Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Linux Systems Administrators
PREMIUM
Số trang
472
Kích thước
2.4 MB
Định dạng
PDF
Lượt xem
1937

Linux Systems Administrators

Nội dung xem thử

Mô tả chi tiết

*100072*

*100072*

COIT 13146

Systems Administration

(An Introduction to Linux Systems

Administration)

Study Guide

Systems Administration

Edition 2003

 Copyright (Study Guide) Central Queensland University, 2003

Developed by staff of the Faculty of Informatics and Comminication.

Produced and printed by the Distance and Flexible Learning Centre

Central Queensland University

Rockhampton, Queensland

Copyright material herin is reproduced under the provision of the Copyright Act 1968.

Material copied with the permission of thecopyright holder has been duely identified

DEVELOPED BY

David Jones, Kieren Jamieson, Damien Clark, Nathaniel

Fitzgerald-Hood and Anthony Ferguson

Chapter .............................................................................................................................................................................19

The Overview................................................................................................................................................................................19

Introduction...................................................................................................................................................................................19

Other Resources ............................................................................................................................................................................19

The Course ....................................................................................................................................................................................20

LAMENT OF A LINUX STUDENT .................................................................................20

THE RATIONALE........................................................................................................21

WHAT YOU WILL LEARN............................................................................................21

WHY NOT WINDOWS?...............................................................................................23

Course Material.............................................................................................................................................................................23

STUDY GUIDE ...........................................................................................................24

THE COURSE WEBSITE..............................................................................................24

Solving Problems ..........................................................................................................................................................................24

Computers in the Real World ........................................................................................................................................................24

WHAT YOU THINK COMPUTERS ARE ..........................................................................24

SOME ALTERNATIVES................................................................................................26

An Overview of Linux...................................................................................................................................................................28

BOOTING...................................................................................................................28

RUNNING ..................................................................................................................29

SHUTTING DOWN.......................................................................................................30

LAYERS.....................................................................................................................30

Conclusions...................................................................................................................................................................................32

Chapter .............................................................................................................................................................................33

The What, Why and How of Sys Admin .......................................................................................................................................33

Introduction...................................................................................................................................................................................33

What Systems Administrators do ..................................................................................................................................................33

WHY WE NEED THEM ................................................................................................34

WHAT THEY DO.........................................................................................................34

Home and the real world ...............................................................................................................................................................37

What Systems Administrators need to know .................................................................................................................................37

Why UNIX? ..................................................................................................................................................................................39

Unix past, present and future.........................................................................................................................................................40

Linux .............................................................................................................................................................................................40

The relationship between Linux and UNIX ...................................................................................................................................41

Some more sys admin theory.........................................................................................................................................................41

Daily operations ............................................................................................................................................................................42

AUTOMATE, AUTOMATE AND AUTOMATE .................................................................42

SYSTEM MONITORING ...............................................................................................42

Hardware and software..................................................................................................................................................................43

EVALUATION ............................................................................................................43

PURCHASE.................................................................................................................44

INSTALLATION ..........................................................................................................44

HARDWARE...............................................................................................................44

DOCUMENTATION .....................................................................................................45

Policy ............................................................................................................................................................................................48

PENALTIES ................................................................................................................48

TYPES OF POLICY......................................................................................................48

CREATING POLICY.....................................................................................................48

Code of ethics................................................................................................................................................................................49

SAGE-AU CODE OF ETHICS......................................................................................49

SAGE-AU CODE OF ETHICS......................................................................................49

People skills ..................................................................................................................................................................................50

COMMUNICATING WITH USERS .................................................................................50

HOW NOT TO COMMUNICATE WITH USERS.................................................................53

Conclusions...................................................................................................................................................................................53

Chapter .............................................................................................................................................................................54

Information Sources and Problem Solving ....................................................................................................................................54

Introduction...................................................................................................................................................................................54

Other resources..............................................................................................................................................................................54

Information sources.......................................................................................................................................................................54

