Changes

Jump to: navigation, search

OPS335 Lab 1

19,769 bytes added, 19:11, 4 January 2021
Generating a Public/Private Key Pair & Sharing the Public Key
= INVESTIGATION 1: BASIC NETWORK CONFIGURATION = OBJECTIVE & PREPARATION==In OPS235, you learned how to configure a virtual private network for your '''vm1''', '''vm2''' and '''vm3''' virtual machines. You were required to configure a static network connection for your VMs. In OPS335, you will also be setting up a static network connection for all of your VMs (which all VMs will be text-based). All of the services that we install and configure for this course '''require a working network connection'''; therefore, it is very important that you know how to configure a network connection for your VMs, whether via command line for trouble-shooting purposes, or to create a persistent (permanent) network connection that uses static IP address (REVISITEDas opposed to DHCP) =.
Remember how you set up This lab is a <u>review</u> of the network interfaces in your virtual machines in OPS235? You're expected to know that ''"insidematerial from labs 6 ( [http://zenit.senecac.on.ca/wiki/index.php/OPS235_Lab_6_-out"'' by now_CentOS7#Part_4:_Configuring_VM_Network_Setup_via_Command_Line_.28centos3.29 CLI Network Configuration] ), but will also additional topics.
=== Online Resources===
In OPS235, you learned how to configure a virtual private network via graphical applications for the '''centos1''' and '''centos2''' machines*[https://www.tty1. In the previous lab, you have created and cloned VMs that are textnet/blog/2010/ifconfig-ip-based only ('''like centos3''')comparison_en. All of the services that we are configuring in this course require a working network connection; therefore, it is very important that you know html ip vs ifconfig]*[https://www.digitalocean.com/community/tutorials/how -to set (preferable configure) -use-rsync-to-sync-local-and-remote-directories-on-a static IP address, default gateway, as well as your DNS server-vps rsync Howto]*[https://help.ubuntu.com/community/CronHowto Cron HowTo]
This lab is a <u>review</u> of the material from labs 6 ( [http== INVESTIGATION 1://zenit.senecac.on.ca/wiki/index.php/OPS235_Lab_6_-_CentOS7#Part_4:_Configuring_VM_Network_Setup_via_Command_Line_.28centos3.29 CLI Network Configuration] ), but will also show newer BASIC NETWORK CONFIGURATION (more efficientREVISITED) commands in the process.==
Remember how you set up the network interfaces in your virtual machines in OPS235?
You are expected to be familiar with how to configure and test out a VM's network connectivity at this point.
== Check = Checking Your Current Network Settings ===
In OPS235 , you've have used the '''ifconfig''' and '''route ''' commands. In this course we'll use the '''ip''' command instead (, so that you're welcome to use the old ll be familiar with both sets of commands but you're expected to know the new ones too).
The following table displays a comparison between ipconfig and ip commands, as well as other common commands to obtain your current network setting:
<table border="1" cellspacing="0" cellpadding="2"><tr><td>Purpose</td><td>Older Method (command)</td><td>Newer Method (command)</td></tr><tr> <td>Obtain IP ADDRESS and Subnet Mask</td><td>ifconfig</td><td>ip address</td></tr>'''Perform the following steps:'''
<tr> # View the table below comparing <td>Obtain Default Gateway</td><td>route -n</td><td>ip route</td></tr>''older'' vs ''newer'' methods of obtaining network setting information for a Linux machine.
<tr> <td>Obtain DNS Server</td><td>nslookup</td><td>more resolv.conf</td></tr>
<tr> <td>Purpose</td><td>uname -n</td><td>Same</td></tr>::'''Comparison of Older and Newer Methods of Obtaining Network Settings'''
<table border="1" cellspacing="0" cellpadding="5" style="margin-left:51px;"><tr><td>'''Purpose'''</tbletd><td>'''Older Method'''<br>''(command)''</td><td>'''Newer Method'''<br>''(command)''</td></tr><tr> <td>Obtain IP ADDRESS and Subnet Mask</td><th>ifconfig</th><th>ip address</th></tr>
<tr> <td>Obtain Default Gateway</td><th>route -n</th><th>ip route</th></tr>
<tr> <td>Obtain DNS Server</td><th>nslookup</th><th>more resolv.conf</th></tr>
== Make persistent changes ==<tr> <td>Obtain Hostname</td><th>uname -n</th><th>uname -n</th></tr>
For the IP address, subnet mask, default gateway, and DNS server you edit a file in '''<tr> <td>See MAC cache</etctd><th>arp -n</sysconfigth><th>ip neighbour</network-scriptsth></'''tr>
You'll need a file that describes the settings for a network interface. The association between a specific network interface and the configuration file is made using (from least to most important):* The name of the file ('''ifcfg-'''interfacename)* The "NAME" setting inside the file* The "DEVICE" setting inside the file* The "HWADDR" setting inside the file</table>
To set the hostname you use the '''hostnamectl''' command.
