Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Linux Administration Best Practices

You're reading from   Linux Administration Best Practices Practical solutions to approaching the design and management of Linux systems

Arrow left icon
Product type Paperback
Published in Mar 2022
Publisher Packt
ISBN-13 9781800568792
Length 404 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Scott Alan Miller Scott Alan Miller
Author Profile Icon Scott Alan Miller
Scott Alan Miller
Arrow right icon
View More author details
Toc

Table of Contents (16) Chapters Close

Preface 1. Section 1: Understanding the Role of Linux System Administrator
2. Chapter 1: What Is the Role of a System Administrator? FREE CHAPTER 3. Chapter 2: Choosing Your Distribution and Release Model 4. Section 2: Best Practices for Linux Technologies
5. Chapter 3: System Storage Best Practices 6. Chapter 4: Designing System Deployment Architectures 7. Chapter 5: Patch Management Strategies 8. Chapter 6: Databases 9. Section 3: Approaches to Effective System Administration
10. Chapter 7: Documentation, Monitoring, and Logging Techniques 11. Chapter 8: Improving Administration Maturation with Automation through Scripting and DevOps 12. Chapter 9: Backup and Disaster Recovery Approaches 13. Chapter 10: User and Access Management Strategies 14. Chapter 11: Troubleshooting 15. Other Books You May Enjoy

Alternative remote access approaches

Traditional remote access, at least as we tend to think of it, is all designed around the needs of end users needing to use remote sessions as a replacement for their local desktop. As system administrators, it is great for us to be able to use those tools when they make sense for us, and it is necessary that we understand those tools because they are generally components that fall to us to administer, but for our own usage they may not be the most practical.

Of course, we can include most indirect remote access technologies under the heading of alternative remote access approaches, but they are basically just traditional access that has been tweaked to be more practical for our use cases. As administrators we want to reduce our logins or interactive sessions with remote machines in the hopes of removing that access completely, at least in an ideal world.

To this end, we have other methodologies today for running commands on our servers. There...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image