Professional organisations .............................................................................................................................................................55

THE SAGE GROUPS ..................................................................................................55

SAGE-AU...................................................................................................................55

UNIX USER GROUPS.................................................................................................56

THE ACS, ACM AND IEEE......................................................................................56

Books and magazines ....................................................................................................................................................................56

BIBLIOGRAPHIES .......................................................................................................57

O'REILLY BOOKS.......................................................................................................57

MAGAZINES ..............................................................................................................57

Internet resources ..........................................................................................................................................................................57

THE COURSE WEBSITE ...............................................................................................57

HOW TO USE THE INTERNET ......................................................................................58

SOFTWARE ON THE INTERNET ...................................................................................58

DISCUSSION FORUMS ................................................................................................58

JUST THE FAQS ........................................................................................................59

GOOGLE....................................................................................................................60

MAILING LISTS..........................................................................................................60

OTHER DISCUSSION FORUMS .....................................................................................60

INTERNET BASED LINUX RESOURCES ........................................................................62

Problem solving.............................................................................................................................................................................63

GUIDELINES FOR SOLVING PROBLEMS .......................................................................63

EXAMPLES OF SOLVING PROBLEMS ...........................................................................64

Conclusions...................................................................................................................................................................................65

Review questions...........................................................................................................................................................................65

Chapter .............................................................................................................................................................................66

Using UNIX ..................................................................................................................................................................................66

Introduction...................................................................................................................................................................................66

Other resources..............................................................................................................................................................................66

What you need to learn..................................................................................................................................................................66

Introductory UNIX ........................................................................................................................................................................67

WHY DO I NEED TO KNOW THE COMMAND LINE? ......................................................68

HOW DO I LEARN ALL THIS STUFF? ...........................................................................68

UNIX COMMANDS ARE PROGRAMS ..........................................................................69

vi..................................................................................................................................................................................................69

AN INTRODUCTION TO VI...........................................................................................70

UNIX commands...........................................................................................................................................................................72

PHILOSOPHY OF UNIX COMMANDS ..........................................................................72

UNIX COMMAND FORMAT........................................................................................73

A COMMAND FOR EVERYTHING.................................................................................74

Online help ....................................................................................................................................................................................74

USING THE MANUAL PAGES.......................................................................................75

IS THERE A MAN PAGE FOR... .....................................................................................75

MAN PAGE FORMAT.....................................................................................................76

HTML VERSIONS OF MANUAL PAGES ......................................................................76

Some UNIX commands.................................................................................................................................................................76

IDENTIFICATION COMMANDS....................................................................................77

SIMPLE COMMANDS ..................................................................................................78

FILTERS.....................................................................................................................78

Getting more out of filters .............................................................................................................................................................83

Conclusions...................................................................................................................................................................................84

Chapter .............................................................................................................................................................................85

The File Hierarchy.........................................................................................................................................................................85

Introduction...................................................................................................................................................................................85

WHY? .......................................................................................................................85

The important sections ..................................................................................................................................................................86

THE ROOT OF THE PROBLEM......................................................................................86

Homes for users.............................................................................................................................................................................87

EVERY USER NEEDS A HOME... ..................................................................................87

OTHER HOMES?.........................................................................................................87

/usr and /var...........................................................................................................................................................88

AND THE DIFFERENCE IS............................................................................................88

/USR/LOCAL..............................................................................................................89

LIB, INCLUDE AND SRC ..............................................................................................89

/VAR/SPOOL..............................................................................................................90

X-WINDOWS.............................................................................................................90

Bins ...............................................................................................................................................................................................91

WHICH BIN? ..............................................................................................................91

/BIN...........................................................................................................................91

/SBIN .........................................................................................................................91

/USR/BIN....................................................................................................................93

/USR/LOCAL/BIN..........................................................................................................93

Configuration files, logs and other bits!.........................................................................................................................................93

ETC ETC ETC. .............................................................................................................93

