<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Muralidhar M Pala</title>
    <description>The latest articles on DEV Community by Muralidhar M Pala (@muralipala).</description>
    <link>https://dev.to/muralipala</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3235198%2F367b7748-67aa-4bc4-bd24-97b593ba4ae4.jpg</url>
      <title>DEV Community: Muralidhar M Pala</title>
      <link>https://dev.to/muralipala</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/muralipala"/>
    <language>en</language>
    <item>
      <title>Linux Mastery in a Line: Advanced One-Liners for Busy Sysadmins</title>
      <dc:creator>Muralidhar M Pala</dc:creator>
      <pubDate>Sun, 06 Jul 2025 07:41:57 +0000</pubDate>
      <link>https://dev.to/muralipala/linux-mastery-in-a-line-advanced-one-liners-for-busy-sysadmins-2omb</link>
      <guid>https://dev.to/muralipala/linux-mastery-in-a-line-advanced-one-liners-for-busy-sysadmins-2omb</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;Tired of the usual df -h and uname -a? Here are 10 advanced one-liners that help real sysadmins diagnose, audit, and monitor faster.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;1️⃣ Find files modified in the last 7 days, larger than 100MB:&lt;/p&gt;

&lt;pre&gt; find / -type f -mtime -7 -size +100M 2&amp;gt;/dev/null &lt;/pre&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjlvunobmiex5ufzgatip.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjlvunobmiex5ufzgatip.png" alt="Image description" width="800" height="128"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2️⃣ Check top 10 memory-consuming processes with live updates:&lt;/p&gt;

&lt;pre&gt; watch -n 1 "ps aux --sort=-%mem | head" &lt;/pre&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fswd5e0yhaouwf581oqie.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fswd5e0yhaouwf581oqie.png" alt="Image description" width="800" height="220"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;3️⃣ List all listening ports with associated processes:&lt;/p&gt;

&lt;pre&gt; lsof -i -P -n | grep LISTEN &lt;/pre&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7lx0haawknixp609ctc7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7lx0haawknixp609ctc7.png" alt="Image description" width="800" height="105"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;4️⃣ Get your server’s public IP without third-party scripts:&lt;/p&gt;

&lt;pre&gt; dig +short myip.opendns.com @resolver1.opendns.com &lt;/pre&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fis1hki90ts66qlbpnull.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fis1hki90ts66qlbpnull.png" alt="Image description" width="800" height="90"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;5️⃣ Check inode usage across filesystems (useful for mail servers):&lt;/p&gt;

&lt;pre&gt; df -i &lt;/pre&gt;

&lt;p&gt;6️⃣ Find zombie processes:&lt;/p&gt;

&lt;pre&gt; ps -eo pid,ppid,state,cmd | awk '$3=="Z"'&lt;/pre&gt;

&lt;p&gt;7️⃣ Quickly check CPU usage per core:&lt;/p&gt;

&lt;pre&gt; mpstat -P ALL 1 3 &lt;/pre&gt;

&lt;p&gt;8️⃣ Check which processes are using swap:&lt;/p&gt;

&lt;pre&gt; for pid in $(ls /proc | grep -E '^[0-9]+$'); do awk '/VmSwap/{print $2 " kB\tPID=" '"$pid"'}' /proc/$pid/status 2&amp;gt;/dev/null; done | sort -n &lt;/pre&gt;

&lt;p&gt;9️⃣ Find largest directories in /var (top 5):&lt;/p&gt;

&lt;pre&gt; du -Sh /var | sort -rh | head -n 5 &lt;/pre&gt;

&lt;p&gt;10️⃣ Live bandwidth usage per interface:&lt;/p&gt;

&lt;pre&gt; ifstat -t &lt;/pre&gt;

&lt;p&gt;Which of these do you use, or do you have your own hidden gems? Drop one below to share with fellow admins.&lt;br&gt;
Stay tuned for next week’s Sysadmin Sunday tip to keep sharpening your command-line edge&lt;/p&gt;

