Quantcast
Channel: Linux tutorials Archives | Unixmen
Viewing all 1264 articles
Browse latest View live

How To Install Mumble Server On Ubuntu

$
0
0

What is Mumble Server?

Mumble is an open source, low-latency, high quality voice chat software. Mumble is a voice over IP (VoIP) application primarily designed for use by gamers, similar to programs such as TeamSpeak and Ventrilo. Mumble uses a client–server architecture which allows users to talk to each other via the same server.

Step 1

Now open the Terminal or Press (Ctrl+Alt+T). After that follow this command one by one.

sudo apt-get update
sudo apt-get upgrade

If will be asked to confirm installing any packages. Type Y and press Enter.

Step 2

Now Install Mumble Server.

sudo apt-get install mumble-server

Then install Mumble Client.

sudo apt-get install mumble

Step 3

After the installation is complete, you will run the package reconfiguration command to create some basic server and user settings.

sudo dpkg-reconfigure mumble-server

You can use your arrow keys to select your answer, then press Enter to continue.

Image 1

you will accept the default value of Yes because we want Mumble-Server to run when the server boots.

Image 2

Even if this will be a dedicated Mumble-Server, Now select Yes since this will ensure the lowest possible latency.

Mumble SuperUser Password

SuperUser is the highest-level administrative account for the server. You’ll need to log in to Mumble with this user when you want to manage the server.

Image 3

Type a password, press Tab to select Ok, and press Enter.

Step 4

Advanced Configuration

Now you will need to edit some configuration file. Open terminal then type the command.

sudo mcedit /etc/mumble-server.ini

There Just enable some command. To enable some of these settings, you will have to remove the preceding (#) character. This is referred to as un-commenting the line. Lines that start with # are not processed by the server.

1. autobanAttempts, autobanTimeframe, autobanTime,welcometext,

host,bandwidth,users,textmessagelenth,imagemessagelenght,allowhtml,

registername,registerURL (#) removed the character before this line.

When done everything. Then Click Esc button two time and select save.

Now restart Mumble-Server.

sudo service mumble-server restart

Step 5

Now connect to your Mumble Server. Open the Mumble client on your computer. 

Image 4

When Click Connect then show the audio tunning wizard. After that setting your audio tunning. Click Next Button.

Image 5

Now Add new User in the Server.

Image 6
Click Add new Button.

Image 7
Enter the information for your Mumble server. The address can be a host name or the IP address of your server. If you did not use a custom port, it will be the default port of 64738. Click OK to save settings.
Example: Your IP address like this:  192.168.10.100.
Now select your own server name and Click Connect.

Image 8
You will get the message Connected once you are successfully connected.

image 8
Now Enjoy!!!


Advertise here with BSA

---------------------------------------------------------------------
How To Install Mumble Server On Ubuntu


Nagios Xi: How To Monitor Your Linux Server Using NRPE Agent

$
0
0

Introduction

Nagios is the leader and industry standard in enterprise-class monitoring solutions. Nagios provides two monitoirng tools Nagios Core and Nagios XI.

Nagios Core is a free and open source tool that allows you to monitor your entire IT infrastructure to ensure hosts, services and applications are functioning properly.

Nagios XI is based on Nagios Core and is the commercial solution of Nagios. Nagios XI provides organizations with many benefits:

  • Comprehensive IT Infrastructure Monitoring
  • Advanced Graphs & Visualizations
  • Advanced Infrastructure Management Capabilities
  • Monitoring Wizard
  • Easily and Advanced User Management

For more informations, you can visit the website of Nagios, and check our article in this link .

Purpose and Target Audience

This artilce is intended for use by Nagios Administrators who wish to monitor Linux servers with Nagios XI using the linux NRPE agent. The linux NRPE agent must be installed on the target linux machine and configured before Nagios XI can monitor system metrics, services, processes, or performance data on the target machine.

If you still didn’t install Nagios-Xi , check this article to see how to do that.

In this article we will show you how to install and configure NRPE AGENT in the remote server and how to add the host to Nagios Xi.

Installing and Configuring NRPE On The Remote

Linux Machine

Download the Linux NRPE agent to the /tmp directory on the Linux server you wish to monitor.

cd /tmp

For RHEL/CentOS 5+, Fedora 14+, SLES 11+, OpenSUSE 11+, Ubuntu 12+, and Debian 6+:

wget http://assets.nagios.com/downloads/nagiosxi/agents/linux-nrpe-agent.tar.gz

For RHEL 4 & CentOS 4 (el4):

wget http://assets.nagios.com/downloads/nagiosxi/agents/linux-nrpe-agent-el4.tar.gz

Unpack the installation archive you just downloaded:

tar xzf linux-nrpe-agent.tar.gz

Enter the newly created agent sub-directory:

cd linux-nrpe-agent

You need to run the wrapper script as root (if using Ubuntu you’ll need to either run sudo -i to run as root):

sudo ./fullinstall

The script will stop to prompt you once, to ask for the IP address(es) for your monitoring server(s). You will need to type the ip address, of your Nagios Xi server and then press enter. This will allow connections from your monitoring server to the agent process.

nagios6

Configuring Nagios Xi to Monitor the Linux Host

You have now successfully installed and configured the monitoring agent and required plugins on the Linux server. In order to monitor the server using Nagios XI, you will need to run the Linux Server configuration wizard in the Nagios XI web interface.

Log into the web interface via : http://[SERVER_IP]/ and enter your login information. You will see this page after the login.

nagios1

Choose Configure to start the host configuration.

6

Go Under Run the Monitoring Wizard

7

You need to choose Linux Server wizard to monitor your host.

8

Next, we set the device parameters.

9

Now that the device has been added.

10

We specify the services that we want to create. This section can be found in the bottom section of the page.

12

Enter the information regarding the polling strategy:

14

Our host and services will then be checked every 5 minutes and an alert will be sent out 5 minutes after our host goes « DOWN » (5 check attempts with 1 check every 1 minutes will confirm its « HARD » state). Next you need the configure the notification settings.

The notification will be send immediately in case of alert and every 60 minutes until the problem is resolved.
At last, the notification parameters are as follows:

17

After you should click Apply to add the host and finish the new configuration.

20

The results of the polling are visible in the Home => Host Details.

After period of time you can need to see a graphs like this which is the Current-Load.

23

That’s all.

Congratulations! Enjoy your new Monitoring platform Nagios Xi.


Advertise here with BSA

---------------------------------------------------------------------
Nagios Xi: How To Monitor Your Linux Server Using NRPE Agent

Linux Basics: How To Check The State Of A Network Interface Card

$
0
0

Normally, we can easily check the state of a network interface card like whether the cable plugged in to the slot or the network card is up or down in Graphical mode. What if you have only command line mode? Ofcourse, you can turn around the system and check for the cable is properly plugged in, or you can do the same easily from your Terminal. Here is how to do that. This method is almost same for Debian and RPM based systems.

Check Network Card State

I have two ethernet cards on my laptop. One, eth0,  is wired, And another, wlan0, is wireless.

Let us check the state of the eth0.

cat /sys/class/net/eth0/carrier

Sample output:

0

Or, use the following command to check the status.

cat /sys/class/net/eth0/operstate

Sample output:

down

As you see in the above results, the NIC is down or cable is not connected.

Let me plug a network cable to the eth0 slot, and check again.

After plugged in the cable, I executed the above commands:

cat /sys/class/net/eth0/carrier

Sample output:

1

Or,

cat /sys/class/net/eth0/operstate

Sample output:

up

Voila, the eth0 is up or the cable is connected to eth0.

Be mindful, it doesn’t mean that the IP address has been assigned to the eth0. The cable is just connected to that slot. That’s all.

Let us check for the wlan0 state.

cat /sys/class/net/wlan0/carrier

Sample output:

1

The result is 1, which means the wlan0 is up and connected.

Or,

cat /sys/class/net/wlan0/operstate

Sample output:

up

Likewise, you can check all the network cards on your machine.

Cheers!


Advertise here with BSA

---------------------------------------------------------------------
Linux Basics: How To Check The State Of A Network Interface Card

How To Send Alerts From Nagios Core Using Gmail And Yahoo

$
0
0

Introduction

One of the most important feature of the monitoring platform is the notification system; by default  they use the local mail daemon (postfix,mail,exim) installed on the server to send the notifications.

Using local mail daemon has many issues :

  • You need to install and configure your smtp server.
  • Maybe your mail server go down so you can’t receive the alert.
  • Maybe this kind of emails from a not verified source like nagios can be filtered by the same company antispam system.

In order to avoid all issues, In this article I am going to explain how to send alert from monitoring tool Nagios Core using an external smtp server with authentication like Gmail and Yahoo.

This task was not so easy since communicating with Gmail through a linux server was requiring permissions and certifications but with sendEmail you can do it easily.

Installation and Configuration Of SendEmail

SendEmail is an email program for sending SMTP mail from a command line. SendEmail is a lightweight program written in Perl and is unique in that it requires NO MODULES. It has an intuitive and flexible set of command-line options, making it very easy to learn and use.

SendEmail is licensed under the GNU GPL and supported many platforms like: Linux, BSD, OS X, Windows 98, Windows NT, Windows 2000, & Windows XP

System Requirements

SendEmail requires certain technical requirements to be met for the store to operate properly. You should check to see that these server requirements are provided and installed on your monitoring servers.

The following commands should be run as root user privileges.

To install those requirements use this command:

On Ubuntu:

apt-get install libio-socket-ssl-perl libnet-ssleay-perl perl

On CentOS:

yum install libio-socket-ssl-perl libnet-ssleay-perl perl

In order to send email via gmail you also need additional libraries “Net::SSLeay” and “IO::Socket::SSL” which are needed for authentication.

To install those libraries use this command:

On Ubuntu:

apt-get install 'perl(Net::SSLeay)' 'perl(IO::Socket::SSL)'

On CentOS:

yum install 'perl(Net::SSLeay)' 'perl(IO::Socket::SSL)'

Download and Installation of sendEmail

In order to start the installation , download the sendEmail tar archive:

wget http://caspian.dotconf.net/menu/Software/SendEmail/sendEmail-v1.56.tar.gz

Then extract it:

tar -zxvf sendEmail-v1.56.tar.gz

Then copy the sendEmail script to /usr/local/bin. Make use that you have root permission.

sudo cp -a sendEmail-v1.XX/sendEmail /usr/local/bin

The script needs to be executable, so go make it.

sudo chmod +x /usr/local/bin/sendEmail

Then, go ahead and run:

sendEmail

If everything work fine, you will see a usage summary of sendEmail.

send

In order to troubleshoot any eventual problem, you can  create a log file fro senEmail.

touch /var/log/sendEmail
chmod 666 /var/log/sendEmail

In order to test sending an email via Gmail, the command should look like this:

sendEmail -v -f $username -s $host -xu $username -xp $password -t $recipient -o tls=yes -u $subject -m $content

Configure Nagios Core to Send notification Using Gmail

In order to configure Nagios core to send alert using sendEmail and external smtp server like Gmail, you need to flow those steps:

Start by editing the resource.cfg file located in /usr/local/nagios/etc/resource.cfg :

vi /usr/local/nagios/etc/resource.cfg

Add the following lines with your particular smtp configuration:

$USER5$=email@address.tld
$USER7$=smtp.server.tld:25
#If you don’t use smtp authentication skip this variables and use the version B) of commands.cfg
$USER9$=username
$USER10$=password
On the case of Gmail smtp you can see this example:
$USER5$=email@gmail.com
$USER7$=smtp.gmail.com:587
$USER9$=email
$USER10$=password
Save the file resource.cfg and exit.
After this go under /usr/local/nagios/etc/objects/ and edit the file commands.cfg but that perform a backup of the config file:
cd /usr/local/nagios/etc/objects/
cp commands.cfg commands.cfg.old
Edit the commands.cfg file and you will find two commands ‘notify-host-by-email’ and ‘notify-service-by-email’
A – SMTP AUTHENTICATION COMMANDS
Now, if you use SMTP authentication replace the two commands with the following:
# 'notify-host-by-email' command definition define command{command_name notify-host-by-email command_line /usr/bin/printf "%b" "***** Nagios *****\n\nNotification Type: $NOTIFICATIONTYPE$\nHost: $HOSTNAME$\nState: $HOSTSTATE$\nAddress: $HOSTADDRESS$\nInfo: $HOSTOUTPUT$\n\nDate/Time: $LONGDATETIME$\n" | /usr/local/bin/sendEmail -s $USER7$ -xu $USER9$ -xp $USER10$ -t $CONTACTEMAIL$ -f $USER5$ -l /var/log/sendEmail -u "** $NOTIFICATIONTYPE$ Host Alert: $HOSTNAME$ is $HOSTSTATE$ **" -m "***** Nagios *****\n\nNotification Type: $NOTIFICATIONTYPE$\nHost: $HOSTNAME$\nState: $HOSTSTATE$\nAddress: $HOSTADDRESS$\nInfo: $HOSTOUTPUT$\n\nDate/Time: $LONGDATETIME$\n" }
# 'notify-service-by-email' command definition define command{command_name notify-service-by-email command_line /usr/bin/printf "%b" "***** Nagios *****\n\nNotification Type: $NOTIFICATIONTYPE$\n\nService: $SERVICEDESC$\nHost: $HOSTALIAS$\nAddress: $HOSTADDRESS$\nState: $SERVICESTATE$\n\nDate/Time: $LONGDATETIME$\n\nAdditional Info:\n\n$SERVICEOUTPUT$" | /usr/local/bin/sendEmail -s $USER7$ -xu $USER9$ -xp $USER10$ -t $CONTACTEMAIL$ -f $USER5$ -l /var/log/sendEmail -u "** $NOTIFICATIONTYPE$ Service Alert: $HOSTALIAS$/$SERVICEDESC$ is $SERVICESTATE$ **" -m "***** Nagios *****\n\nNotification Type: $NOTIFICATIONTYPE$\n\nService: $SERVICEDESC$\nHost: $HOSTALIAS$\nAddress: $HOSTADDRESS$\nState: $SERVICESTATE$\n\nDate/Time: $LONGDATETIME$\n\nAdditional Info:\n\n$SERVICEOUTPUT$" }
B- NO SMTP-AUTHENTICATION 
This is pretty much the same but without passing the authentication triggers to sendemail:
# 'notify-host-by-email' command definition define command{command_name notify-host-by-email command_line /usr/bin/printf "%b" "***** Nagios *****\n\nNotification Type: $NOTIFICATIONTYPE$\nHost: $HOSTNAME$\nState: $HOSTSTATE$\nAddress: $HOSTADDRESS$\nInfo: $HOSTOUTPUT$\n\nDate/Time: $LONGDATETIME$\n" | /usr/local/bin/sendEmail -s $USER7$ -t $CONTACTEMAIL$ -f $USER5$ -l /var/log/sendEmail -u "** $NOTIFICATIONTYPE$ Host Alert: $HOSTNAME$ is $HOSTSTATE$ **" -m "***** Nagios *****\n\nNotification Type: $NOTIFICATIONTYPE$\nHost: $HOSTNAME$\nState: $HOSTSTATE$\nAddress: $HOSTADDRESS$\nInfo: $HOSTOUTPUT$\n\nDate/Time: $LONGDATETIME$\n" }
# 'notify-service-by-email' command definition define command{command_name notify-service-by-email command_line /usr/bin/printf "%b" "***** Nagios *****\n\nNotification Type: $NOTIFICATIONTYPE$\n\nService: $SERVICEDESC$\nHost: $HOSTALIAS$\nAddress: $HOSTADDRESS$\nState: $SERVICESTATE$\n\nDate/Time: $LONGDATETIME$\n\nAdditional Info:\n\n$SERVICEOUTPUT$" | /usr/local/bin/sendEmail -s $USER7$ -t $CONTACTEMAIL$ -f $USER5$ -l /var/log/sendEmail -u "** $NOTIFICATIONTYPE$ Service Alert: $HOSTALIAS$/$SERVICEDESC$ is $SERVICESTATE$ **" -m "***** Nagios *****\n\nNotification Type: $NOTIFICATIONTYPE$\n\nService: $SERVICEDESC$\nHost: $HOSTALIAS$\nAddress: $HOSTADDRESS$\nState: $SERVICESTATE$\n\nDate/Time: $LONGDATETIME$\n\nAdditional Info:\n\n$SERVICEOUTPUT$" }
Now the configuration is finished. Before applying the new configuration, run the following command to check for any error or mistake:
/usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg

If there are no errors, restart the nagios service:

service nagios restart

To troubleshoot the sendemail command run the following to check in the log file:

tail -f /var/log/sendEmail

That all!.

Thanks for reading my article.


Advertise here with BSA

---------------------------------------------------------------------
How To Send Alerts From Nagios Core Using Gmail And Yahoo

How To Install Xibo On Ubuntu 14.10/14.04/12.04

$
0
0

What is Xibo?

Xibo is a great content management system that can be used for Digital Signage which is  a form of electronic display used to show messages to the public mainly in the advertisement industry. It is free of charge and this tutorial will help you to learn how to install it on an Ubuntu machine.

According to the official page Xibo includes the followings:

  • Content Management System (CMS);
  • Windows Display Client;
  • Ubuntu Display Client;
  • Ubuntu Off-line Download Client;
  • Android Display Client (Commercial Software*);
  • With Xibo the content is designed from anywhere using a web browser on the internet accessible CMS, scheduled to your Display clients and then downloaded automatically when appropriate. This manual will guide you through the application from installation to troubleshooting, from the CMS to the display clients;
  • Commercial software provided by the project sponsors.

Download And Install Requirements

Since Xibo is a web application built in php programming language we need to use the following command in order to install PHP5, Apache2, MYSQL server and the following php plugins:

  • PHP5 GD plugin
  • PHP5 MySQL plugin
  • PHP5 crypt plugin

Open a new terminal on your Ubuntu operating system (CTRL+ALT+T) machine and run the apt-get update command to update the official repositories like shown below.

sudo apt-get update

 Then use the following command to install all the requirements in order to run the Xibo CMS on Ubuntu.

sudo apt-get install apache2 mysql-server php5 php5-gd php5-mysql php5-mcrypt

Once the installation of the required packages is finished it is time to download and configure the latest Xibo application on your machine.

Download And Install Xibo On Ubuntu

The wget utility is very useful when it comes to downloading software from the commandline. I use it alot during development work and even when I test new software.

Use the wget utility like shown below.

wget https://github.com/xibosignage/xibo-cms/archive/1.7.1.tar.gz -O xibo-server.tar.gz

Then extract it using the tar utility. The option is used to indicate verbose mode which is very helpful if you want to see the output of the command displayed on your terminal.

tar xvzf xibo-server.tar.gz

Then run the following commands.

sudo mv xibo-server-142 /var/www/xibo-server
sudo chown www-data:www-data -R /var/www/xibo-server

Once you have finished create a directory for the storage of the media files you will use on Xibo. The following commands will help you do to that.

sudo mkdir /media/xibo-library
sudo chown www-data:www-data -R /media/xibo-library

Web Installation

Restart the webserver with the following command and visit the address http://127.0.0.1/xibo-server in a new tab on your favorite web browser.

sudo /etc/init.d/apache2 restart

Once you visit the url in your web browser it will look like the following.

Click next to continue. There are six steps we need to follow in order to complete the installation of Xibo on your system.

As you can clearly see from the above screenshot Xibo needs to use a connection to your MySQL database. I am going to create a new empety database and will let Xibo do it for me. I suggest you do the same. Leave host as localhost, create an admin password, database name, database username and click on next again.

You will se the following displayed on your screen.

The above will help you to create the administrator account will gain access to the CMS. Mine are the followings. Make sure you use a strong password and an original username.

Click on next again so you can continue with the next step.

The Library Location is the place where things you upload will be stored. Put the full path location of the folder we created for the media files. It should be /media/xibo-library.

Then click on next.

Xibo is finally installed on your machine. Use the login credentials you created and login.

Done!


Advertise here with BSA

---------------------------------------------------------------------
How To Install Xibo On Ubuntu 14.10/14.04/12.04

How To Install And Use Sysdig Troubleshooting Tool

$
0
0

Introduction

One of the most imporant task for an system administrator is the troubleshooting and diagnostic of problems. Today you can say goodbye to top, lsof, strace, iostat, ps, etc., and you can use  sysdig: The most powerful Linux system troubleshooting. 

Sysdig is open source, system-level exploration and a troubleshooting tool that captures system state and activity from a running Linux instance using a linux kernel facility called tracepoint , then save, filter and analyze. Sysdig combines the benefits of many utilities such as strace, tcpdump, and lsof into one single application.

Sysdig is also packed with a set of scripts called Chisels that make it easier to extract useful information and do troubleshooting.

In this article we’ll explore the installation and basic usage of sysdig to perform system monitoring and troubleshooting on Linux.

For more information, you can see the website of Sysdig.

Features Of Sysdig

  • Fast and stable
  • Easy to Use
  • Debugging pretty much anything
  • Crazy Powerful
  • and more

Installing Sysdig On Ubuntu

To install sysdig via apt we will need to setup the apt repository maintained by Draios the company behind sysdig. We can do this by running the following curl commands.

The following commands should be run by root user.

curl -s https://s3.amazonaws.com/download.draios.com/DRAIOS-GPG-KEY.public | apt-key add -  
curl -s -o /etc/apt/sources.list.d/draios.list http://download.draios.com/stable/deb/draios.list

After this command you need to update your server. Use this command to do that.

apt-get update

The sysdig tools requires the kernel headers package before installing it. Flow the command to install the kernel headers package.

Use this command to check the kernel version.

uname -r
apt-get install linux-headers-<kernel version>

Now you can install sysdig on ubuntu using this command.

apt-get install sysdig

Installing Sysdig On CentOS

Before stating with the installation itself, you will need to setup the yum repository that will use this key to verify the authenticity of the package you’re about to download.

Use the rpm tool with the --import flag To manually add the Draios key to your RPM keyring.

sudo rpm --import https://s3.amazonaws.com/download.draios.com/DRAIOS-GPG-KEY.public  

Then, download the Draios repository and configure yum to use it:

sudo curl -s -o /etc/yum.repos.d/draios.repo http://download.draios.com/stable/rpm/draios.repo

After that try to make update to your server using this command

yum update

Then you need to enable extra packages for enterprise Linux (EPEL) The EPL repository is needed in order to download the Dynamic Kernel Module Support (DKMS) package, which is used by sysdig tool. Flow the command to enable EPEL repository:

sudo yum -y install epel-release

Then you need to install kernel headers in order to setup sysdig-probe module used by sysdig.

sudo yum -y install kernel-devel-$(uname -r)

Now you can install sysdig.

sudo yum -y install sysdig

Using Sysdig

The simplest and easiest method to use sysdig is by invoking it without any argument.By default, sysdig prints the information for each captured event on a single line.

sysdig

you will see output like this example.

