The operating system is the critical system software that ensures the smooth operation of the computer. Some operating systems are designed to serve a specific purpose. They provide some unique tools or services to their users that are adequately available, making it a good OS for the purpose.
Friday, April 22, 2022
Friday, April 15, 2022
Yes, the native "audit" is one of the best security features which is generally not used that much now-e-days. Well, if there is another well advanced security feature which does more than audit then it is good. In this blog post I wish to discuss and talk about this feature and how to get the best out of it without investing anything extra. All that is required is good administrative skills and what needs to be audited. Most importantly, this native audit feature could only track the security violations on a Linux box, however, it could not fix/resolve it. It is only an auditing system. Using this native feature one could track down any system events such as change of file attributes or shutdown events etc, and could understand which user has triggered it. Let's see how it works.
Monday, November 29, 2021
There are many times that we get puzzled with this question "Who has rebooted the system?". Was this triggered by a user or done by some kernel threads? What was the reason why the server was rebooted? Of course, a running system should not be rebooted without a reason, as this incurs downtime and service disruptions. There are many ways to avoid service disruption by setting up High Availability (HA) so that one server down/reboot would not cause any downtime as the application/service would continue to work from another server in this setup. However, in Load Balancer (LB) mode where there are multiple nodes serving the applications and node down would certainly be balanced by other nodes in the LB setup. Let's come back to our main agenda which is to track the system reboot activity. Yes, in this blog post we would talk about this topic and different ways to detect/identify this from a Linux system.
Monday, June 14, 2021
DNF or Dandified YUM is the next generation version of yum.
DNF is a software package manager that installs, updates, and removes packages on RPM-based Linux distributions. It automatically computes dependencies and determines the actions required to install packages. DNF also makes it easier to maintain groups of machines, eliminating the need to manually update each one using rpm. Introduced in Fedora 18, it has been the default package manager since Fedora 22. So, in this post I’m not going to discuss the usage of DNF rather on why and advantages of using it. By default, DNF comes pre-installed on RHEL8.x releases. The "yum" command is a symbolic link to the "dnf" binary now.
Wednesday, May 12, 2021
As we all know, patching is an essential & integral part of any IT infrastructure. It could be cloud based systems (virtual) or an on-premise virtual systems or physical servers running in a dedicated data center. Patch management has now become an important buzzword in corporate IT organizations and business offices. Patch management is basically the process of acquiring, testing and installing multiple code changes (patches) to systems software and applications.
Monday, December 7, 2020
Yes, there are several places where a dot (.) is being used in Linux terminal/Shell. In addition, a dot would depict some meaning when shown in the output of a command. Let us see the different places where we would normally use a dot and explore the other places where one could get to see this in Linux. The usage of a dot that is documented here is excluding the standard or regular use that is not specific to Linux/Unix and it is common across computer environments. Such as in representing a FQDN (Fully Qualified Domain Name) separated with dot, IP Address where each bit (from 0 to 255) is separated by a dot etc,