<ol><li value== Set static IP addresses "2">Run the '''ifconfig''' command on your '''host''' machine. Check and record the IPADDR for your default (dhcp) network interface card (possibly eno1) and the virtual bridge.</li><li>Issue the '''ip''' command on your '''host''' machine to determine the IPADDR and GATEWAY information (refer to above chart). How are the result similar or different than the ifconfig command?</li><li>Issue the ifconfig command on vm1, vm2, your VMs. what happened?</li><li>Use the '''ip''' command for your VMs to list the IPADDR and vm3 ==GATEWAY information.</li><li>Refer to the man pages or refer to following article [http://www.tecmint.com/ip-command-examples/ 10 Useful ip Commands] to see how to issue the above commands to create a <u>temporary</u> connection to your existing network.</ol>
Except for the host all the machines in this course will have static network configuration. That means you need to be able to perform said configuration and debug problems quickly. If the following steps aren't 100% clear - make sure to practice them.=== Making Persistent (Permanent) Network Setting Changes ===
# Edit each of In your VMs to use OPS235 course, you used a static IP address. vm1 should use the first available address in the subnetseries of commands (ifconfig, route, vm2 the second and vm3 the third.# Don't forget nameserver) to set the default gateway and DNS serversetup a temporary network connection. You can use your host's IP address as the ip command (a another command) in a DNS server (libvirt will proxy the requests similar way to the real DNS server)create a temporary network connection.# Make note of the files used and entries required.# Restart each VM and run the following command to ensure they still have the The problem with this network configuration connection method is that those changes will be lost if you set.# Test connectivity by pinging each of restart your VMs.# Try to ssh from the guest to the host Linux machine, then from the host although you may want to do that to the guestcreate a temporary network connection for troubleshooting purposes. # Try In order to ping matrix have your network settings become permanent, you need to edit and google from your host machinesave the settings changes in a file.# Try to ping matrix For the IP address, subnet mask, default gateway, and google from each of your VMDNS server you edit that file is contained in a directory called '''network-scripts'''s to ensure you can reach the outside world.
If everything works - great. If not, move on to '''Perform the next section.following steps:'''
== Linux # Change to the ''network connection configuration troubleshooting ==-scripts'' directory (see your ''OPS335''/''OPS235''/''ULI101'' notes).# The name of the file that contains your persistent network settings has the following name format:<br>'''ifcfg-''interfacename'''''# Which file-name in your network-scripts directory do you think contains your current network settings?# View the contents of the file to see if it contains the IP address, subnet mask, and default gateway.# What is the MAC address if your current machine?# Does this file contain the hostname of your machine? If not, what command can allow you to change your machine's hostname?
If the network works in your host but not in the VM, the following are the usual steps you go through to troubleshoot the problem, starting with the first two rules of troubleshooting:
# '''Is it plugged in?''' On a physical network you would check whether the cable is plugged in and the link light is on on Except for your network card. In a virtual network environment you don't have that - you'll need to check host machine, all the NIC settings Virtual Machines in the virtual machine details. In there it this course will tell you which virtual network your virtual network card is connected to.# '''Is it turned on?have ''' This is a problem more common with virtual networks than physical networks. Check in your VirtManager->ConnectionDetails->VirtualNetworks that your static network is active.# '''Do you have an IP address?''' Run '''ip addressconfiguration''' (as opposed to check.# '''Can you ping the host by IP?''' (by its internal IP addressAutomatic or DHCP). If not - check all of the aboveSometimes, check if you have an IP address conflict, check that your subnet mask is correct.# '''Can you ping 8.8.8.8?''' If all of will be required to debug networking problems quickly by changing the above work - check that your default gateway is set correctly with '''ip route''' and that you can ping the default gateway.# '''Can you resolve google.ca?''' Run '''host google.ca'''. If it doesn't come back with an IP address, and all network configuration of the above worked - check that your DNS server is configured correctly and that you can ping itVMs.
