Previous | Next

Objectives| Introduction| Policy and Penalty| Records| User Liaison| Observation| Conclusion| Review Questions

Section 5


SYSTEMS ADMINISTRATION THEORY


Objectives


By the end of this section you should

Introduction


Not every responsibility of a Systems Administrator is dependent on the type of machine or operating system being used. There are some tasks that have to be undertaken whether UNIX, VMS or any other operating system is being used. These tasks can be as, if not more, important than the technical portion of the job.

These machine independent tasks include


Policy and Penalty


Think of the computer systems you manage as an environment in which humans live and work. Like any environment, if anarchy is not to reign supreme then there must exist some type of behavioural code that everyone lives by. In a computer system this code is liable to include (amongst others) such things as A set of rules by themselves is not enough. There must also exist If any one of these necessary components is missing the system may not work to the best of its ability.


Types of Policy


On a computer system there should be set policies (of which everyone is aware) for a whole range of issues including (but not limited to) Depending on the site the Systems Administrator will take on responsibilities in any one or all of these components. At the very least he or she must be aware of them and make sure that they all exist. At most sites the Systems Administrator will be responsible for enforcing policy. It is very rare for a Systems Administrator to be charged with creating policy.

Exercise 5-1. What factors do you think would affect the setting up of a sites policy and penalty components? e.g. the type of work being carried out the company might affect security procedures.

Exercise 5-2. For what other issues might it be important to have policies on?


Records


It is not unusual for a Systems Administrator to spend two to three days trying to fix some problem that requires minor changes to obscure files hidden away in the dim, dark recesses of the file hierarchy. It is not unusual for a problem of this sort to crop up unexpectedly every six to twelve months.

What happens if the Systems Administrator didn't record the solution? Unless he or she is blessed with a photographic memory there is liable to be another two to three days lost trying to fix the problem.

Records of everything done to the system must be kept and must be accessible at all times.

It is typical for a Systems Administrator and/or a computer site to maintain some type of log book. There is no set format to follow in keeping a log book.

Log Book Format


There are two basic types of log books that are used. Table 5.1. lists compares these two forms of log book.
	Electronic				Paper

For		Against			For		Against

easy to update	if the machine is down	less prone to	harder to update
 and search	 there is no access	 machine down time	 and search

easy to include	can be hard to		can be carried	can become messy
 command output	 include diagrams	 around		 and hard to read	

	Table 5-1. Comparison of electronic versus paper log books.

What Information should be Logged?


Anything that might be necessary to reconstruct the current state of the computing system should be stored. Examples of necessary information includes

Example Log Book Layout


The type of information recorded will depend on your responsibilities and the capabilities of your site. There might be someone else who looks after the physical layout of the network leaving you to worry about your machine.

It is possible that a log book might be divided into separate sections. The sections might include

Each entry in a log book should contain information about time, date, reason for the change, and who made the change.

If you intend using a paper based log book then one suggestion is to use a ring binder. Using a ring binder you can add pages to various sections if they are starting to fill up.


User Liaison


Systems Administration is like being a policeman. The only time the users come to see you is when they are in trouble. If the computer system is working without a problem they won't give the Systems Administrator a second thought.

The following reading was first published in "The Australian Systems Administrator" (Vol 1, Issue 2, June/July 1994) the bi-monthly newsletter of the Systems Administrators Guild of Australia (SAGE-AU). It provides an example of how a real-life System Administrator handles user liaison.

Communicating with Users


Copyright Janet Jackson.

Next to balancing conflicting demands, communicating with users is the hardest part of my job. I tend to make a great effort for little gain, whereas in technical endeavours a little effort can produce a major, long-lasting improvement (for example, taking ten minutes to set up regular, automated scratch area cleanups has saved me hours of tedious work and the users a lot of frustration).

Also, with users there are emotions to take into account. It doesn't matter whether the computer respects you, but if the users respect you life is a lot easier.

My aim in communicating with users is to make life (my job and those of the users) easier by:

In this column I'm going to describe some of the communication vehicles I've tried, and how effective they've been for me. I'll start with those I've found least effective overall, and work my way up.

Probably the method most useless with the general user community is the policy statement. The typical user just isn't going to read it. However, it can be a good way of communicating with management. Drafting a good policy statement (based on discussions with everyone, but especially with them) shows you mean business and understand how your work fits into the organisation. It should cover the responsibilities of the systems administrator as well as those of the users.

Group meetings, whether of the users in general or of a committee of representatives, can help people -- again, especially senior people -- feel more confident that things are going OK, but aren't much use for disseminating information. If a meeting is run well you can have a productive discussion of major issues, but if run badly it is likely to turn into a gripe session.

Paper memos are to be avoided, because they encourage stiffness and formality. I use them only to answer other people's paper memos (which are usually complaints) and then only when I don't think the person will read it if I do it by email. Replying by email to a memo has the effect of saying "There's no need to be so formal".

There are a number of leading-the-horse-to-water methods, which only work if the user makes an effort. You can use electronic information services, such as bulletin boards, newsgroups, Gopher, or online manuals; and you can get together a library of printed manuals and books. If you provide easy access to high-quality information, the interested user can learn a lot. Unfortunately it's often the disinterested user that you really want to reach.

People often come to my office to ask me things. You'd think that face-to-face communication would work the best, but in this particular setting it doesn't because I am not comfortable. It's not so much that I resent interruptions -- it's that I don't have an office, only a desk. There's no room for a visitor's chair; to talk to anyone I have to swivel round and face backwards; and people make a habit of sneaking up on me. Hopefully, one day my campaign for proper accommodation will be successful, and it will be interesting to see how much difference it makes.

