Advanced Search
Search Results
57 total results found
SystemCtl Usage
Below is a list of commonly used systemd commands. If you are needing to configure a binary as a linux service, see this: Ubuntu Service Creation Reload Systemd Units Each time you edit a systemd unit file, you must tell systemd to reload changes.To reload ...
Ubuntu Service Creation (Systemd)
Below are instructions on how to setup a binary as a linux service. For additional systemd commands, see this: SystemCtl Usage Service Creation Here are steps to run a binary as a linux service. Create a systemd unit file for the service by generating a fi...
UFW and Docker
When running containers in Docker, you will come across the need for a container to gain access to a resource on the host.If you have UFW firewall enabled, you will need to allow ingress from the docker network, running on the host. To identify the docker net...
Postgres: Troubleshooting Remote Access
Here's steps to work through, to ensure remote access to a PostgreSQL instance. Check PostgreSQL is Listening on All Interfaces From a terminal, open the postgresql.conf file, with this: sudo nano /etc/postgresql/<version>/main/postgresql.conf NOTE: Replac...
HowTo: Install PostGreSQL
Adapted steps from here: https://www.c-sharpcorner.com/article/crud-operations-in-postgresql-with-ef-core-and-asp-net-core-web-api/ https://documentation.ubuntu.com/server/how-to/databases/install-postgresql/index.html Download PostgreSQL can be downloaded...
Postgres Commands
Access Postgres as SuperUser Use this terminal command to access the local PostgreSQL instance as the postgres user: sudo -u postgres psql Setting Postgres (Superuser) Password Normally, the postgres user (superuser) does NOT have a set password.This is be...
How to Get Host SSH Key Fingerprints
Here’s a short command line statement that will fetch the host ssh key fingerpring without authenticating with it: ssh-keyscan host | ssh-keygen -lf - Here’s another way to clean up ssh host key fingerprints: # remove any old fingerprints for the host ssh-...
Creating SSH Keys in Windows
General Notes SSH keys can be easily generated in Windows, using PuttyGen. See this article for an update based on obsolete SHA-1 RSA key usage: Ubuntu 22.04 SSH the RSA key isn't working since upgrading from 20.04 Based on the obsolescence of RSA keys in U...
SSH Key Naming Convention
This page describes a good naming convention for SSH keys, that makes them easier to track, rotate, and revoke. You should use this naming convention for the filename of keys.And as well, use the same convention when populating the the comment field of each k...
Creating SSH Keys in Linux
Creating an SSH key is straightforward on a linux client, using this command: ssh-keygen By default recent versions of ssh-keygen will create a 3072-bit RSA key pair, which is secure enough for most use cases (you may optionally pass in the -b 4096 flag to c...
Linux: Allow User to Skip Sudo Challenge
When scripting command line work, you will come across the need to respond to sudo challenges, to execute commands that require elevation, if not running as root. You can choose to pass the user's password as stdinput, using the command line gymnastics at the...
Linux: Shell Appearance
If you ever log into a linux host, and the command prompt has only a '$', and there is no scrollable command history, then the shell may not be set to bash. Shell Assignment You can check what shell is assigned to the user with this: getent passwd username ...
Managed Host User Setup
For hosts that will be managed by Ansible, or some other automated method, the host will need a user account with proper access. Follow these steps to setup the account and access. NOTE: This page assumes that SSH server is setup.And, that the firewall rules...
Linux: Missing .SSH Folder
When creating a new linux user, the system may not create a .ssh folder in the user profile, by default. This creates a little complexity as the permissions are a bit picky. Here are steps to do so. NOTE: Replace 'username' with the target user. Create the...
Cleaning up Ansible Temp Folders
As Ansible playbooks run, some will fail to cleanup temp folders on the Ansible server. Since the temp folder for most Ansible jobs is configured as '/home/glwhite/Desktop', this will cause an accumulation of folders in that user's Desktop. The folders are n...
Ansible Commands Cheat Sheet
Here’s a list of common ansible commands… Read through this DevOps book pdf for getting Docker and Ansible to work together: https://bjpcjp.github.io/pdfs/devops/ansible-docker.pdf Host Setup Host Setup Playbook This playbook will do basic setup of common ...
HowTo Configure IIS Reverse Proxy
How to configure reverse proxy on Windows IIS
Adding a HSM Token to a VM
There are a couple of issues when using a SafeNet token from inside a VSphere virtual machine. USB Controller First, we must have a v3.0 USB controller configured for the virtual machine. A v2.0 USB controller has been tried, and not worked.If both v2.0 and ...
Code Signing Cert Setup
Each time you receive a new code signing certificate on a USB eToken, there are steps to perform and information to collect, so it can be utilized in an automated build pipeline. There is little comprehensive documentation available on the web, for how to eas...
Linux VM Provisioning
Here are some steps that need to be done when creating a VM template that will be used multiple times: Template Usage See this page to setup a deployed instance from a template VM: Ubuntu Host Setup References Here’s a good reference for template generatio...