LOGS.........................................................................................................................94

/PROC........................................................................................................................94

/DEV .........................................................................................................................94

Conclusion.....................................................................................................................................................................................94

FUTURE STANDARDS .................................................................................................94

Review questions...........................................................................................................................................................................95

Chapter .............................................................................................................................................................................96

Processes and Files........................................................................................................................................................................96

Introduction...................................................................................................................................................................................96

Other resources..............................................................................................................................................................................96

Multiple users................................................................................................................................................................................96

IDENTIFYING USERS ..................................................................................................97

USERS AND GROUPS ..................................................................................................97

NAMES AND NUMBERS ..............................................................................................97

ID ..............................................................................................................................98

Commands and processes..............................................................................................................................................................98

WHERE ARE THE COMMANDS? ..................................................................................98

WHICH ........................................................................................................................98

WHY CAN'T I RUN MY SHELL SCRIPT? .......................................................................99

WHEN IS A COMMAND NOT A COMMAND? .................................................................99

WHY SHELL COMMANDS ARE FASTER THAN OTHER COMMANDS .............................100

Controlling processes .................................................................................................................................................................. 100

VIEWING EXISTING PROCESSES ...............................................................................101

JOB CONTROL..........................................................................................................105

MANIPULATING PROCESSES ....................................................................................106

Process attributes......................................................................................................................................................................... 109

PARENT PROCESSES.................................................................................................109

PROCESS UID AND GID..........................................................................................109

REAL UID AND GID ...............................................................................................109

EFFECTIVE UID AND GID.......................................................................................109

Files............................................................................................................................................................................................. 110

FILE TYPES ..............................................................................................................111

TYPES OF NORMAL FILES.........................................................................................111

FILE ATTRIBUTES ....................................................................................................112

VIEWING FILE ATTRIBUTES .....................................................................................113

File protection ............................................................................................................................................................................. 114

FILE OPERATIONS....................................................................................................114

USERS, GROUPS AND OTHERS..................................................................................115

THREE SETS OF FILE PERMISSIONS ...........................................................................116

SPECIAL PERMISSIONS.............................................................................................116

Effective UID and GID ............................................................................................................................................................... 117

SETUID AND SETGID ................................................................................................118

Numeric permissions................................................................................................................................................................... 118

SYMBOLIC TO NUMERIC ..........................................................................................119

Changing file permissions ........................................................................................................................................................... 120

CHMOD ......................................................................................................................120

CHOWN ......................................................................................................................121

CHGRP ......................................................................................................................121

CHOWN AND CHGRP ....................................................................................................121

DEFAULT PERMISSIONS ...........................................................................................122

File permissions and directories .................................................................................................................................................. 124

FOR EXAMPLE .........................................................................................................124

WHAT HAPPENS IF? .................................................................................................124

Links ........................................................................................................................................................................................... 125

CREATING LINKS.....................................................................................................125

HARD AND SOFT LINKS, THE DIFFERENCES..............................................................127

Searching the file hierarchy......................................................................................................................................................... 128

THE FIND COMMAND...............................................................................................128

Performing commands on many files .......................................................................................................................................... 133

FIND AND -EXEC.....................................................................................................134

FIND AND BACK QUOTES.........................................................................................134

FIND AND XARGS .....................................................................................................135

Conclusion................................................................................................................................................................................... 135

Review questions......................................................................................................................................................................... 136

Chapter ........................................................................................................................................................................... 138

The Shell ..................................................................................................................................................................................... 138

Introduction................................................................................................................................................................................. 138

Executing commands................................................................................................................................................................... 138

DIFFERENT SHELLS .................................................................................................139

STARTING A SHELL..................................................................................................139

Parsing the command line............................................................................................................................................................ 140

The command line....................................................................................................................................................................... 141

ARGUMENTS ...........................................................................................................141

ONE COMMAND TO A LINE.......................................................................................142

COMMANDS IN THE BACKGROUND ..........................................................................142

Filename substitution................................................................................................................................................................... 143

