background
Book cover
Cover image and cartoons by Lisa Haney
Amazon.com five star reviewed

“I rec­om­mend this book for any­one ad­min­is­ter­ing UNIX or Linux sys­tems.”

David  |  15 re­view­ers made a sim­i­lar state­ment

“It's well writ­ten, easy to read and very in­for­ma­tive.”

Gary L. Roach  |  12 re­view­ers made a sim­i­lar state­ment

“Best Linux book I have pur­chased ever to date.”

Josh  |  15 re­view­ers made a sim­i­lar state­ment

We are pleased to an­nounce the com­pletely up­dated fifth edi­tion of UNIX and Linux Sys­tem Ad­min­is­tra­tion Hand­book!  The book is pub­lished by Ad­di­son-Wes­ley Pro­fes­sional.

“This edi­tion is for those whose sys­tems live in the cloud or in vir­tu­al­ized data cen­ters; those whose ad­min­is­tra­tive work largely takes the form of au­toma­tion and con­fig­u­ra­tion source code; those who col­lab­o­rate closely with de­vel­op­ers, net­work en­gi­neers, com­pli­ance of­fi­cers, and all the other worker bees who in­habit the mod­ern hive.”

  from the Fore­word by Paul Vixie, In­ter­net Hall of Fame-rec­og­nized in­no­va­tor and founder of ISC and Far­sight Se­cu­rity

“As an au­thor, ed­i­tor, and pub­lisher, I never paid much at­ten­tion to the com­pe­ti­tion— except in a few cases. This is one of those cases. UNIX Sys­tem Ad­min­is­tra­tion Hand­book is one of the few books we ever mea­sured our­selves against.”

  from the 4th Edi­tion Fore­word by Tim O'Reilly, founder of O'Reilly Media


About the book

UNIX and Linux Sys­tem Ad­min­is­tra­tion Hand­book, Fifth Edi­tion, is today’s de­fin­i­tive guide to in­stalling, con­fig­ur­ing, and main­tain­ing any UNIX or Linux sys­tem, in­clud­ing sys­tems that sup­ply core In­ter­net and cloud in­fra­struc­ture.

Up­dated for new dis­tri­b­u­tions and cloud en­vi­ron­ments, this com­pre­hen­sive guide cov­ers best prac­tices for every facet of sys­tem ad­min­is­tra­tion, in­clud­ing stor­age man­age­ment, net­work de­sign and ad­min­is­tra­tion, se­cu­rity, web host­ing, au­toma­tion, con­fig­u­ra­tion man­age­ment, per­for­mance analy­sis, vir­tu­al­iza­tion, DNS, se­cu­rity, and the man­age­ment of IT ser­vice or­ga­ni­za­tions. The au­thors—world-class, hands-on tech­nol­o­gists—offer in­dis­pens­able new cov­er­age of cloud plat­forms, the De­vOps phi­los­o­phy, con­tin­u­ous de­ploy­ment, con­tainer­iza­tion, mon­i­tor­ing, and many other es­sen­tial top­ics.

What­ever your role in run­ning sys­tems and net­works built on UNIX or Linux, this con­ver­sa­tional, well-writ­ten guide will im­prove your ef­fi­ciency and help solve your knot­ti­est prob­lems.
x

Errata for UNIX and Linux System Administration Handbook, 4E

We usually have the opportunity to make corrections before each printing. Therefore, your book's complement of errors may vary depending on its printing. To determine your printing, look at the last line of the copyright page.

Found a problem not listed here? Please let us know.

Updated pages Issues
Page 33
p33

Page 33

The back­quoted com­mand wc -l /etc/passwd seen in the page's last com­mand line should ac­tu­ally be wc -l < /etc/passwd.

The issue is that wc -l prints out file­names as well as line counts when file­names are sup­plied on the com­mand line. Here, only the line count is wanted.

Page 44
p44

Page 44

Con­trary to Table 2.2, bash has no string equiv­a­lents to the nu­meric -le and -ge op­er­a­tors. The >= and <= op­er­a­tors listed in Table 2.2 do not exist.

The > and < op­er­a­tors do exist. How­ever, they must be back­slash-es­caped or dou­ble brack­eted to pre­vent them from being in­ter­preted as I/O redi­rec­tion char­ac­ters.

Page 45
p45

Page 45

The loop vari­able in the ex­am­ple for loop is ac­tu­ally called script. The text refers to it as file.

