A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of
computer systems
A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as C ...
, especially
multi-user
Multi-user software is computer software that allows access by multiple users of a computer. Time-sharing systems are multi-user systems. Most batch processing systems for mainframe computers may also be considered "multi-user", to avoid leaving t ...
computers, such as
servers. The system administrator seeks to ensure that the
uptime
Uptime is a measure of system reliability, expressed as the percentage of time a machine, typically a computer, has been working and available. Uptime is the opposite of downtime.
It is often used as a measure of computer operating system reliabi ...
,
performance
A performance is an act of staging or presenting a play, concert, or other form of entertainment. It is also defined as the action or process of carrying out or accomplishing an action, task, or function.
Management science
In the work place ...
,
resources
Resource refers to all the materials available in our environment which are technologically accessible, economically feasible and culturally sustainable and help us to satisfy our needs and wants. Resources can broadly be classified upon their a ...
, and
security
Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
of the computers they manage meet the needs of the
users
Ancient Egyptian roles
* User (ancient Egyptian official), an ancient Egyptian nomarch (governor) of the Eighth Dynasty
* Useramen, an ancient Egyptian vizier also called "User"
Other uses
* User (computing), a person (or software) using an ...
, without exceeding a set
budget
A budget is a calculation play, usually but not always financial, for a defined period, often one year or a month. A budget may include anticipated sales volumes and revenues, resource quantities including time, costs and expenses, environmenta ...
when doing so.
To meet these needs, a system administrator may acquire, install, or
upgrade
Upgrading is the process of replacing a product with a newer version of the same product. In computing and consumer electronics an upgrade is generally a replacement of hardware, software or firmware with a newer or better version, in order to ...
computer components and
software
Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work.
At the lowest programming level, executable code consists ...
; provide routine automation; maintain security policies;
troubleshoot
Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process ope ...
; train or supervise staff; or offer
technical support
Technical support (abbreviated as tech support) is a call centre type customer service provided by companies to advise and assist registered users with issues concerning their technical products. Traditionally done on the phone, technical suppor ...
for projects.
Related fields
Many organizations staff offer jobs related to system administration. In a larger company, these may all be separate positions within a computer support or Information Services (IS) department. In a smaller group they may be shared by a few sysadmins, or even a single person.
* A
database administrator
Database administrators (DBAs) use specialized software to store and organize data. The role may include capacity planning, installation, configuration, database design, migration, performance monitoring, security, troubleshooting, as well as ba ...
(DBA) maintains a
database
In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases sp ...
system, and is responsible for the integrity of the data and the efficiency and performance of the system.
* A
network administrator
A network administrator is a person designated in an organization whose responsibility includes maintaining computer infrastructures with emphasis on local area networks (LANs) up to wide area networks (WANs). Responsibilities may vary between org ...
maintains network infrastructure such as
switches
In electrical engineering, a switch is an electrical component that can disconnect or connect the conducting path in an electrical circuit, interrupting the electric current or diverting it from one conductor to another. The most common type of ...
and
routers, and diagnoses problems with these or with the behavior of network-attached computers.
* A
security administrator is a specialist in computer and network security, including the administration of security devices such as firewalls, as well as consulting on general security measures.
* A
web administrator
A webmaster is a person responsible for maintaining one or more websites. The title may refer to web architects, web developers, site authors, website administrators, website owners, website coordinators, or website publishers.
The duties of ...
maintains web server services (such as
Apache
The Apache () are a group of culturally related Native American tribes in the Southwestern United States, which include the Chiricahua, Jicarilla, Lipan, Mescalero, Mimbreño, Ndendahe (Bedonkohe or Mogollon and Nednhi or Carrizaleño an ...
or
IIS) that allow for internal or external access to web sites. Tasks include managing multiple sites, administering security, and configuring necessary components and software. Responsibilities may also include software change management.
