Author name: Hasan Altın

Commands I used while configuring a Ruijie Switch

I have recently experienced a switch which is called a Ruijie made in China. I’m not good at Cisco, but briefly, I can say that Ruijie commands are similar to Cisco. You can visit its webpage by clicking here. Anyway I just wanted to share the commands that I use commonly to configure a Ruijie switch in this post. Run the enable command that gives you to enter privileged mode. You can use this command mode to conduct basic tests or display system information. enable After you run the enable mode that allows you to enter the privileged mode, then run the configure command to enter global configuration mode. configure terminal The default host name is Ruijie. Run the hostname command to change the default system name. hostname <NewHostName> See the configs which is currently runs on the switch. show running-config In global configuration mode, run the interface command to enter interface configuration mode. It allows you to configure an interface or interfaces. interface Seeing more commands about the interface, don’t forget to add a question mark after you typing the interface. There is no need to use only a question mark after the interface, you can use it everywhere to see what to do. interface ? You don’t need to write the all commands in a row, just start to text and press the Tab key to display the complete keyword. SW# show run<Tab> SW# show running-config Assigning an ip address to the switch. Firstly of all you should enter the global configuration mode. All ports are belong to VLAN 1. It comes out of the factory as default like other manufacturers did. SW1(config)# Interface VLAN 1 SW1(config-VLAN 1)# ip address 172.16.16.2 255.255.255.0 SW1(config-VLAN 1)# exit Accessing your Ruijie switch via your web browser. Ruijie needs to have an enabled web server service before you set an ip address or after. In the global configuration mode, type the command given below. It grants both http and https traffics to your swich. enable service web-server all Connecting your Ruijie switch via telnet. Run the following command to enable the telnet command in the global configuration mode. enable service telnet-server Accessing your Ruijie switch via telnet or console are not enough to connect your device with the command which was given above. You have to use the following commands below, they help you to set a password for both privileged mode and global configuration mode. username admin secret Passw0rd enable secret Passw0rd line vty 0 4 login local Creating a new vlan also is so simple, just text VLAN ID command in the global configuration mode. SW1(config)# VLAN 50 SW1(config)# name Camera SW1(config)# exit Assigning a specific port or ports to a VLAN that was created for the Camera System. Following commands assing the first 10 ports of the switch to VLAN 50. SW1(config)#interface range gigabitEthernet 0/1-10 SW1(config-if-range)#switchport mode access SW1(config-if-range)#switchport access vlan 50 SW1(config-if-range)#exit Seeing the status of all the ports show interface status Seeing the mac address of the devices which is connected to gigabit ethernet ports of the switch. show mac-address-table | exclude TenGigabitEthernet or all. show mac-address-table Seeing the aggregate ports and, how to configure aggregate ports examples are shown below. SW45#show aggregatePort summary AggregatePort MaxPorts SwitchPort Mode Load balance Ports ————- ——– ———- —— —————————- ———————————– Ag1 8 Enabled ACCESS src-mac Gi0/32 ,Gi0/33 ,Gi0/38 ,Gi0/39 Ag2 8 Enabled ACCESS src-mac Gi0/24 ,Gi0/25 ,Gi0/27 ,Gi0/29 SW45# SW45(config)#interface aggregatePort 3 SW45(config-if-AggregatePort 3)#switchport access vlan 100 SW45(config-if-AggregatePort 3)#exit SW45(config)#wr SW45(config)#interface range gigabitEthernet 0/1-4 SW45(config-if-range)#port-group 3 mode active SW45(config-if-range)#exit SW45(config)#exit SW45#wr Building configuration… [OK] SW45# AggregatePort MaxPorts SwitchPort Mode Load balance Ports ————- ——– ———- —— —————————- ———————————– Ag1 8 Enabled ACCESS src-mac Gi0/32 ,Gi0/33 ,Gi0/38 ,Gi0/39 Ag2 8 Enabled ACCESS src-mac Gi0/24 ,Gi0/25 ,Gi0/27 ,Gi0/29 Ag3 8 Enabled ACCESS src-mac Gi0/1 ,Gi0/2 ,Gi0/3 ,Gi0/4 If you want to know which port is used by your device can be found by using the following command. sh mac-address-table dynamic address aaaa.bbbb.cccc.dddd Sometimes LLDP command helps you to find out other network devices (switch, IP phone, etc. ). LLDP also helps you to assign the VLANs automatically to IP phones for IP Phone networks. Simply you can find these devices using the following command. show lldp neighbors Deploying the VLANs to all network enable the gvrp feature on the all switches. gvrp enable gvrp dynamic-vlan-creation enable Shutting down or powering up an interface or poe can be done for the interface gigabitEthernet 0/1 with the following command. shutdown no shutdown poe enable no poe enable I will try to add this post more when i start to collect new information about Ruijie. Have a great day.

