Set 4
31. Incident Triage – Extract Fatal Errors
Scenario During a production incident, SREs need to quickly isolate fatal log entries.
Instructions:
Navigate to
~/kactii29Create folder
fatal_errorsAssume
prod.logexistsExtract lines containing
FATALSave output to
fatal.log
Commands Expected:
grep, output redirection
32. Disk Capacity Check – Home Directory Usage Report
Scenario Capacity planning team needs a snapshot of disk usage under user home directories.
Instructions:
Navigate to
~/kactii29Create
capacity_reportMeasure disk usage of home directory contents
Limit depth to one level
Save output to
capacity.txt
Commands Expected:
du -h --max-depth=1
33. User Accountability – Login Evidence Collection
Scenario Audit team requests evidence of active users during a maintenance window.
Instructions:
Navigate to
~/kactii29Create
user_accountabilityCapture logged-in users
Append current date and time
Save to
users.log
Commands Expected:
who, date, output redirection
34. Binary Validation – Confirm Command Availability
Scenario Before running recovery scripts, engineers must ensure required commands are present.
Instructions:
Navigate to
~/kactii29Create
binary_validationLocate paths for
grep,du, anduptimeSave output to
binaries.txt
Commands Expected:
which
35. Service Health – SSH Availability Check
Scenario Remote access is critical during incidents; SSH service health must be verified.
Instructions:
Navigate to
~/kactii29Create
ssh_healthCheck SSH service status
Start service if inactive
Save status output to
ssh_status.txt
Commands Expected:
systemctl status, systemctl start
36. Deferred Task Audit – Review Scheduled Jobs
Scenario Ops leadership wants visibility into all deferred tasks on the system.
Instructions:
Navigate to
~/kactii29Create
deferred_tasksList all scheduled
atjobsSave output to
tasks.txt
Commands Expected:
atq
37. Environment Snapshot – Capture Runtime Context
Scenario Debugging requires capturing the full runtime environment during execution.
Instructions:
Navigate to
~/kactii29Create
runtime_contextDisplay all environment variables
Save output to
env.txt
Commands Expected:
printenv
38. Network Exposure – Listening Port Evidence
Scenario Security team needs evidence of open listening ports before policy enforcement.
Instructions:
Navigate to
~/kactii29Create
network_exposureCapture all listening TCP and UDP sockets
Save output to
ports.txt
Commands Expected:
ss -tuln
39. Data Normalization – Deduplicate Transaction IDs
Scenario Finance team needs a clean list of unique transaction IDs from raw dumps.
Instructions:
Navigate to
~/kactii29Create
transaction_cleanupAssume
transactions.logexistsSort and remove duplicate entries
Save to
unique_tx.txt
Commands Expected:
sort, uniq
40. System Evidence – Uptime During Incident
Scenario Post-incident report requires proof that the system stayed online.
Instructions:
Navigate to
~/kactii29Create
incident_evidenceCapture system uptime
Append timestamp
Save to
uptime_evidence.log
Commands Expected:
uptime, date, output redirection
Last updated