</description>
    </item>
    <item>
      <title>ShellGPT for Sysadmins: Master These Lesser-Known CLI Tricks</title>
      <dc:creator>Muralidhar M Pala</dc:creator>
      <pubDate>Mon, 30 Jun 2025 10:24:51 +0000</pubDate>
      <link>https://dev.to/muralipala/shellgpt-for-sysadmins-master-these-lesser-known-cli-tricks-2dk9</link>
      <guid>https://dev.to/muralipala/shellgpt-for-sysadmins-master-these-lesser-known-cli-tricks-2dk9</guid>
      <description>&lt;p&gt;&lt;strong&gt;Save time and mental strain by letting ShellGPT generate clean one-liners for advanced system checks.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Being a Linux sysadmin often means juggling memory usage checks, digging through logs, finding who’s hogging ports, or debugging network issues—all while managing daily operational pressure.&lt;br&gt;
Many of these CLI tasks are powerful but get avoided or deferred because remembering exact flags feels like mental tax.&lt;/p&gt;

&lt;p&gt;Enter ShellGPT.&lt;/p&gt;

&lt;p&gt;It generates clean, ready-to-run one-liners for advanced system checks, helping you troubleshoot and learn simultaneously.&lt;/p&gt;

&lt;p&gt;Here’s how I use ShellGPT in my RHEL 9.6 VM lab for real-world sysadmin workflows:  &lt;/p&gt;

&lt;p&gt;1️⃣ Filter System Logs with journalctl&lt;br&gt;
🔹 Prompt:&lt;/p&gt;

&lt;pre&gt;  sgpt "Write a one-liner to filter system logs for sshd failures in the last 24 hours"  &lt;/pre&gt;

&lt;p&gt;Why: Saves you from recalling time flags and filtering syntax during SSH troubleshooting.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frw9b9uug6vouo5odkf5p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frw9b9uug6vouo5odkf5p.png" alt="Image description" width="800" height="207"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2️⃣ Find Who’s Using a Port with lsof&lt;br&gt;
🔹 Prompt:&lt;/p&gt;

&lt;pre&gt;  sgpt "Generate a command to find which process is using port 443" &lt;/pre&gt;

&lt;p&gt;Why: Useful when services clash on critical ports.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fraqp43greaeuf1nio6xo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fraqp43greaeuf1nio6xo.png" alt="Image description" width="800" height="209"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;3️⃣ Advanced Network Checks&lt;br&gt;
🔹 Prompt:&lt;/p&gt;

&lt;pre&gt; sgpt "How to check all active TCP connections with remote IPs and their states" &lt;/pre&gt;

&lt;p&gt;Why: Useful during connection debugging or tracing suspicious IPs.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fytmw83k47kma9mh9havo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fytmw83k47kma9mh9havo.png" alt="Image description" width="800" height="434"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;4️⃣ Monitor Memory Usage Over Time&lt;br&gt;
🔹 Prompt:&lt;/p&gt;

&lt;pre&gt; sgpt "Create a one-liner to monitor free memory every 10 seconds with timestamp" &lt;/pre&gt;

&lt;p&gt;Why: Helps during incident analysis or load testing.&lt;/p&gt;

&lt;p&gt;5️⃣ Disk Space Alerts&lt;br&gt;
🔹 Prompt:&lt;/p&gt;

&lt;pre&gt; sgpt "Write a bash script to alert if disk usage crosses 85%" &lt;/pre&gt;

&lt;p&gt;Why: Proactive monitoring to prevent downtime from full disks.&lt;/p&gt;

&lt;p&gt;Why This Matters&lt;/p&gt;

&lt;p&gt;✅ Frees your mental bandwidth to focus on architecture and higher-level tasks.&lt;br&gt;
✅ Reduces repetitive Google searches for syntax.&lt;br&gt;
✅ Becomes your practical LLM co-pilot for real workflows, not just theoretical exploration.&lt;/p&gt;

&lt;p&gt;Try It Yourself&lt;/p&gt;

&lt;p&gt;Copy-paste these prompts in your ShellGPT setup and let it simplify your sysadmin workflows.&lt;/p&gt;