Removing special meaning.......................................................................................................................................................... 144

Input/output redirection ............................................................................................................................................................... 146

HOW IT WORKS .......................................................................................................146

FILE DESCRIPTORS ..................................................................................................146

STANDARD FILE DESCRIPTORS ................................................................................147

CHANGING DIRECTION ............................................................................................147

USING STANDARD I/O .............................................................................................148

FILTERS...................................................................................................................148

I/O REDIRECTION EXAMPLES...................................................................................149

REDIRECTING STANDARD ERROR ............................................................................149

EVALUATING FROM LEFT TO RIGHT.........................................................................150

Everything is a file ...................................................................................................................................................................... 151

TTY...........................................................................................................................151

DEVICE FILES ..........................................................................................................151

REDIRECTING I/O TO DEVICE FILES.........................................................................152

Shell variables ............................................................................................................................................................................. 153

ENVIRONMENT CONTROL ........................................................................................153

THE SET COMMAND..................................................................................................153

Using shell variables.................................................................................................................................................................... 153

ASSIGNING A VALUE ...............................................................................................153

UNINITIALISED VARIABLES .....................................................................................154

RESETTING A VARIABLE..........................................................................................154

THE READONLY COMMAND..........................................................................................154

THE UNSET COMMAND ..............................................................................................154

ARITHMETIC ...........................................................................................................155

THE EXPR COMMAND ................................................................................................155

ALTERNATIVES TO EXPR FOR ARITHMETIC ..............................................................156

Valid variable names ................................................................................................................................................................... 156

{}...........................................................................................................................156

Environment control.................................................................................................................................................................... 156

PS1 AND PS2 ...........................................................................................................157

BASH EXTENSIONS.....................................................................................................157

Variables and sub-shells .............................................................................................................................................................. 158

FOR EXAMPLE .........................................................................................................158

EXPORT......................................................................................................................158

LOCAL VARIABLES..................................................................................................158

Advanced variable substitution.................................................................................................................................................... 159

Brace expansion .......................................................................................................................................................................... 159

Evaluation order .......................................................................................................................................................................... 161

WHY ORDER IS IMPORTANT.....................................................................................161

THE ORDER .............................................................................................................162

The eval command ........................................................................................................................................................... 162

DOING IT TWICE ......................................................................................................162

Conclusion................................................................................................................................................................................... 163

Review questions......................................................................................................................................................................... 163

Chapter ........................................................................................................................................................................... 165

Text Manipulation ....................................................................................................................................................................... 165

Introduction................................................................................................................................................................................. 165

Other resources............................................................................................................................................................................ 165

Regular expressions..................................................................................................................................................................... 165

RES VERSUS FILENAME SUBSTITUTION AND BRACE EXPANSION..............................166

HOW THEY WORK....................................................................................................168

Repetition, repetitionÖ rep-i-titionÖ ......................................................................................................................................... 168

Concatenation and Alternation .................................................................................................................................................... 170

Different commands, different REs............................................................................................................................................. 170

Tagging ....................................................................................................................................................................................... 170

FOR EXAMPLE .........................................................................................................171

ex, ed, sed and vi .............................................................................................................................................................. 171

SO???......................................................................................................................172

WHY USE ED?...........................................................................................................172

ED COMMANDS ........................................................................................................172

FOR EXAMPLE .........................................................................................................174

THE SED COMMAND..................................................................................................175

SED COMMAND FORMAT ...........................................................................................175

Understanding complex commands............................................................................................................................................. 176

Conclusions................................................................................................................................................................................. 177

Review questions......................................................................................................................................................................... 177

Chapter ........................................................................................................................................................................... 178

Shell Programming...................................................................................................................................................................... 178

Introduction................................................................................................................................................................................. 178

SHELL PROGRAMMING - WHY?..............................................................................178

SHELL PROGRAMMING - WHAT? ...........................................................................178

SHELL PROGRAMMING - HOW?..............................................................................179

The basics.................................................................................................................................................................................... 179

