Rakesh Jain Profile picture
Jan 4, 2022 16 tweets 6 min read Read on X
Linux Diagnostics and Troubleshooting Series -

Thread 1 👇

Understanding what Troubleshooting is!

#Linux #diagnostics #troubleshooting #security
What is troubleshooting?

Troubleshooting is the art of taking a problem, gathering information about it, analyzing it, and finally solving it.

While some problems are inherently “harder” than others, the same basic approach can be taken for every problem. PC: https://knowmax.ai/wp-content/uploads/2020/09/Troublesho
Not just fixing!

While fixing a problem is one of the major parts of troubleshooting, there are other parts that cannot be neglected: documenting the problem (and fix), and performing a root cause analysis (RCA). PC: https://knowmax.ai/wp-content/uploads/2020/09/Troublesho
Documenting the problem (and the fix) can help in the future when another (or possibly the same) administrator is faced with the same, or a similar, problem.

Performing a root cause analysis can help in preventing similar problems in the future. PC: https://www.foodengineeringmag.com/ext/resources/FE-Late
Using the scientific method -

A good schema to follow wen troubleshooting is d scientific method:

1.Clearly define d issue-
Take a step & view d larger picture, den clearly define d actual problem. Most of d problems reported r symptoms of another problem, not d actual problem. PC: https://www.wikihow.com/images/thumb/c/c9/Define-a-Probl
For eg, a user might call about a problem signing into a machine. While this is a problem for d user, the actual problem can be a forgotten passwd, an incorrectly configured machine, a nw issue, or something else entirely.

Further investigation is needed to determine d cause. PC: https://www.elegantthemes.com/blog/wp-content/uploads/20
2. Collect information -

The next step is collecting as much (relevant) as possible. This information can come from a wide variety of sources: reading log files, information displayed on screen or in a GUI, follow-up questions for the original reporter, etc. PC: https://www.gocanvas.com/content/images/image-uploads/fa
3. Form a hypothesis -
After looking at all gathered info, & d symptoms observed/reported, it is time to form a hypothesis abt the cause of d problem. PC: https://slideplayer.com/5772059/19/images/slide_1.jpg
Sometimes this can be easy; for example, when a user has forgotten his password. Other times, it can be harder; for example, when a single service in a high-availability cluster fails to start on Mondays during months with an "e" in their name.
The key to remember during this step is that the hypothesis is just that, a hypothesis: a best guess as to what can be the cause of the issue. During the following steps, this hypothesis will be tested. If it turns out the hypothesis was wrong, a new one can be formed.
4. Test the hypothesis -
With an initial hypothesis formed, it can be tested for validity. How this testing happens depends on d problem & d hypothesis. PC: www.statisticsteacher.org/files/2021/03/HypothesisTestin
For example, when d hypothesis for a login problem states, “The nw connection between d workstation & d KDC is being interrupted by a firewall,” the testing will be different from a hypothesis for a spontaneously rebooting server including a faulty UPS.
5. Fixing the problem -
If a hypothesis was not found to be invalid, an attempt can be made to fix the problem. During this stage, it is vital to only change one variable at a time, documenting all changes made, and testing every change individually. PC: https://www.slideteam.net/media/catalog/product/cache/96
Keeping backups of any changed configuration files, and reverting to those backups if a change was found to be ineffective, is also crucial. Modifying multiple configurations at once typically only leads to further issues, not fixes. PC: https://iosafe.com/wp-content/uploads/2020/04/3-types-of
6. Rinse & repeat -
If the proposed fixes did not actually resolve the issue, the process will need to be restarted from the top. This time, any new information discovered during this cycle can be added to the mix to form a new hypothesis. PC: https://miro.medium.com/max/1024/1*FJ20mlOOkJFH6py_-pvRz
Hope you like this thread. If yes Retweet it!
More to come.

Follow me for more such content.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Rakesh Jain

Rakesh Jain Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @devops_tech

Apr 29
🔍 AIOps vs. DevOps
Can AIOps Replace the Whole DevOps? 🔄

A thread🧵👇 Image
1/ 💡 Culture Matters:

DevOps isn't just about tools; it's about teamwork and making things better together. AIOps helps with some tasks, but it can't fix team dynamics.

Example: In DevOps, developers and IT folks work closely to solve problems faster.
2/ 💻 From Idea to Reality:

DevOps handles everything from planning to getting the software out there. AIOps helps with some steps, but it doesn't cover everything DevOps does.

Example: In DevOps, everyone works together to build and release software smoothly.
Read 9 tweets
Apr 24
🚨Interview Guide!

AWS☁️Networking Interview Questions & Answers👇

#AWS #Cloud #networking #interview #Guide
1/15 Q: What is the difference b/n an Internet Gateway (IGW) & a NAT Gateway in AWS networking?

A: An IGW allows communication b/n instances in a VPC & the internet, while a NAT Gateway enables outbound internet traffic from private subnets without exposing their IP addresses.
2/15 Q: Explain the concept of VPC peering in AWS.

A: VPC peering allows connecting two VPCs privately to share resources, like EC2 instances, without traversing the internet. It enables communication using private IP addresses across peered VPCs. #AWSNetworkingInterview
Read 25 tweets
Apr 22
🚨Kubernetes Interview Guide!

A thread with 15 interview questions & answers for new/intermediate administrators ⚓️👇
1/15: Question: What is a Kubernetes Pod, and why is it used?

Answer: A Pod is the smallest deployable unit in Kubernetes, representing one or more containers that share resources. It's used to deploy, manage, and scale containers.
2/15: Question: How does Kubernetes manage container networking?

Answer: Kubernetes uses the Container Network Interface (CNI) to manage container networking. CNI plugins allow for different network configurations and overlays, enabling communication between pods across nodes.
Read 19 tweets
Apr 20
🚨Linux Interview Guide!🚨

A thread with 15 advanced questions &answers 🐧👇 Image
1️⃣ Q: How do you optimize disk I/O performance in Linux?

A: Utilize techniques like RAID striping, I/O schedulers (e.g., deadline, noop), and file system optimizations (e.g., tuning journaling options).
2️⃣ Q: Explain the concept of kernel namespaces in Linux.

A: Kernel namespaces isolate and virtualize system resources, enabling processes to have their own view of the system, improving security and resource management.
Read 18 tweets
Apr 18
🚨🚨Interview Guide!

15 Docker scenario-based interview questions and answers 👇🛳️
Q1: U r tasked with deploying a multi-container app on Docker. How would u orchestrate these containers effectively?

A: Utilize Docker Compose, defining services, networks, & volumes in a YAML file. It simplifies multi-container deployments, ensuring consistency & scalability.
Q2: ur team wants to ensure seamless updates without downtime. How would u achieve zero-downtime deployments with Docker?

A: Implement rolling updates with Docker Swarm/ Kubernetes. By gradually updating containers while keeping the app available, u ensure uninterrupted service.
Read 18 tweets
Apr 16
🚨🚨 Interview Tip!

What happens at the backend when you launch a Pod in Kubernetes!

A Thread 👇 Image
🐳 Step 1: YAML Configuration

To kick things off, you create a YAML file defining your Pod's configuration. This includes details like container images, ports, volumes, etc. #Kubernetes #YAML
🔍 Step 2: API Request

Once you've got your YAML ready, you send an API request to the Kubernetes cluster. This request includes your Pod configuration. #K8s #API
Read 21 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(