&lt;p&gt;If you find this helpful:&lt;br&gt;
✅ Follow for more ShellGPT + Linux productivity workflows.&lt;br&gt;
✅ Share with fellow sysadmins to save their time.&lt;br&gt;
✅ Comment below on how you use ShellGPT in your lab.&lt;/p&gt;

&lt;p&gt;✍️ Murali Pala&lt;br&gt;&lt;br&gt;
📍 Ajman, UAE | Ex-IAF | Linux &amp;amp; AI Infra | Writer&lt;br&gt;&lt;br&gt;
🛠️ Building AI-powered sysadmin workflows, one prompt at a time.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.linkedin.com/in/muralipala" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt; | &lt;a href="https://medium.com/@muralipala15" rel="noopener noreferrer"&gt;Medium&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;📢 Follow for more ShellGPT and Linux productivity workflows.&lt;/p&gt;

</description>
      <category>linux</category>
      <category>shellgpt</category>
      <category>sysadmin</category>
      <category>opensource</category>
    </item>
    <item>
      <title>ShellGPT in Cybersecurity: Your Terminal’s Silent Sentinel</title>
      <dc:creator>Muralidhar M Pala</dc:creator>
      <pubDate>Mon, 23 Jun 2025 02:05:41 +0000</pubDate>
      <link>https://dev.to/muralipala/shellgpt-in-cybersecurity-your-terminals-silent-sentinel-32c5</link>
      <guid>https://dev.to/muralipala/shellgpt-in-cybersecurity-your-terminals-silent-sentinel-32c5</guid>
      <description>&lt;p&gt;“As a Linux sysadmin and DevOps engineer, I juggle vulnerability scans, config hardening, and alerts—while always fighting with browser tabs.”&lt;/p&gt;

&lt;p&gt;Cybersecurity is no longer just for pen testers or red teams. Today’s sysadmins, DevOps engineers, and solo IT warriors need to stay ahead of threats while keeping systems clean, lean, and secure. ShellGPT, a terminal‑based AI assistant, is quietly becoming a powerful ally in that mission.&lt;/p&gt;

&lt;p&gt;In this episode, let’s explore how ShellGPT fits right into your daily security routine — helping you harden systems, audit configs, and spot trouble before it bites.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Vulnerability Scanning: nmap ...&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;SGPT assisting with Prompts ShellGPT can help you:&lt;/p&gt;

&lt;p&gt;Generate custom nmap commands for quick and deep scans&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sgpt &lt;span class="s2"&gt;" Create an nmap command to scan all TCP ports with service detection and save it to a file "&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu0spyut9c1cxunnvootp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu0spyut9c1cxunnvootp.png" alt="Image description" width="800" height="98"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Password Policy Checks: lock it down&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Weak Links Exposed&lt;/p&gt;

&lt;p&gt;Tighten your local user security by prompting ShellGPT to:&lt;/p&gt;

&lt;p&gt;Suggest strong password policies for /etc/login.defs and pam.d configs&lt;/p&gt;

&lt;p&gt;Auto-create a script that flags weak passwords using cracklib-check&lt;/p&gt;

&lt;p&gt;List audit steps for shadow file integrity&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sgpt &lt;span class="s2"&gt;"Suggest a script using cracklib-check to audit /etc/shadow for weak user passwords and log usernames"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp3le1dq3mjd26qie66rq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp3le1dq3mjd26qie66rq.png" alt="Image description" width="800" height="328"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Firewall &amp;amp; Port Rules: Build with Confidence&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;From iptables to ufw and firewalld, you can:&lt;/p&gt;

&lt;p&gt;Ask ShellGPT to draft precise rules (e.g., allow 443/tcp only from a subnet)&lt;/p&gt;

&lt;p&gt;Translate abstract policy logic into shell syntax&lt;/p&gt;

&lt;p&gt;Check for common mistakes like conflicting ACCEPT/DROP orders&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sgpt  &lt;span class="s2"&gt;"Generate a john the ripper command to audit /etc/shadow-combined file using wordlist mode with rules"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5afs0ri162s9a1bwq96a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5afs0ri162s9a1bwq96a.png" alt="Image description" width="800" height="102"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;SSH &amp;amp; Remote Access: Gatekeeping the Gatekeeper&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;One of the biggest attack vectors is open SSH. ShellGPT can:&lt;/p&gt;

