This course focuses on the tasks and issues involved in the administration of distributed computing networks. Authentication, Authorization, and Accounting (AAA) systems are covered with emphasis on using cross-platform authentication. Network services including firewalls, DNS, mail, and web services are covered. Content includes Network File Services, Distributed administration, and network management tools. Topics will be covered from a practical, business oriented, cost/benefit perspective and best practice implementation techniques are described. Hands-on experience will include representative technology from each of these areas.
- Network Management
- DHCP Services
- DNS Administration
- Containerization
- Remote Management
- Enterprise Storage
- Centralized Authentication
- LAN System Administration
- Advanced Troubleshooting
- Advanced Virtualization
- Firewall Administration
- Web based Services
- Automation and Provisioning
In this lab, I rebuilt a similar VM environment to what I completed in SYS-Admin I.
Objectives included in this lab:
- Setting up a pfSense firewall
- Configuring several VMs appropriately
- Setting up active directory
- Creating a domain
- Configuring a domain name server
- Joining the domain with a workstation VM
In this lab, I configured SNMP services on
FW01-isaiah
,WEB01-isaiah
, andAD01-isaiah
. I also configured a network monitoring system calledNMON01-isaiah
, which was used in querying our systems for SNMP properties.Objectives included in this lab:
- Set up and configure SNMP services
FW01-isaiah
,WEB01-isaiah
, andAD01-isaiah
.- Set up and configure
NMON01-isaiah
.- Familiarize myself with SNMP services.
The goal of this lab was to set up and configure our newly created
DOCKER01-isaiah
VM, and to install and familiarize ourselves with Docker.Objectives included in this lab:
- Set up and configure the newly created
DOCKER01-isaiah
VM- Install and configure Docker
- Familiarize myself with Docker with the hello-world Docker application
- Set up a simple networking Python Docker application
- Set up Dockerized Wordpress
The goal of this lab was to familiarize ourselves with working with Git, and pushing and pulling from a GitHub repository. Towards the end of the lab, I set up a .sh script that was an introduction into streamlining automation across various systems.
Objectives included in this lab:
- Install and configure Git on
DOCKER01-isaiah
,WEB01-isaiah
, andMGMT01-isaiah
.- Familiarize ourselves with using Git.
- Creating and implementing SSH keys.
- Create a script that:
- Creates a user with a provided parameter.
- Creates a home directory, and copying a public SSH key into the home directories .ssh folder,
- Changes the permissions of the .ssh folder and public key.
- Disables the ability to login through the root account.
In this lab I worked with Ansible to automate several tasks within my VM environment. Three new VMs were introduced to my VM environment, CONTROLLER-isaiah, ANSIBLE01-isaiah, and ANSIBLE02-isaiah. This lab involved setting these up, as well as working with Ansible, Ansible Galaxy, and Chocolatey to conduct various tasks within the VM enivronment.
Objectives included in this lab:
- Configure CONTROLLER-isaiah, ANSIBLE01-isaiah, and ANSIBLE02-isaiah
- Set up RSA key-pairs among CONTROLLER-isaiah and the two Ansible VMs
- Familiarize myself with working with Ansible
- Creating an Ansible script
- Installing and connecting to Webmin
- Automating an Apache installation
- Automating with Ansible in a Windows environment
In this short lab I worked to familiarize myself with how to deploy software through group policies.
Objectives included in this lab:
- Set up a share on MGMT01-isaiah to deploy software
- Editing OUs through PowerShell
- Set up a group policy for deploying software
- Use PowerShell to filter through event logs
This lab served as an introduction into Distributed File Systems, building off the some of the foundations of last weeks lab. Essentially we set up a share that is replicated between several computers. If one of the systems is down, the DFS share will still be up as another computer is still hosting the files.
- Setting up and configuring DFS01-isaiah & DFS02-isaiah
- Creating shares on each of these VMs
- Installing DFS management tools on MGMT01-isaiah
- Installing DFS replication on DFS01-isaiah & DFS02-isaiah
- Setting up and configuring DFS namespaces
For my project I decided to install a Dockerized version of ownCloud, a free and open-source software for sharing and syncing files. In my project I needed to customize the trusted domains to allow for computers other than
DOCKER01-isaiah
to be able to access ownCloud. I also adjusted the ownCloud administrator username and password.Objectives included in this project:
- Install ownCloud through Docker on
DOCKER01-isaiah
- Configure ownCloud to adjust default credentials, and trust other domains
In this project, we introduced OpenNMS into our VM environment, and configured several network management traps.
Objectives included in this project:
- Set up and configure PostgreSQL
- Set up and configure OpenNMS
- Configure OpenNMS through the web GUI
- Set up alarms for when two hosts go down, and for when disk space usage is beyond a certain threshold
This project involved deploying as service that uses a remote file system for its storage. For our project we decided to use SeaweedFS for our file system to host the files for an Apache server.
Objectives included in this project:
- Install and configure both SeaweedFS and Apache
- Set up a share that is replicated between both CONTROLLER & DOCKER01-isaiah
- Execute test scripts to indicate a working environment
For the final project our team is going to built a medium-sized enterprise from scratch for a client over a period of some weeks. We demonstrated our integration efforts to a client manager as part of user acceptance testing in a series of milestones.
Objectives included in this project:
- Redundant AD infrastructure using DC1 + DC2. One should be able to turn off DC1 or DC2, and still be able to manage AD and login via W1 + W2 + MGMT1.
- DHCP1 and DHCP2 should provide DHCP services to your LAN. They should also be redundant. Turn off DHCP1 or 2 and ipconfig/release and /renew from W1.
- MGMT2 will be an Ansible controller system that can control your entire domain, with the exception of Windows workstations and the firewall. You should be able to run interactive commands against all these systems.
- Util will be a system that you can provision with a new application via MGMT2 and Ansible. It can also be used to assist in meeting other requirements. Deploy an application that has not been covered in class to util, using an Ansible playbook.
- MGMT1, DC1, DC2, DFS1, DFS2 and your workstations represent your Active Directory Infrastructure. Your domain should be your groupname.local. Join all Windows systems to the domain and at least one of your Linux systems.
- Create an AD security group called linux-admins. Members of this group should be able to sudo to root on one of your Linux systems (this has some implied sub-requirements).
- Install docker and a wiki/application of your choice on docker. (NOT WORDPRESS!)
- Create a Domain Group Policy that allows W1 + W2 to remote desktop between one another.
- Create a Domain Group Policy that applies corporate wallpaper to W1 + W2 + MGMT1.
- Create a Domain group policy that moves W1 and W2 user profiles and home directories to a DFS share.
- Use Ansible to install an apt-package.
- Use Ansible to install a yum package.
- Use Ansible to add a new Linux local user can be an SSH user or one with a password.
- Use Ansible to add a new Windows domain user.