Language Selection

English French German Italian Portuguese Spanish

today's howtos

Filed under
HowTos
  • Evgeni Golov: It's not *always* DNS

    Two weeks ago, I had the pleasure to play with Foremans Kerberos integration and iron out a few long standing kinks.

    It all started with a user reminding us that Kerberos authentication is broken when Foreman is deployed on CentOS 8, as there is no more mod_auth_kerb available. Given mod_auth_kerb hasn't seen a release since 2013, this is quite understandable. Thankfully, there is a replacement available, mod_auth_gssapi. Even better, it's available in CentOS 7 and 8 and in Debian and Ubuntu too!

    So I quickly whipped up a PR to completely replace mod_auth_kerb with mod_auth_gssapi in our installer and successfully tested that it still works in CentOS 7 (even if upgrading from a mod_auth_kerb installation) and CentOS 8.

  • [Older] How To Install MariaDB 10.5 on Ubuntu 20.04

    MariaDB is one of the most popular open-source databases next to its originator MySQL. The original creators of MySQL developed MariaDB in response to fears that MySQL will suddenly become a paid service due to Oracle acquiring it in 2010. With its history of doing similar tactics, the developers behind MariaDB have promised to keep it open source and free from such fears as what has happened to MySQL.

  • Save a dict to a file – Linux Hint

    Dictionary is a very famous object in python. And it is a collection of keys and values. The key of the dict must be immutable, and it can be integer, float, string, but neither a list nor a dict itself can be a key. So, sometimes we need to save the dict objects into a file. So we are going to see different methods to save a dict object in a file.

  • Introduction to RPM/YUM Package Management – Linux Hint

    Red Hat Package Manager is the default open-source package management utility built under General Public License (GPU). The package management system is for all Red Hat-based Linux derivatives like Fedora, RHEL, and CentOS. RPM facilitates system administrators with the basic five modes of package management operations: installing, updating, removing, querying, and verifying packages.

    Moreover, Yellowdog Updater Modified (YUM) is to RPM what APT package management tool is for dpkg utility in Debian packaging system: it resolves the package dependency issues of RPM. In this guide, we will briefly introduce YUM. Whereas, we will have an in-depth introduction and background to the RPM packaging system for Red Hat Linux distributions.

  • What is ngrep and How to Use It? – Linux Hint

    Even though tshark and tcpdump are the most popular packet sniffing tools that dig down to the level of bits and bytes of the traffic. ngrep is another command-line nix utility that analyzes network packets and searches for them on a given regex pattern.

    The utility uses pcap and GNU library to perform regex string searches. ngrep stands for Network grep that is similar to the regular grep utility. The only difference is that ngrep parses text in network packets by using regular or hexadecimal expressions.

    In this article, we learn about a command-line, feature-rich utility known as ngrep that is handy for quick PCAP analysis and packet dumping.

  • Kubectl Port Forward – Linux Hint

    Forwarding a port using kubectl is relatively easy, although it only operates with individual pods but not with services. Port forwarding is a valuable tool for debugging different applications and deployments in the Kubernetes cluster. For illustration, if one of your pods is acting strangely, you will need to link to it directly. As this is a microservice setting, you can utilize port forwarding to communicate with a back-end service that would otherwise be hidden. The Kubelet delivers all information entered into the stream to the destination pod and port. When designing Kubernetes applications, it’s common to wish for immediate use of a service from the surrounding environment without exposing it via a load balancer or perhaps an ingress resource.

    We can use kubectl to create a proxy that forwards all traffic from a local port to a port linked to our chosen Pod. The kubectl port-forward instruction can be utilized to accomplish this. The kubectl port-forward sends an appeal to the Kubernetes API. That implies the machine that runs it requires access to the API server, and all communication is tunneled through a single HTTP connection. By passing one (or more) local ports to a pod, we can access container content with this command. This command performs effectively when you are required to debug a malfunctioning pod. We are going to talk about a step-by-step method to check port forwarding using kubectl.

  • Kubectl Get Events To Sort By Time – Linux Hint

    While other resources have changes, errors, or other notifications that should be broadcasted to the system, Kubernetes events are generated automatically. There is not so much documentation on events, but they are a great help when troubleshooting problems in your Kubernetes cluster. When compared to many other Kubernetes objects, events have a lot of activity. Events have a one-hour life period by default, and a distinct etcd cluster is advised for scalability. Events on their own, when combined with the inability to filter or aggregate, may not be particularly valuable unless they are transferred to external systems. Kubernetes events are entities that inform you what’s going on inside a cluster, like the scheduler’s decisions and why some pods were ejected from a node. The API Server allows all key components and extensions (operators) to generate events. When something is not operating as planned, the first area to check at is events and network operations. If the failure is the outcome of earlier events or when performing post-mortem analysis, keeping them for a longer duration is critical. Kubernetes generates events every time any of the resources it manages changes. The entity that initiated the event, the kind of event, and the cause are generally included in these events. Now to sort events by time, you have to follow the appended steps described in this tutorial.

  • Introduction to Manjaro Package Manager Pacman – Linux Hint

    The Linux distributions package management system has covered a long way. The timely practice of software management by creating independent repositories, application packages, and installation tools made software accessible across environments. Similar to all other Linux distributions, Manjaro has a default package manager of Arch Linux.

    In this article, we learn to use the command-line package manager Pacman to add, remove, and update software packages from the distribution or user build repository. The tutorial also covers how to query details of installed packages on the system.

More in Tux Machines

Can You Run Linux Without a Desktop Environment?

