Sunday, May 17, 2020

zcat, zless, zdiff and zgrep.

When working with compressed files, many standard commands cannot be used directly. For many commonly-used file and text manipulation programs, there is also a version especially designed to work directly with compressed files. These associated utilities have the letter "z" prefixed to their name. For example, we have utility programs such as zcatzlesszdiff and zgrep.

Here is a table listing some z family commands:

CommandDescription
$ zcat compressed-file.txt.gzTo view a compressed file
$ zless somefile.gz or $ zmore somefile.gzTo page through a compressed file
$ zgrep -i less somefile.gzTo search inside a compressed file
$ zdiff file1.txt.gz file2.txt.gzTo compare two compressed files

Note that if you run zless on an uncompressed file, it will still work and ignore the decompression stage. There are also equivalent utility programs for other compression methods besides gzip.

Let's Learn "cat" the most frequently used Linux command line utilities.

cat is short for concatenate and is one of the most frequently used Linux command line utilities. It is often used to read and print files, as well as for simply viewing file contents. To view a file, use the following command:

1
$ cat <filename>

For example, cat readme.txt will display the contents of readme.txt on the terminal. However, the main purpose of cat is often to combine (concatenate) multiple files together. You can perform the actions listed in the table using cat.

The tac command (cat spelled backwards) prints the lines of a file in reverse order. Each line remains the same, but the order of lines is inverted. The syntax of tac is exactly the same as for cat, as in:

1
2
$ tac file
$ tac file1 file2 > newfile
CommandUsage
cat file1 file2Concatenate multiple files and display the output; i.e. the entire content of the first file is followed by that of the second file
cat file1 file2 > newfileCombine multiple files and save the output into a new file
cat file >> existingfileAppend a file to the end of an existing file
cat > fileAny subsequent lines typed will go into the file, until Ctrl-D is typed
cat >> fileAny subsequent lines are appended to the file, until Ctrl-D is typed






Saturday, July 21, 2018

Introduction to Process Management - Linux


Linux, in general, is a fairly stable system. Occasionally, things do go wrong however and sometimes we also wish to tweak the running of the system to better suit our needs. 

In this section, we will take a brief look at how we may manage programs or processes on a Linux system. So what are they?

A program is a series of instructions that tell the computer what to do. When we run a program, those instructions are copied into memory and space is allocated for variables and other stuff required to manage its execution. This running instance of a program is called a process and it's processed which we manage.

What is Currently Running?

Linux, like most modern OS's, is a multitasking operating system. This means that many processes can be running at the same time. As well as the processes we are running, there may be other users on the system also running stuff and the OS itself will usually also be running various processes which it uses to manage everything in general. If we would like to get a snapshot of what is currently happening on the system we may use a program called top.
top

Below is a simplified version of what you should see when you run this program.
1. top
2. Tasks: 174 total, 3 running, 171 sleeping, 0 stopped
3. KiB Mem: 4050604 total, 3114428 used, 936176 free
4. Kib Swap: 2104476 total, 18132 used, 2086344 free
5.  
6. PID USER %CPU %MEM COMMAND
7. 6978 ryan 3.0  21.2 firefox
8.   11 root 0.3   0.0 rcu_preempt
9. 6601 ryan 2.0   2.4 kwin
10. ...


