Skip to main content

traceroute

Traceroute:
It will show 30 hops route path from source to destination, so we easily identify which device packet is getting lost.

Traceroute command shows the path to your destination. packets send to will pass through the routers and you receive a response obeying the time to live (TTL) value for each packets. the * denotes a timeout as a response from the intermediate routers that says the packet has expired. This could be due to various reasons. Either the TTL value is not enough, or could be that a firewall or router is denying the trace packets.


How to use traceroute command in unix

how to determine if the server is slow or not with traceroute unix command . Here is the traceroute 

Out put of a host IP .

#traceroute 188.165.247.43
 
traceroute to 188.165.247.43 (188.165.247.43), 30 hops max, 60 byte packets
 1  iPhone.local (172.20.10.1)  1.493 ms  2.546 ms  3.287 ms
 2  * * *
 3  10.52.141.50 (10.52.141.50)  782.228 ms  784.069 ms  786.188 ms
 4  10.52.141.54 (10.52.141.54)  786.491 ms  786.510 ms  786.927 ms
 5  10.52.92.237 (10.52.92.237)  787.157 ms  788.059 ms  788.001 ms
 6  aircel-gprs-177.5.251.27.aircel.co.in (27.251.5.177)  787.140 ms  98.452 ms  100.978 ms
 7  114.79.219.41 (114.79.219.41)  158.391 ms  161.252 ms  161.610 ms
 8  abs-cn-61.194.148.202.aircel.co.in (202.148.194.61)  178.216 ms  175.575 ms  193.356 ms
 9  114.79.196.185 (114.79.196.185)  197.859 ms  218.156 ms  220.694 ms
10  abs-cn-129.198.148.202.aircel.co.in (202.148.198.129)  221.497 ms  238.732 ms  157.212 ms
11  * * *
12  * * *
13  125.17.180.149 (125.17.180.149)  137.955 ms  157.563 ms  139.677 ms
14  AES-Static-137.36.144.59.airtel.in (59.144.36.137)  289.250 ms  310.797 ms  290.745 ms
15  * * *
16  * * *
17  * * *
18  * * *
19  * * *
20  * * *
21  * * *
22  * * *
23  * * *
24  * * *
25  * * *
26  * * *
27  * * *
28  * * *
29  * * *
30  * * *


Comments

Popular posts from this blog

sed

Sed Command in Linux/Unix with examples SED command in UNIX is stands for stream editor and it can perform lot’s of function on file like, searching, find and replace, insertion or deletion. Though most common use of SED command in UNIX is for substitution or for find and replace. By using SED you can edit files even without opening it, which is much quicker way to find and replace something in file, than first opening that file in VI Editor and then changing it. o     SED is a powerful text stream editor. Can do insertion, deletion, search and replace(substitution). o     SED command in unix supports regular expression which allows it perform complex pattern matching. Syntax: sed OPTIONS... [SCRIPT] [INPUTFILE...] Example: Consider the below text file as an input. $cat > geekfile.txt unix is great os. unix is opensource. unix is free os. learn operating system. unixlinux which one you choose. unix is easy to learn.unix ...

initramfs" file is deleted or corrupted on your RHEL or CentOS 7

Initrd/Initramfs image provides the capability to load a RAM disk by the boot loader. This RAM disk can then be mounted as the root filesystem and programs can be run from it. Afterwards, a new root file system can be mounted from a different device. The previous root filesystem which was mounted from initrd/initramfs is then moved to a directory and can be subsequently unmounted. Their are chances that either you might have accidentally deleted "initramfs" file from the /boot partition or it is corrupted due to some reason.  Then boot process will get interrupted and you will see below error: error: file '/initramfs-3.10.0-957.el7.x86_64.img' not found. Good news is you can still recover this "initramfs" by following below steps: Step 1 :  Mount RHEL or CentOS 7 ISO image on your physical server and boot from it. In case you are using HPE Prolient server you can mount this ISO image on iLO, if this is virtual environment then mount it accordingly and reboot...

acls

Secure Files/Directories using ACLs (Access Control Lists) in Linux As a System Admin , our first priority will be to protect and secure data from unauthorized access. We all are aware of the permissions that we set using some helpful Linux commands like chmod , chown , chgrp … etc. However, these default permission sets have some limitation and sometimes may not work as per our needs. For example, we cannot set up different permission sets for different users on same directory or file. Thus, Access Control Lists ( ACLs ) were implemented. 1. Check Kernel for ACL Support Run the following command to check ACL Support for file system and POSIX_ACL=Y option (if there is N instead of Y , then it means Kernel doesn’t support ACL and need to be recompiled). [root@linux ~]# grep -i acl /boot/config* CONFIG_ EXT4_FS_POSIX_ACL=y CONFIG_ REISERFS_FS_POSIX_ACL=y CONFIG_JFS_POSIX_ACL=y CONFIG_XFS_POSIX_ACL=y CONFIG_BTRFS_FS_POSIX_ACL=y CONFIG...
# # #