SlideShare a Scribd company logo
1 of 42
LINUX ADMINISTRATION 
View Linux Administration Course at: http://www.edureka.co/linux-admin 
For more details please contact us: 
US : 1800 275 9730 (toll free) 
INDIA : +91 88808 62004 
Email Us : sales@edureka.co 
For Queries: 
Post on Twitter @edurekaIN: #askEdureka 
Post on Facebook /edurekaIN
Slide2 
http://www.edureka.co/linux-admin 
Objectives 
At the end of this module, you will be able to: 
Understand essential tools for handling files, directories and command-line environments 
Control running systems, including booting into different run levels 
Identify processes, starting and stopping virtual machines, and controlling services 
Configure local and remote storage using partitions & logical volumes 
Maintain systems including software installation, update, and core services 
Manage users and groups and security
Slide3 
http://www.edureka.co/linux-admin 
Linux –An Overview 
Linux Operating System can be downloaded for free and installed legally on as many systems as you want and freely given to others 
Because most Linux flavors are available as open source, you can edit the Linux source code as you want it to be! 
The Linux installation process is easier than Windows! 
Most malware software are designed to attack Windows systems, so Linux OS is less vulnerable to computer malwares!
Slide4 
http://www.edureka.co/linux-admin 
Why Linux Administration? 
The New World of Technology is Built on Linux 
This Linux dependence becomes evident in a survey of 5,000 + Linux professionals and hiring managers the Linux Foundation recently released in partnership with Dice.com. Among other findings in the report: 
77% of hiring managers have “hiring Linux talent” on their list of priorities for 2014, up from 70% in 2013. With these strategic priorities set, 93% of hiring managers plan to hire a Linux professional in the next six months 
46% of hiring managers are beefing up their plans for recruiting Linux talent over the next six months, a three- point increase over last year 
86% of Linux professionals report that knowing Linux has given them more career opportunities, and 64% say they chose to work with Linux because of its pervasiveness in modern-day technology infrastructure 
Keep Learning Linux -It's The Future
Slide5 
http://www.edureka.co/linux-admin 
Getting Started with Linux Administration 
This course describes the system administration aspects of using Linux. It is projected for people who know next to nothing about Linux system administration. It is widely understood that Linux certifications do help us in career advancement. Lets Start…
Slide6 
http://www.edureka.co/linux-admin 
Getting Started with Linux Administration (Contd.) 
ALinux administratorjob has one of the most rewarding job opportunities 
To become a Linux Administration Professional, you should havesolid system administration skills onLinux and you should be a master in some vital techniques such as 
»Squid 
»NFS 
»IP Traffic 
»Syslog Configuration 
»Permission and so on
Slide7 
http://www.edureka.co/linux-admin 
Roles of aLinux Administrator 
The basic roles and responsibilities of a Linux administrator are 
»Setting up and maintaining the system or server 
»User administration 
»Monitor system performance 
»Handling hardware in occasion of hardware failure 
»Monitor network communication 
»Monitor everyday system activities and evaluate availability of server resources 
»Setup security policies for users and much more
Slide8 
http://www.edureka.co/linux-admin 
Example 1: Setting up an NFS Directory 
The Network File System is one of the most widely used network services.It allows the client to automatically mount remote file systems and very clearly provide an access to NFS client as if the file system is local 
NFS SERVER 
NFS CLIENT 
NFS CLIENT 
NFS CLIENT 
NFS CLIENT 
Setting up an Network File System is one of your tasks in Linux Admin role 
Do you know how to setup NFS directory?
Slide9 
http://www.edureka.co/linux-admin 
Example 2: IP Traffic 
Monitoring System Performanceproblems every day is one of the roles of a system administrator 
If one of the users in a network is downloading unnecessary videos or other huge files, that results in slow internet speed for other users 
In such case, do you know how to monitor and catch the user?
Slide10 
http://www.edureka.co/linux-admin 
Example 3: Implementing Squid 
One of the main tasks of the system administrator is to restrict internet access to the users to avoid high utilization of bandwidth 
Do you know how to restrict internet access by using Squid?
Slide11 
http://www.edureka.co/linux-admin 
Example 4: Syslog Configuration 
Syslog is the most common system used for computer message logging. Using Syslog configuration is very easy to monitor the system.Thesyslog daemonmanages with any of the logging actions of other systems on your network 
Do you know how to use Syslog techniques?
Slide12 
http://www.edureka.co/linux-admin 
Scenario 
Consider thatXYZ Company created a new branch with sales and admin department 
You have been appointed as a Linux system administrator 