While modern Linux systems have attractive desktop interfaces, you may be wondering whether you can use Linux without them. The straightforward answer is "yes." What Is a Desktop Environment? While the desktop environments on Windows and macOS are tightly integrated and built into the system, on Linux, desktop environments like GNOME, KDE, and Xfce are just collections of programs that you can install in addition to the base operating system. Read more

today's leftovers

  • Oracle v. Google: What the verdict means for open source | InfoWorld

    The decade-long legal battle between two of the world’s largest tech companies has finally come to an end. The result was a victory for the open-source software community. In case you need a refresher on the Oracle v. Google case, Oracle sued Google in 2010 for copyright infringement on Google’s use of Oracle’s Java API in its Android smartphone operating system. The District Court ruled in favor of Google, but that decision was later reversed on appeal. The case ultimately landed in the U.S. Supreme Court, which ruled six to two in Google’s favor this April.

  • Jupyter Labs Desktop App: What Is It & Do We Need It?
  • Apple's M1 MacBook screens are stunning – stunningly fragile and defective, that is, lawsuits allege

    Aggrieved MacBook owners in two separate lawsuits claim Apple's latest laptops with its M1 chips have defective screens that break easily and malfunction. The complaints, both filed on Wednesday in a federal district court in San Jose, California, are each seeking class certification in the hope that the law firms involved will get a judicial blessing to represent the presumed large group of affected customers and, if victorious, to share any settlement. Each of the filings contends Apple's 2020-2021 MacBook line – consisting of the M1-based MacBook Air and M1-based 13" MacBook Pro – have screens that frequently fail. They say Apple knew about the alleged defect or should have known, based on its own extensive internal testing, reports from technicians, and feedback from customers.

  • A Burger King where the only Whopper is the BSOD font

    Bork goes back to its roots today, with a screen of purest blue showing its unwanted face outside a US Burger King branch. At least it makes a change from McDonald's, very much the DNS of Bork when it comes to failures. In this instance, it looks like it is the exterior signage, normally showing a slideshow of tasty (and frequently greasy) treats, that has succumbed to the curse of Microsoft.

  • RISC-V Launches the Open Hardware Diversity Alliance

    RISC-V International, a global open hardware standards organization, announced the launch of the Open Hardware Diversity Alliance. The global Alliance, created by CHIPS Alliance, OpenPOWER Foundation, RISC-V, and Western Digital, will develop and provide learning and networking programs, mentorship opportunities and inclusive environments across the expansive ecosystem of open hardware. The Alliance will be focused on supporting professional advancement and encouraging equal participation for women and underrepresented individuals in the open hardware community.

  • ASUS Tinker Board 2S: High-performance Raspberry Pi alternative

    The long-awaited ASUS Tinker Board 2S is out. And there's a lot packed into the 85 x 56 mm Raspberry Pi form factor. At the heart of the Tinker Board 2S is a Rockchip RK3399 chipset that combines two ARM Cortex-A72 cores, four ARM Cortex-A53 cores, and an ARM Mali-T860 MP4 GPU. The board comes with 2GB or 4GB of LPDDR4 RAM, and 16 GB of eMMC flash.

  • Value Stream Management: Bringing Lean Manufacturing Techniques To IBM i Development - IT Jungle [Ed: Another example of grotesque conflict of interest by IBM. This ‘article’ is about IBM and is also sponsored by IBM.]
  • Open Mainframe Project Announces Continued Growth in Community Contributions and Adoption as Mainframes Accelerate Innovation in Enterprise Hybrid Technology [Ed: "Linux" Foundation is openwashing IBM to make a monopoly seem like "community"]

    The Open Mainframe Project kicked off the 2nd annual Open Mainframe Summit today with news of record growth in contributions - with more than 105.31 Million Lines of Code written and over 9,600 commits submitted by Open Mainframe Project communities so far this year. This is 100 percent more code than last year with an increased number of active participants in the 20 project and working groups. These numbers will only increase as Open Mainframe continues to be the cornerstone of governance and innovation for modernizing the mainframe and its path to IoT, Cloud and Edge Computing.

today's howtos

  • How to use wall command in linux - Unixcop

    wall is (an abbreviation of write to all) is a Unix command-line utility that displays the contents of a computer file or standard input to all logged-in users. It is used by root to send out shutting down message to all users just before poweroff. It displays a message on the terminals of all logged-in users. The messages can_be either typed on the terminal or the contents of a file. Also usually, system administrators send messages to announce maintenance and ask users to log out and close all open programs.The messages ‘re shown to all logged in users with a terminal open.

  • Any Port in a Storm: Ports and Security, Part 1

    When IT and Security professionals talk about port numbers, we’re referring to the TCP and UDP port numbers a service is running on that are waiting to accept connections. But what exactly is a port?

  • Book Review: Data Science at the Command Line By Jeroen Janssens

    Data Science at the Command Line: Obtain, Scrub, Explore, and Model Data with Unix Power Tools written by Jeroen Janssens is the second edition of the series “Data Science at the Command Line”. This book demonstrates how the flexibility of the command line can help you become a more efficient and productive data scientist. You will learn how to combine small yet powerful command-line tools to quickly obtain, scrub, explore, and model your data. To get you started, author Jeroen Janssens provides a Docker image packed with over 80 tools–useful whether you work with Windows, macOS, or Linux.

  • How to Take a Typing Test on Linux With tt

    In the modern era of technology, typing has become one of the most common activities for a lot of professions. Learning to type faster with accuracy can help you get more things done in the same amount of time. However, touch typing is not a skill that you can master overnight. It takes regular practice and testing to improve your speed and accuracy gradually. While there are a lot of websites that help you achieve this, all you essentially need on Linux is a terminal. Let's see how.

  • FIX: Google Chrome doesn’t work on Kali linux
  • How to install OpenToonz on a Chromebook

    Today we are looking at how to install OpenToonz on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below. If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!

Security and DRM Leftovers