Simple Linux UFW Example
Allow a connection from a particular remote IP address to any IP address on the local machine on a specific port (TCP & UDP). Verify with:
The ramblings of a computer geek
Allow a connection from a particular remote IP address to any IP address on the local machine on a specific port (TCP & UDP). Verify with:
The following can get the errors out for a particular interface (port), in this case we are looking for the InErrors (RXErrors) and OutErrors (TXErrors). For example ID: Only issue i’ve found is that interface errors in VOSS/FabricEngine seem to include RX or TX errors plus annoyingly things like oversized packets. So if you have … Read more
A simple function that takes a DateTime in the format: 2023-11-29T06:41:20-08:00 and outputs it in a much more pretty: 29/11/2023 06:41:20 -0800. As you can see its switching to the DDMMYY date format, followed by the time and finally the timezone.
Read in JSON from a file and convert into a Dictionary For example I was testing getting data from the Slack service status API, so wanted to simulate broken-ness to test my script was working correctly. I did this by creating a file with a sample set of JSON that showed a problem, as I … Read more
The Dell ECS is an object based storage platform, in our case we are using it as an archive layer to our Dell PowerScale platform; where it provides a single-namespace file-system allowing “cooler” data to be pushed to the “cheaper”, slower Dell ECS storage freeing up the front-end storage for new data that is “hot” … Read more
VMware vCenter can use a multitude of authentication methods, such as LDAP, Active Directory and SAML (ADFS), however since vCenter 8.0 U1 the ability to integrate with OKTA for authentication has been added, which allows for adding MFA (multi-factor authentication) for enhanced security and detaching the vCenter appliance from Active Directory. When switching to use … Read more
DISCLAIMER: Ensure you consult with a certified electrician, the below is for information only and is not to be taken as guidance on what you should or should not do, it is merely a detail of what I found. Our Ei Electronics Ei166RC smoke detector started to go off at random intervals, we have 3 … Read more
Setting up network bonding between two 10Gbit NICs within a physical machine; this assumes Active-Standby bonding so a link down event on one NIC will cause the other to become Active, no LACP or switch side configuration is required in this case. The documentation assumes you are running under root, stick sudo in front of … Read more
We had some older VMware hosts where there is a warning about a host being vulnerable to a particular CVE relating to the processor type, in this case the fix was not possible, but we still wanted to suppress the warning. When applying the normal Host Profile it was grumbling about this shell warning, so … Read more
Creating a user account with a home directory and setting the default shell as BASH, can be done as follows, add “sudo” to the front as required. If you need your account to have sudo rights, you can specify the “sudo” group upon creation, as follows: