Log On/Register  

855.838.5028

Linux Optimization and Troubleshooting

Duration: 4 Days
Course Price: $2,990

Maintain a reliable and highly available Linux server infrastructure, and reduce costly downtime. In this Linux optimization and troubleshooting training course, you gain the expertise to effectively diagnose and fix common and complex Linux server configuration and administrations issues, and learn to apply those skills in data centers and in the cloud.

You Will Learn How To
Troubleshoot Linux with effective tools and techniques
Rescue an unbootable system
Recover and tune local and remote file systems
Identify and fix network errors and bottlenecks

Important Course Information
Requirements:
Knowledge of Linux at the level of:
Course 144, Linux Administration & Support

Software:
This course uses Red Hat Enterprise Linux
Concepts taught are applicable to all Linux distributions

Maintain a reliable and highly available Linux server infrastructure, and reduce costly downtime. In this Linux optimization and troubleshooting training course, you gain the expertise to effectively diagnose and fix common and complex Linux server configuration and administrations issues, and learn to apply those skills in data centers and in the cloud.

You Will Learn How To
Troubleshoot Linux with effective tools and techniques
Rescue an unbootable system
Recover and tune local and remote file systems
Identify and fix network errors and bottlenecks

Important Course Information
Requirements:
Knowledge of Linux at the level of:
Course 144, Linux Administration & Support

Software:
This course uses Red Hat Enterprise Linux
Concepts taught are applicable to all Linux distributions

Introduction to Troubleshooting
• Investigating different failure modes
• Reviewing troubleshooting methods
• Documenting solutions and configurations
• Booting the System


Starting the boot sequence
• Fixing kernel load errors
• Distinguishing BIOS from UEFI requirements


Recreating a working boot environment
• Rebuilding the RAM drive with correct drivers
• Recovering the root file system
• Optimizing and Recovering File Systems


Managing local file system integrity
• Locating disks and LUNs by path and ID
• Running fsck on live file systems
• Selecting the correct file system type


Improving file system performance
• Detecting incorrect queueing algorithms
• Tuning the cache for the application load


Finding file system errors in logical volumes
• Implementing snapshots into the troubleshooting process
• Remounting corrupt LVM file systems


Extending and resizing live file systems
• Increasing storage space with online resizing
• Adding physical and logical volumes effectively
• Managing Packages and Processes


Rebuilding packages for compatibility
• Satisfying legacy and foreign RPM dependencies
• Adapting the spec file and rebuilding the package


Measuring application resource usage
• Identifying application bottlenecks in disks, processors and memory usage
• Monitoring system performance
• iostat
• rlimit
• top
• strace
• nfsstat
• vmstat


Allocating resources to applications
• Setting limits for specific applications
• Ensuring optimal system performance
• Troubleshooting the Linux Network Stack


Applying troubleshooting tools
• Capturing traffic with graphical and command-line tools
• Working around vendor distribution limitations


Tuning network kernel parameters
• Pinpointing parameters affecting performance
• Maximizing network throughput


Adjusting Ethernet drivers
• Evaluating driver settings for MTU and protocol offload
• Tailoring kernel modules for various traffic profiles


Restoring network connectivity through the firewall
• Enabling firewall logging to isolate application failures
• Extending rules with iptables


Diagnosing Network File System (NFS) errors
• Gathering statistics to uncover NFS shortcomings
• Modifying communication buffer settings
• Auditing and Logging with SELinux and Rsyslog


Fine-tuning SELinux to enable applications
• Restoring security contexts to re-enable access
• Translating audit events to policy changes
• Writing and compiling an SELinux policy


Collecting remote event information with Rsyslog
• Setting up remote logging of errors and failures
• Centralizing log collection and analysis


Detecting unauthorized changes with Advanced Intrusion Detection Environment (AIDE)
• Generating the security database
• Exposing configuration and file changes
• Integrating Linux with Active Directory


Authenticating with Lightweight Directory Access Protocol (LDAP)
• Migrating Pluggable Authentication Modules (PAM) and nsswitch.conf
• Resolving user and group ID mapping errors


Finding and fixing Kerberos errors
• Kerberizing user authentication
• Debugging Active Directory connectivity

Learn More
Please type the letters below so we know you are not a robot (upper or lower case):