A BASIC PROGRAM..................................................................................................179

AN EXPLANATION OF THE PROGRAM .......................................................................180

All you ever wanted to know about variables.............................................................................................................................. 182

WHY? .....................................................................................................................182

PREDEFINED VARIABLES .........................................................................................183

PARAMETERS - SPECIAL SHELL VARIABLES .............................................................184

ONLY NINE PARAMETERS? ......................................................................................185

THE DIFFERENCE BETWEEN $* AND $@ ..................................................................186

The basics of Input/Output (I/O) ................................................................................................................................................. 187

And now for the hard bits............................................................................................................................................................ 189

SCENARIO ...............................................................................................................189

IF ... THEN ... MAYBE? .............................................................................................190

TESTING TESTING....................................................................................................191

EXPRESSIONS, EXPRESSIONS!..................................................................................192

ALL ABOUT CASE.....................................................................................................194

LOOPS AND REPEATED ACTION COMMANDS ............................................................194

WHILE ......................................................................................................................195

FOR..........................................................................................................................195

MODIFYING SCANIT ................................................................................................196

PROBLEMS WITH RUNNING SCANIT..........................................................................196

SO WHAT IS HAPPENING ..........................................................................................198

Speed and shell scripts................................................................................................................................................................. 200

WHAT'S THE MISTAKE.............................................................................................200

SOLUTION IN C........................................................................................................200

SHELL SOLUTION WRITTEN BY C PROGRAMMER .....................................................201

SHELL SOLUTION BY SHELL PROGRAMMER .............................................................201

COMPARING THE SOLUTIONS...................................................................................201

THE PROBLEM .........................................................................................................202

A SOLUTION FOR SCANIT?.......................................................................................202

NUMBER OF PROCESSES ..........................................................................................202

until......................................................................................................................................................................................... 203

BREAK AND CONTINUE ..............................................................................................203

REDIRECTION..........................................................................................................204

Now for the really hard bits......................................................................................................................................................... 205

FUNCTIONAL FUNCTIONS ........................................................................................205

LOCAL ......................................................................................................................206

THE RETURN TRIP .....................................................................................................206

Difficult and not compulsory....................................................................................................................................................... 207

RECURSION: (SEE "RECURSION") ............................................................................207

WAIT'ING AND TRAP'ING ...........................................................................................208

Bugs and Debugging ................................................................................................................................................................... 212

METHOD 1 - SET .....................................................................................................212

METHOD 2 ñ ECHO...................................................................................................212

SOME EXAMPLES OF SOME VERY COMMON MISTAKES ..........................................212

And now for the really, really hard bits ....................................................................................................................................... 213

WRITING GOOD SHELL PROGRAMS ..........................................................................213

EVAL THE WONDERFUL!...........................................................................................214

Step-by-step................................................................................................................................................................................. 217

THE PROBLEM .........................................................................................................217

SOLVING THE PROBLEM ..........................................................................................218

THE FINAL PROGRAM - A LISTING............................................................................226

Conclusions................................................................................................................................................................................. 229

Review questions......................................................................................................................................................................... 229

References................................................................................................................................................................................... 230

Chapter ............................................................................................................................................................... 231

Users ........................................................................................................................................................................................... 231

Introduction................................................................................................................................................................................. 231

Other resources............................................................................................................................................................................ 231

What is a UNIX account?............................................................................................................................................................ 231

LOGIN NAMES .........................................................................................................232

PASSWORDS ............................................................................................................233

THE UID.................................................................................................................233

HOME DIRECTORIES ................................................................................................234

LOGIN SHELL...........................................................................................................234

DOT FILES ...............................................................................................................234

SKELETON DIRECTORIES .........................................................................................236

THE MAIL FILE ........................................................................................................236

MAIL ALIASES.........................................................................................................236

Account configuration files ......................................................................................................................................................... 238

