Home | Articles | About | Contact | Forum |
Friday, September 20, 2019

Lunarpages.com Web Hosting

Mailing List

By Joining the mailing list you will be notified of site updates.

Show Your Support For
This Site By Donating:

Audience: All
Last Updated: 6/9/2011 7:08:41 PM
**All times are EST**

Inheriting Linux Server Administration Duties

By Erik Rodriguez

Tags: Linux Server Admin, Linux system administration, linux administrator, Linux discovery, document Linux version, find Linux version

This articles provides information about inheriting Linux server administration. Methodology and things to watch out for are discussed in detail.


Linux may be a bit challenging to take over administration. Compared to a Windows environment, the discovery process can be much more difficult. Overlooking certain things can lead to problems or unexpected outages. The following course provides a thorough list of discovery tactics to ensure nothing is missed when taking over administration of a Linux server or servers.

More often than not, you will be required to take over Linux administration because the last administrator left or was fired. This can go one of two ways. Smooth if the previous admin knew their stuff and left on good terms. Awful if they had no clue or left on bad terms. It may even be a mix of both situations. Whatever the case may be, try to ask as many questions with the rest of the staff. They may have key information that can give you clues on what to look at first. For example, they may tell you that in the case a specific Linux box was down, nobody could get online. This could indicate the server is performing DHCP leases, firewall/NAT functions, or DNS. Of course you should be able to determine these things through other methods, but it's often easiest to gather such clues the easy way.

We all like to think we are the most brilliant IT minds, but in reality we probably are not. Those being said, do not under-estimate the value of using a checklist. The checklist should include basic information like IP address, hostname, etc. It should also include detailed notes such as processes for starting and stopping certain daemons, dependencies on other servers, or other details that are critical to normal operation.


Here is some basic information that should be included in a discovery:

  1. Server name:
  2. IP address or FQDN:
  3. Distro/version:
  4. Backup status:
  5. Physical location:
  6. Number of network cards:
  7. Network connectivity/port numbers:
  8. Virtual server:
  9. Server make/model:
  10. Server role:
Server name is obviously an important detail. The server name may be used by client machines to map resources such as network drives, databases, and other critical operations.

IP address or addresses is important. Multiple IP addresses could indicate a web server (apache) running name or IP based hosting. Multiple IPs and/or network cards may be required due to different VLANs. For those who are not familiar, I have included instructions for how to find the IP settings in Linux. One of the worst things about inheriting a Linux server is working with a distribution you are not familiar with. While I am primarily a Red Hat/CentOS admin, I have inherited nearly every distribution under the sun. I have worked on everything from Slackware Linux to FreeBSD. While FreeBSD was the hardest for me to work with, if you have the fundamental understanding of Linux/UNIX operating systems, it isn't that difficult to get up to speed.

One of the toughest things to do is work with a Linux server that has an EOL operating system. End-of-life (EOL) operating systems are classified as operating systems that no longer have updates or patches available from the vendor. This is a common scenario with servers running Fedora Core or SuSE (Novell) Linux. These distributions have very short release-cycles meaning they are only "officially supported" for 3 -4 years at best. After the vendor drops support and declares the OS EOL, it inherently becomes a ticking time bomb.

Aging servers or servers running out of disk space are also ticking time bombs. Especially when taking over administration of such servers. It is best to assume there are no backups of the data so deleting data should be done with EXTREME caution. Log files for certain daemons can grow very large depending on how busy they are. Careful attention should be used when modifying log rotation scripts. Deleting the log file incorrectly can stop the daemon from operating. Specifically, Apache WILL crash if the logs are deleted instead of being rotated. Remember that Linux has no undelete feature. There is no software package that can undelete a file and for this reason, backups are even more critical on Linux servers. The information below provides some good ways to determine how and if backups are being performed.

Backups in Linux are not as easy compared to traditional Windows backups. There is not as much software available and most of it is much harder to configure. Symantec backupexec and R1soft CDP server are the most common mainstream backup titles available for Linux. Both software editions have Linux agents, which include plugins for things like databases and work extremely well. Both of these agents will run as a service so you should be able to find them using the following:

Find the services running in the list of daemons (backupexec runs as be.agent or VRTSralus) Use netstat to find a listening port associated with backup software

If not using mainstream software, Linux servers may be using something like bacula or even a manual script to zip or tar a group of files and copy them somewhere. It may be a simple or complicated script that moves or deletes old copies of the data. Whatever the case may be, these will almost always be done by setting a cron job with the backup scripts. For those who are not familiar, I have included instructions for how to view and edit cron jobs in Linux.