They asked you to complete the following list of tasks: 
1.The sales branch users need to access some data from the main branch. So, they decide to set NFS directory with group collaboration 
2.Users are reporting that the network is very slow. On examining the network, you have found out one of the user copying bulk data from the main branch 
3.Company has framed a new rule to the system administrator to give restricted internet access to the sales employees 
4.The company wants to monitor the new branch user system logs from the main branch. In order to accomplish the task, administrator implemented log server in main branch
Slide13 
http://www.edureka.co/linux-admin 
How? 
As a Linux system administrator, how do you complete your tasks?
Slide14 
http://www.edureka.co/linux-admin 
Question 1 
1.The sales branch users need to access some data from the main branch. So, they decide to set NFS directory with group collaboration
Slide15 
http://www.edureka.co/linux-admin 
Setting up an NFS Directory 
Configuring NFS Server 
To setup NFS directory with group collaboration 
Step 1: Install NFS 
»Command: yum install nfs-utils nfs-utils-lib 
Step 2: Start the service 
»Command: chkconfig nfs on 
»Command: chkconfig portmap on 
Step 3: Create a new directory 
»Command: mkdir /profilesharing 
Step 4: Configure NFS Export Directory 
»Command: vim /etc/exports 
Insert the line 
/profilesharing 192.168.0.199/24(rw,sync,no_root_squash)
Slide16 
http://www.edureka.co/linux-admin 
Setting up an NFS Directory (Contd.) 
Configuring NFS group collaboration in server side 
Step 1: Create a new group “sales” 
»Command: groupadd -g 600 sales 
Step 2: Change the group of the directory /profilesharing to sales 
»Command: chgrp sales /profilesharing
Slide17 
http://www.edureka.co/linux-admin 
Step 3: Set full permissions to owner and group with sticky bit on and no permission to others 
»Command: chmod 2770 /profilesharing 
Step 4: Export all directories 
»Command: exportfs -a 
Setting up an NFS Directory (Contd.)
Slide18 
http://www.edureka.co/linux-admin 
NFS Client side configuration 
Step 1: Install NFS 
»Command: yum install nfs-utils nfs-utils-lib 
Step 2: Start the service 
»Command: chkconfig nfs on 
»Command: chkconfig portmap on 
Step 3: View the exported directory 
»Command: showmount -e 192.168.0.199 
Setting up an NFS Directory (Contd.)
Slide19 
http://www.edureka.co/linux-admin 
Step 4: Create the group 
»Command: groupadd -g 600 sales 
Step 5: Create a directory locally 
»Command: mkdir /nfsshare 
Step 6: Mount the exported directory locally 
»Command: mount.nfs 192.168.0.199:/profilesharing /nfsshare 
Setting up an NFS Directory (Contd.)
Slide20 
http://www.edureka.co/linux-admin 
Step 7:Use mount command to check the mounted directory. 
Now all the user belongs to the Group sales (GID 600) can access the nfsshare. 
Setting up an NFS Directory (Contd.)
Slide21 
http://www.edureka.co/linux-admin 
Step 8: To mount an NFS directory permanently on the client machine, we need to make an entry in “/etc/fstab”. 
Add the following line: 
Format (separated by tabs): 
Serverip:/exported_directory/local_mount_directorynfsdefaults00 
192.168.0.199:/profilesharing/nfssharenfsdefaults00 
Setting up an NFS Directory (Contd.)
Slide22 
http://www.edureka.co/linux-admin 
2.Users are reporting that the network is very slow. On examining the network, you have found out one of the user copying bulk data from the main branch 
Question 2
Slide23 
http://www.edureka.co/linux-admin 
IP Traffic 
To kill the particular process and resume network speed. 
Step 1: Examine the network 
»Use ping command to check the network from main branch to new branch. 
»Main Branch server ip–192.168.0.199 
»New branch system ip–192.168.0.100 
Step 2: Install iptrafin server 
»Command: yum install iptraf 
Step 3: Monitor the network Using IP traffic 
»Command: iptraf 
Step 4: Select IP traffic monitor
Slide24 
http://www.edureka.co/linux-admin 
IP Traffic (Contd.) 
Step 5: Select All interfaces 
This will show the TCP connections as shown here.
Slide25 
http://www.edureka.co/linux-admin 
On examining, we found out that machine 192.168.0.212 is sending/receiving unusually large number of packets 
IP Traffic (Contd.)
Slide26 
http://www.edureka.co/linux-admin 
Once we identify the machine and the problem caused, we are going to kill the process from the problematic machine using top command to restore normal network speed 
Once we found with top command that the gnome-vfs-daemois that process, we would kill the process with kill command in top command by entering [k] key. It prompts for the process id. 
Enter the process id and press [Enter] key 
IP Traffic (Contd.)
Slide27 
http://www.edureka.co/linux-admin 
Question 3 
3.Company has framed a new rule to the system administrator to give restricted internet access to the sales employees.
Slide28 
http://www.edureka.co/linux-admin 
Implementing Squid 
To restrict unnecessary internet access to the sales employees due to high utilization of bandwidth 
Step 1: First, install squid with yum 
»Command: yum install squid 
