Jump To Close Expand all Collapse all Table of contents Introduction To System Administration Introduction Expand section "Introduction" Collapse section "Introduction" 1. Architecture-specific Information 2. More to Come Expand section "2. More to Come" Collapse section "2. More to Come" 2.1. Send in Your Feedback 1. The Philosophy of System Administration Expand section "1. The Philosophy of System Administration" Collapse section "1. The Philosophy of System Administration" 1.1. Automate Everything 1.2. Document Everything 1.3. Communicate as Much as Possible Expand section "1.3. Communicate as Much as Possible" Collapse section "1.3. Communicate as Much as Possible" 1.3.1. Tell Your Users What You Are Going to Do 1.3.2. Tell Your Users What You Are Doing 1.3.3. Tell Your Users What You Have Done 1.4. Know Your Resources 1.5. Know Your Users 1.6. Know Your Business 1.7. Security Cannot be an Afterthought Expand section "1.7. Security Cannot be an Afterthought" Collapse section "1.7. Security Cannot be an Afterthought" 1.7.1. The Risks of Social Engineering 1.8. Plan Ahead 1.9. Expect the Unexpected 1.10. Red Hat Enterprise Linux-Specific Information Expand section "1.10. Red Hat Enterprise Linux-Specific Information" Collapse section "1.10. Red Hat Enterprise Linux-Specific Information" 1.10.1. Automation 1.10.2. Documentation and Communication 1.10.3. Security 1.11. Additional Resources Expand section "1.11. Additional Resources" Collapse section "1.11. Additional Resources" 1.11.1. Installed Documentation 1.11.2. Useful Websites 1.11.3. Related Books 2. Resource Monitoring Expand section "2. Resource Monitoring" Collapse section "2. Resource Monitoring" 2.1. Basic Concepts 2.2. System Performance Monitoring 2.3. Monitoring System Capacity 2.4. What to Monitor? Expand section "2.4. What to Monitor?" Collapse section "2.4. What to Monitor?" 2.4.1. Monitoring CPU Power 2.4.2. Monitoring Bandwidth 2.4.3. Monitoring Memory 2.4.4. Monitoring Storage 2.5. Red Hat Enterprise Linux-Specific Information Expand section "2.5. Red Hat Enterprise Linux-Specific Information" Collapse section "2.5. Red Hat Enterprise Linux-Specific Information" 2.5.1. free 2.5.2. top Expand section "2.5.2. top" Collapse section "2.5.2. top" 2.5.2.1. The GNOME System Monitor -- A Graphical top 2.5.3. vmstat 2.5.4. The Sysstat Suite of Resource Monitoring Tools Expand section "2.5.4. The Sysstat Suite of Resource Monitoring Tools" Collapse section "2.5.4. The Sysstat Suite of Resource Monitoring Tools" 2.5.4.1. The iostat command 2.5.4.2. The mpstat command 2.5.4.3. The sadc command 2.5.4.4. The sar command Expand section "2.5.4.4. The sar command" Collapse section "2.5.4.4. The sar command" 2.5.4.4.1. Reading sar Reports 2.5.5. OProfile Expand section "2.5.5. OProfile" Collapse section "2.5.5. OProfile" 2.5.5.1. OProfile Components 2.5.5.2. A Sample OProfile Session 2.6. Additional Resources Expand section "2.6. Additional Resources" Collapse section "2.6. Additional Resources" 2.6.1. Installed Documentation 2.6.2. Useful Websites 2.6.3. Related Books 3. Bandwidth and Processing Power Expand section "3. Bandwidth and Processing Power" Collapse section "3. Bandwidth and Processing Power" 