Professional Documents
Culture Documents
CHAPTER1 Reviewer - Introduction To System Administration - Sir Ryan
CHAPTER1 Reviewer - Introduction To System Administration - Sir Ryan
ORGANIZATIONAL POLICIES
▪ The sysadmin has to think carefully about TROUBLESHOOTING AND MANAGING ISSUES
computer security and whether or not to ▪ When you're managing an entire IT
allow access to certain users infrastructure, you'll constantly have to
IT INFRASTRUCTURE SERVICES troubleshoot problems and find solutions for
▪ The services that are potentially used in an your IT needs. This will probably take up
organization like file storage, email, web most of your time as an IT support specialist.
content. IN CASE OF FIRE, BREAK GLASS
ROUTINE MAINTENANCE ▪ It's super important to make sure that your
▪ when managing machines for a company, company's data is routinely backed up
you don't just set it and forget it, you have to somewhere. Preferably, far away from its
constantly provide updates and current location. Being responsible for
maintenance so that they run the latest keeping data available isn't easy.
secure software.
ADDITIONAL ROLES
VENDORS
▪ Sysadmins must be sure to weigh their Create and manage user accounts
option before purchasing anything. They Configuring and maintaining hardware and
need to think about hardware supply. software
Working with vendors or other businesses to Providing end-user support
buy hardware is a common practice. Perform backup and restore operations
▪ determine backup strategy and policies
▪ configure backup software
▪ perform backups RECORDING YOUR ACTIONS
▪ monitor backup logs ▪ A common practice for system
▪ check backup integrity administrators that work with bug queues or
▪ determine disaster survival plans ticketing systems is to include the
▪ perform restores commands executed and the output
Maintain documentation and licenses obtained in the corresponding bug or
System planning ▪ ticket.
▪ Scaling the system ▪ However, there are situations where you
▪ Assessing new technologies don’t yet know which commands exactly
▪ Anticipate and avoid problems you’ll need to execute because there’s some
Security Management investigation that needs to happen. In cases
Monitor system usage and performance and like that, it can be helpful to use a command
managing resources (disk, memory, CPU) like script for Linux or Start- Transcript for
Troubleshoot and repair system problems; and Windows.
determine, locate, and repair/replace problem NEVER TEST IN PRODUCTION
components ▪ The key to safely making these changes is to
Perform upgrades/patches, and test devices and always run them through a test environment
schedule downtime to manage devices. first.
▪ The test environment is usually a virtual
machine running the same configuration as
SYSTEM ADMINISTRATOR CHALLENGES a production environment, but isn't actually
serving any users of the service. This way, if
▪ Poor quality control in software or procedures. there's a problem when deploying the
▪ Problems in operating systems and their change, you'll be able to fix it without the
subsystems. user seeing it.
▪ Unfortunate clashes between incompatible ▪ Always use a test instance first and only
software deploy the change to production after
▪ Inexplicable phenomena, cosmic rays, viruses verifying that it works.
and other attacks ASSESSING THE RISK
APPLYING CHANGES ▪ We can assess the risk involved by
considering how important the services to
WITH GREAT POWER COMES GREAT the infrastructure and how many users
RESPONSIBILITY would be impacted if the service went down.
▪ The most important thing is to avoid using ▪ You can also use these criteria to establish
administrator rights for tasks that don't priorities for fixing a problem.
require them. FIXING THINGS THE RIGHT WAY
▪ Respect the privacy of others. Being an ▪ The problem could be in a user's computer,
administrator of an email server doesn't a server in your own infrastructure, a piece
mean you should read someone else's email. of code running in the cloud or somewhere
▪ You shouldn't use your administrator rights in between.
to bypass any rules. ▪ When looking for a reproduction case, there
▪ Mistakes like deleting the wrong set of files, are three questions you'll need to answer.
rebooting the wrong machine, or breaking • What steps did you take to get to this
the connection that you're using to manage point?
a remote machine can all happen if you're • What's the unexpected or bad result?
not careful. • And what's the expected result?
▪ Reverting to the previous state is called a ▪ Make sure you document all your steps and
rollback. any findings. Having this documentation may
prove invaluable if you ever have to deal ▪Monitoring systems help monitor energy
with similar issues again. consumption, temperature, and relative
humidity.
COOLING SYSTEM
DATA CENTER ▪ Data center cooling technology is to
maintain environmental conditions suitable
a facility that centralizes an organization’s IT for equipment operation.
operations and equipment, as well as where it ▪ In a data center, computing equipment
stores, manages, and disseminates its data. usually emit a considerable amount of heat.
7 KEY COMPONENTS OF A DATA CENTER ▪ In this case, cooling systems help prevent
overheating. Cooling systems can use water,
SERVERS AND RACKS glycol, and chilled air to cool the room.
▪ Server is a computer or system that provides POLICIES & PROCEDURES
resources, data, services, or programs to ▪ data center operators are guided by a set of
other computers known as clients over a policies and procedures. That helps maintain
network. efficiency within the facility.
▪ The rack contains multiple mounting slots ▪ data center are kept secure, the policies
called bays, each designed to hold a apply to all personnel requiring access.
hardware unit secured in place with screws. ▪ Personnel who access the data center must
POWER SUPPLY have proper authorization
▪ Power is needed to keep all equipment up
and running.
▪ Data centers usually have redundant HANDLING HARDWARE
electricity and often a backup generator to
provide reliable power in case of power ▪ Read instructions
outage. ▪ Identify or use correct connectors/cables.
▪ An uninterruptible power supply (UPS) o Many manufacturers use cables which look
ensures that the quality remains constant similar, superficially, but which actually are
even after a power outage different.
NETWORK CONNECTIVITY ▪ Use safety gears
▪ Computers and systems are connected to o Before touching any computer components,
the internet connection to enable the access make sure that you wear safety shoes and
of IT solutions. gloves.
▪ Data is distributed to and from the server by ▪ Use correct memory modules and disk.
a system of network switches.
▪ Depending on the density, a data center can
have one or more switches per rack.
SECURITY SYSTEM
▪ Data center security refers to the physical
practices and virtual technologies used to
protect a data center from external threats
and attacks.
▪ Data centers usually have a range of security
devices to limit access to the virtual
environment and physical building
MONITORING SYSTEM
▪ Data centers usually have several monitoring
systems to help operators manage the
working environment.