I'm a systems engineer and security guru. I'm surrounded by experts in their fields and excited to be able to work with such talent.
This article walks you through the process of enforcing 2FA on Ubuntu using the Google Authenticator. All of these steps are completed on the system that you want 2FA to be enforced on. Important notes: * SSH key-based logins bypass the 2FA component of the login verification process. * Users
Read more
This article shows the Ansible playbook used to query target systems to get their version details. Ie, the details obtained from “/etc/*release”. — – hosts: all # remote_user: root # become: yes tasks: – debug: msg: – “ansible_distribution {{ hostvars[inventory_hostname].ansible_distribution }}” – “major version {{ hostvars[inventory_hostname].ansible_distribution_major_version }}” – “version {{
Read more
This article continues from Part 2 – Replica Sets and Scaling. Our objective in this article is to get an application exposed to the wider network on an IP address of the host and a port of our choice. The IP address will be “10.0.0.210” and our port of choice
Read more
This article continues from Part 1 – Installation and configuration. We can create a replica set (replicateset) or “rs” for short, so we can scale an application to meet demand. Create a file on the Kubernetes host called “my-rep-set.yaml” and populate it with the following: Tip: This is just an
Read more
This article walks you through the process of installing the minimal Kubernetes environment on Ubuntu 20.04. Kubernetes comes in two forms; a single node cluster and a multi-node cluster. In this walk through, we’ll be using the single node cluster called MicroK8s. I suggest starting with a Ubuntu 20.04 server
Read more
This article discussed my experiences with the Google Home WIFI Router. Specifically, my experience trying to get multiple access points working on the same network in Bridge mode rather than NAT mode. The documentation states that a Google Home Router can’t be in Bridge mode and work with additional access
Read more
This article explains how to solve the issue of FreeRADIUS certificates expiring. In this example, we’re using CentOS 7 but the same should work on any Linux provided the paths are the same. The following commend errors due to a certificate expiring. systemctl restart freeradius SO we need to re-generate
Read more
Your Git repo doesn’t need to be on Bitbucket or Github. You can very easily host a repository on your own systems. This article demonstrates this. We’re using CentOS here but any Linux OS should work. You just need the “git” package. As always, we’d love to read your comments.
Read more
This article demonstrates how to configure HAProxy to use LetsEncrypt to automatically manage certificates ensuring that those on the Internet accessing servers behind your HAProxy are protected with SSL security. Here’s some important points before we get started: We’re using a Netgate pfSense firewall appliance in this example but pfSense
Read more
This article is focused on generating a CSR file, submitting it to a CA and using the resulting Certificate on Linux with Apache, Nginx and/or IIS on Windows. The Windows related steps continue on from the work required to get the Certificate ready for Linux. In other words, regardless of
Read more