May 16, 2016 / / Linux Tips
May 5, 2016 / / Linux Tips
April 8, 2016 / / HowTo Guide
April 7, 2016 / / HowTo Guide
April 5, 2016 / / Linux Tips
March 28, 2016 / / Linux Tips
March 28, 2016 / / Linux Tips
March 28, 2016 / / Linux Tips

Linux’s ext2/ext3 filesystem uses UUID

UUID benefits

As a sesonded UNIX admin I have to deal with various data storage technologies such as SAN, iSCSI, DAS, scsi disks volumes. Sometime you may need to move storage from one device to another and updating /etc/fstab can be pain in a$$. With UUID Linux kernel should automatically find and map (read as mount to exact location) volumes to storage device. This saves lots of time and avoid /etc/fstab breaks.

  Read the Post Finding UUID to Identify Partitions

March 13, 2016 / / Learning Linux
The hostnamectl tool is provided for administering the three separate classes of host names in use on a given system.

View All the Host Names

To view all the current host names, enter the following command:

~]$ hostnamectl status

The status option is implied by default if no option is given.

Read the Post Set Host name in rhel7

March 13, 2016 / / HowTo Guide
March 13, 2016 / / Linux Tips
February 23, 2016 / / Linux Tips

How do I find the largest top files and directories on a Linux or Unix like operating systems?

Sometime it is necessary to find out what file(s) or directories are eating up all your disk space. Further, it may be necessary to find out it at the particular location such as /tmp or /var or /home.

Read the Post Find Largest files on Linux System

February 21, 2016 / / HowTo Guide

Security is an incredibly complex problem when administering online servers. While it is possible to configure firewalls, fail2ban policies, secure services, and lock down applications, it is difficult to know for sure if you have effectively blocked every attack.

A host-based intrusion detection system (HIDS), works by collecting details about your computer’s filesystem and configuration. It then stores this information to reference and validate the current state of the system. If changes are found between the known-good state and the current state, it could be a sign that your security has been compromised.

Read the Post Installing Tripwire

February 21, 2016 / / Technology News

ElasticSearch is flexible and powerful open source, distributed real-time search and analytic engine. Using a simple set of APIs, it provides the ability for full-text search. Elastic search is freely available under the Apache 2 license, which provides most flexibility.

This article will help you for configuring ElasticSearch Multi Node Cluster on CentOS, RHEL, Ubuntu and Debian Systems. In ElasticSearch multi node cluster is just configuring multiple single node clusters with same cluster name in same network.

Read the Post ElasticSearch Clustering setup

February 21, 2016 / / Linux Tips

About crontab

The crontab is a list of commands that you want to run on a regular schedule, and also the name of the command used to manage that list.

crontab stands for “cron table,” because it uses the job scheduler cron to execute tasks;cron itself is named after “chronos,” the Greek word for time.

Read the Post Lets look at CronTab

February 21, 2016 / / Linux Tips

How to install FFmpeg on Ubuntu 14.04

FFmpeg has been removed from Ubuntu 14.04 and was replaced by Libav. This decision has been reversed so that FFmpeg is available now in Ubuntu 15.04 again, but there is still no official package for 14.04. In this tutorial, I will show you how to install FFmpeg from mc3man ppa.

Read the Post Converting MP3 to Asterisk PBX recordings

February 16, 2016 / / HowTo Guide

There are many reasons why you would want to configure Postfix to send email using an external SMTP provider such as Google Apps (Gmail), Mandrill, SendGrid, Amazon SES, or any other SMTP server. One reason is to avoid getting your mail flagged as spam if your current server’s IP has been added to a spam list.

In this tutorial, you will learn how to install and configure a Postfix server to send email through Google Apps, Mandrill, or SendGrid.

Read the Post Setting up Postfix relay

February 16, 2016 / / Linux Tips

Sending mail can be accomplished by a number of programs on a linux system. Here are a few examples provided you have already setup postfix relay services on your server. Then you have to configure it, and once you have done that, you can send email like this:

Read the Post Sending eMail from Terminal

February 1, 2015 / / HowTo Guide

GNS3 team has done a great job in stabilizing the ASA implementation.

