Linux Server Hacks, Volume 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting

Linux Server Hacks, Volume 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting

William von Hagen, Brian K. Jones

Language: English

Pages: 746

ISBN: 2:00049383

Format: PDF / Kindle (mobi) / ePub


I also have this book in EPUB and PDF as retail (no conversion).

Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are many more hacks, cool tips, and ways of solving problems than can fit in a single volume (one that mere mortals can lift, that is).

Which is why we created Linux Server Hacks, Volume Two, a second collection of incredibly useful tips and tricks for finding and using dozens of open source tools you can apply to solve your sys admin problems. The power and flexibility of Linux and Open Source means that there is an astounding amount of great software out there waiting to be applied to your sys admin problems -- if only you knew about it and had enough information to get started. Hence, Linux Server Hacks, Volume Two.

This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. No more sifting through man pages, HOWTO websites, or source code comments -- the only resource you need is right here. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network.

Compiled by experts, these hacks not only give you the step-by-step instructions necessary to implement the software, but they also provide the context to truly enable you to learn the technology. Topics include:
* Authentication
* Remote GUI connectivity
* Storage management
* File sharing and synchronizing resources
* Security/lockdown instruction
* Log files and monitoring
* Troubleshooting
* System rescue, recovery, and repair

Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative environments, the solutions found in Linux Server Hacks, Volume Two will simplify your life as a system administrator.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

then echo " Usage: cp_backup partition backup-device" echo " Example: cp_backup /home /dev/sda1" exit fi VERBOSE="no" STDOPTS="-dpRux" LOGFILE="/var/log/backup/simple.log" TARGETBASE=`echo $1 | sed -e 's;^\/;;' -e 's;\/;-;g'` FULLTARGET="/mnt/"$TARGETBASE"-backup" DATE=`date` export BACKUPTASK="$1 to $2" trap cleanup 1 2 3 6 cleanup() { echo " Uh-oh, caught signal: tidying up…" | tee -a $LOGFILE DATE=`date` umount $FULLTARGET echo "Aborted simple backups of $BACKUPTASK

(both had the word 'refused'). To get around these false positive without also throwing out things you want to know about, you put a line like this in /usr/local/etc/logcheck.violations.ignore: mailer=local, stat=refused This will match only the Sendmail log entry and will be ignored. Any other entries will be caught if they contain the string "refused". Of course, it will likely take you some time to fine-tune the reports logcheck sends, but the model of forcing you to tell the tool to

$entry->get_value('uidNumber')) =~ s/:/./g; (my $gidnum = $entry->get_value('gidNumber')) =~ s/:/./g; (my $gecos = $entry->get_value('gecos')) =~ s/:/./g; (my $homedir = $entry->get_value('homeDirectory')) =~ s/:/./g; (my $shell = $entry->get_value('loginShell')) =~ s/:/./g; (my $up = $entry->get_value('userPassword')) =~ s/:/./g; if (index($up, "{crypt}") != -1) { $up = substr($up, 7); }else{ $up = crypt($up, "bR"); } $passrecord =

get the installation process rolling. It would really be wonderful if installing Linux were as simple as walking through the machine room (or lab, or anyplace else where there are a lot of target hosts that need installing), powering on all the new machines, and walking away. Let's have a look at how this (and more!) can be accomplished. In my examples, I'll be using the Red Hat/Fedora kickstart mechanism for my automated installations, but other tools can accomplish similar if not identical

tags, I put more keystrokes on the end of my mapping. First, I enter command mode using the Esc key. The 2F> bit says to search from where the cursor is backward to the second occurrence of >, and then the a places the cursor, back in insert mode, after the > character. I never even realize I ever left insert mode—it's completely seamless! Hack #40. Move Your PHP Web Scripting Skills to the Command Line PHP is so easy, it's made web coders out of three-year-olds. Now, move that skill to

Download sample

Download