System Operations IT-ST-FDO

Total Page:16

File Type:pdf, Size:1020Kb

System Operations IT-ST-FDO System Operations IT-ST-FDO Index: - Bash pag. 2 - Common Operations pag. 3 - EOS pag. 13 - Filesystem Operations pag. 16 - CASTOR pag. 23 - Interventions pag. 28 - How to implement the SSO on EOSCOCKPIT Machine pag. 34 - XrdFed pag. 38 - Rundeck pag. 40 - Gitlab pag. 41 - SAMBA pag. 45 Please remind that commands and procedures could be no longer updated. Please verify them before any use. Bash: Shell command line --> “command” “options” “arguments”. - scp [source] [dest] --> scp log.cron root@lxbst2277:/etc/file.conf --> Secure copy to other machines. - cp [options]... Source Dest --> Copy Source to Dest or Directory. - lp [options]...[file...] --> Send files to a printer. - cd [Options] [Directory] --> Change Directory - change the current working directory to a specific folder. - pwd [-LP] --> Print Working Directory. - ls [Options]... [File]... --> List information about files. - ll = ls -l [file] --> List directory contents using long list format. - cat [Options] [File]... --> Concatenate and print (display) the content of files. - grep [options] PATTERN [FILE...] --> Search file(s) for specific text. - sort [options] [file...] --> Sort text files. Sort, merge, or compare all lines from files given. - cut [OPTION]... [FILE]... --> Divide a file into several parts (columns). - tr [options]... SET1 [SET2] --> Translate, squeeze, and/or delete characters. - mv [options]... Source... Directory --> Move or rename files or directories. - source filename [arguments] --> Read and execute commands from the filename argument in the current shell context. - mkdir [Options] folder... --> Create new folder(s), if they do not already exist. - xrdcp [options] source destination --> Copies one or more files from one location to another. - df [option]... [file]... --> Disk Free - display free disk space. - alias [-p] [name[=value] ...] --> Create an alias that substitut a string with a word. - awk <options> 'Program' Input-File1 Input-File2 --> Find and Replace text, database sort/validate/index. - fs [Options --> la, sa, lq] [Directory] --> Permit to see who can access to files or directories on AFS. - rm [options]... file... --> Remove files (delete/unlink). - man [command name] --> Format and display help pages. - ssh --> ssh -l root [machine_name] or ssh [user@][hostname] --> OpenSSH SSH client (remote login program). - kinit [-R] --> Requests renewal of the ticket-granting ticket. - history --> Command Line history. → to remove a line from the history → history -d [line.number] - service [hostname or script-name] COMMAND --> Show the status or start, stop, and restart the daemons and other services. COMMAND = start – stop – status - restart - vimdiff [options] [file1] [file2] --> Edit one, two or more version of a file and show differences. - uptime --> Tell how long the system has been running. - /dev/urandom --> It is a random number generator to create random files. - less [path][script] --> See all code of the script - Parsing --> [script_path]... --[parameter1]... --[parameter2]... --> How to write a parsing of a script. - CTRL+R --> Reversed search - locate [word]--> Useful to find where are the logs - iftop – iotop – iostat --> Network monitoring - uname -a --> check name and so version of the machine - ifconfig → Check information in the machine, IP, MAC address, etc... - eos-disk-menu.py - uname -r → check kernel version of a machine (if you want to compare what is in GRUB → cat /boot/grub/grub.conf) - service iptables stop → Stop the firewall - wall → to send messages to everybody connected in one machine - who → to see who is connected in the console - last --> show last logged in users, crashes and reboots Common Operations: How to create a new directory and an empty file: [root@lxfsrd06c03 ~]# mkdir /etc/castor/ [root@lxfsrd06c03 ~]# echo -n > /etc/castor/castor.conf Special Characters: # --> Comment. * --> String wildcard. \ --> Quote next character. > --> Output redirect. < --> Input redirect. & --> Background job: [command..] > [file] & --> Send output in background to a file. | --> Pipe: redirect