Everyone can read /etc/passwd ............................................................................................................................................ 239

THIS IS A PROBLEM..................................................................................................239

PASSWORD MATCHING ............................................................................................239

THE SOLUTION ........................................................................................................239

SHADOW FILE FORMAT............................................................................................240

Groups......................................................................................................................................................................................... 240

SHADOW PASSWORDS FOR GROUPS ........................................................................240

LIMITING USERS ACCESS BY GROUPS.......................................................................241

THE DEFAULT GROUP ..............................................................................................241

OTHER GROUPS .......................................................................................................241

USER PRIVATE GROUPS ...........................................................................................241

Special accounts .......................................................................................................................................................................... 242

RESTRICTED ACTIONS .............................................................................................242

BE CAREFUL............................................................................................................242

The mechanics............................................................................................................................................................................. 243

OTHER CONSIDERATIONS ........................................................................................243

PRE-REQUISITE INFORMATION ................................................................................243

ADDING AN /ETC/PASSWD ENTRY ...........................................................................244

THE INITIAL PASSWORD ..........................................................................................244

/ETC/GROUP ENTRY ................................................................................................244

THE HOME DIRECTORY............................................................................................245

THE STARTUP FILES.................................................................................................245

ONE COMMAND TO RULE THEM ALL........................................................................245

SETTING UP MAIL ....................................................................................................246

TESTING AN ACCOUNT ............................................................................................247

INFORM THE USER ...................................................................................................248

Removing an account .................................................................................................................................................................. 249

DISABLING AN ACCOUNT ........................................................................................249

The Goals of Account Creation ................................................................................................................................................... 250

Making it simple.......................................................................................................................................................................... 250

USERADD ..................................................................................................................250

USERDEL AND USERMOD ............................................................................................250

GRAPHICAL TOOLS..................................................................................................250

Automation.................................................................................................................................................................................. 251

GATHERING THE INFORMATION...............................................................................251

POLICY....................................................................................................................251

CREATING THE ACCOUNTS ......................................................................................251

ADDITIONAL STEPS .................................................................................................252

CHANGING PASSWORDS WITHOUT INTERACTION.....................................................252

Delegation ................................................................................................................................................................................... 252

Allocating root privilege.............................................................................................................................................................. 252

SUDO ADVANTAGES ................................................................................................254

Conclusions................................................................................................................................................................................. 255

Review questions......................................................................................................................................................................... 255

References................................................................................................................................................................................... 256

Chapter ............................................................................................................................................................... 257

Managing File Systems ............................................................................................................................................................... 257

Introduction................................................................................................................................................................................. 257

WHAT? ...................................................................................................................257

WHY? .....................................................................................................................257

Other resources............................................................................................................................................................................ 258

A scenario.................................................................................................................................................................................... 258

Devices - Gateways to the kernel ................................................................................................................................................ 258

A DEVICE IS... .........................................................................................................258

DEVICE FILES ARE...................................................................................................259

DEVICE DRIVERS ARE..............................................................................................259

/DEV .......................................................................................................................259

PHYSICAL CHARACTERISTICS OF DEVICE FILES .......................................................260

MAJOR AND MINOR DEVICE NUMBERS ARE... ..........................................................261

FINDING THE DEVICES ON YOUR SYSTEM.................................................................261

WHY USE DEVICE FILES? .........................................................................................263

CREATING DEVICE FILES .........................................................................................264

THE USE AND ABUSE OF DEVICE FILES.....................................................................265

Devices, Partitions and File systems............................................................................................................................................ 266

DEVICE FILES AND PARTITIONS ...............................................................................266

PARTITIONS AND FILE SYSTEMS ..............................................................................267

PARTITIONS AND BLOCKS .......................................................................................268

USING THE PARTITIONS ...........................................................................................268

THE VIRTUAL FILE SYSTEM....................................................................................269

DIVIDING UP THE FILE HIERARCHY - WHY? .............................................................269

SCENARIO UPDATE .................................................................................................271

The Linux Native File System - ext3 ........................................................................................................................................ 272

