this post was submitted on 03 Aug 2023
37 points (95.1% liked)

Linux

48074 readers
1007 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

Hello all, running Debian 12 right now and really liking this thing. I never ran straight Debian before, always mint or Ubuntu. But anyway....

I'm wondering if you guys could recommend some troubleshooting or scanning tools that help you find errors, misconfiguration, basically any thing that could be wrong with your system. I'd much prefer GUI tools as CLI tools can be a bit confusing.

So my only thoughts are auditing type apps. Don't those comb through your system for issues? I've tried Lynis and it seemed pretty cool, need to explore further. Of course you got your vulnerability scanners which I plan to use. You've got your rootkit scanners and clamv for malware. I just got netdata up and running last night. Now that is one confusing ass app lol so many options and i dont really kniw what im looking at lol. But I'm more interested in the system itself. I know I have some issues within my system. Htop only tells you so much and it never answers my problems when my computer random freezes or It starts overworking and heating, yet no high CPU or memory usage showing on htop.

I know I have networking issues with my VPN and DNS and other stuff. I just lack the knowledge to know where to look and what to fix, so trying to finder more user friendly, maybe more proactive tools I can use to help me discover things within the system that need attention. Overall I just want a healthy, dependable, safe, secure Linux system and I always endupFrankensteining my shit just trying different crap and everything eventually falls apart lol so help with some reomendations please, folks!

top 19 comments
sorted by: hot top controversial new old
[–] [email protected] 10 points 1 year ago (2 children)

Opensuse has GUI frontend that controls almost all the system settings called YaST, why dont you give it a try

[–] [email protected] 1 points 1 year ago

Do you mean give yast a try or OpenSUSE?

[–] [email protected] 1 points 1 year ago (1 children)

Yes! I tried tumbleweed before but it seemed quite fragile or maybe over secure? Idk if I'm explaining it correctly, but it seemed like everything I tried to do on the OS ended up breaking the system so I has to keep starting over and try reconfiguring things. Probably just learning curve issues

[–] [email protected] 2 points 1 year ago (1 children)

Yep, too overly specific or weird on some stuff, like for example on installing packages via terminal, I just went with suggesting it because I haven't fully red and understood your query, my bad :)

As for auditing tools, I can't think of any because there is a lot of ways how to check logs and it is messy ngl. If I'll be honest with you how I kinda survived linux is by automating backup of important files through nas and if I f*cked up my system, instead of fiddling the logs to find what went wrong, I'll just nuke it.

[–] [email protected] 2 points 1 year ago

Not a bad approach actually lol. I've pretty much done the same with virtually no backup. I never have much to save on my computers.

[–] [email protected] 5 points 1 year ago (1 children)

You can use inspec to apply declarative rules against your machine and look for deviations (but I don't think you want to be writing rules to check for system sanity). I'd say go even crazier, run Qubes, then run VMs of many different linuxs, and you can break them at will, resurrect them, etc.

https://github.com/inspec/inspec

[–] [email protected] 5 points 1 year ago (1 children)

Oh lord that is over my head. I tried messing around with that more advanced stuff but just got lost

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago) (2 children)

You might want to start with something very friendly like checkmk, I'm sure there is a open source alternative to it, but I don't know it off the top of my head.

https://checkmk.com/ https://github.com/Checkmk/checkmk

Full Disclosure, I've never used this, but it seems friendly enough

[–] [email protected] 1 points 1 year ago

Sweet, thanks. Gonna take a look

[–] [email protected] 1 points 1 year ago

Sorta looks similar to netdata which I recently setup and holy crap is it confusing. I have no idea what to look at and what to do. Didn't realize its that tricky for a newb.

[–] [email protected] 4 points 1 year ago (1 children)

Hrm, I've been using Linux as my dayjob server os of choice for about 15 years, and for my personal computer for the past 10 - and I haven't found something like what you described. Something I would recommend is looking at a configuration management tool (Ansible is a really solid choice).

Stability issues often come from misconfiguration or just flat out configuration drift (changes over time) - something like Ansible or Chef would help with that.

Other things that touch on some of your concerns may be SELinux (https://wiki.debian.org/SELinux). It's a bit of a pain to get set up, but once you do your system is much more secure. It effectively functions under the principal of least access to lock down your Debian OS, rendering the need for AV/Malware scanning somewhat moot.

I've done a cursory glance or two at Checkmk for monitoring, but it sounds a bit overkill for a single Debian workstation.

I mostly troubleshoot things like VPN instability or crashes by diving into /var/log or journalctl -ex to see if any googleable errors are visible.

Maybe someone else on here has more help to give?

[–] [email protected] 1 points 1 year ago (1 children)

Great advice. Its just that I'm sorta a eager learner when it comes to tech, especially the privacy and security side and I honestly don't always know what I'm doing or I'll read the wrong guide to set things up and I end up getting lost or confused or things just straight up don't work. So I for sure have some wires crossed somewhere and some roadblocks causing issues here and there. I have recently learned more about ansible and chef and I indeed need to research. Those tools seem quite complex but hey, I'll try anyway. And as far as selinux goes, I just thought that was one of those thins that automatically comes installed and configured on every OS? Also there's app armor.... Is that in this realm of things too? Is it deemed "good" or necessary to use? Thanks

[–] [email protected] 2 points 1 year ago (1 children)

Personally, I find Ansible to be much more intuitive than other products in the configuration management space. Start small, think about what you want your system to look like.

Do you want Firefox installed? Use ansible.builtin.package to install it!

Do you want to have ssh server configured to disallow password authentication (and only allow ssh keys)? Use ansible.builtin.blockinfile on your sshd.config file!

Regarding SELinux vs apparmor, they both are designed to lock down a system, but they have different philosophies about how to approach the problem.

SELinux says block all by default and only if it's configured to allow it will it be allowed to happen.

Apparmor on the other hand is permissive by default, and it will only restrict if it is configured to do so.

By the way, both can be managed by Ansible, and SELinux even has a module to do so: https://docs.ansible.com/ansible/latest/collections/ansible/posix/selinux_module.html.

[–] [email protected] 1 points 1 year ago (1 children)

Fascinating stuff! A tad confusing lol but definitely learnable. So to me, selinux and app armor sound similar to firewalls... On the surface at least

[–] [email protected] 2 points 1 year ago (1 children)

I suppose you could say it's similar in that there are allow-lists and deny-lists that permit or restrict actions, but the key difference is Apparmor/SELinux are in the OS space - they can permit/restrict the ability to restart services, or prevent sudo from being used in certain ways.

Firewalls are predominantly used to permit/restrict network connectivity either ingress (e.g. traffic from outside the system coming into it) or egress (e.g. traffic that is leaving the system). A good example would be using a firewall to restrict ingress traffic to port 22 - allowing remote management of a system over SSH.

I hope this is helpful!

[–] [email protected] 1 points 1 year ago
[–] [email protected] 2 points 1 year ago
[–] [email protected] 2 points 1 year ago (1 children)

Perhaps webmin could be what you're looking for. I haven't used it in 10 years though.

[–] [email protected] 1 points 1 year ago

Never even heard of it, gonna do some research. Thank you