3.1. Bandwidth Expand section "3.1. Bandwidth" Collapse section "3.1. Bandwidth" 3.1.1. Buses Expand section "3.1.1. Buses" Collapse section "3.1.1. Buses" 3.1.1.1. Examples of Buses 3.1.2. Datapaths Expand section "3.1.2. Datapaths" Collapse section "3.1.2. Datapaths" 3.1.2.1. Examples of Datapaths 3.1.3. Potential Bandwidth-Related Problems 3.1.4. Potential Bandwidth-Related Solutions Expand section "3.1.4. Potential Bandwidth-Related Solutions" Collapse section "3.1.4. Potential Bandwidth-Related Solutions" 3.1.4.1. Spread the Load 3.1.4.2. Reduce the Load 3.1.4.3. Increase the Capacity 3.1.5. In Summary… 3.2. Processing Power Expand section "3.2. Processing Power" Collapse section "3.2. Processing Power" 3.2.1. Facts About Processing Power 3.2.2. Consumers of Processing Power Expand section "3.2.2. Consumers of Processing Power" Collapse section "3.2.2. Consumers of Processing Power" 3.2.2.1. Applications 3.2.2.2. The Operating System 3.2.3. Improving a CPU Shortage Expand section "3.2.3. Improving a CPU Shortage" Collapse section "3.2.3. Improving a CPU Shortage" 3.2.3.1. Reducing the Load Expand section "3.2.3.1. Reducing the Load" Collapse section "3.2.3.1. Reducing the Load" 3.2.3.1.1. Reducing Operating System Overhead 3.2.3.1.2. Reducing Application Overhead 3.2.3.1.3. Eliminating Applications Entirely 3.2.3.2. Increasing the Capacity Expand section "3.2.3.2. Increasing the Capacity" Collapse section "3.2.3.2. Increasing the Capacity" 3.2.3.2.1. Upgrading the CPU 3.2.3.2.2. Is Symmetric Multiprocessing Right for You? 3.3. Red Hat Enterprise Linux-Specific Information Expand section "3.3. Red Hat Enterprise Linux-Specific Information" Collapse section "3.3. Red Hat Enterprise Linux-Specific Information" 3.3.1. Monitoring Bandwidth on Red Hat Enterprise Linux 3.3.2. Monitoring CPU Utilization on Red Hat Enterprise Linux 3.4. Additional Resources Expand section "3.4. Additional Resources" Collapse section "3.4. Additional Resources" 3.4.1. Installed Documentation 3.4.2. Useful Websites 3.4.3. Related Books 4. Physical and Virtual Memory Expand section "4. Physical and Virtual Memory" Collapse section "4. Physical and Virtual Memory" 4.1. Storage Access Patterns 4.2. The Storage Spectrum Expand section "4.2. The Storage Spectrum" Collapse section "4.2. The Storage Spectrum" 4.2.1. CPU Registers 4.2.2. Cache Memory Expand section "4.2.2. Cache Memory" Collapse section "4.2.2. Cache Memory" 4.2.2.1. Cache Levels 4.2.3. Main Memory -- RAM 4.2.4. Hard Drives 4.2.5. Off-Line Backup Storage 4.3. Basic Virtual Memory Concepts Expand section "4.3. Basic Virtual Memory Concepts" Collapse section "4.3. Basic Virtual Memory Concepts" 4.3.1. Virtual Memory in Simple Terms 4.3.2. Backing Store -- the Central Tenet of Virtual Memory 4.4. Virtual Memory: The Details Expand section "4.4. Virtual Memory: The Details" Collapse section "4.4. Virtual Memory: The Details" 4.4.1. Page Faults 4.4.2. The Working Set 4.4.3. Swapping 4.5. Virtual Memory Performance Implications Expand section "4.5. Virtual Memory Performance Implications" Collapse section "4.5. Virtual Memory Performance Implications" 4.5.1. Worst Case Performance Scenario 4.5.2. Best Case Performance Scenario 