System administrator

Basicintroduction

Systemadministrators

Mainlydividedintonetworksystemadministratorsandinformationsystemadministrators.Thenetworksystemadministratorismainlyresponsibleforthedesign,installation,configuration,managementandmaintenanceofthenetworkequipmentandserversystemoftheentirenetwork,andprovidestechnicalguaranteeforthesafeoperationoftheintranet.Theserveristhecoreofthenetworkapplicationsystem,whichisspeciallymanagedbythesystemadministrator;theinformationsystemadministratorisresponsibleforthedailymanagementandmaintenanceofthespecificinformationsystem,andhasthehighestmanagementauthorityoftheinformationsystem.

Mainresponsibilities

Infrastructuremanagement

(1)Ensurethesmoothtransmissionofnetworkcommunication

(2)Mastertheconfigurationofthebackboneequipmentandconfigurationparameterchanges,andbackuptheconfigurationfilesofeachdevice

(3)Equipthebackboneequipmentrunningthecriticalbusinessnetworkwithcorrespondingbackupdevicesandconfigurethemashotbackupdevices

(4)Responsibleforthemanagementofthenetworkwiringdistributionframetoensurethatthewiringisreasonableandorderly

(5)Masterthestatusoftheclientequipmentaccessingthenetwork,sothatyoucanQuicklylocate

(6)Taketechnicalmeasurestomanagethefrequentlyoccurringsituationsinthenetworkwhereusersneedtochangelocationsanddepartments

(7)Mastertheconnectionconfigurationwiththeexternalnetwork,Supervisenetworkcommunicationstatus,andcontactrelevantagenciesintimewhenproblemsarefound

(8)Real-timemonitoringoftheoperationoftheentirelocalareanetworkandnetworkcommunicationtrafficconditions

(9)DevelopandpublishnetworkinfrastructureUsemanagementmethodsandsuperviseimplementation

Operatingsystemmanagement

(1)Afterthenetworkoperatingsystemisconfiguredandputintonormaloperation,inordertoensurenetworkoperationThesystemisworkingproperly,andthenetworkadministratorshouldfirstbeabletoskillfullyusethevariousmanagementtoolsandsoftwareprovidedbythesystemtosupervisetheoperationofthesysteminrealtime,andtodetectanddealwithfaultsignsintime.

(2)Duringthenetworkoperation,thenetworkadministratorshouldkeepabreastofthenetworksystemconfigurationandconfigurationparameterchanges,andbackuptheconfigurationparameters.Networkadministratorsshouldalsodynamicallyadjustsystemconfigurationparameterstooptimizesystemperformanceinaccordancewithchangesinthesystemenvironment,businessdevelopmentneeds,anduserneeds.

(3)Networkadministratorsshouldestablishahotbackupsystemforkeynetworkoperatingsystemserverstopreparefordisasterprevention.

Applicationsystemmanagement

(1)EnsuretheuninterruptedoperationofvariousnetworkapplicationservicesandthegoodperformanceoftheThelossandimpactcausedbythefailurearecontrolledtoaminimum.(2)Forcriticalnetworkapplicationsystemsthatrequireuninterruptibility,inadditiontomasteringandbackingupsystemparametersandregularlybackingupsystembusinessdatainsoftwaremeans,ahotbackupofthesystemmustbeestablishedandconfiguredonhardwaremeanswhennecessary.

(3)Fornetworkapplicationserviceswithhighuseraccessfrequencyandsystemload,networkadministratorsshouldalsotakesharedtechnicalmeasureswhennecessary.

UserServiceandManagement

(1)Useraccountopeningandcancellation;

(2)Usergroupsettingandmanagement;

(3)Authoritymanagementandquotamanagementofuseravailableservicesandresources;

(4)Userbillingmanagement;

(5)includingTechnicalsupportservicesforuserdesktopnetworkedcomputersanduser-sidesupportservicesforusertechnicaltrainingservices.

Securityandconfidentialitymanagement

(1)Securityandconfidentialityaretwoaspectsofthesameproblem.Securitymainlyreferstopreventingexternalattacksandintrusionsonthenetwork.Confidentialitymainlyreferstopreventingtheleakageofinformationinsidethenetwork.

