If you have a “Work or School” Office 365 account, you’re likely able to use it as your Windows Domain service, allowing you go join your Windows 10 Pro (or higher, but not Home) to it as a domain member much like you would with an on-prem domain controller We’ll
Read moreLatest Articles
Share an EC2 AMI Image with Another AWS Account
This article demonstrates how to share an image with another AWS account. For example, you have an EC2 that needs to be moved to another AWS account. If so, this article is for you. Start by logging into the source AWS account. This is the account where the EC2
Read moreFail2Ban with MySQL Database for IP Blacklisting
This article demonstrates how to configure Fail2Ban to use a MySQL (or MariaDB, etc) as the storage repository for IP blocking records. This allow multiple Fail2Ban services (running on multiple servers) to report and use a central IP blocking repository. A little context. In this article, we’re installing everything on
Read moreCheck for Windows Updates using PowerShell
This article shows a one lines (well, 4 lines) that output any updates that are waiting to be installed on your local computer. Open PowerShell and run the following commands: $UpdateSession = New-Object -ComObject Microsoft.Update.Session $UpdateSearcher = $UpdateSession.CreateupdateSearcher() $Updates = @($UpdateSearcher.Search(“IsHidden=0 and IsInstalled=0”).Updates) $Updates | Select-Object Title The output should
Read moreGeoBlocking with Apache on CentOS and Ubuntu
This article describes how to protect your Apache web server by restricting which countries can access it. We’re using Apache on CentOS 7 but Ubuntu instructions are included and are very similar. I’ve given two examples; one on whitelisting everything except what we want to block, and blacklisting everything except
Read more2FA with SSH on Ubuntu | Google Authenticator
This article walks you through the process of enforcing 2FA on Ubuntu using the Google Authenticator. All of these steps are completed on the system that you want 2FA to be enforced on. Important notes: * SSH key-based logins bypass the 2FA component of the login verification process. * Users
Read moreAnsible To Get Linux OS Version Details
This article shows the Ansible playbook used to query target systems to get their version details. Ie, the details obtained from “/etc/*release”. — – hosts: all # remote_user: root # become: yes tasks: – debug: msg: – “ansible_distribution {{ hostvars[inventory_hostname].ansible_distribution }}” – “major version {{ hostvars[inventory_hostname].ansible_distribution_major_version }}” – “version {{
Read moreKubernetes (MicroK8s) Part 3 – Exposing Applications on Ubuntu 20.04
This article continues from Part 2 – Replica Sets and Scaling. Our objective in this article is to get an application exposed to the wider network on an IP address of the host and a port of our choice. The IP address will be “10.0.0.210” and our port of choice
Read moreKubernetes (MicroK8s) Part 2 – Replica Sets and Scaling on Ubuntu 20.04
This article continues from Part 1 – Installation and configuration. We can create a replica set (replicateset) or “rs” for short, so we can scale an application to meet demand. Create a file on the Kubernetes host called “my-rep-set.yaml” and populate it with the following: Tip: This is just an
Read moreKubernetes (MicroK8s) Part 1 – Installation on Ubuntu 20.04
This article walks you through the process of installing the minimal Kubernetes environment on Ubuntu 20.04. Kubernetes comes in two forms; a single node cluster and a multi-node cluster. In this walk through, we’ll be using the single node cluster called MicroK8s. I suggest starting with a Ubuntu 20.04 server
Read more