OVERVIEW ..............................................................................................................272

I-NODES..................................................................................................................273

PHYSICAL STRUCTURE AND FEATURES ...................................................................274

Journaling.................................................................................................................................................................................... 275

ADVANTAGES OF JOURNALING................................................................................275

TYPES OF JOURNALING............................................................................................276

HOW DOES JOURNALING WORK? .............................................................................276

Creating file systems ................................................................................................................................................................... 278

MKFS........................................................................................................................278

SCENARIO UPDATE .................................................................................................279

LOGICAL VOLUME MANAGEMENT..........................................................................280

Mounting & UN-mounting Partitions & Devices ........................................................................................................................ 281

MOUNT ......................................................................................................................281

UMOUNT ....................................................................................................................282

MOUNTING WITH THE /ETC/FSTAB FILE .................................................................283

SCENARIO UPDATE .................................................................................................284

File Operations ............................................................................................................................................................................ 285

CREATING A FILE ....................................................................................................285

LINKING FILES.........................................................................................................285

LN............................................................................................................................286

Checking the file system.............................................................................................................................................................. 287

WHY ME? ...............................................................................................................287

WHAT TO DO...........................................................................................................288

FSCK........................................................................................................................288

USING FSCK.............................................................................................................288

WHAT CAUSED THE PROBLEM? ...............................................................................289

Conclusions................................................................................................................................................................................. 289

Review questions......................................................................................................................................................................... 289

References................................................................................................................................................................................... 291

Chapter ............................................................................................................................................................... 292

Backups....................................................................................................................................................................................... 292

Introduction................................................................................................................................................................................. 292

Other resources............................................................................................................................................................................ 292

Backups aren't enough................................................................................................................................................................. 293

Characteristics of a good backup strategy.................................................................................................................................... 293

EASE OF USE ...........................................................................................................293

TIME EFFICIENCY ....................................................................................................293

EASE OF RESTORING FILES ......................................................................................294

ABILITY TO VERIFY BACKUPS..................................................................................294

TOLERANCE OF FAULTY MEDIA...............................................................................294

PORTABILITY TO A RANGE OF PLATFORMS ..............................................................295

Considerations for a backup strategy........................................................................................................................................... 295

The components of backups ........................................................................................................................................................ 295

SCHEDULER ............................................................................................................296

TRANSPORT.............................................................................................................296

MEDIA ....................................................................................................................298

Commands................................................................................................................................................................................... 298

DUMP AND RESTORE ..................................................................................................299

DUMP ON LINUX .......................................................................................................299

THE RESTORE COMMAND .........................................................................................300

Using dump and restore without a tape ................................................................................................................................. 301

OUR PRACTICE FILE SYSTEM ...................................................................................301

DOING A LEVEL 0 DUMP..........................................................................................301

RESTORING THE BACKUP.........................................................................................302

ALTERNATIVE.........................................................................................................302

THE TAR COMMAND.................................................................................................303

THE DD COMMAND...................................................................................................304

THE MT COMMAND...................................................................................................305

Compression programs................................................................................................................................................................ 306

COMPRESS ................................................................................................................307

GZIP........................................................................................................................307

Conclusions................................................................................................................................................................................. 307

Review questions......................................................................................................................................................................... 308

Chapter ............................................................................................................................................................... 309

Startup and Shutdown.................................................................................................................................................................. 309

Introduction................................................................................................................................................................................. 309

Other resources............................................................................................................................................................................ 309

A booting overview ..................................................................................................................................................................... 309

Finding the kernel........................................................................................................................................................................ 310

ROM ......................................................................................................................310

THE BOOTSTRAP PROGRAM .....................................................................................310

Booting on a PC .......................................................................................................................................................................... 311

