for i in G M K; do du -ah | grep [0-9]$i | sort -nr -k 1; done | head -n 20
x=1;while [ $x -eq 1 ]; do user=phillip;prsp=$(pgrep -n -u $user);posp=$(pgrep -n -u $user);if [ $prsp -ne $posp ];then x=0;fi;done; strace -vvf -s 300 -p $posp
strace -vff -s200 `ps wuax | grep php-fpm | grep -v grep | awk '{print "-p" $2}' | xargs`
find . -xdev -type f | cut -d "/" -f 2 | sort | uniq -c | sort -nr | head -5
strace -ff -s 100 `pidof php-fpm |sed 's/\([0-9]*\)/\-p \1/g'`
n=1;while true; do ps faux | gawk '{if($8 == "D") print $0}';echo $n; n=$(($n + 1)) ; done
while true; do ps faux | gawk '{if($8 == "D") print $0}' ; done
user=USERNAMEGOESHERE;x=1; while (( $x == 1 )); do pid=$(pgrep -u $user | head -1); [[ $pid ]] && x=0; done; strace -vvvtff -s1000 -p $pid
x=`lsof -n -U`;for i in `netstat -x |gawk '/mysql.sock/{print $7}'`; do echo "$x\n" | grep `echo -e "$(( $i -1 ))\n"`; done
/opt/rh/rh-varnish4/root/usr/bin/varnishadm "ban req.http.host ~ deanengineering.us.com"
/opt/rh/rh-varnish4/root/usr/bin/varnishtop -q 'VCL_call ~ BACKEND_FETCH' -q 'Backend ~ _pdplapp and BerespHeader ~ PHP and not BereqHeader:Cookie' -i 'BereqURL'
index=web-access vhost=*shape.com request_uri!=/sites/* | top request_uri
mysqldump --master-data --opt --single-transaction --comments --hex-blob --dump-date --no-autocommit --databases mysql moredbshere | gzip > /data/alldbs.sql.gz
echo | openssl s_client -starttls smtp -connect deanengineering.us:25 | openssl x509 -noout -text
echo | openssl s_client -connect google.com:443 -servername google.com | openssl x509 -noout -text
/opt/rh/rh-varnish4/root/usr/bin/varnishadm backend.list | grep parents | awk -F '(' '{ print $1 }' | xargs -I {} /opt/rh/rh-varnish4/root/usr/bin/varnishadm backend.set_health {} sick
strace -vff -p 18176 -e trace='!futex,poll,mprotect,stat'
ldapsearch -x -L -h gcaws.cvpc.phillip.com -p 389 -D "cn=LDAP Proxy,ou=Service Accounts III,ou=Service Accounts,ou=restricted,dc=ad,dc=phillipdean,dc=com" -w'REDACTED_PASSWORD'
-bash-4.2$ curl -s -L http://d7uri8nf7uskq.cloudfront.net/tools/list-cloudfront-ips | jq '.CLOUDFRONT_REGIONAL_EDGE_IP_LIST' | jq -r 'flatten[]'
-----------------------------------
curl https://get.acme.sh | sh
acme.sh --issue -d website.com -w /var/www/html
acme.sh --install-cert -d website.com --cert-file /etc/ssl/wildcard.website.com.crt --key-file /etc/ssl/wildcard.website.com.key --reloadcmd "service httpd force-reload"
------------------------------------
curl -L 192.168.0.6/lineup.json | tr '},{' '\n'
bash-4.3# echo 'mplayer -cache 8000 -dumpstream http://192.168.0.6:5004/auto/v23.1?duration=3600 -dumpfile /root/movies/Cops_$(date '+%m_%d_%Y_%H_%M')' | at noon today
if [ $(mysqladmin proc | wc -l) -gt 20 ] ; then mysql -e "show full processlist\G;"
saml2aws exec -- aws s3api put-object --acl public-read --website-redirect-location "$b" --bucket dish.allrecipes.com-redirect-bucket --key "$a"
# get a list of managed polices in json, convert to yaml.
-bash-4.2$ curl -s -L https://gist.githubusercontent.com/gene1wood/55b358748be3c314f956/raw/a5dc94f98dc73774abf0f5d3c58bc17506b191d0/all_aws_managed_policies.json \
| python -c 'import sys, yaml, json; yaml.safe_dump(json.load(sys.stdin), sys.stdout, default_flow_style=False)'
capture all resets with a source port range
tcpdump -i any -nn 'tcp[13] & 4!=0' and src portrange 7200-7230
tail -f $(lsof -p 3061 | awk '/\.log/{print $9}' | paste -s -d" ")