* A
computer operator
A computer operator is a role in IT which oversees the running of computer systems, ensuring that the machines, and computers are running properly. The job of a computer operator as defined by the United States Bureau of Labor Statistics is to ...
performs routine maintenance and upkeep, such as changing backup tapes or replacing failed drives in a
redundant array of independent disks
Raid, RAID or Raids may refer to:
Attack
* Raid (military), a sudden attack behind the enemy's lines without the intention of holding ground
* Corporate raid, a type of hostile takeover in business
* Panty raid, a prankish raid by male college ...
(RAID). Such tasks usually require physical presence in the room with the computer, and while less skilled than sysadmin tasks, may require a similar level of trust, since the operator has access to possibly sensitive data.
* An
SRE Site Reliability Engineer - takes a software engineering or programmatic approach to managing systems.
Training
Most employers require a bachelor's degree in a related field, such as
computer science
Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to Applied science, practical discipli ...
,
information technology
Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of data . and information. IT forms part of information and communications technology (ICT). An information technology system (I ...
,
electronics engineering
Electronics engineering is a sub-discipline of electrical engineering which emerged in the early 20th century and is distinguished by the additional use of active components such as semiconductor devices to amplify and control electric current f ...
, or
computer engineering
Computer engineering (CoE or CpE) is a branch of electrical engineering and computer science that integrates several fields of computer science and electronic engineering required to develop computer hardware and software. Computer engineers ...
. Some schools also offer undergraduate degrees and graduate programs in system administration.
In addition, because of the practical nature of system administration and the easy availability of
open-source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
server
Server may refer to:
Computing
*Server (computing), a computer program or a device that provides functionality for other programs or devices, called clients
Role
* Waiting staff, those who work at a restaurant or a bar attending customers and su ...
software, many system administrators enter the field self-taught.
Generally, a prospective employee will be required to have experience with the computer systems they are expected to manage. In most cases, candidates are expected to possess industry certifications such as the Microsoft
MCSA,
MCSE,
MCITP
Microsoft Certified Professional was a certification program from Microsoft.
Overview
Microsoft Certifications are earned by passing exams aligned to a specific certification. The process of earning certification has changed multiple times sinc ...
, Red Hat
RHCE, Novell
CNA,
CNE, Cisco
CCNA or
CompTIA
The Computing Technology Industry Association (CompTIA) is an American non-profit trade association that issues professional certifications for the information technology (IT) industry. It is considered one of the IT industry's top trade associ ...
's
A+ or
Network+,
Sun Certified The Oracle Certification Program certifies candidates on skills and knowledge related to Oracle products and technologies.
Credentials are granted based on a combination of passing exams, training and performance-based assignments, depending on the ...
SCNA,
Linux Professional Institute
The Linux Professional Institute (LPI) is a Canadian non-profit organisation and oriented towards certifications for Linux, BSD and open-source software-based technologies. It was founded in October 1999.
Linux Professional Institute Certific ...
, Linux Foundation Certified Engineer or Linux Foundation Certified System Administrator,
among others.
Sometimes, almost exclusively in smaller sites, the role of system administrator may be given to a skilled user in addition to or in replacement of his or her duties.
Skills
The ''subject matter'' of system administration includes computer systems and the ways people use them in an organization. This entails a knowledge of
operating system
An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs.
Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
s and
applications, as well as hardware and software
troubleshooting
Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process ope ...
, but also knowledge of the purposes for which people in the organization use the computers.
Perhaps the most important skill for a system administrator is
problem solving
Problem solving is the process of achieving a goal by overcoming obstacles, a frequent part of most activities. Problems in need of solutions range from simple personal tasks (e.g. how to turn on an appliance) to complex issues in business an ...
—frequently under various sorts of constraints and stress. The sysadmin is on call when a computer system goes down or malfunctions, and must be able to quickly and correctly diagnose what is wrong and how best to fix it. They may also need to have teamwork and communication skills; as well as being able to install and configure hardware and software.