Commands I used while configuring a Ruijie Switch Read More »

Downloaded Sophos SSL VPN file is 0 Kb

Seems I forgot to publish this article. According to pictures, this article was written before the pandemic in Feb of 2020. Our sales team delivered to me a Sophos XG 115 Firewall and they wanted me to config it according to the customer’s infrastructure and demands. At the end of the installation I needed to config the SSL VPN and I completed it and wanted to try whether it works or not. I downloaded the SSL VPN config file but something was wrong because the size of the downloaded file was 0 kb. It says the file is 0 kb, as in the picture above. Then I needed to check out the written information on the Default Certificate. I made countless research on google and Sophos community. Many of them were mentioning about the written information of the certificate authority. Certificate authority information was okay and its firmware of Sophos was up to date. I had taken a look at Sophos community and found this solution. Keep the pattern updates up to date, then your problem will be solved. System > Backup & Firmware > Pattern updates Thanks to Sophos community. Thanks for your time reading my article about Sophos SSL VPN.

Downloaded Sophos SSL VPN file is 0 Kb Read More »

Cisco Commands

I’ve collected some useful command lists of Cisco and wanted publishing on my blog. This article will be updated when I see some new commands related to Cisco. Changing switch hostname Switch(config)#hostname SW1 Configuring passwords SW1(config)#enable secret cisco SW1(config)#enable password notcisco Securing console port SW1(config)#line con 0 SW1(config-line)#password cisco SW1(config-line)#login Securing terminal lines SW1(config)#line vty 0 4 SW1(config-line)#password cisco SW1(config-line)#login Configuring banners SW1(config)#banner motd $ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- UNAUTHORIZED ACCESS IS PROHIBITED -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- $ Giving the switch an IP address SW1(config)#interface VLAN 1 SW1(config-if)#ip address 172.16.1.11 255.255.255.0 (or dhcp) SW1(config-if)#shutdown Setting the default gateway SW1(config)#ip default-gateway 172.16.1.1 Saving configuration SW1#copy running-config startup-config Destination filename [startup-config]? [OK] or SW1#wr [OK] Working environment (name lookup, history, exec-timeout and logging behavior) SW1(config)#no ip domain-lookup SW1(config)#line vty 0 4 SW1(config-line)#history size 15 SW1(config-line)# exec-timeout 10 30 SW1(config-line)#logging synchronous Configuring switch to use SSH 1. Configure DNS domain name: SW1(config)#ip domain-name example.com 2. Configure a username and password: SW1(config)#username admin password cisco 3. Generate encryption keys: SW1(config)#crypto key generate rsa How many bits in the modulus [512]: 1024 4. Define SSH version to use: SW1(config)#ip ssh version 2 5. Enable vty lines to use SSH: SW1(config)#line vty 0 4 SW1(config-line)#login local SW1(config-line)#transport input telnet ssh Aliases SW1(config)#alias exec c configure terminal SW1(config)#alias exec s show ip interface brief SW1(config)#alias exec sr show running-config Description, speed and duplex SW1(config)#interface fastEthernet 0/1 SW1(config-if)#description LINK TO INTERNET ROUTER SW1(config-if)#speed 100 (options: 10, 100, auto) SW1(config)#interface range fastEthernet 0/5 – 10 SW1(config-if-range)#duplex full (options: half, full, auto) Verify Basic Configuration SW1#show version Shows information about the switch and its interfaces, RAM, NVRAM, flash, IOS, etc. SW1#show running-config Shows the current configuration file stored in DRAM. SW1#show startup-config Shows the configuration file stored in NVRAM which is used at the first boot process. SW1#show history Lists the commands currently held in the history buffer. SW1#show ip interface brief Shows an overview of all interfaces, their physical status, protocol status, and IP address if assigned. SW1#show interface VLAN 1 Shows detailed information about the specified interface, its status, protocol, duplex, speed, encapsulation, last 5 min traffic. SW1#show interfaces description Shows the description of all interfaces SW1#show interfaces status Shows the status of all interfaces like connected or not, speed, duplex, trunk, or access VLAN. SW1#show crypto key mypubkey RSA Shows the public encryption key used for SSH. SW1#show DHCP lease Shows information about the leased IP address (when an interface is configured to get an IP address via a DHCP server) Configuring port security The sticky keyword is used to let the interface dynamically learns and configures the MAC addresses of the currently connected hosts. 