Book Image

Red Hat Enterprise Linux 8 Administration

By : Miguel Pérez Colino, Pablo Iranzo Gómez, Scott McCarty
Book Image

Red Hat Enterprise Linux 8 Administration

By: Miguel Pérez Colino, Pablo Iranzo Gómez, Scott McCarty

Overview of this book

Whether in infrastructure or development, as a DevOps or site reliability engineer, Linux skills are now more relevant than ever for any IT job, forming the foundation of understanding the most basic layer of your architecture. With Red Hat Enterprise Linux (RHEL) becoming the most popular choice for enterprises worldwide, achieving the Red Hat Certified System Administrator (RHCSA) certification will validate your Linux skills to install, configure, and troubleshoot applications and services on RHEL systems. Complete with easy-to-follow tutorial-style content, self-assessment questions, tips, best practices, and practical exercises with detailed solutions, this book covers essential RHEL commands, user and group management, software management, networking fundamentals, and much more. You'll start by learning how to create an RHEL 8 virtual machine and get to grips with essential Linux commands. You'll then understand how to manage users and groups on an RHEL 8 system, install software packages, and configure your network interfaces and firewall. As you advance, the book will help you explore disk partitioning, LVM configuration, Stratis volumes, disk compression with VDO, and container management with Podman, Buildah, and Skopeo. By the end of this book, you'll have covered everything included in the RHCSA EX200 certification and be able to use this book as a handy, on-the-job desktop reference guide. This book and its contents are solely the work of Miguel Pérez Colino, Pablo Iranzo Gómez, and Scott McCarty. The content does not reflect the views of their employer (Red Hat Inc.). This work has no connection to Red Hat, Inc. and is not endorsed or supported by Red Hat, Inc.
Table of Contents (25 chapters)
1
Section 1: Systems Administration – Software, User, Network, and Services Management
9
Section 2: Security with SSH, SELinux, a Firewall, and System Permissions
14
Section 3: Resource Administration – Storage, Boot Process, Tuning, and Containers
21
Section 4: Practical Exercises

Changing users with the su command

As we have entered a multi-user system, it is logical to think that we will be able to change between users. Even when this can be done easily by opening a session for each, sometimes we want to act as other users in the same session we are in.

To do so, we can use the su tool. The name of the tool is usually referred to as Substitute User.

Let's use that last session in which we logged in as root and turn ourselves into the user user.

Before doing so, we can always ask which user I am logged in with by running the whoami command:

[root@rhel8 ~]# whoami
root

Now we can make the change from root to user:

[root@rhel8 ~]# su user
[user@rhel8 root]$ whoami 
user

Now we have a session as the user user. We could finish this session by using the exit command:

[user@rhel8 root]$ exit
exit
[root@rhel8 ~]# whoami
root

As you may have seen, when we are logged in as root, we can act as any user without knowing its password. But...