&lt;p&gt;Review your sshd_config and suggest key-based auth, limited users, port changes&lt;/p&gt;

&lt;p&gt;Script a checker that looks for brute-force attempts in /var/log/secure&lt;/p&gt;

&lt;p&gt;Offer fail2ban regex filters tailored to your distro&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sgpt  &lt;span class="s2"&gt;"Give me a grep command to find recent failed SSH login attempts in /var/log/auth.log"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv48b6ifypyiuhsiwxo57.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv48b6ifypyiuhsiwxo57.png" alt="Image description" width="800" height="87"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Log Analysis &amp;amp; Alerting: Parsing with Precision&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Need to trace suspicious activity?&lt;/p&gt;

&lt;p&gt;Ask ShellGPT to write grep, awk, or sed pipelines for /var/log/auth.log, /var/log/audit/audit.log, etc.&lt;/p&gt;

&lt;p&gt;Create a script to send real-time alerts on unusual login times or IPs&lt;/p&gt;

&lt;p&gt;Use it to build test filters for journalctl -xe&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sgpt  &lt;span class="s2"&gt;"Suggest an awk one-liner to detect 'Failed password' patterns in /var/log/secure, outputting timestamp and IP"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0mpcxyorasee6zgeuhim.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0mpcxyorasee6zgeuhim.png" alt="Image description" width="800" height="101"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wrapping Up&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ShellGPT isn’t just a shortcut — it’s a smart assistant that helps enforce good habits, spot holes, and write clear, accurate commands. Used in a controlled, ethical way, it can elevate your Linux security game without turning you into a hacker.&lt;/p&gt;

&lt;p&gt;In our next article, we’ll take ShellGPT deeper into the world of ethical pentesting — the red team side. For now, stay safe, stay sudo.&lt;/p&gt;

&lt;p&gt;Tell me how you're using ShellGPT—security flows, automation, or anything else you’ve built&lt;/p&gt;

&lt;p&gt;Follow for more ShellGPT tricks and real-world command line wizardry.&lt;/p&gt;

</description>
      <category>shellgpt</category>
      <category>cybersecurity</category>
      <category>linux</category>
      <category>aitools</category>
    </item>
    <item>
      <title>10 Real-World ShellGPT Prompts Every Linux Admin Should Know</title>
      <dc:creator>Muralidhar M Pala</dc:creator>
      <pubDate>Sun, 15 Jun 2025 07:41:47 +0000</pubDate>
      <link>https://dev.to/muralipala/10-real-world-shellgpt-prompts-every-linux-admin-should-know-41hc</link>
      <guid>https://dev.to/muralipala/10-real-world-shellgpt-prompts-every-linux-admin-should-know-41hc</guid>
      <description>&lt;p&gt;If you've read my ShellGPT episodes (1, 2, and 3), you already know this isn't hype — it's hands-on. And today, for Sysadmin Sunday, I'm doing something different. No long story, no theory. Just 10 powerful ShellGPT prompts I’ve personally used as a Linux sysadmin — tested in real-world servers, not lab fantasy.&lt;/p&gt;

&lt;p&gt;Let’s dive straight in.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. 🔍 Check System Health
&lt;/h3&gt;

&lt;p&gt;"&lt;em&gt;Check CPU, RAM, disk usage, and top processes in a single-line command&lt;/em&gt;."&lt;/p&gt;

&lt;pre&gt;sgpt "Provide a Bash one-liner to display CPU load, memory usage, disk usage, and top 5 processes."&lt;/pre&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnuuzz8rgzntqtig8rw6v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnuuzz8rgzntqtig8rw6v.png" alt="Image description" width="800" height="276"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  2. 🧠 Summarize a Log File
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;"Scan and summarize the last 100 lines of a syslog or journalctl output."&lt;/em&gt;&lt;/p&gt;