1. Make the switch interface as access port: SW1(config-if)#switchport mode access 2. Enable port security on the interface: SW1(config-if)#switchport port-security 3. Specify the maximum number of allowed MAC addresses: SW1(config-if)#switchport port-security maximum 1 4. Define the action to take when a violation occurs: SW1(config-if)#switchport port-security violation shutdown (options: shutdown, protect, restrict) 5. Specify the allowed MAC addresses: SW1(config-if)#switchport port-security mac-address 68b5.9965.1195 (options: H.H.H, sticky) Verify and troubleshoot port-security SW1#show mac-address-table Shows the entries of the mac address table SW1#show port-security Overview of port security of all interfaces SW1#show port-security interface fa0/5 Shows detailed information about port security on the specified interface Configuring VLANs 1. Create a new VLAN and give it a name: SW1(config)#vlan 10 SW1(config-vlan)#name SALES 2. Assign an access interface to access a specific VLAN: SW1(config)#interface fastEthernet 0/5 SW1(config-if)#switchport mode access SW1(config-if)#switchport access VLAN 10 Configuring an auxiliary VLAN for cisco IP phones Accessing vlan 10 (data) and 12 (VoIP) SW1(config)#interface fastEthernet 0/5 SW1(config-if)#switchport access vlan 10 SW1(config-if)#switchport voice vlan 12 Configuring Trunks SW1(config)#interface fastEthernet 0/1 SW1(config-if)#switchport mode trunk (options: access, trunk, dynamic auto, dynamic desirable) SW1(config-if)#switchport trunk allowed vlan add 10 (options: add, remove, all, except) Securing VLANS and Trunking 1. Administratively disable unused interfaces: SW1(config-if)#shutdown 2. Prevent trunking by disabling auto-negotiation on the interface: SW1(config-if)#nonegotiate (or hardcode the port as an access port) SW1(config-if)#switchport mode access 3. Assign the port to an unused VLAN: SW1(config-if)#switchport access VLAN 222 Thanks reading the cisco commands article.

Cisco Commands Read More »

How to get CentOS 7 Installation media

Hello Guys, As you know CentOS is one of the most important Linux distributions. Nowadays we do lots of things without paying money for 3rd applications by using Linux distributions. Today we will learn how to get CentOS 7 and see in other articles on how to install and configure our CentOS Server. Since this article published the current available CentOS version is 7 and this version support will be ended on 30 June 2024 and for CentOS 6 will be ended on 30 November 2020. Resource: https://wiki.centos.org/Download How to download the latest version of the CentOS. We have the opportunity to download the latest version of the CentOS via the lots of firms around the world but the Official CentOS webpage offers us the mirrors who serve in our region. I meant the firms who became a volunteer to share the latest version via their websites. Also, these firms use the CentOS in their locations for their customers. There are two different packages related to CentOS. One of them is Minimal Iso and another is DVD Iso. CentOS shows us two paths to get the installation media both over http and over torrent. You can choose which way you want to use, it’s up to your situation. Minimal Iso only includes the basement of the operating system without GUI despite DVD Iso includes everything inside of itself that you need except for specific repos but it doesn’t matter, you can add easily which repo you want to use later. After this step, I’ll show you how to download Centos 7 step by step using pictures. Thanks for reading and have a great day.  

