Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Linux Administration Best Practices

You're reading from   Linux Administration Best Practices Practical solutions to approaching the design and management of Linux systems

Arrow left icon
Product type Paperback
Published in Mar 2022
Publisher Packt
ISBN-13 9781800568792
Length 404 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Scott Alan Miller Scott Alan Miller
Author Profile Icon Scott Alan Miller
Scott Alan Miller
Arrow right icon
View More author details
Toc

Table of Contents (16) Chapters Close

Preface 1. Section 1: Understanding the Role of Linux System Administrator
2. Chapter 1: What Is the Role of a System Administrator? FREE CHAPTER 3. Chapter 2: Choosing Your Distribution and Release Model 4. Section 2: Best Practices for Linux Technologies
5. Chapter 3: System Storage Best Practices 6. Chapter 4: Designing System Deployment Architectures 7. Chapter 5: Patch Management Strategies 8. Chapter 6: Databases 9. Section 3: Approaches to Effective System Administration
10. Chapter 7: Documentation, Monitoring, and Logging Techniques 11. Chapter 8: Improving Administration Maturation with Automation through Scripting and DevOps 12. Chapter 9: Backup and Disaster Recovery Approaches 13. Chapter 10: User and Access Management Strategies 14. Chapter 11: Troubleshooting 15. Other Books You May Enjoy

Remote access approaches

Assuming we are not using a access-less approach built off of state machine technology, we have a few different paths that we can popularly use to gain access to our Linux systems. In most cases with Linux based operating systems we are going to be discussing how system administrators, like you and me, are able to log in and use the operating system interactively, but any typical method that we are going to use to do this is going to be an option for end users as well. The needs of end users is generally very different from that of system administrators, but the tools that we can use are going to generally overlap.

For us, in the system administration role, access is most often defined by needing to be very quick to set up, quite temporary in its use, with the focus critically being on ensuring that the system is highly accessible and command line driven. For end users, we will expect the opposite. Administrators often have to log into many different operating...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime