Develop simple scripts to manage the user and file system

Assignment Help Other Subject
Reference no: EM132248591

Assessment item - Installing and Managing Linux

Task

The first assignment comprises of a number separate tasks, described as follows.

Part 1: Install Linux
The first step is to create the virtual machines in the hypervisor (VMWare Player or Virtualbox) and install the following two Linux distributors: Ubuntu Server 18.04.1. and Fedora Server 29

During the install process, you are to put /home and /var on separate partitions. Provide hostnames for the servers that include your student number, for example, name the Fedora Server Fedora-11666234.

You should not install a LAMP (Linux, Apache, MySQL and PHP) stack.

Once the operating systems are installed, you are to demonstrate connectivity to the Internet and more importantly update the operating system for each Linux server.

You are to document the steps and decisions taken to get the operating system installed on your virtual machine. Where you are required to make a decision you are to explain why. You must also provide screenshots showing your installation process and clearly highlight the decision you have made during installation.

These virtual Linux servers will be used in future assessment tasks, so make sure you do not delete them after this assessment task is completed.

Part 2: Profile the System

Once you have completed the install, write a script called current.sh which obtains a current snapshot of system. The script should run on both the Fedora and Ubuntu Linux servers.

1. show current processes running tcp and udp and clearly show the port number of each service

2. show the local or remote login in last 7 times

3. show current disk on all partitions, RAM, Swap, and CPU usage, include seven snapshots each second for the last seven seconds.

4. show the last 10 lines of the message log

This information should be collated, and a report produced called snapshot.txt. Each set of information should be proceeded by a header outlining what the information following relates to. It should be formatted properly and include dashed lines between each of the key information mentioned above.
You are to document the steps and decisions taken to get the operating system installed on your virtual machine. Where you are required to make a decision you are to explain why.

Part 3: Packages and Services
Install tools and utilities that already made by Ubuntu and Fedora distributors and using dnf (yum replacement) or apt installation services. You are required to install the following utilities for both Linux: cpuid, hwinfo, tree, and mc

Rationale
This assessment task will assess the following learning outcome/s:
• be able to apply technical knowledge to manage servers.
• be able to investigate the layout of server file systems.
• be able to plan, create and manage information services.
• be able to design and write scripts to automate various server management tasks.
The assignment is to develop your understanding of how operating systems are installed and managed. In addition to this you will gain some insight into how a system administrator can automate workloads through the development of scripts.

Presentation

You should submit your assessment in a single word document which contains all components of your assignment. Use screenshots to provide evidence and details of the work you have done to complement your written answers. You should reference where appropriate using an approve referencing style to support your work.

Assessment item - File Systems and Advanced Scripting

Task

In this assignment, you will develop simple scripts to manage the user and file system whilst developing some expertise in managing a complex file system. For this assessment piece, you will utilize the virtual machines created in the previous assessment piece.

Part 1: Automated Account Management

You have been asked by your boss to prepare two shell scripts which manage user information:

1. You are to prepare a simple shell script which reads a text file called newusers.txt. The file is in the form allen student /home/allen Allen John jeff student /home/jeff Jeff Jackson brett staff /home/brett Brett Wildermoth anto staff /home/anto Antonio Buck and creates these users on the system without any interactive input by run script one time only. To do this you will need to use the adduser(1) and passwd(1) commands. You will need to randomly produce the password and report this to the administrator.

You can assume the fields being username, group, home directory and GCOS string are separated by a single white space.

The program should output the username, group, home directory, and generated password once created.

2. Management of users is important particularly an account to change the password in every 30 days. Write a shell (.sh) script that takes a single argument being a username, looks for the account in /etc/passwd, force the accounts above to change their password in every 30 days, and archives their home directory into a systemdate.tar.gz file. The script should also show a summary of the users usage in their home account. You will receive more marks if you avoid using the standard user management tools. systemdate should be yyyy-mm-dd-hhmm at the time of the script run.

