5.5. Making the Storage Usable .............................................................................................. 695.5.1. Partitions/Slices................................................................................................. 705.5.2. File Systems ...................................................................................................... 715.5.3. Directory Structure............................................................................................ 735.5.4. Enabling Storage Access................................................................................... 745.6. Advanced Storage Technologies ...................................................................................... 745.6.1. Network-Accessible Storage............................................................................. 745.6.2. RAID-Based Storage ........................................................................................ 755.6.3. Logical Volume Management ........................................................................... 805.7. Storage Management Day-to-Day ................................................................................... 815.7.1. Monitoring Free Space...................................................................................... 825.7.2. Disk Quota Issues ............................................................................................. 845.7.3. File-Related Issues ............................................................................................ 855.7.4. Adding/Removing Storage................................................................................ 865.8. A Word About Backups. . . .............................................................................................. 915.9. Red Hat Enterprise Linux-Specific Information .............................................................. 925.9.1. Device Naming Conventions ............................................................................ 925.9.2. File System Basics ............................................................................................ 945.9.3. Mounting File Systems ..................................................................................... 965.9.4. Network-Accessible Storage Under Red Hat Enterprise Linux ....................... 995.9.5. Mounting File Systems Automatically with /etc/fstab............................. 1005.9.6. Adding/Removing Storage.............................................................................. 1005.9.7. Implementing Disk Quotas ............................................................................. 1045.9.8. Creating RAID Arrays .................................................................................... 1085.9.9. Day to Day Management of RAID Arrays ..................................................... 1095.9.10. Logical Volume Management ....................................................................... 1115.10. Additional Resources ................................................................................................... 1115.10.1. Installed Documentation ............................................................................... 1115.10.2. Useful Websites ............................................................................................ 1115.10.3. Related Books ............................................................................................... 1126. Managing User Accounts and Resource Access ....................................................................... 1136.1. Managing User Accounts............................................................................................... 1136.1.1. The Username ................................................................................................. 1136.1.2. Passwords........................................................................................................ 1166.1.3. Access Control Information ............................................................................ 1206.1.4. Managing Accounts and Resource Access Day-to-Day ................................. 1216.2. Managing User Resources ............................................................................................. 1236.2.1. Who Can Access Shared Data ........................................................................ 1236.2.2. Where Users Access Shared Data................................................................... 1246.2.3. What Barriers Are in Place To Prevent Abuse of Resources .......................... 1256.3. Red Hat Enterprise Linux-Specific Information ............................................................ 1256.3.1. User Accounts, Groups, and Permissions ....................................................... 1256.3.2. Files Controlling User Accounts and Groups ................................................. 1276.3.3. User Account and Group Applications ........................................................... 1306.4. Additional Resources ..................................................................................................... 1316.4.1. Installed Documentation ................................................................................. 1326.4.2. Useful Websites .............................................................................................. 1326.4.3. Related Books ................................................................................................. 132