There is a number of other problems that could prevent your network connection from functioning but the above are the most common ones. You should be able to go through the troubleshooting process pretty quickly. Setting up the network in this course is never a primary task, but it's almost always a prerequisite for anything else we're going to do. You can't have a working web server (or any other kind of server) if you don't have a working network connection.
<ol><li value= SSH Server "7">Edit the '''ifcfg-''interfacename''''' (most likely ifcfg-eth0) file for each of your VMs to use a static IP address (refer to previous OPS235 lab on networking: [ [https://wiki.cdot.senecacollege.ca/wiki/OPS235_Lab_6#Part_3:_Configuring_VM_Network_Setup_via_Command_Line_.28centos3_and_centos2.29 Network Config - CLI] ].<br> You should be configuring the BOOTPROTO ('''static''' instead of dhcp), IPADDR, PREFIX (or NETMASK), GATEWAY, HWADDR, and DNS1 for this file. Note the following information for this setup:<ul><li>Set your IPADDR for each VM with the following rules:<ol type="a"><li>Your IPADDR's third octet will use the last 2 digits in your student number.</li><li> Make certain that the 4th octet for your VMs does not start with '''1''' since that is reserved by your host machine.<br>Use the recommended fourth octets: '''2 for vm1''', '''3 for vm2''', and '''4 for vm3'''.</li></ol></li><li>Don't forget to set the default gateway and DNS server for your VMs. You can use your host's IP address as a gateway and DNS server<br>(''libvirt'' will proxy the requests to the real DNS server).</li><li> You can refer to your previous lab to obtain information for setup of these options: [ [https://wiki.cdot.senecacollege.ca/wiki/OPS335_Installation_Lab#Configuring_a_VM_host Configuring a VM Host] ]<br><br></li></ul><li>Make note of the files used and entries required and note them in your lab log-book.</li><li>Save your editing session, and then restart each VM and run the following command to ensure they still have the network configuration you set:<ul><li>'''ping''' (what is the purpose of this command?). Try to ping google from your host machine.<br>Try to ping google from each of your VM's to ensure you can reach the outside world.</li><li>'''ssh''' (into another server, like Matrix) </li></ul></li><li>After setting the network configuration for EACH VM, then either the the ifdown and ifup commands or reboot each VM, to verify that you can connect to the Internet with the new static IP network configuration. If you cannot connect to the Internet, then check the network configuration file and make corrections until you have a workable network connection for each VM from boot-up.</ol>
The default (and often the only) way to administer a linux server is via SSH. Even in your case where you have a direct console to all your VM screens you may find it helpful to connect to your virtual machines using SSH (if nothing else - you can resize the terminal window).
The SSH server should be installed and running in your VMs. If it's not installed - you can install '''opensshare uncertain how to perform those above-server''' using yumlisted operations by member, take time to practice them. Whether it is running or not - If everything works and you should practice the following commands to make sure are comfortable with these operations then you know how may proceed to use them, you'll need them for nearly every topic this semester:the next section.
* '''systemctl start/stop'''* '''systemctl enable/disable'''* '''systemctl status'''=== Linux Network Connection Configuration Troubleshooting ===
== SSH Keys ==If the network works in your host, but not in your Virtual Machine, you should perform the following routine steps to troubleshoot the network connection:
Using # '''IS THE NETWORK ON VM PLUGGED IN?''' On a physical network you would check whether the cable is plugged in and the magic of public key cryptography link light is on on your network card. In a virtual network environment, you don't have a physical network adapter. Instead, you can SSH will need to a linux check the NIC settings in the <u>'''virtual'''</u> machine without using a passworddetails to view and confirm the appropriate network connection. # '''IS THE NETWORK ENABLED?''' This topic is crucial a problem more common with virtual networks than physical networks. Check in:<br> '''VirtManager'''-> '''ConnectionDetails'''- > '''VirtualNetworks''' that your network is active.# '''DO YOU HAVE AN IP ADDRESS?''' Run '''ip address''' to check.# '''CAN YOU PING THE HOST BY IP?''' (by its internal IP address). If not only for this course but in - check all of the above, check if you have an IP address conflict, and check that your subnet mask is correct.# '''CAN YOU PING 8.8.8.8?''' If all of the above work - check that your default gateway is set correctly with '''ip route''' and that you can ping the default gateway.# '''CAN YOU RESOLVE google.ca?''' Run '''host google.ca'''. If the industryoutput doesn't provide an IP address, SSH keys are used everywhere check that your DNS server is configured correctly and that you can ping that linux servers are usedaddress.
