Skip to main content

245 docs tagged with "Certifications"

View all tags

AAA in AWS

Authentication, Authorization, and Access Control

Additional Updates

Some of the scenario questions here are based on Kodekloud's CKAD course labs.

AI and ML

Artificial Intelligence and Machine Learning

Amazon MQ

Fully managed, open-source message brokers

Amazon S3

Amazon Simple Storage Service (Amazon S3)

Archive and Backup

Archiving and backing up files in Linux is essential for data protection and management. Various tools and commands can help you achieve this, including tar, gzip, bzip2, and xz.

Automated Installations

Automated installations help streamline the deployment process by using predefined configurations, making it easier to manage and maintain multiple systems.

AWS Config

Assess, audit, and evaluate configurations

AWS KMS

Create and control your cryptographic keys

AWS SAM

Build and deploy serverless applications

Azure MFA

Secure yoru Azure resources with MFA.

Bash Scripts

Bash scripts automate tasks by executing commands in a specific order, making them powerful tools for automating repetitive tasks, managing system configurations, and performing complex operations efficiently in Unix-like operating systems.

Basic Installation

There are various ways to setup Red Hat Enterprise Linux (RHEL) for your personal lab:

Cluster Maintenance

Some of the scenario questions here are based on Kodekloud's CKA course labs.

Cockpit

Cockpit is a server administration tool sponsored by Red Hat, focused on providing a modern-looking and user-friendly interface to manage and administer servers.

Configuration

Some of the scenario questions here are based on Kodekloud's CKAD course labs.

Copying across Host and Guest Machine

Thought I'd include this part since I used VirtualBox VMs in some of the labs in this series. I was having issues copying text from my laptop and then pasting them onto the terminal inside the VM (and then vice versa). I've also included some packages that would be helpful. Some setup doesn't come with pre-built packages like vim.

Core Concepts

Some of the scenario questions here are based on Kodekloud's CKA course labs.

Custom Partitioning

This follows the same steps as the previous lab but this time we'll be configuring a custom partitioning. Follow the steps in Lab 1 (under "RHEL on VirtualBox" section) up to Step 9: Confirm the Installation Destination. Note that for this lab, we changed our hostname to tst-rhel-local-2.

Exam Objectives

RHCSA exam candidates should be able to accomplish the tasks below without assistance. These have been grouped into several categories.

Firewalld

Firewalld is a Linux management tool that provides a simpler alternative to the low-level and complex nftables, which replaced iptables in modern Linux kernels. It offers an easier way to manage firewall rules and configurations on Linux systems.

Format of `/etc/passwd`

The /etc/passwd file stores user account information. Each line in this file represents a single user and contains seven fields separated by colons (

IPTables

Iptables is a command-line firewall utility that uses policy chains to allow or block traffic. When a connection tries to establish itself on your system, iptables looks for a rule in its list to match it to. If it doesn’t find one, it resorts to the default action.

Lambda

Run code without provisioning servers

Linux Kernel

The Linux kernel is the core of the Linux operating system, acting as a bridge between the hardware and software. It interacts with hardware devices through drivers, known as modules, which are essential for the system's functionality.

Mock Exam

Some of the scenario questions here are based on Kodekloud's CKA course labs.

Mock Exams

Some of the scenario questions here are based on Kodekloud's CKAD course labs.

Networking

Some of the scenario questions here are based on Kodekloud's CKA course labs.

Partitions

Managing disk partitions is a critical task for organizing and utilizing storage effectively. Tools like parted, gparted, and fdisk are commonly used for partitioning disks.

Persistent Mounts

Before we go to mounting the disks persistently, we need to know about these two things:

Pod Design

Some of the scenario questions here are based on Kodekloud's CKAD course labs.

Practice Test 01

These labs are based on Sander Van Vugt's O'Reailly course, "Red Hat Certified System Administrator (RHCSA), 3/e"

Practice Test 02

These labs are based on Sander Van Vugt's O'Reailly course, "Red Hat Certified System Administrator (RHCSA), 3/e"

Practice Test 05

These are some of the scenarios that I haven't tried to simulate yet.

Practice Test: CKA

Some of the scenario questions here are based on Kodekloud's CKA course labs.

Practice Test: CKAD

Some of the scenario questions here are based on Kodekloud's CKAD course labs.

Resizing LVMs

Resizing Logical Volume Management (LVM) allows you to increase the storage capacity of your logical volumes as needed. This is particularly useful when you start running out of space on your disks.

Scheduling

Some of the scenario questions here are based on Kodekloud's CKA course labs.

Security

Some of the scenario questions here are based on Kodekloud's CKA course labs.

Security Updates

To check for high-priority, security updates, run the command below.

Setting up a Repository

Decided to come back to this again after I installed VirtualBox again on my personal laptop, downloaded the RHEL 8 iso file from developer.redhat.com site and run a VM. I also remember the reason why i stop using VirtualBox. My laptop had a 4gb ram back then and launching VMs quickly make my laptop laggy.

Setting up WebMin Repository

In this lab, we'll set up the Webmin YUM repository on your system. Webmin is a web-based interface for system administration for Unix. Using any modern web browser, you can set up user accounts, Apache, DNS, file sharing, and much more. By setting up the YUM repository, you can easily install and update Webmin through your package manager.

SSH-Based Logins

SSH key-based login is a method to securely connect to remote systems without using a password. Instead, it uses a pair of cryptographic keys: a private key, kept on your local machine, and a public key, placed on the remote server. This enhances security by eliminating the need for password-based authentication.

State Persistence

Some of the scenario questions here are based on Kodekloud's CKAD course labs.

Storage

Some of the scenario questions here are based on Kodekloud's CKA course labs.

VPN

Seamless integration between on-premise and the cloud