4.6. Red Hat Enterprise Linux-Specific Information 4.7. Additional Resources Expand section "4.7. Additional Resources" Collapse section "4.7. Additional Resources" 4.7.1. Installed Documentation 4.7.2. Useful Websites 4.7.3. Related Books 5. Managing Storage Expand section "5. Managing Storage" Collapse section "5. Managing Storage" 5.1. An Overview of Storage Hardware Expand section "5.1. An Overview of Storage Hardware" Collapse section "5.1. An Overview of Storage Hardware" 5.1.1. Disk Platters 5.1.2. Data reading/writing device 5.1.3. Access Arms 5.2. Storage Addressing Concepts Expand section "5.2. Storage Addressing Concepts" Collapse section "5.2. Storage Addressing Concepts" 5.2.1. Geometry-Based Addressing Expand section "5.2.1. Geometry-Based Addressing" Collapse section "5.2.1. Geometry-Based Addressing" 5.2.1.1. Cylinder 5.2.1.2. Head 5.2.1.3. Sector 5.2.1.4. Problems with Geometry-Based Addressing 5.2.2. Block-Based Addressing 5.3. Mass Storage Device Interfaces Expand section "5.3. Mass Storage Device Interfaces" Collapse section "5.3. Mass Storage Device Interfaces" 5.3.1. Historical Background 5.3.2. Present-Day Industry-Standard Interfaces Expand section "5.3.2. Present-Day Industry-Standard Interfaces" Collapse section "5.3.2. Present-Day Industry-Standard Interfaces" 5.3.2.1. IDE/ATA 5.3.2.2. SCSI 5.4. Hard Drive Performance Characteristics Expand section "5.4. Hard Drive Performance Characteristics" Collapse section "5.4. Hard Drive Performance Characteristics" 5.4.1. Mechanical/Electrical Limitations Expand section "5.4.1. Mechanical/Electrical Limitations" Collapse section "5.4.1. Mechanical/Electrical Limitations" 5.4.1.1. Command Processing Time 5.4.1.2. Heads Reading/Writing Data 5.4.1.3. Rotational Latency 5.4.1.4. Access Arm Movement 5.4.2. I/O Loads and Performance Expand section "5.4.2. I/O Loads and Performance" Collapse section "5.4.2. I/O Loads and Performance" 5.4.2.1. Reads Versus Writes 5.4.2.2. Multiple Readers/Writers 5.4.2.3. Locality of Reads/Writes 5.5. Making the Storage Usable Expand section "5.5. Making the Storage Usable" Collapse section "5.5. Making the Storage Usable" 5.5.1. Partitions/Slices Expand section "5.5.1. Partitions/Slices" Collapse section "5.5.1. Partitions/Slices" 5.5.1.1. Partition Attributes Expand section "5.5.1.1. Partition Attributes" Collapse section "5.5.1.1. Partition Attributes" 5.5.1.1.1. Geometry 5.5.1.1.2. Partition Type Expand section "5.5.1.1.2. Partition Type" Collapse section "5.5.1.1.2. Partition Type" 5.5.1.1.2.1. Primary Partitions 5.5.1.1.2.2. Extended Partitions 5.5.1.1.2.3. Logical Partitions 5.5.1.1.3. Partition Type Field 5.5.2. File Systems Expand section "5.5.2. File Systems" Collapse section "5.5.2. File Systems" 5.5.2.1. File-Based Storage 5.5.2.2. Hierarchical Directory Structure 5.5.2.3. Tracking of File Creation, Access, Modification Times 5.5.2.4. Access Control 5.5.2.5. Accounting of Space Utilized 5.5.3. Directory Structure 5.5.4. Enabling Storage Access 5.6. Advanced Storage Technologies Expand section "5.6. Advanced Storage Technologies" Collapse section "5.6. Advanced Storage Technologies" 5.6.1. Network-Accessible Storage 5.6.2. RAID-Based Storage Expand