Step 2: Configure squid 
»Command: vim /etc/squid/squid.conf 
Main squid configuration file is located in /etc/squid/squid.conf. 
Step 2(a): 
Add hostname in the file. Find visible_hostname tag. Insert a new line and add 
»visible_hostname squid.azimuth.com 
Step 2(b): Enable the squid port 3128 as shown here
Slide29 
http://www.edureka.co/linux-admin 
Implementing Squid (Contd.) 
Step 2(c): Create Access Control List 
Locate the tag access control lists by searching “acl CONNECT” and insert the below lines, as shown here. 
acl allow_network src 192.168.0.0/24 -> (this acl will allow the network to access internet) 
acl web_allow dstdomain “etc/squid/web_allow” -> (this acl will allow only particular sites mentioned in the /etc/squid/web_allow file)
Slide30 
http://www.edureka.co/linux-admin 
Step 2(d): Implement the Access list 
Search for “http_access allow”. Insert the lines as shown here 
»http_access allow localhost 
»http_access allow web_allow 
»http_access deny all 
We have created an access list web_allow to filter the web traffic and http_access allow web_allow tag in squid.conf 
Save and close the file 
Implementing Squid (Contd.)
Slide31 
http://www.edureka.co/linux-admin 
Step 3: Create a new file /etc/squid/web_allow 
»Command: vim /etc/squid/web_allow 
Now, add the urlof the websites in this file, which you want to allow 
In this example, we are allowing only two websites. This completes the squid configuration in server part 
Step 4: 
It is a good practice to check for syntax errors in configuration file before restarting or starting a service. To check syntax errors in squid.conf 
»Command: squid -k parse 
Step 5: 
Restart the squid service 
»Command: service squid restart 
Implementing Squid (Contd.)
Slide32 
http://www.edureka.co/linux-admin 
Implementing Squid 
Client Side configuration 
Change the IP configuration and set the squid server IP as default gateway 
Next, open the browser and manually set the port number and IP address of squid (proxy) server 
Once done, apply the changes 
Now, the sales guys will only be able to access the site that is mentioned in the /etc/squid/web_allowfile in the squid server
Slide33 
http://www.edureka.co/linux-admin 
Question 4 
4.The company wants to monitor the new branch user system logs from the main branch. In order to accomplish the task, administrator implemented log server in main branch
Slide34 
http://www.edureka.co/linux-admin 
Syslog Configuration 
To monitor the new branch user system logs from the main branch 
Log configuration information is located in /etc/syslog.conf 
Configures system logging under 
/etc/sysconfig/syslog 
Log Configuration
Slide35 
http://www.edureka.co/linux-admin 
Syslog Configuration (Contd.) 
Configuring log server in main branch 
To configure the log server, the following services must be running: syslog, xinetd, portmap 
»Command: chkconfig syslog on 
»Command: chkconfig xinetdon 
»Command: chkconfig portmap on 
To check the service status 
»Command: chkconfig --list syslog 
»Command: chkconfig --list portmap 
»Command: chkconfig --list xinetd 
All the above three services were permanently turned on 
Log Configuration
Slide36 
http://www.edureka.co/linux-admin 
Open syslog file to configure the settings 
»Command: vim /etc/sysconfig/syslog 
Insert “-r” in SYSLOGD_OPTIONS as shown in the image. The -r option tag accepts the logs from client machines 
Now restart the syslog service 
»Command: service syslog restart 
Syslog Configuration (Contd.) 
Log Configuration
Slide37 
http://www.edureka.co/linux-admin 
Client side configuration (in new branch) 
Configure /etc/syslog.confin client machine 
»Command: vim /etc/syslog.conf 
Inserted a new line at the end of the file and enter the following: 
*.* @192.168.0.199 
In this example, the IP 192.168.0.199 represents the syslog server (main branch) 
Syslog Configuration (Contd.) 
Log Configuration
Slide38 
http://www.edureka.co/linux-admin 
Restart the client machine 
»Command: init6 
Once the client machine restarts, it starts sending the log messages to syslog server 
Check the /var/log/messages in server 
»Command: less /var/log/messages 
In this example, the client machine’s IP address is 192.168.0.200. You can see some messages logged from IP 192.168.0.200 
Syslog Configuration (Contd.) 
Log Configuration
Slide39 
http://www.edureka.co/linux-admin 
Course Topics 
Module 7 
»Linux Networking 
Module 8 
»Linux Configuration 
Module 9 
»Security Administration, Shell Script and Virtualization 
Module 10 
»Project 
Module 1 
»Installation and Initialization 
Module 2 
»Boot and Package Management 
Module 3 
»Kernel Services 
Module 4 
»System Services 
Module 5 
»User Administration 
Module 6 
»File System Management and Security
LIVE Online Class 
Class Recording in LMS 
24/7 Post Class Support 
Module Wise Quiz 
Project Work 
Verifiable Certificate 
Slide40 
http://www.edureka.co/linux-admin 
How it Works?
Questions 
Slide41 
Twitter @edurekaIN, Facebook /edurekaIN, use #askEdureka for Questions 
http://www.edureka.co/linux-admin
Webinar: Linux administration : Past, Present and Is the Future

