Text preview for : 174389-001_XENIX_286_System_Administrators_Guide_Nov84.pdf part of Intel 174389-001 XENIX 286 System Administrators Guide Nov84 Intel system3xx xenix-286 174389-001_XENIX_286_System_Administrators_Guide_Nov84.pdf



Back to : 174389-001_XENIX_286_Syst | Home

inter
XENIX* 286
SYSTEM ADMINISTRATOR'S
GUIDE

*XENIX is a trademark of Microsoft Corporation.




Copyright @ 1984, Intel Corporation
Intel Corporation, 3065 Bowers Avenue, Santa CI XENIX* 286
SYSTEM ADMINISTRATOR'S
GUIDE

Order Number: 174389-001



*XENIX is a trademark of Microsoft Corporation.




Copyright @ 1984 Intel Corporation
I Intel Corporation. 3065 Bowers Avenue. Santa Clara, California 95051 I
The information in this document is subject to change without notice.

Intel Corporation makes no warranty of any kind with regard to this material, including, but not limited to, the implied
warranties of merchantability and fitness for a particular purpose. Intel Corporation assumes no responsibility for any errors
that may appear in this document. Intel Corporation makes no commitment to update or to keep current the information
contained in this document.

Intel Corporation assumes no responsibility for the use of any circuitry other than circuitry embodied in an Intel product. No
other circuit patent licenses are implied.

Intel software products are copyrighted by and shall remain the property ofIntel Corporation. Use, duplication or disclosure is
subject to restrictions stated in Intel's software license, or as defined in ASPR 7-104.9 (a) (9).

No part of this document may be copied or reproduced in any form or by any means without prior written consent of Intel
Corporation.

The following are trademarks of Intel Corporation and its affiliates and may be used only to identify Intel products:


BITBUS im iRMX OpenNET
COMMputer iMDDX iSBC Plug-A-Bubble
CREDIT iMMX iSBX PROMPT
Data Pipeline Insite iSDM Promware
Genius inte l iSXM QUEST
.6
1 intelBOS KEPROM QueX
i Intelevision Library Manager Ripplemode
I2ICE inteligent Identifier MCS RMX/80
ICE inteligent Programming Megachassis RUPI
iCS Intellec MICROMAINFRAME Seamless
iDBP Intellink MULTIBUS SLD
iDIS iOSP MULTICHANNEL SYSTEM 2000
iLBX iPDS MULTIMODULE UPI


MS-DOS and XENIX are trademarks of Microsoft Corporation.




REV. REVISION mSTORY DATE
-001 Original issue 11/84




ii 10/84
TABLE OF CONTENTS



CONTENTS

CHAPTER 1 PAGE
INTRODUCTION TO SYSTEM ADMINISTRATION
Audience 1-1
Manual Overview 1-1
Notational Conventions 1-2
Your Role as System Administrator 1-3
First Steps 1-3
Routine Tasks 1-3
As-Needed Tasks 1-3
Privileged Functions 1-4
Recordkeeping 1-6
CHAPTER 2
STARTING AND STOPPING THE SYSTEM
Starting the System 2-1
Logging On 2-2
Logging Off 2-2
Changing Accounts 2-2
Changing to root ID 2-2
Stopping the System 2-3
Stopping Normally with shutdown 2-3
Stopping Immediately with haltsys 2-4
Stopping Manually 2-4
Going into Single-User Mode 2-5
CHAPTER 3
ADMINISTERING USERS
Users and Groups 3-1
Regular Users and Groups 3-1
System Users and Groups 3-1
Adding Accounts 3-2
Steps 3-2
Adding a User Account with mkuser 3-4
Maintaining Accounts 3-11
Removing a User 3-13
Maintaining Groups 3-16
Administering Passwords 3-19
Protecting the root Password 3-19
Insisting on User Passwords 3-19
Enforcing Password Changes 3-19
Changing the Minimum Password Length 3-20
Replacing a Password 3-20


iii
Table of Contents System Administrator's Guide



CONTENTS PAGE

Communicating with Users 3-21
The Message of the Day 3-21
Sending a Message with wall 3-21
Sending a Message with write 3-21
Sending a Message with mail 3-22