Here's There are a modified diagram number of other problems that could prevent your network connection from [http://sebastien.saunier.me/blog/2015/05/10/github-public-key-authentication.html Sébastien Saunier's blog] that's a simple illustration of how SSH key authentication works (functioning but the one in above are the blog post had a significant error in it which I fixed in the version here):most common problems.
[[Image:ssh_connection_explained.png|800px]]==== Run Script to Break Network Connection for Troubleshooting ====
It's not You will now download, set execute permissions and run a complete diagram but it helps see all Bash shell script to try to "break" the parts of ssh key authentication in one placenetwork connection for your vm1. This will provide troubleshooting practice to check your network configuration file, look and correct errors and restart your network interface connection.
=== Public/Private key pair ===
This needs to be generated on and used on your '''client''' (Perform the user/machine you're connecting '''from'''). The private key is the equivalent of a password, that's why it's private. And a private key is used by one user, that's why it's stored in a user's ~/.ssh/ directory.Following Steps:
You generate a new keypair with this #Move to your '''vm1''' machine and make certain that you are logged in as '''root'''.#Make certain that the '''wget''' command (press enter is available on your VM. If not, install the wget application. Make certain to do for all ALL of your VMs.#Use the questions'''wget''' command (with option "--no-check-certificate" )to download and run the following shell script:<br>http://scs.senecacollege.ca/~murray.saul/ops335/break-network.bash#When you have run that shell script, it should automatically restart your vm1.#Login to your vm1.#Use the commands taught in this lab to confirm if your network connection is broken.#Carefully check your configuration to see if there is a change to your settings#Try to temporarily connect to the Internet#Edit your network settings file to make the changes permanent#Test your connectivity (including after a reboot of your vm1)
<source lang="bash">ssh-keygen -'''Note:''' You should be able to go through that troubleshooting process pretty quickly. Setting up the network in this course is never a primary task, but it's almost always a prerequisite for anything else we're going to do. You can't rsa</source>have a working web server (or any other kind of server) if you don't have a working network connection.
You'll end up with ~/.ssh/id_rsa and ~/.ss/id_rsa.pub - now you have a key pair you can use for authentication.
=== Public key on the server ==='''Record steps, commands, and your observations in INVESTIGATION 1 in your OPS335 lab log-book'''
If you have the private key - you can prove to someone who has your public key that you're really the owner of that public key. That's how ssh key authentication works, so the server needs to have you user's public key. You can copy it over manually and append the contents of your ~/.ssh/id_rsa.pub from the client to ~/.ssh/authorized_keys on the server, or you can issue this command on the client to do all that for you== INVESTIGATION 2:Configuring SSH ==
ssh-The default (and often the only way) to administer a Linux server is via SSH. Even if you work in a graphical Linux environment, it is very useful to open a terminal and use SSH to monitor and manage your VMs (you can resize the terminal window). Using SSH to connect to remote servers on a network helps to protect your Linux machine from being penetrated. You can also generate a private and public encryption key for the root user, and copy-id -i ~/that public key from your host to your VMs in order to allow certain backup programs to run via a scheduling daemon (called cron) without having to be required to enter the password for the remote machine.ssh/id_rsaYou will be doing those operations later in this lab.pub username@server
After that you can login without a password. But remember - keys are per user, not per machine. So this will only work with one user on the client and one user on the server (the two users involved in running the command above).=== Managing Services ===
The SSH server should already be installed and running in your VMs. If it's not installed, you can install '''Your task ===:openssh-server''' For this lab using yum.It is essential for CNS/CTY students to become comfortable managing services since you have will need to set up password-less login constantly stop services, change their configuration, and start them for the root user on the host configuration changes to the root user on each of the VMstake effect in nearly every topic this semester, and for other courses involving Linux network management.
= Rsync =
Rsync is a very versatile backup tool. As '''Perform the name suggests itfollowing steps:'''s used for synchronising files typically across a network. It works over the SSH protocol so if you have ssh working - you can use rsync as well.