More Related Content

What's hot

Wordpress On Windows
Wordpress On WindowsWordpress On Windows
Wordpress On WindowsJosh Holmes
 
Rev it up with php on windows
Rev it up with php on windowsRev it up with php on windows
Rev it up with php on windowsJosh Holmes
 
Open Mic IBM connections and IBM Verse on premise integration
Open Mic IBM connections and IBM Verse on premise integrationOpen Mic IBM connections and IBM Verse on premise integration
Open Mic IBM connections and IBM Verse on premise integrationjayeshpar2006
 
Microsoft/Zend Webcast on Cloud Computing
Microsoft/Zend Webcast on Cloud ComputingMicrosoft/Zend Webcast on Cloud Computing
Microsoft/Zend Webcast on Cloud ComputingJosh Holmes
 
IIS for Developers
IIS for DevelopersIIS for Developers
IIS for DevelopersIdo Flatow
 
Introduction To Iis 7
Introduction To Iis 7Introduction To Iis 7
Introduction To Iis 7amit_monty
 
Understanding a web server and types of web servers ppt
Understanding a web server and types of web servers pptUnderstanding a web server and types of web servers ppt
Understanding a web server and types of web servers pptNivi Sharma
 
Connect2016 - 1172 Shipping domino
Connect2016 - 1172 Shipping dominoConnect2016 - 1172 Shipping domino
Connect2016 - 1172 Shipping dominoMatteo Bisi
 
introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)Assay Khan
 
Seo pressor unlimited-license-v4.0
Seo pressor unlimited-license-v4.0Seo pressor unlimited-license-v4.0
Seo pressor unlimited-license-v4.0Sarit Cohen
 
Iis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.comIis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.comphanleson
 
Multi Lingual Websites In Umbraco
Multi Lingual Websites In UmbracoMulti Lingual Websites In Umbraco
Multi Lingual Websites In UmbracoPaul Marden
 
Windows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete labWindows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete labAhmed Abdelwahed
 
Upgradingtodominov10bestpractices1549485091676
Upgradingtodominov10bestpractices1549485091676Upgradingtodominov10bestpractices1549485091676
Upgradingtodominov10bestpractices1549485091676André Luís Cardoso
 
Ultimate Guide to WordPress Multisite
Ultimate Guide to WordPress MultisiteUltimate Guide to WordPress Multisite
Ultimate Guide to WordPress MultisiteAndrew Marks
 
Hosting a website on IIS Server
Hosting a website on IIS ServerHosting a website on IIS Server
Hosting a website on IIS ServerDinesh Vasamshetty
 
important DotNet Questions For Practicals And Interviews
important DotNet Questions For Practicals And Interviewsimportant DotNet Questions For Practicals And Interviews
important DotNet Questions For Practicals And InterviewsRahul Jain
 

What's hot (20)

Wordpress On Windows
Wordpress On WindowsWordpress On Windows
Wordpress On Windows
 
Rev it up with php on windows
Rev it up with php on windowsRev it up with php on windows
Rev it up with php on windows
 
Open Mic IBM connections and IBM Verse on premise integration
Open Mic IBM connections and IBM Verse on premise integrationOpen Mic IBM connections and IBM Verse on premise integration
Open Mic IBM connections and IBM Verse on premise integration
 
Microsoft/Zend Webcast on Cloud Computing
Microsoft/Zend Webcast on Cloud ComputingMicrosoft/Zend Webcast on Cloud Computing
Microsoft/Zend Webcast on Cloud Computing
 
IIS for Developers
IIS for DevelopersIIS for Developers
IIS for Developers
 
Introduction To Iis 7
Introduction To Iis 7Introduction To Iis 7
Introduction To Iis 7
 
Understanding a web server and types of web servers ppt
Understanding a web server and types of web servers pptUnderstanding a web server and types of web servers ppt
Understanding a web server and types of web servers ppt
 
Connect2016 - 1172 Shipping domino
Connect2016 - 1172 Shipping dominoConnect2016 - 1172 Shipping domino
Connect2016 - 1172 Shipping domino
 
Php On Windows
Php On WindowsPhp On Windows
Php On Windows
 
introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)
 
Seo pressor unlimited-license-v4.0
Seo pressor unlimited-license-v4.0Seo pressor unlimited-license-v4.0
Seo pressor unlimited-license-v4.0
 
Migration:Impossible ... Not so
Migration:Impossible ... Not soMigration:Impossible ... Not so
Migration:Impossible ... Not so
 
Iis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.comIis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.com
 
Multi Lingual Websites In Umbraco
Multi Lingual Websites In UmbracoMulti Lingual Websites In Umbraco
Multi Lingual Websites In Umbraco
 
Windows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete labWindows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete lab
 
Upgradingtodominov10bestpractices1549485091676
Upgradingtodominov10bestpractices1549485091676Upgradingtodominov10bestpractices1549485091676
Upgradingtodominov10bestpractices1549485091676
 
Ultimate Guide to WordPress Multisite
Ultimate Guide to WordPress MultisiteUltimate Guide to WordPress Multisite
Ultimate Guide to WordPress Multisite
 
Understanding IIS
Understanding IISUnderstanding IIS
Understanding IIS
 
Hosting a website on IIS Server
Hosting a website on IIS ServerHosting a website on IIS Server
Hosting a website on IIS Server
 
important DotNet Questions For Practicals And Interviews
important DotNet Questions For Practicals And Interviewsimportant DotNet Questions For Practicals And Interviews
important DotNet Questions For Practicals And Interviews
 

Similar to Webinar: Linux administration : Past, Present and Is the Future

A Day In The Life Of A Linux Administrator
A Day In The Life Of A Linux AdministratorA Day In The Life Of A Linux Administrator
A Day In The Life Of A Linux AdministratorEdureka!
 
