Books by TheUrbanPenguin
Shell scripting is a quick method to prototype a complex application or a problem by automating tasks when working on Linux-based systems. Using both simple one-line commands and command sequences complex problems can be solved with ease, from text processing to backing up sysadmin tools.
In this book, you’ll discover everything you need to know to master shell scripting and make informed choices about the elements you employ. Get to grips with the fundamentals of creating and running a script in normal mode, and in debug mode. Learn about various conditional statements’ code snippets, and realize the power of repetition and loops in your shell script. Implement functions and edit files using the Stream Editor, script in Perl, program in Python – as well as complete coverage of other scripting languages to ensure you can choose the best tool for your project.
What You Will Learn
- Use the type command to identify the order of command evaluation
- Create interactive scripts that prompt for user input
- Foster menu structures for operators with little command-line experience
- Develop scripts that dynamically edit web configuration files to produce a new virtual host
- Write scripts that use AWK to search and reports on log files
- Draft effective scripts using functions as building blocks, reducing maintenance and build time
- Make informed choices by comparing different script languages such as Perl and Python with BASH
Red Hat Enterprise Linux (RHEL) is the most popular Linux distribution currently being used and can be deployed on many platforms. Enterprises that have a large number of systems need to be interconnected, configured, and managed effectively. RHEL networking lets you accomplish these tasks easily.
This is a highly-detailed guide to help with your deployments on RHEL 7 or CentOS 7. This book, based on RHEL 7.1, will introduce to you the fundamentals of networking your systems. You will learn the use of new consistent names to identify your network cards. Soon, you will move on to configuring the basic plumbing of your network, setting up time, network address assignment, and name resolution. Last, the focus moves to configuring the new kernel-based iSCSI target services on RHEL 7 and using the service to host storage area networks.
- Master the new time daemon, chronyd, and understand why it is used over the more traditional NTP
- Delve inside the workings of the kernel-based iSCSI target that shares disks on your network
- Share data with your Windows network and make use of their users and groups for authentication, without the need to replace your existing infrastructure
- Shield your users and data from the ever-present dangers that exist on the Internet by implementing and understanding SELinux
- Deploy Apache 2.4 and make use of its new features
- Provide saleable and fault-tolerant file systems with btrfs, more quickly than you could ever imagine
- Protect your investment using the new firewalld process, enabling you to deploy firewall changes while the firewall is in place
The Linux Distribution CentOS 6.5 is very popular and common in the Enterprise market and small businesses. CentOS is widely respected as a very powerful and flexible Linux distribution and it can be used as a web server, file server, FTP server, domain server, or a multi-role solution. It is designed to handle the more demanding needs of business applications such as network and system administration, database management, and web services. Used in conjunction with CentOS there is OpenLDAP, which has huge global support when used within Identity Management Solutions such as Puppet. Puppet is a leader in cross-platform configuration management and BTRFS, and is a rapidly emerging technology. CentOS is self-sufficient and fast while working, with the added benefit of global acceptance as a large number of the world’s web servers run on it.
This is the ideal companion for the Linux administrator who wishes to take their knowledge to a higher level. The book not only concentrates on the basics, but also supplements your existing knowledge on subject areas that are important in the Enterprise market, such as Directory services, security configuration management, and Web-based architecture. You will be able to manage an Enterprise Linux network focused on management-centralized configuration, user management, and file system enhancements by covering everything from the latest filesystem advances with BTRFS through to learning the new web server on the block—NGINX.
With so many examples, you will be guided through some of the less-covered areas of administration to ensure that you have a comprehensive knowledge of how to administer your system.
If you need a quick start administration guide to the leading remote desktop solution that plugs directly into you public or private clouds then this book is going to be the answer. Providing you quickly and concisely expert tips to see you up and running quickly with your new server farms. The books takes you through the administration both leading you via the UI and from the command line using PowerShell.