section "5.6.2. RAID-Based Storage" Collapse section "5.6.2. RAID-Based Storage" 5.6.2.1. Basic Concepts Expand section "5.6.2.1. Basic Concepts" Collapse section "5.6.2.1. Basic Concepts" 5.6.2.1.1. RAID Levels Expand section "5.6.2.1.1. RAID Levels" Collapse section "5.6.2.1.1. RAID Levels" 5.6.2.1.1.1. RAID 0 5.6.2.1.1.2. RAID 1 5.6.2.1.1.3. RAID 5 5.6.2.1.1.4. Nested RAID Levels 5.6.2.1.2. RAID Implementations Expand section "5.6.2.1.2. RAID Implementations" Collapse section "5.6.2.1.2. RAID Implementations" 5.6.2.1.2.1. Hardware RAID 5.6.2.1.2.2. Software RAID 5.6.3. Logical Volume Management Expand section "5.6.3. Logical Volume Management" Collapse section "5.6.3. Logical Volume Management" 5.6.3.1. Physical Storage Grouping 5.6.3.2. Logical Volume Resizing 5.6.3.3. Data Migration 5.6.3.4. With LVM, Why Use RAID? 5.7. Storage Management Day-to-Day Expand section "5.7. Storage Management Day-to-Day" Collapse section "5.7. Storage Management Day-to-Day" 5.7.1. Monitoring Free Space Expand section "5.7.1. Monitoring Free Space" Collapse section "5.7.1. Monitoring Free Space" 5.7.1.1. Excessive Usage by a User Expand section "5.7.1.1. Excessive Usage by a User" Collapse section "5.7.1.1. Excessive Usage by a User" 5.7.1.1.1. Handling a User's Excessive Usage 5.7.1.2. Excessive Usage by an Application 5.7.1.3. Normal Growth in Usage 5.7.2. Disk Quota Issues 5.7.3. File-Related Issues Expand section "5.7.3. File-Related Issues" Collapse section "5.7.3. File-Related Issues" 5.7.3.1. File Access 5.7.3.2. File Sharing 5.7.4. Adding/Removing Storage Expand section "5.7.4. Adding/Removing Storage" Collapse section "5.7.4. Adding/Removing Storage" 5.7.4.1. Adding Storage Expand section "5.7.4.1. Adding Storage" Collapse section "5.7.4.1. Adding Storage" 5.7.4.1.1. Installing the Hardware Expand section "5.7.4.1.1. Installing the Hardware" Collapse section "5.7.4.1.1. Installing the Hardware" 5.7.4.1.1.1. Adding ATA Disk Drives 5.7.4.1.1.2. Adding SCSI Disk Drives 5.7.4.1.2. Partitioning 5.7.4.1.3. Formatting the Partition(s) 5.7.4.1.4. Updating System Configuration 5.7.4.1.5. Modifying the Backup Schedule 5.7.4.2. Removing Storage Expand section "5.7.4.2. Removing Storage" Collapse section "5.7.4.2. Removing Storage" 5.7.4.2.1. Moving Data Off the Disk Drive 5.7.4.2.2. Erase the Contents of the Disk Drive 5.8. A Word About Backups… 5.9. Red Hat Enterprise Linux-Specific Information Expand section "5.9. Red Hat Enterprise Linux-Specific Information" Collapse section "5.9. Red Hat Enterprise Linux-Specific Information" 5.9.1. Device Naming Conventions Expand section "5.9.1. Device Naming Conventions" Collapse section "5.9.1. Device Naming Conventions" 5.9.1.1. Device Files Expand section "5.9.1.1. Device Files" Collapse section "5.9.1.1. Device Files" 5.9.1.1.1. Device Type 5.9.1.1.2. Unit 5.9.1.1.3. Partition 5.9.1.1.4. Whole-Device Access 5.9.1.2. Alternatives to Device File Names Expand section "5.9.1.2. Alternatives to Device File Names" Collapse section "5.9.1.2. Alternatives to Device File Names" 5.9.1.2.1. File System Labels 5.9.1.2.2. Using devlabel 5.9.2. File System Basics Expand section "5.9.2. File System Basics" Collapse section "5.9.2. File System