Note: I configured 5 servers for labs:
- 10 Centos 8 Servers
- 1 Ubuntu 20.04 Server
- Server1 8GB, IPA Server to have enterprise services such as Kerberos, DNS, MAIL, FTP, HTTPS, etc., (ipaserver.rhce.lab).
- Server2 8GB, Ansible Control Node (control-node.rhce.lab).
- Server3 2GB, Ansible Node1 (node1.rhce.lab).
- Server4 2GB, Ansible Node2 (node2.rhce.lab).
- Server5 2GB, Ansible Node3 (node3.rhce.lab).
- Server6 4GB, Ansible Node4 (mail.rhce.lab).
- Server7 4GB, Ansible Node5 (db01.rhce.lab).
- Server8 4GB, Ansible Node6 (db02.rhce.lab).
- Server9 2GB, Ansible Node7 (web01.rhce.lab).
- Server10 2GB, Ansible Node8 (web02.rhce.lab).
- Server11, 8GB, Ansible Node9 (pulp.rhce.lab).
- 100Gb VHD on rootvg
- 2GB /boot xfs
- 10GB /home xfs
- 25GB / xfs (root)
- 40GB /var xfs
- 6GB swap
- 14GB free space
- Private Host IP Range on the 10.0.3.0/24 subnet - rhce.lab (namespace).
- I have enabled port-forwarding for NAT for 10.0.3.10 as my Bastion server interface.
- IPA Server 10.0.3.2/24
- Ansible Control Node 10.0.3.10/24
- Ubuntu 20.04 - Node1 10.0.3.11/24
- Centos 8 - Node2 10.0.3.12/24
- Centos 8 - Node3 10.0.3.13/24
As an RHCE exam candidate, you should be able to handle all responsibilities expected of a Red Hat Certified System Administrator, including these tasks:
Be able to perform all tasks expected of a Red Hat Certified System Administrator
- Understand and use essential tools
- Operate running systems
- Configure local storage
- Create and configure file systems
- Deploy, configure, and maintain systems
- Manage users and groups
- Manage security
- Inventories
- Modules
- Variables
- Facts
- Plays
- Playbooks
- Configuration files
- Use provided documentation to look up specific information about Ansible modules and commands
- Install required packages
- Create a static host inventory file
- Create a configuration file
- Create and use static inventories to define groups of hosts
- Manage parallelism
- Create and distribute SSH keys to managed nodes
- Configure privilege escalation on managed nodes
- Validate a working configuration using ad hoc Ansible commands
- Create simple shell scripts
- Create simple shell scripts that run ad hoc Ansible commands
- Know how to work with commonly used Ansible modules
- Use variables to retrieve the results of running a command
- Use conditionals to control play execution
- Configure error handling
- Create playbooks to configure systems to a specified state
- Software packages and repositories
- Services
- Firewall rules
- File systems
- Storage devices
- File content
- Archiving
- Scheduled tasks
- Security
- Users and groups
- Create roles
- Download roles from an Ansible Galaxy and use them
- Create and use templates to create customized configuration files
- Use Ansible Vault in playbooks to protect sensitive data
- Create and use templates to create customized configuration files
- Work with Ansible variables and facts
- Create and work with roles
- Download roles from an Ansible Galaxy and use them Manage parallelism
- Use Ansible Vault in playbooks to protect sensitive data
- Use provided documentation to look up specific information about Ansible modules and commands
As with all Red Hat performance-based exams, configurations must persist after reboot without intervention.