How to get CentOS 7 Installation media Read More »

How to install CentOS

I had mentioned on my previous article how to get CentOS 7 Installation Media and it was so simple to get the iso file and in this article, we will see how to install CentOS that we downloaded the installation media. If you want to download CentOS click here. Generally you will see the pictures and you will understand what to do, mentioning about something in each step of installation is not necessary. Let’s start. CentOS Installation I used single-core CPU, 4GB Ram, 20 GB HDD and changed my network adapter from NAT to Bridge on VMware Workstation. We start to installation clicking on the Install CentOS 7. We see the installation summery field and need to change some setting according to our location and situation. In localization field, I will change the location which I live and keyboard which I use but there is a place into Date & Time field that we need to change after we set the network connection on because I want to use global NTP resources which located on CentOS servers. If you have NTP Server in your location, you can use it also. I’m going to mention it when the time comes. As you see, I choose my location. Remember what I mentioned above about NTP Servers. You see there is a set place on Network Time, you can click on this button and set your NTP Server IP Address or FQDN addresses. You can set your NTP Servers as below and it will be activated if your network is connected. You can’t change these settings unless your connection is enabled. Localization field has completed and it is time to set Sofware Selection. We don’t need to touch installation source field that we saw in the main page because we are going to use ISO file which was added in the beginning. In the Software Selection section, I won’t change anything because I want to install minimal Installation and it is set as default. I click on the Done button. In Installation Destination field, I set 20 GB HDD and I’m choosing it and it needs to choice as blow and I click on the Done button. I prefer to disabled the KDUMP because It is going to use the memory and we don’t need to use it unless we don’t have a problem with related to system or services. It can be enabled later when it needs. You can set a name for your CentOS in Hostname field, if you don’t click on the Apply button after you change your hostname, it won’t be changed. and you can also activate your Ethernet connection here. After you set everything in this part you can click on the Done button to ready your server to installation. Everything is ready for installation and I click on the Begin Installation. As you see, the installation has started and I need to set my root password after clicking on the Begin Installation. I don’t set the User Creation part because I’m going to use root account and everything will be root level. Now I set my password and I need to apply twice because I set a weak password and system wants me to press on the Done button twice to accept the weak password. You should choose a strong password if you use it on real systems. This is a demo installation and I’m using a weak password. Installation is completed and I click on the Reboot button to restart my server. I log in to my new CentOS server and check something to sure everything is okay. CentOS Installation article has completed, thanks for reading. If you want to read more about Linux you visit Linux category.

How to install CentOS Read More »