25722 22:48:41.788762892 3 sshd (1733) > rt_sigprocmask
25723 22:48:41.788763312 3 sshd (1733) < rt_sigprocmask
25724 22:48:41.788763603 3 sshd (1733) > rt_sigprocmask
25725 22:48:41.788763801 3 sshd (1733) < rt_sigprocmask
25726 22:48:41.788764486 3 sshd (1733) > read fd=11(<f>/dev/ptmx) size=16384
25727 22:48:41.788765210 2 sysdig (3745) > switch next=318 pgft_maj=0 pgft_min=910 vm_size=92452 vm_rss=5532 vm_swap=0
25728 22:48:41.788766062 3 sshd (1733) < read res=118 data=8622 22:48:41.759980138 2 sysdig (3745) > switch next=318 pgft_maj=0 pgft_min...
25729 22:48:41.788778756 2 <NA> (318) > switch next=3745(sysdig) pgft_maj=0 pgft_min=0 vm_size=0 vm_rss=0 vm_swap=0
25731 22:48:41.788785389 3 sshd (1733) > select

To write output of the sysdif in a file you can use the -w flag  and specify the file name.

sysdig -w <output file>

Example:

sysdig -w trace.dump

You can read the output file using this command

sysdig -r <output file>

Example:

sysdig -r trace.dump

Sysdig command has filters that allow you to filter the output to specific information. You can find a list of available filters by running this command.

sysdig -l
sysdig -l
 ----------------------
    Field Class: fd

    fd.num            the unique number identifying the file descriptor.
    fd.type           type of FD. Can be 'file', 'ipv4', 'ipv6', 'unix', 'pipe', 'e
                      vent', 'signalfd', 'eventpoll', 'inotify' or 'signalfd'.
    fd.typechar       type of FD as a single character. Can be 'f' for file, 4 for 
                      IPv4 socket, 6 for IPv6 socket, 'u' for unix socket, p for pi
                      pe, 'e' for eventfd, 's' for signalfd, 'l' for eventpoll, 'i'
                       for inotify, 'o' for uknown.
    fd.name           FD full name. If the fd is a file, this field contains the full path. 
                       If the FD is a socket, this field contain the connection tuple.
<truncated output>

You can use the “proc.name” filter to capture all of the sysdig events for a specific process.

sysdig -r tracefile.dump proc.name=name-of-process

Example:

sysdig -r tracefile.dump proc.name=sshd
    530 23:45:02.804469114 0 sshd (917) < select res=1 
    531 23:45:02.804476093 0 sshd (917) > rt_sigprocmask 
    532 23:45:02.804478942 0 sshd (917) < rt_sigprocmask 
    533 23:45:02.804479542 0 sshd (917) > rt_sigprocmask 
    534 23:45:02.804479767 0 sshd (917) < rt_sigprocmask 
    535 23:45:02.804487255 0 sshd (917) > read fd=3(<4t>10.0.0.12:55993->162.0.0.80:22) size=16384

You can see here many examples how to use sysdig.

That all!

Hope this article help you.


Advertise here with BSA

---------------------------------------------------------------------
How To Install And Use Sysdig Troubleshooting Tool

How To Install Hiawatha Webserver On CentOS 7

$
0
0

In this tutorial I will teach you guys how to install Hiawatha on your CentOS 7 machine. But, what is it?

About Hiawatha

Hiawatha is a lightweight webserver which is built with security in mind both in code and features, preventing common web application attacks such as sql injection, cross-site scripting(xss) and CSRF. According to the official page you don’t need to be an expert on http or cgi to use this webserver as it is very easy to use.

This fully functional webserver started back in January 2002 as an opensource project in order to provide a very secure webserver to the user and also easy configuration syntax. Special techniques are used on the webserver to make it run even on old hardware, the fact that someone managed to run it on a raspberry pi means alot, doesn’t it?

Some Features Of Hiawatha

There are many features present in the Hiawatha webserver. It supports IPV6 which makes a very prepared webserver for the future, control the access to your websites via Basic or Digest HTTP authentication or by IP address, execution of CGI scripts and SSL.

Security is the key feature of this webserver, offering great protection from dangerous malicious attacks such as sql injections, xss attacks and csrf.

Hiawatha allows you to keep track of all your webservers via a PHP application called Hiawatha Monitor. There is also a CommandChannel which can be used to get detailed information on a single webserver or even control it.

“The Hiawatha Monitor is a monitoring tool for the Hiawatha webserver. It can be used to keep track of the performance and security of all your Hiawatha webservers via one single interface. It’s not a replacement for analytics software or the local logfiles, but it gives you a quick and easy overview of how your webservers are performing and which ones require some attention. The Hiawatha Monitor is a PHP5 web application with a MySQL database backend. It requires the cron daemon for periodic downloading of statistical information from the web servers it monitors.”, reads the official documentation.

Other features include:

  • Speed
  • URL rewriting
  • Reverse Proxy

Installation On CentOS 7

The installation of Hiawatha on CentOS 7 is very easy, easier than any installation you have done with another webserver. Open a new terminal tab and run the following command to download a repo we need before going any further.

wget http://anku.ecualinux.com/7/x86_64/anku-release-8-1.noarch.rpm

The following screenshot will help you to understand what is going on.

Once the download is finished, clear your screen and run the following command to become root.

su root

The rpm command will help us to install the rpm file we downloaded.

rpm -ivh anku-release-8-1.noarch.rpm

If the installation succeeds you will see the following output.

Run the following command to clear the screen.

clear

The yum program is used to maintain systems using rpm. Now it is time to enable the repo we just added and proceed with the installation.

yum --enablerepo=anku install hiawatha -y

When the installation starts you will see the following.

If the installation of the Hiawatha webserver succeeds you will see the following on your screen.

Once the installation is finished start the server by using the command service hiawatha start like shown below.

service hiawatha start

Then open a new tab on your web browser and visit http://www.127.0.0.1.

Done!


Advertise here with BSA

---------------------------------------------------------------------
How To Install Hiawatha Webserver On CentOS 7

How To Install VirtualMin On CentOS

$
0
0

Introduction

One of the most important consideration for a Linux system administrator is how to easily manage and configure  the server. Control Panel software is a the best solution to make that. It allows a user to configure and administer a server without the need to log in on the command line using a web interface. One of the more popular control panel is Virtualmin.

Virtualmin is a Webmin module for managing multiple virtual hosts through a single interface, like Plesk or Cpanel. It supports the creation and management of Apache virtual hosts, BIND DNS domains, MySQL databases, and mailboxes and aliases with Sendmail or Postfix. It makes use of the existing Webmin modules for these servers, and so should work with any existing system configuration, rather than needing it’s own mail server, web server and so on.

Two versions of Virtualmin exist:

  • Virtualmin GPL wichich is a free and the open source version.
  • Virtualmin Pro wichich is a the commercail version of Virtualmin.

In this article we will show you how to install Virtualmin under Centos 6.5.

System Requirements

It’s highly recommends using a freshly installed server to prevent conflicts when you start the installation and you need to update the system to ensure that we have all of the latest software installed.

sudo yum -y update

Also you need to make sure that you server has a hostname.Use the following command to check your current hostname.

hostname -f

And use the following command to change your hostname

hostname server.doamin.com

Download and install VirtualMin

Virtualmin can be installed in a number of ways an automated install script or manual Installation.It’s strongly recommend that you use the automated install script to install Virtualmin because the script contains the standard package management features of your OS, and software repositoriesof VirtualMin

To download the VirtualMin installer. Type the following to download it:

wget http://software.virtualmin.com/gpl/scripts/install.sh

Now it is time to install VirtualMin. To do so, use the command below:

sudo sh install.sh

You will be prompted with a license agreement. Press Y followed by Enter to continue.

It will begin performing several checks and installing the required components.

Once it has completed you should see a line similar to the following:

ssapi mod_ssl ruby ruby-devel rubygems perl-XML-Simple perl-Crypt-SSLeay: Succeeded.

Completing the installation

When the install script has finished installing, you can log  to log into your VirtualMin console. To do this point your web browser to  the following URL:

https://server.domain.com:10000/ or https://ip-address-of-server:10000

There you can login with your root username and password. Once you are logged in the “Post-Installation Wizard”, it will begin to configure your Virtualmin installation.

webmin

That all for this article. Hope this help you to install virtualmin.

The next article will be how to configure virtualmin, please hold on and don’t forget to share this article.


Advertise here with BSA

---------------------------------------------------------------------
How To Install VirtualMin On CentOS


How To Make Nvidia Optimus Technology Work (properly) On Debian

$
0
0

Hello guys! My name is Cosmin Crihan and I am writing this tutorial in order to show you how to make the Nvidia optimus technology properly work on Debian systems. For Ubuntu or Linux Mint users, I am aware of a little button that triggers the usage of the Nvidia X Org Server or the Nouveau Drivers, at your command. But you all know that Debian is not simple, but powerful. Here, it is not so easy.

I wanted to write this tutorial because it took me an entire week to make my video card work on my system and I found that this problem affects many many users having the Optimus technology from Nvidia. Note that some users might still use the card no problem by activating it from the BIOS (toggling the Discrete Graphics option). Well, I don’t have this option, and many don’t.

For those who don’t know what is Nvidia Optimus, it is an Nvidia technology that should trigger the usage of your dedicated video card on demand, so it consumes less power and only activates itself if it is needed. In other words, if the PC needs video performance, the dedicated card gets into action. That’s the theory: welcome to Linux! (if you know what I mean).

First, I must mention a part of this tutorial is from this link.

DO NOT install the official drivers from the nvidia website, because they do not work, and if they do install, you will need to reinstall them at each kernel upgrade. They are a useless piece of crap, in that form there, on the driver download page.

Follow these steps carefully in order to setup your system to use the discrete card. If you already have things installed from Nvidia, purge everything:

sudo apt-get remove --purge nvidia*

1. You will need to enable the 32-bit architecture on your system, like so:

sudo dpkg --add-architecture i386

2. Update your system

sudo apt-get update

3. Install the required packages:

sudo apt-get install bbswitch-dkms intel-microcode firmware-linux-nonfree bumblebee bumblebee-nvidia primus primus-libs primus-libs:i386 linux-headers-$(uname -r)

If this command complaints about not finding some of the packages, check if you have enabled the non-free repositories in your sources.list file. Open it: “/etc/apt/sources.list” and check that you have “non-free contrib” added at each line.

Note that during installation, you will be prompted by some blue screens telling you to configure manually the Nvidia X server, and to blacklist the Nouveau conflicting driver. Ignore everything and continue the installation (it’s fine).

4. After installation, open this file as root, with your favorite text editor: /etc/bumblebee/bumblebee.conf

For example,

sudo mousepad /etc/bumblebee/bumblebee.conf

Find within the file, this line: “KernelDriver=”. It should be empty after the equal sign, or it might contain “nvidia”. Write “nvidia-current” instead, so it looks like: “KernelDriver=nvidia-current”.

5. Add your user to the bumblebee group, if not already done:

sudo addgroup <your_username_here> bumblebee

If this says you were already added, it is OK.

6. You need to also append a new boot parameter. Use your text editor to open /etc/default/grub.

Example:

 sudo mousepad /etc/default/grub

Find the line “GRUB_CMDLINE_LINUX_DEFAULT” and add the parameter: “rcutree.rcu_idle_gp_delay=1″

Example of the line in cause, after modification: GRUB_CMDLINE_LINUX_DEFAULT=”quiet rcutree.rcu_idle_gp_delay=1″

7. Update GRUB and regenerate the boot image:

sudo update-grub

8. Reboot and you are done!

You can use your discrete video card with the “primusrun” or “optirun” commands. After the restart, try it in your terminal:

 optirun glxgears

You will be presented an animation with some rotating coloured gears, that is really rendered with your Nvidia card.

To open a process with your dedicated video card, simply add “primusrun” or “optirun” in front of the command.

Example:

“primusrun ./AmnesiaAMFP” (supposing I am in the “Amnesia – A Machine for Pigs” game folder).

For Steam games, you need to place a special code in the game launch options, to run it with the Nvidia video card. Right click the game you want to be opened with the discrete graphics card every time, choose “Properties”. In the new window that appeared, click “SET LAUNCH OPTIONS” and write there “primusrun %command%”. Close the properties window and you’re ready to go.

These commands are very useful, I even opened Google Chrome with primusrun to watch a Youtube 4K video, so it was rendered with my Nvidia card, as it was laggy with the Intel chip.

And now, I must mention about a recent bug, that prevents primusrun from working with some games, especially on Steam. Recently, after some updates, I noticed that games like Left4Dead 2, Antichamber, Half Life, Oil Rush, and many others stopped working with primusrun, they just don’t run at all, crash with a puzzling error (if you run them in terminal). I researched this and found out that it is a problem with a package called libdrm-intel1 that is bugged in it’s recent version, 2.4.58.

