Professional Documents
Culture Documents
Ch8 OS Installation Recovery and System Logs
Ch8 OS Installation Recovery and System Logs
Chapter 8
OS Installation, Recovery and
System Logs
ITP3901 OPERATING SYSTEMS FUNDAMENTALS
(AY 2019/20)
2
OS Installation
Before installation, make sure that the key elements (CPU, RAM and
hard disk space) of the system hardware meet the minimum
requirements of the OS.
Check with the OS and hardware manufacturers to verify that the
hardware is compatible with the OS.
The software and hardware manuals may contain compatibility
information.
The update compatibility information is the World Wide Web.
The installation program will also give the user the option
to install a default set of components or choose the
components manually.
It is recommended to use the default setting for new users
since it will simplify the installation process and ensure a
successful installation.
The first method uses a type of backup called a system image, which
you need to have created earlier.
The second method reinstalls Windows, either from a recovery image
provided by your computer manufacturer, or from the original
Windows installation files.
The first method is better since most of your files, programs, and
settings are preserved on the system image. You will only need to
reinstall or restore any programs, updates, or files that you added after
the date you created the system image.
However, if the system image was made recently, there is a chance it
could contain the problem you are trying to fix.
Backup and
Recovery
Backups
data
data
data
2 3
1
Restore
data
Backs up only files that have changed since last full backup
Differential backups are cumulative. Once a file has been changed, it
will be included in all subsequent differential backups
Reduces the size of backup jobs compared to full backups but not
incremental backups
Restore process requires only the full backup and the latest
differential backup
Backups
data data
data
Restore
data
System Logging in
Linux
Log files are files that contain message about the system, including kernel,
services and applications running on it.
There are different log files for different information. For example, there is a
default system log file, a log file just for security messages, and a log file for
cron tasks.
Some log files are managed by a daemon called journald, a component of
systemd. The journalctl command lets you interact with the journald.
Applications such as
httpd(apache web server) and
samba(for sharing file with MS Windows clients)
have a directory within /var/log for their log files.
The default system log files are stored in the directory /var/log.
This log file is typically the recipient of all informational class
messages generated by the system.
Allow log file to grow until they reach the pre-defined size, then
restart the log from zero.
Do not guarantee that log will be kept for expected time
e.g. if a system is attacked by someone then system write a lot of data to
log file. The size of log file will over the limit and re-set quickly.
“version based”
Version based rotated the log in such a way that the old file has a
suffix 1, the older file has a suffix 2, etc. Each time log rotate N
files are preserved.
“date based”
Date based used daily or weekly of month rotation pattern and
each rotated log is marked by timestamp.
Monday Tuesday
last
Command used to list last logged in user