ON THE FLOPPY.......................................................................................................311

MAKING A BOOT DISK .............................................................................................311

USING A BOOT LOADER ...........................................................................................312

Starting the kernel ....................................................................................................................................................................... 313

KERNEL BOOT MESSAGES........................................................................................313

Starting the processes .................................................................................................................................................................. 315

RUN LEVELS............................................................................................................316

/ETC/INITTAB........................................................................................................316

System configuration................................................................................................................................................................... 319

Terminal logins ........................................................................................................................................................................... 320

Startup scripts.............................................................................................................................................................................. 320

THE LINUX PROCESS ...............................................................................................321

/etc/rc.d/init.d .....................................................................................322

Why won't it boot? ...................................................................................................................................................................... 322

SOLUTIONS .............................................................................................................323

MAKING A BOOT DISK .............................................................................................323

USING RESCUE MODE ON THE CD-ROM .................................................................324

USING THE ALTERNATIVE BOOT ..............................................................................325

DISASTER RECOVERY SOLUTIONS............................................................................326

Solutions to hardware problems .................................................................................................................................................. 327

DAMAGED FILE SYSTEMS ........................................................................................327

IMPROPERLY CONFIGURED KERNELS .......................................................................327

Shutting down ............................................................................................................................................................................. 328

REASONS FOR SHUTTING DOWN ..............................................................................328

BEING NICE TO THE USERS.......................................................................................329

Commands to shutdown........................................................................................................................................................... 329

SHUTDOWN ..................................................................................................................330

WHAT HAPPENS ......................................................................................................330

THE OTHER COMMANDS ..........................................................................................331

Conclusions................................................................................................................................................................................. 331

Review questions......................................................................................................................................................................... 331

References................................................................................................................................................................................... 332

Chapter ............................................................................................................................................................... 333

Kernel.......................................................................................................................................................................................... 333

The heart that keeps the system pumping .................................................................................................................................... 333

Other resources............................................................................................................................................................................ 333

Why the kernel? .......................................................................................................................................................................... 334

How? ........................................................................................................................................................................................... 335

The lifeless image........................................................................................................................................................................ 335

Inside the great unknown, the kernel ........................................................................................................................................... 336

Documentation ............................................................................................................................................................................ 339

The first incision.......................................................................................................................................................................... 339

MAKING THE HEART BEAT... ...................................................................................339

The proc file system.................................................................................................................................................................. 340

Really, why bother?..................................................................................................................................................................... 342

COMPILING THE SOURCE .........................................................................................343

STANDARD UNIX COMPILATION .....................................................................................343

DEPENDENCIES .......................................................................................................348

COMPILATION .........................................................................................................348

CONFIGURING THE BOOT LOADER ...........................................................................349

Kernel Modules ........................................................................................................................................................................... 350

KERNEL MODULE UTILITIES ...................................................................................351

KMOD: THE KERNEL MODULE LOADER......................................................................353

Installing pre-compiled kernels using RPM................................................................................................................................. 353

APPLYING PATCHES ................................................................................................354

THATíS ALL GREAT, BUT HOW LONG IS IT GOING TO TAKE? ....................................355

COMMON PROBLEMS...............................................................................................356

Conclusions................................................................................................................................................................................. 357

Review questions......................................................................................................................................................................... 357

References................................................................................................................................................................................... 358

Chapter ............................................................................................................................................................... 359

Automation and Observation....................................................................................................................................................... 359

Introduction................................................................................................................................................................................. 359

Other resources............................................................................................................................................................................ 359

Automation and cron................................................................................................................................................................. 359

COMPONENTS OF CRON .............................................................................................360

CRONTAB FORMAT ......................................................................................................360

CREATING CRONTAB FILES..........................................................................................361

Current Observation .................................................................................................................................................................... 362

DF ............................................................................................................................362

DU ............................................................................................................................362

SYSTEM STATUS .....................................................................................................363

THE NICE VALUE.....................................................................................................365

Tải ngay đi em, còn do dự, trời tối mất!