Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

57 total results found

SystemCtl Usage

System Administration

Below is a list of commonly used systemd commands. If you are needing to configure a binary as a linux service, see this: Ubuntu Service Creation Reload Systemd Units Each time you edit a systemd unit file, you must tell systemd to reload changes.To reload ...

Administration
Linux
systemd

Ubuntu Service Creation (Systemd)

System Administration

Below are instructions on how to setup a binary as a linux service. For additional systemd commands, see this: SystemCtl Usage Service Creation Here are steps to run a binary as a linux service. Create a systemd unit file for the service by generating a fi...

Linux
Administration
systemd

UFW and Docker

System Administration

When running containers in Docker, you will come across the need for a container to gain access to a resource on the host.If you have UFW firewall enabled, you will need to allow ingress from the docker network, running on the host. To identify the docker net...

Administration
Linux
docker

Postgres: Troubleshooting Remote Access

PostgreSQL

Here's steps to work through, to ensure remote access to a PostgreSQL instance. Check PostgreSQL is Listening on All Interfaces From a terminal, open the postgresql.conf file, with this: sudo nano /etc/postgresql/<version>/main/postgresql.conf NOTE: Replac...

database
postgres
Administration

HowTo: Install PostGreSQL

PostgreSQL

Adapted steps from here: https://www.c-sharpcorner.com/article/crud-operations-in-postgresql-with-ef-core-and-asp-net-core-web-api/ https://documentation.ubuntu.com/server/how-to/databases/install-postgresql/index.html Download PostgreSQL can be downloaded...

postgres
database
Administration

Postgres Commands

PostgreSQL

Access Postgres as SuperUser Use this terminal command to access the local PostgreSQL instance as the postgres user: sudo -u postgres psql Setting Postgres (Superuser) Password Normally, the postgres user (superuser) does NOT have a set password.This is be...

database
postgres
Administration

How to Get Host SSH Key Fingerprints

System Administration SSH Keys

Here’s a short command line statement that will fetch the host ssh key fingerpring without authenticating with it: ssh-keyscan host | ssh-keygen -lf - Here’s another way to clean up ssh host key fingerprints: # remove any old fingerprints for the host ssh-...

Administration
SSH

Creating SSH Keys in Windows

System Administration SSH Keys

General Notes SSH keys can be easily generated in Windows, using PuttyGen. See this article for an update based on obsolete SHA-1 RSA key usage: Ubuntu 22.04 SSH the RSA key isn't working since upgrading from 20.04 Based on the obsolescence of RSA keys in U...

SSH
Administration

SSH Key Naming Convention

System Administration SSH Keys

This page describes a good naming convention for SSH keys, that makes them easier to track, rotate, and revoke. You should use this naming convention for the filename of keys.And as well, use the same convention when populating the the comment field of each k...

SSH
Administration

Creating SSH Keys in Linux

System Administration

Creating an SSH key is straightforward on a linux client, using this command: ssh-keygen By default recent versions of ssh-keygen will create a 3072-bit RSA key pair, which is secure enough for most use cases (you may optionally pass in the -b 4096 flag to c...

SSH
Administration
Linux

Linux: Allow User to Skip Sudo Challenge

System Administration

When scripting command line work, you will come across the need to respond to sudo challenges, to execute commands that require elevation, if not running as root. You can choose to pass the user's password as stdinput, using the command line gymnastics at the...

Administration
Linux
sudo

Linux: Shell Appearance

System Administration

If you ever log into a linux host, and the command prompt has only a '$', and there is no scrollable command history, then the shell may not be set to bash. Shell Assignment You can check what shell is assigned to the user with this: getent passwd username ...

Administration
Linux

Managed Host User Setup

System Administration

For hosts that will be managed by Ansible, or some other automated method, the host will need a user account with proper access. Follow these steps to setup the account and access. NOTE: This page assumes that SSH server is setup.And, that the firewall rules...

Linux
ansible
Administration
deployment

Linux: Missing .SSH Folder

System Administration

When creating a new linux user, the system may not create a .ssh folder in the user profile, by default. This creates a little complexity as the permissions are a bit picky. Here are steps to do so. NOTE: Replace 'username' with the target user. Create the...

Administration
Linux

Cleaning up Ansible Temp Folders

HowTo Ansible

As Ansible playbooks run, some will fail to cleanup temp folders on the Ansible server. Since the temp folder for most Ansible jobs is configured as '/home/glwhite/Desktop', this will cause an accumulation of folders in that user's Desktop. The folders are n...

ansible
Administration
deployment
Linux

Ansible Commands Cheat Sheet

HowTo Ansible

Here’s a list of common ansible commands… Read through this DevOps book pdf for getting Docker and Ansible to work together: https://bjpcjp.github.io/pdfs/devops/ansible-docker.pdf Host Setup Host Setup Playbook This playbook will do basic setup of common ...

deployment
Administration
ansible

HowTo Configure IIS Reverse Proxy

System Administration

  How to configure reverse proxy on Windows IIS

Administration
infrastructure
windows

Adding a HSM Token to a VM

System Administration Code Signing Token Setup

There are a couple of issues when using a SafeNet token from inside a VSphere virtual machine. USB Controller First, we must have a v3.0 USB controller configured for the virtual machine. A v2.0 USB controller has been tried, and not worked.If both v2.0 and ...

SafeNet
HSM
Administration

Code Signing Cert Setup

System Administration Code Signing Token Setup

Each time you receive a new code signing certificate on a USB eToken, there are steps to perform and information to collect, so it can be utilized in an automated build pipeline. There is little comprehensive documentation available on the web, for how to eas...

Administration
deployment
programming

Linux VM Provisioning

System Administration

Here are some steps that need to be done when creating a VM template that will be used multiple times: Template Usage See this page to setup a deployed instance from a template VM: Ubuntu Host Setup References Here’s a good reference for template generatio...

Administration
deployment
Linux
ubuntu