Day 11 SAMBA NFS Logs Managing Users. SAMBA Implements the ability for a Linux machine to communicate with and act like a Windows file server. –Implements.

Slides:



Advertisements
Similar presentations
Syslog and log files1-1 Syslog and Log Files  From logfiles, you can find m important information m History m Errors/warnings  Logging policies m Reset.
Advertisements

CIS 193A – Lesson3 Vigilance! Logging & Monitoring Syslog Logrotate Logwatch Accounting.
Samba Integrating SMB file systems with UNIX. Samba Provides a file server compatible with Windows 9x and NT.. SMB Can function in NETBIOS name browsing.
Lesson 22 – Introduction to Linux Systems Administration.
Syslogd Tracking system events. Log servers Applications are constantly encountering events which should be recorded –users attempt to login with bad.
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Unix System.
Linux+ Guide to Linux Certification, Second Edition
Chapter 3 Unix Overview. Figure 3.1 Unix file system.
NOC TOOLS syslog AfNOG Cairo, SI-E, 2 of 5 Sunday Folayan.
NETWORK FILE SYSTEM (NFS) By Ameeta.Jakate. NFS NFS was introduced in 1985 as a means of providing transparent access to remote file systems. NFS Architecture.
AfChix 2011 Blantyre, Malawi Log management. Log management and monitoring ■ What is log management and monitoring ? ● It's about keeping your logs in.
CMSC 691X – Summer 2002 Project By Pravin D’Souza.
1 COP 4343 Unix System Administration Unit 16: file server – samba.
NFS Server Setup NFS SERVER SETUP. Network File Service NFS Server Setup Allows to share Directories between UNIX Systems Daemons: netfs, nfs, nfslock.
Linux System Administration LINUX SYSTEM ADMINISTRATION.
1.  The Linux system of permissions is much more difficult than that of Windows  System administrators are given more control with the use of three.
Syslog and log files Ameera Jaradat.
New SA Training Topic 9: Logging, Monitoring, and Performance  Logging  Windows – “Auditing”  Linux – syslog  Monitoring  MRTG  Big Brother  Performance.
1 COP 4343 Unix System Administration Unit 15: file server – ftp – nfs.
CIS 218 Advanced UNIX 1 User and System Information CIS 218.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
ITI-481: Unix Administration Meeting 5. Today’s Agenda Network Information Service (NIS) The Cron Program Syslogd and Logging.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Unix Basics Chapter 4.
System logging and monitoring
Day 8 Exporting Displays Cronjobs Mount. Chapter 5 Chapter 5 talks about X windows. –You should read the chapter. –However, you do not need to pay particular.
New SA Training Topic 8: File System Access  Our organization uses a variety of services for accessing files on remote systems  WWW  FTP  CIFS/SMB.
Samba Advanced System Administration Course James Lwali University computing Centre Ltd, University of Dar es salaam,
IT2204: Systems Administration I 1 6b). Introduction to Linux.
System Administration System Configuration and Logs.
System Monitoring and Automation. 2 Section Overview Automation of Periodic Tasks Scheduling and Cron Syslog Accounting.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Linux+ Guide to Linux Certification, Third Edition
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 6 Manage Linux Processes and Services.
Linux Security. See who's logged in 1) w (more information) 2) who (less information)
Generating Reports and Analyzing Logs 黃雁亭 陳麗雯 廖榆恬 1.
Jabberd Quick Installation Guide. The jabberd server is the original open-source server implementation of the Jabber protocol, and is the most popular.
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Sys Admin Course NFS and SAMBA Fourie Joubert. Sys Admin Course NFS NFS is the Network File System It allows Linux systems to share a file system, or.
Ch11: Syslog and Logfiles Presented by: Apichana Thiantanawat 06/11/02.
Chapter 10: Rights, User, and Group Administration.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Linux Exercise. Download and Install the latest CentOS version and latest Ubuntu/Fedora OS. Configure a unique Host Name and a permanent IP Address for.
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
Cosc 4750 Log files Logging policies Throw away all data immediately Reset log files at periodic intervals Rotate logs files, keeping data for a fixed.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
Manually Creating a New User Account Presented by Carl South.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Linux Operations and Administration
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
Day 15 Apache. Being a web server Once your system is correctly connected to the network, you could be a web server. –When you go to a web site such as.
Multi-Domain Hosting CPTE 212 “Missing Slides” for 1/22/2015 John Beckett.
Lightweight Directory Access Protocol Objectives –This chapter will first show you how to install and use LDAP Contents –The LDAP Database Structure –Scenario.
The Linux Kernel About 6 million lines of code
COP 4343 Unix System Administration
Cosc 4750 Log files.
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
System Programming and administration CS 308
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008
Chapter 11 – Processes and Services
Log management AfNOG 2008 Rabat, Morocco.
Lab 1 introduction, debrief
LINUX SYSTEM ADMINISTRATION
CIT 470: Advanced Network and System Administration
Adding New Users.
Presentation transcript:

