Installing a Specific Ruby Version

We needed to install Ruby 2.7 instead of what normally comes with Ubuntu 20.04 LTS, if we installed a later than 2.7 Ruby version, the particular application (i.e. Staytus in this case) would barf. The nice people at BrightBox have created some packaged installs of Ruby at various versions.https://www.brightbox.com/docs/ruby/ubuntu/#adding-the-repositoryhttps://launchpad.net/~brightbox/+archive/ruby-ng (Latest version supported 20.04) We first […]

More...

Microsoft Exchange 2016 – How to Fix Exchange DAG Witness Failed State

In certain situations the Exchange DAG witness can become a problem, this can occur during an upgrade or can happen if there is a network interruption. Although the DAG will continue to operate the witness is considered failed, which can cause odd behaviour in a failover scenario, as there is no quorum available for the […]

More...

VMware Check Path Selection Policy for Datastores

The Path Selection Policy is set for devices to determine how the ESXi host will utilise the paths to the storage, for example, you can have “Fixed” or “Round Robin” or “Most Recently Used”, you can also have storage vendor provided ones such as “NIMBLE_PSP_DIRECTED”. The scripts and commands I’ve found keep mentioning “Multipathing”, if […]

More...

Terraform Basics (with VMware)

Hashicorp’s Terraform is an Infrastructure as Code (IaC) declarative language that allows you to define the existence and state of objects within your infrastructure and then publish this new state to your infrastructure. Terraform is agnostic of platform, you can use a wide range of “providers” to manage a number of different infrastructure components from […]

More...

Road to CISSP – Certified Information Systems Security Professional

IT Security continues to be a very important topic in the IT ecosystem, ensuring your Information Security is as good as it can be also makes good business sense, through the reduction of risk of loss and showing commitment to your customers of your organisation’s quality and capability. Information Security doesn’t just come from technical […]

More...