You're going to use your host machine to backup files from # Note the virtual machinesfollowing [http://zenit.senecac. To make it simpler we won't have any incremental backups and the backups will be automated so don't rely on these too much, but they may save you some time over .ca/wiki/index.php/Init_vs_systemd#systemd_Command_Usage systemctl] commands (refer to man pages or the many weeks in this course.Internet) and become comfortable using them:
On your host run the following commands::* '''systemctl list-units --all'''::* '''systemctl start/stop'''::* '''systemctl enable/disable'''::* '''systemctl status'''
<source langol><li value=bash"2">mkdir -p Launch your '''vm2''' machine, login to the machine, and open a shell terminal.</backup/vm1rsync -avz 192li><li>Use one of the commands above to check the status of your SSH server (i.168e.xservice: ''sshd'').2:</etc li><li>Issue one of the above commands to stop of the ssh server and run a command to verify that the ssh server is no longer running.</backupli><li>Issue another one of the above commands to start the SSH server and to verify that it is running.</vm1li><li>Issue a command to confirm that the ssh service will run upon when the vm2 server restarts (i.e. "enabled").</li></sourceol>
If rsync asked for a password - make sure you completed ===Configuring the SSH keys part of the lab, and that you're using the correct user. If you get a different error - perhaps rsync is not installed. What you should see is all the files from vm1 being copied over.Service===
Rerun the command. Notice that the second time nothing A common (if somewhat blatant) way to try to hack into a machine is copied over to try to ssh as '''root''' and brute- thatforce root's because there would be no pointpassword. The root user always exists, none of meaning the files have changed attacker doesn't need to try guessing what user names are on vm1your system. If they can get access to root, they can do anything. To prevent this, we will edit the configuration file for the ssh service to prevent root from ssh'ing into your host machine.
Create a new file in vm1's /etc/ directory, and rerun rsync. Notice that only that file gets copied over.
= Cron ='''Perform the following steps:'''
Cron #Login to your Centos '''host''' machine for the following steps.#Use the more command to display '''/etc/ssh/sshd_config''' on your host. This file contains the configuration parameters for the ssh service.#Take a few moments to view this file. Lines that begin with # are comments. Either simple explanations of parameters, or parameters that have not been set.#Open the man page for '''sshd_config'''. This lists all the possible parameters in alphabetical order along with a brief explanation of what each one does. The parameter we are looking for is '''PermitRootLogin''', read its description.#Use a daemon - a program text editor to edit the file '''/etc/ssh/sshd_config''', and find the line that runs has '''PermitRootLogin'''. By default it is set to yes, allowing the root user to ssh in to the backgroundmachine. It# Uncomment '''PermitRootLogin'''s role , and change the value to '''no'''.#Try to use ssh from one of your VMs to log into your host as root. What happened?#This is because (for most services) the '''changes you make to the configuration file will not take effect until the service restarts'''.#Restart the sshd service on your host and try to run tasks periodicallyssh in again. It can run tasks Now it should prevent you.#The option '''PermitRootLogin''' for the system or '''all of your VMs''' for both labs and assignments MUST be set to '''yes'''. The reason for this is that you have created a user (any user). Wevirtual network, so you have protected the host from root login, so you don'll get cron t have to run some backup scripts do the same for usyour VMs. Also, but first letby allowing root login for your VM's see how it workswill allow you to automatically backup your VMs to your host machine (via a crontab entry) without being prompted for a root password for each VM.
Every user has a crontab - a list of tasks they want to run periodically. You edit this table using the command '''crontab -eNote:'''Configuration files for most services follow a very similar format. Once you run Some use an = between the command parameter and its value, some require you'll get an empty file where you have to insert group certain parameters together, and most use # to be a line like comment. You will get lots of experience working with the configuration files for services in this:course.
<pre>10 * * * * echo "Cron ran this job at: "`date` > /tmp/cron.log</pre>=== SSH Key Concepts===
This tells cron After performing lab7 in OPS235, you should have a basic understanding of ssh and public/private key cryptography to run the command '''echo create secure connections between servers.<br>The public key can be "Cron ran this job at: shared"`date` > /tmp/cron.log''' at the 10th minute of every hour of every day of every month. Modify the setting so it will run with other server accounts, and can be used in a couple of minutes from now and insert that into conjunction with your crontabprivate key in order to help encrypt/de-crypt data.
Wait for the minute to pass, and check that The diagram below is shared from [http:/tmp/cronsebastien.log was created with the expected contentssaunier. You can also check me/blog/2015/var05/log10/cron to github-public-key-authentication.html Sébastien Saunier's blog].It demonstrates how SSH key authentication works. It's not a complete diagram, but it helps see what jobs were runall the parts of ssh key authentication in one place.