- Install the Citrix XenApp 6.5 server on Windows Server 2008R2
- Delegate administration within the XenApp farm by adding an administrator
- Manage the XenApp server farm with both AppCenter and from the command line using PowerShell
- Publish applications to users
- Customize the Web Interface with your corporate branding
- Control client printing within a XenApp environment using policies
- Implement IMA encryption to protect data passed between XenApp servers
- Provide secure remote access using the Citrix Access Gateway
So if you would like to know how to install and configure the Citrix Access Gateway both as a simple ICA Proxy as well as then the full VPN using SmartAccess then this is the book for you. Setting up licensing, installing the CAG, basic login points, end point analysis, smart access to full and limited resources, we have the lot. Not only this but we add HA with appliance fail-over! Available now from PACKT Publishing
- Chapter 1: Getting Started with the Citrix Access Gateway Product Family This chapter describes the purpose of the Citrix Access Gateway and the models that are available and their associated features. The chapter will serve as a good introduction to the product range and help in choosing the correct model to meet a required business need.
- Chapter 2: Licensing Citrix Access Gateway This chapter introduces Citrix licensing and what options are available. It is important to step though the MyCitrix Website where Licenses are obtained from and the assignment of licenses. Licenses can be delivered from the access gateway or from a specific license server.
- Chapter 3: Configure the initial Citrix Access Gateway setup The first step in using the Gateway is to import it into our virtualization hosts and configure networking, passwords and add SSL certificates.
- Chapter 4: Configure a basic logon point to provide secure access XenApp or XenDesktop servers With the platform license you can use unlimited connections to XenApp / XenDesktop servers and is widely used in this manner as an ICA-Proxy. We will look at how to create this proof of concept system by creating a basic logon point and use authentication at the Web Interface. This is the simplest form of the Access Gateway and provides a quick and easy start into using this system.
- Chapter 5: Creating authentication profiles Allowing authentication to occur at the Citrix Web Interface is a simple solution but limits how the Access Gateway can be used and to basic logon points. From a security perspective passing authentication to the Web Interface is just adding another component to could become hijacked for malicious purposes. Authentication should be handled at the point of entry and nowhere else; this is required for smart access logon points.
- Chapter 6: Beyond the basics This chapter introduces “smart access” login points and what becomes available with the universal licenses. Not only can we connect to XenApp and XenDesktop but we now have full VPN access to internal resources such as internal email, intranets and file shares.
- Chapter 7:Address Pools Address pools allow your smart access clients to be issued with an IP Address to access internal resources; these may be required for some services that do not allow multiple connections from a single device
- Chapter 8: Device profiles and End Point Analysis Using device profiles with smart access we are available to identify different classifications of client machines this can control which resources they can access and which policies will apply if they access XenApp or XenDesktop. Typically we may need to identify corporately managed computes from home or personal computers. We can build up expressions from scans we add to match the profile of the machine
- Chapter 9: Defining network resources The universal license and smart access allows you not only to access Citrix XenApp and Citrix XenDesktop but to access internal resources such as file shares and email using the Citrix Access Gateway. In this chapter we look at adding in network resources that we wish are users to have access to and those that they should not access.
- Chapter 10: SmartAccess logon points Nearing the end of the configuration we add smart logon points to the management console. These give access to same resources as a basic logon point but add in the access to network resources and allowing for end point analysis with the device profiles
- Chapter 11: Linking it all with SmartGroups SmartGroups enable resources to be linked to logon points, these are added through the management console; these can be described as the “glue” of the SmartAccess solutions
- Chapter 12: Connecting to SmartAccess logon points We are now able to access the logon point. We can do this through the browser or direct with the plugin. If the plugin is not yet installed this can be installed from the Citrix Access Gateway directly
- Chapter 13: Monitoring the Access Gateway and Enabling Appliance Failover In this chapter we will learn how to monitor and maintain the Citrix Access Gateway. Having setup the gateway it important to be able to keep in running effectively. This will involve monitors connections, logs, backing up the configuration with snapshots and upgrading the firmware. Once we have this in the bag we need to look into providing high availability using Appliance Failover
- Chapter 14: Manage the access gateway from the command line In this chapter the command line in introduced and we investigate some of the options available. Although most management is maintain via the console some elements can be managed from the command line and we look and when and why we use this