(2)Forordinary-levelnetworks,themaintaskofthenetworkadministratoristoconfigureandmanagethesystemfirewall.Inordertobeabletodetectandpreventnetworkhackerattacksintime,anintrusiondetectionsystemcanbeaddedtoprovidesecurityprotectionforkeyservices.

(3)Fornetworksthatrequirehighlevelsofsecurityandconfidentiality,networkadministratorsshouldnotonlytaketheabove-mentionedmeasures,butalsobeequippedwithanetworksecurityvulnerabilityscanningsystem,andtakedisasterrecoverytechniquesforkeynetworkservers.

(4)Amorestringentsecret-relatedcomputernetworkalsorequiresabsoluteisolationfromexternalpubliccomputernetworks.Securitymeasuresmustbetakenfortheroomswheresecret-relatednetworkcomputersandnetworkbackboneequipmentareplaced,andmanagementandTocontroltheentryandexitofpersonnel,theworkingconditionsofsecret-relatednetworkusersmustbefullymanagedandmonitored.

Informationstoragebackupmanagement

(1)Takeallpossibletechnicalmeansandmanagementmeasurestoprotecttheinformationsecurityinthenetwork.

(2)Forsystemsanddatathatdonotrequirehighlevelsofreal-timework,atleastnetworkadministratorsshouldalsoperformregularmanualbackups.

(3)Forkeybusinessservicesystemsanddataandinformationwithhighreal-timerequirements,networkadministratorsshouldestablishastoragebackupsystemforcentralizedbackupmanagement.

(4)Finally,itisveryimportanttokeepthebackupdatainasafeplaceatanytime.

Computerroommanagement

(1)Masterthewiringofdatacommunicationcablesinthecomputerroom,ensurereasonablewiringandconvenientmanagementandmaintenancewhenaddingorremovingequipment;

(2)Inchargeofthepowersupplylinearrangementofequipmentinthecomputerroom,payattentiontothereasonableconfigurationoftheloadwhenaddingorreducingequipment;

(3)Managethetemperature,humidityandventilationconditionsofthenetworkcomputerroom,andprovidesuitableworkEnvironment;

(4)Ensurethenormaloperationofvariousequipmentinthenetworkcomputerroom;

(5)Ensurethatthenetworkcomputerroommeetsthefiresafetyrequirements,thefirealarmmonitoringsystemisworkingnormally,andthefirefightingmeasuresareeffective;

(6)Takemeasurestoensurethesafeoperationofnetworkequipmentunderunattendedconditionswhentheexternalpowersupplyisunexpectedlyinterruptedandrestored;

(7)KeepthecomputerroomcleanandcleanInordertorecordtheoperationlogofthenetworkcomputerroomontime,formulatethenetworkcomputerroommanagementsystemandsupervisetheimplementation.

Othermanagement

(1)Cooperatewithotherdepartmentsintheconstructionofdepartmentallocalareanetworks,andproposeplansandstandards.

(2)Cooperatewiththesecuritydepartmenttocollectevidencefornetworkbadbehavior.

(3)Realizethenetworkcenterservicefeedbackwork,andtimelyreportnetworkoperationinformation.

Basicpoints

Responsiblefortheimprovementofprocessesandsystems

(1)Specificnetworkaccordingtospecifications,processesandproductdescriptionsDailymaintenance,configuration,installation,etc.ofthesystemserver;

(2)Inpractice,feedbacktheproblemsfoundintimeandassistinsolvingthem,andprovidesuggestionsfortheimprovementofprocessesandsystemsaccordingtopractice;

Responsibleforsystemoptimization

Basedontheanalysisofthenetworkandsystemintermsofperformancecapacity,reliability,security,etc.,providesuggestionsforsystemoptimization,andperformsystemoptimization.Optimizeworktoimprovetheefficiencyofthenetworkandsystem;

Responsibleforthedailymaintenanceofthesystem

(1)Maintainthesafetyofthecompany’snetworksystemandtelephonesystem,andguaranteeReliableoperationofthenetwork;

(2)Assistthesuperiorinmaintainingthecompanydatabasetoensurethenormaloperationofthecompany’sserverequipment;

