Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Reading the Technical Manual of UNIX/Linux system Management (2)

2025-03-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

August 10, 2016 20:00-21:20

1.1.3 Performing backups

1.1.3 perform a backup

Performing backups is perhaps the most important job of the system administrator, and it is also the job that is most often ignored or sloppily done. Backups are time consuming and boring, but they are absolutely necessary. Backups can be automated and delegated to an underling, but it is still the system administrator's job to make sure that backups are executed correctly and on schedule (and that the resulting media can actually be used to restore files).

Performing backups is probably the most important job for system administrators, which is often overlooked or carelessly done. Backup work is time-consuming and monotonous but absolutely necessary. Backups can be done automatically and can be authorized to be done by subordinates, but the system administrator still needs to make sure that the backup works on time and the backup media can indeed recover the original files.

Words

Perhaps, maybe, maybe.

Most often, most often is usually said.

Ignored ignored it.

Sloppily carelessly

Consuming consumption

Boring is boring and boring.

Absolutely necessary is absolutely necessary.

Automated Automation and Mechanization

Delegated authorization

Underling subordinate pawns

Still is still, but even so,

Executed correctly executes correctly

On schedule on time and on schedule

Resulting as a result

Actually actually actually

1.1.4 Installing and upgrading software

1.1.4 installation and software updates

When new software is acquired, it must be installed and tested, often under several operating systems and on several types of hardware. Once the software is working correctly, users must be informed of its availability and location. As patches and security updates are released, they must be incorporated smoothly into the local environment.

After obtaining the new software, it must be installed and tested, and often under several types of operating systems and hardware. Once the software works properly, you should also tell the user the location of the software. Patches and security upgrades must be smoothly integrated into the local environment as they are released.

Local software and administrative scripts should be properly packaged and managed in a fashion that's compatible with the native upgrade procedures used on systems at your site. As this software evolves, new releases should be staged for testing before being deployed to the entire site.

Local software and management scripts should be properly packaged and managed to adapt to the upgrade mechanism adopted by the local system itself. As the software moves forward, new releases should be scheduled for testing and then deployed to the entire site.

Words

Acquired acquisition capture

Correctly correctly and appropriately

Informed Notification

The past tense of released releasing release has been released

Merged by incorporated

Smoothly is smooth and fluent.

Into the integration

Environment environment outside

Properly appropriately, correctly and appropriately

Managed management

In a fashion is just so-so. A little

Compatible compatible, coexistent, coexisting.

Native upgrade local upgrade

Procedures procedure

The Development and Evolution of evolves

Releases release exemption

Be staged test performance

1.1.5 Monitoring the system

1.1.5 Monitoring system

Large installations require vigilant supervision. Don't expect users to report problems to you unless the issues are severe. Working around a problem is usually faster than taking the time to document and report it, so users often follow the path of least resistance.

Large deployment environments need to be monitored at all times. Do not expect the user to report the problem to the system administrator unless the situation is serious. It's usually much faster to get around the problem than to take the time to write a report, so users tend to do what they need to do.

Regularly ensure that email and web services are working correctly, watch log files for early signs of trouble, make sure that local networks are properly connected, and keep an eye on the availability of system resources such as disk space. All of these chores are excellent opportunities for automation, and a variety of off-theshelf monitoring systems can help sysadmins with this task.

Check regularly to ensure that email and Web services are functioning properly. Check the log files for early signs of failure. Ensure that the local network is connected to properly monitor the availability of system resources such as disk space. All these tasks are likely to automate a variety of off-the-shelf monitoring systems that can help system administrators accomplish this task.

Words

Installations system facility installation

Require needs to request a command

Vigilant vigilant vigilance vigilance vigilance

Supervision supervision and management

Minimum least

Resistance

Regularly regularly and regularly symmetrically

Early symptoms and early manifestations of early signs

The difficult work of chores

Excellent is excellent, excellent, outstanding.

Opportunities possible factors opportunities [number of] opportunities

A variety of all kinds of...

Off the shelf ready-made, no need to customize.

