... tasks that you might never have considered
automating.
Automating Linux
and Unix System
Administration
Second Edition
Nate Campi and Kirk Bauer
INTRODUCTION
xxiv
Downloading the Code
The ... Telegraph Avenue, Suite 600,
Berkeley, CA 947 05. Phone 51 0 -54 9 -59 30, fax 51 0 -54 9 -59 39, e-mail ejbk<]lnaoo*_ki, or visit
dppl6++sss*]lnaoo*_ki.
Apress and friends o...
... some
CHAPTER 4 CONFIGURING SYSTEMS WITH CFENGINE
56
`a^e]j[0[,ba4,[[ .5, [.3bb[baa4 [51 -,ba4,[[ .5, [.3bb[baa4 [51 elr0[ -5. elr0[ -5. [-24
elr0[ -5. [-24[-elr0[ -5. [-24[-[-hejqthejqt[.[2[-4[1[]i`20hejqt[t42[20
hejqt[t42[20[.[2[-4[1[]i`20
hejqt[t42[20[.[2[-4[1[]i`20[[-[OIL[O]p[@a_[ ... entries. On every system, the behao section
checks and fixes the ownership and perm...
... master, system upgrade, and patching procedures is easy before
the systems and procedures are put into use. Once you’ve been deploying and updating
systems using automated means, reorganizing and ...
odahh_kii]j`o6
]hh66
+qon+^ej+n`]pa)ojpl-peiakqp9/,
na`d]p*Dn,.[M-66
+qon+hk_]h+o^ej+hkc[l]_g]cao^]_gcnkqj`9pnqa
On all systems, the n`]pa command is execut...
... +ap_+n_.*`+O55nqjkj_a script runs only once, and upon completion it moves itself
to a file name that won’t be executed by Solaris upon subsequent boots:
_dik`311+]+ap_+n_.*`+O55nqjkj_a
77
ao]_
_kjbecqnalksani]j]caiajp
oa`o+qj_kjbecqna`+jkodqp`ksj++]+ap_+lksan*_kjb:+]+ap_+lksan*_kjb*oa`
ir+]+ap_+lksan*_kjb*oa`+]+ap_+lksan*_kjb
laniepnkkphkcejkranood...
... applications and data from mul-
tiple systems. You can modify the files on any system, and the changes become instantly
available on all other systems.
Problems with network filesystems begin ... client systems inoperable.
With NFS, a user should have the same user ID on all systems. All file ownership on
an NFS filesystem—well, any filesystem, really—is assigned by user IDs (UIDs) an...
... has bugs; and all manner of issues crop up that
cause hosts and applications to fail. System and service monitoring is automation’s com-
panion tool, used to notify us when systems and applications ... chapter, and we believe that our choices will scale with your
environment as it grows.
have chosen Nagios for our system and service monitoring system. Nagios is flex-
ibl...
... entries:
+ap_+l]oos`6c]jche]6t6-,26- ,56 C]jche]Ikjepkn6+qon+lgc+c]jche]6+^ej+b]hoa
+ap_+cnkql6c]jche]6t6- ,56
+ap_+od]`ks6c]jche]66-0-,/6, 655 555 63666
Next, we created a cfengine task ... COURSE
Most system administrators are familiar with the `ebb and l]p_d commands. The `ebb command is
used to compare text files line by line and show the differences. The l]p_d comm...
... You can validate this with the
)O argument to the
l]oos` command on Linux:
oq`kl]oos`)Oj]ceko
j]cekoH,4+.0+.,,4, 55 555 3)-
The H in the output shows that the account is locked. This ... oq`kl]oos`)oj]ceko
j]cekoLO,4+.0+,4, 55 555 3
The LO field denotes either “passworded” or “locked,” but we know our j]ceko
l]oo...