Linux - System Administrator
Linux - System Administrator
System Administration
In Linux, "system administration" refers to the process of setting up, configuring, maintaining, and
managing a computer system running on the Linux operating system, including tasks like user account
creation, file system management, software installation, system updates, backups, security configuration,
and monitoring system performance to ensure optimal uptime and reliability.
In Linux, "configuration files" are text files that store settings and parameters for various system
components and applications, allowing administrators to customize how the system operates. Configuration
file found in the /etc directory.
Function: They define how services, applications, and system settings should behave.
In Linux "log files" are records of system events, activities, and errors, providing valuable
information for troubleshooting and monitoring system health; most configuration files are located in
the /etc directory, while log files are typically found in the /var/log directory.
Function: They record system events, including user actions, system errors, application warnings, and
important system status changes.
Examples:
/var/log/messages: General system messages
/var/log/auth: Authentication related logs
/var/log/secure: Security related logs
/var/log/httpd: Apache web server access logs
Chkconfig:
A ‘chkconfig’ command is used to list all available services and view or update their run level
settings. In simple words it is used to list current startup information of services or any particular service,
update runlevel settings of service, and adding or removing service from management.
Syntax:
Option Description
--list Lists the current status of all services or a specific service.
--add name Adds a new service to the startup sequence, allowing it to be managed by chkconfig.
--del name Removes a service from the startup sequence.
--level levels Specifies the run levels to enable or disable a service.
--override name Overrides the default settings for a service without affecting its configuration file
chkconfig --list
chkconfig rhnsd on
2. Process Isolation
SELinux restricts what processes can access, reducing the risk of privilege escalation or
malware attacks.
3. Labeling and Contexts
Every file, process, and system resource is assigned a security context (label).
Syntax:
Option in rpm:
Option Description
-i Install the package
-v Verbose output
-h Shows progress as a hash (#)
-U Upgrade (installs if not installed, replaces if already installed)
-e Erase (removes the package)
rpm -e httpd