Assessment item 1 File Systems and Advanced Scripting .docx
Assessment item 1 File Systems and Advanced Scripting .docxAssessment item 1 File Systems and Advanced Scripting .docx
Assessment item 1 File Systems and Advanced Scripting .docxdavezstarr61655
 
LINUX ONLINE TRAINING 2024.
LINUX ONLINE TRAINING 2024.LINUX ONLINE TRAINING 2024.
LINUX ONLINE TRAINING 2024.PrasannaNareshIT
 
LINUX ONLINE TRAINING 2024.pptx
LINUX ONLINE TRAINING 2024.pptxLINUX ONLINE TRAINING 2024.pptx
LINUX ONLINE TRAINING 2024.pptxPrasannaNareshIT
 
LINUX ONLINE TRAINING NareshIT
LINUX ONLINE TRAINING NareshITLINUX ONLINE TRAINING NareshIT
LINUX ONLINE TRAINING NareshITPrasannaNareshIT
 
Getting Started With Linux Administration
Getting Started With Linux AdministrationGetting Started With Linux Administration
Getting Started With Linux AdministrationEdureka!
 
SAP HANA 2 – Upgrade and Operations Part 1 - Exploring Features of the New Co...
SAP HANA 2 – Upgrade and Operations Part 1 - Exploring Features of the New Co...SAP HANA 2 – Upgrade and Operations Part 1 - Exploring Features of the New Co...
SAP HANA 2 – Upgrade and Operations Part 1 - Exploring Features of the New Co...Linh Nguyen
 
Cis 2903 project -202110
Cis 2903 project -202110Cis 2903 project -202110
Cis 2903 project -202110AlaJebnoun
 
CEIS106_Final_Project.pptx.pdf
CEIS106_Final_Project.pptx.pdfCEIS106_Final_Project.pptx.pdf
CEIS106_Final_Project.pptx.pdfluxasuhi
 
NTC/326 ENTIRE CLASS UOP TUTORIALS
NTC/326 ENTIRE CLASS UOP TUTORIALSNTC/326 ENTIRE CLASS UOP TUTORIALS
NTC/326 ENTIRE CLASS UOP TUTORIALSSharon Reynolds
 
Linux Operating System Resembles Unix Operating. System
Linux Operating System Resembles Unix Operating. SystemLinux Operating System Resembles Unix Operating. System
Linux Operating System Resembles Unix Operating. SystemOlga Bautista
 

Similar to Webinar: Linux administration : Past, Present and Is the Future (20)

A Day In The Life Of A Linux Administrator
A Day In The Life Of A Linux AdministratorA Day In The Life Of A Linux Administrator
A Day In The Life Of A Linux Administrator
 
Assessment item 1 File Systems and Advanced Scripting .docx
Assessment item 1 File Systems and Advanced Scripting .docxAssessment item 1 File Systems and Advanced Scripting .docx
Assessment item 1 File Systems and Advanced Scripting .docx
 
Linux Day1
Linux Day1Linux Day1
Linux Day1
 
LINUX ONLINE TRAINING 2024.
LINUX ONLINE TRAINING 2024.LINUX ONLINE TRAINING 2024.
LINUX ONLINE TRAINING 2024.
 
LINUX ONLINE TRAINING 2024.pptx
LINUX ONLINE TRAINING 2024.pptxLINUX ONLINE TRAINING 2024.pptx
LINUX ONLINE TRAINING 2024.pptx
 
LINUX ONLINE TRAINING
LINUX ONLINE TRAININGLINUX ONLINE TRAINING
LINUX ONLINE TRAINING
 
LINUX ONLINE TRAINING
LINUX ONLINE TRAININGLINUX ONLINE TRAINING
LINUX ONLINE TRAINING
 
LINUX ONLINE TRAINING NareshIT
LINUX ONLINE TRAINING NareshITLINUX ONLINE TRAINING NareshIT
LINUX ONLINE TRAINING NareshIT
 
LINUX ONLINE TRAINING.
LINUX ONLINE TRAINING.LINUX ONLINE TRAINING.
LINUX ONLINE TRAINING.
 
Getting Started With Linux Administration
Getting Started With Linux AdministrationGetting Started With Linux Administration
Getting Started With Linux Administration
 
SAP HANA 2 – Upgrade and Operations Part 1 - Exploring Features of the New Co...
SAP HANA 2 – Upgrade and Operations Part 1 - Exploring Features of the New Co...SAP HANA 2 – Upgrade and Operations Part 1 - Exploring Features of the New Co...
SAP HANA 2 – Upgrade and Operations Part 1 - Exploring Features of the New Co...
 
