Backups, Logging, Troubleshooting. Dates for Last Week of Class Homework 7 – Due Tuesday 5/1 by midnight Labs 7 & 8 – 8 is extra credit – Due Thursday.

Slides:



Advertisements
Similar presentations
CIS Lesson 12 System Monitoring 1. CIS Lesson 12 System Monitoring Monitoring Log Files /var/log ‒ Can be used as indication of systematic.
Advertisements

Managing logs with syslog-ng and SWATCH AfNOG 11, Kigali/Rwanda.
NetComm Wireless Logging Architecture Feature Spotlight.
Syslog and log files1-1 Syslog and Log Files  From logfiles, you can find m important information m History m Errors/warnings  Logging policies m Reset.
CIS 193A – Lesson3 Vigilance! Logging & Monitoring Syslog Logrotate Logwatch Accounting.
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
Operating Systems. What is an Operating System? A layer of software between users/applications and the hardware. The first program loaded onto a computer.
Chapter 11 Monitoring and Analyzing the Web Environment.
Syslogd Tracking system events. Log servers Applications are constantly encountering events which should be recorded –users attempt to login with bad.
Introduction to Course Content. Computer Center, CS, NCTU 2 Outline  What SA Should do.  What You can expect to learn from this course.  What attitude.
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Unix System.
Linux+ Guide to Linux Certification, Third Edition Chapter 11 Compression, System Backup, and Software Installation.
NOC TOOLS syslog AfNOG Cairo, SI-E, 2 of 5 Sunday Folayan.
Services, logging, accounting Todd Kelley CST8177– Todd Kelley1.
Syslog and log files Ameera Jaradat.
Backups in Linux Ning Zhu Class presentation. Introduction The dump and restore commands are the most common way to create and restore from backups in.
Module 10 – Linux Installations. Wikipedia: Red Hat Package Manager or RPM Package Manager (RPM) is a package management system. The name RPM variously.
Va-scanCopyright 2002, Marchany Securing Solaris Servers Randy Marchany.
V Avon High School Tech Crew Agenda Old Business –Delete Files New Business –Week 10 Topics: Coming up: –Yearbook Picture: Feb 7 12:20PM.
New SA Training Topic 9: Logging, Monitoring, and Performance  Logging  Windows – “Auditing”  Linux – syslog  Monitoring  MRTG  Big Brother  Performance.
Linux Operations and Administration
Partner Logo German Cancio – WP4-install LCFG HOW-TO - n° 1 WP4 hands-on workshop: EDG LCFGng exercises
V Avon High School Tech Crew Agenda Old Business –Delete Files New Business –Week 9 Topics: Coming up: –Yearbook Picture: Feb 7 12:20PM.
Hacking Linux Systems.  Text Editors  vi, ex, pico, jove, GNU emacs  Shells  chs (C Shell), sh (Bourne Shell)  File navigation  cd, ls, cp, mv,
CIS 218 Advanced UNIX 1 User and System Information CIS 218.
System Monitoring and Automation CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
7 November 2005 Sebastian Büttrich ItrainOnline MMTK 1 Linux logging and logfiles monitoring with swatch Sebastian Büttrich, wire.less.dk.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
Online Game Anatomy Server Components &Services. Server Categories  Passive  Patching  Authentication  Game Data Storage  Stats / Inventory  Event.
SCSC 455 Computer Security Chapter 4 File Security.
Linux Operations and Administration
System logging and monitoring
Day 8 Exporting Displays Cronjobs Mount. Chapter 5 Chapter 5 talks about X windows. –You should read the chapter. –However, you do not need to pay particular.
Vodafone MachineLink 3G
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
System Monitoring and Automation. 2 Section Overview Automation of Periodic Tasks Scheduling and Cron Syslog Accounting.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Day 11 SAMBA NFS Logs Managing Users. SAMBA Implements the ability for a Linux machine to communicate with and act like a Windows file server. –Implements.
A Practical Guide to Fedora and Red Hat Enterprise Linux Unit 8: Installing Software in Linux Chapter 13: Downloading and Installing Software By Fred R.
CIS 290 LINUX Security Tripwire file integrity and change management tool and log monitoring.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
INTRODUCTION TO LINUX Jacob Chan. GNU/Linux Consists of Linux kernel, GNU utilities, and open source and commercial applications Works like Unix –Multi-user.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 6 Manage Linux Processes and Services.
Guide To UNIX Using Linux Third Edition Chapter 8: Exploring the UNIX/Linux Utilities.
Linux Introduction What is Linux? How do you use it?
Generating Reports and Analyzing Logs 黃雁亭 陳麗雯 廖榆恬 1.
CENT 305 Information Systems Security Overview of System Logging syslog 1.
Security monitoring boxes Andrew McNab University of Manchester.
Ch11: Syslog and Logfiles Presented by: Apichana Thiantanawat 06/11/02.
Core System Services. INIT Daemon The init process is the patron of all processes. first process that gets started in any Linux/ UNIX -based system.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Cosc 4750 Log files Logging policies Throw away all data immediately Reset log files at periodic intervals Rotate logs files, keeping data for a fixed.
What about errors in my Apples and Penguins
CS 245 – Part 1 Using Operating Systems and Networks for Programmers Jiang Guo Dept. of Computer Science California State University Los Angeles.
CSCI 330 UNIX and Network Programming Unit XX: Linux Administration.
By Jonathan Rinfret UNIX/LINUX By Jonathan Rinfret
Backing Up Your System With rsnapshot
COP 4343 Unix System Administration
Cosc 4750 Log files.
UNIX & LINUX Operating Systems
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008
ITIS 3110 IT Infrastructure II
Log management AfNOG 2008 Rabat, Morocco.
More Scripting & Chapter 11
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
IS3440 Linux Security Unit 8 Software Management
OPS235 PACKAGE MANAGEMENT
CIT 485: Advanced Cybersecurity
CIT 470: Advanced Network and System Administration
Monitoring with logging
Presentation transcript:

Backups, Logging, Troubleshooting

Dates for Last Week of Class Homework 7 – Due Tuesday 5/1 by midnight Labs 7 & 8 – 8 is extra credit – Due Thursday 5/3 by midnight – No Late ones accepted Final – Thursday 5/3 – 6 – 9:30 in classroom – open [book|notes|computer] – will need working VM

Backups What to backup? How often? Where? Don’t forget to test restores!!!

Backup Medium 2 nd Hard Drive CDs, DVDs, Flash Drives Tape Another server Online

Backup Utilities tar cpio dump/restore zip/unzip dd really, really expensive commercial ones

Logs Controlled by 2 daemons –syslog – general logging –klogd – kernel messages

Syslog Controlled by /etc/syslog.conf: # Log anything except mail of level info or higher. # Don't log private authentication messages! *.info;mail.none;authpriv.none;cron.none /var/log/messages # The authpriv file has restricted access. authpriv.* /var/log/secure # Log all the mail messages in one place. mail.* -/var/log/maillog # Log cron stuff cron.* /var/log/cron

Syslog Format Basic syntax: codeword.prioritylocation Example: cron.* /var/log/cron

Syslog Codewords auth – message from a user authentication program this used to be called security auth-priv – private authentication program daemon – any daemon not explicitly listed will generate a message under this category kern – kernel messages through klogd syslog – messages about the logging process itself user – messages from application software started by a user local0 through local7 – messages generated by Linux where the level is established by the Linux vendor local7 for instance pertains to boot messages cron, lpr, mail, news – self explanatory

Syslog Priorities From lowest to highest: –none - no priority –debug - log debugging messages used by programmers or testers of the software –info - log informational messages about what the program is doing –notice - noteworthy events –warning - potential problem events –err – errors –crit - critical error messages that will likely cause the program to terminate –alert - like crit except that the error can impact other programs –emerg - problems serious enough to potentially crash the entire OS

Syslog location File: /some/path/to/file

Troubleshooting Log files in /var/ man pages!!!! apropos (man –k) – search man pages for matches System monitoring commands – top, ps, etc

Software Installation

How to install? Source –Download.tar.gz, extract, make, make install Packages (2 biggest for Linux)‏ –RPM – Redhat Package Manager –DEB – Debian Packages Commercial Unix –bff for AIX – Backup File Format –dstream for Solaris - shar

Package Managers CentOS Specific –rpm (command line)‏ –yum (command line)‏ –pirut (Graphical front-end to yum)‏ “Applications” → “Add/Remove Software”

yum yum – Yellowdog Updater Modified –Used for installing new software –Used for removing old software –Used for updating current software

Make Used to build software from source all: scheduler scheduler: scheduler.o g++ scheduler.o -o scheduler scheduler.o: scheduler.C g++ -c scheduler.C clean: rm -rf *o scheduler install: scheduler mkdir -p /usr/local/bin cp scheduler /usr/local/bin