This document provides an overview of basic Linux administration commands and their usage. It describes commands for managing run levels and services (chkconfig), file permissions (chmod, chown), scheduling tasks (crontab), checking disk usage (df, du), memory usage (free), partitioning disks (fdisk), managing user and group accounts (groupadd, useradd) and more. Each command's syntax and examples are explained to help administrators perform common system management tasks.
This document provides a usage guide for the lsof command on RHEL 7. It describes what lsof is used for, pre-requisites, and examples of common commands to list open files by user, directory, process name, PID, network connections, and NFS files. The guide also explains how to use lsof to find processes associated with a specific file or running on a particular port.
This document provides steps to configure OpenFiler as an NFS server to share files. It involves setting up software RAID across two disks to create storage volumes, configuring network access and shares, and integrating with Active Directory for user authentication. Key steps include creating RAID arrays from disks, synchronizing and managing the RAID volumes, making volume groups, setting up NFS shares with access control, and configuring Active Directory integration.
How To View Login History and Logout History on RHEL 7VCP Muthukrishna
This document provides instructions for viewing login and logout history on RHEL 7 using the 'last' command. It describes the log files that contain login/logout information and provides examples of how to use 'last' to view specific details like a particular user's entries, logins at a certain time, system shutdown/reboot times, and failed login attempts. The 'last' command allows extracting user login/logout data from log files to audit server access and identify users.
How To Install and Generate Audit Reports in CentOS 7 or RHEL 7VCP Muthukrishna
This document provides instructions on how to install and configure auditing on CentOS 7. It describes how to install the audit packages, add and manage audit rules to monitor specific files and directories, perform searches of the audit logs, and generate various audit reports. Commands are provided to list rules, add rules to watch files and their permissions, delete rules, search the logs by criteria like file, user, or group, and produce summary reports on authentication attempts and logins. System calls are also mapped to their numeric identifiers.
Systemd is a system and service manager that replaces SystemV init. It controls and manages units like services, sockets, mounts, and targets. As the first process started by the kernel at boot, systemd coordinates the boot process and configures the environment. It aims to improve boot performance through increased parallelization by starting programs immediately and managing interdependencies asynchronously. Systemctl can be used to list, control, and query properties of systemd units and analyze the boot process.
How To Install and Configure Salt Master on UbuntuVCP Muthukrishna
This document provides instructions on how to install and configure a Salt master on Ubuntu. It includes steps to install the Salt package and PPA repository, create configuration directories, configure the firewall to allow Salt traffic, configure the minion, manage Salt services, accept the minion key on the master, and test the connection by running commands on the minion.
This document provides instructions on how to install and configure SUDO (Super User Do) on RHEL 7. It describes installing the sudo package, verifying the installation, configuring the sudoers file using the visudo editor, setting default permissions for the sudoers file, listing allowed commands for users, caching credentials, defining command privileges for users including requiring passwords or allowing passwordless access, and configuring session timeouts on a system-wide or per-user basis.
This document provides instructions for installing and configuring a TFTP server on Linux. It describes pre-requisites like package dependencies. It also details enabling the TFTP service, checking the service status, and troubleshooting issues like SELinux denials. Specific steps covered include verifying SELinux settings, modifying boolean values to allow TFTP access, and using tftp clients to connect to the server interactively and non-interactively.
This document provides a usage guide for the lsof command on RHEL 7. It describes what lsof is used for, pre-requisites, and examples of common commands to list open files by user, directory, process name, PID, network connections, and NFS files. The guide also explains how to use lsof to find processes associated with a specific file or running on a particular port.
This document provides steps to configure OpenFiler as an NFS server to share files. It involves setting up software RAID across two disks to create storage volumes, configuring network access and shares, and integrating with Active Directory for user authentication. Key steps include creating RAID arrays from disks, synchronizing and managing the RAID volumes, making volume groups, setting up NFS shares with access control, and configuring Active Directory integration.
How To View Login History and Logout History on RHEL 7VCP Muthukrishna
This document provides instructions for viewing login and logout history on RHEL 7 using the 'last' command. It describes the log files that contain login/logout information and provides examples of how to use 'last' to view specific details like a particular user's entries, logins at a certain time, system shutdown/reboot times, and failed login attempts. The 'last' command allows extracting user login/logout data from log files to audit server access and identify users.
How To Install and Generate Audit Reports in CentOS 7 or RHEL 7VCP Muthukrishna
This document provides instructions on how to install and configure auditing on CentOS 7. It describes how to install the audit packages, add and manage audit rules to monitor specific files and directories, perform searches of the audit logs, and generate various audit reports. Commands are provided to list rules, add rules to watch files and their permissions, delete rules, search the logs by criteria like file, user, or group, and produce summary reports on authentication attempts and logins. System calls are also mapped to their numeric identifiers.
Systemd is a system and service manager that replaces SystemV init. It controls and manages units like services, sockets, mounts, and targets. As the first process started by the kernel at boot, systemd coordinates the boot process and configures the environment. It aims to improve boot performance through increased parallelization by starting programs immediately and managing interdependencies asynchronously. Systemctl can be used to list, control, and query properties of systemd units and analyze the boot process.
How To Install and Configure Salt Master on UbuntuVCP Muthukrishna
This document provides instructions on how to install and configure a Salt master on Ubuntu. It includes steps to install the Salt package and PPA repository, create configuration directories, configure the firewall to allow Salt traffic, configure the minion, manage Salt services, accept the minion key on the master, and test the connection by running commands on the minion.
This document provides instructions on how to install and configure SUDO (Super User Do) on RHEL 7. It describes installing the sudo package, verifying the installation, configuring the sudoers file using the visudo editor, setting default permissions for the sudoers file, listing allowed commands for users, caching credentials, defining command privileges for users including requiring passwords or allowing passwordless access, and configuring session timeouts on a system-wide or per-user basis.
This document provides instructions for installing and configuring a TFTP server on Linux. It describes pre-requisites like package dependencies. It also details enabling the TFTP service, checking the service status, and troubleshooting issues like SELinux denials. Specific steps covered include verifying SELinux settings, modifying boolean values to allow TFTP access, and using tftp clients to connect to the server interactively and non-interactively.
This document discusses how to install, configure, and use the Automatic Bug Reporting Tool (ABRT) command line interface (CLI) on Linux. It provides instructions on installing the abrt-cli package, checking and starting the abrtd service, viewing the default ABRT configuration, enabling auto reporting, configuring SELinux for ABRT, listing dump files, and describes various ABRT CLI commands to list, report, get info on, remove, and process issues.