[[Image:ssh_connection_explained.png|thumb|center|600px|A diagram explaining how public / Private keys work. Another term to represent this process is called '''Your task:PKI''' set up cron to make automatic backups of the /etc directory from vm1, vm2, and vm3 into (Public/backupPrivate Key Infrastructure) ]]<br /vm1, /backup/vm2, and /backup/vm3>Put this book on your "must-read" list. These should run every hour and overwrite You can borrow a copy from the previous backupToronto Public Library. Which makes them lousy backups I have yet to see a better introduction to encryption. It's not a reqirement for OPS335 - but they're better than nothingif you want to not be clueless about security fundamentals online - read that book and understand it.
= Completing the lab =[[Image:crypto.jpeg|center|"crypto" by Steven Levy]]
=== Generating a Public/Private Key Pair &amp; Sharing the Public Key === The public/private key pair needs to be generated on and used on your '''host''' machine (i.e. the user/machine you're connecting '''from'''). The private key is the equivalent of a <u>''password''</u> (that is why it is considered to be <u>''private''</u> - only to be used by ''<u>one</u>'' owner). That is why the private key is stored in the owner's '''~/.ssh/''' directory. One very common mistake that students make is to either generate the key pair for the wrong account, or copy the public key to the wrong account on the intended remote machine. '''Perform the following Steps:''' # Make certain you are in your '''host''' machine.# You will be creating a '''key-pair on your host machine with no password''' (i.e. when generating keypair press enter for all prompts including the password).#Make certain you are logged on as '''root''' on your host machine.# Generate the key-pair by issuing the command:<br><source>ssh-keygen -t rsa</source> '''NOTE:''' When issuing this command, you will end up with the files: '''~/.ssh/id_rsa''' and '''~/.ssh/id_rsa.pub''' (private and public keys). So far, this topic is generally a repeat of OPS235 lab7. What you may '''<u>not</u>''' know is that by using a '''"trick"''' (the ''magic'' of public key cryptography), you can SSH to a Linux machine without using a password! Learning to perform this trick is <u>'''essential'''</u> in this course and in the industry in general. SSH keys are used everywhere that Linux servers are used. If you have the private key, you can prove to someone who has your public key that you are indeed the '''actual owner of that public key'''. That is how ssh key authentication works. You are then only required to transfer your public key to a remote server. <ol><li value="5">You are going to share the public key from the '''root user in your host machine''' with the '''root user of your vm1 machine'''.</li><li>Copy the contents of your '''~/.ssh/id_rsa.pub''' from your host machine and append to '''~/.ssh/authorized_keys''' on each of your Virtual Machines. In your case, you will issue the following command 3 times (for each vm IPADDR):<br><source>ssh-copy-id -i ~/.ssh/id_rsa.pub root@IPADDR_for_vm</source>'''NOTE:''' Press ENTER for all prompted information including the password (although this may seen counter-intuitive!).<br><br></li><li>Use the ssh command to test each ssh connection between your host and each virtual machine that you can connect to the VMs without having to use a password. This is essential to create backups from VMs to your hostmachine without being prompted for password.</li></ol>  {{Admon/important|Errors in Copying Public Key from Host to VM|If you experience an error when copying the public key from your hostmachine to your VM, it is most likely caused from not permitting root login that you performed in the previous section. Set to allow login from root for each vm, restart your sshd service and then re-run the above command.}}  After you perform either of those operations, you can then ssh into a remote vm without a password. '''NOTE:''' Always remember that these keys are '''per-user, <u>not</u> per machine'''. This means that sharing a user's public key will only work for that specific user. == INVESTIGATION 3: PERFORMING &amp; AUTOMATING BACKUPS == Data backups are considered to be an insurance policy. Running backup can be tedious, but they MUST be performed in an accurate and consistent basis, since loss of data can be expensive (For example: cost of hiring staff to re-enter data). When performing labs or assignments in this class, if you fail to make backups and something bad occurs and there is loss of data, it only affects you. On the other hand, if you are supporting a client, or working for a company and fail to adequately perform backups and there is loss of data, then other users are affected by failure to backup essential data.  === Performing Full Backups === A full backup represents backing up of all of the files of a computer machine (in our case, a VM). A full backup should be performed at the end of each lab or assignment working session. In OPS235, you learned to use the command '''gzip''', '''gunzip''' (plus'''virsh dumpxml''' / '''virsh define''' if backing up to external storage device like a usb key) to backup your virtual machines. We will use the same method to perform a full backup for these labs and assignments. '''Perform the following steps:''' #Make certain that your virtual machines are NOT running.#Make certain that you are logged in as '''root''' user on your host machine.#Refer to OPS235 lab2 on backing up your VMs using the '''gzip''' command [https://wiki.cdot.senecacollege.ca/wiki/OPS235_Lab_2_-_CentOS7_-_HD2#Part_1:_Backing_Up_Virtual_Machines OPS235 Lab2 - Backing up VMs]#Make certain that you have performed a full backup for '''vm1''', '''vm2''', and '''vm3'''. It is recommended to create a Bash shell script to automate the backing up of ALL your VMs in sequence. You can do this by running a for loop using a list for vm1, vm2, and vm3 image file pathnames. <ol><li value="5">Create the sub-directory '''/root/bin/'''</li><li>You should know how to create full backups of your VMs in your OPS235 course. Create a Bash shell script called:<br>'''/root/bin/fullbackup.bash''' that will backup all of your other vms (i.e. vm1, vm2, and vm3) one at a time using the '''gzip''' command to your host machine into the directory path-name: '''/backup/full/'''</li><li>Set execute permissions, and run the shell script to verify that you shell script works.</li><li>It is also recommended to backup to your USB key as well (qcow2 images and xml config files).</li></ol>  It will be your responsibility as an administrator of your own Linux system, to backup all of your VMs for labs and assignments at the end of your lab session. Learning to create shell scripts to automate routine tasks (such as backups) will be EXTREMELY useful for your NDD430 course. === Performing Incremental Backups === An incremental backup is a backup of only files that have changed since the last backup. In your case, it may be a good idea to perform incremental backups of your '''/etc/''' directory for your VMs upon startup. We will be using the '''rsync''' command to perform incremental backups for all of your VMs. '''Rsync''' is a very versatile backup tool. As the name suggests, rsync is used for <u>synchronizing</u> files typically across a network. It works over the '''SSH''' protocol, which is useful in our situation since we are running ssh on our server and VMs. You are going to use your ''host machine'' to backup files from the ''virtual machines''. '''Perform the following steps:'''  {{Admon/important|Rsync Needs to be Installed on ALL VMs |Since you select minimum install on your VMs, the rsync command was not installed by default. You need the rsync command to be available on your host machine and all of your VMs. Make certain that the '''rsync''' command is installed on all your vms. }}  # Make certain that your '''vm1''' machine is running.# Make certain that you are logged in as '''root''' user on your host machine.# On your '''host machine''', run the following commands: <source>mkdir -p /backup/incremental/vm1rsync -avz 192.168.x.x:/etc /backup/incremental/vm1/ # where 192.168.x.x is the IPADDR of your vm1</source> '''NOTE:''' This command will '''NOT''' work if '''permit root access is denied for your VMs''' for your sshd service configuration, so keep it off for now... <ol><li value="4">If rsync prompts for a password, make certain that you completed the '''SSH key''' section above, and that you assigned the keys for the <u>appropriate user</u><br>(in this case, for the '''root user for both the hostname and vm1'''!)</li><li>When the rsync command runs correctly, you should see all the files from vm1 being copied over to your host machine.</li><li>Run the rsync command again. Notice that the second time nothing is copied over to your host machine since none of the files have changed on your vm1 machine.</li><li>Create a new file in vm1's '''/etc/''' directory, and rerun '''rsync'''. Confirm on your '''host machine''' that only that file that was created on your vm1 machine actually got backed up to your host machine.</li><li>Repeat the above steps to create backups for your '''vm2''' and '''vm3''' machines on your host machine as well (for the respective directories: '''/backup/incremental/vm2''' and '''/backup/incremental/vm3''').