The sys admin's daily grind: Snoopy
Guide Dog
Sometimes sys admin Charly needs to know when exactly he did something ingenious on one of his servers. Finding an infallible memory aid is difficult, you might think. "Peanuts!" says Charly.
At work, I'm sometimes plagued by annoying gaps in my memory: What exactly was the name of that neat tool that I used to flash the LEDs on a specific network adapter to help me find the NIC in the rack? Or: How exactly did I delete all files that were more than a week old in a directory? The answer to all of these questions is in the Bash history, but Murphy's Law dictates that the history is always a little bit too short. And, in my case, there's another degree of uncertainty: Which server did I do this on?
Snoopy potentially offers a solution. The small library with the dog's name, wraps around execve()
and always wakes up when the computer runs a command. Many distributions have Snoopy in the pen, but if not, GitHub [1] will help you out. To enable Snoopy at boot time, you need an entry in /etc/ld.so.preload
. I added the following line: /<path>/snoopy.so
. The path is typically lib
. If you are building Snoopy yourself, the library is likely to be found in /usr/local/lib/
or something similar.
Building Snoopy yourself does offer some benefits. For example, you can edit the snoopy.h
header file in the source up front. If you enter
#define ROOT_ONLY 1
Snoopy only logs commands that run with root privileges, but if you install the tool from the distribution repositories, this option is not set, and it logs any old command no matter who ran it.
Unless configured to do otherwise, Snoopy writes to /var/log/auth.log
. Figure 1 shows the log for some simple commands. The structure always stays the same; each entry starts with the user ID, followed by the session ID and the TTY you use. This is then followed by the working directory, which is important because Snoopy does not log commands like cd /etc
. Navigating the system is not the same for this dog as executing a file.
This information is followed by the full path to the executed file and, finally, the expanded command (e.g., aliases can cause an expansion). Many distributions run ls --color=auto
, so, in this case, if you only type ls
, Snoopy reveals all.
Collection Point
Now you just need to consolidate the logs centrally. I configured one server to accept the log messages from other machines. If the server runs rsyslog, you can just pass in the -r
parameter at boot time to switch rsyslog to receive mode. Next, you can tell your other servers also to send entries in /var/log/auth.log
to the newly configured syslog server. To do this, you just need to add one line to the syslog configuration:
auth,authpriv.* @<192.168.2.80>
The auth log tends not to grow drastically, which means you can rotate on a weekly or even monthly basis. Snoopy fills a substantial log of my heroic deeds of administration day after day – including typos and similar peanuts.
Charly Kühnast
Charly Kühnast is a Unix operating system administrator at the Data Center in Moers, Germany. His tasks include firewall and DMZ security and availability. He divides his leisure time into hot, wet, and eastern sectors, where he enjoys cooking, freshwater aquariums, and learning Japanese, respectively.
Infos
- Snoopy: https://github.com/a2o/snoopy
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
New Slimbook EVO with Raw AMD Ryzen Power
If you're looking for serious power in a 14" ultrabook that is powered by Linux, Slimbook has just the thing for you.
-
The Gnome Foundation Struggling to Stay Afloat
The foundation behind the Gnome desktop environment is having to go through some serious belt-tightening due to continued financial problems.
-
Thousands of Linux Servers Infected with Stealth Malware Since 2021
Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.
-
Halcyon Creates Anti-Ransomware Protection for Linux
As more Linux systems are targeted by ransomware, Halcyon is stepping up its protection.
-
Valve and Arch Linux Announce Collaboration
Valve and Arch have come together for two projects that will have a serious impact on the Linux distribution.
-
Hacker Successfully Runs Linux on a CPU from the Early ‘70s
From the office of "Look what I can do," Dmitry Grinberg was able to get Linux running on a processor that was created in 1971.
-
OSI and LPI Form Strategic Alliance
With a goal of strengthening Linux and open source communities, this new alliance aims to nurture the growth of more highly skilled professionals.
-
Fedora 41 Beta Available with Some Interesting Additions
If you're a Fedora fan, you'll be excited to hear the beta version of the latest release is now available for testing and includes plenty of updates.
-
AlmaLinux Unveils New Hardware Certification Process
The AlmaLinux Hardware Certification Program run by the Certification Special Interest Group (SIG) aims to ensure seamless compatibility between AlmaLinux and a wide range of hardware configurations.
-
Wind River Introduces eLxr Pro Linux Solution
eLxr Pro offers an end-to-end Linux solution backed by expert commercial support.