Materi configure & building kernels System And Kernel Management The Complete Guide to Linux System Administration Chapter 13.

Slides:



Advertisements
Similar presentations
By Rashid Khan Lesson 6-A Place for Everything: Storage Management.
Advertisements

Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Chapter 9: Understanding System Initialization The Complete Guide To Linux System Administration.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Corso referenti S.I.R.A. – Modulo Disaster Recovery 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
ITE PC v4.0 Chapter 1 1 Operating Systems Computer Networks– 2.
File Management Systems
Chapter 6: Configuring Server Storage, Backup, and Performance Options
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 12 File Management Systems
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Linux+ Guide to Linux Certification Chapter 12 Compression, System Backup, and Software Installation.
Implementing Disaster Protection
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Linux+ Guide to Linux Certification, Third Edition Chapter 11 Compression, System Backup, and Software Installation.
Installing software on personal computer
Guide to Linux Installation and Administration, 2e1 Chapter 13 Backing Up System Data.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
1 Chapter Overview Backing Up Your Network Backing Up and Restoring Active Directory.
1 Introducing Windows Backup There are different methods for starting Windows 2000 Backup. Requirements for running Windows 2000 Backup All users can back.
Chapter 11 Compression, System Backup, and Software Installation.
Linux+ Guide to Linux Certification Chapter Three Linux Installation and Usage.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Chapter Sixteen Data Recovery and Fault Tolerance.
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
Linux+ Guide to Linux Certification
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Linux Operations and Administration
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
Chapter Two Exploring the UNIX File System and File Security.
Managing Disks and Drives Chapter 13 powered by dj.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Troubleshooting and Performance
Guide to Linux Installation and Administration1 Chapter 4 Running a Linux System.
Windows Server 2003 硬碟管理與磁碟機陣列 林寶森
Disaster Recovery and Business Continuity Planning.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
Guide to Linux Installation and Administration, 2e1 Chapter 11 Using Advanced Administration Techniques.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
Guide to Linux Installation and Administration, 2e
Managing Multi-User Databases
Introduction to Operating Systems
Chapter 2: System Structures
Networking for Home and Small Businesses – Chapter 2
Exploring the UNIX File System and File Security
IS3440 Linux Security Unit 7 Securing the Linux Kernel
COP 4343 Unix System Administration
Networking for Home and Small Businesses – Chapter 2
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
Hard Drives & RAID PM Video 10:28
Presentation transcript:

Materi configure & building kernels System And Kernel Management The Complete Guide to Linux System Administration Chapter 13

CATATAN MATERI INI TERMASUK SEBAGIAN DARI MATERI “BACKUP AND RESTORE” YANG AKAN DIPELAJARI PADA KAJIAN 3 The Complete Guide to Linux System Administration2

3 Objectives Establish a Linux backup strategy Configure and review system log files Understand the use of kernel modules and the features of a high-end kernel Upgrade and recompile the Linux kernel

The Complete Guide to Linux System Administration4 Backing Up a Linux System Backup –Copy of data on computer system –Form of insurance

The Complete Guide to Linux System Administration5 Designing a Backup Strategy Backup plan –Written document that outlines: When and how files are backed up How files are stored How files are restored Backup media –Item that holds backed-up data Restore data –Copy from backup media to file system

The Complete Guide to Linux System Administration6 Designing a Backup Strategy (continued) Backup plan questions –What files should be backed up? –Who will back up files? –Where are files located? –How should backups be performed? –Must you be able to restore data within a specific period of time?

The Complete Guide to Linux System Administration7 Designing a Backup Strategy (continued) Determining value of data –Spend more to protect integrity of expensive data Opportunity cost Determine when to back up data –Data changes frequently in most organizations User data Log files archives Constitutes daily work of users within organization

The Complete Guide to Linux System Administration8 A Linux Backup Strategy Backup level –Defines how much data is backed up –Backup operation at given backup level stores all data that has changed since last backup of previous level –Levels Level 0, full backup Level 1, weekly differential backup Level 2, daily differential backup

The Complete Guide to Linux System Administration9 A Linux Backup Strategy (continued) Full backup –Also called epoch backup –Everything on system is backed up Differential backup stores only files that changed since full backup Incremental backup stores files that changed since most recent incremental backup or differential backup

The Complete Guide to Linux System Administration10 A Linux Backup Strategy (continued)

The Complete Guide to Linux System Administration11 A Linux Backup Strategy (continued) Restoring file from three-level backup –Check most recent level 2 backup, level 1backup, and level 0 backup Entire system restore from three-level backup –Restore most recent level 0 backup, level 1 backup, and level 2 backup

