Rakesh Jain Profile picture
Oct 9, 2021 β€’ 12 tweets β€’ 4 min read β€’ Read on X
Linux Networking Tools -

ss, nmap, dig, netcat, ping, tcpdump, socat, top, ethtool

A Thread πŸ‘‡
SS -

ss command is a tool that is used for displaying network socket related information on a Linux system.
nmap -

Nmap is short for Network Mapper. It is an open-source Linux cmd-line tool that is used to scan IPs & ports in a nw & to detect installed apps. Nmap allows nw admins to find which devices r running on their nw, discover open ports & services, and detect vulnerabilities.
ping & traceroute-

Ping cmd is used to test d ability of d src system to reach a specified destination system.

Traceroute is a nw diagnostic tool used to track in realtime d pathway taken by a pkt on an IP nw from src to dest,reporting d IPaddr of all d routers it pinged in b/n
ethtool -

Ethtool is a Network Interface Card (NIC) utility/configuration tool. Ethtool allows you to query and change your NIC settings such as the Speed, Port, auto-negotiation and many other parameters.
dig -

Dig (Domain Information Groper) is a powerful cmd-line tool for querying DNS name servers.

It allows you to query info abt various DNS records, including host addresses, mail exchanges, & name servers. A most common tool among sysadmins for troubleshooting DNS problems.
netcat -

Netcat is one of d powerful networking tool,security tool or nw monitoring tool. It acts like cat cmd over a nw.

It is generally used for:
Port Scanning /listening/redirection
open Remote connections
Read/Write data across network
Network debugging
Network daemon test
socat -

The socat command shuffles data between two locations. One way to think of socat is as the cat command which transfers data between two locations rather than from a file to standard output.
tcpdump -

Tcpdump is a command line utility that allows you to capture and analyze network traffic going through your system. It is often used to help troubleshoot network issues, as well as a security tool.
top -

The top command is used to show the active Linux processes. It provides a dynamic real-time view of the running system. Usually, this command shows the summary information of the system and the list of processes or threads which are currently managed by the Linux kernel.
wireshark -

Wireshark is a packet sniffer and analysis tool. It captures network traffic on the local network and stores that data for offline analysis.
Retweet the thread if you find it useful. You can follow me for more such content.

PC: Julia Evans / Comparitech

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with Rakesh Jain

Rakesh Jain Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @devops_tech

Nov 21
Platform Engineer vs. SRE vs. DevOps Engineer!

A Thread 🧡
1/ What’s the difference? πŸ€”
All these roles focus on improving software delivery and reliability but have different goals. Here’s a quick breakdown:
2/ Platform Engineer πŸ‘·
πŸ‘‰ Goal: Make life easier for developers.
β€’ Build tools & platforms (e.g. CI/CD pipelines, Kubernetes)
β€’ Standardize workflows for efficiency
β€’ Create self-service systems so developers can work faster

πŸ› οΈ They focus on improving developer productivity.
Read 9 tweets
Sep 12
AWS service limitations to keep in mind!

A List of critical #AWS services and their limitations πŸ‘‡ Image
1. EC2 – Instance limits by region, instance type restrictions.
2. RDS – Max database storage limits, instance size restrictions.
3. S3 – Max object size is 5TB, bucket policies can limit access.
4. EBS – Volume size max of 64TB, 20,000 IOPS for io1/io2 volumes.
5. IAM – Max 5,000 roles per account, policy size limits.
6. Lambda – Max execution timeout of 15 minutes, memory max 10GB.
7. DynamoDB – Partition throughput limits, item size max of 400KB.
8. CloudFormation – 200 resources limit per stack.
Read 13 tweets
Sep 9
Mastering Ansible command line!

A Thread of 10 key #Ansible commands and concepts all #DevOps and #Linux Administrators should focus on πŸ‘‡πŸ‘‡ Image
1️⃣ Check Ansible Version

Command:
ansible --version

Explanation:
Verify your Ansible installation and check version details.
2️⃣ Ping All Hosts

Command:
ansible all -m ping

Explanation:
Ping all hosts in your inventory to ensure they are reachable.
Read 18 tweets
Sep 5
🧡 Mastering Docker Troubleshooting: 15 Key Tips for Developers and DevOps Engineers!

A Thread πŸ‘‡πŸ‘‡ Image
1/ 🐳 Check Container Status
Use docker ps -a to view all containers and their statuses. A container may have exited unexpectedly.
Look at STATUS and RESTART policies to identify potential issues.
2/ πŸ” Inspect Logs
Run docker logs <container_name> to see the container logs.
This helps troubleshoot crashes, errors, or other issues within the app or service.
Read 18 tweets
Sep 3
🧡 Mastering Dockerfile: A Breakdown of 15 most important Parameters!

A thread πŸ‘‡πŸ‘‡ Image
1️⃣ FROM:
The first instruction in any Dockerfile. It defines the base image for subsequent instructions.

FROM ubuntu:20.04 - Starts with an Ubuntu 20.04 image.
2️⃣ LABEL:
Adds metadata to the image, such as author or version.

LABEL maintainer="you@example.com" - Tags the image with your contact info.
Read 18 tweets
Aug 30
🧡 Kubernetes Security Master Guide! πŸ” Image
1️⃣ Role-Based Access Control (RBAC)

πŸ“œ Limit access with RBAC! Define who can do what in your cluster by setting up roles and bindings. Keep permissions tight!

Example:
kubectl create rolebinding developer --clusterrole=edit --user=dev@example.com -n dev-namespace
2️⃣ Network Policies

🌐 Control traffic flow between pods using Network Policies. Limit communication to what's needed, reducing the attack surface.
Example: A policy that only allows inbound traffic from specific pods: Image
Read 18 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(