0% found this document useful (0 votes)
21 views5 pages

Linux - System Administrator

The document outlines the role and responsibilities of a Linux System Administrator, detailing tasks such as system installation, user management, file system management, network security, and service management. It also discusses configuration and log files, the chkconfig command for managing services, and the Security-Enhanced Linux (SELinux) feature for system security. Additionally, it covers the use of the rpm command for package management in Linux.

Uploaded by

thirosul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views5 pages

Linux - System Administrator

The document outlines the role and responsibilities of a Linux System Administrator, detailing tasks such as system installation, user management, file system management, network security, and service management. It also discusses configuration and log files, the chkconfig command for managing services, and the Security-Enhanced Linux (SELinux) feature for system security. Additionally, it covers the use of the rpm command for package management in Linux.

Uploaded by

thirosul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1

System Administration
In Linux, "system administration" refers to the process of setting up, configuring, maintaining, and
managing a computer system running on the Linux operating system, including tasks like user account
creation, file system management, software installation, system updates, backups, security configuration,
and monitoring system performance to ensure optimal uptime and reliability.

 Role of system administrator:


A Linux System Administrator is responsible for managing, maintaining, and troubleshooting Linux-
based systems. Their role is crucial in ensuring that servers, networks, and services run efficiently and
securely.

Key Responsibilities of a Linux System Administrator

1. System Installation & Configuration

 Install and configure Linux operating systems on servers.


 Set up system partitions, filesystems, and swap space.
 Configure system settings like hostname, network, and time synchronization.

2. User and Group Management

 Create, modify, and delete user accounts and groups.


 Set user permissions and access controls.
 Enforce security policies (password policies, account locking, etc.).

3. File System & Storage Management

 Monitor disk space usage and clean up unnecessary files.


 Configure Logical Volume Manager (LVM) for flexible storage.
 Perform backups and data recovery.

4. Process and Resource Management

 Monitor CPU, RAM, and disk usage.


 Manage system processes using tools like ps, nice ,renice top, htop etc
 Optimize system performance and troubleshoot resource bottlenecks.

5. Network Configuration & Security

 Configure network interfaces (IP, DNS, DHCP).


 Set up and manage firewalls (UFW, iptables).
 Secure SSH access and manage remote connections.

6. Service and Application Management

 Install and manage software packages (apt, yum, dnf).


 Manage system services (systemctl, service).
 Ensure web servers, databases, and applications are running correctly.

Mr. Yogesh D. Pakhare, M. Sc[CS] College - GFCCT, Akluj


2
7. Security & Compliance

 Implement system hardening (Secure) techniques.


 Monitor and analyze logs for security threats (journalctl, /var/log/).
 Apply patches and updates to prevent vulnerabilities.

8. Automation & Scripting

 Write shell scripts to automate routine tasks.


 Use configuration management tools (Ansible, Puppet, Chef).
 Schedule tasks using cron or systemd timers.

9. Backup & Disaster Recovery

 Set up backup solutions (rsync, tar, cloud backups).


 Create disaster recovery plans and test them.
 Restore data in case of failures.

10. System Monitoring & Troubleshooting

 Use monitoring tools (Nagios, Zabbix, Prometheus).


 Investigate and resolve system failures.
 Provide support for application and infrastructure issues.

 Identifying administrative tasks & files:


In Linux, system administrators perform various tasks to manage the system efficiently. These tasks
often involve working with critical system files and directories.

Below is key point of administrative tasks and the associated files.

1. User & Group Management


2. File System & Storage Management
3. Process & System Resource Management
4. Network Configuration & Security
5. System Service & Daemon Management
6. Security & System Logs
7. Package Management & Updates
8. Scheduled Jobs & Automation
9. Backup & Recovery
10. System Boot & Kernel Management

 Configuration and log files:

In Linux, "configuration files" are text files that store settings and parameters for various system
components and applications, allowing administrators to customize how the system operates. Configuration
file found in the /etc directory.