Part 2: Practical File Systems
Create a user "assgn2' and in their home directory create the files with the following permissions [5 marks].
• A file called "test.txt", with contents "This is a test file", include your name and student number as well. Ensure you create the file with read and write permissions for owner, group and other, but no execute permissions.
• A file called "runme.sh" that runs a simple script of your choosing, with read and execute permissions for group and other, and full read, write and execute permissions for the owner. You can make the script echo something to the user.
• A hidden file called ".test_config", owned by root with contents "This is a test config file", that has root read, write and execute permissions only, no other permissions set.
• A symbolic link with an absolute path to a system log file of your choosing.
• A directory called "test_dir" with the owner having full permissions to create, rename or delete files in the directory, list files and enter the directory. Group and other having permissions to only list files and enter the directory and access files within it.

Part 3: Network File System using both Fedora and Ubuntu
In this task, you need set an NFS filesharing storage. Either Fedora or Ubuntu can act as a NFS server or client. The implementation should include installing NFS server and client, /etc/exports file configuration, mounting the shared folder from server to client NFS, and finally, any change to the client mounted folder should be visible on the server's shared folder.
Document the steps taken and clearly show the decisions you made in configuring the NFS service. Include a picture to clearly illustrate the relationship between the server and the client.

Part 4: File System Management with Scripts

Now that you have a plan for the storage there are a few housekeeping matters to take care of because users tend to be somewhat liberal with their storage.

1. Write a script to make sure that user home directories and files are owned and only accessible by the owner. The script should be run by root only.

2. Finally, write a script which takes as an argument the filesystem name e.g. /home and looks for objects which are larger than 15 MB and objects that are executable, then list all these files in a file called suspicious.txt and this file to be located in
/home/user_home_folder/dd-mm-yyyy.suspicious.txt. For instance, for user john
would have /home/john/13-01-2019.suspicious.txt
When these files are found a summary should be produced including where they are and the size.

Rationale
This assessment task will assess the following learning outcome/s:
• be able to apply technical knowledge to manage servers.
• be able to investigate the layout of server file systems.
• be able to plan, create and manage information services.
• be able to design and write scripts to automate various server management tasks.
• be able to justify an appropriate protection strategy for data and services.
In this assignment you will develop simple scripts to manage the user and file system whilst developing some expertise in managing a complex file system.

Presentation

You should submit your assessment in a single word document which contains all components of your assignment. Use screenshots to provide evidence and details of the work you have done to complement your written answers. You should reference where appropriate using an approve referencing style to support your work.

Assessment item - Managing Services and Security

Task

Your job in this assignment is to create two Virtual machines each running a different but the latest distribution of Linux Ubuntu Server and Fedora Server. Each of these VM's is to offer services to a user base.

The Virtual Machines can be implemented using any hypervisor e.g. VMWare Player, Virtual Box or anything else you think is appropriate.

You can use bridged or host-only networking when setting up these Virtual Machines. When implementing the Virtual Machines, rather than obtaining an address from the Hypervisors DHCP server you should ensure the addresses used are static and assigned from your network. YOU WILL NEED TO WORK OUT WHAT ADDRESS SPACE YOU ARE USING AND HOW IT WILL IMPACT YOUR LAN.

Set up the ip addresses for your systems to include key digits of your student number. Let A represent the first digit of your student number down to H representing the last digit. This is explained in the table below.

Part 1: Virtual Machine One (Ubuntu) - DNS & SSH Server

The first Virtual Machine should be installed and have the BIND (DNS) server installed on it. While you do not own any address space/ namespace your name server should manage the following domains:

your_last_name.net.au

The name server should answer queries for this domain. In addition to the your_last_name.net.au zone, a zone should be set up for the reverse zone - the reverse zone would be whatever the address range is of your virtual machine. You should do some research on how Bind handles reverse zones.

