href="#u95a9f1f1-6c31-547e-a93a-28ec1f1e2297">CHAPTER 30: Deploying Applications as Containers with Kubernetes Understanding Kubernetes Trying Kubernetes Enterprise-Quality Kubernetes with OpenShift Summary Exercises
9 Part VII: Appendixes APPENDIX A: MediaMedia Getting Fedora Getting Red Hat Enterprise Linux Getting Ubuntu Booting Linux from a USB Drive Creating Linux CDs and DVDs APPENDIX B: Exercise AnswersExercise Answers Chapter 1: Starting with Linux Chapter 2: Creating the Perfect Linux Desktop Chapter 3: Using the Shell Chapter 4: Moving Around the Filesystem Chapter 5: Working with Text Files Chapter 6: Managing Running Processes Chapter 7: Writing Simple Shell Scripts Chapter 8: Learning System Administration Chapter 9: Installing Linux Chapter 10: Getting and Managing Software Chapter 11: Managing User Accounts Chapter 12: Managing Disks and Filesystems Chapter 13: Understanding Server Administration Chapter 14: Administering Networking Chapter 15: Starting and Stopping Services Chapter 16: Configuring a Print Server Chapter 17: Configuring a Web Server Chapter 18: Configuring an FTP Server Chapter 19: Configuring a Windows File Sharing (Samba) Server Chapter 20: Configuring an NFS File Server Chapter 21: Troubleshooting Linux Chapter 22: Understanding Basic Linux Security Chapter 23: Understanding Advanced Linux Security Chapter 24: Enhancing Linux Security with SELinux Chapter 25: Securing Linux on a Network Chapter 26: Shifting to Clouds and Containers Chapter 27: Using Linux for Cloud Computing Chapter 28: Deploying Linux to the Cloud Chapter 29: Automating Apps and Infrastructure with Ansible Chapter 30: Deploying Applications as Containers with Kubernetes
10 Index
List of Tables
1 Chapter 2TABLE 2.1 Keyboard Shortcuts
2 Chapter 3TABLE 3.1 Keystrokes for Navigating Command LinesTABLE 3.2 Keystrokes for Editing Command LinesTABLE 3.3 Keystrokes for Cutting and Pasting Text from within Command LinesTABLE 3.4 Keystrokes for Using Command HistoryTABLE 3.5 Common Shell Environment VariablesTABLE 3.6 Bash Configuration FilesTABLE 3.7 Characters to Add Information to Bash PromptTABLE 3.8 Manual Page Sections
3 Chapter 4TABLE 4.1 Commands to Create and Use FilesTABLE 4.2 Setting Read, Write, and Execute Permissions
4 Chapter 6TABLE 6.1 Signals Available in Linux
5 Chapter 7TABLE 7.1 Operators for Test Expressions
6 Chapter 9TABLE 9.1 Boot Options for Disabling FeaturesTABLE 9.2 Boot Options for Video ProblemsTABLE 9.3 Boot Options for VNC InstallationsTABLE 9.4 Assigning Partitions to Particular Directories
7 Chapter 11TABLE 11.1 Commands to Create and Use Files
8 Chapter 13TABLE 13.1 Commands to Determine sshd
StatusTABLE 13.2 Commands to Start sshd
TABLE 13.3 Commands to Start sshd
at Boot
9 Chapter 15TABLE 15.1 Standard Linux Runlevels
10 Chapter 22TABLE 22.1 Ideas for Good PasswordsTABLE 22.2 chage
OptionsTABLE 22.3 Log Files in the /var/log
DirectoryTABLE 22.4 Viewing Log Files That Need Special CommandsTABLE 22.5 Package Verification DiscrepanciesTABLE 22.6 Additional Filesystem ScansTABLE 22.7 Popular Linux Intrusion Detection Systems
11 Chapter 23TABLE 23.1 Cryptography CiphersTABLE 23.2 Linux Miscellaneous Cryptography ToolsTABLE 23.3 PAM ContextsTABLE 23.4 PAM Configuration Control Flags and Response Handling
12 Chapter 24TABLE 24.1 secon
Command OptionsTABLE 24.2 File Security Context Label Management CommandsTABLE 24.3 SELinux Policy Package Tools
13 Chapter