(3)Maintaincomputers,networkhardwareequipment,andsystemsoftware,ApplicationsoftwareandotherrelatedITfacilities;

(4)Diagnoseandtroubleshootequipmentandsoftwarefailures;

Responsiblefordocumentmanagement

Compileandorganizesystemdocuments,recordITequipmentanditsusagestatus,andrealizethestandardizationofsystemdocumentmanagement;

Skillstraining

(1)ProvidethecompanyintimeProvidetechnicalsupportforthenormaloperationofcomputersandnetworksinvariousdepartmentstoimproveofficeefficiency;

(2)Assistsuperiorsincompilingbasiccomputerknowledge,commonsoftwareandothermanagementsoftwareteachingmaterials,assistsuperiorsintraining,andprovideendusersProvideITtechnicalsupport.

OccupationPositioning

Firstofall,computernetworkadministratorisaprofessionthat"existsfirstandthendefined"

Computernetworkadministrator(referredtoasnetworkadministrator)isAboomingandemergingprofessionhasbecomeamust-havejobpositioninmostcompaniesinjustafewyears,andithasalsobecomeaprofessionthatmanyyoungpeopleyearnfor.Networkadministratorsarealsoa“pre-existingandthen-defining”profession.Thelackofprofessionalstandardsfornetworkadministratorsandthelackoftraditionaleducationmakethesocietygenerallyhavemanydoubtsaboutthisprofession,whetheritisjobseekersoremployers.Thefollowingquestions:Whatisaqualifiedcomputernetworkadministrator?Whatspecificworkdoesacomputernetworkadministratorneedtodo?Whatarethenecessaryskillsasanetworkadministrator?Howtotrainqualifiedcomputernetworkadministrators?For"networkadministrators"practitioners,howdotheyacquirerelevantknowledgeandskills?

Secondly,networkadministratorsmustestablishtheconceptoflifelonglearning

Lifelonglearningistheterminatoroftraditionaleducationconcepts,systems,structures,andorganizations.Itsvalueconceptisderivedfromthecurrentsituationoftheexplosionofknowledgeandtherapidincreaseofinformationincontemporarysociety,andithasbecomeanewwayoflifeinmoderntimes.Intraditionalknowledgeeducation,thereisnoprofessionalsettingfornetworkadministrators.Inaddition,teachingthatemphasizestheorycannotmeettherequirementsofworkthatemphasizeshands-onability.Practitionerscanonlymeettheneedsoftheirpositionsbyconstantlylearningandexploringatwork;ontheotherhand,ITtechnologyisundoubtedlyoneofthemostrapidlydevelopingtechnologiesinthisera,anditspopularityandapplicationspeedisalsounparalleled.Thisrequiresthat"networkadministrators"mustestablishtheconceptoflifelonglearning,learnandmasterthelatestandmostpracticaltechnologiesthroughvariouschannelssuchasparticipatingintraining,self-study,andcommunication,andbuildandimprovetheirowntechnicalsystem.

Finally,whatisaqualifiedcomputernetworkadministrator?Whatskillsdoesacomputernetworkadministratorneedtomaster?

Dependingonthebusinessnatureandscaleofanenterprise,thejobrequirementsofnetworkadministratorsarealsoquitedifferent.Companieswithlarge-scaleITinformationsystemshaveafinerdivisionoflabor.Networkadministratorsmayonlyneedtoberesponsibleforthenetworkoperationandmaintenanceofthecomputerroom;whilesomesmallcompanieshaveonlyonenetworkadministrator,andhe(she)maynotonlyberesponsiblefortheoperationandmaintenanceoftheITsystem.Inadditiontotheequipmentmanagementofthecompany,itisalsoresponsiblefornetworkmanagementandsystemmanagement,andsomecompaniesneednetworkadministratorstodosomesimplewebsiteconstructionandwebpageproduction.

Inshort,therequirementsfornetworkadministratorsarebasicallylargeandcomprehensive.Theydon'tneedtobeproficient,buttheyhavetounderstandeverything.Therefore,tosumup,aqualifiednetworkadministratorisbesttohavesolidtheoreticalknowledgeandapplicationskillsinthesixaspectsofnetworkoperatingsystem,networkdatabase,networkequipment,networkmanagement,networksecurity,andapplicationdevelopment.Tobehandy,withease.

