Advent of Sysadmin 2025

2025-12-011:17365131sadservers.com

The Advent of Sysadmin 2025 was a 12-day Advent calendar of Linux and DevOps challenges of different difficulties that ran from December 1st to December 12th. This event is over, but you can still see…

The Advent of Sysadmin 2025 was a 12-day Advent calendar of Linux and DevOps challenges of different difficulties that ran from December 1st to December 12th.

This event is over, but you can still see the Advent scenarios that were available at the time with the added clues and solutions.


Read the original article

Comments

  • By 0xbadcafebee 2025-12-013:1017 reply

    Here's 12 Sysadmin/DevOps (they're synonyms now!) challenges, straight from the day job:

      1.  Get a user to stop logging in as root.
      2.  Get all users to stop sharing the same login and password for all servers.
      3.  Get a user to upgrade their app's dependencies to versions newer than 2010.
      4.  Get a user to use configuration management rather than scp'ing config files from their laptop to the server.
      5.  Get a user to bake immutable images w/configuration rather than using configuration management.
      6.  Get a user to switch from Jenkins to GitHub Actions.
      7.  Get a user to stop keeping one file with all production secrets in S3, and use a secrets vault instead.
      8.  Convince a user (and management) you need to buy new servers, because although "we haven't had one go down in years", every one has faulty power supply, hard drive, network card, RAM, etc, and the hardware's so old you can't find spare parts.
      9.  Get management to give you the authority to force users to rotate their AWS access keys which are 8 years old.
      10. Get a user to stop using the aws root account's access keys for their application.
      11. Get a user to build their application in a container.
      12. Get a user to deploy their application without you.
    
    After you complete each one, you get a glass of scotch. Happy Holidays!

    • By cobertos 2025-12-014:592 reply

      Re: 6. ... Github Actions

      Github Actions left a bad taste in my mouth after having it randomly removed authenticated workers from the pool, after their offline for ~5 days.

      This was after setting up a relatively complex PR workflow (always on cheap server starts up very expensive build server with specific hardware) only to have it break randomly after a PR didn't come in for a few days. And no indication that this happens, and no workaround from GitHub.

      There are better solutions for CI, GitHub 's is half baked.

      • By paulddraper 2025-12-0115:231 reply

        This is documented currently (supposed to be 14 days). [1]

        That said, I have found runners to be unnecessarily difficult.

        But Jenkins and its own quirks, and when I used GitLab, it used ancient docker-machine and outdated AMIs by default.

        I think Buildkite has been the only one to make this easy and scalable. But it is meant for self hosted runners.

        [1] https://docs.github.com/en/enterprise-cloud@latest/actions/h...

      • By swyx 2025-12-015:114 reply

        bugs happen to all of us. whats your better solution - gitlab?

        • By shoo 2025-12-017:442 reply

          Roll 2d6, sum result. Your CI migration target is:

            2. migrate secret manager. Roll again
            3. cloud build
            4. gocd
            5. jenkins
            6. gitlab
            7. github actions
            8. bamboo
            9. codepipeline
            10. buildbot
            11. team foundation server
            12. migrate version control. Roll again

          • By swyx 2025-12-018:283 reply

            somehow i am really liking the kind of people that comment in the comment sections of sysadmin posts. i wonder what personality type this is

          • By mroche 2025-12-0118:581 reply

            Bump up to 2d10 and add:

                - Travis
                - CircleCI
                - Drone/Woodpecker
                - Tekton Pipelines
                - TeamCity
                - Zuul
                - Buildkite
                - Agola

            • By flyer23 2025-12-0123:56

              IBM ClearCase anyone? Noone? I AM old

        • By esseph 2025-12-016:351 reply

          GitLab pipelines are really good.

          • By Balinares 2025-12-017:302 reply

            Not in love with its insistence on recreating the container from scratch every step of the pipeline, among a bundle of other irksome quirks. There are certainly worse choices, though.

