i
Installation in Standalone Machine
Installation through NFS
Installation Through FTP
Installation Through HTTP
Installation Through KICKSTART
Creation Of File Systems
Understanding EXT2, EXT3 & EXT4 File Systems
Converting Ext2 to Ext3 File Systems
Reverting back from Ext3 to Ext2 File systems
Understanding fdisk, e2label, mount, umount commands
Understanding fstab and mtab Hles
File System Management Troubleshooting
Understanding different types of groups and creation of groups
Creation of users in different groups
Understanding Passwd, Shadow Files
Understanding Passwd Aging
Creation of Quotas for Users, Groups and File Systems
Understanding Users Security Files
The different commands for Monitoring the Users
User Management Troubleshooting
Understanding the different types of run-levels
Understanding different types of shutdown commands
Understanding run control scripts
Understanding NFS server and NFS clients
Understanding daemons and Files in NFS of boot phases
Configuring NFS server and different NFS clients
Configuration of autofs, NFS security
Understanding the features and advantages of FTP Server
Configuring FTP server and FTP clients
Configuring FTP server for anonymous and real Users with download and upload permissions
Configuring FTP User access, FTP security
Understanding FTP Basic Commands
Configuring of Anonymous FTP Server
Understanding XINETD based and non XINETD based services
Configuring XINETD based services
XINETD security
Understanding DNS Service and different types of DNS Servers
Configuring DNS (Master) DNS (Slave)
Understanding & Configuring forward (DNS) and cache (DNS) of boot phases
Understanding different types of files when the system is booting
DNS Troubleshooting
Creation of file systems and converting into LVM
Creation of Physical Partitions
Creation of Volume Groups
Creation of Logical Partitions
Extending the Volume Group
Extending the Logical Partitions
Understanding the features and advantages of RPM
Installation of RPM Packages
Up-gradation of RPM
Verification of RPM
Querying
RPM Troubleshooting
Understanding different types of File System Backup
Understanding different types of Files Backups
Understanding different types of Dump Levels
Understanding Monthly, Weekly, Daily Backups
Different types of Backup strategies
Understanding NIS and daemons at NIS (Server, Slave and Clients)
Configuring NIS (Master), NIS (Slave) and NIS clients
Integrating NIS ( Master and Slave) with NFS Server
Understanding of APACHE
Configuring APACHE Web Server with virtual hosting
Configuring APACHE Web Server with IP BASED, HOST BASED and PORT BASED
Understanding the features and advantages of Samba Server
Configuring SAMBA for heterogeneous environment
Sharing the resources between Unix to Unix using SAMBA
Sharing the resources between Windows to Unix (vice-versa)
SAMBA security
Automate backups on Linux
If you utilize the UNIX operating system, you have already got access to very powerful tools for making custom backup solutions. The solutions during this article will assist you to perform easy to a lot of advanced and secure network backups victimization open-supply tools that square measure a part of nearly each UNIX operating system distribution.
Simple backups
This article follows a stepwise approach that's quite easy once you follow the essential steps.
Let's begin with an easy, nonetheless powerful archive mechanism on our thanks to a lot of advanced distributed backup resolution. Let's examine a handy script known as arc, which can enable North American country to make backup snapshots from a UNIX operating system shell prompt.
1. The arc shell script
a.) #!/bin/sh
b.) tar czvf $1.$(date +%Y%m%d-%H%M%S).tgz $1
c.) exit $?
The arc script obtains one file or directory name as a parameter and creates a constricted archive file with this date embedded into the coming archive file's name.
The use of the date command to enter a date and timestamp helps to prepare your archived files. The date format is Year, Month, Day, Hour, Minutes, and Seconds -- though the employment of the second's field is probably a small amount a lot of. read the person page for the date command (mandate) to find out regarding different choices. Also, in Listing one, we tend to pass the -v (verbose) choice to tar. This causes tar to show all of the files it's archiving. take away the -v choice if you would like the backup to proceed mutely.
2. Archiving the beoserver directory
a.) $ ls
b.) arc beoserver
c.) $ ./arc beoserver
d.) beoserver/
e.) beoserver/bookl.dat
f.) beoserver/beoserver_ab_off
g.) beoserver/beoserver_ab_on
h.) $ ls
i.) arc beoserver beoserver.20040321-014844.tgz
Advanced backups
This simple backup example is useful; but, it still includes a manual backup method. The industry's best practices suggest backing up usually, onto multiple media, and to separate geographic locations. The central plan is to avoid relying entirely on any single storage media or single location.
We'll tackle this challenge in our next example, wherever we'll examine a fictitious distributed network, illustrated in Figure one, that shows a computer user with access to 2 remote servers associated with an offsite information storage server.
Distributed network
The backup files on Server #1 and #2 are firmly transmitted to the offsite storage server, and also the entire distributed backup method can occur on an everyday basis while not human intervention. We'll use a collection of ordinary tools that square measure a part of the Open Secure Shell tool suite (OpenSSH), also because the tape archiver (tar), and also the cron task programming service. Our overall set up is to use cron for programming, shell programming and also the tar application throughout the backup method, OpenSSH secure shell (ssh) cryptography for remote access, and
authentication, and secure shell copy (SCP) to alter file transfers. make certain to review every tool's man page for added info.
Don't miss out!