&lt;pre&gt;sgpt "Summarize the last 100 lines of /var/log/syslog to identify any warnings or errors."&lt;/pre&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe2mb197g3w4y1jfl94nf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe2mb197g3w4y1jfl94nf.png" alt="Image description" width="800" height="290"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  3. 🔐 Audit User Access
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;"Find all users with sudo access and show last login details."&lt;/em&gt;&lt;/p&gt;

&lt;pre&gt;sgpt "A service is failing with exit code 1. Analyze the output of 'systemctl status ' and suggest a fix."&lt;/pre&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5iviehg2dkr6uilq5en4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5iviehg2dkr6uilq5en4.png" alt="Image description" width="800" height="345"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  4. 📦 Troubleshoot Failing Service
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Analyze systemd output and suggest possible fixes.&lt;/em&gt;&lt;/p&gt;

&lt;pre&gt;sgpt "A service is failing with exit code 1. Analyze the output of 'systemctl status ' and suggest a fix."&lt;/pre&gt;

&lt;h3&gt;
  
  
  5. 🧹 Clean Up Disk Space
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Suggest safe commands to clean temp files, journal logs, old kernels.&lt;/em&gt;&lt;/p&gt;

&lt;pre&gt;sgpt "Suggest commands to safely clean up disk space on a RHEL system, including temp files and journal logs."&lt;/pre&gt;

&lt;h3&gt;
  
  
  6. 🗂️ Parse and Extract Logs
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;"Write awk/sed scripts to extract error patterns from log files."&lt;/em&gt;&lt;/p&gt;

&lt;pre&gt;sgpt "Write an awk command to extract all lines with ERROR from /var/log/app.log and count unique errors."&lt;/pre&gt;

&lt;h3&gt;
  
  
  7. 🌐 Identify Open Ports and Their Services
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;"List all open ports and matching process names."&lt;/em&gt;&lt;/p&gt;

&lt;pre&gt;sgpt "Write a command to list open ports and associated process names in Linux."&lt;/pre&gt;

&lt;h3&gt;
  
  
  8. 🕒 Monitor Real-Time Resource Usage
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;"Use dstat or vmstat in combination with grep to filter critical data."&lt;/em&gt;&lt;/p&gt;

&lt;pre&gt;sgpt "Create a real-time command using dstat to monitor CPU, disk IO, and network usage."&lt;/pre&gt;

&lt;h3&gt;
  
  
  9. 🧱 Create and Mount LVM
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;"Walk through creating a volume group, logical volume, and mounting it."&lt;/em&gt;&lt;/p&gt;

&lt;pre&gt;sgpt "Show steps to create a new LVM from /dev/sdb1, format it, and mount to /mnt/data."&lt;/pre&gt;

&lt;h3&gt;
  
  
  10. 🔄 Schedule Automated Backups
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;"Generate a cronjob to rsync user directories nightly."&lt;/em&gt;&lt;/p&gt;

&lt;pre&gt;sgpt "Write a cronjob that runs rsync daily at 1AM from /home to /backup."&lt;/pre&gt;

&lt;h2&gt;
  
  
  🔗 Want More?
&lt;/h2&gt;

&lt;p&gt;If you liked these prompts, check out the full episodes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://medium.com/@muralipala15/shellgpt-the-swiss-army-knife-for-linux-admins-episode-1-343eca446836?sk=b228490ab31196b4c0aa21dd218eef3d" rel="noopener noreferrer"&gt;Episode 1: ShellGPT CLI Magic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://medium.com/@muralipala15/shellgpt-powering-real-world-devops-episode-2-6b1d94ec5d5c?sk=0347fd8e7c14852db2001fce7010f78e" rel="noopener noreferrer"&gt;Episode 2: DevOps with ShellGPT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://medium.com/@muralipala15/episode-3-rhel-clad-in-action-a-walkthrough-of-real-world-linux-admin-tasks-4077814c5a19?sk=d5e579845eed3b0432cc3dd15c53f6f6" rel="noopener noreferrer"&gt;Episode 3: RHEL CLAD vs ShellGPT&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tried one of these prompts? Let me know in the comments which worked best for your setup. And remember — the real magic is not in knowing, but in using.&lt;/p&gt;

