Tuesday, December 25, 2018

How to Disable, Stop or Uninstall Apport Error Reporting ?

How do I enable or disable Apport?

Apport is an Error Reporting Service provided by Ubuntu to intercept and analyze crashes and bugs as and when they occur. Crashes and Bugs may sound like bad things, but actually most operating systems will have several a day, and it doesn't mean your computer is broken, nor does it necessarily stop working. As such, Apport can usually be safely disabled, as it doesn't fix anything, it just tells developers that something went wrong.

Apport intercepts Program crashes, collects debugging information about the crash and the operating system environment, and sends it to bug trackers in a standardized form. It also offers the user to report a bug about a package, with again collecting as much information about it as possible.

How to Disable Apport at Boot ?

You need to manually edit a file to Stop Apport Running at Boot (when you turn on your machine. Open the Terminal, and paste the following command with Ctrl+Shift+V, or type it in manually.

Change the line that says enabled=1 to enabled=0 to disable Apport. To re-enable, change it back.

How to Stop Apport ?
On ubuntu 14.04 LTS
You can stop the currently running Apport service with the following command.
sudo service apport stop
Note that unless you remove it or disable it at boot it will start again the next time you turn on your computer.

On Ubuntu 16.04

To stop the service

Sudo systemctl stop apport.service

The systemd commands to enable / disable apport are:
Disable
sudo systemctl disable apport.service
If that does not work, you would then need to mask the service
Sudo systemctl mask apport.service
To re-enable
Sudo systemctl unmask apport.service # if you masked it
sudo systemctl enable apport.service

How to Uninstall Apport ?
It is fairly simple to uninstall Apport, as you can open the Ubuntu Software Centre, search for apport, and simply click Remove.
A similar process can be used for the package apport in both Synaptic and the Terminal.

sudo apt-get remove apport

sudo apt-get purge apport


Thursday, December 13, 2018

How to test a zabbix item key using zabbix_agentd in linux ?

zabbix_agentd - Zabbix agent daemon

SYNOPSIS
      zabbix_agentd [-c config-file]
      zabbix_agentd [-c config-file] -p
      zabbix_agentd [-c config-file] -t item-key
      zabbix_agentd [-c config-file] -R runtime-option
      zabbix_agentd -h
      zabbix_agentd -V




DESCRIPTION
      zabbix_agentd is a daemon for monitoring of various server parameters.




OPTIONS
      -c, --config config-file
             Use the alternate config-file instead of the default one.  Absolute path should be specified.

      -f, --foreground
             Run Zabbix agent in foreground.

      -R, --runtime-control runtime-option
             Perform administrative functions according to runtime-option.

          Runtime control options
              log_level_increase[=target]
                  Increase log level, affects all processes if target is not specified

              log_level_decrease[=target]
                  Decrease log level, affects all processes if target is not specified

          Log level control targets
              pid Process identifier

              process-type
                  All processes of specified type (e.g., listener)

              process-type,N
                  Process type and number (e.g., listener,3)

      -p, --print
             Print known items and exit.  

          d Number with a decimal part.

          m Not supported.  This could be caused by querying an item that only works
in the active mode like a log monitoring item or an item that requires multiple collected  values.
              Permission issues or incorrect user parameters could also result in the not supported state.

          s Text. Maximum length not limited.

          t Text. Same as s.

          u Unsigned integer.

      -t, --test item-key
             Test single item and exit.  See --print for output description.

      -h, --help
             Display this help and exit.

      -V, --version
             Output version information and exit.






Examples:

How to test a item key using zabbix_agentd ?

Syntax:

zabbix_agentd -t  --test item-key




zabbix_agentd -t proc.mem[]
proc.mem[]                                    [u|3469561856]
 u give return data type from item was   Unsigned integer.




Proc.mem it give Memory used by process in bytes.




Above example it give all process total memory utilized in server .




zabbix_agentd -t system.hostname
system.hostname                               [s|linuxforfreshers.com]

Item returns data type was  s Text. Maximum length not limited.




How to find agent version ?




Syntax :

zabbix_agentd -V

Or

zabbix_agentd -t agent.version




Example:

zabbix_agentd -V
zabbix_agentd (daemon) (Zabbix) 3.0.22
Revision 84876 14 September 2018, compilation time: Sep 14 2018 07:36:14

zabbix_agentd -t agent.version
agent.version                                 [s|3.0.22]





Wednesday, October 3, 2018

What Is /dev/shm in linux?

What Is /dev/shm



Shared (Virtual) Memory (SHM)


Shared memory is a way to shared state between process.

Shared memory, as its name implies, is a method to “share” data between processes.
Both processes define the same memory area as “shared”, and they can then exchange
information simply by writing into it. This (used to be, and still is somewhat) faster than
the alternative of sending network or pipe-based messages between processes.

If you see the memory as a mean of storing data, a file on a file system can be seen as
shared memory (ie shared file).

It is difficult to account for shared memory. Does it belong to one process? Both? Neither?
If we naively sum the memory belonging to multiple processes, we grossly “over-count”.

As the name implies, the Shared (Virtual) Memory refers to virtual memory that are shared
by more than one process and then can be used by multiple programs simultaneously.

Although virtual memory allows processes to have separate (virtual) address spaces, there
are times when you need processes to share memory.

Shared memory (SHM) is another method of interprocess communication (IPC)
whereby several processes share a single chunk of memory to communicate.

Shared memory provides the fastest way for processes to pass large amounts of data
to one another.


