... UNIX AND LINUX SYSTEM ® ® ADMINISTRATION HANDBOOK FOURTH EDITION This page intentionally left blank UNIX AND LINUX SYSTEM ® ® ADMINISTRATION HANDBOOK FOURTH EDITION Evi ... Congress Cataloging-in-Publication Data UNIX and Linux systemadministration handbook / Evi Nemeth [et al.] —4th ed p cm Rev ed of: Unix systemadministration handbook, 3rd ed., 2001 Includes index ... 12 v vi UNIX and Linux SystemAdministration Handbook System- specific administration tools 13 Notation and typographical conventions ...
... copying and/ or modifying files Either you need to update a file by copying a new file over it, edit the file in place, or copy out an additional file or files Often when files change or new files ... UNIX and UNIX-like operating systems is the fact that almost everything on the system is represented to the user as a file Both real and pseudo devices (such as , , and so on) can be read from and ... tasks on a stand-alone system It makes security checks, updates databases with information on file locations (e.g., ), and collects system accounting and performance information All this and more...
... need to run on the server system to create its public- and private-key files These files will be in the directory (or on Debian and its derivatives) and will be named and The server also needs ... corruption or other errors in copied files by first copying the file to a file named on the local filesystem (where is the name of the file being copied), then renaming the file quickly into place This ... configuration file You can choose from approximately 100 possible commands in this section These commands allow you to check and modify text files (and, in a few cases, binary files) We won’t...
... master, system upgrade, and patching procedures is easy before the systems and procedures are put into use Once you’ve been deploying and updating systems using automated means, reorganizing and ... languages—the imported file is read in and used as if it were content in the original file For the cfengine configuration file sections such as and , will import files in the and We’ll create the ... preceding commands, we’ve created directories that mimic files inside the UNIX filesystem, underneath The directory is meant for files that are pulled or “replicated” from the master system out...
... the Profile file is a text file that describes the software to be installed on a system A proThe file describes aspects of the configuration such as the software group to install and the disk partition ... The directory containing the file, the file, and the profiles is called the JumpStart directory, and the server that hosts the JumpStart directory is called the profile server First create the ... operating system Profile server: This system hosts what the JumpStart documentation calls the file for networked installation clients The file contains information on the profile to...
... when we first set up our file repository in Chapter and On Solaris, the files are and The and files map filesystem paths to files that contain the commands to mount a remote ... hosts and copy the three files we need to a per -file subdirectory, with a file name that includes the hostname of the system that the file is from We will illustrate standardization of account files ... only three included files ( , , and ), and create two new ones ( and ) Now we know the file locations andfile contents that we need in order to host our private DNS on a Debian system running BIND...
... client systems inoperable With NFS, a user should have the same user ID on all systems All file ownership on an NFS filesystem—well, any filesystem, really—is assigned by user IDs (UIDs) and group ... files on any system, and the changes become instantly available on all other systems Problems with network filesystems begin to appear when you have server or network problems Network filesystems ... configure and use than other network filesystems As with just about any network filesystem, you can make changes on the server or on any client and have them be immediately available on all other systems...
... grows have chosen Nagios for our systemand service monitoring system Nagios is flexible and mature, and help is widely available on Internet mailing lists and newsgroups ... world isn’t perfect Disk drives fill up; power supplies fail; CPUs overheat; software has bugs; and all manner of issues crop up that cause hosts and applications to fail Systemand service monitoring ... monitoring systems Applications and hosts are added; applications change and need to be monitored differently; hosts fail permanently; and critical thresholds change You need to know your monitoring systems...
... CRASH COURSE Most system administrators are familiar with the and commands The command is used to compare text files line by line and show the differences The command takes a file containing a ... of the and commands is that the history of the merged files will show exactly where the new file contents came from, including the specific revision and repository path of the source files If ... host and it works properly Each time we update the Nagios configuration files, cfengine gets the files to the cor etchlamp) and restarts the Nagios daemon etchlamp system...
... is handled via a static file copy in another task and provide the task file name in the comment After editing the task to comment out the section and add the new comment, we placed these files ... the system to full functionality CHAPT ER 12 Improving System Security E arly in this book, we established that managing the contents and permission of files is the core of UNIX/Linux systemadministration ... on our systems IMPROVING SYSTEM SECURITY CHAPTER 12 Protecting System Accounts system accounts are commonly used for brute force login attempts to systems Every day, lists of common system...
... the Profile file is a text file that describes the software to be installed on a system A proThe file describes aspects of the configuration such as the software group to install and the disk partition ... The directory containing the file, the file, and the profiles is called the JumpStart directory, and the server that hosts the JumpStart directory is called the profile server First create the ... operating system Profile server: This system hosts what the JumpStart documentation calls the file for networked installation clients The file contains information on the profile to...
... is handled via a static file copy in another task and provide the task file name in the comment After editing the task to comment out the section and add the new comment, we placed these files ... the system to full functionality CHAPT ER 12 Improving System Security E arly in this book, we established that managing the contents and permission of files is the core of UNIX/Linux systemadministration ... on our systems IMPROVING SYSTEM SECURITY CHAPTER 12 Protecting System Accounts system accounts are commonly used for brute force login attempts to systems Every day, lists of common system...