Day 11 SAMBA NFS Logs Managing Users

SAMBA Implements the ability for a Linux machine to communicate with and act like a Windows file server. –Implements File sharing Printer sharing On Linux you run smbd. Configure the smb.conf file. In windows, your linux machine appears as a new machine in the Neighborhood Network.

SAMBA For more information about SAMBA, or to find out how to install/configure it. –

nfs What if you have 2 UNIX machines who would like to share files with each other. One is a server, the other is a client. –We’ll configure both.

Server - /etc/exports Edit the file /etc/exports. Put the following in it: /usr(ro)

Server – Start services As root type: rpc.mountd rpc.nfsd To have these start automatically put them in startup files. If you make any changes to the /etc/exports file, you will need to run exportfs

Client - /etc/fstab Find out the IP address of your cousin. Make a new directory: mkdir /cousin Add the following to /etc/fstab :/usr /cousin nfs Now save that file and then type: mount -a

Testing it out Now on your machine, you should be able to see your cousins /usr partition. As setup, this is a read only mount. To change this, you would use rw instead of ro in the /etc/exports file.

User accounts One big job of a system administrator is managing users. –Adding new users when employees are hired. –Deleting old ones are they are fired/quit. –Managing user groups –Resetting passwords

Create a new user. Usually done with the adduser command. –This simply does the following: Adds a new line in /etc/passwd Creates a new directory for this person. Puts the default files into the new directory. Changes ownership and permissions of the files for the user.

Groups User groups are defined in /etc/group prof:x:101:chastine,delgado,booth,coleman,wilson,t omas,preston,enda Users can be members of multiple groups To see what groups you are a member of use: –id

Changing passwords Users can change their password at any time. –passwd Asks for old password, and then new password twice. If a user forgets their password, there is no way to find it out. –Root user can run passwd enda This will allow him to set a new password for enda, without knowing the old one.

Setting up directory. /etc/skel This is a skeleton directory which has the basic files which a user would need. –.bash_profile etc. To manually setup a user: –mkdir /home/enda –cp –R /etc/skel /home/enda –chown –R enda:enda /home/enda –chmod –R 744 /home/enda

Disable a user Usually done by either: –Change their shell to /bin/false –Or delete them from /etc/passwd –You can also user userdel enda

Logging A log file is a great resource for finding out what is going on. –Main logfile is located in /var/log /var/log/messages –Additional logs may exist in there for various applications: Web Server logs FTP Server logs Mail logs

syslogd Runs all the time in the background as a deamon. Reads configuration file /etc/syslog.conf –This determines how various levels of errors or messages are handled. Broken up as follows: –kern.*/dev/console –daemon.warning/var/log/messages These would mean: –Any message from the kernel should be written to console –Warning messages from daemons should be written to /var/log/messages.

Levels of messages Debug –You probably never care Info –General startup, shutdown of program. Notice –User enda logged out etc. Warnings –Non critical problems err –Errors from the program. Crit –Critical errors which may cause the program to crash alert –Critical errors, which may effect other things emerg –Wow…the system could crash because of this.

Who can log Messages usually come from: –daemon –kern –auth –cron –mail –local0-7 –Actual program names.

After changes - HUP Once you make changes to syslog.conf. You must tell syslogd to reread its configuration file. –kill –HUP [process ID of syslogd]

logger If you want to log something in the log file, you can use logger. –Useful in a script which may be run in background as daemon, or as a cron job. logger Test –If you want it to log under a certain priority: logger –p daemon.info “Started up”

logrotate The program logrotate can be used to rotate your logfiles. –By default on a RedHat system, logfiles are rotated every week, and the previous 4 are kept. With this weeks logfile, you have approx 5 weeks of logfiles. –Configured in: /etc/logrotate.conf If you have a very busy system, this may be too much. Nothing magical, crontab which does: –mv messages messages.old –touch /var/log/messages –kill –HUP syslogd