The Complete Guide to Linux System Administration12 A Linux Backup Strategy (continued) Managing and storing backup media –Determine how many backup media needed for each level –Carefully label media –Most organizations store one set of monthly backup media off-site Possibly weekly as well –Can reuse same set of level 1 weekly tape cartridges each month starting with oldest one

The Complete Guide to Linux System Administration13 A Linux Backup Strategy (continued)

The Complete Guide to Linux System Administration14 A Linux Backup Strategy (continued) Backing up root file system –Requires special attention in backup plan –Contains tools normally used to restore damaged data –Think about how to respond if root file system is damaged

The Complete Guide to Linux System Administration15 Hardware and Software Issues Determine best tools to get job done Linux includes all necessary software utilities for many backup tasks Backup media such as tape cartridges cost much less than hard disk Verify backups regularly Check backup log each morning

The Complete Guide to Linux System Administration16 Hardware and Software Issues (continued) Know exactly what information is backed up –Backup utilities normally include options to maintain or ignore file ownership and permissions Choose whether to use compression feature –When data compressed, redundancy removed

The Complete Guide to Linux System Administration17 Using Linux Backup Utilities tar cpio dump restore dd (“Data dump”)

The Complete Guide to Linux System Administration18 Using Linux Backup Utilities (continued) Graphical utilities rely on tar, cpio, or dump and restore in background Common to use Linux backup utilities across network Most full-featured backup utilities create own network connections ark –Graphical tool for managing data backup operations

The Complete Guide to Linux System Administration19 Using Linux Backup Utilities (continued) Specialized software for maintaining large numbers of backup media for large volumes of data –BRU (backup and restore utility) –Arkeia –Storix –Hypertape –Amanda –Legato

The Complete Guide to Linux System Administration20 Understanding Redundant Disk Systems and RAID Redundant arrays of inexpensive disks –Called RAID subsystems or RAID arrays –Group or array of inexpensive hard disks –If one disk fails, others can take over until failed disk replaced –Can be implemented by Linux kernel As device called /dev/md0 Composed of several actual hard disk partitions

The Complete Guide to Linux System Administration21 Understanding Redundant Disk Systems and RAID (continued) Defining RAID levels –Levels differ in: Amount of fault tolerance provided Speed of reading or writing data Cost of implementation –RAID-Linear Combine multiple physical devices into single logical device Not truly RAID level

The Complete Guide to Linux System Administration22 Understanding Redundant Disk Systems and RAID (continued) RAID-0 –Data storage technique called striping –Single block of data divided into pieces –Stored on more than one hard disk RAID-1 –Mirrors data across multiple hard disks RAID-3 –Stripes data across multiple hard disks –Provides additional protection against failure by using parity

The Complete Guide to Linux System Administration23 Understanding Redundant Disk Systems and RAID (continued)

The Complete Guide to Linux System Administration24 Understanding Redundant Disk Systems and RAID (continued) Mirroring –Two or more hard disks contain identical information Duplexing –Mirrored hard disks on separate controller cards Parity –Technique that allows corrupted data to be reconstructed using extra information created as data stored

The Complete Guide to Linux System Administration25 Understanding Redundant Disk Systems and RAID (continued) RAID-5 –Similar to RAID-3 –Parity information and stored data striped across multiple hard disks Write caching stores information in memory until it can be written to multiple hard disks without degrading performance overall

The Complete Guide to Linux System Administration26 Understanding Redundant Disk Systems and RAID (continued)

The Complete Guide to Linux System Administration27 Understanding Redundant Disk Systems and RAID (continued)

The Complete Guide to Linux System Administration28 Understanding Redundant Disk Systems and RAID (continued) Hardware-based RAID –Control and management of disk array depends on separate hardware system –All special technology contained in RAID device –Often allow hot-swapping disks –Main disadvantage: cost

The Complete Guide to Linux System Administration29 Understanding Logical Volume Management Logical volume manager (LVM) used to manage large hard disks Physical volumes –Use Disk Druid to set up “real” partitions on multiple hard disks –Grouped together into logical volume group –Treated as regular hard disk –Boot loader not able to work directly with LVM

The Complete Guide to Linux System Administration30 System Logs Log files –Detailed records of events within system –Created by many programs /var/log/messages –Many different programs write messages Message –Description of what is happening within program –Uses standard format whatis command –Looks at database of program descriptions –Prints one-line description of program

The Complete Guide to Linux System Administration31 The syslogd and klogd Daemons syslogd –System logging daemon –Watches for messages submitted by programs klogd –Kernel log daemon –Watches for messages submitted by kernel –Logs kernel messages to /var/log/messages

The Complete Guide to Linux System Administration32 syslogd and klogd Work Together to Process Log Messages

The Complete Guide to Linux System Administration33 Configuring the System Log /etc/syslog.conf –Configure syslogd and klogd –Each line in syslog.conf file contains two parts: Selector Action

The Complete Guide to Linux System Administration34 Configuring the System Log (continued)

The Complete Guide to Linux System Administration35 Configuration File Syntax Comment lines –Begin with # character –Precede and explain purpose of each line Some aspects of configuration file syntax not obvious even after reading about facilities and actions After changing syslog.conf configuration file, service syslog restart

The Complete Guide to Linux System Administration36 Configuration File Syntax (continued) SIGHUP signal –Send with kill command –Tells daemon to reread configuration files –kill -HUP ‘cat /var/run/syslogd.pid’

The Complete Guide to Linux System Administration37 Using the Logger Utility Logger utility sends message to syslog function Example: logger compression utility started Logged wherever syslog.conf file has configured messages matching selector

The Complete Guide to Linux System Administration38 Analyzing Log Files System administrator should regularly check log files for indications of trouble –Become accustomed to what is normal and what is unexpected –Use standard Linux tools to search for information in log files –Use special log management utilities that watch log files for specified conditions Notify via about problems

The Complete Guide to Linux System Administration39 Rotating Log Files Erase old log files to free up disk space for new log information Compress log files and store them on archive medium Rename and compress log files Common log rotation system stores log files for a month logrotate utility

The Complete Guide to Linux System Administration40 Exploring Kernel Components Learn how Linux keeps track of time Learn about /proc file system Work with kernel modules and several high-end features of Linux kernel

The Complete Guide to Linux System Administration41 Timekeeping in Linux Hardware clock –Electronic clock with small battery –Maintains correct time even when computer is off System clock –Internal clock in kernel –Maintained internally as single number Number of seconds since January 1, 1970

The Complete Guide to Linux System Administration42 Timekeeping in Linux (continued) date command –See current date and time from system clock hwclock command –See current date and time from hardware clock Network time server –Computer that maintains highly accurate time based on atomic or radio clocks –Network Time Protocol (NTP) /etc/ntp.conf file

The Complete Guide to Linux System Administration43 Kernel Management Using the /proc File System /proc file system –Interact with system resources as if they were files –Query to learn about system hardware –Can also write information to some file names in /proc sysctl command –Preferred method of viewing and updating many kernel parameters –Operates on values stored in /proc/sys

The Complete Guide to Linux System Administration44 Using Kernel Modules Linux kernel modules –Files containing computer code –Can be loaded into kernel or removed from kernel as needed lsmod command lists modules that are installed modinfo command –Learn about modules

The Complete Guide to Linux System Administration45 Using Kernel Modules (continued) Adding and removing modules –modprobe command loads module with any required supporting modules –rmmod command removes module from kernel –Module parameters provides information needed by module to locate system resources

The Complete Guide to Linux System Administration46 Configuring and Upgrading Kernel Components Add features to kernel by inserting kernel modules –Some kernel features not available as modules Recompile Linux kernel from source code –File vmlinuz contains Linux kernel –Usually located in / or /boot directory

The Complete Guide to Linux System Administration47 Installing Kernel Source Code Source code in single rpm –Named kernel-source –Use rpm command to install Explore source code files in directory /usr/src/linux Patch file Patch command –Insert and change lines based on patch file

The Complete Guide to Linux System Administration48 Configuring Kernel Features Select which kernel options to include or activate for system Configuration utilities –config –menuconfig –xconfig make command –Programming utility uses instructions in configuration file to execute series of instructions

The Complete Guide to Linux System Administration49 Compiling a New Kernel Execute series of make commands –Prepare all source code files –Compile them into kernel image Requires between 30 minutes and 3 hours Example: make dep; make bzimage; make modules; make modules_install

The Complete Guide to Linux System Administration50 Summary Backup plan creates orderly system for backing up data on regular basis and restoring lost data as needed Log files record activities of Linux programs System clock in Linux kernel maintains time and date for system events RAID systems improve speed and fault tolerance

The Complete Guide to Linux System Administration51 Summary (continued) /proc file system –View details about Kernel Running processes Other system information Linux kernel sometimes updated by Linux vendors via new rpm file