/dev/shm is nothing but implementation of traditional shared memory concept. It is an
efficient means of passing data between programs. One program will create a memory
portion, which other processes (if permitted) can access. This will result into speeding up
things on Linux.


shm / shmfs is also known as tmpfs, which is a common name for a temporary file storage
facility on many Unix-like operating systems. It is intended to appear as a mounted
file system, but one which uses virtual memory instead of a persistent storage device.
If you type mount command you will see /dev/shm as a tempfs file system. Therefore,
it is a file system, which keeps all files in virtual memory. Everything in tmpfs is temporary
in the sense that no files will be created on your hard drive. If you unmount a tmpfs instance, everything stored therein is lost. By default almost all Linux distros configured to use /dev/shm.

Difference between tmpfs and swap

  • tmpfs uses memory while as swap uses persistent storage devices.
  • tmpfs can be viewed as file system in df output whereas swap dont
  • swap has general size recommendations, tmpsfs not. tmpfs size varies on system purpose.
  • tmpfs makes applications fasters on loaded systems. swap helps system breath in memory full situations.
  • swap full indicates system heavily loaded, degraded performance and may crash.
  •  tmpfs being full not necessarily means heavy load or prone to crash.
  • tmpfs is enhancement where as swap is must have feature!



what is the difference between kill -15 vs kill -9 in linux?


kill -15 vs kill -9
List of kill signals.

kill -l

1) SIGHUP 2) SIGINT 3) SIGQUIT 4) SIGILL 5) SIGTRAP 6) SIGABRT 7) SIGBUS 8) SIGFPE 9) SIGKILL 10) SIGUSR1 11) SIGSEGV 12) SIGUSR2 13) SIGPIPE 14) SIGALRM 15) SIGTERM 16) SIGSTKFLT 17) SIGCHLD 18) SIGCONT 19) SIGSTOP 20) SIGTSTP 21) SIGTTIN 22) SIGTTOU 23) SIGURG 24) SIGXCPU 25) SIGXFSZ 26) SIGVTALRM 27) SIGPROF 28) SIGWINCH 29) SIGIO 30) SIGPWR 31) SIGSYS 34) SIGRTMIN 35) SIGRTMIN+1 36) SIGRTMIN+2 37) SIGRTMIN+3 38) SIGRTMIN+4 39) SIGRTMIN+5 40) SIGRTMIN+6 41) SIGRTMIN+7 42) SIGRTMIN+8 43) SIGRTMIN+9 44) SIGRTMIN+10 45) SIGRTMIN+11 46) SIGRTMIN+12 47) SIGRTMIN+13 48) SIGRTMIN+14 49) SIGRTMIN+15 50) SIGRTMAX-14 51) SIGRTMAX-13 52) SIGRTMAX-12 53) SIGRTMAX-11 54) SIGRTMAX-10 55) SIGRTMAX-9 56) SIGRTMAX-8 57) SIGRTMAX-7 58) SIGRTMAX-6 59) SIGRTMAX-5 60) SIGRTMAX-4 61) SIGRTMAX-3 62) SIGRTMAX-2 63) SIGRTMAX-1 64) SIGRTMAX


SIGKILL (9) – Kill signal. Use SIGKILL as a last resort to kill process. This will not save data or cleaning kill the process.

SIGTERM (15) – Termination signal. This is the default and safest way to kill process.

The difference between 9 and 15 is, the default action for both of them is to terminate
the process, but 9 can't be caught or ignored. So if signal 9 gets sent, the process is
guaranteed to die, immediately. If a sig 15 is sent, the process can catch it and perform cleanups.


Signal name
Signal value
Effect
SIGHUP
1
Hangup
SIGINT
2
Interrupt from keyboard
SIGKILL
9
Kill signal
SIGTERM
15
Termination signal
SIGSTOP
17,19,23
Stop the process

Saturday, June 9, 2018

How do I login over ssh without using password less RSA / DSApublic keys?


Linux system Admins  normally login to the linux  servers either supplying a password,
or using keybased authentication. sshpass is a tool which allows us to automatically
supply password to the command prompt so that automated scripts can be run as desired
by users. sshpass supplies password to ssh prompt using dedicated tty , fooling ssh to
believe that a interactive user is supplying password.

Install sshpass under Debian / Ubuntu Linux

Type the following command:
$ sudo apt-get install sshpass

Install sshpass under RHEL/CentOS Linux

$ sudo yum install sshpass

If you are using Fedora Linux, type:
$ sudo dnf install sshpass

Install sshpass under Arch Linux

$ sudo pacman -S sshpass

Install sshpass under OpenSUSE Linux

$ sudo zypper install sshpass

Install sshpass under FreeBSD Unix

To install the port, enter:
# cd /usr/ports/security/sshpass/ && make install clean
To add the package, run:
# pkg install sshpass

Getting Help :
# sshpass -h
Usage: sshpass [-f|-d|-p|-e] [-hV] command parameters
  • -f filename   Take password to use from file
  • -d number Use number as file descriptor for getting password
  • -p password   Provide password as argument (security unwise)
  • -e         Password is passed as env-var "SSHPASS" With no parameters – password will be taken from stdin
  • -h         Show help (this screen)
  • -V         Print version information
At most one of -f, -d, -p or -e should be used


How do I use sshpass in Linux or Unix?

Login to ssh server called example.com with password called redhat@1234
$ sshpass -p 'redhat@1234' ssh username@example.com

For shell script you may need to disable host key checking:
$ sshpass -p 'redhat@1234' ssh -o StrictHostKeyChecking=no username@example.com

TO RUN SOME COMMAND ON THE REMOTE SERVER TO CHECKING UPTIME

$sshpass -p 'redhat@1234' ssh username@example.com  "uptime"

Sample output
01:04:35 up 126 days,  3:34, 2 users, load average: 0.50, 0.54, 0.55

Reading password from file

Another option is to read password from file using the -f option.
The syntax is:
sshpass -f fileNameHere ssh user@server