Featured »

March 2, 2022 – 2:00 pm

Books have been written on the subject of awk and sed. Here’s a small sample of commands I put together over the years that are useful for everyday system administration tasks. Most of these tasks …

Read the full story »
Networking

Unix and Linux network configuration. Multiple network interfaces. Bridged NICs. High-availability network configurations.

Applications

Reviews of latest Unix and Linux software. Helpful tips for application support admins. Automating application support.

Data

Disk partitioning, filesystems, directories, and files. Volume management, logical volumes, HA filesystems. Backups and disaster recovery.

Monitoring

Distributed server monitoring. Server performance and capacity planning. Monitoring applications, network status and user activity.

Commands & Shells

Cool Unix shell commands and options. Command-line tools and application. Things every Unix sysadmin needs to know.

Home » Archive by Category

Articles in Featured

Approximate String Matching

August 18, 2021 – 11:15 am
IMG_6210-scaled[1]

On occasion I find myself searching for something in log files or in my Bash history, but I can’t quite remember what it is that I am looking for. Come to think of it, this …

Understanding Memory Utilization in Linux

August 11, 2021 – 11:10 am
5gtysva4wkc8mzc1k3e66vaycxx[1]

This is a depressing – and all-too-common – scenario: a user runs the free command and opens a support case because he sees zero “free” memory on the server.

Processing Videos with ffmpeg and Lightroom

October 12, 2020 – 1:52 pm
DSCF5361[1]

On occasion I wondered how to apply advanced photo filters to my lackluster GoPro and drone videos. You know, not the basic exposure/contrast/saturation or the cheesy special effects you find in video editors, but something …

Searching Twitter

October 11, 2020 – 1:50 pm
Cat-Devouring-A-Bird-Pablo-Picasso[1]

Here are just a few hopefully useful tips for searching Twitter to get more relevant results and buy cheap twitter followers.

Bulk Create Linux Users using Salt

October 9, 2020 – 1:48 pm
l5km2qq7sz7bbvg5pra24eygsdp-2[1]

Recently I ran into a situation where hundreds of VMs recently built via OpenShift/Ansible automation were missing an important local user account used for security audits. While our automation guys were working on tracking down …

Checking Linux Account Password

October 8, 2020 – 1:46 pm
IMG_5456-scaled[1]

On occasion you may need to check if an account has a specific password. For example, when you build VMs, you may use some default passwords for some default accounts (i.e. root) that should be …

Coronavirus Stats in Bash

October 7, 2020 – 1:40 pm
IMG_5435[1]

The result of my morbid fascination with the coronavirus situation is this quick bash script that parses Johns Hopkins University coronavirus data to generate a quick report for the current date for the specified countries.

Updating Lynis

October 6, 2020 – 8:22 am
IMG_5427

Lynis is an excellent security audit tool for Linux and various Unix derivatives. I have a small wrapper script that runs Lynis via a cron job, does a selective diff with the previous run’s output, …

Hiding Passwords

October 5, 2020 – 8:20 am
IMG_5301

I’ve touched on this subject previously, but suddenly felt I should repeat myself. The big issue with using passwords from command line is shell history.

Convert Code Snippets to PNG

October 4, 2020 – 8:19 am
2apzqxrvorckslw14x029ua67ku

On occasion I find myself struggling posting code on discussion forums that don’t handle code formatting all that well. What would’ve helped is some quick and easy way to convert code to an image file …

Backup Options for Raspberry Pi

October 3, 2020 – 8:16 am
IMG_5275

Just about every Raspberry Pi I used suffered the same fate: the micro SD card died. It is generally accepted that the expected lifespan of an SD card is around ten years of normal use.

Affordable Linux Server

October 2, 2020 – 8:14 am
IMG_5264-scaled

A friend asked me what server I would recommend to run Linux. Yes, a very broad query. After a few followup questions we’ve determined the server will be used to run VMs, or Apache, or …

Home-Brew Ransomware Defense

October 1, 2020 – 8:10 am
3wve96qqllhu6wkgqmzmqgzo19q-2-gigapixel

The first well-known case of ransomware was documented in 1989. The so-called AIDS Trojan was delivered on a floppy disc; encrypted data; demanded $189.00 (nearly four hundred bucks in today’s money) as a “license fee”. …

Validating HTTPS Cache Peers for Squid

January 6, 2020 – 12:38 am
sy2zeb1vp2h8itlxfbbylw0jrm0[1]

I have a squid proxy server that uses a long list of authenticated cache peers in a round-robin configuration. The process looks something like this:

Analyzing atop Logs with atopsar

December 26, 2019 – 9:52 pm
0h7vjqy3irb9p63bjuuxvd0tq85[1]

I have discussed atop previously but concentrated primarily on how to run it and how to collect data. Now I’d like to spend some time talking about ways to analyze the data collected with atop.

Appending Filenames

December 22, 2019 – 9:51 pm
gk5arsj5ijgmshcbh73vvpkdh2k[1]

If you google how to append, say, current timestamp to the filename in Bash, almost every suggestion boils down to something really basic along the lines of mv $somefile $somefile_$(date +’Y%-%m-%d’). Technically, this is correct …

Selecting Time Ranges from Logs, Part 2

December 16, 2019 – 9:47 pm
4bbqfrqoa4vxlgrr02pg883ozks[1]

A couple of years ago I wrote an article about selecting specific time ranges from log files. I proposed two options: either convert all timestamps to epoch format (a CPU-intensive process) or rely on regex …

Automatically Block Frequent Visitors

December 9, 2019 – 9:45 pm
gea59uduencunzibzb6i3gxn36m[1]

I had a few similar scripts floating around this site, but this one is a bit more all-inclusive and better organized. The script will analyze your firewall/whatever access log and block particularly active visitors.

Detecting Blurry Photos with ImageMagick

December 3, 2019 – 9:43 pm
ll7je7yy7kvxsiw8ibssm0nmqf0-2[1]

Here’s a typical scenario: I go to a birthday party where everyone knows I’m a shutterbug, so I have to bring my camera. As time goes by and blood alcohol concentration rises and attention to …

Working with iptables Logging

November 30, 2019 – 9:41 pm
gpxvtms6cvea4q504jtbxjfwcd5z-2[1]

Most commonly iptables is used to allow, block, or redirect connections. However, it also has a logging feature that can be very useful for network traffic analysis and system security.

Copying File Attributes Across Servers

November 29, 2019 – 9:40 pm
5wqsp02uml4to2k7pe8m63sd7q7[1]

To make long story short, had to fix someone’s chmod -R 777 /. A late-night copy-paste fail, it would seem. Needless to say, console access is required, as SSH will not work with permissions on …

Analyzing Network Performance

November 25, 2019 – 9:37 pm
gly8stqifn615gp3xbc34h64byx-2[1]

Much of network performance analysis will be comparative in nature. Thus, seeing the output of multiple commands side by side can be quite useful. Bash has a useful little utility called pr and we’ll make …