Focus: System Administration
In this issue we have a bunch of articles on system administration, so if you're thinking of breaking into this exciting career, where the stress is high but the hours are long, now is a perfect time to pull up a spare Linux box and get started.
Replacing one big UNIX server with a rack full of inexpensive Linux machines sounds like a great way to save money and increase your server application's reliability and performance. But if you're interested in setting up a high-availability Linux cluster, have a look at how well your clustering technology of choice handles the four failure scenarios in Tim Burke's “High Availability Cluster Checklist”.
While we're on the subject of clustering, those of you interested in pushing the envelope on Linux cluster performance will want to read Ibrahim Haddad's article on the Parallel Virtual File System. Don't try it on the accounting department's server, though—PVFS is about speed, speed, speed and doesn't offer the level of redundancy they're probably expecting.
One of the first concerns for anyone starting out in system administration should be making backups. In “A Linux-Based Automatic Backup System” Michael O'Brien explains not just how to back up your Linux systems but also how to run a script on your Linux system to back up files on your legacy Microsoft Windows machines.
J. R. “Bob” Dobbs tells us that “Too much is always better than not enough.” And that certainly goes for scripting. Marcel Gagné takes scripting to the extremes with an introduction to Expect, the tool whose motto is “Curing Those Uncontrollable Fits of Interactivity”. When you want to write scripts to do everything, you might run into a brick wall—a program that tells you to navigate a menu or enter a command. Instead of giving up and doing it manually, write an Expect script to bend it to your will. You are the sys admin, you are in control, not the machine, not the software, you.
Last month, we complained that APC has not yet published the protocol for communicating with their UPSes. Fortunately, Riccardo Facchetti has figured out how to talk APC-speak—whether APC likes it or not—and so those of you with APC UPSes can safely shut down when the UPS is drained. It's long, but worthwhile reading if you want to protect your whole network from power outages. I'm running apcupsd at home now, and it works great. One important tip: don't forget to check what kind of serial cable you're using and put it in the config file.
You might tend to think of port scans and such as tools for breaking into a network, not for administering it. But read Lawrence Teo's article and try running one on your own network some time. You might find compromised hosts participating in a distributed denial of service attack, improperly configured systems, or just some weenie who decided to put a “personal web server” to serve out stuff that you don't want public.
If you have a system administration idea that works for you, please let us know. We might just want you to write an article about it, and when you send it in, you can hear somebody say, “thank you.”
—Don Marti, Technical Editor
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide