Browsed by
Author: Ricky Adams

Installing vSphere 6.0 ESXi Hosts nested – preconfiguration

Installing vSphere 6.0 ESXi Hosts nested – preconfiguration

Installing vSphere 6.0 ESXi Hosts nested – preconfiguration Introduction After covering the installing of the vCSA in the last article, we now care about the ESXi 6.0 Hosts installation and integration. I need to run the ESXi hosts nested as virtual machines themselves as this will be a testing environment. All systems installed are based on an existing physical environment running vSphere 5.5. The process of deploying on physical hosts instead on virtual machines may vary at some points. Existing…

Read More Read More

How To Setup SSH Keys on a Linux System

How To Setup SSH Keys on a Linux System

How To Setup SSH Keys on a Linux / Unix System by Vivek Gite on March 9, 2014 last updated October 20, 2016 in CentOS, Cryptography, Debian / Ubuntu, Linux, Openbsd, RedHat and Friends, UNIX I recently read that SSH keys provide a secure way of logging into a Linux and Unix-based server. How do I set up SSH keys on a Linux or Unix based systems? In SSH for Linux/Unix, how do I set up public key authentication? I…

Read More Read More

Using the vi Text Editor in Linux

Using the vi Text Editor in Linux

How do I use the vi text editor? The vi text editor has three modes: command mode, input mode, and ex mode. Command mode When starting, vi begins in command mode. If you are ever unsure which mode you’re in, press Esc to return to command mode. In command mode, you can move around with the arrow keys, or by using the vi movement keys, as follows: h left j down k up l right Several vi commands are listed…

Read More Read More

Adding Users to sudo Access

Adding Users to sudo Access

Procedure 2.2. Configuring sudo Access Log in to the system as the root user. Create a normal user account using the useradd command. Replace USERNAME with the user name that you wish to create. # useradd USERNAME Set a password for the new user using the passwd command. # passwd USERNAME Changing password for user USERNAME. New password: Retype new password: passwd: all authentication tokens updated successfully. Run the visudo to edit the /etc/sudoers file. This file defines the policies applied by…

Read More Read More

How to Mount a SMB/CIFS Share as an Automount on CentOS/Fedora/RHEL

How to Mount a SMB/CIFS Share as an Automount on CentOS/Fedora/RHEL

How to Mount a SMB/CIFS Share as an Automount on CentOS/Fedora/RHEL or Using the fstab file approach 1-Install the  Automounter #  yum install autofs 2-Install samba (client) #yum install samba-client samba-common 3-Next you have to add an entry to the file /etc/auto.master, like so: # file: /etc/auto.master # … # … /mnt/cifs_share    /etc/auto.cifs    –timeout=600 –ghost 4-Now we’ll need to create the mount point: % mkdir /mnt/cifs_share 5-now create the file /etc/auto.cifs: share_data    -fstype=cifs,rw,noperm,credentials=/etc/credentials.txt    ://192.168.1.x/windows_data 6-And finally, create the credentials.txt file….

Read More Read More

MySQL JDBC Connector

MySQL JDBC Connector

Download JConnector from Oracle, unpack and copy to the jar file to …jre\lib\ext folder of your Java installation. It will be automatically included in the default library available to every project you create.   Testing the JDBC /* * To change this license header, choose License Headers in Project Properties. * To change this template file, choose Tools | Templates * and open the template in the editor. */ package helloworld; /* JDBC-MySQL */ import java.sql.DriverManager; import java.sql.Connection; import java.sql.SQLException;…

Read More Read More

Windows Restricted Groups – Adding Domain Users To The Local Administrators Group Using Group Policy (GPO)

Windows Restricted Groups – Adding Domain Users To The Local Administrators Group Using Group Policy (GPO)

Adding Domain Users To The Local Administrators Group Using Group Policy Adding AD users to the local administrators group on multiple computers is simple using Group Policy.  In this post I’ll describe the process. Create a fresh group policy object (GPO) and link it to a test Organization Unit (OU).  Add a test server to the OU. Open the GPO and navigate to Computer Configuration -> Policies -> Windows Settings   -> Security Settings -> Restricted Groups.   Right click and choose…

Read More Read More

Use Group Policy to Enable Auto-Logon for a Windows Kiosk

Use Group Policy to Enable Auto-Logon for a Windows Kiosk

How to use Group Policy Preference enable auto-logon Posted by Alan Burchill on 6 October 2010, 12:30 am The below article shows you how to use Group Policy Preference to setup the registry keys on a computer so that it automatically logs onto when its turned on. While doing this is potentially huge security issue and not something I would generally recommend IT staff might want to implement on computers that are highly locked down and used for only a…

Read More Read More

Running JIRA over SSL or HTTPS

Running JIRA over SSL or HTTPS

Running JIRA (6.4) over SSL or HTTPS Atlassian applications allow the use of SSL within our products, however Atlassian Support does not provide assistance for configuring it. Consequently, Atlassian cannot guarantee providing any support for it. If assistance with conversions of certificates is required, please consult with the vendor who provided the certificate. If assistance with configuration is required, please raise a question on Atlassian Answers. The instructions on this page describe how to configure JIRA to enable access via…