            • By friendzis 2025-12-0113:021 reply

              Opposite of Jenkins where you have shared workspaces and have to manually ensure workspace is clean or suffer from reproducibility issues with tainted workspaces.

              • By maratc 2025-12-0119:11

                It's up to you whether you have a shared workspace or not. My machines/pods are destroyed and recreated after each job, so I never had this issue.

            • By esseph 2025-12-020:081 reply

              You don't actually have to.

              If you use the built in container registry and build artifacts, you can pass between steps.

              • By Balinares 2025-12-0320:05

                I'm aware, but thank you. Unfortunately, given sufficiently large artifacts, the overhead of packaging, uploading, downloading and unpacking them at every step becomes prohibitive.

        • By sharts 2025-12-015:242 reply

          honestly jenkins really isnt that bad

          • By friendzis 2025-12-0114:42

            Hudson/Jenkins is just not architected for large, multi-project deployments, isolated environments and specialized nodes. It can work if you do not need these features, but otherwise it's fight against the environment.

            You need a beefy master and it is your single point of failure. Untimely triggers of heavy jobs overwhelm controller? All projects are down. Jobs need to be carefully crafted to be resumable at all.

            Heavy reliance on master means that even sending out webhooks on stage status changes is extremely error prone.

            When your jobs require certain tools to be available you are expected to package those as part of agent deployment as Jenkins relies on host tools. In reality you end up rolling your own tool management system that every job has to call in some canonical manner.

            There is no built in way to isolate environments. You can harden the system a bit with various ACLs, but in the end if you either have to trust projects or build up and maintain infrastructures for different projects isolated at host level.

            In cases when time-wise significant processing happens externally, you have to block an executor.

          • By bionsystem 2025-12-018:131 reply

            Yeah I was thinking of using it for us actually. Connects to everything, lots of plugins, etc. I wonder what the hate is from, they are all pretty bad aren't they ?

            Will test forgejo's CI first as we'll use the repo anyway, but if it ain't for me, it's going to be jenkins I assume.

            • By n4bz0r 2025-12-019:422 reply

              Cons:

                - DSL is harder to get into.
                - Hard to reproduce a setup unless builds are in DSL and Jenkins itself is in a fixed version container with everything stored in easily transferable bind volumes; config export/import isn't straightforward.
                - Builds tend to break in a really weird way when something (even external things like Gitea) updates.
                - I've had my setup broken once after updating Jenkins and not being able to update the plugins to match the newer Jenkins version.
                - Reliance on system packages instead of containerized build environment out of the box.
                - Heavier on resources than some of the alternatives.
              
              Pros:

                - GUI is getting prettier lately for some reason.
                - Great extendability via plugins.
                - A known tool for many.
                - Can mostly be configured via GUI, including build jobs, which helps to get around things at first (but leads into the reproducibility trap later on).
              
              Wouldn't say there is a lot of hate, but there are some pain points compared to managed Gitlab. Using managed Gitlab/Github is simply the easiest option.

              Setting up your own Gitlab instance + Runners with rootless containers is not without quirks, too.

              • By maratc 2025-12-0116:34

                CASC plugin + seed jobs keep all your jobs/configurations in files and update them as needed, and k8s + Helm charts can keep the rest of config (plugins, script approvals, nodes, ...) in a manageable file-based state as well.

                We have our main node in a state that we can move it anywhere in a couple of minutes with almost no downtime.

                I'll add another point to "Pros": Jenkins is FOSS and it costs $0 per developer per month.

              • By bionsystem 2025-12-0111:011 reply

                I have a previous experience with it. I agree with most points. Jobs can be downloaded as xml config and thus kept/versioned. But the rest is valid. I just don't want to manage gitlab, we already have it at corp level, just can't use it right now in preprod/prod and I need something which will be either throwaway or kept just for very specific tasks that shouldn't move much in the long run.

                • By n4bz0r 2025-12-0111:54

                  For a throwaway, I don't think Jenkins will be much of a problem. Or any other tool for that matter. My only suggestion would be to still put some extra effort into building your own Jenkins container on top of the official one [0]. Add all the packages and plugins you might need to your image, so you can easily move and modify the installation, as well as simply see what all the dependencies are. Did a throwaway, non-containerized Jenkins installation once which ended up not being a throwaway. Couldn't move it into containers (or anywhere for that matter) without really digging in.

                  Haven't spent a lot of time with it myself, but if Jenkins isn't of much appeal, Drone [1] seems to be another popular (and lightweight) alternative.

                  [0] https://hub.docker.com/_/jenkins/

                  [1] https://www.drone.io

        • By 0xedd 2025-12-017:23

          [dead]

    • By jagged-chisel 2025-12-014:012 reply

      > … from Jenkins to GitHub Actions.

      Oh, good lord why?

      • By 0xbadcafebee 2025-12-0116:071 reply

        Many, many reasons... the most important of which is, Jenkins is a constant security nightmare and a maintenance headache. But also it's much harder to manage a bunch of random Jenkins servers than GHA. Authentication, authorization, access control, configuration, job execution, networking, etc. Then there's the configuration of things like env vars and secrets, environments, etc that can also scale better. I agree GHA kinda sucks as a user tool, but as a sysadmin Jenkins will suck the life out of you and sap your time and energy that can go towards more important [to the company] tasks.

        • By maratc 2025-12-0117:471 reply

          I really scratch my head when I read your comment, as nothing of this is a real issue in my Jenkins.

          > bunch of random Jenkins servers

          Either PXE boot from an image, or k8s from an image, have a machine or pod rebooted/destroyed after one job. Update your image once a month, or have a Jenkins job to do that for you.

          > Authentication, authorization, access control

          Either use LDAP or Login via Github, and Matrix security plugin. Put all "Devops" group into admins, the rest into users, never touch it again.

          > configuration

          CASC plugin and seed for jobs, and/or Helm for just about everything else.

          > env vars and secrets

          Pull everything from Vault with Vault plugin.

          > as a sysadmin Jenkins will suck the life out of you

          I spend about 1-2 hours a week managing Jenkins itself, and the rest of the week watching the jobs or developing new ones.

          • By 0xbadcafebee 2025-12-031:291 reply

            Well one issue is, CasC isn't enough. You often have to write JobDSL to get around some limitation in CasC, and sometimes Groovy for limitations in the other two. If you want to manage access control (and you choose the correct Auth plugin, and figure out how to configure it), often you need an admin to make changes in both the Jenkins server and your backend AuthNZ system. Then there's the "seed job vs not-seed-job" weirdness that doesn't exist with GHA. And building the (hopefully containerized) Jenkins server, Jenkins build agents, etc will depend on your infrastructure provider, but still usually requires you to get your hands dirty. There are many, many more layers to the onion with Jenkins, and it's just not worth all that overhead for what should be "git clone && build && deploy" - which GHA does much simpler, right where your code lives, without you needing to maintain anything.

            And this is if you get to manage it! Often there's 5 different random Jenkins servers set up by different teams, all of which are EOL and rife with security holes, and they expect you to fix them when they break, nobody version controls their configs or backs them up (they haven't even heard of CasC and have no interest in using it), and your boss says you can't say no, and also you can't upgrade them/take them over. I've seen million-dollar products which are completely dependent on over a thousand Jenkins jobs on an out-of-date Jenkins server, so complex and intertwined it couldn't be replaced.

            If it were up to me, I would replace most CI with Drone.io (or Woodpecker CI if it ever gets feature parity). Now that's a dead simple CI system.

            • By maratc 2025-12-0311:061 reply

              My issue with GHA and other "dead simple" systems is that my CI is complicated. Having a real programming language for stuff like "calculate what date it was a week ago" or "concatenate these three strings but only under some conditions" or "parse the output and build an object out of it" is really helpful while a bastardised YAML-based Jinja template simply can't hold up.

              But yeah, if all there is to do is "git clone && build && deploy" then Jenkins is an overkill and it probably wasn't warranted in the first place.

              • By 0xbadcafebee 2025-12-0317:191 reply

                For complex logic I don't rely on the CI system; I've been burned too many times. I shell out to an external program and have it return an output variable, and I just do "if $foo = y then blah" in the CI's DSL (and I keep those tests to a minimum; rather have more separate jobs than one complex job). Often I will put everything in a dedicated build tool (Make or similar) so I can run it from my laptop or CI, and any change to logic only happens in one place. It's adding an abstraction, but the end result is I write the CI job once and never touch it again. For flexibility I add parameters to the CI job.

                • By maratc 2025-12-0410:291 reply

                  > For complex logic I don't rely on the CI system

                  I do that too, until my complex logic belongs to the CI system and nowhere else.

                  As an example:

                      It's 2 am now and Jenkins needs to run some (but not all) nightly tests[0]. To figure out which, let's bring the source code and analyse the configuration file, disregarding anything that doesn't need to run at this hour. Once we have the plan for which tests to run, let's figure out what we need to build[1]. Also, let's see what is the status of the pool running the tests[2] so we can decide on a tests parallelisation strategy for this run. When we have a plan, let's build and test, keeping an eye on the triggered tests. When all these have finished, analyse the failures[3], create tickets for the failures[4] and prepare a report to be sent.
                  
                  I wouldn't be able to express all this in YAML.

                  [0] other "nightly tests" run at 1, 3, 4 etc.

                  [1] this is mapped in the configuration file too.

                  [2] this is internal to Jenkins

                  [3] same

                  [4] this involves finding the "responsible person," so a lot of API calls

                  • By 0xbadcafebee 2025-12-0419:51

                    Sounds like you're using cron as a complex job queue! A lot of teams get there eventually, and either 1) keep hacking on cron/jenkins/etc to make this work, 2) invent their own queueing tool (NIH syndrome; been done many times before, there is nothing new to make here), or 3) use a purpose-built solution for this. Airflow is the old-and-busted solution; the new hotness is newer generations of the same concept (Prefect/Dagster, Luigi, Temporal). But often sticking to your existing thing is cheaper; depends how much custom engineering you want to invest.

                    Fwiw, I do believe you can do this in GHA, but you may need to call their API from your workflow. In addition, their replacement for Groovy is to run an action which lets you embed Javascript/Typescript and call their SDK. It sucks, but so does Groovy! ;-)

      • By vachina 2025-12-014:30

        Because sysadmim wants to outsource their responsibilities (and job).

    • By n4bz0r 2025-12-019:59

      > Sysadmin/DevOps (they're synonyms now!)

      I've notified the authorities and social services.

    • By betaby 2025-12-014:23

      5. and 6. are a matter of taste (trade-offs), the rest is spot on!

    • By daemonologist 2025-12-014:571 reply

      You get me the permissions to do half of this stuff, and I'll do whatever you want.

    • By Waterluvian 2025-12-0117:58

      Here’s the first step to all of these that I often see sysadmins stumbling on: communicate in written, non-abstract terms why each of these matter.

      Most are obvious to most people. None are obvious to everybody.

    • By Nextgrid 2025-12-0111:201 reply

      > Get a user to stop logging in as root.

      It really depends if the machine is hosting anything that you don't want some users to access. If the machine is single-purpose and any user is already able to access everything valuable from it (DB with customer data, etc) or trivially elevate to root (via sudo, docker access, etc) then it's just pointless extra typing and security theatre.

      • By panzagl 2025-12-0115:46

        I guess no one ever audits your servers.

    • By f1shy 2025-12-0111:002 reply

      >> Sysadmin/DevOps (they're synonyms now!)

