Which methods are commonly used by sysadmins to organize issues check all that apply

A system administrator is responsible for the maintenance and security of computer networks. The job includes administering networks, individual systems, databases, web applications, mail servers and many more components. With crucial tasks such as these in hand, it is imperative that a system admin maintains a list of resources to fall back to in case of emergency, use them to expand knowledge- or just have some fun from the serious life. Here is a list of some top resources for such people!

Stack Exchange– Server Fault, Super User and StackOverflow:

Stack Exchange is a collection of over a hundred question and answer websites on diverse topics. For system admins, the sites that are most informative are StackOverflow and Super User. Server Fault is a website dedicated for system admins and contains lots of useful information. Don’t believe me? Check out this list of cool stuff that you can carry around in a thumb drive!

HackerNews

If you thought TechCrunch was everything, you definitely miss the bigger picture! HackerNews is a social website where common people submit their posts. It doesn’t only contain news about hackers and hacking, but some wonderful content on burning topics in IT and even entrepreneurship!

High Scalability

Being a system admin, you must encounter issues related to high availability architecture quite frequently. This website helps you in getting ideas to scale your applications, in addition to real life examples of companies that have been successful in scaling their products.

SpiceWorks

SpiceWorks is a community of IT professionals who mingle by showcasing their projects. It’s just not about that- SpiceWorks also has how-to articles, plugins, extensions and a question answer forum if you are in trouble.

xkcd

xkcd is a webcomic that concentrates on mathematical and scientific jokes. It also contains some comics related to IT. Overall, it provides you with a good read.

Security in Debian Systems

The security page in Debian gives you some good advice on how to secure your debian systems. The page contains archives of security related articles. You can even join their mailing list to keep updated on the same.

Reddit

Reddit is a social news and entertainment website where people can share information as links or text. There is a ranking system and information is organized into categories called subreddits. Some such subreddits useful for system programmers are programming, technology or information technology.

DailyVIM

VIM is one of the most popular text editors which can be run from within the terminal. DailyVIM provides tips, tricks, tutorials and howtos related to VIM.

TheDailyWTF

If you think that it happened only with you, you are probably mistaken. TheDailyWTF is a humorous blog that reports “curious perversions in Information Technology”. The blog provides you with examples of code that lead you to explain WTF!

Google Webmaster Blog

If you are a webmaster, you must have invariably used Google Webmasters at some point of time. In addition to that, SEO is certainly an important topic of discussion for you. The Google Webmaster Blog gives official news on crawling and indexing sites for the Google Index.

With this, we come to the end of the resources for a system admin. We hope that you enjoyed reading this post and would continue using these resources in the future!

System administrators are critical to the reliable and successful operation of an organization and its network operations center and data center. A sysadmin must have expertise with the system's underlying platform (i.e., Windows, Linux) as well as be familiar with multiple areas including networking, backup, data restoration, IT security, database operations, middleware basics, load balancing, and more. Sysadmin tasks are not limited to server management, maintenance, and repair, but also any functions that support a smoothly running production environment with minimal (or no) complaints from customers and end users.

Although sysadmins have a seemingly endless list of responsibilities, some are more critical than others. If you work in a sysadmin role (or hope to one day), make sure you are ready to follow these best practices.

Documentation

Documentation is how sysadmins keep records of assets, including hardware and software types, counts, and licenses. Should there be any issues in the production environment, documentation helps identify the hardware, virtual machine, appliance, software, etc., that may be involved.

Hardware inventory

Maintain lists of all your physical and virtual servers with the following details:

  • OS: Linux or Windows, hypervisor with versions
  • RAM: DIMM slots in physical servers
  • CPU: Logical and virtual CPUs
  • HDD: Type and size of hard disks
  • External storage (SAN/NAS): Make and model of storage with management IP address and interface IP address
  • Open ports: Ports opened at the server end for incoming traffic
  • IP address: Management and interface IP address with VLANs
  • Engineering appliances: e.g., Exalogic, PureApp, etc.

Software inventory

  • Configured applications: e.g., Oracle WebLogic, IBM WebSphere Application Server, Apache Tomcat, Red Hat JBoss, etc.
  • Third-party software: Any software not shipped with the installed OS

License details

Maintain license counts and details for physical servers and virtual servers (VMs), including licenses for Windows, subscriptions for Linux OS, and the license limit of hypervisor host.

Server health checkup

  • Running processes: Check for processes that are consuming more resources than expected, and take action to fine-tune the applications (with the help of the application team).
  • CPU utilization: Consistently monitor and check the CPU utilization of the critical process like "java", "http", "mysql" etc. to ensure that these are not consuming the CPU resources more than expected. If it is so, then coordinate with the application team to check it at application level  and fine tune the same. Parallely analyse the OS parameters like "Ulimits".
  • Memory utilization: Check memory utilization and clear the cache, if required.
  • Zombie processes: Check for processes where the PID still exists in the process table after it is terminated. Zombie processes degrade server performance, so find and kill any that exist.
  • Load average: If you're having performance issues, check the load average and tune the server for performance.
  • Disk/SAN/NAS utilization: Check the I/O reports for externally attached storage to track and check the speed of read/write operations. If you find any issues, coordinate with the storage and network teams immediately to correct them.

Backup and disaster recovery planning

Communicate with the backup team and provide them the data and client priorities for backup. The recommended backup criteria for production servers is:

  • Incremental backups: Daily, Monday to Friday
  • Full backup: Saturday and Sunday
  • Disaster recovery drills: Perform restoration mock drills once a month (preferably, or quarterly if necessary) with the backup team to ensure the data can be restored in case of an issue.

Patching

Operating system patches for known vulnerabilities must be implemented promptly. There are many types and levels of patches, including:

  • Security 
  • Critical 
  • Moderate

When a patch is released, check the bug or vulnerability details to see how it applies to your system (e.g., does the vulnerability affect the hardware in your system?), and take any necessary actions to apply the patches when required. Make sure to cross-verify applications' compatibility with patches or upgrades.

Application compatibility

Before going live with any application, check its compatibility with your hardware and operating system, and make sure to do load testing (with the support of application team).

Server hardening

Linux:

  • Set a BIOS password: This prevents users from altering BIOS settings.
  • Set a GRUB password: This stops users from altering the GRUB bootloader.
  • Deny root access: Rejecting root access minimizes the probability of intrusions.
  • Sudo users: Make sudo users and assign limited privileges to invoke commands.
  • TCP wrappers: This is the weapon to protect a server from hackers. Apply a rule for the SSH daemon to allow only trusted hosts to access the server, and deny all others. Apply similar rules for other services like FTP, SSH File Transfer Protocol, etc.
  • Firewalld/iptables: Configure firewalld and iptables rules for incoming traffic to the server. Include the particular port, source IP, and destination IP and allow, reject, deny ICMP requests, etc. for the public zone and private zone.
  • Antivirus: Install antivirus software and update virus definitions regularly.
  • Secure and audit logs: Check the logs regularly and when required.
  • Rotate the logs: Keep the logs for limited period of time like "for 7 days", to keep the sufficient disk space for flawless operation.

Windows:

  • Set a BIOS password: This prevents users from altering BIOS settings.
  • Antivirus: Install antivirus software and update virus definitions regularly.
  • Configure firewall rules: Prevent unauthorized parties from accessing your systems.
  • Deny administrator login: Limit users' ability to make changes that could increase your systems' vulnerabilities.

Use a syslog server

By configuring a syslog server in the environment to keep records of system and application logs, in the event of an intrusion or issue, the sysadmin can check previous and real-time logs to diagnose and resolve the problem.

Automation

Many sysadmin tasks (such as server health checkups, resource utilization, backup triggers, transfer files and logs, etc.) must be done at specific times. Therefore, the sysadmin must write scripts or use external tools and configure them as cron jobs to do the tasks automatically at the proper time.

Install and configure live monitoring tools like Nagios, HP, etc., to monitor your IT infrastructure and issue alerts about potential problems.

Conclusion

While these are the most important tasks a sysadmin is responsible for, there is much more to the role than the duties on this list.

For example, the sysadmin must coordinate with multiple teams to resolve issues, communicate with and update customers, maintain 100% uptime, hold discussions with the audit team, prepare weekly/monthly/quarterly reports, do continuous monitoring of servers and services using appropriate tools, and maintain the hardware console and respond to any triggered alarms.

The sysadmin is always a single point of content (SPOC) in the data center or network operations center for issues related to web hosting, application and server outages, and other critical IT operations problems.

What other tasks or best practices do you think are essential for sysadmins? Please share your opinion in the comments.

Which methods are commonly used by sysadmins to organize issues check all that apply
This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License.

Which methods are commonly used by sysadmins to organize issues C?

The methods that are commonly used by sysadmins to organize issues are random check on machines and service monitoring alerts. These methods enables them to quickly detect issues. Service monitoring alerts will enable the sysadmins to get notified whenever there is a problem with any of the systems.

What factors are most important when planning for disaster recovery check all that apply?

1 Procure sturdy devices. 2 Deleting old backups. 3 Physically distant backup location. 4 Regular backups.

What are potential responsibilities of sysadmin choose three 3 that apply?

Sysadmins are responsible for managing, troubleshooting, licensing, and updating hardware and software assets. You will ensure that appropriate measures are proactively followed in response to unforeseen issues such as IT downtime or zero-day exploits.

Which of these are common responsibilities of systems administrators quizlet?

Which of these are common responsibilities of systems administrators? Constantly troubleshoot problems such as network issues. Help users with issues, such as lost password or logon problems.