Client Server Live Hosting Documentation
Client Server Live Hosting Documentation Client Server Live Hosting Documentation
Client Server Live Hosting Documentation
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
linuxsarath (1)
linuxsarath (1)linuxsarath (1)
linuxsarath (1)
 
linuxsarath (1)
linuxsarath (1)linuxsarath (1)
linuxsarath (1)
 
Cis 2903 project -202110
Cis 2903 project -202110Cis 2903 project -202110
Cis 2903 project -202110
 
CEIS106_Final_Project.pptx.pdf
CEIS106_Final_Project.pptx.pdfCEIS106_Final_Project.pptx.pdf
CEIS106_Final_Project.pptx.pdf
 
NTC/326 ENTIRE CLASS UOP TUTORIALS
NTC/326 ENTIRE CLASS UOP TUTORIALSNTC/326 ENTIRE CLASS UOP TUTORIALS
NTC/326 ENTIRE CLASS UOP TUTORIALS
 
EVA_Navigator_Presentation.ppt
EVA_Navigator_Presentation.pptEVA_Navigator_Presentation.ppt
EVA_Navigator_Presentation.ppt
 
Linux Operating System Resembles Unix Operating. System
Linux Operating System Resembles Unix Operating. SystemLinux Operating System Resembles Unix Operating. System
Linux Operating System Resembles Unix Operating. System
 

More from Edureka!

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaEdureka!
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaEdureka!
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaEdureka!
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaEdureka!
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaEdureka!
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaEdureka!
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaEdureka!
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaEdureka!
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaEdureka!
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaEdureka!
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | EdurekaEdureka!
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEdureka!
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEdureka!
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaEdureka!
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaEdureka!
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaEdureka!
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Edureka!
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaEdureka!
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaEdureka!
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | EdurekaEdureka!
 

More from Edureka! (20)

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
 

Recently uploaded

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Webinar: Linux administration : Past, Present and Is the Future