Here are details 

Line 2 Tasks is just another name for processes. It's typical to have quite a few processes running on your system at any given time. Most of them will be system processes. Many of them will typically be sleeping. This is ok. It just means they are waiting until a particular event occurs, which they will then act upon.
Line 3 This is a breakdown of working memory (RAM). Don't worry if a large amount of your memory is used. Linux keeps recently used programs in memory to speed up performance if they are run again. If another process needs that memory, they can easily be cleared to accommodate this.
Line 4 This is a breakdown of Virtual memory on your system. If a large amount of this is in use, you may want to consider increasing its size. For most people with most modern systems having gigabytes of RAM, you shouldn't experience any issues here.
Lines 6 - 10 Finally is a listing of the most resource intensive processes on the system (in order of resource usage). This list will update in real time and so is interesting to watch to get an idea of what is happening on your system. The two important columns to consider are memory and CPU usage. If either of these is high for a particular process over a period of time, it may be worth looking into why this is so. The USER column shows who owns the process and the PID column identifies a process's Process ID which is a unique identifier for that process.
Top will give you a real-time view of the system and only show the number of processes which will fit on the screen. Another program to look at processes is called ps which stands for processes. In it's normal usage it will show you just the processes running in your current terminal (which is usually not very much). If we add the argument aux then it will show a complete system view which is a bit more helpful.

ps [aux]

It does give quite a bit of output so people usually pipe the output to grep to filter out just the data they are after. We will see in the next bit an example of this.
Killing a Crashed Process

It doesn't happen often, but when a program crashes, it can be quite annoying. Let's say we've got our browser running and all of a sudden it locks up. You try and close the window but nothing happens, it has become completely unresponsive. No worries, we can easily kill Firefox and then reopen it. To start off we need to identify the process id.

1. ps aux | grep 'firefox'
2. ryan 6978 8.8 23.5 2344096 945452 ? Sl 08:03 49:53 /usr/lib64/firefox/firefox


It is the number next to the owner of the process that is the PID (Process ID). We will use this to identify which process to kill. To do so we use a program which is appropriately called kill.
kill [signal] <PID>

1. kill 6978
2. ps aux | grep 'firefox'
3. ryan 6978 8.8 23.5 2344096 945452 ? Sl 08:03 49:53 /usr/lib64/firefox/firefox
.
Sometimes you are lucky and just running kill normally will get the process to stop and exit. When you do this kill sends the default signal ( 1 ) to the process which effectively asks the process nicely to quit. We always try this option first as a clean quit is the best option. Sometimes this does not work, however. In the example above we ran ps again and saw that the process was still running. No worries, we can run kill again but this time supply a signal of 9 which effectively means, go in with a sledgehammer and make sure the process is well and truly gone.

1. kill -9 6978
2. ps aux | grep 'firefox'

Normal users may only kill processes which they are the owner for. The root user on the system may kill anyone processes.


When a process crashes and locks up, it can lock up the entire desktop. If this happens there is still hope.

Linux actually runs several virtual consoles. Most of the time we only see console 7 which is the GUI but we can easily get to the others. If the GUI has locked up, and we are in luck, we can get to another console and kill the offending process from there. To switch between consoles you use the keyboard sequence CTRL + ALT + F<Console>. So CTRL + ALT F2 will get you to a console (if all goes well) where you can run the commands as above to identify process ids and kill them. Then CTRL + ALT F7 will get you back to the GUI to see if it has been fixed. The general approach is to keep killing processes until the lock up is fixed. Normally you can look for tell tale signs such as high CPU or Memory usage and start with those processes first. Sometimes this approach works, sometimes it doesn't and you need to restart the computer. Just depends how lucky you are.
Foreground and Background Jobs

Friday, May 11, 2018

Why DevOps ?

DevOps is a culture/profession which promotes collaboration between Development and Operations Team to deploy code to production faster in an automated & repeatable way. The word 'DevOps' is a combination of two words 'development' and 'operations.'
DevOps helps to increases an organization's speed to deliver applications and services. It allows organizations to serve their customers better and compete more strongly in the market.
In simple words, DevOps can be defined as an alignment of development and IT operations with better communication and collaboration. 





DevOps = ACCELERATE  software delivery  +  BALANCE speed, cost, quality & risk + REDUCE time to customer feedback

A collaborative DevOps implementation can bring real business benefit:
  • Meet customer expectations 100%
  • Develop new applications for new markets
  • Reduce the cost of IT overhead
  • Enable innovation at a controlled cost
  • Reduce the cost of market entry
  • Lower the risk of software change





Horizon Desktop-as-a-Service Platform ( Vmware DaaS )



Desktop as a Service provides a useful solution that can bring greater flexibility, ease of administration and cost savings to organizations.