Page 51
p51-52

Pages 51 and 52

The reg­u­lar ex­pres­sion shown on pages 51–52 for match­ing var­i­ous spellings of Moam­mar Gad­hafi's name is OK as orig­i­nally printed. How­ever, the ac­com­pa­ny­ing text does not ex­plain why the ([dtz][dhz]?)+ group (a com­po­nent of the last name match) al­lows rep­e­ti­tion.

The + is there to ac­com­mo­date vari­ants such as Quad­hd­hafi. Re­ally, that frag­ment should be ([dtz][dhz]?){1,2} so that only one or two oc­cur­rences are per­mis­si­ble.

More gen­er­ally, it's worth not­ing that this regex is per­mis­sive. Not every string that it matches is a le­git­i­mate spelling of Gad­hafi's name. How­ever, it should match all le­git­i­mate spellings.

Page 153
p153

Page 153

The cross-ref­er­ence in the last line of the first para­graph under The se­tuid and set­gid bits points to the wrong place.

The ref­er­enced ma­te­r­ial is on page 105, not page 106.

Page 466
p466

Page 466

The route com­mands at the bot­tom of the page are shell com­mands, not ex­cerpts from a startup script as the sur­round­ing text might imply.

The # char­ac­ter in­di­cates root's shell prompt, not the com­ment char­ac­ter used in shell scripts.

Page 574
p574

Page 574

DNS Pun­y­code names begin with xn--, not xf-- as stated in the text.

Page 808
p808

Page 808

In ad­di­tion to hav­ing its own con­ven­tions, De­bian's ver­sion of Exim con­fig­u­ra­tion uses the m4 pre­proces­sor.

We don't de­scribe the De­bian sys­tem in this book.

Page 817
p817

Page 817

There are two er­rors on this page.

In the sen­tence "The sender's ad­dress is not checked be­cause many user agents get con­fused by error re­turns," re­place "sender's ad­dress" with "re­cip­i­ent's ad­dress."

The para­graph that starts "We next check the des­ti­na­tion do­main..." claims that DKIM ver­i­fi­ca­tion is not per­formed dur­ing this step. That is in­cor­rect; DKIM is in fact en­abled.

Page 821
p821

Page 821

It is not en­tirely ac­cu­rate to say that "If a mes­sage re­ceives a pass or decline from all the routers in the se­quence, it is bounced as an un­routable ad­dress."

In fact, Exim may ei­ther bounce or re­ject such mes­sages, de­pend­ing on the con­text.

Page 827
p827

Page 827

Con­trary to the state­ment in the De­bug­ging sec­tion, exim does fork when given the -d flag. How­ever, it does not de­tach it­self from the con­trol ter­mi­nal.

Page 852
p852

Page 852

In the con­fig­u­ra­tion file ex­cerpt, the line that sets dkim_selector should do a lookup on $dkim_domain, not $sender_address_domain as shown.

No for­mal er­rata are avail­able for this print­ing yet.
We will up­date this list after the next print­ing has been fi­nal­ized.

x

Frequently Asked Questions about ULSAH4E

I'm teach­ing a course that uses UNIX and Linux Sys­tem Ad­min­is­tra­tion Hand­book as a text­book. Are there slides, out­lines, or other ma­te­ri­als avail­able for in­struc­tors?

Un­for­tu­nately, no. This is some­thing we'd like to do, but the scope of the book makes it likely that dif­fer­ent courses will choose to focus on dif­fer­ent as­pects of the ma­te­r­ial in­cluded in the book. If you have spe­cific sug­ges­tions for sup­ple­men­tary ma­te­ri­als that you would find help­ful, please let us know.

I'm in­ter­ested in trans­lat­ing your book into an­other lan­guage.

Trans­la­tion and for­eign sales rights are han­dled by Pren­tice Hall. Please con­tact us and we will put you in touch with the right peo­ple.

Is your book avail­able as an eBook? What for­mats are avail­able?

UL­SAH5E is avail­able as a printed book, a Kin­dle book, a Nook-com­pat­i­ble ePub book, a DRM-free PDF file, and as an on­line re­source through Sa­fari Books On­line. Please see the links on the home page.

Hey! I found a mis­take! You suck!

We usu­ally have the op­por­tu­nity to make cor­rec­tions be­fore each print­ing. Please send us a note de­scrib­ing the issue and we will make sure it is ad­dressed. (And thanks for your help!)

There's a prob­lem with my printed copy of the book.

A small num­ber of books were sent into dis­tri­b­u­tion with miss­ing pages or with pages out of order. If you've ended up with one of these copies, please let us know and we will hook you up with a re­place­ment.