Linux System Administration. System Administration Tasks



Similar documents
Linux System Administration on Red Hat

CSE/ISE 311: Systems Administra5on Logging

Syslog & xinetd. Stephen Pilon

Topics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy?

syslog - centralized logging

UNIX System Administration S Y STEMS

System Administration

Configuring System Message Logging

Configuring System Message Logging

Configuring System Message Logging

Presented by Henry Ng

NAS 272 Using Your NAS as a Syslog Server

Linux logging and logfiles monitoring with swatch

Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation

Network Monitoring & Management Log Management

CSE 265: System and Network Administration

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Security Correlation Server Quick Installation Guide

Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.

Security Correlation Server Quick Installation Guide

QuickBooks Enterprise Solutions. Linux Database Server Manager Installation and Configuration Guide

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.

Backing Up TestTrack Native Project Databases

NTP and Syslog in Linux. Kevin Breit

NSave Table of Contents

HP-UX Essentials and Shell Programming Course Summary

Logging with syslog-ng, Part One

Users Manual OP5 Logserver 1.2.1

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

Computer Security DD2395

Audit Trail Administration

Network Monitoring & Management Log Management

Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery

RecoveryVault Express Client User Manual

Online Backup Linux Client User Manual

USEFUL UNIX COMMANDS

Online Backup Client User Manual

System Message Logging

Job Scheduler Daemon Configuration Guide

Network Monitoring & Management Log Management

1. Product Information

Rsync: The Best Backup System Ever

4PSA Total Backup User's Guide. for Plesk and newer versions

Online Backup Client User Manual Linux

Chapter 10: System monitoring and logging. Chapter 10 System monitoring and logging

Setting-Up an Open-Source Backup Software Amanda Community in About 15 Minutes

Linux System Administration

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

Cisco Setting Up PIX Syslog

Newton Linux User Group Graphing SNMP with Cacti and RRDtool

GLS250 "Enterprise Linux Systems Administration"

Do it Yourself System Administration

Plesk 8.3 for Linux/Unix Acronis True Image Server Module Administrator's Guide

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

Linux Backups. Russell Adams Linux Backups p. 1

SYSLOG 1 Overview... 1 Syslog Events... 1 Syslog Logs... 4 Document Revision History... 5

Red Condor Syslog Server Configurations

Unix Sampler. PEOPLE whoami id who

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Sophos Anti-Virus for Linux user manual

NRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview Example Uses... a) Direct Checks... b) Indirect Checks...

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

USTM16 Linux System Administration

Unix/Linux Forensics 1

insync Installation Guide

Backup policies. Or - how not to get annoyed when you accidentally delete stuff. Warning - this does get a little technical

Amanda The Open Source Backup & Archiving Software. Ian Turner ian@zmanda.com 11 April Copyright 2006 Zmanda, Inc. All rights reserved.

XCloner Official User Manual

BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

SendMIME Pro Installation & Users Guide

Managing Data Protection

Linux Security Ideas and Tips

Setting up PostgreSQL

Intuit QuickBooks Enterprise Solutions. Linux Database Server Manager Installation and Configuration Guide

Incremental Backup Script. Jason Healy, Director of Networks and Systems

Firebird on Linux. Author: Philippe Makowski IBPhoenix Licence: Public Documentation License Date:

This is when a server versus a workstation is desirable because it has the capability to have:

Workflow Templates Library

Thirty Useful Unix Commands

Backup and Restore FAQ

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.

Web-Based Data Backup Solutions

CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities. Project 7-1

Birmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0

Sophos Anti-Virus for Linux configuration guide. Product version: 9

Online Backup Client User Manual

INF-110. GPFS Installation

Table of Contents. Introduction. Audience. At Course Completion. Prerequisites

Symantec System Recovery 2013 User's Guide. Linux Edition

MapGuide Open Source Repository Management Back up, restore, and recover your resource repository.

What s New in Propalms VPN 3.5?

Installing F-Secure Anti-Virus (FSAV) Table of Contents. FSAV 8.x and FSLS 7.x End of Life. FSAV 9.x and FSLS 9.x End of Life

Logging and Log Analysis - The Essential. kamal hilmi othman NISER

HighPoint RAID Management Command Line Interface Guide

Transcription:

System Administration Tasks

User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #, home directory, login shell, etc. for each valid user. The actual users' passwords are kept encrypted in /etc/shadow, not /etc/passwd.

Group Management groupadd - Adds a new group groupdel - Deletes an existing group groupmod - Modifies an existing group /etc/group contains group name, number, membership, and optional group password information.

Filesytstem Backups Need for system backups Backups are needed in the event of Hardware failure Filesystem or file corruption Accidental file deletion. RAID does NOT eliminate the need for backups. Ideally, systems would be backing up constantly. Realistically, once per day is reasonable.