NOTE: Proceed to the next workaround step only if you need to (if the primusrun command does not start your games properly, or it does for some only). Check the version of your libdrm-intel1 package, like this:

apt-cache show libdrm-intel1 | grep Version

If it returns 2.4.58, try the workaround:

If you are experiencing the same bug (games don’t run at all), you must downgrade the package to version 2.4.56. It is a workaround until we expect a future fix. But that is not all, of course. The package depends on other 10 packages that also need downgrading, so that the package manager does not complain about dependency breaking.

The packages that need downgrading are: libdrm-dev libdrm-dev:i386 libdrm-intel1 libdrm-intel1:i386 libdrm-nouveau2 libdrm-nouveau2:i386 libdrm-radeon1 libdrm-radeon1:i386 libdrm2 libdrm2:i386

You need all these installed over the new ones, version 2.4.56.

You can either Google them, find them on the official Debian packages website, or download them from the archive I made here: http://www.filedropper.com/primusfixtar

Install everything in there with,

sudo dpkg -i *.deb

ignoring all the warnings about downgrading.

After you do this, there is another step to ensure that your package manager does not update these thing back. To prevent this happening, you can use the “apt-mark hold” command, to “hold” a package from upgrading itself.

Write this in terminal:

sudo apt-mark hold libdrm-dev libdrm-dev:i386 libdrm-intel1 libdrm-intel1:i386 libdrm-nouveau2 libdrm-nouveau2:i386 libdrm-radeon1 libdrm-radeon1:i386 libdrm2 libdrm2:i386

If you try to upgrade the system, you will be greeted with something like this:

Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
The following packages have been kept back:
libdrm-dev libdrm-dev:i386 libdrm-intel1 libdrm-intel1:i386 libdrm-nouveau2
libdrm-nouveau2:i386 libdrm-radeon1 libdrm-radeon1:i386 libdrm2 libdrm2:i386

This is normal, it will not affect the upgrading process, but it will keep those packages at the required version for primusrun to work, for now.

That is all you need for now, until a fix is made for the buggy package “libdrm-intel1″. When a fix will be available, we must leave the held packages to upgrade themselves, by running:

sudo apt-mark unhold libdrm-dev libdrm-dev:i386 libdrm-intel1 libdrm-intel1:i386 libdrm-nouveau2 libdrm-nouveau2:i386 libdrm-radeon1 libdrm-radeon1:i386 libdrm2 libdrm2:i386

Done!

If you have any doubts or comments, feel free to write me: astronos2007@yahoo.com


Advertise here with BSA

---------------------------------------------------------------------
How To Make Nvidia Optimus Technology Work (properly) On Debian

How To Install ONLYOFFICE On Ubuntu

$
0
0

What is ONLYOFFICE

ONLYOFFICE is a free, open source software that helps to organize the teamwork online. The current Linux version of ONLYOFFICE comprises the following features:

  • document management including integration with file storage systems, like Google Drive, Box, OneDrive, Dropbox and SharePoint;
  • project management with Gantt Chart;
  • CRM and invoicing;
  • set of tools for collaboration within a team including chat, blogs, forums, news, wiki etc.
  • email aggregator.

This guide will show how to install ONLYOFFICE on Ubuntu. This will also work on Debian and its derivatives.

System requirements

For ONLYOFFICE correct work your machine should meet some system requirements and have some additional components installed:

  • RAM: 2 GB or more
  • Swap file: at least 2 GB
  • HDD: at least 2 GB of free space
  • mono: version 3.2 or later
  • MySQL: version 5.6 or later
  • nginx

If some of these components are missing in your system, refer the following this link.

Installing ONLYOFFICE

To install ONLYOFFICE from the repository, first of all you need to download ONLYOFFICE GPG signing key:

sudo wget http://download.onlyoffice.com/repo/onlyoffice.key 

And add it to the system:

sudo apt-key add onlyoffice.key

Then add ONLYOFFICE repository to the list stored in the /etc/apt/sources.list file. Open this file using any available text editor (e.g. nano):

sudo nano /etc/apt/sources.list

Add the following record:

deb http://download.onlyoffice.com/repo/debian squeeze main

Update the package cache:

sudo apt-get update

Now to install ONLYOFFICE from the repository execute the following command:

sudo apt-get install onlyoffice

Running ONLYOFFICE

To open your office in the web browser, enter localhost (http://127.0.0.1) in the address bar of your browser. The Welcome page will open:

Enter a password and specify the email address you will use to access your ONLYOFFICE the next time.

ONLYOFFICE_on_Ubuntu

Done! Your office is ready!

Onlyoffice

For more details visit,


Advertise here with BSA

---------------------------------------------------------------------
How To Install ONLYOFFICE On Ubuntu

Install Shinken Monitoring Framework On Ubuntu

$
0
0

About Shinken Monitoring Framework

Shinken is an open source monitoring framework based on Nagios core. It is written using Python and is licensed under the terms of the GNU Affero General Public License. Hence, It is based on Nagios core you can use the nagios configuration and plugins without modifying or re-writing them. Shinken has no limits regarding distribution. You can scale it to your LAN, through your DMZs and even across several datacenters. Shinken is very easy compared to Nagios in terms of usage and installation. It is multi-platform, and you can easily migrate from nagios.

Features

The following are the features of Shinken.

  • Ready to run monitoring packs;
  • Endless scalability and RAID-like availability;
  • Focus on critical business impacts only;
  • Full virtualization integration;
  • Keep your Nagios configuration and plugins;
  • Load balancing;
  • High availability;
  • Multi-paltform;
  • Multi sites management;
  • and many.

In this guide, we will see how to install and configure Shinken on Ubuntu 14.04 system. Although, the same steps should work on Debian too.

Installation

Change to root user with command:

sudo su

Install the following required dependencies.

apt-get update
apt-get install python-pip python-pycurl python-cherrypy3 python-setuptools -y

Create a new user namely shinken.

adduser shinken

Now, run the following command to download and install Shinken.

pip install shinken

Sample output:

Downloading/unpacking shinken
  Downloading Shinken-2.2.tar.gz (27.1MB): 27.1MB downloaded
  Running setup.py (path:/tmp/pip_build_root/shinken/setup.py) egg_info for package shinken

[...]

Changing owner of /etc/shinken to shinken:shinken
    Changing owner of /var/run/shinken to shinken:shinken
    Changing owner of /var/log/shinken to shinken:shinken
    Changing owner of /var/lib/shinken/ to shinken:shinken
    Changing owner of /var/lib/shinken/libexec to shinken:shinken
    Changing owner of /usr/bin/shinken to shinken:shinken
    Changing owner of /usr/bin/shinken-receiver to shinken:shinken
    Changing owner of /usr/bin/shinken-scheduler to shinken:shinken
    Changing owner of /usr/bin/shinken-broker to shinken:shinken
    Changing owner of /usr/bin/shinken-poller to shinken:shinken
    Changing owner of /usr/bin/shinken-arbiter to shinken:shinken
    Changing owner of /usr/bin/shinken-reactionner to shinken:shinken
    Changing owner of /usr/bin/shinken-discovery to shinken:shinken
    Shinken setup done
Successfully installed shinken
Cleaning up...

Shinken has been installed now.

Change to the ‘shinken’ user and initialize shinken.

su shinken
shinken --init

Sample output:

Creating ini section paths
Creating ini section shinken.io
Saving the new configuration file /home/shinken/.shinken.ini

Now, install Shinken web user interface using command:

shinken install webui

Sample output:

Grabbing : webui
OK webui

Install Shinken identification module too.

shinken install auth-cfg-password

Sample output:

Grabbing : auth-cfg-password
OK auth-cfg-password

Here is an important part. We need to install a module to store user data in a database. If you didn’t install this module, you will have the following error while accessing Shinken Dashboard:

Warning:

You didn’t define a WebUI module for saving user preferences like the MongoDB one. You won’t be able to use this page!

Dashboard - Mozilla Firefox_004

Here, we will install sqlitedb module using command:

shinken install sqlitedb

Sample output:

Grabbing : sqlitedb
OK sqlitedb

We have finished the installation of Shinken and it’s modules now. You can find the installation and configuration files in the following locations.

  • /etc/shinken for configuration files
  • /var/lib/shinken for shinken modules, retention files…
  • /var/log/shinken for log files
  • /var/run/shinken for pid files

Next, we will see Shinken configuration.

Shinken Configuration

First we need to enable Webui by editing the broker-master.cfg file,

nano /etc/shinken/brokers/broker-master.cfg

Add the following line:

[...]
modules     webui
[...]

Edit webui.cfg file to enable authentication modules and SQLite database for the user interface.

nano /etc/shinken/modules/webui.cfg

Add the following line:

[...]
modules         auth-cfg-password,SQLitedb
[...]

Save and close the file.

Restart shinken service.

service shinken restart

Now, you’ll be able to access the Shinken webui using URL: http://ip-address:7767. The default username/password is admin/admin.

However, It is recommended to change the admin user password to something strong.

Edit the following file and change the default admin user password.

nano /etc/shinken/contacts/admin.cfg
# This is a default admin
# CHANGE ITS PASSWORD!

define contact{
    use             generic-contact
    contact_name    admin
    email           sk@unixmen.com   
    pager           0600000000   ; contact phone number
    password        <put-strong-password>
    is_admin        1
    expert          1
}

Save and close the file.

Now, restart shinken service.

service shinken restart

Now, open up your web browser and access the Shinken web console using URL: http://ip-address:7767.

Enter the username and password which we defined in the above steps.

Shinken UI login - Mozilla Firefox_001

This is how your Shinken web console will look.

All problems - Mozilla Firefox_001

As you see above, the Shinken server(localhost) is being monitored by default. And the localhost is down with error:

[Errno 2] No such file or directory.

This is because we haven’t installed the monitoring plugins yet.

We will download and install some plugins. Return back to the root user by typing: exit.

Then, enter the following command to download shinken plugins.

 wget --no-check-certificate https://www.monitoring-plugins.org/download/monitoring-plugins-2.1.1.tar.gz

You can find the latest plugins here.

Extract the tar file.

tar -xvf monitoring-plugins-2.1.1.tar.gz

Now, install the plugins using commands:

cd monitoring-plugins-2.1.1
./configure --with-nagios-user=shinken --with-nagios-group=shinken --enable-libtap --enable-extra-opts --enable-perl-modules --libexecdir=/usr/lib/nagios/plugins
make install

That’s it.

Restart shinken service.

service shinken restart

Now, wait for few seconds and refresh or re-login to the shinken webui page.

Congratulations. Now, the Shinken server(localhost) is up and is being monitored by Shinken.

All problems - Mozilla Firefox_002

You can see detailed output by clicking on the localhost (or hostname of the server).

Host detail about localhost - Mozilla Firefox_003

Initially, Shinken doesn’t has any widget by default. Let us add some widget. To do that, go to that Dashboard and click Add a new widget button.

Dashboard - Mozilla Firefox_004Select the available widgets on the right side.

Dashboard - Mozilla Firefox_005

Now, you’ll see the widgets have been added in the dashboard.

Dashboard - Mozilla Firefox_006

That’s all for now. We will see how to add clients and monitor them from the Shinken server in our upcoming article.

That’s it. Cheers!

Reference:


Advertise here with BSA

---------------------------------------------------------------------
Install Shinken Monitoring Framework On Ubuntu

ClipGrab: A Friendly Downloader And Converter For YouTube And Other Sites

$
0
0

About ClipGrab

We all know that we can download videos from popular websites like YouTube, Metacafe, Vimeo etc. There are many applications available to download from those sites. But, the problem is some websites doesn’t allow you to save videos to a different format. You can only download the videos in the given format by those sites. Ofcourse, there are plenty of tools available to convert the downloaded videos to different formats. However, downloading videos using one tool, and then convert them to another format using another tool might be definitely time wasting process. This is where ClipGrab comes in handy.

ClipGrab is a 2-in-1 tool that can use used to download videos from many video sites and convert them to the desired format in minutes. It supports Linux, Windows and Mac OS X platforms. ClipGrab can download videos from popular online video sites such as YouTube, Vimeo, Dailymotion etc. The list of supported video sites are given below.

