Reader small image

You're reading from  Linux Administration Best Practices

Product typeBook
Published inMar 2022
PublisherPackt
ISBN-139781800568792
Edition1st Edition
Tools
Right arrow
Author (1)
Scott Alan Miller
Scott Alan Miller
author image
Scott Alan Miller

Scott Alan Miller has more than thirty years of experience in IT and software engineering having worked in companies of all sizes, from the smallest firms to the largest companies and governments, and in all types across nearly every type of industry with specialization in investment banking and small business. Scott has been an avid writer for IT magazines and books in both IT and software engineering, has led IT for companies, overseen outsourcing firms, spoken at conferences, worked in both K12 and university programs, contributed heavily to technology forums, and generally been involved in every aspect of the industry. Today Scott provides CIO and architecture services to companies of all sizes through an international consultancy. He also pursues his hobbies including being a hotelier, restaurateur, and photographer.
Read more about Scott Alan Miller

Right arrow

Alerts and troubleshooting

Having just discussed logs we now have to consider the highly related concept of system alerting. I have to mention that of course logging systems themselves are also a potential source of alerts. If we use automation in our logging systems, that automation will generally be expected to either send alerts directly, or add alerts to an alerting system.

Alerts are, fundamentally, a way for our monitoring systems to reach out and tell us humans that they are in trouble and it is time for us to step in and work our human-intelligence magic. While we hope that our systems will have automation and can repair many problems themselves, the reality is that for the foreseeable future nearly all companies will have to keep working in a reality where human intervention is needed on a regular basis in systems administration. Whether it is to log in and clear a full disk or stop a broken process or identify a corrupt file or even to trigger a failover to a different...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Linux Administration Best Practices
Published in: Mar 2022Publisher: PacktISBN-13: 9781800568792

Author (1)

author image
Scott Alan Miller

Scott Alan Miller has more than thirty years of experience in IT and software engineering having worked in companies of all sizes, from the smallest firms to the largest companies and governments, and in all types across nearly every type of industry with specialization in investment banking and small business. Scott has been an avid writer for IT magazines and books in both IT and software engineering, has led IT for companies, overseen outsourcing firms, spoken at conferences, worked in both K12 and university programs, contributed heavily to technology forums, and generally been involved in every aspect of the industry. Today Scott provides CIO and architecture services to companies of all sizes through an international consultancy. He also pursues his hobbies including being a hotelier, restaurateur, and photographer.
Read more about Scott Alan Miller