Basics" 5.9.2.1. EXT2 5.9.2.2. EXT3 5.9.2.3. ISO 9660 5.9.2.4. MSDOS 5.9.2.5. VFAT 5.9.3. Mounting File Systems Expand section "5.9.3. Mounting File Systems" Collapse section "5.9.3. Mounting File Systems" 5.9.3.1. Mount Points 5.9.3.2. Seeing What is Mounted Expand section "5.9.3.2. Seeing What is Mounted" Collapse section "5.9.3.2. Seeing What is Mounted" 5.9.3.2.1. Viewing /etc/mtab 5.9.3.2.2. Viewing /proc/mounts 5.9.3.2.3. Issuing the df Command 5.9.4. Network-Accessible Storage Under Red Hat Enterprise Linux Expand section "5.9.4. Network-Accessible Storage Under Red Hat Enterprise Linux" Collapse section "5.9.4. Network-Accessible Storage Under Red Hat Enterprise Linux" 5.9.4.1. NFS 5.9.4.2. SMB 5.9.5. Mounting File Systems Automatically with /etc/fstab 5.9.6. Adding/Removing Storage Expand section "5.9.6. Adding/Removing Storage" Collapse section "5.9.6. Adding/Removing Storage" 5.9.6.1. Adding Storage Expand section "5.9.6.1. Adding Storage" Collapse section "5.9.6.1. Adding Storage" 5.9.6.1.1. Partitioning 5.9.6.1.2. Formatting the Partition(s) 5.9.6.1.3. Updating /etc/fstab 5.9.6.2. Removing Storage Expand section "5.9.6.2. Removing Storage" Collapse section "5.9.6.2. Removing Storage" 5.9.6.2.1. Remove the Disk Drive's Partitions From /etc/fstab 5.9.6.2.2. Terminating Access With umount 5.9.6.2.3. Erase the Contents of the Disk Drive 5.9.7. Implementing Disk Quotas Expand section "5.9.7. Implementing Disk Quotas" Collapse section "5.9.7. Implementing Disk Quotas" 5.9.7.1. Some Background on Disk Quotas Expand section "5.9.7.1. Some Background on Disk Quotas" Collapse section "5.9.7.1. Some Background on Disk Quotas" 5.9.7.1.1. Per-File-System Implementation 5.9.7.1.2. Per-User Space Accounting 5.9.7.1.3. Per-Group Space Accounting 5.9.7.1.4. Tracks Disk Block Usage 5.9.7.1.5. Tracks Disk Inode Usage 5.9.7.1.6. Hard Limits 5.9.7.1.7. Soft Limits 5.9.7.1.8. Grace Periods 5.9.7.2. Enabling Disk Quotas 5.9.7.3. Managing Disk Quotas 5.9.8. Creating RAID Arrays Expand section "5.9.8. Creating RAID Arrays" Collapse section "5.9.8. Creating RAID Arrays" 5.9.8.1. While Installing Red Hat Enterprise Linux 5.9.8.2. After Red Hat Enterprise Linux Has Been Installed 5.9.9. Day to Day Management of RAID Arrays Expand section "5.9.9. Day to Day Management of RAID Arrays" Collapse section "5.9.9. Day to Day Management of RAID Arrays" 5.9.9.1. Checking Array Status With /proc/mdstat 5.9.9.2. Rebuilding a RAID array 5.9.10. Logical Volume Management 5.10. Additional Resources Expand section "5.10. Additional Resources" Collapse section "5.10. Additional Resources" 5.10.1. Installed Documentation 5.10.2. Useful Websites 5.10.3. Related Books 6. Managing User Accounts and Resource Access Expand section "6. Managing User Accounts and Resource Access" Collapse section "6. Managing User Accounts and Resource Access" 6.1. Managing User Accounts Expand section "6.1. Managing User Accounts" Collapse section "6.1. Managing User Accounts" 6.1.1. The Username Expand section "6.1.1. The Username" Collapse section "6.1.1. The Username" 6.1.1.1. Naming Conventions Expand section "6.1.1.1. Naming Conventions" Collapse section "6.1.1.1. Naming Conventions" 6.1.1.1.1. Dealing with