Essentialskills

Usermanagement

WhetheritisUNIXorNT,usermanagementisinthefirstplace,Asanovice,youmustfirstgrasptheoperationssuchasadding,deleting,andrestrictingusersimmediately.Thisincludestwoaspects:

Oneistolearntouseafriendlygraphicalinterfacemanagementtoolset,intheSUNSolarissystemisthe/usr/bin/admintoolstoolsetintheOpenwinenvironment;usedinSCOUNIXSysadmshmanagementShelltomanageusers;inNovellsystem,youonlyneedtousetheSysconmenutocompletetheaddition,deletion,andrestrictionsettingsofusersandusergroups,etc.Forthesamebatchmanagementofmultipleusers,usethemakeusranduserdefutilitiestoDo;inNT,usethedomainusermanagementtoolorusermanagementtoolunderthemanagementtool(common)groupintheprogramgroup.Usingthesetools,youcancreate,delete,lock,andrestrictpermissionsforusersverysimplyandclearly.IntheusergroupmanagementunderNTandthesystempropertiesprograminthecontrolpanelmanagetheuserenvironmentsettingprofile,usetheSystemPolicyEditortoconfigureadomain-widecomputeroruser-basedconfigurationandwriteloginscripts.

Thesecondistolearnusermanagementunderthecharactercommandline,mainlyintheUNIXorLinuxenvironment,includingeditingtoolsVi,emacs,etc.tooperate/etc/passwdordirectlyuseaddusr,deleusrandotherusermanagementCommandandusethepwconvcommandtomakethe/etc/passwdconsistentwiththeshadowfile,useSCO's/etc/rmusercommandtodeleteusers,usethenewgrpcommandtoadduserstoanewgroup,andincludethecommandmkdirforcreatinguserdirectories,whichisassignedtouserattributesThegroupattributecommandschownandchgrp,andtheuserarealimitcommandquotalimitthesizeoftheuserareatopreventtheuserareafromoccupyingtoomuchharddiskspaceandcausingthesystemtocrash.Amongthem,aspecialreminder,ifyouwanttostrictlyrestrictuserpermissions,theuser'sregisteredshellcanuse/usr/lib/rsh.Theuser's.profileand.loginfilescanusethesystemstandardconfigurationfile,oryoucansetthecorrespondingsettingsinthe.profile,andusetheSUcommandorSUUsernametoentertheuserenvironmentforspecificdetection.Inaddition,fortheuser'smessagepublishingsystem,thealertfunctionisusedinNTtosendout,andthecomputer|sendmessagefunctionintheServerManagerisusedfortheremotehost.UsethesendcommandinNovell.InUNIX,thewallorwritecommandisused.Youcanalsousethedailymessagefile/etc/motdorthenewscommandtoissuethecontentsofthe/usr/newfile.