Sysadmins must understand the behavior of software in order to deploy it and to troubleshoot problems, and generally know several
programming language
A programming language is a system of notation for writing computer programs. Most programming languages are text-based formal languages, but they may also be graphical. They are a kind of computer language.
The description of a programming ...
s used for
scripting or automation of routine tasks. A typical sysadmin's role is not to design or write new application software but when they are responsible for automating system or application configuration with various configuration management tools, the lines somewhat blur. Depending on the sysadmin's role and skillset they may be expected to understand equivalent key/core concepts a software engineer understands. That said, system administrators are not
software engineer
Software engineering is a systematic engineering approach to software development.
A software engineer is a person who applies the principles of software engineering to design, develop, maintain, test, and evaluate computer software. The term ''p ...
s or
developer
Developer may refer to:
Computers
* Software developer, a person or organization who develop programs/applications
* Video game developer, a person or business involved in video game development, the process of designing and creating games
* Web d ...
s, in the job title sense.
Particularly when dealing with
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
-facing or business-critical systems, a sysadmin must have a strong grasp of
computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
. This includes not merely deploying software patches, but also preventing break-ins and other security problems with preventive measures. In some organizations, computer security administration is a separate role responsible for overall security and the upkeep of
firewall
Firewall may refer to:
* Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
* Firewall (construction), a barrier inside a building, designed to limit the spre ...
s and
intrusion detection system
An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
s, but all sysadmins are generally responsible for the security of computer systems.
Duties
A system administrator's responsibilities might include:
* Analyzing
system logs and identifying potential issues with computer systems.
* Applying
operating system
An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs.
Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
updates, patches, and configuration changes.
* Installing and configuring new
hardware and
software
Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work.
At the lowest programming level, executable code consists ...
.
* Adding, removing, or updating
user account
A user is a person who utilizes a computer or network service.
A user often has a user account and is identified to the system by a username (or user name). Other terms for username include login name, screenname (or screen name), accoun ...
information, resetting
password
A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of ...
s, etc.
* Answering technical queries and assisting users.
* Responsibility for
security
Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
.
* Responsibility for
documenting the configuration of the system.
*
Troubleshooting
Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process ope ...
any reported problems.
* System
performance tuning
Performance tuning is the improvement of system performance. Typically in computer systems, the motivation for such activity is called a performance problem, which can be either real or anticipated. Most systems will respond to increased load wi ...
.
* Ensuring that the network infrastructure is up and running.
* Configuring, adding, and deleting file systems.
* Ensuring parity between dev, test and production environments.
* Training users
* Plan and manage the machine room environment
In larger organizations, some of the tasks above may be divided among different system administrators or members of different organizational groups. For example, a dedicated individual(s) may apply all system upgrades, a
Quality Assurance (QA) team may perform testing and validation, and one or more
technical writer
A technical writer is a professional information communicator whose task is to transfer information between two or more parties, through any medium that best facilitates the transfer and comprehension of the information. Technical writers researc ...
s may be responsible for all technical documentation written for a company. System administrators, in larger organizations, tend not to be
systems architects,
systems engineers, or
systems design
Systems design interfaces, and data for an electronic control system to satisfy specified requirements. System design could be seen as the application of system theory to product development. There is some overlap with the disciplines of system a ...
ers.
In smaller organizations, the system administrator might also act as technical support,
database administrator
Database administrators (DBAs) use specialized software to store and organize data. The role may include capacity planning, installation, configuration, database design, migration, performance monitoring, security, troubleshooting, as well as ba ...
, network administrator, storage (SAN) administrator or
application analyst
In the US, an application analyst (also applications systems analyst) is someone whose job is to support a given application or applications. This may entail some computer programming, some system administration skills, and the ability to analyze ...
.
See also
*
Application service management
Application service management (ASM) is an emerging discipline within systems management that focuses on monitoring and managing the performance and quality of service of business transactions.
ASM can be defined as a well-defined process and use ...
*
Bastard Operator From Hell
The Bastard Operator From Hell (BOFH) is a fictional rogue computer operator created by Simon Travaglia, who takes out his anger on users (who are "lusers" to him) and others who pester him with their computer problems, uses his expertise agai ...
(BOFH)
*
DevOps
DevOps is a set of practices that combines software development (''Dev'') and IT operations (''Ops''). It aims to shorten the systems development life cycle and provide continuous delivery with high software quality. DevOps is complementary to a ...
*
Forum administrator
An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are often longer than one line of text, and are at least temporar ...
*
Information technology operations
Data center management is the collection of tasks performed by those responsible for managing ongoing operation of a data center This includes ''Business service management'' and planning for the future.
Historically, ''data center management'' w ...
*
League of Professional System Administrators
The League of Professional System Administrators (LOPSA), founded in 2004, is a professional association for IT Administrators.
History and formation
Originally, the corporation was created as "The System Administrators Guild, Inc" in July 2004 ...
*
LISA (organization)
LISA is the USENIX special interest group for system administrators. LISA was known officially as the System Administrators Guild until November 2003; from 2003 to 2010, it was known as SAGE.
In March 2016 it was announced that LISA was being ...
*
Professional certification (computer technology)
Professional certification, trade certification, or professional designation, often called simply ''certification'' or ''qualification'', is a designation earned by a person to assure qualification to perform a job or task. Not all certifications ...
*
Superuser
In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of t ...
*
Sysop
A sysop (; an abbreviation of system operator) is an administrator of a multi-user computer system, such as a bulletin board system (BBS) or an online service virtual community.Jansen, E. & James,V. (2002). NetLingo: the Internet dictionary. Netl ...
*
System Administrator Appreciation Day
References
Further reading
* ''Essential Linux Administration: A Comprehensive Guide for Beginners'', by
Chuck Easttom
William "Chuck" Easttom II (born October 5, 1968) is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.
Education
Chuck Easttom holds a B.A. from Southeastern Oklahoma State ...
(Cengage Press, 2011)
* ''Essential System Administration'' (O'Reilly), 3rd Edition, 2001, by
Æleen Frisch
* ''The Practice of System and Network Administration'' (Addison-Wesley), 2nd Edition 5 Jul. 2007, by
Thomas A. Limoncelli,
Christine Hogan and
Strata R. Chalup
* ''The Practice of System and Network Administration Volume 1: DevOps and other Best Practices for Enterprise IT'' (Addison-Wesley), 3rd Edition. 4 Nov. 2016, by
Thomas A. Limoncelli,
Christine Hogan,
Strata R. Chalup
* ''The Practice of Cloud System Administration: Designing and Operating Large Distributed Systems'', Volume 2 (Addison-Wesley), 2 Sep. 2014, by
Thomas A. Limoncelli,
Christine Hogan,
Strata R. Chalup
* ''Principles of Network and System Administration'' (J. Wiley & Sons), 2000, 2003 (2nd ed.), by
Mark Burgess
* ''Time Management for System Administrators'' (O'Reilly), 2005, by
Thomas A. Limoncelli
* ''UNIX and Linux System Administration Handbook'' (Prentice Hall), 5th edition, 8 Aug. 2017, by
Trent R. Hein
Trent may refer to:
Places Italy
* Trento in northern Italy, site of the Council of Trent United Kingdom
* Trent, Dorset, England, United Kingdom Germany
* Trent, Germany, a municipality on the island of Rügen United States
* Trent, California, ...
,
Ben Whaley,
Dan Mackin,
Sandeep Negi
"The blue collar workers of the 21st century" Minnesota Public Radio, 27 January 2004
External links
Communication Workers of America
{{DEFAULTSORT:System administrator
*
Computer occupations
Computer systems