logo

User Instructions for Execution of Change Logger Script for Linux

This coursework requires the development of a Linux System Change Logger Script.

10 Pages1401 Words423 Views
   

Added on  2022-11-23

About This Document

This document provides user instructions for executing the change logger script for Linux. It also discusses the benefits of Linux operating systems and their vulnerabilities. The document covers various commands and tools used in Linux, such as ps, awk, and cut, and their applications in system health monitoring. The script helps system administrators manage resources and optimize performance.

User Instructions for Execution of Change Logger Script for Linux

This coursework requires the development of a Linux System Change Logger Script.

   Added on 2022-11-23

ShareRelated Documents
Running head: COMPUTER SYSTEMS AND NETWORKS
Computer Systems and Networks
Name of the Student
Name of the University
Authors note
User Instructions for Execution of Change Logger Script for Linux_1
COMPUTER SYSTEMS AND NETWORKS
1
User instructions for the execution of the change logger script for Linux
Linux operating systems has demonstrated to be beneficial for the organizations as
well individual users as it provides noteworthy features that makes it versatile to numerous
computing frameworks. Regardless, similar to some other broadly useful OS’s, it is
exceedingly vulnerable against different issues such as deadlocks, imperative infringement
and other progressive conditions.
There are various commands available in Linux care utilized by the system
administrator inside the shell a portion of those commands requires super user privileges than
a basic client (for example requires root privileges to execute the command). In the majority
of the cases the default root level privileges are not available to the other users in most of the
Linux distributions such as Ubuntu and Fedora. Hence, it is recommended to utilize the
‘sudo’ in order to execute the accompanied shell script and generate the health report in the
so that the processes can be viewed for the specific Linux server or system at any point of
time.
Whenever a file/directory is created inside Linux environment, default permissions is
assigned to that file/directory is decided and assigned depending upon the umask value. This
value is set by the umask command that sets the permission value in which the first digit
represents the permissions for the user who created the file, second digit represent the
permissions for group in which the users belong to and lastly the third digit represent the
permissions for other users.
In order to make the script executable, it is suggested to use the chmod command.
This command or the system call is utilized in order to change the permissions of a specific
User Instructions for Execution of Change Logger Script for Linux_2
COMPUTER SYSTEMS AND NETWORKS
2
file that needs some access restrictions. This command can also be used in order to change
special mode flags.
For this specific shell script the change of permission can be achieved by;
chmod + x mySysMonitor.sh
After this in order to execute the script the following command needs to be executed.
sudo ./ mySysMonitor.sh
Design consideration for Health monitoring script
According to the requirement of this project, the created script will generate a log
after collecting data about the different attributes of the Linux based system such as use of the
processor, memory as well as resource utilization. Furthermore home directories, usage of
files, and other processes, available network interfaces, their status, and finally the list of the
USB devices also will be checked and listed through the use of developed shell script along
with the current processes.
Listing the current processes
For listing all the processes in the concerned Linux system ps Command used. The
ps or the process status is utilized in order to retrieve information related to the currently
running processes in the system. The output includes the PIDs which are unique identification
numbers. A process inside a system which is often referred as task is a running instance of a
program.
Listing the top 5 CPU and RAM utilizing processes
In order to list the top 5 cpu and RAM consuming processes we used the following
command;
User Instructions for Execution of Change Logger Script for Linux_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer System and Network Assignment 2022
|10
|1850
|8

Linux Change Logger Script Execution Instructions and Design Considerations for Health Monitoring
|5
|1446
|410

IMAT5122 – Computer Systems and Networks Case Study 2022
|5
|902
|18

Linux System Change Logger Script
|12
|2750
|201

Linux System Change Logger Script
|26
|4743
|96

Linux Bash Scripting: Commands, Installation, and Outputs
|13
|2206
|488