  • 1. LINUX ADMINISTRATION View Linux Administration Course at: http://www.edureka.co/linux-admin For more details please contact us: US : 1800 275 9730 (toll free) INDIA : +91 88808 62004 Email Us : sales@edureka.co For Queries: Post on Twitter @edurekaIN: #askEdureka Post on Facebook /edurekaIN
  • 2. Slide2 http://www.edureka.co/linux-admin Objectives At the end of this module, you will be able to: Understand essential tools for handling files, directories and command-line environments Control running systems, including booting into different run levels Identify processes, starting and stopping virtual machines, and controlling services Configure local and remote storage using partitions & logical volumes Maintain systems including software installation, update, and core services Manage users and groups and security
  • 3. Slide3 http://www.edureka.co/linux-admin Linux –An Overview Linux Operating System can be downloaded for free and installed legally on as many systems as you want and freely given to others Because most Linux flavors are available as open source, you can edit the Linux source code as you want it to be! The Linux installation process is easier than Windows! Most malware software are designed to attack Windows systems, so Linux OS is less vulnerable to computer malwares!
  • 4. Slide4 http://www.edureka.co/linux-admin Why Linux Administration? The New World of Technology is Built on Linux This Linux dependence becomes evident in a survey of 5,000 + Linux professionals and hiring managers the Linux Foundation recently released in partnership with Dice.com. Among other findings in the report: 77% of hiring managers have “hiring Linux talent” on their list of priorities for 2014, up from 70% in 2013. With these strategic priorities set, 93% of hiring managers plan to hire a Linux professional in the next six months 46% of hiring managers are beefing up their plans for recruiting Linux talent over the next six months, a three- point increase over last year 86% of Linux professionals report that knowing Linux has given them more career opportunities, and 64% say they chose to work with Linux because of its pervasiveness in modern-day technology infrastructure Keep Learning Linux -It's The Future
  • 5. Slide5 http://www.edureka.co/linux-admin Getting Started with Linux Administration This course describes the system administration aspects of using Linux. It is projected for people who know next to nothing about Linux system administration. It is widely understood that Linux certifications do help us in career advancement. Lets Start…
  • 6. Slide6 http://www.edureka.co/linux-admin Getting Started with Linux Administration (Contd.) ALinux administratorjob has one of the most rewarding job opportunities To become a Linux Administration Professional, you should havesolid system administration skills onLinux and you should be a master in some vital techniques such as »Squid »NFS »IP Traffic »Syslog Configuration »Permission and so on
  • 7. Slide7 http://www.edureka.co/linux-admin Roles of aLinux Administrator The basic roles and responsibilities of a Linux administrator are »Setting up and maintaining the system or server »User administration »Monitor system performance »Handling hardware in occasion of hardware failure »Monitor network communication »Monitor everyday system activities and evaluate availability of server resources »Setup security policies for users and much more
  • 8. Slide8 http://www.edureka.co/linux-admin Example 1: Setting up an NFS Directory The Network File System is one of the most widely used network services.It allows the client to automatically mount remote file systems and very clearly provide an access to NFS client as if the file system is local NFS SERVER NFS CLIENT NFS CLIENT NFS CLIENT NFS CLIENT Setting up an Network File System is one of your tasks in Linux Admin role Do you know how to setup NFS directory?
  • 9. Slide9 http://www.edureka.co/linux-admin Example 2: IP Traffic Monitoring System Performanceproblems every day is one of the roles of a system administrator If one of the users in a network is downloading unnecessary videos or other huge files, that results in slow internet speed for other users In such case, do you know how to monitor and catch the user?
  • 10. Slide10 http://www.edureka.co/linux-admin Example 3: Implementing Squid One of the main tasks of the system administrator is to restrict internet access to the users to avoid high utilization of bandwidth Do you know how to restrict internet access by using Squid?
  • 11. Slide11 http://www.edureka.co/linux-admin Example 4: Syslog Configuration Syslog is the most common system used for computer message logging. Using Syslog configuration is very easy to monitor the system.Thesyslog daemonmanages with any of the logging actions of other systems on your network Do you know how to use Syslog techniques?
  • 12. Slide12 http://www.edureka.co/linux-admin Scenario Consider thatXYZ Company created a new branch with sales and admin department You have been appointed as a Linux system administrator They asked you to complete the following list of tasks: 1.The sales branch users need to access some data from the main branch. So, they decide to set NFS directory with group collaboration 2.Users are reporting that the network is very slow. On examining the network, you have found out one of the user copying bulk data from the main branch 3.Company has framed a new rule to the system administrator to give restricted internet access to the sales employees 4.The company wants to monitor the new branch user system logs from the main branch. In order to accomplish the task, administrator implemented log server in main branch
  • 13. Slide13 http://www.edureka.co/linux-admin How? As a Linux system administrator, how do you complete your tasks?
  • 14. Slide14 http://www.edureka.co/linux-admin Question 1 1.The sales branch users need to access some data from the main branch. So, they decide to set NFS directory with group collaboration
  • 15. Slide15 http://www.edureka.co/linux-admin Setting up an NFS Directory Configuring NFS Server To setup NFS directory with group collaboration Step 1: Install NFS »Command: yum install nfs-utils nfs-utils-lib Step 2: Start the service »Command: chkconfig nfs on »Command: chkconfig portmap on Step 3: Create a new directory »Command: mkdir /profilesharing Step 4: Configure NFS Export Directory »Command: vim /etc/exports Insert the line /profilesharing 192.168.0.199/24(rw,sync,no_root_squash)
  • 16. Slide16 http://www.edureka.co/linux-admin Setting up an NFS Directory (Contd.) Configuring NFS group collaboration in server side Step 1: Create a new group “sales” »Command: groupadd -g 600 sales Step 2: Change the group of the directory /profilesharing to sales »Command: chgrp sales /profilesharing
  • 17. Slide17 http://www.edureka.co/linux-admin Step 3: Set full permissions to owner and group with sticky bit on and no permission to others »Command: chmod 2770 /profilesharing Step 4: Export all directories »Command: exportfs -a Setting up an NFS Directory (Contd.)
  • 18. Slide18 http://www.edureka.co/linux-admin NFS Client side configuration Step 1: Install NFS »Command: yum install nfs-utils nfs-utils-lib Step 2: Start the service »Command: chkconfig nfs on »Command: chkconfig portmap on Step 3: View the exported directory »Command: showmount -e 192.168.0.199 Setting up an NFS Directory (Contd.)
  • 19. Slide19 http://www.edureka.co/linux-admin Step 4: Create the group »Command: groupadd -g 600 sales Step 5: Create a directory locally »Command: mkdir /nfsshare Step 6: Mount the exported directory locally »Command: mount.nfs 192.168.0.199:/profilesharing /nfsshare Setting up an NFS Directory (Contd.)
