Quantcast
Channel: Linux – David Vassallo's Blog
Browsing latest articles
Browse All 39 View Live

Image may be NSFW.
Clik here to view.

Creating a custom Nagios/Centreon passive alerter

Scenario: This is very probably a familiar problem that any sysadmin must solve: Using your monitoring setup to receive alerts from other servers. Note the highlighted "receive". This is different from...

View Article


Image may be NSFW.
Clik here to view.

Bringing IPv6 to the home : Part 1

World IPv6 day came and went, but for most of us nothing much changed. In Malta especially, there currently seems no interest for ISPs to start using IPV6, very probably due to the challenges it poses....

View Article


Image may be NSFW.
Clik here to view.

Bringing IPv6 to the home : Part 2

The article is a more in-depth look at residential IPv6, the final installment of the 2 part series. If you’ve missed it, the 1st article can be found here. After having established a successful...

View Article

Image may be NSFW.
Clik here to view.

Lessons Learned: Redhat 5.8 + IBM Bladecenter 88524TG + IBM Storwise V7000

Objective: Having a baremetal install of Redhat Enterprise on a blade within the IBM Bladecenter, configure the OS to successfully mount a LUN on the SAN (Storwise v7000) as usable storage. Hardware: -...

View Article

Image may be NSFW.
Clik here to view.

Bash scripting: another use for “DD”

For most linux users, “dd” is mostly used when dealing with disk issues, such as copying one disk to another (byte for byte) creating an ISO from a CD/DVD, and so on. I personally didnt know what else...

View Article


Image may be NSFW.
Clik here to view.

Adding agentless Windows WMI monitoring to Nagios

There are a couple of well documented methods to monitor Windows machines from Nagios. The most popular of these seems to be NRPE. This method works very well, but the biggest downside for me was the...

View Article

Image may be NSFW.
Clik here to view.

Connecting to a Palo Alto Network GlobalProtect Gateway from Linux

Please note: this software has only been officially tested on Ubuntu and CentOS distributions. The VPN software uses community based vpnc software, please direct support questions about the actual...

View Article

Image may be NSFW.
Clik here to view.

Web MeetMe : Conferencing in FreePBX

The company I work for currently uses TrixBox as their VoIP server. It’s an excellent piece of software but being no longer supported, the decision was taken to upgrade to the later and more active...

View Article


Image may be NSFW.
Clik here to view.

Nugget Post : Beyond basic SED

Interesting problem to solve with sed. Given the following file: [firstCompany-1-restricted-internal] exten => _1XX,1,Goto,(from-internal,${EXTEN},1) exten =>...

View Article


Image may be NSFW.
Clik here to view.

Android (SL4A) bluetooth to Linux (ubuntu)

As a follow up to my recent post I tried to program a very basic launcher. The idea is to pass commands from my android phone to my ubuntu laptop. The android side of things was already catered for by...

View Article

Image may be NSFW.
Clik here to view.

Lessons Learned: Setting up TVHeadend for live TV streaming in Malta

I recently had the opportunity of setting up a system which captures free-to-air channels and streams them over IP for use by TV set-top boxes such as RaspBMC (or plain old XBMC). We decided on using...

View Article

Image may be NSFW.
Clik here to view.

Lessons learned: Gephi not starting up

Scenario: When using Ubuntu Trusty (14.04.3LTS) Gephi 0.82 initializes but gets stuck on “Loading Cached Objects” Solution: The default Gephi startup bash script does not correctly initialize the JAVA...

View Article

Image may be NSFW.
Clik here to view.

Proxy re-encryption

What is proxy re-encryption? Proxy re-encryption lets Alice send Bob a message (M) via a semi-trusted proxy, without revealing Alice’s private key to either the proxy or Bob, and without revealing the...

View Article


SQUID + GreasySpoon : enhancing your proxy deployment with content adaptation

When comparing the two proxy solutions I am most familiar with, these being BlueCoat ProxySG and SQUID, the most striking difference is the capability of the bluecoat to easily change and modify the...

View Article

Easy cisco syslog monitoring using Webmin

At some point probably a network team would need something similar to this, so I thought it would be a good article to document what I’ve used to achieve this scenario: There is a need to monitor...

View Article


Nugget Post: LPIC-2 material

While hunting for good study material for the LPIC-2 certificate (linux professional institute certification) I came across a very good online book that’s up to date and very structured at the time of...

View Article

Linux script for automatic notification of failed download

Scenario: We need a CentOS machine to periodically automatically download a file from a remote server on the internet. If this download fails for any reason, the network admin should be emailed to...

View Article


Analyzing SQUID access logs

There are loads of programs on the internet which are squid log analyzers. While this article does address the same thing, it’s presented more with an eye to how you can use standard linux bash scripts...

View Article

Nugget Post: LPI 201 exam notes

Just took my LPI 201 exam successfully (LPIC 201). Here are my personal notes taken during my studies and a few added after the exam...

View Article

Tomcat configuration summary

Tomcat is one of the more involving servers to setup. It contains a rather large server.xml file that can be daunting at first. If you “break down” the massive xml file into containers however, it...

View Article

Linux Mail Components

Drawing diagrams always helps visualize and understand concepts. While studying  for LPIC202 I came up with the following diagram to help understand a simple linux mail system. I say simple because the...

View Article


Nugget Post: LPIC 202 exam notes

Just took my LPI 202 exam successfully (LPIC 202). Here are my personal notes taken during my studies and a few added after the exam...

View Article


Monitoring custom attributes via SNMP

There comes a time in every network admin’s career when management/developers/dbas need to monitor some obscure attribute on a particular server. Invariably, there is no pre-existing plugin in nagios...

View Article

Entertainment: Asus O’play file share w/ Windows 7

A bit of a different post from the norm since this deals with IT in entertainment rather than the normal work IT, but seems to be a useful. @ Home I do not use any cable, TV or satellite description....

View Article

Lessons Learned: Building statically-linked Rust binaries (OpenSSL)

In a couple of modules which used in CyberSift, Rust is slowly making an appearance, depending on the use-case at hand. Generally we develop in GoLang, and one of the advantages was the resulting...

View Article

Browsing latest articles
Browse All 39 View Live