&lt;p&gt;Happy Sysadmin Sunday! &lt;/p&gt;

&lt;p&gt;Follow me here on Dev.to for more ShellGPT use cases, Linux tips, and sysadmin stories from the trenches.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;— Murali Pala&lt;/em&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>🔨 When Red Hat Trains Your Hands: A Walkthrough with CLAD( Command Line Assitant Daemon)</title>
      <dc:creator>Muralidhar M Pala</dc:creator>
      <pubDate>Sun, 08 Jun 2025 06:18:21 +0000</pubDate>
      <link>https://dev.to/muralipala/when-red-hat-trains-your-hands-a-walkthrough-with-clad-command-line-assitant-daemon-49h9</link>
      <guid>https://dev.to/muralipala/when-red-hat-trains-your-hands-a-walkthrough-with-clad-command-line-assitant-daemon-49h9</guid>
      <description>&lt;p&gt;After exploring ShellGPT in action, it's time to meet its quieter cousin from the enterprise world: RedHat CLAD (aka Lightspeed). Built directly into RHEL 9.6+, CLAD brings AI guidance tailored for sysadmins working in the Red Hat ecosystem. But is it just a documentation lookup engine or something more? Let's look at &lt;/p&gt;

&lt;p&gt;🔑 What is CLAD?&lt;/p&gt;

&lt;p&gt;CLAD (Command-Line Assistant Daemon), branded as "RHEL Lightspeed," is RedHat's built-in assistant designed to help sysadmins right inside the terminal. Unlike general-purpose AI tools, CLAD speaks RedHat. It pulls guidance aligned with best practices from official docs and IBM Watson backend.&lt;/p&gt;

&lt;p&gt;⚙️ Real-World Admin Tasks with CLAD&lt;/p&gt;

&lt;p&gt;Let’s walk through some common Linux sysadmin duties and see how CLAD performs:&lt;/p&gt;

&lt;p&gt;👥 1. User Creation&lt;br&gt;
Prompt: How do I create a user with a specific UID and home directory?&lt;/p&gt;

&lt;p&gt;CLAD Response: Clear 5-step breakdown, even includes best practices and warnings.&lt;/p&gt;

&lt;p&gt;Verdict: Like having a RedHat trainer whispering over your shoulder&lt;/p&gt;

&lt;p&gt;📀 2. LVM Setup&lt;br&gt;
Prompt: Steps to create a logical volume using LVM?&lt;/p&gt;

&lt;p&gt;CLAD: Walks through pvcreate, vgcreate, lvcreate, and mount steps with optional flags.&lt;/p&gt;

&lt;p&gt;Verdict: Great for brushing up. Verbose but valuable.&lt;/p&gt;

&lt;p&gt;🚧 3. Firewall Configuration&lt;br&gt;
Prompt: Allow only HTTP and SSH through firewalld?&lt;/p&gt;

&lt;p&gt;CLAD: Sets up the public zone, adds services, checks runtime config. Also dives into internal zone usage.&lt;/p&gt;

&lt;p&gt;Verdict: A bit more than asked, but useful if you're building secure setups.&lt;/p&gt;

&lt;p&gt;⏰ 4. Cron Job Setup&lt;br&gt;
Prompt: Run a script daily at 2 AM?&lt;/p&gt;

&lt;p&gt;CLAD: Offers classic cron syntax with brief explanation of each field.&lt;/p&gt;

&lt;p&gt;Verdict: Useful refresher. Adds clarity to routine tasks.&lt;/p&gt;

&lt;p&gt;🔐 5. SELinux &amp;amp; Apache Troubleshooting&lt;br&gt;
Prompt: How to allow blocked actions by SELinux for Apache?&lt;/p&gt;

&lt;p&gt;CLAD: Checks audit logs, uses sealert, audit2allow, and reinforces labeling practices.&lt;/p&gt;

&lt;p&gt;Verdict: A strong guide that keeps sysadmins out of "just disable SELinux" land.&lt;/p&gt;