Collisions 6.1.1.2. Dealing with Name Changes 6.1.2. Passwords Expand section "6.1.2. Passwords" Collapse section "6.1.2. Passwords" 6.1.2.1. Weak Passwords Expand section "6.1.2.1. Weak Passwords" Collapse section "6.1.2.1. Weak Passwords" 6.1.2.1.1. Short Passwords 6.1.2.1.2. Limited Character Set 6.1.2.1.3. Recognizable Words 6.1.2.1.4. Personal Information 6.1.2.1.5. Simple Word Tricks 6.1.2.1.6. The Same Password for Multiple Systems 6.1.2.1.7. Passwords on Paper 6.1.2.2. Strong Passwords Expand section "6.1.2.2. Strong Passwords" Collapse section "6.1.2.2. Strong Passwords" 6.1.2.2.1. Longer Passwords 6.1.2.2.2. Expanded Character Set 6.1.2.2.3. Memorable 6.1.2.3. Password Aging 6.1.3. Access Control Information 6.1.4. Managing Accounts and Resource Access Day-to-Day Expand section "6.1.4. Managing Accounts and Resource Access Day-to-Day" Collapse section "6.1.4. Managing Accounts and Resource Access Day-to-Day" 6.1.4.1. New Hires 6.1.4.2. Terminations 6.1.4.3. Job Changes 6.2. Managing User Resources Expand section "6.2. Managing User Resources" Collapse section "6.2. Managing User Resources" 6.2.1. Who Can Access Shared Data Expand section "6.2.1. Who Can Access Shared Data" Collapse section "6.2.1. Who Can Access Shared Data" 6.2.1.1. Shared Groups and Data 6.2.1.2. Determining Group Structure 6.2.2. Where Users Access Shared Data Expand section "6.2.2. Where Users Access Shared Data" Collapse section "6.2.2. Where Users Access Shared Data" 6.2.2.1. Global Ownership Issues 6.2.2.2. Home Directories 6.2.3. What Barriers Are in Place To Prevent Abuse of Resources 6.3. Red Hat Enterprise Linux-Specific Information Expand section "6.3. Red Hat Enterprise Linux-Specific Information" Collapse section "6.3. Red Hat Enterprise Linux-Specific Information" 6.3.1. User Accounts, Groups, and Permissions Expand section "6.3.1. User Accounts, Groups, and Permissions" Collapse section "6.3.1. User Accounts, Groups, and Permissions" 6.3.1.1. Usernames and UIDs, Groups and GIDs 6.3.2. Files Controlling User Accounts and Groups Expand section "6.3.2. Files Controlling User Accounts and Groups" Collapse section "6.3.2. Files Controlling User Accounts and Groups" 6.3.2.1. /etc/passwd 6.3.2.2. /etc/shadow 6.3.2.3. /etc/group 6.3.2.4. /etc/gshadow 6.3.3. User Account and Group Applications Expand section "6.3.3. User Account and Group Applications" Collapse section "6.3.3. User Account and Group Applications" 6.3.3.1. File Permission Applications 6.4. Additional Resources Expand section "6.4. Additional Resources" Collapse section "6.4. Additional Resources" 6.4.1. Installed Documentation 6.4.2. Useful Websites 6.4.3. Related Books 7. Printers and Printing Expand section "7. Printers and Printing" Collapse section "7. Printers and Printing" 7.1. Types of Printers Expand section "7.1. Types of Printers" Collapse section "7.1. Types of Printers" 7.1.1. Printing Considerations Expand section "7.1.1. Printing Considerations" Collapse section "7.1.1. Printing Considerations" 7.1.1.1. Function 7.1.1.2. Cost 7.2. Impact Printers Expand section "7.2. Impact Printers" Collapse section "7.2. Impact Printers" 7.2.1. Dot-Matrix Printers 7.2.2. Daisy-Wheel Printers 7.2.3. Line Printers 