Talking on the phone is only good for emergencies. Someone is always interrupted; there's no body language; and you tend to forget half of what you wanted to say.

I write a column, "Computer Corner", in our staff newsletter. I sometimes write about issues (such as what I'm trying to achieve) and sometimes about technical tips. This column isn't as useful as I'd hoped. The first problem is that there isn't room to say much, because the newsletter is short and a bit, shall we say, irregular. The second problem is that the rest of the newsletter tends to be kind of dull (lists of visitors; dry field-trip reports; the occasional births and deaths) so people aren't so eager to read it. When I pointed this out I was told that it is deliberately impersonal and non-funloving because some of the more senior readers are rather easily offended. Sigh.

Next on the scale are signs (on doors, noticeboards, etc) and electronic messages-of-the-day. People have a strong tendency to miss the former and ignore the latter. It may help to make them more interesting with graphics, pictures and human-interest items.

Seminars and workshops are worthwhile if you can get people to attend, but they're a lot of work. If not many turn up, you don't get much return on your investment. Students can sometimes be induced to attend by making it count towards their marks. In other situations, offering food, door prizes, alcohol, sex, drugs or rock-n-roll may help.

For explaining specific information (how to pick a good password; how UNIX file permissions work) I've found paper handouts reasonably effective. Some users take them quite seriously, even filing them for later reference. Unfortunately, others toss them straight in the bin.

After about 3 months in my current job I emailed everyone a questionnaire, asking such things as what they used the systems for, what new services they would like to see, and how often they did backups. I offered a chocolate frog to each person who replied. The subject line "Apply here for your FREE chocolate frog" caused some of the more pokerfaced members of staff to delete the mail without reading it, but otherwise the response was surprisingly good. In hindsight, I guess the questionnaire generated more PR than information, although it did confirm my suspicion that most people did not back up their data even though they were supposed to.

For me, the second most effective communication vehicle is email. Email is as informal as a personal visit or phone call, but you can get in a lot more information. It is also asynchronous: no-one has to be interrupted, and you don't have to wait for people to be available.

I often use email broadcasts for notification -- to tell people about impending downtime, for example. Email is quick, convenient, and reaches people who are working offsite. It is also informal and I think people feel more at ease with it than they do with paper memos and printed signs.

1-to-1 email gives people a sense of personal service without much of the hassle that normally entails. At my site people can email problem reports and questions to a special address, "computerhelp". Our stated aim is to respond within 2 working days. We don't always make it. But it does give people a point of contact at all times, even after hours, and it means we get a few less interruptions.

You'd think all of that might be enough, but no. My boss said, "You need to communicate more with the users, to tell them about what you're doing". I agreed with him. So I now produce a fortnightly emailed bulletin. It is longer and more formal than a typical email message, with headings and a table of contents. Most of the information in it is positive -- new software that we've installed, and updates on our programme of systems improvements. I also include a brief greeting and a couple of witty quotations. Judging by the feedback I've received, this seems to be working remarkably well -- much better than the staff newsletter column.

The only thing that works better than email is personal visits where I am in their office, usually leaning over their screen showing them how to do something. Taking an interest in their work helps a lot. I find this easy where they are graphing the temperature of a lake in glorious colour, but more difficult where they are typing up letters. I don't do enough personal visiting, partly because I'm so busy and partly because I'm not keen on interrupting people. It usually happens only when they've asked a question that requires a "show me" approach.

A disadvantage of personal visits is that they help only one person at once, whereas with email you can reach all your users.

To sum up: in communicating with users, I aim to teach them things and get them to respect me. By sending email I can help the most people for the least effort, although personal visits have much more impact. There are other useful methods, such as policy statements, newsletters, handouts and seminars, but they may not reach the ones who need it most.

It's hard. Very hard. If you have any insights or ideas in this area, I'd love to hear them, and I'm sure the rest of the readers would too.


Observation


The major responsibility of a Systems Administrator is to ensure that the computer system keeps working. A major part of this responsibility is simply checking the system regularly to see that everything is okay. You don't want the users telling you that the machine is down, you should already know.

The sort of regular observations required include

These tasks are repetitive and can be time consuming. This is especially so if you are in charge of tens or even hundreds of machines. So like many things in Systems Administration these tasks can, and should be automated. There are various collections of shell scripts and programs that perform these tasks.

Another important reason for making AND recording these observations is to use them in negotiations with management when it becomes time to lobby for better equipment. It is easier to convince management that you need another disk drive if you can show them reports that demonstrate that disk usage on the system has consistently run at 95% or higher.

We will examine the methods used on UNIX system to do this logging and observation in section 16.

Conclusion


The topics covered in this section can be issues that are overlooked or treated as poorer cousins by some Systems Administrators (the author included). They are however probably the most important issues covered in this text. It is essential that they are done well. If not, the computer system can quickly degenerate into anarchy.

The importance of


Review Questions


5.1. Choose one of the following UNIX commands. Print out the manual page for the command. Write a simple explanation of the command. Give to somebody who has never used UNIX and see if they can follow the documentation.

5.2. Decide on a format for your logbook (something you may already have done). Collect all the information that is mentioned in this section and anything else you consider important.


Previous | Next

David Jones (author)
Chris Hanson (html 25/08/96)