the output of a command into the standard input of another command instead of a file. ; --> Shell command separator, permits putting two or more commands on the same line. ` --> Back tick: everything you type between backticks is evaluated (executed) by the shell before the main command. Automated Operations: - for i in [host1] [host2] [host3] ...; do echo “[command] $i”; done | sh Parallel Login: - wassh -t 99999 -l root [host1],[host2],[host3] “[command]” File Permission: - ls -l /afs/.../file.key --> Check setted permissions. - chmod [600] /afs/.../file.key --> Set file permissions. Me Group Other RWX RWX RWX 4 2 1 - - - - - - ---> /afs/.../file.key 6 0 0 How to make a script executable: - chmod +x [script_path] Phyton Debug --> PDB or strace -p [PID] Service Now (SNOW) assignments: In case of Hardware problems → Repair Services In case of Software problems → Sys Admins Team In case of a network cable problem → Facility operation (search the FE in snow) How to recover AFS home directory from backup: This procedure is for the WORK space. Concerning the user space have a look on the link below. ~/tmp$ fs mkm -dir test -vol work.$USER.backup ~/tmp$ ls test (copy stuff) eventually ~/tmp$ fs rmm -dir test https://cern.service-now.com/service-portal/article.do?n=KB0000430 To recover single files written after 6:30 pm of the previous day it is needed to use → afs restore Check information about users and groups: - getent passwd [user] - getent group [GID] - ls -l [path] - id [user] - groups [user] - getacl [path] - chown user:group [path] --> change ownership - ACLs → http://eos.readthedocs.org/en/latest/configuration/permission.html How to see if a machine is an headnode: - cat /etc/sysconfig/eos - nslookup [ip] How to transform a vertical list in an horizontal one: for i in `cat /afs/cern.ch/user/a/afiorot/LISTS/abc`; do echo "$i "| tr '\n' ' '; done How to check the status of all the nodes in an instance: [afiorot@aiadm054 ~]$ for i in `wassh -c eoslhcb --list`; do roger show $i 2>/dev/null | tr '\n' ' ' | tr '[{}]:,' ' ';echo; done | awk '{print $1, $2, $3, $4, $9, $10, $8, $13, $14, $15, $16, $17, $18, $19, $20}' | sort for i in `wassh -cl eos/cms/storage --list`; do roger show $i 2>/dev/null | tr '\n' ' ' | tr '[{}]:,' ' ';echo; done 2>/dev/null --> if there are errors in the output the commmand delete them tr '\n' '|' --> If there are more variables in column, this command put them in one line tr " " "\n" --> If I have variables on the same lines, this command put them in column [root@p05508916e55509 ~]# cat /afs/cern.ch/user/a/afiorot/LISTS/ldap | tr '\n' '|' | sed 's/||/\n/g' | tr '|' ' ' | grep -E "gidNumber|uidNumber" Service or process problems: if there is some problem or error messages with services or processes, restart it --> service [srvname] restart When service goes down: -Check which kind of error is form IT Status Board How to do some statistic: [afiorot@c2atlassrv301 ~]$ zgrep atlspecial /var/log/castor/stagerd.log-201412* | grep atnight | tr ' ' '\n' | grep Filename | sort | uniq -c | sort -nr [afiorot@c2atlassrv301 ~]$ zgrep atlspecial /var/log/castor/stagerd.log-201412* | grep atnight | tr ' ' '\n' | grep Type | sort | uniq -c | sort -nr How to see the mapping of a user: [afiorot@c2atlassrv301 ~]$ grep atlas003 /etc/grid-security/grid-mapfile How to add a machine in Puppet: echo "c2repack-2.cern.ch 128.142.37.94 C8-60-00-1B-D8-D6" | ai-foreman addhost -o "SLC 6.7" --architecture "x86_64" --hostgroup "castor/c2repack/headnode" --environment "production" --ptable "Castor_MDRaid1_SystemOnSmallestDisks" -m "SLC" How to check the list of files are present in a CASTOR pool: /afs/cern.ch/project/castor/www/DiskPoolDump/lhcb.lhcbdisk.last.gz How to create directory in EOS and list them: - eos mkdir /eos/castorlhcb-decommission/lhcbt3.remains - eos ls -l /eos/castorlhcb-decommission/ drwxrwsr-+ 1 afiorot c3 1 Jun 03 17:17 castor drwxrwsr-+ 1 root root 2 Sep 14 15:31 lhcbdisk.remains drwxrwsr-+ 1 root root 0 Sep 16 14:08 lhcbt3.remains How to sum a list of number: …........ 