Welcome to AGIX. I'm the owner of the business. I'm also a member of the Linux System Administrator team responsible for maintaining our client's systems.
RHCE, Sec+, CySA+, CASP+
Contact our friendly team to get started.
The good news is that Microk8s can now be deployed in a multi-node architecture. And it’s simple to do. This video “https://www.youtube.com/watch?v=dNT5uEeJBSw” is a nice demonstration. It uses a floating IP between the cluster nodes that removes the need to use a load balancer in front of your cluster. Start
Read more
If you have a “Work or School” Office 365 account, you’re likely able to use it as your Windows Domain service, allowing you go join your Windows 10 Pro (or higher, but not Home) to it as a domain member much like you would with an on-prem domain controller We’ll
Read more
This article demonstrates how to share an image with another AWS account. For example, you have an EC2 that needs to be moved to another AWS account. If so, this article is for you. Start by logging into the source AWS account. This is the account where the EC2
Read more
This article demonstrates how to configure Fail2Ban to use a MySQL (or MariaDB, etc) as the storage repository for IP blocking records. This allow multiple Fail2Ban services (running on multiple servers) to report and use a central IP blocking repository. A little context. In this article, we’re installing everything on
Read more
This article shows a one lines (well, 4 lines) that output any updates that are waiting to be installed on your local computer. Open PowerShell and run the following commands: $UpdateSession = New-Object -ComObject Microsoft.Update.Session $UpdateSearcher = $UpdateSession.CreateupdateSearcher() $Updates = @($UpdateSearcher.Search(“IsHidden=0 and IsInstalled=0”).Updates) $Updates | Select-Object Title The output should
Read more
This article describes how to protect your Apache web server by restricting which countries can access it. We’re using Apache on CentOS 7 but Ubuntu instructions are included and are very similar. I’ve given two examples; one on whitelisting everything except what we want to block, and blacklisting everything except
Read more
This article walks you through the process of enforcing 2FA on Ubuntu using the Google Authenticator. All of these steps are completed on the system that you want 2FA to be enforced on. Important notes: * SSH key-based logins bypass the 2FA component of the login verification process. * Users
Read more
This article shows the Ansible playbook used to query target systems to get their version details. Ie, the details obtained from “/etc/*release”. — – hosts: all # remote_user: root # become: yes tasks: – debug: msg: – “ansible_distribution {{ hostvars[inventory_hostname].ansible_distribution }}” – “major version {{ hostvars[inventory_hostname].ansible_distribution_major_version }}” – “version {{
Read more
This article continues from Part 2 – Replica Sets and Scaling. Our objective in this article is to get an application exposed to the wider network on an IP address of the host and a port of our choice. The IP address will be “10.0.0.210” and our port of choice
Read more
This article continues from Part 1 – Installation and configuration. We can create a replica set (replicateset) or “rs” for short, so we can scale an application to meet demand. Create a file on the Kubernetes host called “my-rep-set.yaml” and populate it with the following: Tip: This is just an
Read more