Linux Server Hacks, Volume 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting
William von Hagen, Brian K. Jones
Format: PDF / Kindle (mobi) / ePub
I also have this book in EPUB and PDF as retail (no conversion).
Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are many more hacks, cool tips, and ways of solving problems than can fit in a single volume (one that mere mortals can lift, that is).
Which is why we created Linux Server Hacks, Volume Two, a second collection of incredibly useful tips and tricks for finding and using dozens of open source tools you can apply to solve your sys admin problems. The power and flexibility of Linux and Open Source means that there is an astounding amount of great software out there waiting to be applied to your sys admin problems -- if only you knew about it and had enough information to get started. Hence, Linux Server Hacks, Volume Two.
This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. No more sifting through man pages, HOWTO websites, or source code comments -- the only resource you need is right here. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network.
Compiled by experts, these hacks not only give you the step-by-step instructions necessary to implement the software, but they also provide the context to truly enable you to learn the technology. Topics include:
* Remote GUI connectivity
* Storage management
* File sharing and synchronizing resources
* Security/lockdown instruction
* Log files and monitoring
* System rescue, recovery, and repair
Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative environments, the solutions found in Linux Server Hacks, Volume Two will simplify your life as a system administrator.
Linux Server Hacks, Volume Two Table of Contents Credits About the Authors Contributors Acknowledgments Preface Why Linux Server Hacks, Volume Two? How to Use This Book How This Book Is Organized Conventions Used in This Book Using Code Examples How to Contact Us Safari® Enabled Got a Hack? 1. Linux Authentication 1.1. Hacks 1–9: Introduction Hack #1. Disable User Accounts Instantly 1.2.1. Disabling Accounts on Systems That Use Local Authentication 1.2.2. Disabling
initially belong to when you log in, known as your login group. Linux enables users to belong to multiple groups at the same time, in order to let people work on multiple projects that are protected at the group level. For the purposes of creating files, Linux users function as members of a single group at any given time, and they can change the group that is in effect via the newgrp command. However, as explained in the next section, you can also set Linux directory protections to control the
via SMB. With separate partitions they're still both coming to the same box, but at least the disk and operating system can cache reads and handle writes appropriately and separately for each type of filesystem. Getting insights into the usage patterns of your users can help you decide what type of filesystem you want to use on each of the exported filesystems [Hack #70] . I'm a big ext3 fan because so many utilities are available for correcting problems with ext2/ext3 filesystems. Regardless
in a much more user-friendly format, as shown in Figure 9-1. You can then modify the index file just as you would any HTML file to make it display any other information you wish. Figure 9-1. Network traffic graphs created from MRTG data Automating MRTG The only thing left to do is to automate the process. MRTG wouldn't be very useful if you had to start it manually every time, so we'll have to automate it by adding it to cron. Add the following entry to root's crontab to run MRTG
phones in the office all day, the desktop might not be the place for Linux to shine. On the other hand, if you have an operator on a switchboard built in the 1920s, and the lifeblood of the business is phone communication, a Linux-based Asterisk PBX solution might be useful and much appreciated! The point is, choose your battles. Even in Unix environments, there will be resistance to Linux, because some brands of Unix have been doing jobs for decades that some cowboy now wants Linux to perform.