17268959 942202576 289531559 [afiorot@wlustagemanu ~]$ awk '{ sum += $1 } END { print sum }' /afs/cern.ch/user/a/afiorot/list.txt 11780693487319 LEMON METRICS: Exceptions: If there is some unusual exception: search for it in --> ls /etc/lemon/agent/metrics/ | grep [exception] take the ID look in the https://metricmgr.cern.ch How to read a metric: In case I want to know how the following Notification works --> exception.packetsDropped Find the notification in metricmgr.cern.ch –> look for the correlation, that in this case is: Correlation: ((13367:1 eq 'interface') || (13367:3 > 300 ) || (13367:5 > 300)) The correlation explain how the exception works and which counters are taken in consideration. 13367:1 → the first field indicate the number of the metric, while the second one the index of that metric have a look at the Metrics page in metricmgr.cern.ch → Open the Metric class for details In the correlation are taken into account 3 fields (1-3-5) that correspond to: 1 InterfaceName 3 NumReceivedDroppedLastInterval 5 NumTransmittedDroppedLastInterval At this point we know what the correlation means: if “NumReceivedDroppedLastInterval” or “NumTransmittedDroppedLastInterval” are more than 300 during 5 min of interval, the notification will be raised. - To check that the interval is 5 min → login in metricmgr → open the notification –> Edit → Period (300 sec in this case) How to disable a metric temporary: lemon-host-check -d ID --duration=2678400
Recommended publications
  • Performance Counters in Htop 3.0
    Slide: [ ] Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command Performance counters in htop 3.0 Hisham Muhammad @[email protected] https://hisham.hm Slide: [ 2 ] Date: 2018-08-25 Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command About me original author of htop, a project started in 2004 http://hisham.hm/htop/ lead dev of LuaRocks, package manager for Lua http://luarocks.org/ co-founder of the GoboLinux distribution http://gobolinux.org/ developer at Kong – FLOSS API gateway http://getkong.org/ (we’re hiring!) Slide: [ 3 ] Date: 2018-08-25 Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command What is htop an interactive process manager intended to be “a better top” by this all I originally meant was: scrolling! (versions of top improved a lot since!) Slide: [ 4 ] Date: 2018-08-25 Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command Hello, htop! Slide: [ 5 ] Date: 2018-08-25 Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command htop beyond Linux Linux MacOS FreeBSD OpenBSD DragonFlyBSD Solaris (illumos) Slide: [ 6 ] Date: 2018-08-25 Talk: Perf counters in htop 3.0 Presenter: https://hisham.hm PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command Then Apple released a broken kernel..
    [Show full text]
  • 20 Linux System Monitoring Tools Every Sysadmin Should Know by Nixcraft on June 27, 2009 · 315 Comments · Last Updated November 6, 2012
    About Forum Howtos & FAQs Low graphics Shell Scripts RSS/Feed nixcraft - insight into linux admin work 20 Linux System Monitoring Tools Every SysAdmin Should Know by nixCraft on June 27, 2009 · 315 comments · Last updated November 6, 2012 Need to monitor Linux server performance? Try these built-in commands and a few add-on tools. Most Linux distributions are equipped with tons of monitoring. These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as: 1. Finding out bottlenecks. 2. Disk (storage) bottlenecks. 3. CPU and memory bottlenecks. 4. Network bottlenecks. #1: top - Process Activity Command The top program provides a dynamic real-time view of a running system i.e. actual process activity. By default, it displays the most CPU-intensive tasks running on the server and updates the list every five seconds. Fig.01: Linux top command Commonly Used Hot Keys The top command provides several useful hot keys: Hot Usage Key t Displays summary information off and on. m Displays memory information off and on. Sorts the display by top consumers of various system resources. Useful for quick identification of performance- A hungry tasks on a system. f Enters an interactive configuration screen for top. Helpful for setting up top for a specific task. o Enables you to interactively select the ordering within top. r Issues renice command.