You should set up the your_last_name.net.au zone with the usual information including SOA, NS and other records where appropriate. The address used for this should be the address of the virtual machine. You should give this Virtual Machine an A record with the name Ubuntu Linux. You should also create an A record for the Fedora system.

In addition to this, you should create a CNAME record with the name mysql. When a user does a lookup on mysql.your_last_name.net.au - the address returned should be that of the Fedora system.

Be sure to create the appropriate reverse (PTR) records for the machines and to help other administrators be sure to put in place appropriate TXT records.

Once complete, you should fine-tune your DNS Servers Virtual machine. Do this by disabling services that were installed but are not required. Be very careful not to break anything here. As a tip, you will want to keep both DNS, SSH, database and web services active. Ensure DNS, SSH, database and web services are invoked at startup.

Finally, harden the two Linux Servers using a firewall. Set up filters which allow access to the services DNS and web from anywhere, and restrict SSH and database to only your two Linux servers. You can assume this incoming traffic can come from anywhere. You will need to make sure these rules always take affect at boot.
Your resolve test result should able to query from any of your server.
Document the entire process and challenges you experienced. You can install BIND from source or using your package manager.

Part 2: Virtual Machine Two (Fedora) - Web and Database servers
Once complete set up this Virtual Machine to host a website using the Apache Web Server and database server using MySQL. Ensure PHP is enabled with Apache and database services and able to show proof from phpinfo().
The Virtual Machine should have a statically assigned address which matches that specified in the A record for host mysql. Test your Apache Server Virtual Machine by using a web browser on another host and trying to browse the website mysql.your_last_name.net.au.

Finally, harden this host so that only services being used can be accessed by other machines. You will need to use iptables for Fedora or ufw for Ubuntu.
Confirm that you can connect to both ssh and mysql from virtual machine one (Ubuntu). Document the entire process and challenges you experienced.

Part 3: Remote File Access
Provide two methods to transfer files to any of Linux server from remote. At least one is secured and another non-secure file transfer method.
Document the entire process and challenges you experienced.

Part 4: Simple Web Services
In Virtual Machine Two set up a web server for the DNS www.your_last_name.net.au. Make sure you create an appropriate CNAME in the DNS service on the Ubuntu Server. The web server on the Fedora system is implemented using the HTTP protocol listening on port 8888. Your challenge is to make the same site accessible using the HTTPS protocol. To do this set up SSL with a self-signed certificate for the site.
Once configured correctly you should be able to access www.your_last_name.net.au on both HTTP/HTTPS ports. Naturally, you will need to make appropriate changes to your firewall rules.
Document the entire process and challenges you experienced.

Rationale
This assessment task will assess the following learning outcome/s:
• be able to apply technical knowledge to manage servers.
• be able to investigate the layout of server file systems.
• be able to plan, create and manage information services.
• be able to design and write scripts to automate various server management tasks.
• be able to justify an appropriate protection strategy for data and services.
• be able to critically evaluate security policies and procedures.
In this assignment students will develop a understanding and appreciation for building complex services whilst considering impacts on security.

Presentation
You should submit your assessment in a single word document which contains all components of your assignment. Use screenshots to provide evidence and details of the work you have done to complement your written answers. You should reference where appropriate using an approve referencing style to support your work.

