Skip to content

Isaiah-River/SYS-265-02-SYS-Admin-II

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 

Repository files navigation

Navigation

Course Overview

Course Description

This course focuses on the tasks and issues involved in the administration of distributed computing networks. Authentication, Authorization, and Accounting (AAA) systems are covered with emphasis on using cross-platform authentication. Network services including firewalls, DNS, mail, and web services are covered. Content includes Network File Services, Distributed administration, and network management tools. Topics will be covered from a practical, business oriented, cost/benefit perspective and best practice implementation techniques are described. Hands-on experience will include representative technology from each of these areas.

Topic Coverage

  • Network Management
  • DHCP Services
  • DNS Administration
  • Containerization
  • Remote Management
  • Enterprise Storage
  • Centralized Authentication
  • LAN System Administration
  • Advanced Troubleshooting
  • Advanced Virtualization
  • Firewall Administration
  • Web based Services
  • Automation and Provisioning

Course Progression

Labs

In this lab, I rebuilt a similar VM environment to what I completed in SYS-Admin I.

Objectives included in this lab:

  • Setting up a pfSense firewall
  • Configuring several VMs appropriately
  • Setting up active directory
  • Creating a domain
  • Configuring a domain name server
  • Joining the domain with a workstation VM

In this lab, I configured SNMP services on FW01-isaiah, WEB01-isaiah, and AD01-isaiah. I also configured a network monitoring system called NMON01-isaiah, which was used in querying our systems for SNMP properties.

Objectives included in this lab:

  • Set up and configure SNMP services FW01-isaiah, WEB01-isaiah, and AD01-isaiah.
  • Set up and configure NMON01-isaiah.
  • Familiarize myself with SNMP services.

The goal of this lab was to set up and configure our newly created DOCKER01-isaiah VM, and to install and familiarize ourselves with Docker.

Objectives included in this lab:

  • Set up and configure the newly created DOCKER01-isaiah VM
  • Install and configure Docker
  • Familiarize myself with Docker with the hello-world Docker application
  • Set up a simple networking Python Docker application
  • Set up Dockerized Wordpress

The goal of this lab was to familiarize ourselves with working with Git, and pushing and pulling from a GitHub repository. Towards the end of the lab, I set up a .sh script that was an introduction into streamlining automation across various systems.

Objectives included in this lab:

  • Install and configure Git on DOCKER01-isaiah, WEB01-isaiah, and MGMT01-isaiah.
  • Familiarize ourselves with using Git.
  • Creating and implementing SSH keys.
  • Create a script that:
    • Creates a user with a provided parameter.
    • Creates a home directory, and copying a public SSH key into the home directories .ssh folder,
    • Changes the permissions of the .ssh folder and public key.
    • Disables the ability to login through the root account.

In this lab I worked with Ansible to automate several tasks within my VM environment. Three new VMs were introduced to my VM environment, CONTROLLER-isaiah, ANSIBLE01-isaiah, and ANSIBLE02-isaiah. This lab involved setting these up, as well as working with Ansible, Ansible Galaxy, and Chocolatey to conduct various tasks within the VM enivronment.

Objectives included in this lab:

  • Configure CONTROLLER-isaiah, ANSIBLE01-isaiah, and ANSIBLE02-isaiah
  • Set up RSA key-pairs among CONTROLLER-isaiah and the two Ansible VMs
  • Familiarize myself with working with Ansible
  • Creating an Ansible script
  • Installing and connecting to Webmin
  • Automating an Apache installation
  • Automating with Ansible in a Windows environment

In this short lab I worked to familiarize myself with how to deploy software through group policies.

Objectives included in this lab:

  • Set up a share on MGMT01-isaiah to deploy software
  • Editing OUs through PowerShell
  • Set up a group policy for deploying software
  • Use PowerShell to filter through event logs

This lab served as an introduction into Distributed File Systems, building off the some of the foundations of last weeks lab. Essentially we set up a share that is replicated between several computers. If one of the systems is down, the DFS share will still be up as another computer is still hosting the files.

  • Setting up and configuring DFS01-isaiah & DFS02-isaiah
  • Creating shares on each of these VMs
  • Installing DFS management tools on MGMT01-isaiah
  • Installing DFS replication on DFS01-isaiah & DFS02-isaiah
  • Setting up and configuring DFS namespaces

Solo Projects

For my project I decided to install a Dockerized version of ownCloud, a free and open-source software for sharing and syncing files. In my project I needed to customize the trusted domains to allow for computers other than DOCKER01-isaiah to be able to access ownCloud. I also adjusted the ownCloud administrator username and password.

Objectives included in this project:

  • Install ownCloud through Docker on DOCKER01-isaiah
  • Configure ownCloud to adjust default credentials, and trust other domains

Group Projects

In this project, we introduced OpenNMS into our VM environment, and configured several network management traps.

Objectives included in this project:

  • Set up and configure PostgreSQL
  • Set up and configure OpenNMS
  • Configure OpenNMS through the web GUI
  • Set up alarms for when two hosts go down, and for when disk space usage is beyond a certain threshold

This project involved deploying as service that uses a remote file system for its storage. For our project we decided to use SeaweedFS for our file system to host the files for an Apache server.

Objectives included in this project:

  • Install and configure both SeaweedFS and Apache
  • Set up a share that is replicated between both CONTROLLER & DOCKER01-isaiah
  • Execute test scripts to indicate a working environment

For the final project our team is going to built a medium-sized enterprise from scratch for a client over a period of some weeks. We demonstrated our integration efforts to a client manager as part of user acceptance testing in a series of milestones.

Objectives included in this project:

  • Redundant AD infrastructure using DC1 + DC2. One should be able to turn off DC1 or DC2, and still be able to manage AD and login via W1 + W2 + MGMT1.
  • DHCP1 and DHCP2 should provide DHCP services to your LAN. They should also be redundant. Turn off DHCP1 or 2 and ipconfig/release and /renew from W1.
  • MGMT2 will be an Ansible controller system that can control your entire domain, with the exception of Windows workstations and the firewall. You should be able to run interactive commands against all these systems.
  • Util will be a system that you can provision with a new application via MGMT2 and Ansible. It can also be used to assist in meeting other requirements. Deploy an application that has not been covered in class to util, using an Ansible playbook.
  • MGMT1, DC1, DC2, DFS1, DFS2 and your workstations represent your Active Directory Infrastructure. Your domain should be your groupname.local. Join all Windows systems to the domain and at least one of your Linux systems.
  • Create an AD security group called linux-admins. Members of this group should be able to sudo to root on one of your Linux systems (this has some implied sub-requirements).
  • Install docker and a wiki/application of your choice on docker. (NOT WORDPRESS!)
  • Create a Domain Group Policy that allows W1 + W2 to remote desktop between one another.
  • Create a Domain Group Policy that applies corporate wallpaper to W1 + W2 + MGMT1.
  • Create a Domain group policy that moves W1 and W2 user profiles and home directories to a DFS share.
  • Use Ansible to install an apt-package.
  • Use Ansible to install a yum package.
  • Use Ansible to add a new Linux local user can be an SSH user or one with a password.
  • Use Ansible to add a new Windows domain user.

Static Badge

About

SYS Admin II GitHub Repo

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published