    [Show full text]
  • Nginx 1 Web Server Implementation Cookbook
    Nginx 1 Web Server Implementation Cookbook Over 100 recipes to master using the Nginx HTTP server and reverse proxy Dipankar Sarkar BIRMINGHAM - MUMBAI This material is copyright and is licensed for the sole use by 2135 Lymington on 26th March 2012 2135 Lymington, Carrollton, 75007 Nginx 1 Web Server Implementation Cookbook Copyright © 2011 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: May 2011 Production Reference: 1180511 Published by Packt Publishing Ltd. 32 Lincoln Road Olton Birmingham, B27 6PA, UK. ISBN 978-1-849514-96-5 www.packtpub.com Cover Image by Javier Barria ([email protected]) This material is copyright and is licensed for the sole use by 2135 Lymington
    [Show full text]
  • Pluggable Authentication Modules
    Who this book is written for This book is for experienced system administrators and developers working with multiple Linux/UNIX servers or with both UNIX and Pluggable Authentication Windows servers. It assumes a good level of admin knowledge, and that developers are competent in C development on UNIX-based systems. Pluggable Authentication Modules PAM (Pluggable Authentication Modules) is a modular and flexible authentication management layer that sits between Linux applications and the native underlying authentication system. The PAM framework is widely used by most Linux distributions for authentication purposes. Modules Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX. This book provides a practical approach to UNIX/Linux authentication. The design principles are thoroughly explained, then illustrated through the examination of popular modules. It is intended as a one-stop introduction and reference to PAM. What you will learn from this book From Technologies to Solutions • Install, compile, and configure Linux-PAM on your system • Download and compile third-party modules • Understand the PAM framework and how it works • Learn to work with PAM’s management groups and control fl ags • Test and debug your PAM confi guration Pluggable Authentication Modules • Install and configure the pamtester utility
    [Show full text]
  • Additional Software 1 Additional Software
    Additional Software 1 Additional Software 1 Additional Software 15 Feb 2014 1 1.1 Description 1.1 Description Where to get software written by other parties that might be useful (or necessary) when running mod_perl. 1.2 Perl Perl is probably already installed on your machine, but you should at least check the version you are using. It is highly recommended that you have at least Perl version 5.004. You can get the latest perl version from http://cpan.org/src/. Try the direct download link http://cpan.org/src/stable.tar.gz. You can get Perl documentation from the same location (although copious documentation is included in the downloaded Perl distribution). 1.3 CPAN Downloads You can download most of the Perl modules from CPAN. There are many mirrors of this site. The main site’s URL is http://cpan.org/. You may want to search the Perl modules database by using http://search.cpan.org/. Either use the search form, or type in the name of the package the module is distributed in. For example if you are looking for Apache::DumpHeaders, you can type: http://search.cpan.org/search?dist=Apache-DumpHeaders . 1.4 Apache Get the latest Apache webserver and documentation from http://httpd.apache.org. Try the direct download link http://httpd.apache.org/dist/. 1.5 Squid - Internet Object Cache http://www.squid-cache.org/ Squid Linux 2.x Redhat RPMs : http://home.earthlink.net/~intrep/linux/ 1.6 thttpd - tiny/turbo/throttling HTTP server http://www.acme.com/software/thttpd/ 1.7 mod_proxy_add_forward Ask Bjoern Hansen has written the mod_proxy_add_forward.c module for Apache that sets the X-Forwarded-For field when doing a ProxyPass, similar to what Squid does.
    [Show full text]
  • Strong Distributed Authentication Architecture for UNIX Ashwin Ganti
    University of Illinois at Chicago Strong Distributed Authentication Architecture for UNIX by Ashwin Ganti A PROJECT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE MASTER OF SCIENCE in COMPUTER SCIENCE Approved, MASTERS PROJECT COMMITTEE Jon Solworth, Adviser Associate Professor of Computer Science V.N. Venkatakrishnan Assistant Professor of Computer Science Chicago, Illinois December, 2007 This project is dedicated to my family. Acknowledgments I would like to thank my adviser Jon Solworth for his invaluable guidance throughout the course of the research for this project and for having been most patient and supportive of me during the entire duration of my time in graduate school. Ashwin 2 Contents 1 Introduction 7 2 Overview of the Frameworks used 9 2.1 PAM........................................ 10 2.2 Name Service Module . 11 2.3 IPSec . 12 3 System Design 12 3.1 Statics . 12 3.1.1 Modules of the system . 12 3.1.2 Relation between the Modules . 13 3.1.3 SayAnything Certificates Used . 13 3.1.4 Relation between certificates . 15 3.2 Dynamics - Logical Flow . 17 4 System Internals 18 4.1 pam sayAnything . 18 4.2 nss sayAnything . 18 4.2.1 getpwuid (uid t uid) . 19 4.2.2 getpwnam (char* name) . 20 4.2.3 setpwent (void) . 20 4.2.4 getpwent (void) . 20 4.2.5 endpwent (void) . 21 4.3 sayAnything Agent . 21 4.3.1 Overview . 22 4.3.2 Logical Flow . 22 4.4 Certificate Server . 24 3 4.4.1 Add Certificate . 24 4.4.2 Get Certificate . 24 5 System Administration 25 5.1 pam sayAnything .