      Is this really like that? Isn't there any Unix/DBA anymore? I associate DevOps to what at my time we called "operations" and "development". We had 5 teams or so:

      1) Developers, who would architect and write code, 2) Operations who would deploy, monitor and address customer complaints, 3) Unix (aka SYS) administrators, who would take care of housekeeping of well, the OS (and web servers/middleware), 4) DBA who would be monitoring and optimizing Oracle/Postgres, and 5) Network admins, who would take care of Load Balancers, Routers, Switches, Firewalls (well, there were 2 security experts for that also)

      So I think DevOps would be a mix of 1&2, to avoid the daily wars that would constantly happen "THEY did it wrong!"

      Can somebody clear my mind, please!? It seems I was out of it for too long?!

      • By Wilya 2025-12-0111:453 reply

        In full-cloud environments, in small/middle companies I've worked at:

        Developers handle 1). Devops handle 2)/3)/5). Nobody does 4)

        • By f1shy 2025-12-0113:031 reply

          Thanks. That is an interesting insight into the current reality. I assume the developers take care of optimization of queries; set up indexes and development of schemas and DB backups is handled by devops.

          I must say, again I thought (I read it somewhere?) DevOps should take care of the constant battle between Devs and Operations (I've seen enough of that in my times) by merging 1 and 2 together. But it seems just a name change, and if anything, seems worst, as a (IMHO) critical and central component, like the DB, now has totally distributed responsibilities. I would like to know what happens when e.g. a DB crashes because a filesystem is full, "because one developer made another index, because one from devops had a complaint because X was too slow".

          Either the people are extremely more professional that in my times, or it must be a shitshow to look while eating pop-corn.

          • By friendzis 2025-12-0114:49

            > DevOps should take care of the constant battle between Devs and Operations

            In practice there is no way to relay "query fubar, fix" back, because we are much agile, very scrum: feature is done when the ticket is closed, new tickets are handled by product owners. Reality is antithesis of that double Ouroboros.

            In practice developers write code, devops deploy "teh clouds" (writing yamls is the deving part) and we throw moar servers at some cloud db when performance becomes sub-par.

        • By sgarland 2025-12-0112:34

          Nobody does 4 until they’ve had multiple large incidents involving DBs, or the spend gets hilariously out of control.

          Then they hire DBREs because they think DBA sounds antiquated, who then enter a hellscape of knowing exactly what the root issues are (poorly-designed schemata, unperformant queries, and applications without proper backoff and graceful degradation), and being utterly unable to convince management of this (“what if we switched to $SOME_DBAAS? That would fix it, right?”).

        • By avhception 2025-12-0112:04

          Can confirm: that's exactly what we do.

      • By rtp4me 2025-12-0115:08

        For 4) - consider PGHero[1] and PGTuner[2] instead of a full-time DBA. We use both in production and they work very well to help track down performance issues with Postgres.

        [1] https://github.com/ankane/pghero

        [2] https://pgtune.leopard.in.ua/

        Edit: For the record, I have worked at a few small companies as the "SysAdmin" guy who did the whole compliment of servers, OS, storage, networking, VMs, DB, perf tuning, etc.

    • By technion 2025-12-018:055 reply

      I know its a common view that sysadmin/devops are the same these days, but witha current sysadmin role nothing youve mentioned sounds relevant. Let's give you my list:

      1. Patch Microsoft exchange with only a three hour outage window 2. Train a user to use onedrive instead of emailing 50mb files and back and forth 3. Setup eight printers for six users. Deal with 9gb printer drivers. 4. Ask an exec if he would please let you add mfa to their mailbox. 5. Sit there calmly while that exec yells like a wwe wrestler about the ways he plans to ruin you in response 6. Debate the cost of a custom mouse pad for one person across three meetings 7. Deploy any standard windows app that expects everyone be an administrator without making everyone an administrator 8. Deploy an app that expects uac disabled without disabling uac 9. Debug some finance persons 9000 line excel function

      • By hnlmorg 2025-12-019:17

        That sounds more like Desktop Support than a SysAdmin role. My condolences if that's the job you landed when interviewing for a SysAdmin role

      • By 0xbadcafebee 2025-12-0116:25

        I used to have that job, but my title wasn't Sysadmin, it was IT Manager. For companies small enough that they don't have multiple roles, you do both... but for larger companies, the user-side stuff is done by IT, and the server-side stuff is done by a Sysadmin. (And my condolences; having done that combined role, it's not easy, and you don't get paid enough!)

      • By hansmayer 2025-12-018:532 reply

        What you describe sounds more like a MS "Modern Workplace" / IT support in a corporate environment.

        • By technion 2025-12-0110:153 reply

          Are we arguing that corporate workers arent "real sysadmins"?

          • By jagged-chisel 2025-12-0110:48

            Pretty sure they mean “general IT support isn’t sysadmin work.”

          • By jabroni_salad 2025-12-0115:092 reply

            HN culture as a whole doesnt really recognize the validity of business that buy software vs build software.

            • By fragmede 2025-12-0213:05

              This HN?

              > you can already build such a system yourself quite trivially by getting an FTP account, mounting it locally with curlftpfs, and then using SVN or CVS on the mounted filesystem. From Windows or Mac, this FTP account could be accessed through built-in software.

              https://news.ycombinator.com/item?id=8863

            • By hansmayer 2025-12-0212:54

              Not really - there are lot of "real" sysadmins working with bought software such as RHEL and AAP...

          • By hansmayer 2025-12-0212:52

            No. There are plenty of corporate sysadmins. I am arguing that MS Workplace Sysadmins are not the ones this advent was meant for.

        • By Xiol 2025-12-019:491 reply

          i.e., Hell

          • By hansmayer 2025-12-0212:53

            That is hands down the most concise description, yes.

      • By dessimus 2025-12-041:37

        >4. Ask an exec if he would please let you add mfa to their mailbox.

        Ask?! This is where the org's cyber insurance is your friend. Just have the executive get the provider's clearance on him not having MFA. I'm sure that line item will change his mind, and if not, be sure to accidently mention those exemptions to those yearly auditors.

      • By stackskipton 2025-12-0116:591 reply

        Former Exchange Admin here: 1 is easy, I used to do 70k mailboxes in middle of the day only but it requires spare hardware or virtualization with headroom.

        Deploy new Server(s), patch, install Exchange, Setup DAGs, migrate everyone mailbox, swing load balancer over to new servers, uninstall Exchange from old, remove old from Active Directory, delete servers.

        BTW, Upgrades now suck because Office365 uses method above so upgrade system never gets good Q&A from them.

        • By EvanAnderson 2025-12-0117:38

          Same feeling here re: migrations being easy if the Customer isn't a cheapass. Small business Customers who had the competing requirements of spending as little money as possible and having as much uptime as possible were the stressor.

    • By alberth 2025-12-014:501 reply

      I’d be super interested to see solutions to each, just to learn from.

      • By philipwhiuk 2025-12-0116:18

        You can deploy tooling (e.g. BeyondTrust / CyberArk for 1&2), but ultimately there's a conversation and a migration plan to be done for each.

    • By athrowaway3z 2025-12-019:53

        9.  Get management to give you the authority to force users to rotate their AWS access keys which are 8 years old.
      
      
      Saying "keys which are 8 years old" implies you're worried about the keys themselves, which is just wrong. (Their security state depends on monitoring)

      You can definitely make a strong argument that the organization needs practice rotating, so I would advise reframing it as an org-survivability-planning challenge and not a key-security issue.

    • By DoctorOW 2025-12-0115:33

      > Get a user to use configuration management rather than scp'ing config files from their laptop to the server.

      Damn, this one I'm guilty of. Though, I'm not real Sysadmin/DevOps, I'm just throwing something together and deploying it on a LAN-only VM for security reasons (I don't trust the type of code I would write)

    • By infogulch 2025-12-0115:15

      Q: 3. Get a user to upgrade their app's dependencies to versions newer than 2010.

      A: Calculate the average age in years of all dependencies calculated by: (max(most recent version release date, date of most recent CVE on library) - used version release date). Sleep for that many seconds before the app starts.