  • 20. Slide20 http://www.edureka.co/linux-admin Step 7:Use mount command to check the mounted directory. Now all the user belongs to the Group sales (GID 600) can access the nfsshare. Setting up an NFS Directory (Contd.)
  • 21. Slide21 http://www.edureka.co/linux-admin Step 8: To mount an NFS directory permanently on the client machine, we need to make an entry in “/etc/fstab”. Add the following line: Format (separated by tabs): Serverip:/exported_directory/local_mount_directorynfsdefaults00 192.168.0.199:/profilesharing/nfssharenfsdefaults00 Setting up an NFS Directory (Contd.)
  • 22. Slide22 http://www.edureka.co/linux-admin 2.Users are reporting that the network is very slow. On examining the network, you have found out one of the user copying bulk data from the main branch Question 2
  • 23. Slide23 http://www.edureka.co/linux-admin IP Traffic To kill the particular process and resume network speed. Step 1: Examine the network »Use ping command to check the network from main branch to new branch. »Main Branch server ip–192.168.0.199 »New branch system ip–192.168.0.100 Step 2: Install iptrafin server »Command: yum install iptraf Step 3: Monitor the network Using IP traffic »Command: iptraf Step 4: Select IP traffic monitor
  • 24. Slide24 http://www.edureka.co/linux-admin IP Traffic (Contd.) Step 5: Select All interfaces This will show the TCP connections as shown here.
  • 25. Slide25 http://www.edureka.co/linux-admin On examining, we found out that machine 192.168.0.212 is sending/receiving unusually large number of packets IP Traffic (Contd.)
  • 26. Slide26 http://www.edureka.co/linux-admin Once we identify the machine and the problem caused, we are going to kill the process from the problematic machine using top command to restore normal network speed Once we found with top command that the gnome-vfs-daemois that process, we would kill the process with kill command in top command by entering [k] key. It prompts for the process id. Enter the process id and press [Enter] key IP Traffic (Contd.)
  • 27. Slide27 http://www.edureka.co/linux-admin Question 3 3.Company has framed a new rule to the system administrator to give restricted internet access to the sales employees.
  • 28. Slide28 http://www.edureka.co/linux-admin Implementing Squid To restrict unnecessary internet access to the sales employees due to high utilization of bandwidth Step 1: First, install squid with yum »Command: yum install squid Step 2: Configure squid »Command: vim /etc/squid/squid.conf Main squid configuration file is located in /etc/squid/squid.conf. Step 2(a): Add hostname in the file. Find visible_hostname tag. Insert a new line and add »visible_hostname squid.azimuth.com Step 2(b): Enable the squid port 3128 as shown here
  • 29. Slide29 http://www.edureka.co/linux-admin Implementing Squid (Contd.) Step 2(c): Create Access Control List Locate the tag access control lists by searching “acl CONNECT” and insert the below lines, as shown here. acl allow_network src 192.168.0.0/24 -> (this acl will allow the network to access internet) acl web_allow dstdomain “etc/squid/web_allow” -> (this acl will allow only particular sites mentioned in the /etc/squid/web_allow file)
  • 30. Slide30 http://www.edureka.co/linux-admin Step 2(d): Implement the Access list Search for “http_access allow”. Insert the lines as shown here »http_access allow localhost »http_access allow web_allow »http_access deny all We have created an access list web_allow to filter the web traffic and http_access allow web_allow tag in squid.conf Save and close the file Implementing Squid (Contd.)
  • 31. Slide31 http://www.edureka.co/linux-admin Step 3: Create a new file /etc/squid/web_allow »Command: vim /etc/squid/web_allow Now, add the urlof the websites in this file, which you want to allow In this example, we are allowing only two websites. This completes the squid configuration in server part Step 4: It is a good practice to check for syntax errors in configuration file before restarting or starting a service. To check syntax errors in squid.conf »Command: squid -k parse Step 5: Restart the squid service »Command: service squid restart Implementing Squid (Contd.)
  • 32. Slide32 http://www.edureka.co/linux-admin Implementing Squid Client Side configuration Change the IP configuration and set the squid server IP as default gateway Next, open the browser and manually set the port number and IP address of squid (proxy) server Once done, apply the changes Now, the sales guys will only be able to access the site that is mentioned in the /etc/squid/web_allowfile in the squid server
  • 33. Slide33 http://www.edureka.co/linux-admin Question 4 4.The company wants to monitor the new branch user system logs from the main branch. In order to accomplish the task, administrator implemented log server in main branch
  • 34. Slide34 http://www.edureka.co/linux-admin Syslog Configuration To monitor the new branch user system logs from the main branch Log configuration information is located in /etc/syslog.conf Configures system logging under /etc/sysconfig/syslog Log Configuration
  • 35. Slide35 http://www.edureka.co/linux-admin Syslog Configuration (Contd.) Configuring log server in main branch To configure the log server, the following services must be running: syslog, xinetd, portmap »Command: chkconfig syslog on »Command: chkconfig xinetdon »Command: chkconfig portmap on To check the service status »Command: chkconfig --list syslog »Command: chkconfig --list portmap »Command: chkconfig --list xinetd All the above three services were permanently turned on Log Configuration
  • 36. Slide36 http://www.edureka.co/linux-admin Open syslog file to configure the settings »Command: vim /etc/sysconfig/syslog Insert “-r” in SYSLOGD_OPTIONS as shown in the image. The -r option tag accepts the logs from client machines Now restart the syslog service »Command: service syslog restart Syslog Configuration (Contd.) Log Configuration
  • 37. Slide37 http://www.edureka.co/linux-admin Client side configuration (in new branch) Configure /etc/syslog.confin client machine »Command: vim /etc/syslog.conf Inserted a new line at the end of the file and enter the following: *.* @192.168.0.199 In this example, the IP 192.168.0.199 represents the syslog server (main branch) Syslog Configuration (Contd.) Log Configuration
  • 38. Slide38 http://www.edureka.co/linux-admin Restart the client machine »Command: init6 Once the client machine restarts, it starts sending the log messages to syslog server Check the /var/log/messages in server »Command: less /var/log/messages In this example, the client machine’s IP address is 192.168.0.200. You can see some messages logged from IP 192.168.0.200 Syslog Configuration (Contd.) Log Configuration
  • 39. Slide39 http://www.edureka.co/linux-admin Course Topics Module 7 »Linux Networking Module 8 »Linux Configuration Module 9 »Security Administration, Shell Script and Virtualization Module 10 »Project Module 1 »Installation and Initialization Module 2 »Boot and Package Management Module 3 »Kernel Services Module 4 »System Services Module 5 »User Administration Module 6 »File System Management and Security
  • 40. LIVE Online Class Class Recording in LMS 24/7 Post Class Support Module Wise Quiz Project Work Verifiable Certificate Slide40 http://www.edureka.co/linux-admin How it Works?
  • 41. Questions Slide41 Twitter @edurekaIN, Facebook /edurekaIN, use #askEdureka for Questions http://www.edureka.co/linux-admin