    [Show full text]
  • Systemd – Easy As 1, 2, 3
    Systemd – Easy as 1, 2, 3 Ben Breard, RHCA Solutions Architect, Red Hat [email protected] Agenda ● Systemd functionality ● Coming to terms ● Learning the basics ● More advanced topics ● Learning the journal ● Available resources 2 Systemd is more than a SysVinit replacement 3 Systemd is a system and service manager 4 Systemd Overview ● Controls “units” rather than just daemons ● Handles dependency between units. ● Tracks processes with service information ● Services are owned by a cgroup. ● Simple to configure “SLAs” based on CPU, Memory, and IO. ● Properly kill daemons ● Minimal boot times ● Debuggability – no early boot messages are lost ● Easy to learn and backwards compatible. 5 Closer look at Units 6 Systemd - Units ● Naming convention is: name.type ● httpd.service, sshd.socket, or dev-hugepages.mount ● Service – Describe a daemon's type, execution, environment, and how it's monitored. ● Socket – Endpoint for interprocess communication. File, network, or Unix sockets. ● Target – Logical grouping of units. Replacement for runlevels. ● Device – Automatically created by the kernel. Can be provided to services as dependents. ● Mounts, automounts, swap – Monitor the mounting/unmounting of file systems. 7 Systemd – Units Continued ● Snapshots – save the state of units – useful for testing ● Timers – Timer-based activation ● Paths – Uses inotify to monitor a path ● Slices – For resource management. ● system.slice – services started by systemd ● user.slice – user processes ● machine.slice – VMs or containers registered with systemd 8 Systemd – Dependency Resolution ● Example: ● Wait for block device ● Check file system for device ● Mount file system ● nfs-lock.service: ● Requires=rpcbind.service network.target ● After=network.target named.service rpcbind.service ● Before=remote-fs-pre.target 9 That's all great .......but 10 Replace Init scripts!? Are you crazy?! 11 We're not crazy, I promise ● SysVinit had a good run, but leaves a lot to be desired.
    [Show full text]
  • Server: Apache
    Modern Trends in Network Fingerprinting SecTor [11.21.07] Jay Graver Ryan Poppa // Fingerprinting Topics Why, What, Who & How? Tools in action Why Tools Break Tools EOL New Approaches New Tool // Why Fingerprint? WhiteHat needs accurate identification of hosts in a PenTest report BlackHat reconnaissance SysAdmins track down and identify new services or hosts when they appear on their network // What is a Fingerprint? Looking at something common … 192.168.2.187:8004 192.168.2.187 [152] 48 54 54 50 2f 31 2e 31 20 32 30 30 20 4f 4b 0d HTTP/1.1 200 OK. 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 63 6c 6f .Connection: clo 73 65 0d 0a 41 6c 6c 6f 77 3a 20 4f 50 54 49 4f se..Allow: OPTIO 4e 53 2c 20 47 45 54 2c 20 48 45 41 44 2c 20 50 NS, GET, HEAD, P 4f 53 54 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e OST..Content‐Len 67 74 68 3a 20 30 0d 0a 44 61 74 65 3a 20 46 72 gth: 0..Date: Fr 69 2c 20 30 32 20 4e 6f 76 20 32 30 30 37 20 32 i, 02 Nov 2007 2 32 3a 32 35 3a 31 38 20 47 4d 54 0d 0a 53 65 72 2:25:18 GMT..Ser 76 65 72 3a 20 6c 69 67 68 74 74 70 64 2f 31 2e ver: lighttpd/1. 34 2e 31 35 0d 0a 0d 0a 4.15...
