Coder Social home page Coder Social logo

andresf91 / linux-sysops-handbook Goto Github PK

View Code? Open in Web Editor NEW

This project forked from abarrak/linux-sysops-handbook

0.0 0.0 0.0 908 KB

A study notes book for the common knoweldge and tasks of Linux system admins.

Home Page: https://abarrak.gitbook.io/linux-sysops-handbook

linux-sysops-handbook's Introduction

Linux SysOps Handbook

A study notes book for the common knowledge and tasks of a Linux system admin.

GitBook.

Table of Content

  1. Processes
  2. User Management
  3. Shell Tips and Tricks
  4. File Permissions
  5. Background Services and Crons
  6. Linux Distros
  7. Logs, Monitoring, and Troubleshooting
  8. Network Essentials
  9. System Updates and Patching
  10. Storage
  11. Notes & Additional Resources

1 - Processes

List the current active process with their statuses, numbers, resource usage, etc. using the command ps.

$ ps -auxc

Quoting man's page documentaiton on ps: "A different set of processes can be selected for display by using any combination of the -a, -G, -g, -p, -T, -t, -U, and -u options. If more than one of these options are given, then ps will select all processes which are matched by at least one of the given options".

The daemon systemd process starts during boot time, and remains active until the shutdown. It's the parent process for all other process in the system.

Each process contains several main parts, such as: PID, state, virtual space address (memory), threads, network and file descriptors, scheduler information, and links. Processes are controlled and respond to signals. The states that a process can transistion among are depicted below:

To observe the states and other information of the processes interatively, use the top command.

2 - User Management

The users and groups are managed in /etc/passwd and /etc/group files.

$ tail /etc/passwd
$ tail /etc/group
$ tail /etc/shadow

The commands to manage a user are as follows:

  • useradd
  • usermod
  • userdel

And for groups:

  • groupadd
  • groupmod
  • groupdel

Each user in the system is associated with unique user id uid, and each group is associated with gid.

$ id abdullah

Use flags -g and -aG for users to replace group or append group, respectively:

$ sudo usermod -G admins abdullah
$ sudo usermod -aG staff abdullah

To lock or unlock a user account, us the -L, -U options respectively.

$ usermod -L <username>
$ usermod -U <username>

To restrict service user accounts (e.g. accounts for web servers), the shell can be set to nologin:

$ usermod -s /sbin/nologin nginx_usr1

To change a user password, use the command passwd interactively. Additionally change command sets the password policy in the system.

Use the command su - <username> to switch to the specified user. which will promote for her password. Running the command without username will switch to the root user. To avoid cases where password is not available, use sudo to switch accounts using current user password only and according to rules in /etc/sudoers directory. Use sudo -i to gain an interactive root shell.

To run executables as background process (job), append an ampersand to it:

$ echo "Hi .. looping:" | sleep 10000 | echo "done." &

To view the current jobs, and their details run job, ps j commands respectively.

To bring back a job in the foreground in the current session, and send it back use the following:

$ fg %<job-no>
$ ctrl+z
$ bg %<job-no>

Use the command kill -l to see the available signals to send to processes, like interrupt, terminate, resume, etc.

$ kill -l
$ kil -9 5921
$ kill -SIGTERM 6152

Use killall to operate on multiple processes using their executable name. Use pkill for filtering with more options.

$ killall -15 nginx
$ pkill -U tester

3 - Shell Tips and Tricks

Getting used to bash language and its fundamentals like conditions, looping, functions, etc. is recommended.

The popular files and text processing and manipulation utilites are important to master, such as:

  • cat
  • cp
  • rm
  • mkdir
  • rmdir
  • touch
  • less
  • more
  • head
  • tail
  • grep
  • find
  • locate
  • wc
  • sed

Use the command date to print the current date and time or others in the past and future:

$ date +%x

The ssh command used to connect to servers in secure manner using OpenSSH library using public key cryptography. The configuration and known hosts are kept under /etc/ssh system-wide or in ~/.ssh/ in current user's home directory. On the other hand scp is used for secure copy on secure shell fashion.

The following list of commands are used to generate and manage ssh keys between client and server:

  1. ssh-keygen.
  2. ssh-agent.
  3. ssh-copy-id.
  4. ssh-add.

4 - File Permissions

A file permissions are considered in three dimensions: the owner user, the owner's group, and rest of other users.

Showing the permisison of files and directories can be using ls -l, ls -ld respectively.

The basic permission types are: read (r), write (w), and execute (x) on both folders and files:

$ ls -l
-rw-r--r--  1 abdullah  staff  35149 Jan 30 17:20 LICENSE

Setting the files and folders permission is done by chmod command and can be using symbols or digits.

