Virtual Server Hosting: Quick Start Guide for Linux
Linux Wiki Page
Get step-by-step instructions on individual software applications and their components on the Virtual Server Hosting Linux Wiki.
Departmental Administrative Access
- SSH based protocols only
- Two ssh connection methods
- ale03.oit.umn.edu -dedicated ssh gateway server
- Mkey enforced VPN
- World accessible ssh not allowed
- All users must have an Internet ID.
- Sponsored Internet ID required for external collaborators.
- Passwords are Mkey (two-factor authentication). All users must have an Mkey.
- Root access is reserved for OIT System Administrators.
- sudo based privileges are negotiated, allocated, and configured to address application requirements on a case-by-case basis.
Shared Application User
- swadm user. By default, a single shared user exists for the purpose of custom software administration. Appropriate departmental Internet ID accounts will have pseudo access to this user. This user will not have remote server access capability.
- Additional shared service users can be created, if necessary.
Server Administration and Configuration
This section describes operating system configuration defaults. Changes will be negotiated, allocated, and configured to address application requirements on a case-by-case basis.
Operating System Version and Updates
- OS installation will consist of the latest stable version of 64-bit Red Hat Enterprise Linux at the time of VM deployment.
- Operating System updates as supplied from Red Hat will be automatically applied within 3 days of release.
OIT provides monitoring for all servers.
|Items Monitored||Check Method||Notification|
|Disk usage||% full||Page⁄email|
|Customer owned services||Service running/stopped||Page⁄email|
File System Layout
|⁄tmp||1 gb||Please limit use of ⁄tmp|
|⁄swadm||2 gb||Owned by swadm user|
|2 gb||Database file systems created if needed|
- All file systems are backed up with the exception of database file systems.
- Databases should be dumped into ⁄swadm in order for the dump files to be picked up by the backup software.
- Restore requests are fulfilled by OIT systems administrators. Requests can be sent to email@example.com.