Securityandlogmanagement

Asasystemadministrator,youmustbeabletofindthecauseofthesystemItemlogforinspectionandanalysis.InNT,usetheEventViewerintheAdministrativeToolsmenutoviewtheSYSTEM,SECURITY,andAPPLICATIONlogfilesofthesystem.ForNetware,theerrorlogistheSYS$LOG.ERRfile,whichcanbeobservedandrecordedthroughviewfileservererrorlogundersupervisoroptionsinthesysconmenu.Inaddition,thevolumeerrorlogfileistheVOL$LOG.LOGandtransactiontrackingprocessingineachvolume.SystemerrorlogfileSYS:TTS$LOG.ERRfileinthevolume;variouslogsinUNIXincludethesystemerrorregistrationfilemessageinthe/usr/admdirectory,thelogfilesulogusingthesucommand,andthelasttimeeachuserrecordsTheregistrationfilelastlogoftheregistrationtime,therelevantinformationfilewtmpoftheregisteredusersinthesystem,thecontentitemfileacctofthecommandsexecutedbyeachuser,andtherelevantinformationfileutmpofthecurrentregistereduserinthe/etcdirectoryandlogfilesgeneratedbyotherapplications.Forsomeoftheselogfiles,youcanusethewhoorwcommandtoviewthelogged-inusersofthecurrentsystem(intheXENIXsystem,youcanalsousethewhodocommandtodeterminethebehaviorofthecurrentuser);thelastcommandtoviewthepreviousloginstatus,thesecommandscanbeusedincombinationGrepperformsconditionalcontrolselectionfiltering;usefindtoviewfilesandtheirowners,especiallytomonitorprocessesandfileswithrootaccessrights,andtocheckbootfiles/etc/inetd.conf,/etc/rc.local,/etc/passwdandcornOrthefilesrunbyat,andusethecorntab-landcorntab-rcommandstolistanddeletetheuser'scorntabfiles;usels-lRtogeneratethemainchecklist,andperiodicallygeneratenewtables,usethediffcommandtocompare,anduseThenewtablepassedtheinspectionbecomesthenewmaininspectiontableuntilthenextinspection.Personally,Istronglyrecommendcommentingoutallthecommandfilesstartingwithrininetd.conf,andremovingalltheitemsin/etc/hosts.equiv,anddoesnotallowuserstosetuppersonal.rhostsfiles,sothatthetrustedhostisnotsetuporisEmptytostrengthenthesecurityofthesystem.

Systemprocessmanagement

InUNIX,systemreportcommandsincludedftoreportthenumberoffreediskblocks;dutosummarizediskusage;niceUsedtochangetheprioritysetbyacommand;Pstatisusedtoreportsysteminformation,suchasnodetableorprocesstable;sarisusedtoreportsystemactivitystatus,suchasCPUusageandbufferactivitystatus;timeisusedtoprintthepastTime,systemtime,andcommandexecutiontime;uptimeisusedtoreportsystemactivity,suchassystemstartuptimeandrunningtime;vmsfatisusedtoreportpagenumbersandsystemstatistics,suchasbranchpoints.Theps-auxinBSDUNIXortheps-efinsystemVandthepsauxinLINUXareusedtoviewtheprocessstatusanditshost,andusethekillcommandtostopabnormalprocessesintime.InNT,TaskManagerisusedtoviewtheusageofcpuandmemory,processmanagement,andperformancemonitorisalsousedforstatusmonitoringtomaketimelyadjustments.Itisworthnotingthatwiththeexpansionofnetworkapplications,viruseshavebecomeamajorthreattonetworksecurity.Forthisreason,installingvirusdetectionandremovaltoolsonthenetworkhasbecomeamustfornetworkmanagement.

BackupManagement

Asamoreimportantsystem,timelybackupisnecessary,soyoumustdevelopthehabitoftimelyandregularbackupfromthebeginning.Masterthebasicmethodsandstepsofbackup,andusebasicbackupandrestorecommands,suchas:NTBackupprograminthemanagementtoolsetinNT.BecausethereisnoschedulingcapabilityinBackup,thebackupmustbecompletedmanuallyorscheduledwiththeATcommandline;andthird-partybackupsolutionsareused.SystemVinUNIXusestar,cpio,backup,restor,rolcopy,BSDusestar,dump,restor,etc.,andSCOusessysadminforfilesystembackupandfilerecovery.Thebackupmustalsomakeaplantospecifywhenandwhatkindofbackup,includingfullbackupandincrementalbackup.Forexample,youcandoafullbackuponceaweekandanincrementalbackupeveryday,orifthesystemdoesnotchangefrequently,youcanperformafullbackuponceamonth.,Incrementalbackuponceaweek.Recoveryandfault-tolerantmanagementWhenthesystemfails,asasystemadministrator,youmustbeabletolocateandsolvetheproblem.Thisreliesontheanalysisoftheconsoleerrormessagesandlogfiles,andmoreimportantly,thedailybackupandemergencysystemdiskpreparation.ForNT,itistocreatesystembootdisks,emergencyrepairdisks,etc.,anduseDiskAdminstratortocreateRAIDoperationssuchasmirroring.ForUNIX,italsoreliesontheestablishmentofthesysteminstallationdiskandemergencyrepairdisk.Inparticular,aftermakinganychangestothesystem,youmustregenerateanewsystemrecoverydisk,performasynchronousbackupandusesingle-usermodetoeliminatemostoftheproblemsofthesystem,thatis,usetheboot-singlecommandwhenstarting,whichisakey.Ofcourse,theadministrator'spasswordmustnotbeforgotten,otherwise,itwillcausealotoftrouble,butfortheadministrator,heandotherusershaveimposedrestrictionsontheuseofpasswords,suchaspasswordlengthanddaterestrictionsandotherrestrictions,Isverynecessary.Toosimplepasswordsoftencauseinsecurity.Intermsoffaulttolerance,italsoincludesfrequentlyrunningvariousmaintenancesystemcommands,suchasthesuperblockmaintenancecommandSYNC,andthefilesystemcheckcommandfsck.

