tag:blogger.com,1999:blog-52611184902883916932024-03-05T05:11:20.948+00:00Linux: Tips n TricksJayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.comBlogger71125tag:blogger.com,1999:blog-5261118490288391693.post-67543627375600661612023-11-03T15:17:00.001+00:002023-11-03T15:17:29.523+00:00Migrate Redis to OCI Cache on RedisYou can
migrate your Redis DB to OCI Cache on Redis using the following steps.
You need to
use a data dump tools such as pyredis-dump for getting serialised dump from
your Redis DB. This tool can be used to take a serialised dump from any Redis node
running in any cloud environments like AWS ElastiCache. So far, we are testing
only single master Redis cluster.
[root@jay ~]# git Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-76841205491727036152023-10-27T17:15:00.001+01:002024-01-10T13:45:53.257+00:00How to connect to OCI Redis clusterRedis is a private service and accessible
only within the VCN or appropriately peered VCNs.
You can connect to the OCI Redis Clusters
using the cluster endpoints provided.
To write to the redis cluster, connect
using the Primary endpoint.
To read from the redis cluster, connect
using the Replica endpoint.
You may choose a client library your
programming language Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-26769275721480411052023-10-27T16:22:00.002+01:002024-01-10T13:46:23.663+00:00OCI Redis Cache Endpoints OCI
provisions private DNS endpoints for your Redis Cluster as follows.
- 1 Primary
Endpoint always pointing to the Primary node. In case of a primary node
failure, the primary endpoint will automatically failover to the new primary.
- 1 Replica
Endpoint pointing to one of the Read replicas. If you have more than 1 read
replica, the replica end point resolves to one of theJayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-889592610989060322023-10-27T15:33:00.005+01:002023-10-27T16:08:33.902+01:00How to launch OCI Redis Cache Cluster on OCIOCI Redis
Cache is GA as of now. You can launch Redis Cache clusters using Console, CLI,
SDK, Terraform and so on.
Using Console : Launching a Redis cluster using OCI console is even easier.Just go to Databases --> Redis --> Clusters --> Create cluster and launch selecting required options.
Let’s see
how to launch a Redis Cluster on OCI using CLI.
Sample Command:
# oci Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-74732440919374413112023-10-25T16:58:00.006+01:002023-10-25T16:58:38.932+01:00FortiGate VIP responding on telnet to TCP 5060 and 2000If you have
a FortiGate Firewall you might have encountered situation where Fortinet
devices appear to have open TCP ports 2000 and 5060, even when firewalls are
configured to block them. If
an IPSec connection is configured, this even looks like a telnet connection can
be established between the devices in each end of the tunnels on TCP 2000 and
5060.
Security
scans will flag it a threat.
&Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-53215693515544687722023-10-23T16:45:00.002+01:002023-10-23T16:45:46.277+01:00DHCP deleting custom entries in /etc/resolv.conf file
If you are
working on cloud environments like AWS, OCI you might have come across a
requirement where you need to add custom settings on DNS like name servers,
search domains and so on. Any changes to /etc/resolv.conf or the network configuration files
will be reverted by the DNS server associated with the cloud virtual network.
There are
many ways to set custom DNSJayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-28467358632710533862023-10-18T13:02:00.000+01:002023-10-18T13:02:00.467+01:00Intrusion Detection and Integrity Checks with AIDE in Linux Advanced Intrusion Detection
Environment (AIDE) is an open-source utility designed to
monitor and protect the integrity of files on a Linux system. AIDE creates a
database of file attributes and uses it to perform regular checks for changes,
additions, or deletions in system files, alerting you to potential security
breaches. When properly used AIDE helps to protect the system internally, Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-88744103066104242252023-10-17T18:43:00.001+01:002023-10-18T09:00:16.202+01:00How to remove malwares and virus from Linux servers
Linux servers are renowned for their resilience and security.