7.2.4. Impact Printer Consumables 7.3. Inkjet Printers Expand section "7.3. Inkjet Printers" Collapse section "7.3. Inkjet Printers" 7.3.1. Inkjet Consumables 7.4. Laser Printers Expand section "7.4. Laser Printers" Collapse section "7.4. Laser Printers" 7.4.1. Color Laser Printers 7.4.2. Laser Printer Consumables 7.5. Other Printer Types 7.6. Printer Languages and Technologies 7.7. Networked Versus Local Printers 7.8. Red Hat Enterprise Linux-Specific Information 7.9. Additional Resources Expand section "7.9. Additional Resources" Collapse section "7.9. Additional Resources" 7.9.1. Installed Documentation 7.9.2. Useful Websites 7.9.3. Related Books 8. Planning for Disaster Expand section "8. Planning for Disaster" Collapse section "8. Planning for Disaster" 8.1. Types of Disasters Expand section "8.1. Types of Disasters" Collapse section "8.1. Types of Disasters" 8.1.1. Hardware Failures Expand section "8.1.1. Hardware Failures" Collapse section "8.1.1. Hardware Failures" 8.1.1.1. Keeping Spare Hardware Expand section "8.1.1.1. Keeping Spare Hardware" Collapse section "8.1.1.1. Keeping Spare Hardware" 8.1.1.1.1. Having the Skills 8.1.1.1.2. What to Stock? Expand section "8.1.1.1.2. What to Stock?" Collapse section "8.1.1.1.2. What to Stock?" 8.1.1.1.2.1. How Much to Stock? 8.1.1.1.3. Spares That Are Not Spares 8.1.1.2. Service Contracts Expand section "8.1.1.2. Service Contracts" Collapse section "8.1.1.2. Service Contracts" 8.1.1.2.1. Hours of Coverage Expand section "8.1.1.2.1. Hours of Coverage" Collapse section "8.1.1.2.1. Hours of Coverage" 8.1.1.2.1.1. Depot Service 8.1.1.2.2. Response Time Expand section "8.1.1.2.2. Response Time" Collapse section "8.1.1.2.2. Response Time" 8.1.1.2.2.1. Zero Response Time -- Having an On-Site Technician 8.1.1.2.3. Parts Availability 8.1.1.2.4. Available Budget 8.1.1.2.5. Hardware to be Covered 8.1.2. Software Failures Expand section "8.1.2. Software Failures" Collapse section "8.1.2. Software Failures" 8.1.2.1. Operating System Failures Expand section "8.1.2.1. Operating System Failures" Collapse section "8.1.2.1. Operating System Failures" 8.1.2.1.1. Crashes 8.1.2.1.2. Hangs 8.1.2.2. Application Failures 8.1.2.3. Getting Help -- Software Support Expand section "8.1.2.3. Getting Help -- Software Support" Collapse section "8.1.2.3. Getting Help -- Software Support" 8.1.2.3.1. Documentation 8.1.2.3.2. Self Support 8.1.2.3.3. Web or Email Support 8.1.2.3.4. Telephone Support 8.1.2.3.5. On-Site Support 8.1.3. Environmental Failures Expand section "8.1.3. Environmental Failures" Collapse section "8.1.3. Environmental Failures" 8.1.3.1. Building Integrity 8.1.3.2. Electricity Expand section "8.1.3.2. Electricity" Collapse section "8.1.3.2. Electricity" 8.1.3.2.1. The Security of Your Power 8.1.3.2.2. Power Quality 8.1.3.2.3. Backup Power Expand section "8.1.3.2.3. Backup Power" Collapse section "8.1.3.2.3. Backup Power" 8.1.3.2.3.1. Providing Power For the Next Few Seconds 8.1.3.2.3.2. Providing Power For the Next Few Minutes 8.1.3.2.3.3. Providing Power For the Next Few Hours (and Beyond) 8.1.3.2.4. Planning for Extended Outages 8.1.3.3. Heating, Ventilation, and Air Conditioning 8.1.3.4. Weather and the Outside World 