16:30-17:30 on August 11, 2016

1.1.6 Troubleshooting

1.1.6 Fault diagnosis

System failures are inevitable. It is the administrator's job to play mechanic by

Diagnosing problems and calling in experts if needed. Finding the problem is often harder than fixing it.

The failure of the system is inevitable. When necessary, it has become the duty of the administrator to invite experts to troubleshoot the system. Finding a problem is often ten times more difficult than fixing it.

Words

System failures system failure system failure system failure

Inevitable is inevitable

Mechanic mechanic

Diagnosing Problems diagnosing issu

Call in summoned

The plural form of experts expert talents expert

Fixing it processing repair

1.1.7 Maintaining local documentation

1.1.7 maintain local documentation

As a system is changed to suit an organization's needs, it begins to differ from the plain-vanilla system described by the documentation. Since the system administrator is responsible for making these customizations, it's also the sysadmin's duty to document the changes. This chore includes documenting where cables are run and how they are constructed, keeping maintenance records for all hardware, recording the status of backups, and documenting local procedures and policies.

With the gradual transformation of the system to meet the needs of the unit, the system begins to become different from the basic system described in the document. Since the system administrator is responsible for doing these customization work, it is also the administrator's responsibility to document the changes. This responsibility includes writing information such as the location and connection of the cable into the document, keeping the maintenance records of all hardware, recording the status of backups, writing documents of local processing procedures and policies, etc.

Words

Maintaining maintenance

Suit is suitable for adaptation

Maintenance records maintenance record

Recording record

Documenting compiling record record document making

Procedures process procedure

1.1.8 Vigilantly monitoring security

1.1.8 always be vigilant against system security

The system administrator must implement a security policy and periodically check to be sure that the security of the system has not been violated. On lowsecurity systems, this chore might involve only a few basic checks for unauthorized access. On a high-security system, it can include an elaborate network of traps and auditing programs.

The system administrator must implement some kind of security policy and make regular checks to ensure that the system security is not compromised. On systems with low security requirements, this task may include only a cursory check for unauthorized access. On highly secure systems, this may include careful placement of surveillance networks built by traps and programs.

Words

Vigilantly is vigilant and vigilant

Periodically check periodic inspection

Not been violated is not violated.

Chore tedious odd work

Might power and power can

Involve involves involving the immersion of

Basic checks basic check

Illegal unauthorized actions of unauthorized

An elaborate network Surveillance Network A well-designed network

Traps trap

Auditing audit

1.1.9 Fire fighting

1.1.9 Fire fighting

Although helping users with their various problems is rarely included in a system

Administrator's job description, it claims a significant portion of most administrators' workdays. System administrators are bombarded with problems ranging

From "It worked yesterday and now it doesn't! What did you change?" To "I spilled coffee on my keyboard! Should I pour water on it to wash it out?"

Although helping users solve a variety of problems is rarely included within the scope of the work of system administrators, for most system administrators, this usually takes up a large part of their daily work. System administrators are often bombarded with shape problems, from "my program worked yesterday but didn't work today. What have you changed?" to "I spilled coffee on the keyboard. Should I pour water on the keyboard to wash off the coffee?"

In most cases, your response to these issues affects your perceived value as an

Administrator far more than does any actual technical skill you might possess. You

Can either howl at the injustice of it all, or you can delight in the fact that a single well-handled trouble ticket scores as many brownie points as five hours of midnight debugging. You pick!

In most cases, a system administrator responds to these things more than any practical technical skills he may have. Either resent this or gladly accept the fact that spending five hours in the middle of the night debugging problems is the same as properly dealing with a faulty work order.

Words

Although, though, but

Various in a variety of ways

Rarely included rarely includes

Job description Job description

A large part of significant portion

Bombarded with indiscriminate bombardment

A series of problems such as problems ranging

The spillover of spilled cannot be spilled.

Pour water pour water

Response to to... The answer is right. The reaction of

Perceived value perceived value

Far more than is far more than the much more

Practical skills of actual technical skill

Might, maybe. Maybe.

Possess has the ability to

Howl growled, roared, barked.

Delight in because of... Feel happy, like to have fun, be happy.

Fact the actual truth

Well-handled handles it properly

Trouble ticket failure report form

You pick, you accept.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 237

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report