Attachment:- Linux Server Administration.rar

Reference no: EM132248591

Questions Cloud

Compare neo-conceptualism and neo-expressionism : Compare and contrast Neo-Conceptualism and Neo-Expressionism, highlighting a representative artist and his / her work from each movement.
What are the four steps for assessing knowledge management : What are the four steps for assessing knowledge management and why are they essential to fostering a successful project?
How the article directly ties to your group topic : Write 2400 essays for the 2 articles listed below. Answer the questions below related to the hypotheses Are lead Female characters really leading?
Describe psychometric methodologies employed in development : Research five peer-reviewed articles in the Ashford University Library that were published within the last 15 years, including a minimum of one article.
Develop simple scripts to manage the user and file system : ITC514 - Linux Server Administration - Charles Sturt University - Develop simple scripts to manage the user and file system whilst developing some expertise
The difference between leadership and board governance : Write a paper that evaluates the difference between leadership and board governance in establishing strategic planning for a health care organization.
Compute the percentage of the current loans : Set up the 2018 loan distribution (shown in Table 1) as a column vector. Compute the percentage of the current loans in each of the four categories in 2019
Explain the development of the abnormal behavior : Using the personal experience or encounter with abnormal behavior you (or a classmate) explored in this week's Discussion, compare and contrast the two models.
Service into both superordinate and subordinate group : When it comes to this product category, might the consumer suffer from overchoice?

Reviews

len2248591

3/5/2019 9:04:27 PM

Part 1: Virtual Machine One – DNS & SSH Server Ability to learn and use systems administration techniques. Application of technical knowledge. Explanation, Evidence and Referencing. Demonstrated working virtual linux server, name server and remote access which exceeds all functional requirements. Reflecting on your learning experience, providing evidence of insight and commenting on the acquisitions of new knowledge drawing from multiple sources.

len2248591

3/5/2019 9:04:14 PM

Part 4: File System Management and Scripts Ability to learn and use systems administration techniques. Application of technical knowledge. Explanation, Evidence and Referencing. Demonstrated working file system management scripts which exceed all functional requirements. Reflecting on your learning experience, providing evidence of insight and commenting on the acquisitions of new knowledge drawing from multiple sources.

len2248591

3/5/2019 9:04:05 PM

Part 3: Network File Systems Ability to learn and use systems administration techniques. Application of technical knowledge. Explanation, Evidence and Referencing. Demonstrated working file share sharing and backup management which meets basic functional requirements. Reflecting on your learning experience, providing evidence of insight and commenting on the acquisitions of new knowledge drawing from

len2248591

3/5/2019 9:03:56 PM

Part 2: Practical File Systems Ability to learn and use systems administration techniques. Application of technical knowledge. Explanation, Evidence, and Referencing. Clearly documented solution to tasks, showing a high understanding of filesystems in completing all tasks. Reflecting on your learning experience, providing evidence of insight and commenting on the acquisitions of new knowledge drawing from multiple sources.

len2248591

3/5/2019 9:03:19 PM

Part 1: Automated Account Management Ability to learn and use systems administration techniques. Application of technical knowledge. Explanation, Evidence and Referencing. Demonstrated working automated account management script which exceeds all functional requirements. Reflecting on your learning experience, providing evidence of insight and commenting on the acquisitions of new knowledge drawing from multiple sources.

len2248591

3/5/2019 9:03:01 PM

Part 3: Packages and Services Ability to learn and use systems administration techniques. Application of technical knowledge. Explanation, Evidence and Referencing. Demonstrated working lighthttpd service which exceeds all functional requirements. Reflecting on your learning experience, providing evidence of insight and commenting on the acquisitions of new knowledge drawing from multiple sources.

len2248591

3/5/2019 9:02:52 PM

Part 2: Profile the System Ability to learn and use systems administration techniques. Application of technical knowledge. Explanation, Evidence and Referencing.Demonstrated working script which exceeds all functional requirements. Reflecting on your learning experience, providing evidence of insight and commenting on the acquisitions of new knowledge drawing from multiple sources.

len2248591

3/5/2019 9:02:25 PM

Part 1: Install Linux Ability to learn and use systems administration techniques. Application of technical knowledge. Explanation, Evidence and Referencing. Demonstrated working linux server which exceeds all functional requirements. Reflecting on your learning experience, providing evidence of insight and commenting on the acquisitions of new knowledge drawing from multiple sources. Demonstrated working linux server which meets all functional requirements. Reflect on your own learning experience providing evidence of insight, drawing on multiple sources to develop understanding.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd