Sei sulla pagina 1di 14

Unit 4:

System Services
Welcome!
2
Unit-4: System Services

Network Time Protocol

Configure System Logging

X Window System

emotely !dministering system

"utom!te #o$s wit% & cront!$

Configuring Printing
3
Network Time Protocol
NTP stands for Network Time Protocol, and it is an
Internet protocol used to synchronize the clocks of
computers to some time reference. NTP is an
Internet standard protocol originally developed by
Professor David . !ills at the "niversity of
Delaware.
NTP is one of the oldest Internet protocols still in use
#since before $%&'(
4
Network Time Protocol
NTP uses a hierarchical system of )clock strata). The stratum levels define the
distance from the reference clock and e*ist to prevent cycles in the hierarchy.
+reen line #direct connection( and ,ed line #network connection(
5
Network Time Protocol
NTP is configured in 'etc'nt()conf.
-an also be configured using system-config-d!te
6
System Logging
.ariety of log files are maintained. /nd its understanding is often vital for
troubleshooting system problems. The centralized logging is provided by two
daemons 0
syslogd
*logd
1ome of the more important log files that are a part of system administrator2s
forte are as follows0
'v!r'log'dmesg 3 This log file is written upon system boot. It contains
messages from the kernel that were raised during the boot process. 4ou can
also view them using the command0 dmesg
'v!r'log'mess!ges 3 This is the standard system log file, which contains
messages from all your system software, non3kernel boot issues, and
messages that go to 2dmesg2.
7
System Logging
'v!r'log'm!illog 3 This log file contains messages and errors from your
sendmail.
'v!r'log'secure 3 This log file contains messages and errors from security
related systems such as login, tcp5wrappers, and *inetd. This log file is very
useful in detecting and investigating network abuse.
+!in Configur!tion ,iles:
'etc'syslog)conf
'etc'sysconfig'syslog
8
emote X Sessions
ss%d 3 1shd #Secure S%ell -!emon( is the daemon program for ssh.
Together these programs replace rlogin and rsh programs, and provide secure
encrypted communications between two untrusted hosts over an insecure
network.
'v!r'log'secure 3 This log file contains messages and errors from security
related systems such as login, tcp5wrappers, and *inetd. This log file is very
useful in detecting and investigating network abuse.
+!in Configur!tion ,iles:
'etc'syslog)conf
'etc'sysconfig'syslog
9
*ernel +odules
The inu* kernel has a modular design. /t boot time, only a minimal resident
kernel is loaded into memory. Thereafter, whenever a user re6uests a
feature that is not present in the resident kernel, a kernel module,
sometimes referred to as a driver, is dynamically loaded into memory.
During installation, the hardware on the system is probed. 7ased on this probing
and the information provided by the user, the installation program decides
which modules need to be loaded at boot time. The installation program sets
up the dynamic loading mechanism to work transparently.
8ithout modules, we would have to build monolit%ic kernels and add new
functionality directly into the kernel image. 7esides having larger kernels
#l!rger foot-(rint(, this has the disadvantage of re6uiring us to rebuild and
reboot the kernel every time we want new functionality.
ocated under 'li$'modules'./un!me -r0 '
10
*ernel +odules Utilities
lsmod0 gives a list of currently loaded modules
mod(ro$e0 can be used to load or unload a module
mod(ro$e -r us$1stor!ge
modinfo0 can be used to display the information regarding a module
modinfo us$1stor!ge
11
+!n!ging initrd 2m!ge

Initial ,/! disk provides the basic set of modules 9 drivers re6uired to boot
the machine.

ocated under '$oot'initrd-./un!me -r0)img

-an be recre!ted, if deleted, by using :mkinitrd; command

-an be re$uild by using :mkinitrd; command using :33with; option


mkinitrd --wit%3us$1stor!ge '$oot'initrd-./un!me -r0)img ./un!me -r0
12
sysctl: (ersistent kernel configur!tion

sysctl is used to modify kernel parameters at runtime.

ist all the current settings0


sysctl -!

To configure a parameter using :sysctl; command

sysctl -w net)i(v4)icm(1ec%o1ignore1!ll 3 4

!ake the changes permanent by giving

sysctl -(
13
56(loring 7!rdw!re -evices

ls(ci 0 to list current P-I devices.

lsus$ 0 to list current "17 connected devices.

%!l-device-m!n!ger 0 display devices in graphical window


?
Questions

Potrebbero piacerti anche