Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

CHAPTER I: INTRODUCTION TO SYSTEM  USER AND HARDWARE PROVISIONING

ADMINISTRATION ▪ Sysadmins have to be able to create new


users and give them access to their
company's resources.
WHAT IS SYSTEM ADMINISTRATION? ▪ They also have to remove users from an IT
infrastructure if users leave the company. It's
 Refers to the management of one or more not just user accounts they have to worry
hardware and software systems ensuring that about, sys admins are also responsible for
the systems are running efficiently and user machines.
effectively.
 Branch of engineering that concerns the FOUR MAIN STAGES OF HARDWARE LIFECYCLE
operational management of human-computer ▪ PROCUREMENT
systems. o This is the stage where hardware is
 The task is performed by a system administrator purchased or re-used for any employee.
SYSTEM ADMINISTRATOR MUST BE... ▪ DEPLOYMENT
o This is where hardware is set up so that
▪ Able to know how to communicate with the employee can do their job.
technical and non-technical users. ▪ MAINTENANCE
▪ Patient at all times and knows how to handle o This is the stage where software is
pressure and has a customer service attitude. updated and hardware issues are fixed if
▪ Able to solve difficult technical problems. and when they occur.
▪ Know how to document activities in order to ▪ RETIREMENT
reproduce the results. o In this final stage, hardware becomes
▪ know the risks of being a system administrator or unusable or no longer needed and it
sysadmin needs to be properly removed from the
fleet.
SYSTEM ADMIN TASKS