Key points about configuration files:

Function: They define how services, applications, and system settings should behave.

Mr. Yogesh D. Pakhare, M. Sc[CS] College - GFCCT, Akluj


3
Examples:
/etc/passwd: User account details
/etc/shadow: User password information
/etc/fstab: File system mount options
/etc/apache2/apache2.conf: Apache web server configuration

In Linux "log files" are records of system events, activities, and errors, providing valuable
information for troubleshooting and monitoring system health; most configuration files are located in
the /etc directory, while log files are typically found in the /var/log directory.

Key points about log files:

Function: They record system events, including user actions, system errors, application warnings, and
important system status changes.

Examples:
/var/log/messages: General system messages
/var/log/auth: Authentication related logs
/var/log/secure: Security related logs
/var/log/httpd: Apache web server access logs

 Chkconfig:
A ‘chkconfig’ command is used to list all available services and view or update their run level
settings. In simple words it is used to list current startup information of services or any particular service,
update runlevel settings of service, and adding or removing service from management.

Syntax:

Chkconfig [Option] [service-name]

Common Options used with the ‘chkconfig’ command:

Option Description
--list Lists the current status of all services or a specific service.
--add name Adds a new service to the startup sequence, allowing it to be managed by chkconfig.
--del name Removes a service from the startup sequence.
--level levels Specifies the run levels to enable or disable a service.
--override name Overrides the default settings for a service without affecting its configuration file

Example 1: List current status of all system services

chkconfig --list

Mr. Yogesh D. Pakhare, M. Sc[CS] College - GFCCT, Akluj


4

Example 2: View current status of a particular services

chkconfig --list rhnsd

Example 3: Disabling a Service

chkconfig rhnsd off

Example 4: Enabling a Service

chkconfig rhnsd on

Example 5: Delete a Service

chkconfig del rhnsd

Example 6: Add a Service

chkconfig add rhnsd

 Security Enhanced Linux:


Security-Enhanced Linux (SELinux) is a security feature of the Linux kernel that provides
mandatory access control (MAC) policies to enhance system security. It was originally developed by the
U.S. National Security Agency (NSA) and later integrated into major Linux distributions like RHEL,
CentOS, Fedora, and Debian-based systems.

Key Features of SELinux:

1. Mandatory Access Control (MAC)


 SELinux enforces strict system-wide security policies.

2. Process Isolation
 SELinux restricts what processes can access, reducing the risk of privilege escalation or
malware attacks.
3. Labeling and Contexts
 Every file, process, and system resource is assigned a security context (label).

Mr. Yogesh D. Pakhare, M. Sc[CS] College - GFCCT, Akluj


5
4. SELinux Policies
 Defines access rules. Common modes:
1. Enforcing → SELinux blocks unauthorized access.
2. Permissive → SELinux only logs warnings but does not block actions.
3. Disabled → SELinux is turned off.
5. Three Types of SELinux Policies:
 Targeted Policy (default, only protects specific services)
 MLS (Multi-Level Security) Policy (strict security, used in government/military systems)
 Strict Policy (everything is protected, rarely used)

 Installing and removing packages with rpm command:


The rpm command is used to install, update, query, verify, and remove .rpm packages in
Linux. It's a package management tool used in many Linux distributions, including Red Hat, CentOS,
Fedora and openSUSE.

Syntax:

rpm [option] [package-name.rpm]

Option in rpm:

Option Description
-i Install the package
-v Verbose output
-h Shows progress as a hash (#)
-U Upgrade (installs if not installed, replaces if already installed)
-e Erase (removes the package)

Example 1: Installing Packages with rpm.

rpm -ivh httpd-2.4.6-97.el7.centos.x86_64.rpm

Example 2: Removing Packages with rpm.

rpm -e httpd

⚠ Note: Do not include the .rpm extension when removing a package.

Mr. Yogesh D. Pakhare, M. Sc[CS] College - GFCCT, Akluj

You might also like