Lecture 1
Lecture 1
Introduction
Topics
INTRODUCTION
1. What do sysadmins do?
2. Organizations
3. SAGE Classifications and Skills
4. Certifications
5. Principles and First Steps
DESKTOPS
1. Machine Lifecycle
2. Automated Installs
3. Updates
4. Network Configuration
What is a Sysadmin?
In a small org, sysadmin can be entire IT staff
◼ Phone support
4. Copy image to
5. deployment #1
server.
5. Boot clients with 1. ftp server
imaging media.
6. Clients pull image 5. deployment #2
from ftp server.
Using g4u
1. Enable ftp server (service/chkconfig)
2. Download g4u
3. Copy g4u to a floppy disk (or CD)
cat g4u-2.1-1.fs >/dev/fd0
4. Boot installed client with floppy disk.
5. Upload image to server.
uploaddisk your.ftp.server.com filename.gz
6. Boot blank client with floppy disk.
7. Install image from server.
slurpdisk your.ftp.server.com filename.gz
Disk Imaging Tools
Acronis TrueImage
Clonezilla (free)
g4u: Ghost for UNIX (free)
Symantec GHOST
System Imager (free)
Kickstart Components
Bootable media
◼ Small bootstrap kernel and filesystem.
◼ Uses DHCP server to configure system.
Source machine
◼ Network server: ftp, http, nfs.
◼ Kickstart configuration file(s).
◼ Install files (RPMs).
Target machine
◼ Machine on which you’re installing.
◼ Boot with bootable media.
Kickstart Components
http
Target Machine
Source Machine Setup
1. Start network service.
2. Copy install media--for each CD:
mount /mnt/cdrom
cp -var /mnt/cdrom/RedHat
/usr/local/ks
umount /mnt/cdrom/
3. Create config files.
Store under kickstart subdirectory.
Kickstart Configuration File
Describes desired system configuration.
Disk partition setup.
Network configuration.
Language and other configuration items.
Package selection.
Pre- and post-install scripts for customization.
Creating a Kickstart file:
Original install (located under /root)
Kickstart Configurator application
Manually
Kickstart Configurator
Configuration Options
auth
crypt, md5, nis, ldap, smb, krb5
network and firewall
DHCP, static, firewall configuration
part
Create disk partitions: size, maxsize, grow.
c.f. autopart, clearpart, log, raid.
rootpw
xconfig
packages
Performing a Kickstart Install
1. Boot with install media
RHEL CD #1
Bootable Kickstart media
2. Specify Kickstart file location
Web: ks=http://<server>/<path>
NFS: ks=http://<server>/<path>
Floppy: ks=floppy
PXE: ks
Auto-Install Tools
DrakX: Mandriva Linux
FAI, Preseed: Debian Linux
Jumpstart: Solaris
Kickstart: Red Hat Linux
Software Update Difficulties
No physical access
◼ Update process should work w/o physical access.
Host may not be in known state
◼ Prior updates may or may not have happened.
◼ Sysadmins or users may have reconfigured.
Hosts may not be there
◼ Portable computers may not be on your network
when you’re updating systems.
Host may have live users
◼ Some updates require no user access or reboots.
One, Some, Many
Failed updates break someone’s machine.
◼ Vendor hasn’t tested updates in your env.
One, some, many process mitigates risks
◼ One: Test update on one system first.
◼ Some: Test update on group of test
systems that are representative of the
target systems.
◼ Many: Schedule update for a time that
limits disruption and update user systems.
Network Configuration
What’s so bad about manual net settings?
◼ It’s only an IP address and netmask.
◼ What happens if you need to renumber?
Use DHCP instead of manual settings
◼ Make all changes on a single server.
◼ Easy to change network settings for entire
net.
◼ DHCP can assign static IPs as well as
dynamic.
Key Points
Being a Sysadmin
◼ Customer-oriented, technical knowledge, time.
◼ Basics: request system, known host state, policies.
Desktop Lifecycle
◼ New, clean, configured, unknown states.
Automated Installs
◼ Why: consistency, fast recovery, saves time.
◼ Install types: imaging vs. scripted.
◼ Components: boot, network, config, data.
One, some, many Approach to Updates.
References
1. Mark Burgess, Principles of System and Network
Administration, Wiley, 2000.
2. Aeleen Frisch, Essential System Administration, 3rd edition,
O’Reilly, 2002.
3. R. Evard. "An analysis of unix system configuration."
Proceedings of the 11th Systems Administration conference
(LISA), page 179,
http://www.usenix.org/publications/library/proceedings/lisa97/f
http://www.usenix.org/publications/library/proceedings/lisa97/full_papers/20.evard/20_html/main.html
ull_papers/20.evard/20_html/main.html, 1997
http://www.usenix.org/publications/library/proceedings/lisa97/full_papers/20.evard/20_html/main.html
descriptions.mm.
http://www.sage.org/field/jobs-descriptions.mm