Linux System Administration Tools
Linux old-timers revel in reminding newcomers that they used to have to do everything by hand, at the command line, uphill, both ways, with duct tape for shoes. What really gets some of these folks sputtering is today's collection of system administration tools that introduce quite a bit of automation. There's good reason for this, actually; if you don't know how to administer your system by hand then you are sunk if something goes wrong. However, this factor doesn't mean you shouldn't take advantage of available helping hands.
There are four major players in the world of Linux system administration tools: COAS, Linuxconf, Webmin and YaST. One of these, YaST, is tied specifically to SuSE Linux. The other three, COAS, Linuxconf and Webmin, come by default with some distributions but are independently available for download and installation.
Linuxconf (Figure 1) comes with Mandrake Linux and Red Hat Linux, but is also available for most modern Linux distributions. You've probably encountered this tool before if you use one of these distributions, either as the whole package or in one of its modular components. Multiple interfaces for Linuxconf have been available for years, but now we're up to four: GUI, Web, command-line and ncurses.
Linuxconf has actually been around for years, which means its bugs have had longer to shake out than the other distribution-neutral tools. You can download and find out more about this tool at www.solucorp.qc.ca/linuxconf. Be sure to read through what each portion of the Linuxconf package is used for. There is a base package with the non-GUI components, and then there are various GUI front-end pieces from a more general X Window System version to one specifically built for GNOME.
Whether you stick with the command-line version or add a GUI front end, you run the tool by typing linuxconf. From here you navigate text or point and click menus to access a wide variety of system settings, everything from basic networking details to GRUB configuration. Linuxconf also plays well with people who refuse to use the root account for anything but the most vital tasks. If you try to run it as root, the tool simply asks for the root password--if this fact makes you nervous, then you may want to consider not using this tool, but this practice is fairly standard in modern administration tools. When you consider that anyone could just try to su to the root account at whim, you start to see why it is so important to have a secure root password in place.
Webmin (Figure 2) comes with, and was recently acquired by, Caldera Linux. This tool is not only available for most modern Linux distributions, it also runs on most major flavors of UNIX and is available in around twenty languages (though some modules are not available in all of the languages). As you might guess, Webmin is purely a web-based application and a heavily modular one at that.
There is a set of core modules that handle the usual system administration functionality, and then there are the third-party modules available for administering a variety of packages and services. To download and learn more about Webmin, point your web browser to www.webmin.com/webmin. Once again, this package is available in a number of formats specific to different distributions.
Where any user can install Linuxconf, Webmin must be installed by root. After that you can access this tool from any user account as long as you know the root password.
There are three separate rows of icons on this tool's front page. On the upper right, you have a pair of administrative links, one to log you out of the Webmin tool and another that allows you to fill out a feedback form that sends your comments back to the Webmin team. In the same top row on the upper left you can click on the word Webmin and go to the product home page. On the upper bar directly beneath those links, there are a series of menu icons, which are, from left to right:
Webmin: takes you back to the main Webmin screen.
System: a collection of configuration issues, such as user and group manipulation, disk quotas and cron jobs.
Servers: configuration routines for a number of servers you may have installed on your system, such as Apache, WU-FTPD and sendmail.
Hardware: configuration utilities for hardware issues such as RAID, printers and disk partitions.
Cluster: a collection of cluster maintenance tools.
Others: a set of tools that system administrators typically need, such as a command prompt, an alias manager and a file manager.
Finally, there is the Webmin tab, which has a series of Webmin management tools:
Webmin Actions Log: if you've enabled Webmin logging, this function allows you to search through the logfiles for what you've utilized this tool to do to your system.
Webmin Configuration: takes you to the amazing number of configuration options available for Webmin, everything from strengthening your Webmin authentication requirements to upgrading either the main package or individual modules.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
- New Container Image Standard Promises More Portable Apps
- Canonical and BQ's Aquaris M10 Ubuntu Edition Tablet
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide