Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Real-World Edge Computing

You're reading from   Real-World Edge Computing Scale, secure, and succeed in the realm of edge computing with Open Horizon

Arrow left icon
Product type Paperback
Published in Jun 2024
Publisher Packt
ISBN-13 9781835885840
Length 296 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (2):
Arrow left icon
Robert High Robert High
Author Profile Icon Robert High
Robert High
Sanjeev Gupta Sanjeev Gupta
Author Profile Icon Sanjeev Gupta
Sanjeev Gupta
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

Preface 1. Part 1: Managing the Edge FREE CHAPTER
2. Chapter 1: Fundamentals of Edge Computing 3. Chapter 2: Practicalities of Edge Computing 4. Chapter 3: Designing and Building Edge Software 5. Chapter 4: Edge Container Platforms 6. Chapter 5: Application Placement and Life Cycle Management 7. Part 2: Working on the Edge
8. Chapter 6: Installing an Edge Agent on an Edge Node 9. Chapter 7: Registering an Edge Node 10. Chapter 8: Using the Open Horizon CLI and API 11. Chapter 9: Autonomous and Flexible Management of Edge Services 12. Chapter 10: Managing Edge Scale with Policy-Based Workload Placement 13. Part 3: Advancing the Edge System
14. Chapter 11: Machine Learning Workload and Model Deployment 15. Chapter 12: Security at the Edge 16. Chapter 13: Network Connectivity at the Edge 17. Part 4: Edge Management in Practice
18. Chapter 14: Building a Real-World Example Application 19. Chapter 15: Troubleshooting at the Edge 20. Chapter 16: Follow-on Topics 21. Chapter 17: Using the IBM Edge Application Manager Web UI 22. Index 23. Other Books You May Enjoy

Setting up a non-root user

Follow these steps:

Tip

We have observed that when the administrative staff create a Linux VM, they usually give users full root access and leave it to the users to create non-root users. Subsequently, typical users will start using root itself for their tasks. However, this practice isn’t the most secure approach in a software environment. We strongly encourage users to create a non-root user, and that’s the direction we’ll follow. This may be somewhat redundant and if your environment is already configured accordingly, you may choose to skip this step. These or similar steps can be used to create a non-root user on all machines that we will use throughout this book. If you are conversant with the Linux environment, you may have a different set of steps to create a non-root user.

  1. Open a CLI Terminal to work on a Linux machine.
  2. Log in as a root user using root credentials:
    ssh root@<ip-address-of-the-host>
  3. Add...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime