Record your terminal session and share recorded session with friends. :- http://showterm.io
Posts
Kubernetes with UI installation on Ubuntu 14.04
- Get link
- X
- Other Apps
Kubernetes with UI over Docker 1. Install prerequisite software packages on both $apt-get update $apt-get install ssh curl vim 2. Docker installation sudo apt-get update sudo apt-key adv --keyserver hkp://p80.pool.sks-keyservers.net:80 --recv-keys 58118E89F3A912897C070ADBF76221572C52609D touch /etc/apt/sources.list.d/docker.list echo deb https://apt.dockerproject.org/repo ubuntu-trusty main > /etc/apt/sources.list.d/docker.list sudo apt-get update sudo apt-get purge lxc-docker sudo apt-cache policy docker-engine sudo apt-get install docker-engine -y 3.ssh-keygen -t rsa 4.Copy the ssh id_rsa key locally /// optional for passwordless auth $ ssh-copy-id -i /root/.ssh/id_rsa.pub 127.0.0.1 5. In case this command fails please use this alternative solution in order to add the key //optional $ cat /root/.ssh/id_rsa.pub >> /root/.ssh/authorized_keys 6.Validate the password-less ssh-login // optional passwordless auth test $
Pnp4Nagios installation and configuration on nagios4
- Get link
- X
- Other Apps
PNP4Nagios // we assume you have already install nagios core Part 1. installation of pnp4nagios We start with the simplest. We download the latest available version of pnp4nagios, in our case 0.6.24, unpack, compile and activate the service. Prerequisite software required - rrdtool - librrds-perl - g++ - php5-cli - php5-gd - libapache2-mod-php5 tar zxvf pnp4nagios-0.6.24.tar.gz cd pnp4nagios-0.6.24 ./configure make all make fullinstall To check pnp4nagios http://localhost/pnp4nagios/ We must remove the following file if we have the pnp4nagios: rm -rf /usr/local/pnp4nagios/share/install.php Part 2. Edit nagios.cfg This is the most complicated part, we need to edit the file and add the following lines indicated. We begin with the main configuration file for Nagios, where besides adding the lines look for the "process_performance_data" parameter and will equal 1. vi /usr/local/
Configurations Sftp server chroot (sftp chroot)
- Get link
- X
- Other Apps
Note:- · need to open port or disabled iptables. · Selinux need to disabled 1. Create a New Group Create a group called sftpusers. Only users who belong to this group will be automatically restricted to the SFTP chroot environment on this system. # groupadd sftpusers 2. Create Users (or Modify Existing User) Let us say you want to create an user guestuser who should be allowed only to perform SFTP in a chroot environment, and should not be allowed to perform SSH. The following command creates guestuser, assigns this user to sftpusers group, make /incoming as the home directory, set /sbin/nologin as shell (which will not allow the user to ssh and get shell access). # useradd -g sftpusers -d /incoming -s /sbin/nologin guestuser # passwd guestuser Verify that the user got created properly. # grep guestuser /etc/passwd guestuser:x:500:500::/incoming:/sbin/nologin If you want to modify an existing user and make him an sftp user only