L11 - Troubleshooting

18 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$69.99
List Price:  $99.99
You save:  $30
€65.24
List Price:  €93.20
You save:  €27.96
£55.93
List Price:  £79.91
You save:  £23.97
CA$95.58
List Price:  CA$136.56
You save:  CA$40.97
A$107.13
List Price:  A$153.05
You save:  A$45.92
S$95.25
List Price:  S$136.08
You save:  S$40.82
HK$547.90
List Price:  HK$782.75
You save:  HK$234.85
CHF 63.85
List Price:  CHF 91.21
You save:  CHF 27.36
NOK kr770.13
List Price:  NOK kr1,100.23
You save:  NOK kr330.10
DKK kr486.51
List Price:  DKK kr695.05
You save:  DKK kr208.53
NZ$117.65
List Price:  NZ$168.07
You save:  NZ$50.42
د.إ257.06
List Price:  د.إ367.25
You save:  د.إ110.18
৳7,679.19
List Price:  ৳10,970.75
You save:  ৳3,291.55
₹5,834.32
List Price:  ₹8,335.10
You save:  ₹2,500.78
RM333.81
List Price:  RM476.90
You save:  RM143.08
₦91,422.33
List Price:  ₦130,608.93
You save:  ₦39,186.60
₨19,487.31
List Price:  ₨27,840.21
You save:  ₨8,352.89
฿2,585.90
List Price:  ฿3,694.31
You save:  ฿1,108.40
₺2,277.50
List Price:  ₺3,253.72
You save:  ₺976.21
B$361.10
List Price:  B$515.88
You save:  B$154.78
R1,320.17
List Price:  R1,886.05
You save:  R565.87
Лв127.48
List Price:  Лв182.13
You save:  Лв54.64
₩96,293.43
List Price:  ₩137,567.94
You save:  ₩41,274.51
₪266.53
List Price:  ₪380.78
You save:  ₪114.24
₱4,038.21
List Price:  ₱5,769.12
You save:  ₱1,730.90
¥10,975.59
List Price:  ¥15,680.08
You save:  ¥4,704.49
MX$1,206.90
List Price:  MX$1,724.22
You save:  MX$517.31
QR255.26
List Price:  QR364.68
You save:  QR109.41
P965.80
List Price:  P1,379.77
You save:  P413.97
KSh9,448.65
List Price:  KSh13,498.65
You save:  KSh4,050
E£3,352.63
List Price:  E£4,789.68
You save:  E£1,437.04
ብር3,985.10
List Price:  ብር5,693.24
You save:  ብር1,708.14
Kz58,489.70
List Price:  Kz83,560.30
You save:  Kz25,070.60
CLP$66,385.51
List Price:  CLP$94,840.51
You save:  CLP$28,455
CN¥507.19
List Price:  CN¥724.59
You save:  CN¥217.40
RD$4,111.01
List Price:  RD$5,873.12
You save:  RD$1,762.11
DA9,398.61
List Price:  DA13,427.17
You save:  DA4,028.55
FJ$158.17
List Price:  FJ$225.97
You save:  FJ$67.79
Q544.39
List Price:  Q777.73
You save:  Q233.34
GY$14,639.41
List Price:  GY$20,914.34
You save:  GY$6,274.92
ISK kr9,791.60
List Price:  ISK kr13,988.60
You save:  ISK kr4,197
DH708.11
List Price:  DH1,011.63
You save:  DH303.52
L1,243.72
List Price:  L1,776.81
You save:  L533.09
ден4,016.98
List Price:  ден5,738.79
You save:  ден1,721.81
MOP$563.94
List Price:  MOP$805.67
You save:  MOP$241.72
N$1,340.22
List Price:  N$1,914.68
You save:  N$574.46
C$2,575.16
List Price:  C$3,678.96
You save:  C$1,103.79
रु9,316.74
List Price:  रु13,310.19
You save:  रु3,993.45
S/261.07
List Price:  S/372.97
You save:  S/111.90
K269.52
List Price:  K385.04
You save:  K115.52
SAR262.50
List Price:  SAR375.02
You save:  SAR112.51
ZK1,842.03
List Price:  ZK2,631.59
You save:  ZK789.55
L324.63
List Price:  L463.78
You save:  L139.14
Kč1,640.70
List Price:  Kč2,343.96
You save:  Kč703.26
Ft25,605.88
List Price:  Ft36,581.40
You save:  Ft10,975.51
SEK kr762.91
List Price:  SEK kr1,089.92
You save:  SEK kr327.01
ARS$61,153.48
List Price:  ARS$87,365.86
You save:  ARS$26,212.38
Bs484.56
List Price:  Bs692.26
You save:  Bs207.70
COP$275,828.59
List Price:  COP$394,057.74
You save:  COP$118,229.14
₡35,172.98
List Price:  ₡50,249.28
You save:  ₡15,076.29
L1,727.65
List Price:  L2,468.18
You save:  L740.53
₲519,796.34
List Price:  ₲742,598.03
You save:  ₲222,801.68
$U2,684.12
List Price:  $U3,834.62
You save:  $U1,150.50
zł281.95
List Price:  zł402.81
You save:  zł120.85
Already have an account? Log In

Transcript

Welcome back friends. Throughout the course we have learned about installation, users of file system, permissions installation our various utilities, in the network clients and everything as the virtualization and avoidance of things. When you are done with our installation and you are a proper user of our system, there are certain scenarios where a system may crash down or do not perform exactly as you're planning to. We're expecting it to perform then there comes a need to troubleshoot, what are the problems, you should test it you should be aware of what is going on and you should be able to fix it. You should not call a maintenance guy or every time if you have a problem that keeps the cost very high. It is not secured enough.