How To Protect SSH Access with Fail2Ban on RHEL 7VCP Muthukrishna
This document provides instructions on how to install and configure Fail2Ban on RHEL 7 to protect SSH access. It describes installing the Fail2Ban package, configuring jails and filters to monitor the SSH service logs, enabling and starting the Fail2Ban service, and viewing firewall rules and banned IP addresses. Key steps include editing /etc/fail2ban/jail.local to enable SSH monitoring, setting attributes like maxretry and findtime, and starting the Fail2Ban service to begin blocking IPs.
This document provides step-by-step instructions for installing CentOS 7 on a virtual machine. It describes pressing a key to begin installation, selecting a language, configuring installation destination and partitioning, setting up networking using DHCP, creating a root user and optional additional user, finishing installation, and rebooting. Upon first login, the document recommends verifying the IP address and disk configuration.
How To Audit Server Login and Shutdown or Reboot ActivityVCP Muthukrishna
This document provides instructions on using the "last" and "lastb" commands to audit login, reboot, and shutdown actions on a Linux server. It describes how to use last to view successful login information and shutdown/reboot details from the /var/log/wtmp file. It also explains that lastb displays failed login attempts from /var/log/btmp and has the same parameters as last.
This document discusses configuring run levels on RHEL 7/CentOS 7. It provides an overview of run levels and targets in systemd, compares traditional run levels to new target names, and describes commands to switch run levels, set defaults, power off, reboot, and halt the system.
How to Manage journalctl Logging System on RHEL 7VCP Muthukrishna
The document provides information on how to configure and use the journalctl logging system on RHEL 7. It includes details on the journald.conf configuration file such as configurable values and their purposes. It also describes various journalctl commands to list, filter and manage log entries.
How To Configure Apache VirtualHost on RHEL 7 on AWSVCP Muthukrishna
This document provides instructions on how to configure Apache virtual hosts on RHEL 7 to host multiple websites on different ports with different content folders. It includes steps to configure the Apache listen directive, create virtual host directives, set document roots and ports, create log directories, validate the configuration, and modify security settings. Sample index files are provided to demonstrate the three configured websites.
This document provides instructions for installing and configuring Apache2 on Ubuntu. It discusses updating system packages, installing Apache2 packages, starting/stopping the Apache2 service, reloading configurations, important configuration files and directories, global configuration attributes like ServerName and Listen directives, the default virtual host configuration in sites-available, virtual host directives and their purposes, defining a virtual host with directives like ServerAdmin and DocumentRoot, enabling and disabling modules and sites, and managing Apache2 modules and sites.
The document provides steps to install Openfire instant messaging server on CentOS 7. It includes downloading and installing Java, setting the hostname, installing MariaDB database, downloading and configuring Openfire, and starting the Openfire service. Troubleshooting tips are also included to address potential issues like service failures.
How to Install Configure and Use sysstat utils on RHEL 7VCP Muthukrishna
The document discusses how to install, configure, and use the sysstat utilities to generate system activity reports on Linux systems. It provides steps to install the sysstat package, enable and start the sysstat service, and configure default settings and cron jobs. It also describes the various sysstat command line tools like sar, iostat, mpstat and their options to generate CPU, memory, disk, network and other reports.
This document provides instructions for managing Linux users on Red Hat Enterprise Linux 7. It discusses user types and ID ranges, and provides examples of how to use the useradd, usermod, and userdel commands to create, modify, and delete users. Specific examples shown include creating users with different options like setting the user ID, group ID, home directory, login shell, comment, and expiry date. It also demonstrates modifying user attributes like ID, primary group, home directory, login shell, and locking/unlocking users.
This document provides instructions for installing and configuring the Chrony time synchronization daemon on Red Hat Enterprise Linux 7 systems. It describes Chrony as an alternative to NTP that can adjust the system clock more rapidly, especially for servers that are not permanently connected to the network or powered on. The document outlines pre-requisites, advantages of Chrony over NTP, package installation steps, and commands to enable, start, and check the status of the Chrony daemon.
How To Install and Configure Log Rotation on RHEL 7 or CentOS 7VCP Muthukrishna
Logrotate is used to automatically rotate, compress, and remove log files. It can be configured to run daily, weekly, or monthly, and also based on log file size. The main configuration file is /etc/logrotate.conf, and individual services are configured in files under /etc/logrotate.d/. Logrotate can be run manually with the logrotate command or automatically via cron. Options allow compressing, emailing, and moving old log files. Scripts can be used for tasks like restarting services after rotation.
This document provides steps to install and configure a VNC server on CentOS 7 to allow remote desktop connections. It describes installing the vnc-server package, configuring the service, enabling the firewall, setting passwords, and connecting with a VNC client. The key steps are: 1) Installing vnc-server, 2) Configuring a service file for each user, 3) Enabling and starting the service, 4) Opening the firewall port, 5) Setting the VNC password, and 6) Connecting with a VNC viewer using the configured password.
How To Install and Configure VSFTPD on RHEL 7 or CentOS 7VCP Muthukrishna
This document provides instructions on how to install and configure the VSFTPD file transfer protocol (FTP) server on Red Hat Enterprise Linux 7 or CentOS 7. It includes steps to install the VSFTPD package, manage the VSFTPD service, and configure options such as the data folder, anonymous user access, banners, and uploads. The document is intended to help users set up an FTP server using the VSFTPD package on RHEL/CentOS 7 systems.
This document provides instructions for installing and configuring the Gnome desktop environment on CentOS 7. It begins with pre-requisites like ensuring the system is updated. It then checks if Gnome is already installed before using YUM to install the GNOME Desktop group package. Post-installation steps include launching the GUI, configuring the system to use Gnome by default, rebooting, and verifying Gnome loads correctly.
How to Install MariaDB Server or MySQL Server on CentOS 7VCP Muthukrishna
This document provides instructions for installing MariaDB server on CentOS 7. It describes downloading and installing the mariadb-server and mariadb packages using yum. It then covers starting and enabling the mariadb daemon service, and checking its status. The final step is connecting to the server using the mysql command.
This document provides steps to install CentOS 6.3, including selecting installation type, disk partitioning, configuring network settings like hostname and DHCP, setting the root password, selecting packages, and rebooting the system to complete installation. Key steps are choosing installation media, partitioning and formatting disks, installing boot loader, and rebooting to finish.
This document provides steps to configure an Amazon EC2 load balancer with two nodes. It includes launching two EC2 instances, updating packages, configuring NTP and time synchronization, installing an Apache web server, adding content to identify each node, creating a load balancer and defining security settings, health checks, and associating the instances. The load balancer is then tested by making requests which are routed to each node, demonstrating the load balancing functionality.
How To Install and Configure Open SSH Server on UbuntuVCP Muthukrishna
This document provides instructions on how to install and configure OpenSSH server on Ubuntu. It includes steps to update the system, check if OpenSSH is already installed, install the openssh-server package if needed, verify the installation, configure the listen port to 22, start the SSH daemon, test the SSH service from localhost, and open the firewall to allow SSH connections.
This document provides instructions for using a batch script to perform DNS lookups on a range of IP addresses. It describes creating a text file with one IP address per line, then using the nslookup command in a batch script to resolve the addresses, outputting successful and failed resolutions to separate log files. The purpose is to resolve the host names for a list of IP addresses.
How To Configure FirewallD on RHEL 7 or CentOS 7VCP Muthukrishna
This document provides instructions on how to configure the FirewallD firewall on RHEL 7 or CentOS 7 systems. It describes how to manage the firewall service, add and remove firewall rules, configure zones, and lists the predefined firewall configurations.
This document discusses how to install, configure, and use the Automatic Bug Reporting Tool (ABRT) command line interface (CLI) on Linux. It provides instructions on installing the abrt-cli package, checking and starting the abrtd service, viewing the default ABRT configuration, enabling auto reporting, configuring SELinux for ABRT, listing dump files, and describes various ABRT CLI commands to list, report, get info on, remove, and process issues.
How To Protect SSH Access with Fail2Ban on RHEL 7VCP Muthukrishna
This document provides instructions on how to install and configure Fail2Ban on RHEL 7 to protect SSH access. It describes installing the Fail2Ban package, configuring jails and filters to monitor the SSH service logs, enabling and starting the Fail2Ban service, and viewing firewall rules and banned IP addresses. Key steps include editing /etc/fail2ban/jail.local to enable SSH monitoring, setting attributes like maxretry and findtime, and starting the Fail2Ban service to begin blocking IPs.
This document provides step-by-step instructions for installing CentOS 7 on a virtual machine. It describes pressing a key to begin installation, selecting a language, configuring installation destination and partitioning, setting up networking using DHCP, creating a root user and optional additional user, finishing installation, and rebooting. Upon first login, the document recommends verifying the IP address and disk configuration.
How To Audit Server Login and Shutdown or Reboot ActivityVCP Muthukrishna
This document provides instructions on using the "last" and "lastb" commands to audit login, reboot, and shutdown actions on a Linux server. It describes how to use last to view successful login information and shutdown/reboot details from the /var/log/wtmp file. It also explains that lastb displays failed login attempts from /var/log/btmp and has the same parameters as last.
This document discusses configuring run levels on RHEL 7/CentOS 7. It provides an overview of run levels and targets in systemd, compares traditional run levels to new target names, and describes commands to switch run levels, set defaults, power off, reboot, and halt the system.
How to Manage journalctl Logging System on RHEL 7VCP Muthukrishna
The document provides information on how to configure and use the journalctl logging system on RHEL 7. It includes details on the journald.conf configuration file such as configurable values and their purposes. It also describes various journalctl commands to list, filter and manage log entries.
How To Configure Apache VirtualHost on RHEL 7 on AWSVCP Muthukrishna
This document provides instructions on how to configure Apache virtual hosts on RHEL 7 to host multiple websites on different ports with different content folders. It includes steps to configure the Apache listen directive, create virtual host directives, set document roots and ports, create log directories, validate the configuration, and modify security settings. Sample index files are provided to demonstrate the three configured websites.
This document provides instructions for installing and configuring Apache2 on Ubuntu. It discusses updating system packages, installing Apache2 packages, starting/stopping the Apache2 service, reloading configurations, important configuration files and directories, global configuration attributes like ServerName and Listen directives, the default virtual host configuration in sites-available, virtual host directives and their purposes, defining a virtual host with directives like ServerAdmin and DocumentRoot, enabling and disabling modules and sites, and managing Apache2 modules and sites.
The document provides steps to install Openfire instant messaging server on CentOS 7. It includes downloading and installing Java, setting the hostname, installing MariaDB database, downloading and configuring Openfire, and starting the Openfire service. Troubleshooting tips are also included to address potential issues like service failures.
How to Install Configure and Use sysstat utils on RHEL 7VCP Muthukrishna
The document discusses how to install, configure, and use the sysstat utilities to generate system activity reports on Linux systems. It provides steps to install the sysstat package, enable and start the sysstat service, and configure default settings and cron jobs. It also describes the various sysstat command line tools like sar, iostat, mpstat and their options to generate CPU, memory, disk, network and other reports.
This document provides instructions for managing Linux users on Red Hat Enterprise Linux 7. It discusses user types and ID ranges, and provides examples of how to use the useradd, usermod, and userdel commands to create, modify, and delete users. Specific examples shown include creating users with different options like setting the user ID, group ID, home directory, login shell, comment, and expiry date. It also demonstrates modifying user attributes like ID, primary group, home directory, login shell, and locking/unlocking users.
This document provides instructions for installing and configuring the Chrony time synchronization daemon on Red Hat Enterprise Linux 7 systems. It describes Chrony as an alternative to NTP that can adjust the system clock more rapidly, especially for servers that are not permanently connected to the network or powered on. The document outlines pre-requisites, advantages of Chrony over NTP, package installation steps, and commands to enable, start, and check the status of the Chrony daemon.
How To Install and Configure Log Rotation on RHEL 7 or CentOS 7VCP Muthukrishna
Logrotate is used to automatically rotate, compress, and remove log files. It can be configured to run daily, weekly, or monthly, and also based on log file size. The main configuration file is /etc/logrotate.conf, and individual services are configured in files under /etc/logrotate.d/. Logrotate can be run manually with the logrotate command or automatically via cron. Options allow compressing, emailing, and moving old log files. Scripts can be used for tasks like restarting services after rotation.
This document provides steps to install and configure a VNC server on CentOS 7 to allow remote desktop connections. It describes installing the vnc-server package, configuring the service, enabling the firewall, setting passwords, and connecting with a VNC client. The key steps are: 1) Installing vnc-server, 2) Configuring a service file for each user, 3) Enabling and starting the service, 4) Opening the firewall port, 5) Setting the VNC password, and 6) Connecting with a VNC viewer using the configured password.
How To Install and Configure VSFTPD on RHEL 7 or CentOS 7VCP Muthukrishna
This document provides instructions on how to install and configure the VSFTPD file transfer protocol (FTP) server on Red Hat Enterprise Linux 7 or CentOS 7. It includes steps to install the VSFTPD package, manage the VSFTPD service, and configure options such as the data folder, anonymous user access, banners, and uploads. The document is intended to help users set up an FTP server using the VSFTPD package on RHEL/CentOS 7 systems.
This document provides instructions for installing and configuring the Gnome desktop environment on CentOS 7. It begins with pre-requisites like ensuring the system is updated. It then checks if Gnome is already installed before using YUM to install the GNOME Desktop group package. Post-installation steps include launching the GUI, configuring the system to use Gnome by default, rebooting, and verifying Gnome loads correctly.
How to Install MariaDB Server or MySQL Server on CentOS 7VCP Muthukrishna
This document provides instructions for installing MariaDB server on CentOS 7. It describes downloading and installing the mariadb-server and mariadb packages using yum. It then covers starting and enabling the mariadb daemon service, and checking its status. The final step is connecting to the server using the mysql command.
This document provides steps to install CentOS 6.3, including selecting installation type, disk partitioning, configuring network settings like hostname and DHCP, setting the root password, selecting packages, and rebooting the system to complete installation. Key steps are choosing installation media, partitioning and formatting disks, installing boot loader, and rebooting to finish.
This document provides steps to configure an Amazon EC2 load balancer with two nodes. It includes launching two EC2 instances, updating packages, configuring NTP and time synchronization, installing an Apache web server, adding content to identify each node, creating a load balancer and defining security settings, health checks, and associating the instances. The load balancer is then tested by making requests which are routed to each node, demonstrating the load balancing functionality.
How To Install and Configure Open SSH Server on UbuntuVCP Muthukrishna
This document provides instructions on how to install and configure OpenSSH server on Ubuntu. It includes steps to update the system, check if OpenSSH is already installed, install the openssh-server package if needed, verify the installation, configure the listen port to 22, start the SSH daemon, test the SSH service from localhost, and open the firewall to allow SSH connections.
This document provides instructions for using a batch script to perform DNS lookups on a range of IP addresses. It describes creating a text file with one IP address per line, then using the nslookup command in a batch script to resolve the addresses, outputting successful and failed resolutions to separate log files. The purpose is to resolve the host names for a list of IP addresses.
How To Configure FirewallD on RHEL 7 or CentOS 7VCP Muthukrishna
This document provides instructions on how to configure the FirewallD firewall on RHEL 7 or CentOS 7 systems. It describes how to manage the firewall service, add and remove firewall rules, configure zones, and lists the predefined firewall configurations.
How To Add DVD ISO to YUM Repository in CentOS 6VCP Muthukrishna
This document provides steps to add a CentOS 6 DVD as a YUM repository in CentOS 6. It involves mounting the DVD, creating a repository file in /etc/yum.repos.d, adding entries to the file with the name, baseurl and enabled status, and then installing packages using YUM while only enabling the media repository.
How to install and configure firewall on ubuntu osVCP Muthukrishna
This document discusses how to install and configure the Ubuntu firewall (ufw). It describes how to install the ufw package, allow/deny incoming connections by port, service, IP address or range, enable/disable the firewall at startup, and reset firewall rules to defaults.
After installing the epel-release package on CentOS 7, running yum updateinfo would hang due to a bug where DNF failed to open files in /var/cache/dnf/. Removing the epel-release package resolved the issue.
File Space Usage Information and EMail Report - Shell ScriptVCP Muthukrishna
This script generates an HTML report of the top 10 largest files and directories on a server by size and emails the report. It uses the du command to get disk usage information, sorts the results in descending order of size, and outputs the top 10 to a HTML table. The table is written to a file and emailed using sendmail to notify of disk space usage.
How To Connect Amazon AWS EC2 with Key Pair – LinuxVCP Muthukrishna
This document provides instructions for connecting to an Amazon AWS EC2 Linux instance using a key pair. It outlines downloading the key pair file, modifying its permissions, and then using it to connect via SSH either by public IP or private IP. The key steps are: 1) Identify the key pair associated with the instance; 2) Copy the private key file to the local machine; 3) Change permissions on the key file; 4) Connect using SSH and specifying the key file and either public or private IP address. Following these steps allows logging into the EC2 instance securely using the key pair.
This document provides instructions for configuring security groups on an Amazon EC2 Linux instance. It describes adding inbound rules to allow specific traffic types like SSH, HTTP, and custom TCP ports from selected IP addresses or security groups. Outbound traffic rules are by default open for all traffic to all destinations. The document also provides an example of accessing the Linux instance via SSH using its public IP address.
This document provides steps to access an Amazon EC2 Linux instance as a new user rather than the default "ec2-user". It describes generating an SSH key pair using PuTTYgen, creating a new user on the instance, copying the public key to the user's authorized_keys file, and logging in via SSH using the private key.
How to Configure Amazon AWS EC2 Elastic IP AddressVCP Muthukrishna
This document provides instructions for allocating, associating, disassociating, and releasing Amazon Elastic IP addresses. It explains that Elastic IPs allow keeping a static IP address even when an EC2 instance is stopped and restarted. The steps include launching the Elastic IPs section in the management console, allocating a new address, confirming allocation, associating the address to an EC2 instance, and later disassociating or releasing the address.
The document provides instructions for installing and configuring the AWS CLI on RHEL 7. It describes downloading and installing the AWS CLI bundle, obtaining AWS access keys from the management console, and configuring the CLI with the access keys to enable AWS commands. A sample command is also run to demonstrate the configured CLI.
How To Create EBS Snapshot and Restore EBS Snapshot – Linux InstanceVCP Muthukrishna
This document describes how to create an EBS snapshot of a Linux instance volume, restore the snapshot by creating a new volume from it, and attaching the restored volume to an instance to validate the restore process. Key steps include taking a snapshot of an EBS volume, installing the HTTPD service on the original volume, creating a new volume from the snapshot, detaching the original volume and attaching the restored volume to validate the HTTPD service is not present.
Bash Script Disk Space Utilization Report and EMailVCP Muthukrishna
This bash script generates an HTML disk usage report and emails it. It collects disk usage information using df, formats it into an HTML table, and emails the report. If disk usage exceeds 90%, the row is highlighted red and a critical alert is shown. Usage between 70-80% is highlighted orange. The report is generated daily and emailed to a recipient.
The document discusses how to use the yum interactive shell to install, remove, update, and manage packages on Linux systems where yum is installed. It describes launching the yum shell, then using commands like install, remove, update within the shell along with the run command to perform package actions and quit to exit the shell. The yum shell provides an alternate way to manage packages through interactive commands rather than direct yum commands.
Shell Script to Extract IP Address, MAC Address InformationVCP Muthukrishna
This script collects the active MAC addresses, IP addresses, and associated hardware vendor information on a system. It uses the arp command to gather this network information and outputs it to an HTML file. The HTML file displays the IP address, MAC address, and includes a hyperlink to lookup the IEEE vendor information based on the first three octets of the MAC address. It also includes an option to email the results in an HTML formatted email.
Monitoring CPU Utilization on LINUX (Shell Script Project)Dmitry Ponomarenko
This document describes a shell script that monitors CPU utilization on a Linux server. The script checks CPU usage every 15 minutes using the 'top' utility. If usage exceeds 75% but is less than 85%, it sends a warning to the administrator and users of the top 10 processes. If usage goes above 85%, it kills the top process and notifies the user. The script runs in the background via cron, and technical details are provided on how it extracts CPU usage and process details.
This document provides an overview of shell scripting, cron, and atd for automating tasks in Linux. It discusses using shell scripts to execute a series of commands from a file, as well as topics like shebangs, variables, and conditionals. Cron allows scheduling commands to run on a time-based schedule using crontab files, while atd can run one-off commands at a specific time. The document provides examples and explanations of common cron and atd utilities.
This document provides an overview of shell scripting, cron, and atd for scheduling tasks on Linux systems. It discusses using shell scripts to automate commands, the cron daemon for executing commands on a schedule, and atd for running one-time jobs. Key points covered include using the shebang to directly execute shell scripts, crontab syntax for defining schedules, and commands like crond, at, atq and atrm for managing cron and at jobs. The document is intended as a learning resource for system administration tasks using scheduling utilities in Linux.
Inspection and maintenance tools (Linux / OpenStack)Gerard Braad
This handout is part of the training at UnitedStack and will introduce you to several inspection and maintenance tools.
It is generated from the slides at: http://gbraad.gitlab.io/tools-training/
Source: https://gitlab.com/gbraad/tools-training
This document provides an overview of the Linux operating system. It discusses key Linux concepts like the kernel, shell, file system structure, permissions, users and groups. It also summarizes important commands for navigating and managing files, directories, users, software and services in Linux. These include commands like ls, cd, mkdir, chmod, useradd, yum, service and chkconfig. The document outlines the directory structure in Linux and describes important directories like /bin, /home, /etc. It also covers processes, pipes, redirection and Linux file systems & partitions.
The document provides an overview of the Linux operating system. It discusses key Linux concepts like the kernel, shell, file structure, users and permissions. It also summarizes common Linux commands for file management, editing, users, groups, software installation and services. Key tools covered include vi editor, rpm, tar, useradd/del, service and chkconfig. The document is intended as part of an introductory Linux presentation.
This document discusses managing users and groups in Red Hat Linux 7. It explains that there are three types of users: the root superuser, normal custom users created by administrators, and system users created by packages. It describes the main files and commands used to create and manage users, including /etc/passwd, /etc/shadow, /etc/group, useradd, groupadd, and usermod. The default permissions and umask value are also covered.
Linux is a prominent example of free and open source software. It can be installed on a wide variety of devices from embedded systems to supercomputers. Linux is commonly used for servers, with estimates that it powers around 60% of web servers. Linux distributions package the Linux kernel with other software like utilities, libraries and desktop environments. Programming languages and build tools like GCC are supported. Embedded Linux is often used in devices due to its low cost and ease of modification.
This document provides instructions for a group project on configuring a Linux operating system. It outlines the requirements, learning outcomes assessed, and grading rubric. The project is divided into two parts: a written report worth 50% of the grade and a presentation worth 50%. For the report, students must select a Linux distribution, install it, configure disks, users, groups, permissions, networking, FTP, HTTP, SSH, and firewall security. The presentation requires demonstrating the configured system and defending it during a question and answer session.
Control groups (cgroups) allow administrators to allocate CPU, memory, storage, and other system resources to groups of processes running on the system. The document describes testing done using cgroups on a Red Hat Enterprise Linux 6 system with four Oracle database instances running an OLTP workload. It demonstrates how cgroups can be used for application consolidation, performance optimization, dynamic resource management, and application isolation.
Control groups (cgroups) allow administrators to allocate CPU, memory, storage, and other system resources to groups of processes running on the system. The document describes testing done using cgroups on a Red Hat Enterprise Linux 6 system with four Oracle database instances running an OLTP workload. It demonstrates how cgroups can be used for application consolidation, performance optimization, dynamic resource management, and application isolation.
This document provides an overview of Linux basics, including key terms like kernel and shell; how to check Linux releases and upgrade systems; important file system directories; how to manage packages; environment variables; processes; user management; command enhancements like pipes and aliases; network management tools; and some terminal tips. It covers core Linux concepts and commands for new users to understand the basic workings and administration of the Linux operating system.
This document provides information about installing and configuring Linux, Apache web server, PostgreSQL database, and Apache Tomcat on a Linux system. It discusses installing Ubuntu using VirtualBox, creating users and groups, setting file permissions, important Linux files and directories. It also covers configuring Apache server and Tomcat, installing and configuring PostgreSQL, and some self-study questions about the Linux boot process, run levels, finding the kernel version and learning about NIS, NFS, and RPM package management.
Lab Document on HP ProLiant value add tools on LinuxBruno Cornec
This document provides an overview of various command line tools for managing HP ProLiant servers running Linux, including hplog, hpuid, hpasmcli, hpbootcfg, and hponcfg. It describes how to use these tools to view hardware logs, control the server identify light, modify boot settings, enable/disable automated server recovery, and configure settings on the iLO management processor like the system name. The tools are packaged as hp-health, hpssacli, and hponcfg for installation on supported Linux distributions.
This document discusses Linux file systems and partitioning. It covers commands used to create partitions like fdisk and mkfs, as well as filesystem types like ext3. It also discusses creating and managing swap spaces. The key points are that Linux uses mkfs to format partitions, fdisk to create partitions, and mkswap to initialize swap spaces which are then activated with swapon.
This presentation covers the general concepts about real-time systems, how Linux kernel works for preemption, the latency in Linux, rt-preempt, and Xenomai, the real-time extension as the dual kernel approach.
55 best linux tips, tricks and command linesArif Wahyudi
This document provides 55 tips, tricks, and Linux command lines contributed by readers. It begins with instructions for backing up and restoring Thunderbird emails manually by copying the profile folder. It then offers examples of using SSH to execute commands on remote Linux machines. The tips cover a wide range of Linux tasks like scheduling commands to run after reboot, commenting out config file lines, replacing newlines in files, checking installed shell types, using advanced LS commands, checking for rootkits, finding and replacing text with SED, backing up MySQL databases, and cutting/joining MP3 files.
This document provides 50 examples of common Linux/Unix commands organized by command name. It begins with tar, grep, find, ssh, sed, awk, vim, diff, sort, and export examples. The document is intended as a quick reference for users to learn practical uses of fundamental Linux commands.
How to Fix Duplicate Packages in YUM on CentOS 7VCP Muthukrishna
This document provides steps to resolve duplicate package errors when using YUM on CentOS 7. It involves installing the yum-utils package, using package-cleanup commands to list, count, and clean duplicate packages, and if needed removing any remaining duplicates manually. Running package-cleanup again after should show no more problems.
How To Connect to Active Directory User ValidationVCP Muthukrishna
This PowerShell script connects to Active Directory, requests user credentials, and validates whether a user exists by listing their attributes or displaying an error. It first imports the Active Directory module, connects to AD using provided credentials, and checks if a user called "administrator" exists by getting their attributes. If the user does not exist, an error message is displayed. Otherwise, the user attributes are listed before disconnecting from AD.
This document provides instructions for connecting to Active Directory from Windows PowerShell. It includes prerequisites like having AD installed and configuring firewall ports. The script imports the Active Directory module, connects to AD using credentials, and lists attributes of the "administrator" user if connection is successful. When run, the script prompts for username and password and outputs whether connection was successful or not. If connected, it lists attributes of the specified AD user.
This document provides instructions for using a PowerShell script to list files on a remote server. It describes prerequisites like setting the execution policy and provides the PowerShell code to read user input for a drive and directory and list the first five text files from a remote server. The script outputs whether servers are reachable, paths not found, or lists the files to a text file.
This document provides an overview of using PowerShell to list files on a server. It describes prerequisites like ensuring the correct execution policy is set. The main section provides a PowerShell script that prompts the user for a file path and extension. It checks for files with that extension, displays a message if none are found, and otherwise generates an HTML file listing the files and opens it. The document includes examples of the script output whether files are found or not.
This document provides a PowerShell script to check for and delete a file. It begins with an overview and prerequisites. The script first validates that the provided directory and file exist. It then uses the Remove-Item cmdlet to delete the file, and outputs a message confirming deletion. If the directory or file is invalid, it outputs an error message.
Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...VCP Muthukrishna
The document describes troubleshooting an issue where emails were being deferred from a Zimbra mail server due to port 10024 being refused. The potential causes were a failed or stopped amavisd service, an out-of-date ClamAV antivirus package, or a stale amavisd.pid file. The resolutions included restarting the amavisd service, upgrading ClamAV, and removing and updating the amavisd.pid file before restarting Zimbra services.
This document provides instructions for setting up SSH keys on CentOS 7 to enable passwordless login. It describes generating an RSA key pair with ssh-keygen, setting permissions on the private and public key files, and copying the public key to authorized_keys on the server. Running ssh-copy-id copies the public key and allows logging into the server without a password by authenticating with the private key.
Windows PowerShell Basics - How To List PSDrive InfoVCP Muthukrishna
This document provides information on PowerShell drives (PSDrives) and includes a script to retrieve PSDrive information. PSDrives allow access to data stores like the file system, registry, and certificates from within PowerShell. The script outputs a HTML file listing the name, used space, provider, root, and current location for all available PSDrives.
How To List Nginx Modules Installed / Complied on CentOS 7VCP Muthukrishna
This document provides instructions for listing Nginx modules installed on a RHEL 7 system. It explains that running the command "nginx -V" will output all modules compiled for the Nginx server. Alternatively, piping the output of "nginx -V" through tr and grep can format it to display each module on its own line.
Windows PowerShell Basics – How To Create powershell for loopVCP Muthukrishna
This document discusses using for loops in PowerShell. It provides an example PowerShell script that demonstrates incrementing and decrementing values using for loops. The script clears the host, then runs four for loops: one that increments by 1 from 0 to 5, one that increments by 2 from 0 to 10, one that decrements by 1 from 0 to -5, and one that decrements by 2 from 0 to -10. Each loop displays the current incremental or decremented value and a beep.
How To Construct IF and Else Conditional StatementsVCP Muthukrishna
This document discusses using IF and ELSE conditional statements in PowerShell scripts. It provides code snippets to check for input and return different outputs based on whether input is provided or not. When input is provided, it will write the input and beep at a high pitch. If no input is provided, it will write an error message and beep at a lower pitch. The document also provides background on PowerShell functions and execution policies.
How To Create PowerShell Function Mandatory Parameter and Optional ParameterVCP Muthukrishna
This document discusses PowerShell functions that have mandatory and optional arguments. It provides an example function definition that defines the first argument as optional and the second argument as mandatory. It shows calling the function and passing only the mandatory second argument, which works as expected. It also shows calling the function without any arguments, which causes it to prompt for the mandatory second argument value as required.
How To Create Power Shell Function Mandatory Parameter ValueVCP Muthukrishna
This document discusses PowerShell functions and mandatory arguments. It defines a sample function called MandatoryParameter that takes a mandatory string argument. When invoked without passing a value, it will prompt for the argument. When called with a value, it displays the passed value. The document provides examples of invoking the function with and without arguments to demonstrate PowerShell's handling of mandatory parameters.
This document discusses PowerShell functions and provides an example of creating a simple function called Call_Function_Write_Welcome_Message. The function clears the host, lists function information, prints a purpose message, and outputs the text "Hello - PowerShell Script". To invoke the function, its name is called from the PowerShell CLI or ISE. When run, the function displays its output.
How To Disable IE Enhanced Security Windows PowerShellVCP Muthukrishna
This PowerShell script disables Internet Explorer Enhanced Security by modifying registry values. It checks the registry keys for IE Enhanced Security settings for the Admin and current user profiles. If the keys exist and the configuration is enabled, it sets the registry value to 0 to disable IE Enhanced Security. If the keys are already configured to be disabled, it outputs a message indicating no changes are needed. If the keys don't exist, it displays a message that the registry is not configured.
How To Check IE Enhanced Security Is Enabled Windows PowerShellVCP Muthukrishna
This PowerShell script checks the status of Internet Explorer Enhanced Security settings on a system. It reads the registry keys that control IE Enhanced Security for the local machine profile and current user. The script outputs whether each key is supported, the current value set for each key, and notifies if a key is not defined.
How To Configure Nginx Load Balancer on CentOS 7VCP Muthukrishna
This document provides instructions on how to configure Nginx as a load balancer on CentOS 7. It describes installing Nginx, configuring two web servers and a load balancer node, setting up the load balancing configuration in the Nginx configuration file, and testing the load balancer functionality using curl commands and a web browser.
The nginx service failed to start because it was configured to bind to port 9080, which was not an authorized port by the default SELinux configuration. Adding port 9080 to the list of authorized HTTP ports using semanage resolved the issue, allowing nginx to bind to the non-standard port and start successfully. Validation steps confirmed the service was now accessible on port 9080.