Ifconfig Command Not Found In CentOS 7

As we know “ifconfig” is used to show the details of the network card details, statistic and the situation in GNU/Linux systems but it is used and old way. If you want to use “ifconfig” command in your linux system you should install it from your os repository. The error received is below. [root@centos ~]# ifconfig -bash: ifconfig: command not found Nowadays we use the command, which is given below, to show the IP address, Mac address and the status of the network interface. ip addr Sample output. 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000 link/ether 00:0c:29:b2:52:11 brd ff:ff:ff:ff:ff:ff inet 192.168.2.6/24 brd 192.168.2.255 scope global noprefixroute dynamic ens33 valid_lft 3302sec preferred_lft 3302sec inet6 fe80::5018:6acc:485b:e277/64 scope link noprefixroute valid_lft forever preferred_lft forever To view the less information of the network interface you can use the following command. ip link Sample output. 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000 link/ether 00:0c:29:b2:52:11 brd ff:ff:ff:ff:ff:ff To view the detailed packages which flows on the network, enter the following code. ip -s link Sample output. 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 RX: bytes packets errors dropped overrun mcast 0 0 0 0 0 0 TX: bytes packets errors dropped carrier collsns 0 0 0 0 0 0 2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000 link/ether 00:0c:29:b2:52:11 brd ff:ff:ff:ff:ff:ff RX: bytes packets errors dropped overrun mcast 15206 154 0 0 0 0 TX: bytes packets errors dropped carrier collsns 17767 103 0 0 0 0 Get rid of the ifconfig error. Now, let’s return the subject and install the package what we need to use ifconfig command in CentOS. Enter the code, which is given below, to your command line. yum install net-tools -y Sample output. Failed to set locale, defaulting to C Loaded plugins: fastestmirror Determining fastest mirrors * base: denizli.centos-mirror.guzel.net.tr * extras: mirror.fibersunucu.com.tr * updates: mirror.rackdc.com base | 3.6 kB 00:00:00 extras | 3.4 kB 00:00:00 updates | 3.4 kB 00:00:00 (1/4): base/7/x86_64/group_gz | 166 kB 00:00:00 (2/4): extras/7/x86_64/primary_db | 201 kB 00:00:00 (3/4): updates/7/x86_64/primary_db | 5.0 MB 00:00:06 (4/4): base/7/x86_64/primary_db | 6.0 MB 00:00:09 Resolving Dependencies –> Running transaction check —> Package net-tools.x86_64 0:2.0-0.24.20131004git.el7 will be installed –> Finished Dependency Resolution Dependencies Resolved =========================================================================================== Package Arch Version Repository Size =========================================================================================== Installing: net-tools x86_64 2.0-0.24.20131004git.el7 base 306 k Transaction Summary =========================================================================================== Install 1 Package Total download size: 306 k Installed size: 918 k Downloading packages: warning: /var/cache/yum/x86_64/7/base/packages/net-tools-2.0-0.24.20131004git.el7.x86_64.rpm: Header V3 RSA/SHA256 Signature, key ID f4a80eb5: NOKEY Public key for net-tools-2.0-0.24.20131004git.el7.x86_64.rpm is not installed net-tools-2.0-0.24.20131004git.el7.x86_64.rpm | 306 kB 00:00:00 Retrieving key from file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-7 Importing GPG key 0xF4A80EB5: Userid : “CentOS-7 Key (CentOS 7 Official Signing Key) <security@centos.org>” Fingerprint: 6341 ab27 53d7 8a78 a7c2 7bb1 24c6 a8a7 f4a8 0eb5 Package : centos-release-7-6.1810.2.el7.centos.x86_64 (@anaconda) From : /etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-7 Running transaction check Running transaction test Transaction test succeeded Running transaction Installing : net-tools-2.0-0.24.20131004git.el7.x86_64 1/1 Verifying : net-tools-2.0-0.24.20131004git.el7.x86_64 1/1 Installed: net-tools.x86_64 0:2.0-0.24.20131004git.el7 Complete! We completed the installation and let’s check it out the code whether it works. [root@centos ~]# ifconfig ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.2.6 netmask 255.255.255.0 broadcast 192.168.2.255 inet6 fe80::5018:6acc:485b:e277 prefixlen 64 scopeid 0x20<link> ether 00:0c:29:b2:52:11 txqueuelen 1000 (Ethernet) RX packets 8802 bytes 12814700 (12.2 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 5227 bytes 374060 (365.2 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10<host> loop txqueuelen 1000 (Local Loopback) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 [root@centos ~]# The ifconfig article has completed, thanks for reading. If you want to read more about Linux you visit Linux category. Reference articles: https://www.centos.org/forums/viewtopic.php?t=47342

Ifconfig Command Not Found In CentOS 7 Read More »

