background preloader

20 Linux System Monitoring Tools Every SysAdmin Should Know

20 Linux System Monitoring Tools Every SysAdmin Should Know
Need to monitor Linux server performance? Try these built-in commands and a few add-on tools. Most Linux distributions are equipped with tons of monitoring. These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as: Finding out bottlenecks.Disk (storage) bottlenecks.CPU and memory bottlenecks.Network bottlenecks. #1: top - Process Activity Command The top program provides a dynamic real-time view of a running system i.e. actual process activity. Fig.01: Linux top command Commonly Used Hot Keys The top command provides several useful hot keys: => Related: How do I Find Out Linux CPU Utilization? #2: vmstat - System Activity, Hardware and System Information Display Memory Utilization Slabinfo # vmstat -m Get Information About Active / Inactive Memory Pages

Related:  How-To, Tips, Tricks, Notes

Broadcom B43xx wireless - Bodhi Linux 43xx wifi card The open source b43-fwcutter drivers can be used with these cards, but often give sub-optimal performance (high cpu usage, for example). This alternate setup has given excellent results on the Broadcom bcm4312 and should also work on other cards in that family. Run the following line in terminal: sudo apt-get purge b43-fwcutter && sudo apt-get install linux-headers-$(uname -r) broadcom-sta-source Reboot and you should be good to go.

Debugging Tip: Trace the Process and See What It is Doing with s strace is a useful diagnostic, instructional, and debugging tool. It can save lots of headache. System administrators, diagnosticians and trouble-shooters will find it invaluable for solving problems with programs for which the source is not readily available since they do not need to be recompiled in order to trace them. This is also useful to submit bug reports to open source developers. Each line in the trace contains the system call name, followed by its arguments in parentheses and its return value.

Ch14 : Linux Firewalls Using iptables Network security is a primary consideration in any decision to host a website as the threats are becoming more widespread and persistent every day. One means of providing additional protection is to invest in a firewall. Though prices are always falling, in some cases you may be able to create a comparable unit using the Linux iptables package on an existing server for little or no additional expenditure. 20 Linux Server Hardening Security Tips Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system. Linux Server Hardening Checklist and Tips The following instructions assume that you are using CentOS/RHEL or Ubuntu/Debian based Linux distribution. #1: Encrypt Data Communication

Use your laptop as a wifi router Last week, I was snowboarding with my family in Scheffau, Austria. In the appartment, there was one single cat-5 cable, while 5 of us wanted to use the internet. So I figured out how to build a ad-hoc wifi network with my laptop in order to share the network connection. My configuration On my laptop, I'm running Fedora 13 with dnsmasq installed. All other software is pretty standard. DVD Playback - Fuduntu From Fuduntu Introduction Fuduntu does not ship with a DVD decoder by default due to the legal grey area surrounding it. As a Fuduntu user, you may however want to play DVDs. 32 or 64 bit Installation

Assistance Documentation Before searching for support from someone else, it's usually good to try to find an answer to your problem yourself. That way you will usually get the answers you need, and even if you don't, the experience of reading the documentation will likely be useful for you in the future. There is a fair amount of documentation available in Debian — please refer to the Debian documentation web page. Known problems Limitations and severe problems of the current stable distribution (if any) are described on the release pages. Understanding Windows Logging This article will focus on the importance of monitoring your windows event logs and will highlight the information that is able to be extracted from typical windows logs that help to secure your critical servers. The importance of monitoring the logs will be stressed and creative ways to do this centrally will also be covered. Logging is a very important factor when attempting to decipher what has taken place on a server.

Ubuntu Networking Configuration Using Command Line  If you're new here, you may want to subscribe to my RSS feed and if you have questions related to your ubuntu system post question to our forums. Thanks for visiting! Sponsored Link The basics for any network based on *nix hosts is the Transport Control Protocol/ Internet Protocol (TCP/IP) combination of three protocols. This combination consists of the Internet Protocol (IP),Transport Control Protocol (TCP), and Universal Datagram Protocol (UDP). By Default most of the users configure their network card during the installation of Ubuntu.

Related:  ServersLinuxLinuxInformatiqueLinuxprimoLinux