&lt;p&gt;🌟 Bonus: DevOps Quickfire&lt;/p&gt;

&lt;p&gt;Ansible Playbook: Installs Apache, enables firewalld, copies conf file.&lt;/p&gt;

&lt;p&gt;Terraform: CLAD walks through an EC2 setup using RHEL AMI and AWS provider.&lt;/p&gt;

&lt;p&gt;Docker + Nginx: Steps for reverse proxy container with firewalld and networking tips.&lt;/p&gt;

&lt;p&gt;🕵️ Final Take&lt;/p&gt;

&lt;p&gt;CLAD is not trying to be ShellGPT. It doesn’t chase speed or versatility. It focuses on depth, safety, and alignment with Red Hat principles.&lt;/p&gt;

&lt;p&gt;If you're a Red Hat admin or new to sysadmin tasks, it provides a great comfort layer. But if you're working across distros or need multi-tool flexibility, you might find it slow or verbose.&lt;/p&gt;

&lt;p&gt;That’s why I keep both: ShellGPT for speed, CLAD for grounded confidence.&lt;/p&gt;

&lt;p&gt;Want to see screenshots + step-by-step commands?&lt;/p&gt;

&lt;p&gt;Want to see screenshots + step-by-step commands?&lt;br&gt;
Check out the full walkthrough here → Medium Article&lt;/p&gt;

&lt;p&gt;Up Next: In Episode 4, we dive into ShellGPT’s cybersecurity chops — log parsing, threat detection, and hardening made easy. Stay tuned!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Project: ShellGPT Series – AI for Sysadmins</title>
      <dc:creator>Muralidhar M Pala</dc:creator>
      <pubDate>Tue, 03 Jun 2025 06:11:21 +0000</pubDate>
      <link>https://dev.to/muralipala/project-shellgpt-series-ai-for-sysadmins-1blc</link>
      <guid>https://dev.to/muralipala/project-shellgpt-series-ai-for-sysadmins-1blc</guid>
      <description>&lt;h2&gt;
  
  
  🛠️ Project: ShellGPT Series – AI for Sysadmins
&lt;/h2&gt;

&lt;p&gt;I'm currently writing a multi-part series on &lt;strong&gt;ShellGPT&lt;/strong&gt;, a powerful AI-driven CLI assistant that's transforming the way Linux admins and DevOps engineers work.&lt;/p&gt;

&lt;h3&gt;
  
  
  🔍 What it's about:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Using ShellGPT to reduce manual command-line effort
&lt;/li&gt;
&lt;li&gt;Automating routine tasks with AI
&lt;/li&gt;
&lt;li&gt;Comparing ShellGPT with Red Hat's new CLAD (Lightning Speed)
&lt;/li&gt;
&lt;li&gt;Real-world use cases in DevOps, scripting, cybersecurity, and troubleshooting
&lt;/li&gt;
&lt;li&gt;This series explores how ShellGPT — the AI-powered terminal companion — can save hours for system admins, automate repetitive tasks, and redefine DevOps workflows&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  📚 Episodes so far:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;✅ &lt;a href="https://dev.to/muralipala/terminally-in-love-two-decades-of-linux-one-shell-at-a-time-5d4j"&gt;Terminally in Love: Two Decades of Linux&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;✅ &lt;a href="https://medium.com/@muralipala15/shellgpt-the-swiss-army-knife-for-linux-admins-episode-1-343eca446836?sk=b228490ab31196b4c0aa21dd218eef3d" rel="noopener noreferrer"&gt;ShellGPT: The Swiss Army Knife for Linux Admins – Episode 1&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;✅ &lt;a href="https://medium.com/@muralipala15/shellgpt-powering-real-world-devops-episode-2-6b1d94ec5d5c" rel="noopener noreferrer"&gt;ShellGPT: Powering Real-World DevOps – Episode 2&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔜 Coming soon:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;⚔️ ShellGPT vs. CLAD (Red Hat Lightning Speed)
&lt;/li&gt;
&lt;li&gt;🛡️ ShellGPT in cybersecurity use cases
&lt;/li&gt;
&lt;li&gt;📅 Weekly micro-lessons via "System Admin Sundays" and "Terminal Tuesdays"
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Follow me here or on &lt;a href="https://www.linkedin.com/in/muralipalam/" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt; for more drops. Always open to feedback and geeky convos.&lt;/p&gt;