However, even the most robust systems can fall prey to malware. When malicious
software breaches your Linux server's defences, knowing how to eliminate it is
paramount. In this comprehensive guide, we will walk you through the steps
necessary to remove malware from your Linux server, including utilizing the
helpful Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-47379075392843184872023-09-28T11:51:00.004+01:002023-09-28T11:51:27.145+01:00Depricated SSL/TLS Protocols and Ciphers you should not use As
cybersecurity threats evolve, older SSL/TLS protocols and ciphers that were
once considered secure have become deprecated due to vulnerabilities and
weaknesses. Here are some of the deprecated SSL/TLS protocols and ciphers:
Deprecated
SSL/TLS Protocols:
1.
SSLv2: SSL version 2 is highly insecure and has numerous
vulnerabilities, including susceptibility to Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-12205456707747266212023-09-28T11:48:00.002+01:002023-09-28T11:48:27.231+01:00TLS/SSL Cipher Suites and TLS handshake process
The
foundation of secure communication on the internet relies heavily on TLS/SSL
cipher suites. These suites dictate the algorithms used to encrypt and decrypt
data, ensuring that sensitive information remains private and protected. In
this article, we'll delve into the world of TLS/SSL cipher suites, examining
how they work, their components, and their importance in Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-7658599668053173702023-09-28T11:37:00.001+01:002023-09-28T11:37:07.272+01:00SSL/TLS Certificate Chain Validation in HTTPSThe use of SSL/TLS (Secure Sockets Layer/Transport
Layer Security) encryption is fundamental to the security of internet
communication. When you connect to an HTTPS website, your browser engages in a
complex process of validating SSL/TLS certificates to ensure secure and
trustworthy data transfer. In this article, we'll unravel the mystery behind
SSL/TLS certificate chain validation and how it Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-50632655438752711872023-09-27T11:33:00.003+01:002023-09-27T11:33:43.200+01:00How Linux Manages Physical RAMThe efficient management of physical RAM (Random Access Memory) is crucial for the smooth operation of any operating system. Linux, renowned for its performance and reliability, employs a robust memory management system to optimize the utilization of physical memory resources. In this article, we'll delve into how Linux manages physical RAM, exploring the mechanisms and algorithms that make it Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-30626850600317118162023-09-27T11:28:00.001+01:002023-09-27T11:28:09.287+01:00Memory Leak and how to prevent themMemory leaks can be a silent killer in software
development. They gradually consume system resources, leading to performance
degradation and even application crashes. Detecting and addressing memory leaks
is a critical aspect of maintaining robust and efficient software. In this
article, we'll explore memory leak detection techniques and strategies to help
you keep your codebase leak-free.
Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-8476518660099323032023-09-25T12:46:00.004+01:002023-09-25T12:46:37.039+01:00How to Read and Understand the Linux free Command Output The free command is
a valuable utility in the Linux arsenal, providing insights into your system's
memory usage. It presents a snapshot of the memory utilization and helps you
gauge the health of your system's RAM. In this article, we'll explore how to
read and interpret the output of the free command to make informed decisions
regarding your system's memory management.
The Basics of the Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-84212435255935756512023-09-20T00:17:00.002+01:002023-09-20T09:24:37.374+01:00SS command Cheat Sheetss Command
Cheat Sheet
This cheat
sheet provides an overview of the ss command
and its commonly used options for examining socket statistics and network
connections in Linux. Adjust the options as needed to match your specific
requirements when working with ss.
1.
Displaying Sockets:
ss:
Display a summary of all sockets.ss -t:
Display TCP sockets.ss -u:
Display UDP Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-51357922307355899812023-09-19T23:30:00.001+01:002023-09-20T00:20:36.322+01:00IP command Cheat Sheet
Several of
the most used Linux commands/tools such as ifconfig, netstat, route is
deprecated. It’s time to start using the versatile ip command line
utility.
Ip command
line utility provided by the ‘net-tools’ package is used for various network
administration tasks on Linux nodes.
Syntax
of the ip command line utility:
# ip [ OPTIONS
] OBJECT { Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-44976916330343959172023-09-07T17:00:00.001+01:002023-09-07T17:01:44.302+01:00The DIG command cheat sheet
We all
heard that our bellowed DNS lookup tool ‘nslookup’ is getting deprecated. Even though
the nslookup tool has been resurrected and is not going anywhere, its better to
learn about another cool name lookup tool – ‘dig’.