A third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.


With DaaS, on the other hand, organizations pay no upfront costs. They only pay for the virtual desktops they use each month. Over time, however, these subscription costs can add up and eventually be higher than the capital expenses of deploying on-premises VDI.




Please message me with your problem or what you want before you order

Do you have a problem with your VMware ESXi Host System or a VMware vCenter?

I will help with your problems for the following systems:
  •  vCenter & ESXi Host System

I will help you to manage your virtual server within:
  • vCenter & ESXi Host System

Do you want to try out VMware ESXi on your dedicated server?
If yes I can help you with the installation or if you want to install it for you :)

Thanks

Thursday, October 29, 2015

Solaris 10 ssh lock after retires policy

Check :-

bash-3.2# cat /etc/security/policy.conf | grep LOCK_AFTER_RETRIES=NO
#LOCK_AFTER_RETRIES=NO
bash-3.2# cat /etc/security/policy.conf | grep LOCK_AFTER_RETRIES
# LOCK_AFTER_RETRIES specifies the default account locking policy for local
#LOCK_AFTER_RETRIES=NO
bash-3.2#

Apply :- 


bash-3.2# cp /etc/security/policy.conf /etc/security/policy.orig
bash-3.2#
bash-3.2#
bash-3.2# echo "LOCK_AFTER_RETRIES=YES" >>  /etc/security/policy.conf
bash-3.2#
bash-3.2# cat /etc/security/policy.conf | grep LOCK_AFTER_RETRIES
# LOCK_AFTER_RETRIES specifies the default account locking policy for local
#LOCK_AFTER_RETRIES=NO
LOCK_AFTER_RETRIES=YES

Now if you have appply the rule below, it should work .. 

bash-3.2# cat /etc/default/login | grep RETRIES
# login will wait after RETRIES failed attempts or the PAM framework returns
# RETRIES determines the number of failed logins that will be
# will be locked if failed logins equals or exceeds RETRIES.
RETRIES=5
bash-3.2#

Saturday, September 19, 2015

How to Enable the Audit Service in Solaris

cd /etc/security

# ./bsmconv
This script is used to enable the Basic Security Module (BSM).
Shall we continue with the conversion now? [y/n] y
bsmconv: INFO: checking startup file.
bsmconv: INFO: turning on audit module.
bsmconv: INFO: initializing device allocation.

The Basic Security Module is ready.
If there were any errors, please fix them now.
Configure BSM by editing files located in /etc/security.
Reboot this system now to come up with BSM enabled.
Reboot:
# init 6
After the reboot, the SMF service: svc:/system/auditd:default will be in online status and the auditd daemon will be running:
# svcs -l auditd
fmri         svc:/system/auditd:default
name         Solaris audit daemon
enabled      true
state        online
next_state   none
state_time   Tue Jul 23 11:11:59 2013
logfile      /var/svc/log/system-auditd:default.log
restarter    svc:/system/svc/restarter:default
contract_id  64
dependency   require_all/none svc:/system/filesystem/local (online)
dependency   require_all/none svc:/milestone/name-services (online)
dependency   require_all/none svc:/system/system-log (online)

# pgrep -fl audit
  564 /usr/sbin/auditd


svcadm enable auditd
 ** vi /etc/security/audit_control 
Remove before
## audit_control file
ADD_____________________
flags:lo,ss
naflags:lo,na
plugin:name=audit_binfile.so;p_dir=/var/audit; p_minfree=20;
plugin:name=audit_syslog.so;p_flags=+lo,-ss


Featured Post

Managing CA Certificates on Red Hat Linux 9: Understanding update-ca-trust extract

  Managing CA Certificates on RHEL9 RHEL8 OracleLinux9 OracleLinux8 In today's digital landscape, securing communications and verifying ...