Skip to content

Latest commit

 

History

History
213 lines (205 loc) · 8 KB

linux.org

File metadata and controls

213 lines (205 loc) · 8 KB

Various Linux things

related

docker

[2018-06-15] docker system prune to cleanup

[2021-01-12] figuring out what takes disk space docker images | awk '{print $3}' | xargs docker inspect | less

If you want to bind to the redis port from your nodejs container you will have to expose that port in the redis container:

version: '2'
services:
  nodejs:
    build:
      context: .
      dockerfile: DockerFile
    ports:
      - "4000:4000"
    links:
      - redis
  redis:
    build:
      context: .
      dockerfile: Dockerfile-redis
    expose:
      - "6379"
The expose tag will let you expose ports without publishing them to the host machine, but they will be exposed to the containers networks.
ok, so for debian/ubuntu images don’t really need autoclean – it’s already run automatically
In general, to detach from a Docker container and leave it running, we can use the CTRL-p CTRL-q key sequence.
https://github.com/bcicen/ctop

systemd

debugging: systemctl --failed, journalctl

logs – for individual jobs you can see them via status (or sdj) presistent is not showing anythin by default?

profiling: systemd-analyze blame

use asserts in unit definitions

  • AssertPathExists fails if the pass is missing or symlink is broken

networking

who uses local port

sudo ss -tulpn | grep 5060
sudo ss -anpt  | grep 8640

testing if port is open

netcat -l 5559

one the other machine

echo "TEST" | netcat host 5559
Nice and verbose! From the man pages.
Single port:
nc -zv 127.0.0.1 80

testing if port is open

apt

install build dependencies: sudo apt-get build-dep package

cron

[2018-02-26] if cron fails to start a job, it will send the output to local mail

grep cron /var/log/syslog
tail -f /var/log/syslog | grep cron

[2018-05-10] mail subject – use bash comment operator

 *:* TestJob; cron command

mind the space after colon!

sandboxing

docker is excellent for quick sandboxes (just use ubuntu:latest image or something)

firejail for network sandbox

  • doesn’t require root!
  • firejail --noprofile --net=none

udev

udevadm info /dev/sdc2

[2019-03-07] when you update rules file sudo udevadm control --reload-rules

[2019-03-07] to trigger the target script sudo udevadm trigger

[#C] [2017-05-08] Gateway 0.0.0.0 means that the subnet is link-local i.e. there is no gateway involved, the packets are delivered directly to the target

-----------------------------------------

* [#C] [2018-06-08] Linux ignores the setuid bit on all interpreted executables (i.e. executables starting with a #! line).ok apparently setuid shell scripts are quite risky… press > and select RES
Note that using the standard logging mechanism like this will not create persistent logs by default. To do that, you'll need to create /var/log/journal, and then run sudo systemctl restart systemd-journald

[#C] [2020-01-29] How to read memory usage in htop? - Server Fault

https://serverfault.com/questions/517483/how-to-read-memory-usage-in-htop
Hide user threads (shift + H) and close the process tree view (F5), t
If a process demands a lot of memory, the system moves all other process to the swap file. Including it seems, necessary processes like the X11 server or the terminal.

[#D] [2018-04-27] guide to XKB

-------------------------------------------

* TODO [#C] whereis command :habit:
sudo netstat -plnt