What is ‘dig’?
'Dig,'
short for Domain Information Groper, is a command-line utility designed for DNS
queries. Dig is super useful for Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-13093900204126183112023-09-01T17:46:00.001+01:002023-09-01T17:47:05.998+01:00An iPerf3 Guide
In today's digital age, where fast and reliable
network connectivity is a necessity, ensuring that your network performs at its
best is crucial. This is where iperf3, a versatile and powerful tool, comes
into play. In this blog post, we'll dive into how you can use iperf3 to conduct
network performance tests and optimize your network for peak efficiency.
What is Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-62049254384369758972023-08-31T15:41:00.003+01:002023-09-01T12:33:47.782+01:00TCP Connection states Understanding TCP Connection States: A Fundamental Aspect of Network CommunicationIn the vast landscape of computer networking, the Transmission Control Protocol (TCP) stands as a cornerstone for reliable and orderly data transmission. At the heart of TCP's functionality lies the concept of connection states, a fundamental aspect that governs how data is exchanged between devices over the Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-86180605215582500062023-08-30T13:02:00.007+01:002023-09-04T12:40:41.392+01:00MBR to GPT Disk conversion on LinuxEver wondered how to convert your old MBR based instances to new GPT ones? This will help you to have larger boot volumes and lots of other benefits.This is the step by step procedure that you can follow, but please note this is not copy and past procedure so you should make sure that the device names, units and other variables are suitable for your environment. When you convert the partition Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-91122334799827413272023-08-30T12:42:00.003+01:002023-09-01T12:34:26.677+01:00How to analyse FIO outputStorage performance testing plays a vital role in understanding the capabilities of your storage system. When using tools like Fio (Flexible I/O Tester) to evaluate performance, analyzing the generated output is crucial. This guide will walk you through the process of analyzing Fio output to gain insights into your storage system's performance.Step 1: Run Fio Test:
Begin by running the Fio test Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-18041666527458331542023-08-30T12:28:00.004+01:002023-09-04T12:43:17.949+01:00Create Desktop Environment in Suse Linux on AWS Having a Desktop environment on a Cloud Instance is helpful in many ways. You can troubleshoot application connectivity, take proper HAR files and so on. Even having a desktop is cool!Here is how you can install GNOME on any SUSE Linux instances in any Cloud Environments. Remember, once you install GNOME (or KDE or any desktop environment as a matter of fact), you need to use VNC to connect to Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-88261091246377917692023-08-30T12:21:00.011+01:002023-09-01T12:34:49.082+01:00How to create 1000s of small files in Linux for troubleshooting You can use the following one liner to create thousands of smaller random size files on local block volume. In this example we are creating 21099 smaller files of multiple KBs. for n in {1..21099}; do dd if=/dev/urandom of=file$( printf %03d "$n" ).txt bs=1 count=$(( RANDOM + 1024 )); doneJayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-32216993083756364152023-08-30T12:18:00.045+01:002023-09-01T12:35:00.368+01:00How to do faster copy and delete operations on EFS file systems Issue: How to do faster copy and delete operations on EFS file systems.Environment:Amazon LinuxUbuntu ServerAmazon EFSSolution:To optimize copy and delete operations on EFS file systems, you can use the GNU Parallel shell tool for executing jobs in parallel. By doing this you will be able to complete these tasks faster than using the normal serial method. 1.a. Install the NFS utilities andJayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0tag:blogger.com,1999:blog-5261118490288391693.post-13362160769345691882023-08-30T10:43:00.007+01:002023-09-01T12:35:11.819+01:00Block Volume Performance calculationIn the realm of modern computing, where data storage and retrieval speed are paramount, understanding the performance of storage solutions is crucial. One of the fundamental components of this landscape is Linux block volume performance calculation. Whether you're a system administrator, a developer, or an enthusiast, delving into the intricacies of block volume performance, including Fio-based Jayhttp://www.blogger.com/profile/08928753128432395715noreply@blogger.com0