Backup Media and Management Software While CD, DVD, and portable hard drives are all viable options, tape is generally the backup media of choice. Backup Management Systems Incremental Backups Commercial products Amanda (Advanced Maryland Automatic Disk Archiver) from University of Maryland

Backup Utilities tar - Tape Archiver Backs up and restores files Optional gzip compression cpio - Copy in/out Backs up and restores files. dump - Backs up entire filesystems dump's partner is restore

tar tar is a very useful utility for backing up files, moving files around, or transfering files among *nix computers. Many software packages are distributed in compressed tar format.

tar options tar has many options, some of the most frequently-used are: --help - displays tar command-line syntax -c - Create a new archive -x -Extract files from an archive -f -Use the name of the following file as the file to work with, i.e. to tar to or extract from -z - Use gzip compression

Scheduling Tasks Cron Daemon, crond crond - System service for scheduling periodic tasks. Each user may create a file called a crontab (cron table) used to schedule periodic tasks. /var/spool/cron Cron emails the ouput of scheduled tasks to the user. Standard system cron directories /etc/cron.hourly, /etc/cron.daily, /etc/cron.weekly, /etc/cron.monthly

crontab file A crontab contains 6 fields per line. Minute Hour Day of month Month Day of week Command An asterisk (*) in any field matches all possible values. Linux System Administration

at command at is similar to cron but it runs a command once at a specified time instead of periodically. Typing at followed by a time and/or date puts the user into an interactive shell. At the at> prompt, you can specify the commands you want run at the time specified above. CTRL-d exits the at shell and schedules the tasks. at emails the output of the scheduled tasks to the user.

System Reports vmstat displays virtual memory statistics top Displays system resource information Displays top system tasks in terms of system resources Also displays summary information about system resources (memory, cpu, etc.)

More System Reports lsof - LiSt all Open Files lsof lists all files currently open on the system and the process associated with each. Open files listed by lsof include libraries, binary files, text files, network sockets, etc.

Good System Admin Practices Choose good for passwords for administrative accounts. No dictionary words, no common names. Mix letters, numbers, and special characters. Six characters minimum length. Check root's mailbox regularly, or forward root's mail to yourself at another account. Monitor system logs frequently. logwatch

System Logs /var/log - System log directory syslogd - System logging daemon /etc/syslog.conf config file logrotate - Program run daily by crond to rotate system log files. /etc/logrotate.conf config file /etc/logrotate.d directory

syslogd syslogd is the program reponsible for the majority of system and application logging. Programmers code their programs to send logging messages to syslog, but where those messages actually end up is totally configurable by the system administrator.

syslog.conf /etc/syslog.conf is syslogd's config file. Each line in syslog.conf consists of a facility, a priority, and destination(s). The facility is one of: auth, authpriv, cron, daemon, kern, lpr, mail, news, user, uucp, or localn where n is a number. The priority is one of: debug, info, notice, warning, err, crit, alert, emerg. destination(s) is one of more files, hosts, or terminals to send the log message to.

logrotate logrotate helps manage system logs logrotate's configuration scheme is similar to that of xinetd. Global configuration directives that affect logrotate itself or apply to all logs go in / etc/logrotate.d. Configuration directives for individual logs go in the individual files in /etc/logrotate.d.

rpm rpm is the Redhat Package Manager rpm is used to install, uninstall, update, and manage packages under Redhat Linux and Fedora. Important Options to rpm -qa lists all installed rpm packages --rebuilddb rebuilds the local rpm database of package information.

rpm Install, update, and uninstall options -i installs packages -F freshens packages installs new version only if an older version exists deletes old version -U updates packages installs new package deletes old version if it exists. -e uninstalls packages

Disk Usage Information du reports disk usage for files and directories du <file or directory> du options -k - Reports usage in Kilobytes -s - Report total usage for directory tree, rather that usage for individual files. df lists mounted filesystems and usage df options -k - Reports usage in kilobytes -i - Reports inode usage Linux System Administration

Text Utilities grep - Searches for strings in text or text files. String patterns to search for are expressed as regular expressions awk - Pattern scanning utility Can be used to break up lines of text. grep and awk are even more powerful text tools when used together.

awk awk - pattern scanning tool Awk can be used to work with words within a line of text awk {'print $n'} prints the nth word in the line. awk {'print $2 = print $1'} prints the 2nd and 1st words in a line separated by '='

sort - Text sorting utility sorts lines of text sort -u eliminates duplicates while sorting wc - Word or line counting utility wc with no arguments displays line, word, and byte counts. wc -w counts words wc -l counts lines

Text Paging Utilities more - Displays text one page at a time RETURN advances one line SPACE advances one page '/' searches for a string less - alternative to more More features than more