top of page
Writer's picturevanroemorthealthme

Linux Troubleshooting For System Admins And Power Users



Some of the most popular operating systems that use Linux as kernel are Debian, Knoppix, Ubuntu, and Fedora. Nevertheless, the list does not end here as there are thousands of operating systems based on Linux which offer a variety of functions to the users.




Linux Troubleshooting For System Admins And Power Users




Introduction to Linux System Administration: Linux is a major strength in computing technology. Most of the webserver, mobile phones, personal computers, supercomputers, and cloud-servers are powered by Linux. The job of a Linux systems administrator is to manage the operations of a computer system like maintain, enhance, create user account/report, taking backups using Linux tools and command-line interface tools. Most computing devices are powered by Linux because of its high stability, high security, and open-source environment. There are some of the things that a Linux system administrator should know and understand:


The Google IT Support Professional Certificate equips you with the skills to tackle common sysadmin tasks such as customer support and troubleshooting. It also introduces you to commonly used systems like Linux and Domain Name Systems, and prepares you for the CompTIA A+ exam. Though not a certification, the course will earn you an industry-recognized professional certificate at the end. It requires no previous experience.


According to Zippia, 60 percent of sysadmins have a bachelor's degree and 24 percent have a associate. While it's possible to get a job as a system administrator without a degree, earning one in a topic like computer science, networking, or IT could open up more opportunities [2].


The control of users and groups is a core element of Red Hat Enterprise Linux system administration. This chapter explains how to add, manage, and delete users and groups in the graphical user interface and on the command line, and covers advanced topics, such as creating group directories.


Red Hat Enterprise Linux reserves user and group IDs below 1000 for system users and groups. By default, the User Manager does not display the system users. Reserved user and group IDs are documented in the setup package. To view the documentation, use this command:


In environments with multiple users, it is very important to use shadow passwords provided by the shadow-utils package to enhance the security of system authentication files. For this reason, the installation program enables shadow passwords by default.


The default range of IDs for system and normal users has been changed in Red Hat Enterprise Linux 7 from earlier releases. Previously, UID 1-499 was used for system users and values above for normal users. The default range for system users is now 1-999. This change might cause problems when migrating to Red Hat Enterprise Linux 7 with existing users having UIDs and GIDs between 500 and 999. The default ranges of UID and GID can be changed in the /etc/login.defs file.


Wireshark is a well-known network traffic monitoring tool. It works with the overwhelming majority of known protocols, and it has both a clear and logical graphical interface based on GTK + and a powerful filter system. Moreover, it is cross-platform, working under Linux, Solaris, FreeBSD, NetBSD, OpenBSD, Mac OS X, and, of course, Windows. Wireshark reveals the smallest details of network traffic and network protocols. If you have the necessary knowledge, you can effectively troubleshoot and diagnose a variety of problems that arise in the network using Wireshark.


The PowerShell console is an interactive environment built on the .NET Framework that enables you to run various commands in real time. It is designed specifically for system administrators and power-users who need to automate the administration of operating systems (Linux, macOS, Unix and Windows) and the processes related to the apps that run on those operating systems. In addition you can run cmd.exe commands in PowerShell environment.


The command line dropped in popularity following the introduction of GUI-based personal computer OSes like Microsoft Windows and Apple's "classic" Mac OS in the 1980s. The command line remains an important tool for IT professionals, software developers, sys admins, network administrators and many others who prefer a more precise and reproduceable interface to their systems.


In computing, a shell program provides access to an operating system's components. The shell gives users (or other programs) a way to get "inside" the system to run programs or manage configurations. The shell defines the boundary between inside and outside.


To get the greatest benefit from using a CLI shell, users should learn a scripting language. Most command line shells can save sequences of commands in a script or batch file which may be fully programmable. Shell scripting is the foundation of basic systems management automation.


The page inspection feature enables you to get details about a page, providing insight into the page design, the different elements that comprise the page, and the source behind the data it displays. Page inspection is especially designed for administrators, power users, support personnel, and developers. It is ideal for learning the data model behind a page and troubleshooting. For example, if you are experiencing a problem with a page, you could use page inspection to get information to pass on to your system administrator or support personnel.


net stop cryptsvcren %systemroot%\system32\catroot2 oldcatroot2net start cryptsvcThen, try to visit the Windows Update Web site or the Microsoft Update Web site again. If the problem is resolved, do not continue troubleshooting.


These professionals work in collaboration with the computer system engineer to install the system. The Linux administrator ensures the systems are updated with changing technologies. They are in charge of the installation of new software, granting permissions, and training users for the applications.


The Linux administrator has an active role in patching, compiling, securing, and troubleshooting Linux servers in a heterogeneous environment. The professional performs system updates and server configurations. They are responsible for implementing changes in multiple environments from development to production. The professional may also develop scripts with various languages, such as Bash, Python, and PHP.


  • Bash Guide for Beginners version: 1.11 author: Machtelt Garrels, last update: Dec 2008 ISBN: 0-9744339-4-2 available formats: HTML (read online)

  • HTML (read online, single file, 530k)

  • HTML (tarred and gzipped package, 514K)

  • PDF (1.2M)

  • PostScript (1.0M)

  • text (110k)

  • PluckerDB (165k)

The Bash Guide for Beginners gets you started with Bash scripting andbridges the gap between the Bash HOWTO and the Advanced Bash ScriptingGuide. Everybody who wants to make life easier on themselves, power usersand sysadmins alike, can benefit from reading this practical course. Theguide contains lots of examples and exercises at the end of each chapter,demonstrating the theory and helping you practice. Bash is available ona wide variety of UNIX, Linux, MS Windows and other systems.


  • Introduction to Linux - A Hands on Guide version: 1.27 author: Machtelt Garrels, last update: Jun 2008 ISBN: 1596821124 available formats: HTML (read online)

  • HTML (read online, single file, 800k)

  • HTML (tarred and gzipped package, 1.1M)

  • PDF (1.6M)

  • PostScript (1.4M)

  • text (187k)

  • PluckerDB (254k)

This guide was created as an overview of the Linux Operating System,geared toward new users as an exploration tour and getting startedguide, with exercises at the end of each chapter. For more advancedtrainees it can be a desktop reference, and a collection of the baseknowledge needed to proceed with system and network administration.This book contains many real life examples derived from the author'sexperience as a Linux system and network administrator, trainer andconsultant. We hope these examples will help you to get a betterunderstanding of the Linux system and that you feel encouraged to tryout things on your own.


  • GNU/Linux Command-Line Tools Summary version: 1.2 author: Gareth Anderson, last update: Apr 2006 available formats: HTML (read online)

  • HTML (read online, single file, 559k)

  • HTML (tarred and gzipped package, 317k)

  • PDF (682k)

  • PostScript (584k)

  • text (gzipped, 88k)

  • PluckerDB (238k)

This document is an attempt to provide a summary of useful command-linetools available to a GNU/Linux based operating system, the tools listedare designed to benefit the majority of users and have being chosen atthe authors discretion. This document is not a comprehensive list of everyexistent tool available to a GNU/Linux based system, nor does it have in-depthexplanations of how things work. It is a summary which can be used to learnabout and how to use many of the tools available to a GNU/Linux-basedoperating system.


  • The Linux Network Administrator's Guide, Second Edition version: 1.1 authors: Olaf Kirch and Terry Dawson last update: March 2000 ISBN: 1-56592-400-2 available formats: HTML (read online)

  • HTML (tarred and gzipped package, 690k)

  • PDF (1.5MB)

This book was written to provide a single reference for network administration in a Linux environment. Beginners and experienced users alike should find the information they need to cover nearly all important administration activities required to manage a Linux network configuration. The possible range of topics to cover is nearly limitless, so of course it has been impossible to include everything there is to say on all subjects. We've tried to cover the most important and common ones. We've found that beginners to Linux networking, even those with no prior exposure to Unix-like operating systems, have found this book good enough to help them successfully get their Linux network configurations up and running and get them ready to learn more. 2ff7e9595c


1 view0 comments

Recent Posts

See All

Comments


bottom of page