Read More Read More

OpenStack, Setting up a Local Repository for an Isolated Fuel Deployment

OpenStack, Setting up a Local Repository for an Isolated Fuel Deployment

Set up a local repository updated: 2016/09/21 Contents About the fuel-createmirror script Fuel downloads the OpenStack and operating system packages from the predefined repositories on the Fuel Master node. If your Fuel Master node does not have an Internet connection, you must configure a local repository mirror with the required packages and configure Fuel to use this repository. You can set up a local repository in the Fuel web UI or through Fuel CLI using the fuel-createmirror script. To set…

Read More Read More

OpenStack Environment Architecture

OpenStack Environment Architecture

OpenStack Environment Architecture Fuel deploys an OpenStack Environment with nodes that provide a specific set of functionality. Beginning with Fuel 5.0, a single architecture model can support HA (High Availability) and non-HA deployments; you can deploy a non-HA environment and then add additional nodes to implement HA rather than needing to redeploy the environment from scratch. The OpenStack environment consists of multiple physical server nodes (or an equivalent VM), each of which is one of the following node types: Controller:…

Read More Read More

Mounting NFS Volumes in Linux using mount or /etc/fstab

Mounting NFS Volumes in Linux using mount or /etc/fstab

What a Linux hodge-podge… Command Line approach 19.2. NFS Client Configuration NFS shares are mounted on the client side using the mount command. The format of the command is as follows: mount -t <nfs-type> -o <options><host>:</remote/export></local/directory> Replace <nfs-type> with either nfs for NFSv2 or NFSv3 servers, or nfs4 for NFSv4 servers. Replace <options> with a comma separated list of options for the NFS file system (refer to Section 19.4, “Common NFS Mount Options” for details). Replace <host> with the remote host, </remote/export>…

Read More Read More

Increasing the size of an aggregate on NetApp

Increasing the size of an aggregate on NetApp

You can add disks or array LUNs to an aggregate so that it can provide more storage to its associated volumes. If you need to add enough storage to a 32-bit aggregate to increase its size beyond 16 TB, you can do so; this operation expands the aggregate to 64-bit format. Before you begin You must understand the following concepts: The requirement to add disks or array LUNs owned by the same system For aggregates composed of disks: Benefits of…

Read More Read More

Configuring Linux Samba (SMB) – How to Setup Samba (Linux Windows File Sharing)

Configuring Linux Samba (SMB) – How to Setup Samba (Linux Windows File Sharing)

Configuring Linux Samba (SMB) – How to Setup Samba (Linux Windows File Sharing) Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or SMB. For working with such shared resources over a network consisting of Windows systems, an RHEL system must support SMB. The technology used for this is called SAMBA. This provides integration between the Windows and Linux systems. In addition, this is used to provide folder…

Read More Read More

Linux VI Command Editor

Linux VI Command Editor

Starting and Ending VI Starting VI vi filename Edits filename vi -r filename Edits last save version of filename after a crash vi + n filename Edits filename and places curser at line n vi + filename Edits filename and places curser on last line vi +/string filename Edits filename and places curser on first occurance of string vi filename file2 … Edits filename, then edits file2 … After the save, use :n Ending VI ZZ or :wq or 😡…

Read More Read More

Docker on Red Hat Enterprise Linux

Docker on Red Hat Enterprise Linux

Red Hat Enterprise Linux Docker is supported on Red Hat Enterprise Linux 7. This page instructs you to install using Docker-managed release packages and installation mechanisms. Using these packages ensures you get the latest release of Docker. If you wish to install using Red Hat-managed packages, consult your Red Hat release documentation for information on Red Hat’s Docker support. Prerequisites Docker requires a 64-bit installation regardless of your Red Hat version. Docker requires that your kernel must be 3.10 at…

Read More Read More

Linux CHMOD File Permission Secret Coding from the 1970s

Linux CHMOD File Permission Secret Coding from the 1970s

CHEATER CALCULATOR — > http://chmod-calculator.com/ chmod owner|group|world filename Numeric equivalents (octal) based on the table below: 4 read (r) 2 write (w) 1 execute (x) Practical Examples: chmod 400 mydoc.txt read by owner chmod 040 mydoc.txt read by group chmod 004 mydoc.txt read by everyone chmod 200 mydoc.txt write by owner chmod 020 mydoc.txt write by group chmod 002 mydoc.txt write by everyone chmod 100 mydoc.txt execute by owner chmod 010 mydoc.txt execute by group chmod 001 mydoc.txt execute by…

Read More Read More

Recover a forgotten root password on Redhat 7 Linux system

Recover a forgotten root password on Redhat 7 Linux system

Recover a forgotten root password on Redhat 7 Linux Selinux system The way on how you can reset a forgotten root password on a Linux system have not changed for many years. Resetting a root password on RHEL7 Linux system have not change much except that now we deal with SElinux and the system is now using systemd instead of init. Nevertheless, those who have already did reset root password on the Linux system will be with the following steps…

Read More Read More