    • By JuniperMesos 2025-12-016:292 reply

      A lot of these problems seem pretty solveable, if you're the admin of the machine (or cloud system) and the user isn't.

      If you don't want a user to log in as root, disable the root password (or change it to something only you know) and disable root ssh. If you want people to stop sharing the same login and password across all servers, there's several ways to do it but the most straightforward one seems like it would be to enforce the use of a hardware key (yubikey or similar) for login. If people aren't using configuration management software and are leaving machines in an inconsistent state, again there are several options but I'd look into this NixOS project: https://github.com/nix-community/impermanence + some policy of rebooting the machines regularly.

      If you don't like how users are making use of AWS resources and secrets, then set up AWS permissions to force them to do so the correct way. In general if someone is using a system in a bad or insecure way, then after alerting them with some lead time, deliberately break their workflow and force them to come to you in order to make progress. If the thing you suggest is actually the correct course of action for your organization, then it will be worthwhile.

      • By philipwhiuk 2025-12-0111:411 reply

        None of them are technically hard. All of them are bureaucracy-hard.

        If you just do any of this list without the proper migration plan/time, someone senior in the org will complain and you will lose.

        • By jakeydus 2025-12-0112:36

          > If you just do any of this […], some senior in the org will complain and you will lose.

          More accurate statement imo.

      • By skywhopper 2025-12-0112:33

        It’s not as easy as “I can technically change this”. If you think it is, you don’t understand the job of a sysadmin.

    • By AstroJetson 2025-12-023:16

      I think the BOFH answer would be “They ride Elevator #2 to sub-basement 3.” Plot twist, there is only sub-basement 2.

      Two pints of ale please!

    • By UltraSane 2025-12-0113:13

      Best practice is to use IP-restricted keys.

  • By melvinodsa 2025-12-012:00

    When I get sad and nothing to do in the world, may be hacking into a sad server's problem seems very interesting

  • By alexpotato 2025-12-0118:341 reply

    We use Sad Servers for evaluating candidates for DevOps/SRE roles and it's phenomenal.

    Feedback from candidates is that they find it a bit stressful during the actual interview but love the approach once it's completed.

    The interview option also makes it trivial to just send to a candidate via Zoom chat, ask them to share their screen and "just works".

    Happy to answer questions folks may have about how we use it.

    • By zenoprax 2025-12-0119:341 reply

      This is heartening - I'm about to start with the daily challenges today and document my experience and that sort of thing.

      Any other suggestions? I have sysadmin experience as a homelabber and at work with a small company as a "tech lead" but have not yet had the chance to do it full time in a larger company. Currently focused on back-filling knowledge gaps and adding certs to support my existing experience.

      • By alexpotato 2025-12-0121:291 reply

        Sad Servers is great for trying out how to fix scenarios that you would probably run into while working in the real world.

        If you are looking into more of the "people" side of things, I would HIGHLY recommend Never Split the Difference by Chris Voss [0]. A big part of being a team lead and/or working at a larger firm is understanding where people are coming from and then convincing them that your solution is "win/win". The book is great at highlighting multiple different tactics to do that.

        Turn the Ship Around [1] is also great at giving examples of how to "change organizations in place". If you end up at larger firms, there will be a LOT of legacy infra and processes that you may want to improve. Marquet gives excellent examples of how to change things WHILE ALSO getting buy in from the team.

        0 - https://amzn.to/48dBSn2

        1 - https://amzn.to/4pfL2Wb

        • By zenoprax 2025-12-0123:08

          I actually read "Never Split the Difference" a couple years ago! Initially just to prepare for a salary negotiation but I found it to be very useful in many other ways. Your second recommendation is also appropriate: I had a ton of latitude to build and configure whatever hardware was needed to solve $BUSINESS-PROBLEM (which was often very exciting) but it was done in a bit of a vacuum without any mentorship. Adapting to a more rigorous/larger/slower working environment is exactly what I need to do.

          Great suggestions and thanks for taking the time to respond :)

HackerNews