</li></ol> === Automating Backups (cron) === Since your host machine and VMs are '''not continuously running''', '''you are not required to schedule to perform your FULL BACKUPS periodically''' (eg. every week at 2:00 AM). Instead, it will be YOUR responsibility to run your full backup script when you complete each of your OPS335 labs, or when you finish your OPS335 assignment working session. On the other hand, '''you will use cron to perform incremental backups''' (eg. copy updated files from the VMs/ /etc/ directory)  '''Cron''' is a ''daemon'' (i.e. a program that runs in the background). The term ''"Cron"'' is short for '''Chronograph''' which was an old fashioned term for a '''stop watch''' or '''timer'''. The role of '''Cron''' is to run tasks periodically. It can run tasks for the system (as root) or for a user (including regular users). Every user has a crontab (Cron Table) which is a list of tasks they want to run periodically. You do not edit this file manually: instead, you edit this table using the command '''crontab -e'''. Once you run the command, you will get an empty file where you have to insert a line like this: '''Perform the following steps:''' # Refer to the following WIKI to learn how to use cron: [[crontab tutorial]]# In your host machine as root, modify the setting so it will run that echo command every minute by creating a crontab (via '''crontab -e''') entry with the following line:<br><source>* * * * * echo "Cron ran this job at: "`date` >> /tmp/cron.log</source># Save and exit your crontab edit session.# Wait for one minute to pass, and check the '''/tmp/cron.log''' file to see if it was created with the expected contents.<br>(You can also check '''/var/log/cron''' file to see what jobs were run).# Perform a Net-search to see how to configure that crontab entry to run every two minutes instead of every minute.# Edit your crontab entry to run same command every two minutes, save and exit, and then confirm by viewing '''/tmp/cron.log''' and '''/var/log/cron''' files.# Perform a Net-search to see how to run a cron for a command for every hour.# Edit your crontab to '''make automatic backups using the rsync command''' of the '''/etc''' directory from '''vm1''', '''vm2''', and '''vm3''' into '''/backup/incremental/vm1''', '''/backup/incremental/vm2''', and '''/backup/incremental/vm3''' every hour and overwrite the previous backup.   {{Admon/important |Backup your VMs!|You MUST perform a '''full backup''' of ALL of your VMs whenever you complete your '''OPS335 labs''' or when working on your '''OPS335 assignments'''. You should be using the gzip command, and you should use the Bash shell script that you were adviced to create in order to backup all of your VMs.}}  '''Record steps, commands, and your observations in INVESTIGATION 2 in your OPS335 lab log-book''' == COMPLETING THE LAB == ===Online Submission=== Follow the instructions for lab 1 on blackboard. <!--===Andrew's sections=== You may choose to:* Submit screenshots of your work on Blackboard, in which case you don't need to come to the lab.* Or come to the lab, show me your work, and talk to me about it. I want to hear what you've learned and answer any questions you have. You'll get the same grade regardless of how you choose to submit your work. Expected results of this lab are: ::<span style="color:green;font-size:1.5em;">&#x2713;</span> Each of your VMs should now boot to a command prompt (no graphical interface), and should be using a static IP address. * ::<span style="color:green;font-size:1.5em;">&#x2713;</span> Each of your VMs should have a working network connection and a static IP address.* ::<span style="color:green;font-size:1.5em;">&#x2713;</span> Each of your VMs should have an SSH server running.* You ::<span style="color:green;font-size:1.5em;">&#x2713;</span> should be able to ssh from your host to each VM as the root user without a password.* Backups ::<span style="color:green;font-size:1.5em;">&#x2713;</span> Display contents of the three VMsbackup script called: ''' /etcroot/bin/fullbackup.bash'''::<span style="color:green;font-size:1.5em;">&#x2713;</ directories are made automatically in the hostspan> Full and incremental backups of your 3 VMs.* ::<span style="color:green;font-size:1.5em;">&#x2713;</span> You have notes in your labbook lab-book about what you've learned in this lab.::<span style="color:green;font-size:1.5em;">&#x2713;</span> Run a shell script : http://matrix.senecac.on.ca/~murray.saul/ops335/labcheck_network_backup.sh--> == EXPLORATION QUESTIONS == # Explain the major different between the '''ip''' and '''ifconfig''' commands.# List the steps to create a '''temporary static IP network connection''' for your vm1 machine to connect to your host machine.# List the steps to create a '''persistent static IP network connection''' for your vm1 machine to connect to your host machine.# List at least '''3 trouble-shooting techniques''' to check or verify a network connection from a vm to a host machine.# List at least '''5 reasons''' (from networking trouble-shooting) that can break a network connection.# List the tools (commands) how to configure / stop / start the ssh service.# Explain why it is important to know how to manage network services if you intend to configure ("tweak") the service.# Briefly explain the purpose of the '''tar''', '''cpio''', '''dump''', '''restore''' commands.# Explain how the '''rsync''' command differs from the ''tar'', ''cpio'', ''dump'', and ''restore'' commands.# List the steps to create a '''crontab''' entry to run the program '''/bin/clean-out.bash''' every half day.# What is the purpose of using '''crontabs''' for backing up your virtual machines' data to your host machine?

Navigation menu