As a Linux system engineer, I’m sure you’ve all used the top command. It’s been the go-to tool for decades—simple, reliable, and always there when you need it. But have you ever noticed one thing? Occasionally, you might spot a process with CPU usage skyrocketing to 150%, 200%, or even 400%! Surprised? So what’s going …
Linux
If you’re a Linux user, chances are you’ve used top to check your system’s performance. It’s been the go-to tool for decades—simple, reliable, and always there when you need it. But let’s face it: top feels like a flip phone in the age of smartphones. It works, but there’s something better out there. If you’re …
Secure Shell (SSH) is a powerful and widely used protocol that enables secure communication over a network. Whether you’re managing servers, deploying code, transferring files, or running remote applications, SSH is an essential tool for every IT professional and developer. While the basic ssh [email protected] command is familiar to many, SSH offers a wide array …
What is SSH and How Does It Work? SSH (Secure Shell) is a powerful tool that lets you securely connect to another computer over a network. Imagine you have a computer in the moon and need to access a server in another city or country. Instead of physically going there, SSH allows you to control …
If you’re running a Linux instance and suspect that the bandwidth is being overused, you can use a few tools to investigate what’s causing the high traffic. Tools like SAR, iftop, and NetHogs can help you identify the processes responsible for the load and take action to fix the issue. Common Scenarios High bandwidth usage: …
You’ve been using Linux for a while, so you know the basics: ls, cd, cp.But now you’re stepping up your game. You need more. You’re ready to unlock the power of the Linux command line to elevate your workflow—whether it’s programming, system administration, or just being more efficient in your day-to-day tasks. Well, that’s exactly …
When you’re working with Linux systems, particularly those using systemd, journalctl is an essential tool for accessing and managing logs. journalctl provides a powerful and flexible way to query logs, troubleshoot issues, and monitor system events. In this guide, we’ll walk through everything you need to know about journalctl—from basic commands to advanced filtering techniques. …
When working with Red Hat-based systems (like RHEL, CentOS, or Fedora), it’s important to be able to check when the system was rebooted and understand the reasons behind it. System reboots can happen for various reasons such as updates, crashes, manual reboots, or hardware failures. Here’s how you can check the reboot logs on Red …
Managing users in Linux is an essential aspect of system administration. Linux provides a number of commands for creating, deleting, and modifying user accounts. Below is a guide to some basic Linux user management commands that are commonly used: Key Commands for Linux user management 1. Viewing Current Users and Information List all users: To …
The systemctl list-dependencies command in Linux, using systemd, is a powerful tool for exploring the dependency relationships between various system units. In systemd, units can have dependencies on each other — for example, one service might require another service to be running, or a target unit might depend on multiple services to function properly. This …