Linux Diagnostics and Troubleshooting Series -

Thread 1 πŸ‘‡

Understanding what Troubleshooting is!

#Linux #diagnostics #troubleshooting #security
What is troubleshooting?

Troubleshooting is the art of taking a problem, gathering information about it, analyzing it, and finally solving it.

While some problems are inherently β€œharder” than others, the same basic approach can be taken for every problem. PC: https://knowmax.ai/wp-content/uploads/2020/09/Troublesho
Not just fixing!

While fixing a problem is one of the major parts of troubleshooting, there are other parts that cannot be neglected: documenting the problem (and fix), and performing a root cause analysis (RCA). PC: https://knowmax.ai/wp-content/uploads/2020/09/Troublesho
Documenting the problem (and the fix) can help in the future when another (or possibly the same) administrator is faced with the same, or a similar, problem.

Performing a root cause analysis can help in preventing similar problems in the future. PC: https://www.foodengineeringmag.com/ext/resources/FE-Late
Using the scientific method -

A good schema to follow wen troubleshooting is d scientific method:

1.Clearly define d issue-
Take a step & view d larger picture, den clearly define d actual problem. Most of d problems reported r symptoms of another problem, not d actual problem. PC: https://www.wikihow.com/images/thumb/c/c9/Define-a-Probl
For eg, a user might call about a problem signing into a machine. While this is a problem for d user, the actual problem can be a forgotten passwd, an incorrectly configured machine, a nw issue, or something else entirely.

Further investigation is needed to determine d cause. PC: https://www.elegantthemes.com/blog/wp-content/uploads/20
2. Collect information -

The next step is collecting as much (relevant) as possible. This information can come from a wide variety of sources: reading log files, information displayed on screen or in a GUI, follow-up questions for the original reporter, etc. PC: https://www.gocanvas.com/content/images/image-uploads/fa
3. Form a hypothesis -
After looking at all gathered info, & d symptoms observed/reported, it is time to form a hypothesis abt the cause of d problem. PC: https://slideplayer.com/5772059/19/images/slide_1.jpg
Sometimes this can be easy; for example, when a user has forgotten his password. Other times, it can be harder; for example, when a single service in a high-availability cluster fails to start on Mondays during months with an "e" in their name.
The key to remember during this step is that the hypothesis is just that, a hypothesis: a best guess as to what can be the cause of the issue. During the following steps, this hypothesis will be tested. If it turns out the hypothesis was wrong, a new one can be formed.
4. Test the hypothesis -
With an initial hypothesis formed, it can be tested for validity. How this testing happens depends on d problem & d hypothesis. PC: www.statisticsteacher.org/files/2021/03/HypothesisTestin
For example, when d hypothesis for a login problem states, β€œThe nw connection between d workstation & d KDC is being interrupted by a firewall,” the testing will be different from a hypothesis for a spontaneously rebooting server including a faulty UPS.
5. Fixing the problem -
If a hypothesis was not found to be invalid, an attempt can be made to fix the problem. During this stage, it is vital to only change one variable at a time, documenting all changes made, and testing every change individually. PC: https://www.slideteam.net/media/catalog/product/cache/96
Keeping backups of any changed configuration files, and reverting to those backups if a change was found to be ineffective, is also crucial. Modifying multiple configurations at once typically only leads to further issues, not fixes. PC: https://iosafe.com/wp-content/uploads/2020/04/3-types-of
6. Rinse & repeat -
If the proposed fixes did not actually resolve the issue, the process will need to be restarted from the top. This time, any new information discovered during this cycle can be added to the mix to form a new hypothesis. PC: https://miro.medium.com/max/1024/1*FJ20mlOOkJFH6py_-pvRz
Hope you like this thread. If yes Retweet it!
More to come.

Follow me for more such content.

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with Rakesh Jain

Rakesh Jain Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @devops_tech

18 Dec 21
What are different Process states in Linux!

What is a Zombie Process!

How to Clean a Linux Zombie Process!

A Thread πŸ‘‡ PC: https://store-images.s-microsoft.com
What Is a Zombie Process?

Zombie processes in Linux are sometimes also referred to as defunct or dead processes. They’re processes that have completed their execution, but their entries are not removed from the process table. PC: https://totozhang.github.io/
What are different Process States?

Linux maintains a process table of all the processes running, along with their states. Let’s briefly overview the various process states: PC: https://miro.medium.com/max/642/1*IaPYYJt9tXFvDnLeWNuVbw
Read 20 tweets
30 Nov 21
What is systemd and why should Linux users care about it?

Everything about "systemd" !!

A Mega Thread πŸ‘‡ https://everyday.codes/
What is systemd ?

systemd is the glue that holds Linux systems together. systemd is a collection of building blocks, which handle services, processes, logging, network connectivity and even authentication. PC: https://images.techhive.com/ & ZDNet
systemd handles the boot process for Linux systems. As an init implementation, it has a PID of 1 like other init systems, such as System V, Upstart.

It was designed as a replacement for SystemV and LSB-style startup scrips, which were prevalent since 1980s.
Read 44 tweets
19 Nov 21
#Linux Boot Process Explained!

A Thread πŸ‘‡ PC: https://images.wallpapersden.com/
Every Linux Admin or DevOps Engineer should know what happens when a Linux system boots. It's a very popular Interview Question as well.
Every time you power on your Linux PC, it goes through a series of stages before finally displaying a login screen that prompts for your username or password.

There are 3 high level stages of a typical Linux boot process.
Read 20 tweets
29 Oct 21
Everything you need to know about Virtualization, VMs , Containers, Pods, Clusters ..

A Mega Thread πŸ‘‡ PC: production-cci-com.imgix.net
What is Virtualization?

Virtualization is the act of dividing shared computational resources: CPU, RAM, Disk, and Networking into isolated resources that are unaware of the original shared scope. PC: cloud4y
What is a virtual machine?

A VM is a virtual env that functions as a virtual computer system with its own CPU, memory, nw interface, & storage, created on a physical hw system (located off- or on-prem).

It uses sw instead of a physical computer to run programs & deploy apps. PC: nakivo
Read 26 tweets
27 Oct 21
Traceroute: A computer Network Diagnostic Tool πŸ› οΈ

How does it work! πŸ€”

Ping works fine but not traceroute! 🀨

What are the stars in traceroute output! *⃣*⃣*⃣

#Linux #Networking

A Thread πŸ‘‡ PC: n-able.com
What is traceroute ?

traceroute tracks the route packets take across an IP network on their way to a given host.

It assists you in troubleshooting nw connectivity issues from your Destination to a Remote destination by using echo packets (ICMP) to visually trace the route.
The syntax -

The cmd traceroute <x> (x here being an IP or hostname) is d most basic version & it will begin to send packets to d designated target. This result will allow u to trace d path of d packets sent from ur machine to each of d systems b/n u & ur desired destination.
Read 22 tweets
25 Oct 21
Cyber Security Basics!

#infosec

A Mega Thread πŸ‘‡ PC: cyberoregon
What is Cyber Security?

Cybersecurity is a way of protecting the network, computers, and other electronic gadgets from cybercriminals. The Malicious attackers might delete, modify or leak confidential information posing a huge threat to a business or an individual. PC: abacustechnologies
What is Cyber Crime?

Here are some examples of Cyber Crime:

1. Identity Theft

2. Online Predators

3. BEC ("Business Email Compromise")

4. Ransomware

4. Stealing of sensitive intellectual property
Read 33 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(