CHAPTER 4
WORKING WITH FILES
Examining Files 4-1
Changing File Ownership 4-1
Using Permissions Effectively 4-2
Access Permissions for Ordinary Files 4-2
Access Permissions for Directories 4-3
Access Permissions for Special Files 4-4
Representing Permissions 4-4
Seeing Permissions 4-5
Default Permissions 4-6
Summary of Permissions for Common Functions 4-6
Locating Files and Directories 4-9
Using Is and Ie 4-9
Locating Subdirectories in Root Directory 4-9
Searching through Subtrees 4-9
Finding Files and Executing Commands 4-11
Working with N9n-XENIX Files 4-12

CHAPTER 5
WORKING WITH FILE SYSTEMS
File Systems 5-1
Creating a New File System on a Flexible Disk 5-1
Mounting and Unmounting a File System 5-2
Mounting a File System 5-3
Unmounting a File System 5-5

CHAPTER 6
PROVIDING SYSTEM SECURITY
Security Issues 6-1
Protecting Devices 6-1
Using Super-User Powers Carefully 6-1
Advising Users 6-3
Backing Up Data 6-3
Protecting File Systems 6-3

CHAPTER 7
BACKING UP
Commands for Copying Files 7-1
Strategies for Backups 7-2
Formatting Disks 7-3
Verifying Disks 7-3
Backing Up with tar 7-4
Defaults 7-6
Using sysadmin 7-8



iv
System Administrator's Guide Table of Contents



CONTENTS PAGE

Daily Backup 7-9
Periodic Backup 7-9
Backup Listing 7-10
Restoring a File 7-10
Using dump 7-11
Backup Levels 7-11
Using dump with Defaults 7-13
Using dump with Options and Arguments 7-14
Checking the Validity of a Backup 7-15
Checking Archives 7-15
Checking Backup Levels and Dates 7-16
Restoring Files with restor 7-16

CHAPTER 8
MONITORING SYSTEM USE
Keeping Enough Free Space 8-1
Checking Free Space 8-1
Checking Blocks Free with df -t 8-1
Checking Blocks Used with du 8-2
Checking Use by Owners 8-3
Freeing Up Space 8-3
Keeping Only Necessary Files 8.;.3
Removing Core Files and Temporary Files 8-3
Clearing Log Files 8-4
Moving Files to Another File System 8-5
Packing Large Files 8-5
Accounting for Time Used 8-5
Starting and Stopping Process Accounting 8-6
Displaying Accounting Information 8-6
Checking Processes 8-11
Changing Execution Priorities 8-14

CHAPTER 9
SOLVING SYSTEM PROBLEMS
Solving Terminal Problems 9-1
Restoring a Nonechoing Terminal 9-1
Restoring Colu mns 9-1
Erasing Deleted Characters 9-1
Fixing an Unresponsive Terminal 9-2
Solving Printer Problems 9-2
Removing Jobs from the Print Queue 9-2
Removing Garbage Characters 9-2
Restarting a Line Printer 9-2
Solving File System Problems 9-3
Symptoms of Corrupt File Systems 9-3
Repairing File Systems 9-3
Responding to Root File Syste m Out of Space 9-4
Recovering from a System Crash 9-4
Restoring an Inoperable Syste m 9-4
Improving Response Time 9-5
Responding to Panic Messages 9-5



v
Table of Contents System Administrator's Guide



CONTENTS PAGE
~
CHAPTER 10
TAILORING THE ENVIRONMENT
Changing System Startup 10-1
Automating Process Accounting 10-1
Changing the Default .profile File 10-2
Changing the Default .login File 10-2
Changing the Default .cshrc File 10-2
Changing the Default mkuser.mail File 10-2
Changing the /usr/lib/maiVmailrc File 10-2
Changing the /etc/profile File 10-3
Creating System Routing Lists for Mail 10-3
Creating Help Files for Users 10-4
Reducing Priorities 10-4
Keeping Programs in Swap Space 10-4
Running Processes Automatically 10-5
Logging Processes Run by cron 10-6
Logging Use of su 10-6
Adding a Terminal 10-7
Removing a Terminal 10-9
Administering Assignable Devices 10-9

APPENDIX A
STANDARD DEVICES
Standard Devices A-1

APPENDIX B
BACKUP LOGS
Backup Logs B-1

APPENDIX C
THE ROOT DIRECTORY
The Root Directory C-1

APPENDIX D
RELATED PUBLICATIONS
Related Intel Publications D-1
Suggested Readings D-2

INDEX




vi
System Administrator's Guide Table of Contents



FIGURES

FIGURE TITLE PAGE

1-1 Privileged Functions 1-4
3-1 Syste m Users 3-2
3-2 Use of Comment 3-5
3-3 Detailed Instructions for mkuser 3-6
3-4 Brief Instructions for mkuser 3-10
3-5 Fields in the /etc/passwd File 3-11
3-6 Sample /etc/passwd File 3-11
3-7 Editing /etc/passwd with ed 3-12
3-8 Copying and Editing /etc/passwd 3-12
3-9 Sample pwcheck Messages 3-12
3-10 Removing a User and All the User's Files 3-14
3-11 Moving Files and Re moving a User 3-15
3-12 The Fields of the letc/group File 3-16
3-13 Adding a Group 3-17
3-14 Adding Users to a Group 3-18
3-15 Sample grpcheck Messages 3-18
3-16 Replacing a Password 3-20
4-1 Reading a Directory 4-3
4-2 Representing Permissions with Characters 4-5
4-3 Representing Permissions 4-5
4-4 Permissions Required for Common Functions 4-7
4-5 Sample find Commands 4-10
4-6 Sample find Output 4-11
5-1 Sample mount Command 5-4
5-2 Mounted File Syste m 5-4
5-3 Checking Mounted File Systems 5-4
7-1 Sample tm- Command Syntax 7-5
7-2 Sample tar Commands 7-5
7-3 Sample Defaults for 5f-Inch Disk Backup 7-7
7-4 Sample Defaults for Tape Backup 7-7
7-5 Menu of sysadmin Options 7-8
7-6 Sample Schedule of Backups 7-12
7-7 Sample dump Dialogue 7-13
7-8 Options for dump 7-14
7-9 Sample dump Command 7-14
7-10 Messages fro m restor c 7-15
7-11 Sample restor Command 7-16
7-12 Options for restor 7-17
8-1 Checking Free Blocks with df -t 8-1
8-2 Checking Blocks Used with du 8-2
8-3 Checking Use by Owners with quot 8-3
8-4 Sample Process Accounting Output 8-7
8-5 Process Accounting Options 8-8
8-6 Sample Process Accounting Commands 8-10
8-7 Fields with the Brief Status Report (ps) 8-11
8-8 Fields with the Full Status Report (ps -ef) 8-11
8-9 Fields with the Long Status Report (ps -el) 8-11
8-10 Brief Process Status Report 8-13



vii
Table of Contents System Administrator's Guide



FIGURE TITLE PAGE
8-11 Full Process Status Report 8-13
8-12 Long Process Status Report 8-13
8-13 Changing Execution Priorities 8-14
10-1 Sample Routing Lists for Mail 10-3
10-2 Using Routing Lists for Mail 10-3
10-3 Changing Command Priority 10-4
10-4 Sample /usr/lib/crontab Entries 10-5
10-5 Variables for Recording su Use 10-6
10-6 Sample Log of su Use 10-6
10-7 Sample /etc/ttytype File 10-8
10-8 Sample /etc/ttys File 10-8
10-9 Codes for Baud Rates 10-8
10-10 Making a Device Assignable 10-9
10-11 Making a Device Unassignable 10-9
A-1 Standard Devices A-1
A-2 File System Sizes for Winchester Disks A-2




viii
CHAPTER 1
intel