This article shows the correct settings to use for running a Ubuntu Linux virtual machine on the Synology NAS. The default settings wont work, but with a few adjustments, you can easily run Ubuntu Linux virtualization on a Synology NAS. The virtual machine manager settings windows should look similar to
Read moreLatest Articles
Restore Files From Hyper Backup S3 Bucket (A Disaster Recovery Test)
The Synology Hyper Backup software is great for creating scheduled backup tasks, but there is basically no guide or documentation on how to do a DR test. Essentially, when doing a DR test, we want to know it’s out-of-band and not going to interrupt production system, and can simulate a
Read moreBackup vTigerCRM on Synology (MySQL / MariaDB)
Synology include the vTiger CRM suite as a plugin/add-on. They didn’t include a backup solution though. This how-to described how to backup the vTiger CRM database. The idea is to dump the database regularly, into a place that some other backup process includes. For example, if you have a “Shared
Read moreTerraform – Creating a VPC with an EC2 (With Examples)
This article shows how to create an ec2 in a VPC with an Internet Gateway, Subnet, Route Table and Security Gateway, in AWS. See our “Getting started with Terraform” article for basic information about getting started with Terraform and voiding issues. The Terraform manifest “main.tf” file looks like the following.
Read moreTerraform – Getting Started – The Important Details You Need To Know
This article guides you through the process of installing Terraform, and running Terraform on your AWS environment for the first time. There’s plenty you need to know to prevent destroying your (or someone else’s) network and resources. I’ve added those issues and solutions to the bottom of this article. Install
Read moreCybersecurity Staff Training Session – Part 1
Welcome to the first part of the AGIX Cybersecurity training course. This course is focused on staff related matters. Cybersecurity relates to people as much as organisations, and as such we’ll ensure home and work perspectives are covered. We discuss the methods and solutions, and we discuss what to look
Read moreCybersecurity Staff Training Session – Part 2
Welcome to the second part of the AGIX Cybersecurity training course. This course is focused on staff related matters. Organisationsare under constant attack. Some attacks are “testing the water” while others are organized, local and effective. Organisations are constantly defending against cyber-threats. Targets All organisations are targets: Online businesses. Physical
Read moreInstall PostgreSQL, Create a User/Role, Create a DB, Backup a DB, and Restore a DB
This article walks you through the process of installing PostgreSQL, creating a user, backing up a database and restoring a database. In this tutorial, we’re using Ubuntu, but the commands are the same for everything except the installation. Install PostgreSQL on Ubuntu: apt install postgresql postgresql-contrib systemctl start postgresql ufw
Read moreAnsible Errors When Installing Red Hat Ansible Automation Platform 2.1.0-1
While building an Ansible playbook to install Red Hat Ansible Automation Platform, I stumbled across an interesting issue. I was executing Ansible from the target system (this is not the norm). I am not 100% sure on the cause of the issue but believe it’s something to do with the
Read moreInstalling Redhat Ansible Automation Platform
This article holds my notes from when I recently tested the Redhat Ansible Automation Platform. I’ve included answers to the questions I had at the start and during my effort to install the system. You need to install this on a Redhat Enterprise Linux v8.4 server, or newer. You don’t
Read more