    [Show full text]
  • Next Generation Web Scanning Presentation
    Next generation web scanning New Zealand: A case study First presented at KIWICON III 2009 By Andrew Horton aka urbanadventurer NZ Web Recon Goal: To scan all of New Zealand's web-space to see what's there. Requirements: – Targets – Scanning – Analysis Sounds easy, right? urbanadventurer (Andrew Horton) www.morningstarsecurity.com Targets urbanadventurer (Andrew Horton) www.morningstarsecurity.com Targets What does 'NZ web-space' mean? It could mean: •Geographically within NZ regardless of the TLD •The .nz TLD hosted anywhere •All of the above For this scan it means, IPs geographically within NZ urbanadventurer (Andrew Horton) www.morningstarsecurity.com Finding Targets We need creative methods to find targets urbanadventurer (Andrew Horton) www.morningstarsecurity.com DNS Zone Transfer urbanadventurer (Andrew Horton) www.morningstarsecurity.com Find IP addresses on IRC and by resolving lots of NZ websites 58.*.*.* 60.*.*.* 65.*.*.* 91.*.*.* 110.*.*.* 111.*.*.* 113.*.*.* 114.*.*.* 115.*.*.* 116.*.*.* 117.*.*.* 118.*.*.* 119.*.*.* 120.*.*.* 121.*.*.* 122.*.*.* 123.*.*.* 124.*.*.* 125.*.*.* 130.*.*.* 131.*.*.* 132.*.*.* 138.*.*.* 139.*.*.* 143.*.*.* 144.*.*.* 146.*.*.* 150.*.*.* 153.*.*.* 156.*.*.* 161.*.*.* 162.*.*.* 163.*.*.* 165.*.*.* 166.*.*.* 167.*.*.* 192.*.*.* 198.*.*.* 202.*.*.* 203.*.*.* 210.*.*.* 218.*.*.* 219.*.*.* 222.*.*.* 729,580,500 IPs. More than we want to try. urbanadventurer (Andrew Horton) www.morningstarsecurity.com IP address blocks in the IANA IPv4 Address Space Registry Prefix Designation Date Whois Status [1] -----
    [Show full text]
  • Linux Pocket Guide.Pdf
    3rd Edition Linux Pocket Guide ESSENTIAL COMMANDS Daniel J. Barrett 3RD EDITION Linux Pocket Guide Daniel J. Barrett Linux Pocket Guide by Daniel J. Barrett Copyright © 2016 Daniel Barrett. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebasto‐ pol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promo‐ tional use. Online editions are also available for most titles (http://safaribook‐ sonline.com). For more information, contact our corporate/institutional sales department: 800-998-9938 or [email protected]. Editor: Nan Barber Production Editor: Nicholas Adams Copyeditor: Jasmine Kwityn Proofreader: Susan Moritz Indexer: Daniel Barrett Interior Designer: David Futato Cover Designer: Karen Montgomery Illustrator: Rebecca Demarest June 2016: Third Edition Revision History for the Third Edition 2016-05-27: First Release See http://oreilly.com/catalog/errata.csp?isbn=9781491927571 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Linux Pocket Guide, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellec‐ tual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.
    [Show full text]
  • Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9
    Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9 First Published: 2019-01-09 Last Modified: 2019-05-20 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Lab 09: Operating System Basics
    ESE 150 – Lab 09: Operating System Basics LAB 09 Today’s Lab has the following objectives: 1. Learn how to remotely log into Eniac Linux server 2. Learn some of the basics of process management on the Linux Operating System This lab will take place in Ketterer (Moore 200). Background: OPERATING SYSTEMS We learned in lecture that a CPU can really only execute one task or instruction (like ADD or SUBTRACT, etc) at a time. The Operating System is a program that runs on a CPU with the job of managing the CPU’s time. It schedules programs that user’s would like run for time on the CPU, essentially its main job is to keep the CPU busy. Another aspect of the OS is to protect access to the hardware that surrounds the CPU (like input and output devices – keyboards, mice, etc.) so that programs don’t have direct access to the hardware, but instead ask the OS for permission to access it. This also lends itself to “virtualizing” the CPU and its hardware so that each program that runs on the CPU believes it is the only program running on the CPU at any given time. Before the personal computer existed, before Mac OS and Windows came into being, an operating system named UNIX was written to manage large computers at AT&T Bell Laboratories in the 1970s that became a model for modern operating systems (like Windows, and Mac OSX). In the 1990’s an operating system named Linux was invented modeled very heavily on the UNIX operating system.
    [Show full text]