Upgrade Zabbix/Proxy 5.2.x to 5.4 on RHEL/CentOS

Today I’ve upgraded my monitoring system, Zabbix from 5.2.x to 5.4 version which was published on 14th of May, 2021. The official tweet is here. I earn my living by selling and supporting Microsoft products, but I can’t hide my admiration for open-source software. I always say “You cannot manage the things you cannot see“. This process is very easy and I’ll share the steps with you in a simple way without overwhelming you with too much code. How to upgrade Zabbix server from 5.2.x to 5.4 Let’s get start it logging into our Zabbix server via ssh software, then type the following codes to stop Zabbix server processes because we don’t want any data to be written to our database while we are upgrading our system. systemctl stop zabbix-server The following code helps us to add the new version of Zabbix to our repository of the OS. rpm -Uvh https://repo.zabbix.com/zabbix/5.4/rhel/8/x86_64/zabbix-release-5.4-1.el8.noarch.rpm The next two following codes have added to this article due to I had trouble on my current system that I didn’t see the new version after completing the all steps. I solve the problem by removing the cache of repositories that are enabled, then enabled the cache again. yum clean all yum makecache Be careful with the next code because you may use PostgreSQL instead of MySQL. If you are using PostgreSQL, substitute mysql with pgsql in the command. yum upgrade zabbix-server-mysql zabbix-web-mysql zabbix-agent -y yum install zabbix-apache-conf -y Everything seems done so far, let’s check out our Zabbix version now. If you see that you have upgraded your Zabbix to the 5.4 version of Zabbix, type the following code to start Zabbix. zabbix_proxy –version systemctl start zabbix-server How to upgrade Zabbix proxy from 5.2.x to 5.4 We’ll follow the same steps except for two steps that we have to change the code from server to proxy. I assume that you upgraded your Zabbix server implementing the above steps and tried the see what’s was going on on your Zabbix server on the shell. If you read the log file using the tail -f /var/log/zabbix/zabbix_server.log you will see the given information code on the line because there is a difference between the server and proxy. They need to have the same version to be read and displayed the right data. 2303384:20210525:193018.357 proxy “PROXY_MON_SERVER_NAME” protocol version 5.2 differs from server version 5.4 Let’s start to upgrade our Zabbix Proxy server with the following codes. systemctl stop zabbix-proxy rpm -Uvh https://repo.zabbix.com/zabbix/5.4/rhel/8/x86_64/zabbix-release-5.4-1.el8.noarch.rpm yum clean all yum makecache yum upgrade zabbix-proxy-mysql -y yum install zabbix-apache-conf -y systemctl start zabbix-proxy zabbix_proxy –version Great, you have upgraded your Zabbix server or Zabbix Proxy reading this article. Thanks for your time reading my article about Zabbix and Zabbix proxy.

Upgrade Zabbix/Proxy 5.2.x to 5.4 on RHEL/CentOS Read More »

Connection to database ‘zabbix’ failed: [2002]

Hello IT fellas, When I came to the office today, I saw a warning on our monitoring system that said database error, connection refused. You can see the mentioned picture below. Then I checked out the logs of the Zabbix which is given error below. [root@appliance ~]# tail -f /var/log/zabbix/zabbix_server.log 1144:20210531:082544.703 [Z3001] connection to database ‘zabbix’ failed: [2002] Can’t connect to local MySQL server through socket ‘/var/lib/mysql/mysql.sock’ (111) 1144:20210531:082544.703 database is down: reconnecting in 10 seconds I’ve seen the same problem in the past and didn’t check the DB username and password whether it works. Let’s check the partition which is running on our MySQL. As you see in the picture below the file system /var/lib/mysql which is linked to /dev/sda5 is full. Seems this partition needs to be extended, I also have to check the housekeeper out not to get a similar problem in the future after solving this problem. I prefer to extend the partition using the GParted Live CD. I shut down the server and started it with GParted. In this case, I will just extend the current disk size, and will not interested in the housekeeper issue. I won’t write anything and give any information from now on, you will just see how to extend your Linux partition with GParted. Extending disk size of the linux partition is done. Let’s reject the GParted Live Cd and start the Zabbix OS. The problem with the disk filling up has been resolved by extending the disk size. After this post, I will take a look housekeeper issue. Thanks for your time reading my article.

Connection to database ‘zabbix’ failed: [2002] Read More »

How to enable SSH root login on Alpine Linux

Nowadays I’m interested in docker and i see that docker offers Alpine Linux to use for those who are interested in container technologies nowadays. Once start searching about Alpine Linux distro everybody encourages you to use this distro on your projects. Official web site is said “Alpine Linux is a security-oriented, lightweight Linux distribution based on musl libc and busybox.” Okay, let’s start sharing the knowledge that we have about the SSH in this point. By the way it was the most fastest Linux installation i have ever experienced thus far. In installation progress there was an option about SSH, and its packages. There were two ssh packages named openssh and dropbear-ssh, my choice was openssh, because i had no idea about the second one. After the installation was done I tried to access the alpine but it didn’t work. I thought an existing security policy wouldn’t allow me to use a simple password for an SSH connection, then I changed my password to a complex one but that didn’t work either and I started looking for an answer to this problem and finally found it. Open the given file using vi command. vi /etc/ssh/sshd_config Then find the given line. #PermitRootLogin prohibit-password change it with the following code, and save it. PermitRootLogin yes Then restart the SSH service. service sshd restart Now connection is open for root user. Thanks for your time reading

How to enable SSH root login on Alpine Linux Read More »

tr_TRTR