Skip to main content

Posts

Mysql New installation - User setup

$ sudo mysql - u root # I had to use "sudo" since is new installation mysql > USE mysql ; mysql > SELECT User , Host , plugin FROM mysql . user ; + ------------------+-----------------------+ | User | plugin | + ------------------+-----------------------+ | root | auth_socket | | mysql . sys | mysql_native_password | | debian-sys-maint | mysql_native_password | mysql > UPDATE user SET plugin = 'mysql_native_password' WHERE User = 'root' ; mysql > FLUSH PRIVILEGES ; mysql > exit ; Option 2:  (replace YOUR_SYSTEM_USER with the username you have) $ sudo mysql - u root # I had to use "sudo" since is new installation mysql > USE mysql ; mysql > CREATE USER 'YOUR_SYSTEM_USER' @ 'localhost' IDENTIFIED BY '' ; mysql > GRANT ALL PRIVILEGES ON *.* TO 'YOUR_SYSTEM_USER' @ 'localhost...
Recent posts

Mongodb Replication startup

Start the Mogodbserver ==================== 1)  mongod --replSet rs0 --port 27017 --bind_ip localhost --dbpath /srv/mongodb/rs0-0  --oplogSize 128 & 2)  mongod --replSet rs0 --port 27018 --bind_ip localhost --dbpath /srv/mongodb/rs0-1  --oplogSize 128 & 3)  mongod --replSet rs0 --port 27019 --bind_ip localhost --dbpath /srv/mongodb/rs0-2  --oplogSize 128 & 4) mongo --port 27017 5) rs.status() 6) conf = {             _id: "rs0",             members:                       [                          {_id : 0, host : "localhost:27017"},                          {_id : 1, host : "localhost:27018"},                          {_i...

IPTABLES Rules add and delete

IPTABLES  Rules add and delete 1) Add RULE    iptables -t nat -A DOCKER -p tcp --dport 3000 -j DNAT --to-destination 172.17.0.10:3000 2) Delete RULE  iptables -t nat -v -L -n --line-numbers output: Chain DOCKER (2 references) num   pkts bytes target     prot opt in     out     source               destination        1     3712  223K RETURN     all  --  docker0 *       0.0.0.0/0            0.0.0.0/0          2        0     0 RETURN     all  --  br-8ce9d4979c48 *       0.0.0.0/0            0.0.0.0/0          3       36  2160 DNAT      ...

Docker Points to Remember

                                Docker service commands 1)  Run the container             docker run --name mysql -p 3306:3306 -e MYSQL_ROOT_PASSWORD=root mysql 2) Stop/Start  the container           docker stop mysql           docker start mysql 3) commit the container             docker commit mysql 4) Save the image into the file                 docker save -o mysql mysql 6) load the images into docker repo                docker load -i mysql 7) Running container terminal              docker exec -it mysql bash

Docker SonarQube - Code Review

Docker SonarQube - Code Review 1) Run docker sonarqube                docker run  --name sonarqube -p 7000:9000  -e POSTGRESQL_HOST=10.184.48.46  -e SONARQUBE_DATABASE_USER=sonarqube  -e SONARQUBE_DATABASE_NAME=sonarqube  -e SONARQUBE_DATABASE_PASSWORD=sonarqube -Dsonar.ce.javaOpts=-Xmx2048m -Dsonar.web.javaOpts=-Xmx2048m  bitnami/sonarqube:latest                      username: admin                      password: bitnami In the portal disable scanner 2) Create a key and add the projects to sonarqube                mvn sonar:sonar   -Dsonar.projectKey=myprj1   -Dsonar.host.url=http://localhost:9000   -Dsonar.login=d2023e31fad6ecec0b9ace927c36f58764e35ee8 3) commit the container           ...

Self Signed SSL Certificate

SSL Certificate: ============== 1) openssl req -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr 2) openssl x509 -req -days 1000 -in server.csr -signkey server.key -out server.crt 3) openssl pkcs12 -export -out hyperic.pfx -inkey ../sslcert/server.key -in ../sslcert/server.crt -certfile ../sslcert/server.crt 4) keytool -importkeystore -deststorepass Password@123 -destkeystore hyperic.keystore -destkeypass Password@123 -srckeystore ../pkcscert/hyperic.pfx -srcstoretype PKCS12 -srcstorepass Password@123 -alias 1 -v 5)  keytool -changealias -keystore hyperic.keystore -alias 1 -destalias hq verify Certificate: ============== 1) keytool -list -v -keystore hyperic.pfx -storepass Password@123 -storetype PKCS12 2)  openssl s_client -connect 10.184.48.42:7443

SD-WAN

Points to way ahead: ======== QoS Link quality based path selection Application level visibility Connection level visibility Manual selection of tunnels architecture Automatic policy based creation of tunnels (full mesh/hub & spoke) Encryption Application detection by destination IP/Port DPI based application detection Security Multi VRF IPv6 ================================== 1) curl http://10.184.39.159:8080/wm/core/controller/switches/json     [{"inetAddress":"/127.0.0.1:58410","connectedSince":1572888848497,"openFlowVersion":"OF_13","switchDPID":"00:00:00:0f:fe:f2:14:24"}] 2) ovs-vsctl set bridge br-eth0 protocols=OpenFlow10,OpenFlow11,OpenFlow12,OpenFlow13 Reference: ========= http://docs.openvswitch.org/en/latest/faq/qos/ https://www.networkcomputing.com/networking/how-set-floodlight-and-test-openflow-rules https://groups.geni.net/geni/wiki/GENIExperimenter/Tutori...