A Day in the Life of a Systems Administrator So you want to be a sysadmin? Presented by: Austin Grice and Gayathri Swaminathan Oklahoma Information Technology.

Slides:



Advertisements
Similar presentations
Practical Database Design Methodology and Use of UML Diagrams
Advertisements

White House New Media & Open Source Software Macon Phillips White House New Media.
Kyle Thurow, Kyle Neuschaefer, Alexander Matusiak, and Justin Carroll.
Test Case Management and Results Tracking System October 2008 D E L I V E R I N G Q U A L I T Y (Short Version)
IS 4420 Database Fundamentals Leon Chen. 2 Agenda About yourself About yourself  Name  Major About the instructor About the instructor Syllabus Syllabus.
Copyright © 2007, SAS Institute Inc. All rights reserved. SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
1 Software & Grid Middleware for Tier 2 Centers Rob Gardner Indiana University DOE/NSF Review of U.S. ATLAS and CMS Computing Projects Brookhaven National.
Enterprise Smart Clients Architecture, Patterns, Design, Best Practices Keith Elder Manager, Sr. Software Engineer Quicken Loans Blog:
DEV392: Extending SharePoint Products And Technologies Through Web Parts And ASP.NET Clint Covington, Program Manager Data And Developer Services - Office.
© 2006 IBM Corporation IBM Software Group Relevance of Service Orientated Architecture to an Academic Infrastructure Gareth Greenwood, e-learning Evangelist,
Introduction to z/OS Basics © 2006 IBM Corporation Chapter 8: Designing and developing applications for z/OS.
Database Administration
Connecting with Computer Science, 2e
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Computer Software.
Chapter One Overview of Database Objectives: -Introduction -DBMS architecture -Definitions -Data models -DB lifecycle.
Introduction to the new mainframe © Copyright IBM Corp., All rights reserved. Chapter 7: Designing and developing applications for z/OS.
Design and Implementation of a Single System Image Operating System for High Performance Computing on Clusters Christine MORIN PARIS project-team, IRISA/INRIA.
1 A Day in the Life of a Software Development Professional experiences of problem solving through hypothesis and predictions Oklahoma Information Technology.
BMC Software confidential. BMC Performance Manager Will Brown.
CIS 321—IS Analysis & Design Chapter 1: The World of the Modern Systems Analyst.
INFORMATION SYSTEM APPLICATIONS System Development Life Cycle.
Computers & Employment By Andrew Attard and Stephen Calleja.
Framework for Automated Builds Natalia Ratnikova CHEP’03.
Test Organization and Management
1 Systems Analysis and Design in a Changing World, Fourth Edition.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
A Day in the Life of a Systems Administrator So you want to be a sysadmin? Presented by: Austin Grice and Gayathri Swaminathan Oklahoma Information Technology.
Bottlenecks: Automated Design Configuration Evaluation and Tune.
RUP Implementation and Testing
Test Roles and Independence of Testing Telerik Software Academy Software Quality Assurance.
Academy : Red Hat Certified Engineer (RHCE) is an advanced level certification for Red Hat Certified System Administrator (RHCSA) and determines.
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Relationships July 9, Producers and Consumers SERI - Relationships Session 1.
Dev and Test Environments in the Cloud
Kelly Boccia Abi Natarajan Konstantin Livitski Senthil Anand Subbanan Meyyappan 1.
Database Administration COMSATS INSTITUTE OF INFORMATION TECHNOLOGY, VEHARI.
Deploy With Confidence Minimize risks Improve business output Optimize resources.
©2002 B&R Software Technology - Automation Studio.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
Security monitoring boxes Andrew McNab University of Manchester.
Futures Lab: Biology Greenhouse gasses. Carbon-neutral fuels. Cleaning Waste Sites. All of these problems have possible solutions originating in the biology.
ANKITHA CHOWDARY GARAPATI
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
CIS/SUSL1 Fundamentals of DBMS S.V. Priyan Head/Department of Computing & Information Systems.
Characteristics of the Database Approach (Difference between traditional file processing and database approach) Redundancy Self-Describing nature of a.
LegendCorp What is System Center Virtual Machine Manager (SCVMM)? SCVMM at a glance Features and Benefits Components / Topology /
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
Virtual Application Profiler (VAPP) Problem – Increasing hardware complexity – Programmers need to understand interactions between architecture and their.
Software Engineering for Capstone Courses Richard Anderson CSE 481b Winter 2007.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
T EST T OOLS U NIT VI This unit contains the overview of the test tools. Also prerequisites for applying these tools, tools selection and implementation.
Tech Operation Operation’s KPI & Tasks Processes Team Architecture.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI UMD Roadmap Steven Newhouse 14/09/2010.
UNIX and SOFTWARE TOOLS Dr. Tran, Van Hoai Faculty of Computer Science and Engineering HCMC Uni. of Technology
Structured Container Delivery Oscar Renalias Accenture Container Lead (NOTE: PASTE IN PORTRAIT AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP)
Rapid Launch Workshop ©CC BY-SA.
Chapter 6: Securing the Cloud
Introduction to VMware Virtualization
Test Roles and Independence of Testing
Docker Birthday #3.
Cloud Management Mechanisms
UNIX/Linux Operating System
DAT381 Team Development with SQL Server 2005
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Mark Quirk Head of Technology Developer & Platform Group
Presentation transcript:

A Day in the Life of a Systems Administrator So you want to be a sysadmin? Presented by: Austin Grice and Gayathri Swaminathan Oklahoma Information Technology Mentorship Program

$whois austin

$whois gayathri Programmer Analyst Junior systems administrator Remote applications engineer Systems Engineer worked in Unix/Linux since 2002 performed large scale deployments since 2004 implemented ERPs since 2008

What is a sysadmin? System users DBA Developers Storage Network Security Applications Analysts Systems Engineer Image credit: Operations

$whereis problem Image credit:Prologue Films VFX for Marvel Studios

$grep clues Large infrastructure tied to service(s) Constant refresh projects Inconsistent or specific configurations Tough to measure and metric Tough to scale No hope for automation How do you document mammoth architectures of different types? Instant large learning curve for new hires

$find solutions Credit: Adjust the perspectives!

$diff solution1 solution2 solution Monitor monitor monitor - System profiling - Isolated test environment Figure initial requirements Record behaviors Analyze metrics and identify the useful ones Develop architecture Narrow design constraints Benchmark Load and regression tests - A great place to get your teams to collaborate!

$which solution

Model system 10 Credit: Hypervisor + OS Standard network profile Standard storage profile Standard host profiles Standard system profile Standard metrics and monitors

$vi behavior

Iterative life cycle Gather requirements Dependencies Define metrics Discuss placement of Security controls Start communications on integrations Initiate conversations on external interfaces Collect system behaviors Profile system Expect non-predictable behaviors

Tool chest

Now we have been introduced... A few questions to you! - How many of you can play a musical instrument? - Do you keep a log of number of lines of code you have written? - Who uses your code? - Who could use your code? - Raise your hand if you ever thought, I could write software for that! - How many of you use Linux? - How many of you use Unix/Linux? - How many of you have been in white board sessions with your professor or classmates?

The Unix Philosophy  Small is beautiful.  Make each program do one thing well.  Build a prototype as soon as possible.  Choose portability over efficiency.  Store numerical data in flat ASCII files.  Use software leverage to your advantage.  Use shell scripts to increase leverage and portability.  Avoid captive user interfaces.  Make every program a filter. Credit: Mike Gancarz Also refer: Notes of programming in C - Rob Pike -