8.1.4. Human Errors Expand section "8.1.4. Human Errors" Collapse section "8.1.4. Human Errors" 8.1.4.1. End-User Errors Expand section "8.1.4.1. End-User Errors" Collapse section "8.1.4.1. End-User Errors" 8.1.4.1.1. Improper Use of Applications 8.1.4.2. Operations Personnel Errors Expand section "8.1.4.2. Operations Personnel Errors" Collapse section "8.1.4.2. Operations Personnel Errors" 8.1.4.2.1. Failure to Follow Procedures 8.1.4.2.2. Mistakes Made During Procedures 8.1.4.3. System Administrator Errors Expand section "8.1.4.3. System Administrator Errors" Collapse section "8.1.4.3. System Administrator Errors" 8.1.4.3.1. Misconfiguration Errors Expand section "8.1.4.3.1. Misconfiguration Errors" Collapse section "8.1.4.3.1. Misconfiguration Errors" 8.1.4.3.1.1. Change Control 8.1.4.3.2. Mistakes Made During Maintenance 8.1.4.4. Service Technician Errors Expand section "8.1.4.4. Service Technician Errors" Collapse section "8.1.4.4. Service Technician Errors" 8.1.4.4.1. Improperly-Repaired Hardware 8.1.4.4.2. Fixing One Thing and Breaking Another 8.2. Backups Expand section "8.2. Backups" Collapse section "8.2. Backups" 8.2.1. Different Data: Different Backup Needs 8.2.2. Backup Software: Buy Versus Build 8.2.3. Types of Backups Expand section "8.2.3. Types of Backups" Collapse section "8.2.3. Types of Backups" 8.2.3.1. Full Backups 8.2.3.2. Incremental Backups 8.2.3.3. Differential Backups 8.2.4. Backup Media Expand section "8.2.4. Backup Media" Collapse section "8.2.4. Backup Media" 8.2.4.1. Tape 8.2.4.2. Disk 8.2.4.3. Network 8.2.5. Storage of Backups 8.2.6. Restoration Issues Expand section "8.2.6. Restoration Issues" Collapse section "8.2.6. Restoration Issues" 8.2.6.1. Restoring From Bare Metal 8.2.6.2. Testing Backups 8.3. Disaster Recovery Expand section "8.3. Disaster Recovery" Collapse section "8.3. Disaster Recovery" 8.3.1. Creating, Testing, and Implementing a Disaster Recovery Plan 8.3.2. Backup Sites: Cold, Warm, and Hot 8.3.3. Hardware and Software Availability 8.3.4. Availability of Backups 8.3.5. Network Connectivity to the Backup Site 8.3.6. Backup Site Staffing 8.3.7. Moving Back Toward Normalcy 8.4. Red Hat Enterprise Linux-Specific Information Expand section "8.4. Red Hat Enterprise Linux-Specific Information" Collapse section "8.4. Red Hat Enterprise Linux-Specific Information" 8.4.1. Software Support 8.4.2. Backup Technologies Expand section "8.4.2. Backup Technologies" Collapse section "8.4.2. Backup Technologies" 8.4.2.1. tar 8.4.2.2. cpio 8.4.2.3. dump/restore: Not Recommended for Mounted File Systems! 8.4.2.4. The Advanced Maryland Automatic Network Disk Archiver (AMANDA) 8.5. Additional Resources Expand section "8.5. Additional Resources" Collapse section "8.5. Additional Resources" 8.5.1. Installed Documentation 8.5.2. Useful Websites 8.5.3. Related Books A. Revision History Index Legal Notice Settings Close Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Appendix A. Revision History Revision HistoryRevision 2-7.4002013-10-31Rüdiger Landmann Rebuild with publican 4.0.0 Revision 2-72012-07-18Anthony Towns Rebuild for Publican 3.0 Revision 1.0-0Tue Sep 23 2008Don Domingo migrated to new automated build system Previous Next