</description>
      <category>linux</category>
      <category>devops</category>
      <category>projects</category>
      <category>shellgpt</category>
    </item>
    <item>
      <title>Terminally in Love: Two Decades of Linux, One Shell at a Time</title>
      <dc:creator>Muralidhar M Pala</dc:creator>
      <pubDate>Sun, 01 Jun 2025 17:11:25 +0000</pubDate>
      <link>https://dev.to/muralipala/terminally-in-love-two-decades-of-linux-one-shell-at-a-time-5d4j</link>
      <guid>https://dev.to/muralipala/terminally-in-love-two-decades-of-linux-one-shell-at-a-time-5d4j</guid>
      <description>&lt;p&gt;👋 The Beginning&lt;/p&gt;

&lt;p&gt;It all started in 2005 — RHEL 3.0 and Oracle 8.x were the giants of the day.I wasn’t just installing software — I was absorbing a way of life. I still remember setting up BIND (probably Redhat 9 (not EL)) and attending a demo at Indian Air Force HQ, Subroto Park, New Delhi. My uniform had changed. But my mindset remained tactical — observe, adapt, deploy.&lt;/p&gt;

&lt;p&gt;Back then, there was no Stack Overflow, no YouTube how-tos. Just man pages, printed guides, and logs. And somehow, that made the learning stick deeper.&lt;/p&gt;

&lt;p&gt;🧠 What Made Linux Stick?&lt;/p&gt;

&lt;p&gt;Simple. The terminal felt like home.&lt;br&gt;
Every dmesg, every tail -f /var/log/messages, every stubborn NIC issue — I lived through it, solved it, and learned from it.&lt;/p&gt;

&lt;p&gt;I wasn’t chasing certs (though I earned my RHCE 4 in Dec 2005). I was chasing clarity — why a service failed, why a bootloader broke, how to recover from a corrupted /etc/fstab at 2 AM without breaking a sweat.&lt;/p&gt;

&lt;p&gt;🧰 My Toolkit Has Changed, But Not My Spirit&lt;/p&gt;

&lt;p&gt;Over 20 years, the tools evolved:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;From init.d to systemd

From ipchains to nftables

From hand-edited xorg.conf to Wayland debates

From legacy partitions to LVM, and now ZFS experiments
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;And yet, I still enjoy firing up a terminal in a fresh VM more than any fancy web dashboard.&lt;/p&gt;

&lt;p&gt;I’ve played with:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Docker, Podman, and LXC

Ansible, Terraform, and even ShellGPT recently

Monitoring stacks like Nagios → Zabbix → Prometheus + Grafana

Built my own VM lab, sometimes more powerful than bare-metal servers
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;🤕 A Pause, Not an End&lt;/p&gt;

&lt;p&gt;In between, life threw a curveball. A stroke. Partial speech disability. And yet, I’m still here — typing, building, debugging, and now... sharing.&lt;/p&gt;

&lt;p&gt;If anything, it made me more in love with Linux. The silence of the shell, the logic of grep, the clarity of top, they all became my recovery zone.&lt;/p&gt;

&lt;p&gt;❤️ The Love Story Continues&lt;/p&gt;

&lt;p&gt;Now I’m writing from a  Ajman, UAE. A simple room. But inside it? A world of Linux boxes humming in virtual labs, prompt engineering experiments, and that same curiosity from 2005.&lt;/p&gt;

&lt;p&gt;Two decades in — and I’m still terminally in love.&lt;/p&gt;

&lt;p&gt;💬 Let me know if this story resonates. And if you're just starting your Linux journey, remember: you don’t need to master everything. Just don’t stop exploring the man pages.&lt;/p&gt;

&lt;p&gt;Thanks for reading — feel free to drop a comment or connect if Linux has shaped your story too&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