  • YouTube
  • Vimeo
  • Dailymotion
  • metacafe.com
  • youku.com
  • myspass.de
  • myvideo.de
  • clipfish.de

If a site isn’t officially supported by ClipGrab, you might still be able to download videos from it. Through an advanced video-recognition system, ClipGrab allows the download from thousands of websites even if they are not listed above.

ClipGrab can convert videos to the following formats.

  • MPEG4
  • MP3
  • WMV
  • OGG Vorbis
  • OGG Theora

Install ClipGrab On Ubuntu/Linux Mint

ClipGrab has a official PPA to make the installation lot easier.

sudo add-apt-repository ppa:clipgrab-team/ppa
sudo apt-get update
sudo apt-get install clipgrab

Or you can use the NoobsLab PPA.

sudo add-apt-repository ppa:noobslab/ppa
sudo apt-get update
sudo apt-get install clipgrab

For other distribution users can download, and install ClipGrab tar file from the official page as shown below.

wget http://download.clipgrab.de/clipgrab-3.4.9.tar.gz
tar xvf clipgrab-3.4.9.tar.gz
cd clipgrab-3.4.9
sudo chmod +x clipgrab-*
sudo ./clipgrab-3.4.2.x86_64

Usage

After installing ClipGrab, launch it either from Unity Dash or Menu.

At first time, you’ll be asked to install ffmpeg or avconv if you haven’t install them on your system.

clipgrab_001

Install it using command:

sudo add-apt-repository ppa:jon-severinsson/ffmpeg
sudo apt-get update
sudo apt-get install ffmpeg
sudo apt-get install frei0r-plugins

This is how ClipGrab main interface looks.

ClipGrab - Download and Convert Online Videos_002

Enter a keyword in the search box in order to search videos on Youtube or other sites. For example, I am going to search MJ popular video namely “Dangerous”.

ClipGrab - Download and Convert Online Videos_004

As you see, ClipGrab lists the avialable videos. Select the video you want to download.

And then, select the format, quality, and finally click the button Grab this clip.

ClipGrab - Download and Convert Online Videos_005

That;s it. Now the selected video will start to download. By default, the videos will be saved in Desktop. You can change the path from the Settings Tab.

ClipGrab - 4 -_006

That’s all. Have fun. Enjoy!


Advertise here with BSA

---------------------------------------------------------------------
ClipGrab: A Friendly Downloader And Converter For YouTube And Other Sites

How To Monitor Vmware ESXi Host Using Cacti

$
0
0

Introduction

Cacti is an open source web based network monitoring tool front-end for the data logging tool called RRDtool. It’s allow users to check the services at an interval of time and resulting in the graph format.

For more information, you can visit the website of Cacti.

This article is intended for use by Cacti Administrators who want to monitor VMware ESXi Hosts Using Cacti.

If you haven’t installed Cacti yet, check the following article.

On Ubuntu based systems:

On RPM based systems:

This tutorial explains the process to monitor your linux servers with Cacti and SNMP.

In this article we will show you how to install and configure SNMP in the remote server and how to add the host to Cacti.

Enable SNMP Monitoring on VMware ESXi Hosts

Before you start Cacti configuration to monitor Esxi, you need to enable SNMP on the host. ESXi has an SNMP agent which allows the host to send SNMP traps and got polling requests.

To enable SNMP on ESXi host, type the the following commands.

esxcli system snmp set --communities SNMP_STRING
esxcli system snmp set --enable true
esxcli network firewall ruleset set --ruleset-id snmp --allowed-all true
esxcli network firewall ruleset set --ruleset-id snmp --enabled true
/etc/init.d/snmpd restart

You need to replace SNMP_STRING with your community string. Also ,y ou can change the firewall rule to only allow a specific subnet or host if you would like to.

esxcli network firewall ruleset set --ruleset-id snmp --allowed-all false
esxcli network firewall ruleset allowedip add --ruleset-id snmp --ip-address 10.80.101.0/24
esxcli network firewall ruleset set --ruleset-id snmp --enabled true
/etc/init.d/snmpd restart

Use snmpwalk command to test that the snmpd service work fine like this example:

$ snmpwalk -v 1 -c SNMP_STRING ip-address-of -exi-host

SNMPv2-MIB::sysDescr.0 = STRING: VMware ESXi 5.5.0 build-1331820 VMware, Inc. x86_64
SNMPv2-MIB::sysObjectID.0 = OID: SNMPv2-SMI::enterprises.6876.4.1
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (12300) 0:02:03.00
SNMPv2-MIB::sysContact.0 = STRING:
SNMPv2-MIB::sysName.0 = STRING: cloud1.1on1.com
SNMPv2-MIB::sysLocation.0 = STRING:
SNMPv2-MIB::sysServices.0 = INTEGER: 72
SNMPv2-MIB::sysORLastChange.0 = Timeticks: (0) 0:00:00.00
SNMPv2-MIB::sysORID.1 = OID: SNMPv2-MIB::snmpMIB
SNMPv2-MIB::sysORID.2 = OID: IF-MIB::ifMIB
SNMPv2-MIB::sysORID.3 = OID: IP-MIB::ip
SNMPv2-MIB::sysORID.4 = OID: IP-FORWARD-MIB::ipForward
SNMPv2-MIB::sysORID.5 = OID: UDP-MIB::udp
SNMPv2-MIB::sysORID.6 = OID: TCP-MIB::tcp
SNMPv2-MIB::sysORID.7 = OID: SNMPv2-SMI::mib-2.47
…

Add VMware ESXi Hosts on Cacti

Before you add new host to Cacti , you need to configure ESXi host template. You will not  have  time to develop one, but there are plenty of things that you can monitor on an ESXi host using default standard Cacti templates.  With this template you will be able to begin graphing my datastores space used, network interfaces, users logged in, and memory consumed.

So first step to do is to download this template from this link to your pc.

Then you need to upload this template to Cacti from the web interface. Go Under Import/Export and choose Import Templates and then upload the template.

cacti1

If the import is done, you should see the new template under Host Template

cacti2

Once that is done you will need to add the new box as a device on your Cacti web interface. Click Add new Devices and choose ESXi5.x as Host template and don’t forget to make the snmp comunities.

cacti4

After clicking Create you will see that you got the good snmp information like this example

cacti5

Now that the device has been added, we specify the graph templates that we want to create. This section can be found in the bottom section of the page.

cacti6

And then we proceed to creating the graphs.

cacti1000

Here, we create graphs for datastores space used, network interfaces, users logged in, and memory consumed.

cacti7

Choose the graphs that you want to add to your host.  You should see all of your interfaces, datastores, real memory, etc…

Cacti takes around 15 minutes for Cacti to populate new graphs. And after that you will see graph like this example:

cacti8

cacti9

cacti10

cacti11

cacti12

Done, now you areb able to monitor your VMware ESXi Host.

Thank you.


Advertise here with BSA

---------------------------------------------------------------------
How To Monitor Vmware ESXi Host Using Cacti

How To Fix “VLC does not support the audio or video format “hevc””

$
0
0

VLC media player is a free and open source media player, encoder, and streamer made the volunteers of VideoLAN community.

vlc+hevc

No suitable decoder module

VLC does not support the audio or video format “hevc.

Unfortunately there is no way for you to fix this.

The above error message is a result of trying to play a video file in VLC. The error message doesn’t give a clue either. To fix this we need to install libde265, which is an open source implementation of the h.265 video codec.

We will install libde265 via PPA. To install open Terminal and run the commands below:

sudo apt-add-repository ppa:strukturag/libde265 
sudo apt-get update 
sudo apt-get install vlc-plugin-libde265

VLC should now play these media files after installation has been completed successfully.

Enjoy!


Advertise here with BSA

---------------------------------------------------------------------
How To Fix “VLC does not support the audio or video format “hevc””

Symple PC – Introducing A Low Cost PC Powered By Ubuntu

$
0
0

Hello Ubuntu fans, here is a good news for you. A new low cost PC powered by Ubuntu is available now. Yes, the system name is Symple PC. As it’s name says, it is very simple and cheap to buy. Curious to know the cost? It’s just 89 USD. Symple is 50% weight less than an average desktop tower system. It is purely made using black recycled ABS plastic and shipped in 100% non-virgin fiber packaging. The dimension of Symple PC case is just 12.5×12.5×6.25.

symple pc

Yet another notable thing is symple PC comes with Ubuntu 14.04 LTS pre-installed. So don’t worry about the licensing or renewal costs of OS. You will get the updates and fixes for Ubuntu 14.04 LTS till April 2019. Indeed a good one, isn’t it? You can use this PC to testing labs, Class room labs, non-profit organizations, Net-cafes, Small/Medium offices, Call centers etc. And the good news is Symple PC comes with 1 year Advanced Replacement Warranty. After the 1 year, Symple team offers a $10 Environmental Credit for any Symple PC that is returned to them when you purchase a new unit.

What makes Symple PC special?

Mr.Jason Spisak, Founder of Symple PC, says;

“We are at a crossroads in our technological evolution. Our e-waste problem is massive, and many good computers are being piled up or melted down requiring more natural resources every day. Data control by large corporations and government agencies is a tangible concern. Our Symple PC represents another, environmentally intelligent and privacy-aware path. It is one of the most planet-friendly PCs in the world. The case is made from recycled ABS plastic, the parts are recycled, the box has no new fiber content. Even our paper packing tape has bio degradable adhesive. Plus, the Symple PC runs the open source Ubuntu Linux operating system and doesn’t require you to give your data to a company you may or may not trust. With one product, we hit two core issues confronting any responsible business or school faced with today’s technological choices, and we make it elegant, easy and affordable to make the right choice,”.

Specifications

Symple PC comes with atleast the following specifications.

  • 2GB of RAM (DDR2 or Better);
  • 2.8GHz single core or better (Intel or AMD processor);
  • 80GB SATA HD;
  • 10/100 Ethernet or better;
  • VGA port (Integrated);
  •  2 USB Ports or more;
  • 1 audio out port;
  • 1 Year Advanced Replacement Warranty (provided you ship us the old unit to be recycled after you receive your replacement to be planet conscious).
  • Packaged in 100% post-consumer / post-industrial recycled packaging (even our tape uses bio degradable adhesive);

Symple is made in the USA from recycled & re-manufactured materials.

Where can I buy Symple PC?

You can directly order the Symple PC from the Symple website. Products will be shipped in 1-3 business days.

Symple team says every 2USD made from Symple PC goes to many open source organizations that make the Symple PC possible such as Ubuntu, Debian, and LibreOffice. It is really appreciated. Kudos to Symple PC team.

Hope this PC will come up with more features in near future.

Got any questions? Look at the FAQ page or just send a mail to store@symplepc.com.

Cheers!

Source


Advertise here with BSA

---------------------------------------------------------------------
Symple PC – Introducing A Low Cost PC Powered By Ubuntu


Budgie – An Elegant, Lightweight And Simple Desktop

$
0
0

About Budgie

Budgie is the flagship desktop of the Evolve OS Linux Distribution. It is designed with the modern user in mind, it focuses on simplicity and elegance. A huge advantage for the Budgie desktop is that it is not a fork of another project, but rather one written from scratch with integration in mind. The Budgie Desktop tightly integrates with the GNOME stack, employing underlying technologies to offer an alternative desktop experience. In the spirit of open source, the project is compatible with and available for other Linux distributions including Fedora and openSUSE etc. Budgie can now emulate the look and feel of the GNOME 2 desktop, optionally, via a setting in the panel preferences.

Installation

On Ubuntu and derivatives:

sudo add-apt-repository ppa:evolve-os/ppa
sudo apt-get update
sudo apt-get install budgie-desktop

On Fedora 21, install Budgie as shown below with root user:

cd /etc/yum.repos.d/
wget http://download.opensuse.org/repositories/home:ikeydoherty:evolve/Fedora_21/home:ikeydoherty:evolve.repo
yum install budgie-desktop

On Fedora 20, install Budgie as shown below with root user:

cd /etc/yum.repos.d/
wget http://download.opensuse.org/repositories/home:ikeydoherty:evolve/Fedora_20/home:ikeydoherty:evolve.repo
yum install budgie-desktop

On openSUSE:

For openSUSE Factory run the following as root:

zypper addrepo http://download.opensuse.org/repositories/home:ikeydoherty:evolve/openSUSE_Factory/home:ikeydoherty:evolve.repo
zypper refresh
zypper install budgie-desktop

For openSUSE 13.2 run the following as root:

zypper addrepo http://download.opensuse.org/repositories/home:ikeydoherty:evolve/openSUSE_13.2/home:ikeydoherty:evolve.repo
zypper refresh
zypper install budgie-desktop

For openSUSE 13.1 run the following as root:

zypper addrepo http://download.opensuse.org/repositories/home:ikeydoherty:evolve/openSUSE_13.1/home:ikeydoherty:evolve.repo
zypper refresh
zypper install budgie-desktop

For GNOME STABLE 3.12 openSUSE 13.1 run the following as root:

zypper addrepo http://download.opensuse.org/repositories/home:ikeydoherty:evolve/GNOME_STABLE_3.12_openSUSE_13.1/home:ikeydoherty:evolve.repo
zypper refresh
zypper install budgie-desktop

Or you can directly download the binary files and install it.

Packages for openSUSE Factory:
Packages for openSUSE 13.2:
Packages for openSUSE 13.1:
Packages for GNOME STABLE 3.12 openSUSE 13.1:

After downloading the required rpm, install it as shown below with root user.

rpm -Uvh budgie-desktop-8.1-3.1.i586.rpm

Using Budgie desktop

Now log out and select Budgie as your default DE and log in to your system.

Workspace 1_005

Be mindful that Budgie is still under heavy development. Your system may crash, hang, or your Budgie menu will not even show the installed applications.

Hope the developers will release the stable version soon.

That’s it. More details can be found here.

Cheers!


Advertise here with BSA

---------------------------------------------------------------------
Budgie – An Elegant, Lightweight And Simple Desktop

How To Fix “Not Enough Free Disk Space On /boot” In Ubuntu

$
0
0

Question: How To Fix “Not Enough Free Disk Space On /boot” In Ubuntu?

Today, I got the following error, but a simple one, when try to update my Lubuntu 14.04 desktop.

“Not Enough Free Disk Space On /boot”

Software Updater_002

This is because my /boot partition has caught up with unwanted old kernels, packages etc.

Answer:

I heard about Computer Janitor feature which will remove unwanted old junk files in Ubuntu Tweak tool. Using the Computer Janitor, you can clean up your system like a freshly installed system. Janitor will remove;

  • Apps cache(Firefox/Chrome cache, Software center cache);
  • Thumbnail cache;
  • Apt cache;
  • Old kernels;
  • Package configs;
  • And unneeded packages.

If you haven’t install this tool, look at the following link.

To remove unwanted junk files, open Ubuntu Tweak, and click on the Janitor option.

Ubuntu Tweak_006

Select the check the boxes to remove unwanted junk from your system, and click Clean button.

Ubuntu Tweak_007

Janitor will now start to clean up your system

Ubuntu Tweak_003

Cool! The system is clean now.

Ubuntu Tweak_008

Again I re-launched the software updater. This time it went smoothly without any issues.

Software Updater_009

That’s all. Enjoy. There are others ways also available to clean up the system. But, this seems very easy to follow. We can do system clean up in few mouse clicks.

Cheers!


Advertise here with BSA

---------------------------------------------------------------------
How To Fix “Not Enough Free Disk Space On /boot” In Ubuntu

Linux Basics: How To Find Maximum Supported RAM By Your System

$
0
0

Mostly, you will find maximum supported RAM by your system from the BIOS, Product catalog, or manuals. Here is the simple, yet useful trick, to find out maximum supported RAM using Dmidecode without opening the system chassis or referring the BIOS, product catalogs.

What is Dmidecode?

As you may know, Dmidecode is a tool for dumping a computer’s DMI (some say SMBIOS) table contents in a human-readable format. This table contains a description of the system’s hardware components, as well as other useful pieces of information such as serial numbers and BIOS revision. Using Dmidecode, you can retrieve this information without having to probe for the actual hardware.

Find out the maximum RAM supported by your system

Make sure you have installed dmidecode on your system. I think it will be automatically installed while installing your OS, but I am not sure though.

On Deb based system:

sudo apt-get install dmidecode

On RPM based system:

sudo yum install dmidecode

On SUSE/openSUSE:

sudo zypper in dmidecode

Well, we installed dmidecode. Let us find out the maximum RAM supported. To do that, enter the following command:

sudo dmidecode -t 16

Sample output:

# dmidecode 2.12
SMBIOS 2.6 present.

Handle 0x0014, DMI type 16, 15 bytes
Physical Memory Array
    Location: System Board Or Motherboard
    Use: System Memory
    Error Correction Type: None
    Maximum Capacity: 16 GB
    Error Information Handle: Not Provided
    Number Of Devices: 2

As you see in the above output, my system will support RAM upto 16GB, and it has two RAM slots. Pretty easy, isn’t it?

Well, let us find out the currently installed RAM details.

sudo dmidecode -t 17

Sample output:

# dmidecode 2.12
SMBIOS 2.6 present.

Handle 0x0017, DMI type 17, 28 bytes
Memory Device
    Array Handle: 0x0014
    Error Information Handle: 0x0000
    Total Width: Unknown
    Data Width: Unknown
    Size: No Module Installed
    Form Factor: DIMM
    Set: None
    Locator: DIMM_B
    Bank Locator: BANK 2
    Type: Unknown
    Type Detail: None
    Speed: Unknown
    Manufacturer: Not Specified
    Serial Number: Not Specified
    Asset Tag: Not Specified
    Part Number: Not Specified
    Rank: Unknown

Handle 0x0015, DMI type 17, 28 bytes
Memory Device
    Array Handle: 0x0014
    Error Information Handle: 0x0000
    Total Width: 64 bits
    Data Width: 64 bits
    Size: 4096 MB
    Form Factor: SODIMM
    Set: None
    Locator: DIMM_A
    Bank Locator: BANK 0
    Type: DDR3
    Type Detail: Synchronous
    Speed: 1067 MHz
    Manufacturer: 014F
    Serial Number: 00092AF2
    Asset Tag: 54114000     
    Part Number: JM1066KSN-4G      
    Rank: Unknown

As per the above output, I have installed one RAM in DIMM slot 1. The RAM size is 4GB, and it’s type and speed is DDR3 and 1067 MHz respectively.

Also, we can have the complete RAM details using the following commands.

sudo dmidecode -t memory
sudo dmidecode -t memory | less
sudo dmidecode -t memory | more

Sample output:

# dmidecode 2.12
SMBIOS 2.6 present.

Handle 0x0014, DMI type 16, 15 bytes
Physical Memory Array
    Location: System Board Or Motherboard
    Use: System Memory
    Error Correction Type: None
    Maximum Capacity: 16 GB
    Error Information Handle: Not Provided
    Number Of Devices: 2

Handle 0x0017, DMI type 17, 28 bytes
Memory Device
    Array Handle: 0x0014
    Error Information Handle: 0x0000
    Total Width: Unknown
    Data Width: Unknown
    Size: No Module Installed
    Form Factor: DIMM
    Set: None
    Locator: DIMM_B
    Bank Locator: BANK 2
    Type: Unknown
    Type Detail: None
    Speed: Unknown
    Manufacturer: Not Specified
    Serial Number: Not Specified
    Asset Tag: Not Specified
    Part Number: Not Specified
    Rank: Unknown

Handle 0x0015, DMI type 17, 28 bytes
Memory Device
    Array Handle: 0x0014
    Error Information Handle: 0x0000
    Total Width: 64 bits
    Data Width: 64 bits
    Size: 4096 MB
    Form Factor: SODIMM
    Set: None
    Locator: DIMM_A
    Bank Locator: BANK 0
    Type: DDR3
    Type Detail: Synchronous
    Speed: 1067 MHz
    Manufacturer: 014F
    Serial Number: 00092AF2
    Asset Tag: 54114000     
    Part Number: JM1066KSN-4G      
    Rank: Unknown

Curious to know the complete system details such as Motherboard, Memory, Bios etc? Well, enter the following command to get all details.

sudo dmidecode

Sample output:

# dmidecode 2.12
SMBIOS 2.6 present.
48 structures occupying 2173 bytes.
Table at 0x000EB840.

Handle 0xDA00, DMI type 218, 251 bytes
OEM-specific Type
    Header and Data:
        DA FB 00 DA B2 00 0D 5F 0F 37 40 7D 00 00 00 00
        00 7E 00 01 00 00 00 DC 01 00 80 02 00 DD 01 00
        80 03 00 75 01 01 80 01 00 76 01 02 80 01 00 2D
        01 03 80 01 00 2E 01 03 80 00 00 81 01 07 80 00
        00 82 01 07 80 01 00 83 01 08 80 00 00 84 01 08
        80 01 00 85 01 06 80 00 00 86 01 06 80 01 00 58
        02 05 80 00 00 57 02 05 80 01 00 9C 00 02 00 01
        00 9B 00 02 00 00 00 8A 01 03 00 01 00 89 01 03
        00 00 00 7F 01 04 00 00 00 80 01 04 00 01 00 53
        01 05 00 00 00 52 01 05 00 01 00 7B 01 06 00 00
        00 7C 01 06 00 01 00 94 01 07 00 00 00 93 01 07
        00 01 00 7D 00 08 00 00 00 2D 00 09 00 01 00 2E
        00 09 00 00 00 6E 00 0A 00 00 00 95 00 0B 00 01
        00 96 00 0B 00 00 00 2F 02 0C 00 01 00 30 02 0C
        00 00 00 50 02 0D 00 00 00 51 02 0D 00 01 00 52
        02 0D 00 02 00 FF FF 00 00 00 00

Handle 0xDA01, DMI type 218, 59 bytes
OEM-specific Type
    Header and Data:
        DA 3B 01 DA B2 00 0D 5F 0F 37 40 53 02 0D 00 03
        00 54 02 0D 00 04 00 56 02 0D 00 05 00 4B 01 0E
        00 01 00 4A 01 0E 00 00 00 EA 00 0F 00 01 00 EB
        00 0F 00 00 00 FF FF 00 00 00 00

Handle 0x0004, DMI type 4, 42 bytes
Processor Information
    Socket Designation: CPU 1
    Type: Central Processor
    Family: Core i3
    Manufacturer: Intel            
    ID: A7 06 03 01 FF FB AB BE
    Signature: Type 0, Family 6, Model 42, Stepping 7
    Flags:
        FPU (Floating-point unit on-chip)
        VME (Virtual mode extension)
        DE (Debugging extension)
        PSE (Page size extension)
        TSC (Time stamp counter)
        MSR (Model specific registers)
        PAE (Physical address extension)
        MCE (Machine check exception)
        CX8 (CMPXCHG8 instruction supported)
        APIC (On-chip APIC hardware supported)
        SEP (Fast system call)
        MTRR (Memory type range registers)
        PGE (Page global enable)
        MCA (Machine check architecture)
        CMOV (Conditional move instruction supported)
        PAT (Page attribute table)
        PSE-36 (36-bit page size extension)
        CLFSH (CLFLUSH instruction supported)
        DS (Debug store)
        ACPI (ACPI supported)
        MMX (MMX technology supported)
        FXSR (FXSAVE and FXSTOR instructions supported)
        SSE (Streaming SIMD extensions)
        SSE2 (Streaming SIMD extensions 2)
        SS (Self-snoop)
        HTT (Multi-threading)
        TM (Thermal monitor supported)
        PBE (Pending break enabled)
    Version: Intel(R) Core(TM) i3-2350M CPU @ 2.30GHz       
    Voltage: 1.1 V
    External Clock: 100 MHz
    Max Speed: 2300 MHz
    Current Speed: 2300 MHz
    Status: Populated, Enabled
    Upgrade: Other
    L1 Cache Handle: 0x0005
    L2 Cache Handle: 0x0006
    L3 Cache Handle: 0x0007
    Serial Number: To Be Filled By O.E.M.
    Asset Tag: To Be Filled By O.E.M.
    Part Number: To Be Filled By O.E.M.
    Core Count: 2
    Core Enabled: 1
    Thread Count: 2
    Characteristics:
        64-bit capable

Handle 0x0005, DMI type 7, 19 bytes
Cache Information
    Socket Designation: L1-Cache
    Configuration: Enabled, Not Socketed, Level 1
    Operational Mode: Write Back
    Location: Internal
    Installed Size: 64 kB
    Maximum Size: 64 kB
    Supported SRAM Types:
        Other
    Installed SRAM Type: Other
    Speed: Unknown
    Error Correction Type: None
    System Type: Unified
    Associativity: 8-way Set-associative

Handle 0x0006, DMI type 7, 19 bytes
Cache Information
    Socket Designation: L2-Cache
    Configuration: Enabled, Not Socketed, Level 2
    Operational Mode: Varies With Memory Address
    Location: Internal
    Installed Size: 512 kB
    Maximum Size: 512 kB
    Supported SRAM Types:
        Other
    Installed SRAM Type: Other
    Speed: Unknown
    Error Correction Type: None
    System Type: Unified
    Associativity: 8-way Set-associative

Handle 0x0007, DMI type 7, 19 bytes
Cache Information
    Socket Designation: L3-Cache
    Configuration: Enabled, Not Socketed, Level 3
    Operational Mode: Varies With Memory Address
    Location: Internal
    Installed Size: 3072 kB
    Maximum Size: 3072 kB
    Supported SRAM Types:
        Other
    Installed SRAM Type: Other
    Speed: Unknown
    Error Correction Type: None
    System Type: Unified
    Associativity: Other

Handle 0x0008, DMI type 8, 9 bytes
Port Connector Information
    Internal Reference Designator: J1A1
    Internal Connector Type: None
    External Reference Designator: PS2Mouse
    External Connector Type: PS/2
    Port Type: Mouse Port

Handle 0x0009, DMI type 8, 9 bytes
Port Connector Information
    Internal Reference Designator: J1A1
    Internal Connector Type: None
    External Reference Designator: Keyboard
    External Connector Type: PS/2
    Port Type: Keyboard Port

Handle 0x000A, DMI type 8, 9 bytes
Port Connector Information
    Internal Reference Designator: J2A2B
    Internal Connector Type: None
    External Reference Designator: Video
    External Connector Type: DB-15 female
    Port Type: Video Port

Handle 0x000B, DMI type 8, 9 bytes
Port Connector Information
    Internal Reference Designator: J3A1
    Internal Connector Type: None
    External Reference Designator: USB1
    External Connector Type: Access Bus (USB)
    Port Type: USB

Handle 0x000C, DMI type 8, 9 bytes
Port Connector Information
    Internal Reference Designator: J3A1
    Internal Connector Type: None
    External Reference Designator: USB2
    External Connector Type: Access Bus (USB)
    Port Type: USB

Handle 0x000D, DMI type 8, 9 bytes
Port Connector Information
    Internal Reference Designator: J3A1
    Internal Connector Type: None
    External Reference Designator: USB3
    External Connector Type: Access Bus (USB)
    Port Type: USB

Handle 0x000E, DMI type 8, 9 bytes
Port Connector Information
    Internal Reference Designator: J5A1
    Internal Connector Type: None
    External Reference Designator: LAN
    External Connector Type: RJ-45
    Port Type: Network Port

Handle 0x000F, DMI type 9, 17 bytes
System Slot Information
    Designation: J6B2
    Type: x16 PCI Express
    Current Usage: In Use
    Length: Long
    ID: 0
    Characteristics:
        3.3 V is provided
        Opening is shared
        PME signal is supported
    Bus Address: 0000:00:01.0

Handle 0x0010, DMI type 9, 17 bytes
System Slot Information
    Designation: J6B1
    Type: x1 PCI Express
    Current Usage: In Use
    Length: Short
    ID: 1
    Characteristics:
        3.3 V is provided
        Opening is shared
        PME signal is supported
    Bus Address: 0000:00:1c.3

Handle 0x0012, DMI type 11, 5 bytes
OEM Strings
    String 1: Dell System
    String 2: 5[0003]
    String 3: 13[P18F]

Handle 0x0013, DMI type 12, 5 bytes
System Configuration Options
    Option 1: To Be Filled By O.E.M.

Handle 0x001C, DMI type 21, 7 bytes
Built-in Pointing Device
    Type: Touch Pad
    Interface: Bus Mouse
    Buttons: 2

Handle 0x001D, DMI type 22, 26 bytes
Portable Battery
    Location: Sys. Battery Bay
    Manufacturer: Sanyo              
    Serial Number: 5390     
    Name: DELL 4YRJH22
    Chemistry: Lithium Ion
    Design Capacity: 45000 mWh
    Design Voltage: 10800 mV
    SBDS Version: 1.0                
    Maximum Error: 2%
    SBDS Manufacture Date: 2012-02-28
    OEM-specific Information: 0x00000001

Handle 0x001E, DMI type 32, 20 bytes
System Boot Information
    Status: No errors detected

Handle 0x0020, DMI type 27, 12 bytes
Cooling Device
    Type: Fan
    Status: OK
    OEM-specific Information: 0x00000000

Handle 0x0021, DMI type 28, 20 bytes
Temperature Probe
    Description: CPU Internal Temperature
    Location: Processor
    Status: OK
    Maximum Value: 127.0 deg C
    Minimum Value: 0.0 deg C
    Resolution: 1.000 deg C
    Tolerance: 0.5 deg C
    Accuracy: Unknown
    OEM-specific Information: 0x00000000

Handle 0xB000, DMI type 176, 5 bytes
OEM-specific Type
    Header and Data:
        B0 05 00 B0 00

Handle 0xB100, DMI type 177, 12 bytes
OEM-specific Type
    Header and Data:
        B1 0C 00 B1 1A 0E 00 00 00 00 00 00

Handle 0x0025, DMI type 209, 12 bytes
OEM-specific Type
    Header and Data:
        D1 0C 25 00 00 00 00 03 05 01 00 03

Handle 0x0026, DMI type 210, 12 bytes
OEM-specific Type
    Header and Data:
        D2 0C 26 00 00 00 00 03 05 20 01 03

Handle 0x0027, DMI type 211, 13 bytes
OEM-specific Type
    Header and Data:
        D3 0D 27 00 01 00 00 00 00 02 03 04 04
    Strings:
        Front               

Handle 0x0028, DMI type 212, 57 bytes
OEM-specific Type
    Header and Data:
        D4 39 28 00 70 00 71 00 01 49 50 48 9C 00 49 FC
        01 9B 00 49 FC 00 7F 01 4A FB 04 80 01 4A FB 00
        53 01 4A F7 08 52 01 4A F7 08 7B 01 4A EF 10 7C
        01 4A EF 10 FF FF 00 00 00

Handle 0x002A, DMI type 217, 8 bytes
OEM-specific Type
    Header and Data:
        D9 08 2A 00 01 02 00 00
    Strings:                                       

Handle 0x002B, DMI type 219, 11 bytes
OEM-specific Type
    Header and Data:
        DB 0B 2B 00 00 01 02 03 00 04 05
    Strings:                                                                                                    

Handle 0x002C, DMI type 220, 22 bytes
OEM-specific Type
    Header and Data:
        DC 16 2C 00 01 F0 00 00 02 F0 00 00 00 00 03 F0
        04 F0 00 00 00 00

Handle 0x002D, DMI type 221, 19 bytes
OEM-specific Type
    Header and Data:
        DD 13 2D 00 00 00 00 00 00 03 00 00 00 00 00 00
        00 00 00

Handle 0x002E, DMI type 222, 16 bytes
OEM-specific Type
    Header and Data:
        DE 10 2E 00 01 08 FF FF 00 00 00 00 00 00 00 00

Handle 0x0014, DMI type 16, 15 bytes
Physical Memory Array
    Location: System Board Or Motherboard
    Use: System Memory
    Error Correction Type: None
    Maximum Capacity: 16 GB
    Error Information Handle: Not Provided
    Number Of Devices: 2

Handle 0x0016, DMI type 20, 19 bytes
Memory Device Mapped Address
    Starting Address: 0x00000000000
    Ending Address: 0x000FFFFFFFF
    Range Size: 4 GB
    Physical Device Handle: 0x0015
    Memory Array Mapped Address Handle: 0x0018
    Partition Row Position: 1
    Interleave Position: 1
    Interleaved Data Depth: 1

Handle 0x0017, DMI type 17, 28 bytes
Memory Device
    Array Handle: 0x0014
    Error Information Handle: 0x0000
    Total Width: Unknown
    Data Width: Unknown
    Size: No Module Installed
    Form Factor: DIMM
    Set: None
    Locator: DIMM_B
    Bank Locator: BANK 2
    Type: Unknown
    Type Detail: None
    Speed: Unknown
    Manufacturer: Not Specified
    Serial Number: Not Specified
    Asset Tag: Not Specified
    Part Number: Not Specified
    Rank: Unknown

Handle 0x0018, DMI type 19, 15 bytes
Memory Array Mapped Address
    Starting Address: 0x00000000000
    Ending Address: 0x000FFFFFFFF
    Range Size: 4 GB
    Physical Array Handle: 0x0014
    Partition Width: 2

Handle 0x002F, DMI type 13, 22 bytes
BIOS Language Information
    Language Description Format: Abbreviated
    Installable Languages: 1
        eng
    Currently Installed Language: eng

Handle 0x0030, DMI type 131, 64 bytes
OEM-specific Type
    Header and Data:
        83 40 30 00 31 00 00 00 00 00 00 00 00 00 00 00
        F8 00 4B 1C FF FF FF FF 01 00 00 00 00 00 07 00
        AD 04 04 00 00 00 00 00 C8 00 FF FF 00 00 00 00
        00 00 00 00 32 00 00 00 76 50 72 6F 00 00 00 00

Handle 0x0029, DMI type 216, 9 bytes
OEM-specific Type
    Header and Data:
        D8 09 29 00 01 02 01 00 00
    Strings:
        INTEL
        0000

Handle 0x0000, DMI type 0, 24 bytes
BIOS Information
    Vendor: Dell Inc.
    Version: A05
    Release Date: 08/03/2012
    Address: 0xF0000
    Runtime Size: 64 kB
    ROM Size: 2048 kB
    Characteristics:
        MCA is supported
        PCI is supported
        BIOS is upgradeable
        BIOS shadowing is allowed
        ESCD support is available
        Boot from CD is supported
        Selectable boot is supported
        BIOS ROM is socketed
        EDD is supported
        5.25"/1.2 MB floppy services are supported (int 13h)
        3.5"/720 kB floppy services are supported (int 13h)
        3.5"/2.88 MB floppy services are supported (int 13h)
        Print screen service is supported (int 5h)
        8042 keyboard services are supported (int 9h)
        Serial services are supported (int 14h)
        Printer services are supported (int 17h)
        CGA/mono video services are supported (int 10h)
        ACPI is supported
        USB legacy is supported
        ATAPI Zip drive boot is supported
        BIOS boot specification is supported
        Targeted content distribution is supported
    BIOS Revision: 0.5
    Firmware Revision: 0.5

Handle 0x0002, DMI type 2, 15 bytes
Base Board Information
    Manufacturer: Dell Inc.
    Product Name: 01HXXJ
    Version: A05
    Serial Number: .JSQ7PA1.CN7117623M00J2.
    Asset Tag: Not Specified
    Features:
        Board is a hosting board
        Board is replaceable
    Location In Chassis: To Be Filled By O.E.M.
    Chassis Handle: 0x0003
    Type: Motherboard
    Contained Object Handles: 0

Handle 0x0003, DMI type 3, 21 bytes
Chassis Information
    Manufacturer: Dell Inc.
    Type: Portable
    Lock: Not Present
    Version: Not Specified
    Serial Number: JSR1
    Asset Tag: Not Specified
    Boot-up State: Safe
    Power Supply State: Safe
    Thermal State: Safe
    Security Status: None
    OEM Information: 0x00000000
    Height: Unspecified
    Number Of Power Cords: 1
    Contained Elements: 0

Handle 0x0001, DMI type 1, 27 bytes
System Information
    Manufacturer: Dell Inc.
    Product Name: Inspiron N5050
    Version: Not Specified
    Serial Number: JSR1
    UUID: 4C4C4544-0053-5110-8029-CAC05241
    Wake-up Type: Power Switch
    SKU Number: To be filled by O.E.M.
    Family:                       

Handle 0x0024, DMI type 208, 12 bytes
OEM-specific Type
    Header and Data:
        D0 0C 24 00 02 05 FE 00 04 05 01 02
    Strings:
        20120323
        20120323

Handle 0x0011, DMI type 10, 6 bytes
On Board Device Information
    Type: Video
    Status: Enabled
    Description: Mobile Intel SandyBridge HD Graphics

Handle 0x0015, DMI type 17, 28 bytes
Memory Device
    Array Handle: 0x0014
    Error Information Handle: 0x0000
    Total Width: 64 bits
    Data Width: 64 bits
    Size: 4096 MB
    Form Factor: SODIMM
    Set: None
    Locator: DIMM_A
    Bank Locator: BANK 0
    Type: DDR3
    Type Detail: Synchronous
    Speed: 1067 MHz
    Manufacturer: 014F
    Serial Number: 0009F2
    Asset Tag: 54114000     
    Part Number: JM1066-4G      
    Rank: Unknown

Handle 0x0031, DMI type 127, 4 bytes
End Of Table

That’s it. Happy weekend. Stay happy!


Advertise here with BSA

---------------------------------------------------------------------
Linux Basics: How To Find Maximum Supported RAM By Your System

Install And Configure OpenVZ In Ubuntu

$
0
0

In our previous tutorial, we have installed and configured OpenVZ on CentOS. In this tutorial, we will see how to install OpenVZ in Ubuntu 14.04.

1. Add OpenVZ Repository

Switch to root user:

sudo su

First, we will add OpenVZ Repository.

cat << EOF > /etc/apt/sources.list.d/openvz-rhel6.list
deb http://download.openvz.org/debian wheezy main
# deb http://download.openvz.org/debian wheezy-test main
EOF

Import OpenVZ GPG key:

wget http://ftp.openvz.org/debian/archive.key
apt-key add archive.key

2. Install OpenVZ kernel

apt-get install linux-image-openvz-amd64

Or, if you still have i686:

apt-get update && apt-get install linux-image-openvz-686

3. Setting up Kernel parameters

Make sure you have added the following kernel parameters before logging into vz kernel.

vi sysctl.conf

Add the following lines:

# On Hardware Node we generally need
# packet forwarding enabled and proxy arp disabled
net.ipv4.ip_forward = 1
net.ipv6.conf.default.forwarding = 1
net.ipv6.conf.all.forwarding = 1
net.ipv4.conf.default.proxy_arp = 0

# Enables source route verification
net.ipv4.conf.all.rp_filter = 1

# Enables the magic-sysrq key
kernel.sysrq = 1

# We do not want all our interfaces to send redirects
net.ipv4.conf.default.send_redirects = 1
net.ipv4.conf.all.send_redirects = 0

5. Install OpenVz usage statistics tools

The following tools to be installed to gather the OpenVZ usage statistics. Here is the reason why you should install these tools.

apt-get install vzctl vzquota ploop vzstats

That’s it. We have successfully installed OpenVZ.

Now, it’s time to reboot and log in to OpenVZ kernel(it should be the default choice in the boot loader). In Ubuntu 14.04, it should be under Advanced options in the boot loader menu.

Ubuntu 14.04 [Running] - Oracle VM VirtualBox_003

Ubuntu 14.04 [Running] - Oracle VM VirtualBox_002

We’ll see how to create virtual machines using OpenVZ in our upcoming tutorials.

While creating VMs, make sure you have the same subnet on both physical and virtual machine. If you want to use different subnet, you have to edit /etc/vz/vz.conf file,

vi /etc/vz/vz.conf

Find and uncomment the line:

NEIGHBOUR_DEVS=detect

And, change it to:

NEIGHBOUR_DEVS=all

That’s it.

OpenVZ Home page:


Advertise here with BSA

---------------------------------------------------------------------
Install And Configure OpenVZ In Ubuntu

Ways To Secure Your Ubuntu 14.04 Server Running LAMP

$
0
0

Securing your Ubuntu Linux server to become unpredictable, below are some tips to get you going:

I assume you already have LAMP running in your server and you are using Ubuntu 14.04.

If not, refer the following link to setup LAMP stack on Ubuntu.

Linux

Firewalls:

Most security on servers are the ports and this creates a pathway between the outside world and the server its self, why making all these ports available for access when they ain’t necessary? I will be using a package called UFW which is an easy package for configuring IPTABLES.

Install UFW:

sudo apt-get update && apt-get install ufw

On installation this package is disabled, enable using:

sudo ufw enable

And firstly please, add your SSH port ASAP else you get blocked out from your server, adding a port use this:

sudo ufw allow 22
sudo ufw allow 80

That should add a port successfully and make it publicly accessible, you can view list of ports you’ve added with:

sudo ufw status numbered

Remove or block a port, use the remove argument and number of each port you saw in the status with this command:

sudo ufw remove 1

And entirely disable UFW making all port publicly available using:

sudo ufw disable

Disable User Creation:

As a root, disable unauthorized user creation. This will help you as a sysadmin to know users in your system, disable creation of groups and users using:

sudo chattr +i /etc/passwd && sudo chattr +i /etc/group

When to re-enable use:

sudo chattr -i /etc/passwd && sudo chattr -i /etc/group

SSH:

One of the way we become vulnerable is when we are predictable, change SSH Port to your custom apart from 22 by editing /etc/ssh/sshd_config and find (create if not found).

Port 22

Replace with 22 with your custom port, save and restart SSH with:

sudo service ssh restart

Super User:

You have your default user who has the ROOT Privilege why not create another user to handle root and keep the default for security purposes. Create a user:

sudo groupadd users
sudo mkdir /home/newuser && useradd –home /home/newuser –group users –shell /bin/sh newuser
sudo passwd newuser

The above code creates new group called users, creates a directory in /home/ named newuser, creates a new user called newuser and gives him a home in the new created directory and assigns the users group to him and also give him a shell then assign a new password for it. Now add him to sudoers for him to have ROOT access, edit /etc/sudoers then add:

newuser ALL=(ALL:ALL) ALL

Then save. Always login with newuser account.

Apache

In this Apache for things to be easier we are going to be using configs, you just create a config file in /etc/apache2/conf-available like myconf.conf.

Simple Security:

Paste these in myconf.conf:

ServerSignature Off
ServerTokens Prod
Options all -Indexes

Enable headers module using:

sudo a2enmod headers

Then back to myconf.conf and add:

Headers always unset X-Powered-By

The above turns of unnecessary server signature in directory and error pages and shows only Server Product in Server Name header then headers remove X-Powered-By in headers

PHPMyAdmin:

In this, after installing PHPMyAdmin to your server the default URL is yourdomain.com/phpmyadmin which is predictable, why not change this?

Edit /etc/phpmyadmin/apache.conf and find:

Alias /phpmyadmin /usr/share/phpmyadmin

Then replace with:

Alias /newURL /usr/share/phpmyadmin

And save.

Mod Security:

This is a Web Application Firewall (WAF) protecting your Apache server.

Install it:

sudo apt-get install libapache2-modsecurity

Enable the config for Apache to be able to parse it.

sudo cp /etc/modsecurity/modsecurity{-recommended,}

Turn on the SecRuleEngine from DetectionOnly to On, this will put ModSecurity to work not logging only anymore.

SecRuleEngine On

Find SecRequestBodyAccess and turn it Off, leaving it On will fill large logs for you, just don’t access bodies.

SecRequestBodyAccess Off

Other configurations are okay and doing well in my server except you want to go advanced. I have set of rules that works in my server with no issues and is protecting me as I want, activating all will give you issues for sure because simple URLs might be seen malicious in ModSec, so I recommend you activate these rules.

Rules are located in /usr/share/modsecurity-crs/base_rules.

modsecurity_crs_23_request_limits.conf
modsecurity_crs_35_bad_robots.conf
modsecurity_crs_42_tight_security.conf
modsecurity_crs_45_trojans.conf

The above gives you the amount of security you should need, how can you activate a rule? Just create a symbolic link to /usr/share/modsecurity-crs/activated_rules using:

cd /usr/share/modsecurity-crs/
sudo ln -s /usr/share/modsecurity-crs/base_rules/modsecurity_crs_35_bad_robots.conf ./

Once you are done activating the rules, add them to Apache’s config by going back to our myconf.conf and add this line:

<IfModule security2_module>
Include /usr/share/modsecurity-crs/*.conf
Include /usr/share/modsecurity-crs/activated_rules/*.conf

Save and restart Apache, view logs at /var/log/apache2/modsec_audit.log.

DDOS:

Denial of Service Attack works well with Apache, ModSecurity does not have a rule to protect it yet, but a mod is available to handle that which is mod_evasive. It’s an old mod though but still works, install:

sudo apt-get install libapache2-mod-evasive
sudo mkdir /var/log/apache2/mod_evasive && chmod 777 /var/log/apache2/mod_evasive

Then move to edit the config, edit /etc/apache2/mods-available/evasive.conf and change to this:

<IfModule mod_evasive20.c>
DOSHashTableSize 3097 
DOSPageCount 20
DOSSiteCount 100
DOSPageInterval 3
DOSSiteInterval 5
DOSBlockingPeriod 300

DOSEmailNotify "youremail@site.com"
#DOSSystemCommand "su - someuser -c '/sbin/... %s ...'"
DOSLogDir "/var/log/apache2/mod_evasive"
</IfModule>

Save and restart Apache.

Server Token:

Apache Server Token cannot be removed or modified but with help of ModSecurity, it can be done. Just in same myconf.conf add this line to:

SecServerSignature “My Server Signature”

Save and restart.

MySQL

Port: Talking of security in MySQL, I have no much to say or I don’t know much but just changing your port to something unpredictable. Find any occurance of Port = 3306 and replace to your custom, but if you have UFW already working this port can be made publicly inaccessible.

PHP

PHP itself is already secure, security all lies in the server which is Apache we just handled, but still let’s deal with some, all has to do with the php.ini file located in /etc/php5/apache2/php.ini for people using Apache to interpret PHP. FPM guys is located /etc/php5/fpm/php.ini.

Expose PHP: If you check well in the Apache configuration we did above, I already unset the X-Powered-By header which PHP or any other language might set but if you wish to do so with PHP, find this line and set to Off.

expose_php = Off

Errors: Turn off errors so I can’t know your coding structures or your directory structures, it leaks info to other developers turn:

display_errors = Off

Mail X-PHP-Originating-Script Header: This header is included in mails sent with PHP, telling the client the location of the exact script that triggered the mail sending, this isn’t useful to the client but useful for attackers, turn off:

mail.add_x_header = Off

Session Names: Change Session names, as we all know it’s PHPSESSID, be unpredictable…that’s all.

session.name = MYSESSID

In summary, I showed some ways of securing your Ubuntu Server running LAMP.

About the Author:

This article is written by James John, aka Don Jajo, from Nigeria. He is currently a student of Abia State Polytechnic where he study Computer Science. If you have any queries, mail to the author: donjajo4all@gmail.com.


Advertise here with BSA

---------------------------------------------------------------------
Ways To Secure Your Ubuntu 14.04 Server Running LAMP

Viewing all 1264 articles
Browse latest View live