The symbols/letter way is made for u, g, o, or a basis for the user, group, others, or all. Whereas, the digits are written for all at once in sequence for user, group, and others. Examples are below for both cases:

# Use + to add, - to remove, and = to reset.

# adding execute permission to user
$ chmod u+x my-file.txt
# setting read, execute to all on a folder and its content
$ chmod -R a=rX my-folder

$ chmod 740 special.txt
$ chmod -R 444 read-only-files/

chown is used to change the ownership of folder/files to users or groups respectively. chgrp is a shortcut to group change only. The root or the owner are only people can change ownership and in the latter, she needs to be part of the new target group before the change.

$ chown sarah file-10.txt
$ chown sarah:staff file-12.txt

$ chown :admins server_log.txt
$ chgrp operators server_log.txt

Lastly, a fourth dimension at the start can be added to represent the special permissions of suid s, sgid s, and sticky t which control executable nature of files to be of owner users, and groups regardless of the current user. The last is to restrict deletion for only the root and owner always.

$ chmod a+t protected-folder/
$ chmod -R 1444 read-only-protected/

Finally, use pstree and pgrep to view process parent/child tree and search for processes by pattern.

$ psgrep -u abdullah -l

5 - Background Services and Crons

systemctl is the command used to list, manage, and check background processes or so called daemons.

To list the available categories of daemons, run:

$ systemctl -t help

There are 3 types of daemons: 1. services, 2. sockets, 3. paths. Use the following to see the system's processes in each:

$ systemctl
$ systemctl list-units --type=service
$ systemctl list-units --type=socket --state=LOAD
$ systemctl list-units --type=path --all
$ systemctl list-unit-files

The states enabled and disabled indicate wether a service is lanuched on startup or not. The subcommands enable and disable can be used to control this aspect.

To view the status of a daemon use the status command or its state shortcuts:

$ systemctl status kubelet
$ systemctl is-active dockerd
$ systemctl is-enabled sshd.service

Use the subcommands start, stop, restart, and reload, reload-or-restart to control daemons.

Additionally, use the following to list a daemon dependencies:

$ systemctl list-dependencies nginx.service

Finally, to resolve conflicting services making them unavailable, the mask and unmask commands can be used to point a deamons config to dev/null then back to normal respectively.

6 - Linux Distros

In 1991, Linux kernel was introduced by Linus Torvalds, and combined with GNU project, which is previosuly created in 1990 as open source OS programs and components. This formed what we call today Linux distribution, a Unix-like operating system.

Today the Linux operating system is supported on most hardware platforms. Linux works on almost every architecture from i386 to SPARC. Linux can be found on almost every type of device today, from watches, televisions, mobile phones, servers, desktops, and even vending machines.

One of the major distinction between Linux distributions is the package management part and how software is installed and managed. There are multiple package formats, and the most common ones are Debian (deb), RedHat Package Manager (RPM).

Here's a listing for the common Debian based distros:

  • Debian.
  • Ubuntu.
  • Linux Mint.
  • Kali Linux.

And here's for RPM based distros:

  • Fedora.
  • RedHat Enterprise Linux (RHEL).
  • CentOS.
  • openSUSE.

7 - Logs, Monitoring, and Troubleshooting

You can monitor the system's resources usage, uptime, and sessions' load leverages over time as follows:

$ top
$ uptime
$ w

Use lscpu to see the system's CPU in use and other details.

The logs of the system events and processes traces are usually kept in /var/log directory. There are two categories of persistent logs (rsyslogs) and temporary logs (journald) that are wiped across boots. Logs include syslog protocol messages, events, security incidents, mailing logs, jobs logs, and other program logs.

As explored in section (3), use cat, head, tail commands to interactively see or follow the logs.

$ head -n 50 /var/logs/mail.log
$ tail -f /var/logs/mysql.log

You can configure the syslog service and manage it as any daemon:

$ vim /etc/rsyslog.conf
$ systemctl reload rsyslog

On the other hand, use journalctl to view and follow the system's journald log entries, which resides in run/log/journal.

$ journalctl -n 50 -p err 
$ journalctl -f
$ journalctl _PID=6610

8 - Network Essentials

For effective work on the system network configurations and troubleshooting, it is essential to review network/internet protocols (TCP/UDP) and IPv4/IPv6 concepts (Ref.1), (Ref.2).

See the hostname of current machine or set it as below:

$ hostname
$ hostnamectl set-hostname rhel.n1.apps.com

The host name is managed under /etc/hostname.

The host connection is either managed dynamically (DHCP) configured in /etc/resolv.conf or manually in /etc/hosts file.

The ping utiltiy helps for connectivity checking:

$ ping 172.168.9.13
$ ping -c4 github.com
$ ping6 2001:db8:3333:4444:5555:6666:7777:8888

To see the network routing table and interfaces, use the following:

$ ip routes
$ ip -6 route
$ ip show link

Use the command nmap for advanced network investigation and security monitor and scan.

# Scan a single ip address
$ nmap 192.168.1.1
 
# Scan a host name 
$ nmap -v server1.cyberciti.biz

# View open ports:
$ nmap --open 192.168.2.18

# Trace all pakets:
$ nmap --packet-trace 192.168.1.1

NetworkManager is the kernel feature to manage netowrk configurations in Linux. nmcli is the terminal utility.

$ nmcli device wifi list
$ nmcli dev status
$ nmcli general hostname centos-8.cluster.internal
$ nmcli con show 

9 - System Updates and Patching

Managing the system packages varies depending on linux distributions, but the essential parts are the same (installation, repositories, package managers, etc.). For Debian based distribtuions, apt is the package manager, whereas for Fedora / RHEL, yum is used.

Search for some package:

$ apt search <KEYWORD>
$ yum search <KEYWORD>

Install a package:

$ apt install <NAME>
$ yum install <NAME>

Update a package or all packages:

$ apt update <NAME>
$ yum update <NAME>

Remove a package:

$ apt remove <NAME>
$ yum remove <NAME>

Show details on a package:

$ apt show <NAME>
$ yum info <NAME>

List all current packages on the system:

$ apt list
$ yum list

Audit the history of pacakge management actions:

$ cat less /var/log/apt/history.log | less
$ cat less /var/log/dnf.rpm.log | less

And finally, the package source repos can be set up and updated through the following:

# list current enabled repos
$ yum repolist all
$ apt-cache policy

# manage and add repos in these directories:
$ cat /etc/apt/sources.list /etc/apt/sources.list.d/*
$ cat /etc/yum.repos.d/*

10 - Storage

Linux is formed for a unified file-system consists of all file systems provided by the hardware or virtual storage devices attached to the system. Essentially, everything in linux is a file. It can be viewed as a reversed tree of nested directories starting from the root directory /.

Block devices are the mechanism that the kernel detects and identify raw storage devices (HDD, SSD, USBs, ..). As the name indicates, the kernel interfaces and references them by fixed-size blocks (chunks of spaces). The block devices are stored in /dev directory by the OS, and has letters naming convention such as /dev/sda, /dev/sdb, /dev/vda, and appended numbers in case of partitions /dev/sda3. The attachment of the block device into the system is done through mounting it to a directory in the system.

Two operations are essential for using block storages:

1. Partiition:

Breaking the disk into reusable smaller units, each treated as own disk. The main partitioning methods are MBR (Master Boot Record) and GPT (GUID Partition Table).

2. Formatting:

Prepeating the device as a file-system to be read and write to. Many file-system formats exists like:

  • Ext4.
  • XFS.
  • Btrfs.
  • ZFS.

Additionall, LVM and RAID are another two concepts where the first operate on the opposite of partitioning and group multiple disks as one logical volume. The latter (Redundant Array of Independent Disks) is used to architect more advanced storage setup to ensure higher availablity, redundency, RD, etc.

To see the currently attached file system with mounts and a directory space usage, run df/du commands:

$ df -H
$ du -H /home/abdullah

The lsof command lists all active proccess using the block device.

The permanent mounting process rely on /etc/fstab file to determine devices to mount on the boot time.

Use the commands lsblk and monunt to check and mount file-sytem devices, respectively.

11 - Notes & Additional Resources

Use the man command to lookup the manual information on commands or topics in the system.

Additionally, the info command is the GNU documentation tool and provide more detailed materials.

Both provide shortcuts, navigation, and searching capablities (e.g. man -K <keyword to search across manual).

Recommened Reading List

Books:

  1. How Linux Works What Every Superuser Should Know, Brian Ward, 2nd Edition, No Starch Press..
  2. Linux Command Line and Shell Scripting Bible, R. Blum and C. Bresnahan, 3rd Edition, Wiley.
  3. Linux Bible, Christopher Negus, 9th Edition, Wiley.

Websites & Blogs:

  1. Digital Occean Knowledge Hub.
  2. 9 to 5 Linux Blog.
  3. nixCraft.

License

GNU General Public License v3.0.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.