The option is not secured and you should be aware of various Take the precautions what you could take for running off here the proper ending of your system. So, friends, we are going to learn all these things here in this lecture that is troubleshooting. We will learn how to develop a strategy for troubleshooting, how to fix problems in different areas of the Linux environment, both the system into various run levels the wrong levels, we have learned to use the rescue environment as well. In case we have left with a troublesome scenario. The first method is to do a fault analysis. We have to first analyze what the problem has occurred before going further in fixing it.

If we don't know let us take a simple case. If a doctor does not know what the problem is, suppose you have a fever, and you have asked Dr. Data, I have been in my head had it you Another medic medicine However, he should be treating you differently before knowing the cause, you could not kill the symptoms, you should not fix the problems, the fault analysis is dealing with these things it has to characterize the problem, we have to characterize problems into different categories and try to reproduce the problem for learning what it may could do or to find further information about what are the problems, the possible reasons and fixation methods, we have to eliminate the possible causes. Try the easy thing first, you have to backup configuration files before changing. We have to characterize we have to reproduce we have to eliminate possible causes, and we have to back up the old problems.

Falling away leases there is a gathering of data. We have to gather all Data first. So for gathering of the data, there are few very important or useful commands that will help you gather different data. Suppose the problem could be initialized due to running of a malicious or not malicious or problematic or nuisance commands that are there. If you have mistakenly executed those commands, or maybe some other users have done that remotely or some kind of hacking, or simply a mistake, you may kill a process without knowing the process is very vital to a system. image upload, upload the car now, update the kernel in a upgrade or pass encode.

The useful commands could be history, history will show you last thousand commands that a user have edited cuted that is not dependent on a particular session. Even in the previous or more than previous sessions, you could see the command list. Then there is a useful command for grep which is used vitally, then there is a command called difference which could differentiate between the content of different files. You could use the find same in the one that could be allow you that will allow you to list all the files that have been modified within a particular range of time say 60 minutes, or 60. You have to use the asterisk command for tracing a file or data from the application. It could be used with a PhD and the process ID of the running process.

Then you have a tail command in the log file entry to show some last records from the bottom recent records log entry The user enter details, then there are generate, you can generate additional information by running the debug ins, system log and the debug option in application. Then there are things to check that may cause error sometimes, x window or X can sometimes be problematic. The first thing to try is when confronting x problems, you can go with our system config display, which is a GI option, where you can check x configuration, you should the problem could be occurring in run level five generally, it could make logging in impossible in Acts or inversion of control. They should reboot a system in run level three. Sometimes, viewing the output of x command itself is revealing. It will show you what the errors are the pro volleys will perform all the tasks necessary to install X Server without actually starting it.

Under startup my sights are displayed. If the text is cross of the screen the material of in screen can be viewed by holding the Shift key. You could learn with these things. Try system configuration first the exploit could be used. If a home or temp order temporary file is full, or has the user reached a hard quota, you should be considering to delete the temporary files or recheck the home directory you should move chain or you should move some important files from the home directory to other directories or you should check x Fs either it is running or not. The Xs x Fs fund server is the only foreign Park entry in the XR configuration that is a delay With x one one which is located in the ATC directory, if it is not running x will run make sure that x Fs is configured to run in the appropriate trim levels occasionally it may be necessary to delete his tail lock A p ID process ID or socket files you should be dealing with extra no and properly check whether it is running for debugging you should not be running x in row level five you should be running in level three.

Then there comes are things to check that is networking. You should be checking metrics there could be a problem regarding network for network configurations, the hostname resolution problems, which can create problem for clients and server. Similarly, beside from requiring successful forward lookups reverse lookups are essential for many toothpastes. security mechanisms to slack host and they are invaluable for determining whether hostname resolution problem exists or not. If configuration maybe IP configuration maybe check using the if config command, you can use the if config. For checking the IP address and other details it shows a IP version four and IP version six details which one is configured, you can resolve the hostname with writing ridic command DHCP provide a URL name next to it followed by a space where the default gateway could we check with our own command it could route it to the all the paths and the gateway and other details.

The network start our netstat rm command will show in the system routing table is correct or not. For the data packets, you can check the module specifications and device activation as well. Then you should be checking the order of boot process suppose your system is not starting properly. By default you have an operating system or a cheer installed on your hardest internal hard disk of your PC and some for some reason it is not starting it is showing a boot error when you are trying to restart it will prompt you with a boot menu. So, what is the reason how the system has been crashed down. There might be a scenario where the boot process or boot order could be changed for various reasons.

The default boot order is with the preference to hardest internal hardest. Next is a USB or external hard disk or CD ROM. For some reasons, mistakenly, the pendrive or a CD ROM could be preferred more than your hardest or somewhere may have be done. And the pendrive is constantly running inserted on your system and it has a crashed or improper image installed on it and you are not able to insert one, you can change the boot order and make the hardest to move first, if you're required hardest otherwise other tools in order to troubleshoot boot time process, you must understand the boot process itself. The issue the cause and various things, the BIOS settings the possible process the group could be misconfigured the boot sector is corrupt the BIOS settings such as this addressing scheme that could be modified since the last boot sector was retained.

The kernel does not load at all or load partially before a panic occurs. And the possible process could be corrupted kernel images, incorrect parameters passed to the kernel by the bootloader. Then there could be issues like kind of load completely but by Cause fails when it tries to mount a root filesystem in the unit directory, the possible cause for the bootloader is misconfigured in it the SPN unit or which is can corrupted in establish misconfigured or root file system is damaged or unmounted. It could be dealing with raid or other things, it should start in it with et CIE directory go into the C et CIE directory the RC dot daemon or RC dot system system in it. You can enter run level x using RC dot local the ex and other configurations. The file system corruption which is common after the crash or improper shut down, sometimes a system may be may have improperly shut down.

So it due to crash or software crash or other driver crash. Then the problem could exist the ESD to mounted for writing marked as dirty, if not mounted or mounted in read only, it should be clean. If not mounted as dirty maybe corrupt, repair required exhausted check. The STP file system usually marked as clean the journal indicates if a recovery is needed. All edited check files recorded in journal the file system recovery could be done when a if route has a journal Colonel examines if it has a boot the file system recovery could be done in the rescue mode. They etc The system config phase the file systems model in Fs tab, def Fs tak is a front end for the programs or field as f check must be run manually.

It will configure the recovery run levels and to pass around levels to emit on Good from grab a splash screen from shell from using it or telling it could be used in run level one the process of RC dot says in an RC one dot d d manuscript could be used. In a level as our single the process only RC says in is running in emergency only su login works. So, you can go with as you log in the booting in level one will cause a system to process the system when it escaped followed by each of the init script will be executed in a safe more of our single mode. Run level as the system cause will start acid estimate without doing it. Then it could be used you can still go down to single mode. It is given that you are given the root shell with no escape process and emergency mode.

While technically not in a realm level, emergency mode shares many characteristics of the other levels, but you can only access emergency mode during boot by wising emergency as a parameter from the group from you can go directly with the emergency mode after I grew up the screen shows up, more skillfully processed and you are given a root shell without processing that unit or other scripts. The rescue or environment of is required when a root file system is unavailable. A non system specifying boot even boot from CD ROM boot from disk boot dot image on USB key ms comida. The rescue environment exists within a ram disk image. Because of the limitations on size of the number of I nodes, the table for directories, multi family and utilities and device nodes are not available. However tools really At today's command DNS and Network Connectivity are provided you can go with the rescue mode if nothing works out the rescue environment utilities uses disk maintaining utilities the networking utilities, miscellaneous utilities, the logging with Anaconda and Syslog.

The rescue environment details could be configured with file system reconstruction, you could enter conda will ask if file system should be mounted. You have to provide a PATH variable for that thing. The file system nodes could be used. The rescue warrant will attempt to rescue reconstruct harness file system under the mount points. The cc image system image sensor rescue environment is often used on the system with damaged or misconfigured file system. The operation might or maybe not working.

You can pray With an F disk available and on F two option you should have the command prompt a terminal you should carefully inspect the output of the mount command that should determine the state of the reconstructed file system. The file system that we configured here as an MK command is useful here and you can go with a GI utility data system a specific device files and so on. So, this was a few techniques of what is the role of troubleshooting how you can construct a problem reconstruct a fix and work in a rescue mode or other safe nodes in different levels and other things in case a trouble may occur. You should be planning, troubleshooting since you have installed your device OS troubleshooting is not very hard often But sometimes it could be complicated as well. If you have not prepared and do not know much about it a problem is not a problem at all, when a problem occurs, it is an opportunity for those who may learn from those problems by fixing by trying various things.

And in the next time if the problem occurred, they could be able to fix that thing. So, problem is not a problem at all You should be able to troubleshoot prior fixing these things or be familiar with our shell commands and other things. Let me see the way very useful thing you shouldn't be using it and the power of Archer is very quick. Consider it very carefully and keep learning and keep practicing various commands or utilities. Go with configuration files. We will be learning node Later, you should be practicing vinyasa exercises and arches yours.

Now you can be in your own server environment or your own desktop utilities. Start working on a ritual or ritual is a good solution. So keep learning and keep moving ahead

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.