 ORGANIZATIONAL POLICIES
▪ The sysadmin has to think carefully about  TROUBLESHOOTING AND MANAGING ISSUES
computer security and whether or not to ▪ When you're managing an entire IT
allow access to certain users infrastructure, you'll constantly have to
 IT INFRASTRUCTURE SERVICES troubleshoot problems and find solutions for
▪ The services that are potentially used in an your IT needs. This will probably take up
organization like file storage, email, web most of your time as an IT support specialist.
content.  IN CASE OF FIRE, BREAK GLASS
 ROUTINE MAINTENANCE ▪ It's super important to make sure that your
▪ when managing machines for a company, company's data is routinely backed up
you don't just set it and forget it, you have to somewhere. Preferably, far away from its
constantly provide updates and current location. Being responsible for
maintenance so that they run the latest keeping data available isn't easy.
secure software.
ADDITIONAL ROLES
 VENDORS
▪ Sysadmins must be sure to weigh their  Create and manage user accounts
option before purchasing anything. They  Configuring and maintaining hardware and
need to think about hardware supply. software
Working with vendors or other businesses to  Providing end-user support
buy hardware is a common practice.  Perform backup and restore operations
▪ determine backup strategy and policies
▪ configure backup software
▪ perform backups  RECORDING YOUR ACTIONS
▪ monitor backup logs ▪ A common practice for system
▪ check backup integrity administrators that work with bug queues or
▪ determine disaster survival plans ticketing systems is to include the
▪ perform restores commands executed and the output
 Maintain documentation and licenses obtained in the corresponding bug or
 System planning ▪ ticket.
▪ Scaling the system ▪ However, there are situations where you
▪ Assessing new technologies don’t yet know which commands exactly
▪ Anticipate and avoid problems you’ll need to execute because there’s some
 Security Management investigation that needs to happen. In cases
 Monitor system usage and performance and like that, it can be helpful to use a command
managing resources (disk, memory, CPU) like script for Linux or Start- Transcript for
 Troubleshoot and repair system problems; and Windows.
determine, locate, and repair/replace problem  NEVER TEST IN PRODUCTION
components ▪ The key to safely making these changes is to
 Perform upgrades/patches, and test devices and always run them through a test environment
schedule downtime to manage devices. first.
▪ The test environment is usually a virtual
machine running the same configuration as
SYSTEM ADMINISTRATOR CHALLENGES a production environment, but isn't actually
serving any users of the service. This way, if
▪ Poor quality control in software or procedures. there's a problem when deploying the
▪ Problems in operating systems and their change, you'll be able to fix it without the
subsystems. user seeing it.
▪ Unfortunate clashes between incompatible ▪ Always use a test instance first and only
software deploy the change to production after
▪ Inexplicable phenomena, cosmic rays, viruses verifying that it works.
and other attacks  ASSESSING THE RISK
APPLYING CHANGES ▪ We can assess the risk involved by
considering how important the services to
 WITH GREAT POWER COMES GREAT the infrastructure and how many users
RESPONSIBILITY would be impacted if the service went down.
▪ The most important thing is to avoid using ▪ You can also use these criteria to establish
administrator rights for tasks that don't priorities for fixing a problem.
require them.  FIXING THINGS THE RIGHT WAY
▪ Respect the privacy of others. Being an ▪ The problem could be in a user's computer,
administrator of an email server doesn't a server in your own infrastructure, a piece
mean you should read someone else's email. of code running in the cloud or somewhere
▪ You shouldn't use your administrator rights in between.
to bypass any rules. ▪ When looking for a reproduction case, there
▪ Mistakes like deleting the wrong set of files, are three questions you'll need to answer.
rebooting the wrong machine, or breaking • What steps did you take to get to this
the connection that you're using to manage point?
a remote machine can all happen if you're • What's the unexpected or bad result?
not careful. • And what's the expected result?
▪ Reverting to the previous state is called a ▪ Make sure you document all your steps and
rollback. any findings. Having this documentation may
prove invaluable if you ever have to deal ▪Monitoring systems help monitor energy
with similar issues again. consumption, temperature, and relative
humidity.
 COOLING SYSTEM
DATA CENTER ▪ Data center cooling technology is to
maintain environmental conditions suitable
 a facility that centralizes an organization’s IT for equipment operation.
operations and equipment, as well as where it ▪ In a data center, computing equipment
stores, manages, and disseminates its data. usually emit a considerable amount of heat.
7 KEY COMPONENTS OF A DATA CENTER ▪ In this case, cooling systems help prevent
overheating. Cooling systems can use water,
 SERVERS AND RACKS glycol, and chilled air to cool the room.
▪ Server is a computer or system that provides  POLICIES & PROCEDURES
resources, data, services, or programs to ▪ data center operators are guided by a set of
other computers known as clients over a policies and procedures. That helps maintain
network. efficiency within the facility.
▪ The rack contains multiple mounting slots ▪ data center are kept secure, the policies
called bays, each designed to hold a apply to all personnel requiring access.
hardware unit secured in place with screws. ▪ Personnel who access the data center must
 POWER SUPPLY have proper authorization
▪ Power is needed to keep all equipment up
and running.
▪ Data centers usually have redundant HANDLING HARDWARE
electricity and often a backup generator to
provide reliable power in case of power ▪ Read instructions
outage. ▪ Identify or use correct connectors/cables.
▪ An uninterruptible power supply (UPS) o Many manufacturers use cables which look
ensures that the quality remains constant similar, superficially, but which actually are
even after a power outage different.
 NETWORK CONNECTIVITY ▪ Use safety gears
▪ Computers and systems are connected to o Before touching any computer components,
the internet connection to enable the access make sure that you wear safety shoes and
of IT solutions. gloves.
▪ Data is distributed to and from the server by ▪ Use correct memory modules and disk.
a system of network switches.
▪ Depending on the density, a data center can
have one or more switches per rack.
 SECURITY SYSTEM
▪ Data center security refers to the physical
practices and virtual technologies used to
protect a data center from external threats
and attacks.
▪ Data centers usually have a range of security
devices to limit access to the virtual
environment and physical building
 MONITORING SYSTEM
▪ Data centers usually have several monitoring
systems to help operators manage the
working environment.

You might also like