Filesystemandpoweron/offmanagement

Inallmulti-usersystems,duetothewidespreaduseoffilebuffering,filemodificationsaremadeaftermemoryAfterwritingtothedisk,thekernelprogramperiodicallyrefreshesthesebufferstokeepthefilesandbufferssynchronized.Therefore,shuttingdownthesystemwithoutterminatingitwilloftencausesynchronizationdamageandfilesystemerrors.InNT,usetheshutdownsystemoptioninthebootmenutoshutdownthesystem;UNIXusesshutdown,halt(haltsys),rebootandothercommands.Itisgenerallyrecommendedtouseshutdownplusparameterstoshutdownorenterthesingle-userbackupstate.Thepowercannotbeturnedoffuntiltheshutdownprocedureiscompleted.Inanycase,thismustbekeptinmind.

Inaddition,whenmaintainingthefilesystem,youshouldalwaysrunthesuperblockconsistencycommandsync,filesystemcheckanderrormodificationcommandfsck,andusethemkfscommandwhencreatinganewfilesystem.SystemV'sfsstatwillreportthefilesystemStatus,anddevicemanagementcommandsmount,umount.NOVELLusestheFILERmenutomanagethefilesystemofthefileserver.

Networkmanagement

Networkmanagement,includingdebuggingofE-mail,DNSandWWW.ForE-mail,usesendmail-bt-Cfilename,ormailuserfirst,thentelnethost110,andusepop3commandssuchasuserusername;passpasswd;list;retr*;quitfordebugging.ForDNS,usethenslookupcommandfordomainnameresolutiontoseeiftheIPaddresscanberesolvedcorrectly.ForWWW,itischeckedthroughabrowser.Inaddition,checkthebrowsinglogunder~/httpd/.ForNT,checkwhethereachserviceprogramisrunningnormallythroughtheservermanagerunderthemanagementtool.TherestofthedetectionstepsarethesameastheUNIXsystem,exceptthatthesendmailcommandisnotused.Telnethost25,usehelohost,sendfrom:<yourname@hostname>,rcptto:<username@hostname>,data,messagebody,".",exitandothersmtpcommandsfordetection,andPOP3commandsarethesame.ThemanagementofWWWiscarriedoutdirectlythroughtheonlinemanagementmethodintheformofhttp.Theoperationissimpleandclear,andthereshouldbenoproblems.Inaddition,inthedailymanagementofthenetwork,itincludesusingpingtoviewthenetworkconnectionstatus,netstattoviewtheprotocolstatisticsandthecurrentnetworkconnectionstatus,ifconfigtosetthenetworkinterface,andtracerttomonitortheroutingstatus.ForNTsystems,inadditiontotheabovecommands,italsoincludestheuseof/winnt/system32/Regedit32tocontroltheregistry,IPconfigtoviewIPsettings,andtheuseoftheNetworkmonitorsupportingtheNTservertoperformnetworkloadandperformancestatistics.TheNovellsystemusestheNETADMINutilityorthegraphicalinterfacemanagementtoolNetwareAdminstratortomanageandplanthenetwork,andusethemonitormenutomonitorthestatusofthelocalserver.Comparedwiththethird-partytoolsetofUNIX,thenetworkmanagementsoftwarethatcanberunasamanagermainlyincludesHP'sOpenView,BAY'soptivity,IBM'sNetviewandSUN'sSunNetManager.

Administratorinterview

Whatisyourtechnicalbackground?

Inviewofthedifferentscopeofthesystemadministrator'srole,therequirementsforprofessionaleducationarealsodifferent.Mostsystemadministratorjobsrequireasolidfoundationincomputerscience,suchasabachelor'sdegreeinengineering.Someorganizationsrequireentry-levelcertifications,suchasCompTIAServer+orsimilarspecifictechnologycertifications,suchasMicrosoftCertifiedProfessionalorVMwareCertifiedAssociate-DataCenterVirtualization(VCA-DCV).

Althoughthereisalotofflexibilityintheexpectedresultsofthisanswer,understandyourgapandbepreparedtodiscussit.Ifyoudonothaveanyspecificcertifications,doyouhaverelevantorsimilarexperience?Forexample,ifthepositionrequiresaVMwareCertifiedProfessional5-DataCenterVirtualizationcertification,andyoucurrentlyhaveaVCA-DCV,youcandiscussyourexpertiseandrelatedapplicationsofsimilartechnicalskills.

Beforetheinterview,confirmthatallyourcertificatesarewithinthevalidityperiod,andconfirmwiththecertificationserviceproviderwhetheryourinformationinthedatabaseiscorrect.PotentialemployersmayinquireaboutthevalidityofthisinformationinMicrosoft,VMwareorCompTIAandotherorganizations.Outdated,outdated,orconflictinginformationwillmakeyousuffer.

Respondingtothisinterviewquestioncanalsoshowhowyouassessthevalueandabilityofthecompany.Whendescribingeducationalexperienceandcertification,emphasizehoweachcertificatehelpsyou;demonstratethestrategicsignificanceofeacheducationalinvestment.

Whatisyourbackgroundandexperienceintheuseofoperatingsystemsandservices?

Systemadministratorsneedtoensuretheconfiguration,optimizationandoperationoftheserverandterminalnodes,sotheinterviewwillinevitablyturntoserverhardwareandoperatingsystems,suchasMicrosoftWindowsServer2012R2,VmwareVsphereVirtualizationmanagementprogram,aswellasthescaleandapplicationofnetworkservices,suchasactivedirectory,domainnamesystem,dynamichostconfigurationprotocol,virtualprivatenetwork,etc.

EmployerswanttoknowthescopeofyourfieldandwhetheritmatchesthecoretechnologyoftheirITinfrastructure.Thetypicalresponseistotalkaboutthetasksyouareresponsibleforandanyspecialprojects,suchastestingandinstallingoperatingsystempatches,orupgradingthemanagementservertoWindowsServer2012R2.Don'tworryaboutwhetheryourexperiencecanmatcheachrequirement,becauseassistiveskillscanenhanceworkability.

Howtodealwithuserandterminalsystemsupport?

Theroleofsystemadministratorsusuallyextendsbeyondthedatacentertoendusersandtheirdevices.

Respondingtosuchquestionsintheinterviewisanopportunitytohighlightyourfamiliaritywiththehelpdeskticketsystemandremotedesktopmanagement,especiallyinlargecompanieswithmanyemployees.

Limitingthediscussionframeisaneffectivesolution.Theyalreadyknowthatyoucanpatch,upgrade,orinstallmemoryforWindows.Provethatyouunderstandthebusinessvalueofusersupportandclearcommunication,andcanusetoolstosolveproblemsandquicklyrestorefunctionality.Explainthespecifictoolsusedandhighlightthebenefitstheycanbring.

Highlightyourexperienceandabilityinequipmentmanagementinotherdatacenters,suchascontrollingenduseraccess,firewall,routerandswitchmanagementbackground.Explainyourexpertiseinsomesystemmanagementtools,suchasSplunkandNagios.

Howtomanagesystemperformance

Systemadministratorsshouldregularlymonitortheavailabilityandperformanceofthesystem.Employersgenerallyasktoanswertwoquestionswheninterviewingsystemadministratorstounderstandtheirexpectationsofhardwareoperationandanassessmentofacceptableresourceutilizationlevels,suchasbackupplantasks,theabilitytopayattentiontoerrors,andcheckkeyeventlogs.

Datacenterdecision-makingrequiressolidindicators.Focusonkeyperformanceindicators(KPIs)thatcanserveyourcurrentrole.ThesemetricscanrangefromthehostlevelofCPU,memory,anddiskutilizationtothegranularityofthenumberofservervirtualmachineworkloads.

NotethateachKPIisveryimportanttothebusiness.Perhapsyouareobservingthenumberofvirtualmachinesperhostortheoriginoftheserver,becauseyouaretryingtoimprovetheintegrationofvirtualmachinesbyrecyclingunderutilizedresources.Ifyoudon'tknowwhateachKPIyoucareaboutrepresents,itmaybeadangeroussign.

Intheconversation,youcaninvokespecificmonitoringandmanagementtoolssuchasSolarWinds,ManageEngineorNagios.Introducethesetoyourpotentialemployers-showthatyoucaneasilytransitionfromonetooltoanother.

Howtohandlebackupandrecoverytasksinthecurrentrole

Systemadministratorsstorephysicalandvirtualbackupstovariousmedia,storagelayers,orArchivingsubsystem.

Itisimportanttobefamiliarwithspecificbackuptoolsandunderstandsoundbackupandrecoverypractices,sotalkaboutthetoolsyouuse,suchasCommVaultEnterpriseBackupSoftwareorSymantecNetBackup.Recoveryisoftentheweakestlinkinanydataprotectionstrategy,soitisnecessarytoemphasizeverificationortestingofbackupmethodstoensurerecoverability.Forexample,restorethevirtualmachinetothetestserverthroughreplicationtoverifytheintegrityofthebackup.

Backupandrecoveryalsoaffectdataretention,legaldiscovery,andrelateddatasecurityissues,suchasdatatheftandregulatorycompliance.Thesought-aftersystemadministratorunderstandsbackupmethodsthatcansolvetheseimportantbusinessproblems.Forexample,ifyourresumebackgroundincludesdatamanagement,thenyoucandiscussmethodsofarchivingordestroyingdataduringtheinterview.

Adomainthateverysystemadministratormustknow

Whatisthemostdifficultproblemyouhaveeversolved?

Thisisoneofthemostpropellingquestionsintheinterview.Systemadministratorsareprofessionaltroubleshootingexpertswhocanidentifyandsolveproblemsinhardware,software,networks,services,andapplications.

Somesystemadministratorinterviewsalsoincludeasimpletroubleshootingtestscenario.Highlightrecentexperiencetoemphasizeyourdiagnosticprocessandexpertise.Inashortexample,youcanexplainhowtodeterminetheproblem,usesystemlogstonarrowthescopeoftheproblem,usePerfMonandotherquerytoolstotestperformance,usePowerShelltoqueryorchangeconfigurationdata,andthefinalresultofthisseriesofstepsSolutions.

Showtopotentialemployersthatyoucanuserationalityandmakefulluseofdiagnostictoolstosolveproblemsandquicklyrestorefunctionality.Emphasizethatitcanensuretheavailabilityofapplicationsandservicesduringprocessing,suchasmigratingworkloadsfromfailedservers.

Howtomanagethevirtualizedserverprocess

Don'tbefooledbythistypeofinterview.Virtualizationisundoubtedlyanimportanttechnologyatpresent.Systemadministratorsshouldhavedetailedknowledgeofhypervisors,sofocusonyourexperienceinhypervisorsorhybridmanagement,aswellasremotemanagement(physicalserversandvirtualmachines).

Butdon’tlimityourselftothis.

Thisquestionisaboutstrategy,notjusttechnicaldiscussions.Asaleader,howdoyouweigh,organizeandexecutethedeploymentofthisemergingtechnologyinthedatacenter?HowcanITprovidecost-effectiveservicestoenhancethecompetitivenessofenterprises.

Thisisagoodopportunitytostandupandbecomeamanager.Talkabouthowtoevaluatehypervisors,howtodeterminewhichworkloadsneedtobevirtualized,performperformancetestingandensurethedecision-makingprocess,andhowtomaximizeuserandbusinessbenefitsfromvirtualizationtechnology.

Related Articles
TOP