On the new version1.2.1 they have already set all default options (kernel command and Qemu options) to the best possible set that is out there( which you see below).

And they have also stabilized the cpu utilization issue with ASA by integrating cpulimit and given you an option to choose for the Qemu process priority and cpu % allocation.

So you’ve got most of your work cut out.

Read the Post ASA Install GNS3

January 27, 2015 / / HowTo Guide

This guide explains how to configure PXE server in Ubuntu 14.10 PXE Server, stands for preboot execution environment, is used to enable a network computer to boot only from a network interface card. This method will be very helpful, if a System Administrator wants to install many systems which doesn’t have a CD/DVD device on the network. PXE environment needs a DHCP server that distributes the IP addresses to the client systems, and a TFTP server that downloads the installation files to the PXE clients. You don’t need any CD/DVD or USB bootable drives to install client systems. Just, copy the ISO images on the PXE server and start installing your Linux clients via network using PXE server.

Read the Post Ubuntu 14.10 PXE server installation

January 27, 2015 / / Linux Tips

Cat, Grep and Tail are the commands that truly set Linux based syslog servers apart from one running on windows. Don’t get me wrong, there are other decent alternatives but it’s hard to beat a typed command and an instant result.

Read the Post Tail Cat and Grep Your Log Files

January 12, 2015 / / HowTo Guide
Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It’s based on Ubuntu and contains Snort, Suricata, Bro, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!

Read the Post Evaluate Security Onion on Ubuntu 12.04

November 19, 2014 / / HowTo Guide
  • Generate a single alert when something goes wrong. Don’t spam.
  • Be able to alert on both volume of a particular message or lack thereof
  • If alerting on lack thereof, alert even if there was 0 messages during the period

I started with the throttle filter but felt the use case I wanted to use was a bit different than that filter was intended to do. I used it’s code as a base for this filter. Disclaimer: This is my first attempt at Ruby, so I am sure it is quite rough code wise.

Read the Post Adding Alert to Logstash

November 19, 2014 / / Linux Tips
November 19, 2014 / / HowTo Guide

I was recently asked if it was possible to forward vCenter Server logs to a regular syslog server and if so, how difficult would it be to setup? I had researched this topic several years back, but did not find an ideal solution as vCenter Server was only available on the Windows platform and vCenter Server itself did not provide any syslogging capabilities. With the release of vSphere 5.0, VMware introduced the VCSA (vCenter Server Appliance) and realized I never revisited this question for the VCSA.
Read the Post vCenter Syslog setup

November 17, 2014 / / Linux Tips

Most of web-based application development todays were developed using database. The most popular one is using PHP and MySQL. When developing using MySQL most of beginners were using phpMyAdmin as their power tools in database CRUD (Create-Read-Update-Delete) as well as databases/tables creation and manipulation.

PhpMyAdmin supports encryption feature which enables database developers to raise their application security bar in database. In order to use encryption feature in PHP, phpMyAdmin need a PHP library called mcrypt to be enabled. If it is not already installed during php installation, then you have to enabled it on php.ini either manually or automagically

Read the Post Easy Install PHP Mcrypt Extension on Ubuntu Linux

November 17, 2014 / / HowTo Guide

If you have shell or telnet access to your web server, you can backup your MySQL data by using the mysqldump command. This command connects to the MySQL server and creates an SQL dump file. The dump file contains the SQL statements necessary to re-create the database. Here is the proper syntax:

Read the Post Backing up mysql using mysqldump

November 17, 2014 / / Linux Tips

How do I create a custom static HTTP 404 or HTTP 403 error page under nginx web server?

First create 404.html in your document root. The default is location is /usr/local/nginx/html/. So create a HTML file as follows:

Read the Post NGINX create custom 404 page

November 16, 2014 / / HowTo Guide
November 16, 2014 / / Linux Tips