This document provides instructions on how to install, configure, and use the GNU Screen terminal multiplexer on CentOS 7. It discusses installing the Screen package, verifying installation, launching new screen sessions, listing, attaching, detaching, locking, creating new screens within sessions, switching between sessions, stopping sessions, wiping defunct sessions, scrolling back in sessions, splitting sessions horizontally and vertically, starting and switching split sessions, exiting split sessions, modifying permissions to share sessions between users, and accessing sessions by name from other user accounts.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 6
Linux Basic Administration Commands Guide
1. Linux Basic Administration Commands
i | P a g e
Table of Contents
Overview.......................................................................................................................................................1
Applies To......................................................................................................................................................1
Init Levels or Run levels.................................................................................................................................1
Init Levels Table.........................................................................................................................................1
chkconfig.......................................................................................................................................................1
chmod ...........................................................................................................................................................2
chown............................................................................................................................................................2
crontab..........................................................................................................................................................3
df ...................................................................................................................................................................3
du ..................................................................................................................................................................3
free................................................................................................................................................................4
fdisk...............................................................................................................................................................4
groupadd.......................................................................................................................................................5
groupdel........................................................................................................................................................5
ifconfig ..........................................................................................................................................................5
ifup................................................................................................................................................................6
grep...............................................................................................................................................................6
find................................................................................................................................................................7
kill..................................................................................................................................................................7
passwd ..........................................................................................................................................................8
pidof..............................................................................................................................................................8
tail .................................................................................................................................................................8
tar..................................................................................................................................................................9
zip..................................................................................................................................................................9
unzip............................................................................................................................................................10
gzip..............................................................................................................................................................10
gunzip..........................................................................................................................................................10
top...............................................................................................................................................................11
touch...........................................................................................................................................................11
useradd .......................................................................................................................................................12
userdel ........................................................................................................................................................12
2. Linux Basic Administration Commands
ii | P a g e
mount..........................................................................................................................................................12
umount........................................................................................................................................................13
3. Linux Basic Administration Commands
1 | P a g e
Overview
In this guide you will be able to manage Linux system with basic administration task.
For additional and command usage information on the specific command(s); you can run “man
<command>”.
Note: Not all the parameters are explained in this document.
Applies To
Linux flavours
Init Levels or Run levels
A run level is a state of init (initialization) and the whole system that defines what system services are
operating. Run numbers identifies levels;
There is no consensus of how to use the user defined run levels (2 through 5).
Some system administrators use run levels to define which subsystems are working, e.g., whether X is
running, whether the network is operational, and so on.
Others have all subsystems always running or start and stop them individually, without changing run
levels, since run levels are too coarse for controlling their systems.
Depending on your administration needs, define the run level based on the below.
Init Levels Table
Run Level Operation (Purpose)
0 Halt System
1 Single-user mode (Recovery / special Administration)
2 By Default - Not used (user-definable)
3 By Default - Full (multi-user mode)
4 By Default - Not used (user-definable)
5 Full multi-user mode (with an X-based login screen)
6 Reboot
chkconfig
chkconfig is a basic system utility. It updates and queries run level information for system services,
manages which service(s) will start or stop automatically in a specified run levels.
chkconfig: options
--add Add an new service
--del Delete an existing service
4. Linux Basic Administration Commands
2 | P a g e
--level numbers, 0- 6: Update init levels
--list List Services that are added
Syntax:
chkconfig --add <service Name>
Example:
chkconfig --add httpd
chkconfig --levels 345 httpd on
chmod
chmod changes the permissions for a file; permissions should include a letter designating who gets
permissions (u for the user, g for the group, o for others, or a for all) followed by a + or - (to give or take
away the permission) followed by the kind of permission (r for read access, w for write access, x for
execute if the file is a program or script).
chmod: options
-f Silent Mode
-R Recursive
4 or “r” Read Privilege(s)
2 or “w” Write Privilege(s)
1 or “x” Execute Privilege(s)
Syntax:
chmod +x <FileName>
chmod -w <FileName>
Example:
chmod +x run.sh
chmod -x run.sh
chown
chown changes the user and/or group ownership of each given file as specified by the first non-option
argument, changes the ownership of one or more files to new owner.
chown: options
-f Silent Mode
-h Including symbolic links
-R Recursive
Syntax:
chown -fhR <UserID>:<GroupID> <FileName>
5. Linux Basic Administration Commands
3 | P a g e
Example:
chown -fh jboss:jboss run.sh
crontab
A short name for file /var/lib/crontab, which contains a list of Linux commands to be performed at specific
times. A system administrator can use crontab as an automatic timer to trigger the initiation of important
jobs.
To view, install, or uninstall your current crontab file.
crontab: options
-e Edit crontab entry of existing logged in user
-l List crontab entry of existing logged in user
-r Delete all the entries in crontab file
Syntax:
crontab <option>
Example:
crontab -e
crontab -l
df
df reports the amount of disk space used by the specified files, and by each directory in the hierarchies
rooted at the specified files.
df: options
-k block size will be 1K size
-h Human readable
Syntax:
df <option> <Partition>
Example:
df -kh
du
Print disk usage (as the number of 1 KB blocks used by each named directory and its
subdirectories; default is the current directory).
du: options
6. Linux Basic Administration Commands
4 | P a g e
-k block size will be 1K size
-h Human readable
-b Bytes
-c Calculate or sum
Syntax:
du -<Option> <FileName>
Example:
du -kh
free
Display statistics about memory usage: total free, used, physical, swap, shared, and buffers used
by the kernel.
free: options
-b Memory usage in Bytes
-k Block size will be 1K size
-m Memory usage in Megabytes
-g Memory usage in Gigabytes
Syntax:
free -<option>
Example:
free -km
fdisk
Is a menu driven program for creation and manipulation of partition tables.
fdisk: options
-l Listing of existing drive partitions.
-s Listing of existing drive partitions size.
-v fdisk version number.
Syntax:
fdisk -<option>
Example:
fdisk -l
7. Linux Basic Administration Commands
5 | P a g e
groupadd
Create new group of accounts for the system.
-g Assign Group ID
-f Add to group forcefully
Syntax:
groupadd -<option> <GroupName>
Example:
groupadd -g 500 oracle
groupdel
Remove group from system account files
Syntax:
groupdel <GroupName>
Example:
groupdel oracle
ifconfig
Assign an address to a network interface and/or configure network interface parameters.
ifconfig: option
-a Display all the interface details
-v Verbose mode interface details
up Activate specified interface
down Shutdown the specified interface
Syntax:
ifconfig -<option> <Network Interface>
Example:
ifconfig -a
ifconfig eth0
ifconfig eth0 up
ifconfig eth0 down
8. Linux Basic Administration Commands
6 | P a g e
ifup
Enable network interface
ifup: option
-a Bring up all the interfaces that are defined in /etc/network interfaces
-f Force configuration of the interface
--no-scripts Don’t run any scripts under /etc/network/if-*.d/
Syntax:
ifup <Interface Name>
Example:
ifup eth0
ifup -a
ifdown
Disable network interface
ifdown: option
-a Bring down all the interfaces that are defined in /etc/network interfaces
-f Force configuration of the interface
--no-scripts Don’t run any scripts under /etc/network/if-*.d/
Syntax:
ifdown <Interface Name>
Example:
ifdown eth0
ifdown -a
grep
grep searches the named input FILEs (or standard input if no files are named, or the file name -
is given) for lines containing a match to the given PATTERN. By default, grep prints the matching
lines.
grep: option
-c Count matching lines
-r Recursive search
-l Displays count that doesn’t match the search criteria
9. Linux Basic Administration Commands
7 | P a g e
Syntax:
grep <search string> <File Name>
Example:
grep vcp.muthukrishna /etc/password
grep -r "SearchString" /var/www/
grep -cw "SearchString" SearchFile.txt
grep -cvw "Search" SearchFile.txt
grep -l " SearchString" /www/*
find
Find locates files. Within each directory tree specified by the given paths, it evaluates the given expression
from left to right, according to the rules of precedence.
find: option
-print Prints the results
-name Find string
Syntax:
Find <SearchPath> -<option>
Example:
find . -name "java" -print
find . -name "Java" -H -print
kill
Send a signal to terminate one or more process IDs.
kill: option
-9 Kills process
-l Lists all possible process IDs
Syntax:
kill -<option> <Process ID>
Example:
kill –a gcc
10. Linux Basic Administration Commands
8 | P a g e
kill -9 13445
kill -l 1234
passwd
Change / update the password of a user or logged in user.
passwd: option
-S Status of the password set
-d Deletes set password, passwordless user
Syntax:
passwd -<option> <UserName>
Example:
passwd vcp.muthukrishna
password -S vcp.muthukrishna
password -d vcp.muthukrishna
pidof
Display the process IDs of the listed program or program.
pidof: option
-s Single shot - this instructs the program to only return one pid
Syntax:
pidof -<option> Process ID
Example:
pidof -s gdm-binary
pidof pickup
tail
Print the last 10 lines of each named file
tail: option
-f Real time file print on console
-n Number of lies to print
Syntax:
11. Linux Basic Administration Commands
9 | P a g e
tail -<option> <FileName>
Example:
tail -f server.log
tail –n20
tar
Copy files to or restore files from an archive medium
tar: option
-c Create an archive file
-v Verbose mode enable
-x Extract an archive file
-z Extract gunzip, gzip
-t List the files in the archive
Syntax:
tar -<option> <TarFileName>
Example:
tar -cf ArchiveFileName.tar file1 fileN
tar -cf ArchiveFileName.tar Directory/
tar -czf ArchiveFileName.tar Directory/
tar -tvf ArchiveFileName.tar
tar -xvf httpd.tar
tar -zxvf httpd.tar.gz
zip
Create a compression file.
zip: option
-R Recursive
-v Verbose mode enable
-u Update existing compression file
Syntax:
zip -R <ZipFileName> <Include FileNames>
Example:
12. Linux Basic Administration Commands
10 | P a g e
zip -R ZipFileName.zip *.*
zip -u ZipFileName.zip AddFileName.txt
unzip
Explodes / Extracts a compression file.
zip: option
-d Folder location where the file should be exploded
-t Test archive file
-v Verbose mode enable
Syntax:
unzip -<option> <ZipFileName>
Example:
unzip -d /usr/local/Destination_Directory ZipFileName.zip
gzip
Compress a gzip file (Compression utility like zip).
gzip: option
-v Verbose mode enable
-r Recursive
Syntax:
gzip -<option> <gzipFileName>
Example:
gzip GzipFileName.gz *.*
gzip -f GzipFileName.gz *.*
gzip TarFile.tar
gunzip
Explodes / extracts a compressed gzip file.
guzip: option
-v Verbose mode enable
-r Recursive
13. Linux Basic Administration Commands
11 | P a g e
Syntax:
guzip -<option> <gzipFileName>
Example:
gunzip GunzipFileName.gz
gunzip -R GunzipFileName.gz
top
Provide information (frequently refreshed) about the most CPU-intensive processes currently
running.
top: option
-u Show top info for a user
-p Show top info for a PID
-d Set delay (refresh)
Syntax:
top -<option>
Example:
top -u jboss
top -p10078
touch
Update the access time and modification time (and dates) to the current time and date.
touch: option
-c No create, if file doesn’t exists
-a Change access time only
Syntax:
top -<option> <FileName>
Example:
touch FileName.txt
touch -c FileName.ear
14. Linux Basic Administration Commands
12 | P a g e
useradd
Create new user accounts or update default account information.
useradd: option
-g group id of a the user
-d Location of home directory for user
-f Inactive user
-s Set Shell for the user
-k Skeleton directory
Syntax:
useradd -<option> <UserName>
Example:
useradd -g 500 jboss
useradd -s /bin/bash -g 500 jboss
useradd -s /bin/bash -g 500 jboss -d /usr/local/jboss
userdel
Delete all entries for user in system account files
userdel: option
-r Remove home directory and files of the user
-f Force Remove
Syntax:
userdel -<option> <UserName>
Example:
userdel -r jboss
userdel -f jboss
mount
Mounts a device on a location.
mount: option
-t Type of filesystem to be mounted
-a Mount all filesystem listed in /etc/fstab
15. Linux Basic Administration Commands
13 | P a g e
-l List mounts label
-n unmounts without writing to /etc/fstab
-v Verbose
Syntax:
mount -<option> <Device> <Mount point>
Example:
mount -t ext3 /dev/hdc1 /mnt/Linux2
mount -t iso9660 -o ro /dev/cdrom /mnt/cdrom
mount /dev/cdrom/ /mnt/cdrom
mount -o loop disk1.iso /mnt/isoDisk
Note: /mnt/cdrom and /mnt/Linux2 should be already existing directory. Never mount on
existing file system. You will lose the existing mount locations, you’ve to explicitly reboot to see
the mount points again.
umount
Unmount’s a device that is mounted
mount: option
-n unmounts without writing to /etc/fstab
-v Verbose
-f Force Unmount
Syntax:
umount -<option> <Mount point>
Example:
umount /mnt/Linux2
umount /mnt/cdrom