linux optimization and troubleshooting

As organizations increasingly adopt Linux, they must ensure rapid response time to issues that can affect system availability and cause costly downtime. In Linux Optimization and Troubleshooting course, participants diagnose and correct booting and configuration issues using Red Hat Linux, ensure optimal resource allocation and availability, and apply a series of proven tools and techniques to troubleshoot real-world problems.

By attending Linux Optimization and Troubleshooting workshop, Participants will learn to:

  • Troubleshoot Linux with effective tools and techniques
  • Rescue an unbootable system
  • Recover and tune local and remote file systems
  • Optimize Linux application performance
  • Identify and fix network errors and bottlenecks
  • Secure applications with new SELinux policies

COURSE AGENDA

  • Increasing storage space with online resizing
  • Adding physical and logical volumes effectively
  • Implementing snapshots into the troubleshooting process
  • Remounting corrupt LVM file systems
  • Detecting incorrect queueing algorithms
  • Tuning the cache for the application load
  • Locating disks and LUNs by path and ID
  • Running fsck on live file systems
  • Selecting the correct file system type
  • Rebuilding the RAM drive with correct drivers
  • Recovering the root file system
  • Fixing kernel load errors
  • Distinguishing BIOS from UEFI requirements
  • Investigating different failure modes
  • Reviewing troubleshooting methods
  • Documenting solutions and configurations
  • Satisfying legacy and foreign RPM dependencies
  • Adapting the spec file and rebuilding the package
  • Identifying application bottlenecks in disks, processors and memory usage
  • Monitoring system performance
  • iostat
  • rlimit
  • top
  • strace
  • nfsstat
  • vmstat
  • Setting limits for specific applications
  • Ensuring optimal system performance
  • Capturing traffic with graphical and command-line tools
  • Working around vendor distribution limitations
  • Pinpointing parameters affecting performance
  • Maximizing network throughput
  • Evaluating driver settings for MTU and protocol offload
  • Tailoring kernel modules for various traffic profiles
  • Enabling firewall logging to isolate application failures
  • Extending rules with iptables
  • Gathering statistics to uncover NFS shortcomings
  • Modifying communication buffer settings
  • Restoring security contexts to re-enable access
  • Translating audit events to policy changes
  • Writing and compiling an SELinux policy
  • Setting up remote logging of errors and failures
  • Centralizing log collection and analysis
  • Generating the security database
  • Exposing configuration and file changes
  • Migrating Pluggable Authentication Modules (PAM) and nsswitch.conf
  • Resolving user and group ID mapping errors
  • Kerberizing user authentication
  • Debugging Active Directory connectivity