Physical location is important as you may need to physically reboot the server, attach thumb drives, external drives, and other things. The server will probably be located within the office. However, it is not uncommon for servers to be located in remote offices or data centers. If the server is located in a data center, make sure you are added to the access list. It is much easier to fix problems on server located in the data center when you already have access. There have been situations where I was sent to a data center and had to wait over an hour for credentials to access the servers. It depends on what type of data center the server is located in.

Network connectivity can provide some important clues. For instance, if the server is connected to a managed switch such as Cisco, Juniper, or other enterprise switch it may be on a special VLAN. Linux does have a utility that will allow the network card to read VLAN tags. However, most traditional network administrators will assign VLAN membership by port. If the server has HBA or fiber cards, it could have a iSCSI or fiber channel volumes mounted. Network attached storage is generally very large and is used for things like mailstores, databases, or backups. Documenting port numbers can be an important part of troubleshooting later. Your network administrator or data center may not have proper documentation. Therefore, take notes, and if a problem arises, you can say something like "my server is plugged into a switch labeled EWR-34 port 31." Most colocation facilities keep track of server information by IP addresses and/or customer name.

Is the Linux server virtual? If so, you are probably in for even more work. Virtual servers running on software like VMware or Xen may have things like virtual disks, virtual switches, and other factors that can add complication to your administrative tasks. Chances are, if your Linux server is virtual, there are also other virtual servers on the same box. It is fairly common to have a mix of Windows and Linux servers on the same virtual platform. Unfortunately, because of the way Linux allocates memory, it will "use" more memory from the virtual platform even when idle. Windows servers will traditionally only allocate memory when it's being used. This ultimately means you will not be able to operate as many Linux hosts (compared to Windows) on a virtual platform.

Server make and model is a good thing to know. You may or may not find that information particularly useful. However, you may need it for warranty or hardware related issues should they arise. Make sure you have the make, model number, and serial number documented. Dell refers to "service tags" instead of serial numbers. You can also lookup a server or device by service tag to find the original hardware configuration.

Server role can be a general statement. I usually indicate something like "web server" "file server" or other description. If the server is doing many different roles, you should indicate them in detail within the following sections.

Additional Information

  • Is this server critical to business operations?
  • Is the server running any network functions?
Some servers are not deemed critical to business operations. For example, an intranet site for the marketing department to view previous versions of their marketing campaigns will not bring business to a grinding halt if the server is down for a few hours. In fact, there are many times administrators will reboot non-critical servers during normal business hours.

If the sever is running any network functions such as DNS or DHCP it will affect the rest of the organization if it goes offline. Linux servers can be used as proxy servers or firewalls. There are many open-source packages which turn a standard PC or server into a "firewall appliance." These appliances operate as routers/firewalls but can also do things such as file servers, web servers and database servers. These are generally found in small businesses. The moral to this story is that when dealing with Linux, don't leave any stones unturned. It's much easier to spend the extra hour double checking things, than several hours in the middle of the night when the server crashes.

Contact Us

If you found this information useful, click the +1 button

Your E-mail:


Type verification image:
verification image, type it in the box


NOTE: this form DOES NOT e-mail this article, it sends feedback to the author.

Juniper SRX anti-spam filtering config
Windows Server 2008 Clustering Configuration
Windows 2008 R2 Network Load Balancing (NLB)
Extreme Networks: Downloading new software image
Juniper SRX save config to USB drive
Juniper SRX logout sessions
Extreme Networks Syslog Configuration
Command line drive mapping
Neoscale vs. Decru
Data Security vs. Data Protection
Juniper SRX Cluster Configuration
HOWTO - Create VLAN on Extreme Switch
Using a Non-local Colocation Facility
Linux Server Administration
IT Chop Shops
Flow Viewers: SFLOW, NetFLOW, and JFLOW
Exchange 2007 Back Pressure
IPtables open port for specific IP
Politics in IT Departments
HOWTO - Block Dropbox
Cisco IOS Cheat Sheet
Subnet Cheat Sheet
Design a DMZ Network
How DNS works
Firewall Configuration
Juniper SSG Firewalls
Server Management
Configuring VLANs
Runlevels in Linux
Server Clustering
SONET Networks
The Red Hat Network
Server Colocation
Complicated Linux Servers
Dark Fiber
Data Center Network Design
Firewall Types
Colocation Bandwidth

Copyright © 2002-2016 Skullbox.Net All Rights Reserved.
A division of Orlando Tech Works, LLC
By using this site you agree to its Terms and Conditions.
Contact Erik Rodriguez