELF EFFOR
- Page 37 and 38:
CHAPTER 1 ■ SAVING YOURSELF EFFOR
- Page 39 and 40:
CHAPTER 1 ■ SAVING YOURSELF EFFOR
- Page 41 and 42:
C H A P T E R 2■ ■ ■Centraliz
- Page 43 and 44:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 45 and 46:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 47 and 48:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 49 and 50:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 51 and 52:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 53 and 54:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 55 and 56:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 57 and 58:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 59 and 60:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 61 and 62:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 63 and 64:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 65 and 66:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 67 and 68:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 69 and 70:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 71 and 72:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 73 and 74:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 75 and 76:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 77 and 78:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 79 and 80:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 81 and 82:
CHAPTER 2 ■ CENTRALIZING YOUR NET
- Page 83 and 84:
C H A P T E R 3■ ■ ■Monitorin
- Page 85 and 86:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 87 and 88:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 89 and 90:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 91 and 92:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 93 and 94:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 95 and 96:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 97 and 98:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 99 and 100:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 101 and 102:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 103 and 104:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 105 and 106:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 107 and 108:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 109 and 110:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 111 and 112:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 113 and 114:
CHAPTER 3 ■ MONITORING AND UPDATI
- Page 115 and 116:
C H A P T E R 4■ ■ ■Taking Ba
- Page 117 and 118:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 119 and 120:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 121 and 122:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 123 and 124:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 125 and 126:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 127 and 128:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 129 and 130:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 131 and 132:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 133 and 134:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 135 and 136:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 137 and 138:
CHAPTER 4 ■ TAKING BACKUPS AND MA
- Page 139 and 140:
C H A P T E R 5■ ■ ■Working w
- Page 141 and 142:
CHAPTER 5 ■ WORKING WITH FILESYST
- Page 143 and 144:
CHAPTER 5 ■ WORKING WITH FILESYST
- Page 145 and 146:
CHAPTER 5 ■ WORKING WITH FILESYST
- Page 147 and 148:
CHAPTER 5 ■ WORKING WITH FILESYST
- Page 149 and 150:
CHAPTER 5 ■ WORKING WITH FILESYST
- Page 151 and 152:
CHAPTER 5 ■ WORKING WITH FILESYST
- Page 153 and 154:
CHAPTER 5 ■ WORKING WITH FILESYST
- Page 155 and 156:
C H A P T E R 6■ ■ ■Securing
- Page 157 and 158:
CHAPTER 6 ■ SECURING YOUR SYSTEMS
- Page 159 and 160:
CHAPTER 6 ■ SECURING YOUR SYSTEMS
- Page 161 and 162:
CHAPTER 6 ■ SECURING YOUR SYSTEMS
- Page 163 and 164:
CHAPTER 6 ■ SECURING YOUR SYSTEMS
- Page 165 and 166:
CHAPTER 6 ■ SECURING YOUR SYSTEMS
- Page 167 and 168:
CHAPTER 6 ■ SECURING YOUR SYSTEMS
- Page 169 and 170:
CHAPTER 6 ■ SECURING YOUR SYSTEMS
- Page 171 and 172:
CHAPTER 6 ■ SECURING YOUR SYSTEMS
- Page 173 and 174:
CHAPTER 6 ■ SECURING YOUR SYSTEMS
- Page 175 and 176:
CHAPTER 6 ■ SECURING YOUR SYSTEMS
- Page 177 and 178:
C H A P T E R 7■ ■ ■Working w
- Page 179 and 180:
CHAPTER 7 ■ WORKING WITH APACHEOn
- Page 181 and 182:
CHAPTER 7 ■ WORKING WITH APACHEdi
- Page 183 and 184:
CHAPTER 7 ■ WORKING WITH APACHE4.
- Page 185 and 186:
CHAPTER 7 ■ WORKING WITH APACHE
- Page 187 and 188:
CHAPTER 7 ■ WORKING WITH APACHEAl
- Page 189 and 190:
CHAPTER 7 ■ WORKING WITH APACHE
- Page 191 and 192:
C H A P T E R 8■ ■ ■Making Be
- Page 193 and 194:
CHAPTER 8 ■ USING THE COMMAND LIN
- Page 195 and 196:
CHAPTER 8 ■ USING THE COMMAND LIN
- Page 197 and 198:
CHAPTER 8 ■ USING THE COMMAND LIN
- Page 199 and 200:
CHAPTER 8 ■ USING THE COMMAND LIN
- Page 201 and 202:
CHAPTER 8 ■ USING THE COMMAND LIN
- Page 203 and 204:
CHAPTER 8 ■ USING THE COMMAND LIN
- Page 205 and 206:
C H A P T E R 9■ ■ ■Working w
- Page 207 and 208:
CHAPTER 9 ■ WORKING WITH TEXT IN
- Page 209 and 210:
CHAPTER 9 ■ WORKING WITH TEXT IN
- Page 211 and 212:
CHAPTER 9 ■ WORKING WITH TEXT IN
- Page 213 and 214:
CHAPTER 9 ■ WORKING WITH TEXT IN
- Page 215 and 216:
CHAPTER 9 ■ WORKING WITH TEXT IN
- Page 217 and 218:
CHAPTER 9 ■ WORKING WITH TEXT IN
- Page 219 and 220:
CHAPTER 9 ■ WORKING WITH TEXT IN
- Page 221 and 222:
CHAPTER 9 ■ WORKING WITH TEXT IN
- Page 223 and 224:
C H A P T E R 10■ ■ ■Things G
- Page 225 and 226: CHAPTER 10 ■ THINGS GO IN, THINGS
- Page 227 and 228: CHAPTER 10 ■ THINGS GO IN, THINGS
- Page 229 and 230: CHAPTER 10 ■ THINGS GO IN, THINGS
- Page 231 and 232: CHAPTER 10 ■ THINGS GO IN, THINGS
- Page 233 and 234: C H A P T E R 11■ ■ ■Tracking
- Page 235 and 236: CHAPTER 11 ■ TRACKING DOWN BUGSTh
- Page 237 and 238: CHAPTER 11 ■ TRACKING DOWN BUGS01
- Page 239 and 240: CHAPTER 11 ■ TRACKING DOWN BUGS
- Page 241 and 242: CHAPTER 11 ■ TRACKING DOWN BUGS
- Page 243 and 244: CHAPTER 11 ■ TRACKING DOWN BUGS
- Page 245 and 246: CHAPTER 11 ■ TRACKING DOWN BUGSTh
- Page 247 and 248: CHAPTER 11 ■ TRACKING DOWN BUGSAn
- Page 249 and 250: CHAPTER 11 ■ TRACKING DOWN BUGS#
- Page 251 and 252: C H A P T E R 12■ ■ ■Managing
- Page 253 and 254: CHAPTER 12 ■ MANAGING TIME AND PE
- Page 255 and 256: CHAPTER 12 ■ MANAGING TIME AND PE
- Page 257 and 258: CHAPTER 12 ■ MANAGING TIME AND PE
- Page 259 and 260: CHAPTER 12 ■ MANAGING TIME AND PE
- Page 261 and 262: CHAPTER 12 ■ MANAGING TIME AND PE
- Page 263 and 264: CHAPTER 12 ■ MANAGING TIME AND PE
- Page 265 and 266: CHAPTER 12 ■ MANAGING TIME AND PE
- Page 267 and 268: APPENDIX■ ■ ■Perl TipsSee rec
- Page 269 and 270: APPENDIX ■ PERL TIPS• Date::Par
- Page 271 and 272: APPENDIX ■ PERL TIPSPerl Syntax N
- Page 273 and 274: ■ ■ ■Index■Symbols$CDPATH,
- Page 275: ■ INDEXenscript option (printing)
- Page 279 and 280: ■ INDEXsyslogcentralized logging
- Page 281 and 282: Download at WoweBook.Com