System Administration
Linux
Linux: Impersonating Users
NOTE: This page was created to generalize the technique of impersonating a system account that ha...
Installing Node.js on Ubuntu
This page shows how to install Node.js on an Ubuntu 22 host. It only shows how to install a sing...
Ubuntu 22: Removing Existing Node.js
Ubuntu 22 comes with an existing version of node.js, v12, that is difficult to upgrade. This is ...
OpnSense Notes
Here’s a collection of notes and details for the house router setup. Build Software: OpnSense 2...
Supermicro Fan Problems
If you are running Noctua cooling fans in your PC and the PC is cycling fans up and down, then it...
Supermicro Fan Scripting
Some references: https://www.truenas.com/community/threads/script-hybrid-cpu-hd-fan-zone-control...
HowTo Retrieve Key and Cert from PFX
Here’s a good article on how to export SSL certificates, extract the key and certificate, and imp...
Linux Disk Usage
Linux has a few means to analyze a disk for space usage. One way, is a package called, ncdu. It...
Creating SSH Keys in Linux
Creating an SSH key is straightforward on a linux client, using this command: ssh-keygen By def...
Kali in VMWare
Here are some things for installing Kali in a VMWare VM. Adapted from here: https://www.kali.org...
Create PFX Cert File (for IIS)
Windows IIS requires a pfx file when importing an SSL certificate. This can be created from a cr...
Docker Space Full
Here are some things to check on when the disk on a docker host gets full. sudo docker system pr...
Windows
Generate SSL Cert
Here’s some steps on how to generate and setup an SSL certificate for a web site. First, ord...
Converting PEM to crt and key
If you receive pem formatted certificate and key files from a CA registrar, you will need to conv...
Convert SSL PFX for NGINX Usage
NGINX doesn’t natively use a pfx key file (pfx is what Windows IIS needs). So, it must be convert...
NTP Server
Here are some useful commands when running a GPS-disciplined NTP server. See this page for the l...
WSL Setup
In case it’s necessary to use Windows Subsystem for Linux, here’s a good tutorial on how to get i...
RunDeck Backups
Adapted from here: https://docs.rundeck.com/docs/administration/maintenance/backup.html We will ...
Ubuntu Service Creation (Systemd)
Below are instructions on how to setup a binary as a linux service. For additional systemd comma...
SystemCtl Usage
Below is a list of commonly used systemd commands. If you are needing to configure a binary as a...
UFW and Docker
When running containers in Docker, you will come across the need for a container to gain access t...
Docker Commands
Here’s a list of commands to remember for docker administration. List Containers To list all do...
SSH Keys
SSH Key Naming Convention
This page describes a good naming convention for SSH keys, that makes them easier to track, rotat...
How to Get Host SSH Key Fingerprints
Here’s a short command line statement that will fetch the host ssh key fingerpring without authen...
Creating SSH Keys in Windows
General Notes SSH keys can be easily generated in Windows, using PuttyGen. See this article for...
Authenticating to Linux Server with SSH Keys
Once you have configured the server with SSH key authentication, you can follow this to attempt c...
Linux: Disabling Password Authentication
Once you have confirmed that you have SSH key access to a Linux host (using SSH without a passwor...
Adding SSH Keys with ssh-copy-id
If you are attempting to add an SSH key (to a Linux host), from another Linux host, you can use a...
Adding SSH Keys with CAT
Here's a quick and dirty way to upload SSH keys to a remote user account, using the CAT command. ...
Linux SSH Key Management
See this article for an update based on obsolete SHA-1 RSA key usage: Ubuntu 22.04 SSH the RSA ke...
Linux VM Provisioning
Here are some steps that need to be done when creating a VM template that will be used multiple t...
Linux: Allow User to Skip Sudo Challenge
When scripting command line work, you will come across the need to respond to sudo challenges, to...
Linux: Missing .SSH Folder
When creating a new linux user, the system may not create a .ssh folder in the user profile, by d...
Linux: Shell Appearance
If you ever log into a linux host, and the command prompt has only a '$', and there is no scrolla...
Managed Host User Setup
For hosts that will be managed by Ansible, or some other automated method, the host will need a u...
HowTo Configure IIS Reverse Proxy
How to configure reverse proxy on Windows IIS
How to Add Root CAs to Ubuntu
Reference: https://ubuntu.com/server/docs/install-a-root-ca-certificate-in-the-trust-store Insta...
Ubuntu Server Setup
Ubuntu Host Setup
Here are the minimal steps to setup a clean Ubuntu VM. Note: These instructions are tested on on...
Ubuntu: Setup SSH Server
Here are steps to setup the SSH server on an Ubuntu host. Here's a good reference article for ho...
Ubuntu: Setup Static IP Address
Here are notes and steps to assign a static IP address for an Ubuntu host. These steps are known...
Ubuntu: Set Hostname
Here are steps to properly set the hostname of an Ubuntu server. HostnameCtl Get the current ho...
Linux: Manually Installing SSH Keys
Here's some steps on how to manually install SSH public keys in a host. 1. SSH Key Folder Navig...
How to Setup SSH Key Authentication to Linux
This how to consolidates several aspects of setting up SSH key access to a Linux server. NOTE: W...
SSRS
SSRS: Export Reports Without WebPortal
If you’re trying to export all the RDL, data sources, gif, and other files of a set of reports, b...
SSRS Links
How to Customize the SSRS Report Viewer: https://github.com/MagnusJohansson/CustomSSRSReportViewe...
SSRS Server Pages
This is a bunch of rolling notes for SSRS. Web Portal URL The standard Web portal UI is here: h...
SSRS SSL Certificates
Here's some notes on how to add an SSL certificate to SSRS. Certificate Conversion When importi...
Code Signing Token Setup
Connecting to SSH Server from Windows
Here’s a list of steps to connect with an SSH server from a Windows PC using SSH key authenticati...
HashiCorp Vault
Generate Certificates with Hashicorp Vault
Here are steps to generate SSL certificates using HashiCorp Vault as an Intermediate CA. NOTE: B...
Hashicorp Vault Setup
Here are steps for setting up a secrets store using Hashicorp Vault, on Ubuntu 24. References L...
Clustering HashiCorp Vault
Here are special instructions for setting up a vault cluster. NOTE: See the regular setup page f...
HashiCorp Vault Cluster Unseal
These steps are for a new vault cluster that has been configured and started up, but is in an uns...
Vault Wrapping Tokens
When creating access tokens for HashiCorp Vault, you always want to prevent them from falling int...
Vault Token Administration
Here are notes on access token administration. Be sure that you've already setup an administrati...
Vault Single-Node Unseal
Here are instructions on how to unseal a single-node vault cluster. Vault CLI Comms For the vau...
Vault Administrative Setup
Once you have a vault instance or cluster unsealed, you can setup auditing, and administrative po...
Vault as Root CA
Here are steps you can follow to setup a vault instance as a Root CA. NOTE: This page assumes th...
Vault as Intermediate CA
Here are instructions for setting up a vault instance as an Intermediate CA. NOTE: This page ass...
Handling Vault Node Restart
Each time a Vault node restarts, you will have to unseal it, so that it can participate in the cl...
Local GPS NTP Time Server
Accessible at: 192.168.1.12Project files stored here: “\\192.168.1.11\zfs_mirror3\Projects\Dorman...
Ubuntu: Use Private NTP Server
Status For hosts in isolated VLANS, we provide access to a local NTP server, via firewall rules....
NGINX: Deploy SSL Certificate
Here's quick instructions for deploying an SSL key/cert pair to an NGINX instance. NOTE: These s...