Using workflow management system for some sysadmin tasks
Processes in large environments In large production environments practically everything must be controlled by oracularly defined processes. These computing environments are too complex to know by some...
View ArticleWebsvn with Bugzilla and LDAP authentication
Introduction My goal is to have a system capable of using one authentication database and point from bugzilla point revisions to their corresponding tree in svn. One of my colleges wrote an extension...
View ArticleRedmine install with Passenger module and LDAP auth on Debian squeeze
Introduction I was setting up redmine for some project management monitoring for on of my colleges, and found that LDAP auth is a little under documented. I spent 2 days trouble shoouting until i got...
View ArticlePuppet install on Debian Squeeze with Dashboard
Introduction I had some time and started playing around with puppet. At first I was really frustrated with some sites giving documentation or guides that had errors that resulted in hours of debuging,...
View ArticlePuppet-dashboard with LDAP Auth on Debian Squeeze
Introduction After installing puppet I was researching a possibility to secure puppet dashboard with either ldap auth or apache htpasswd auth. Some quick tests and I got a working config set up fairly...
View ArticleAuthBasicProvider not allowed here
During vhost provisions with LDAP auth I was seeing errors: root@test:~# /etc/init.d/apache2 restart Syntax error on line 30 of /etc/apache2/sites-enabled/000-default: AuthBasicProvider not allowed...
View ArticleBasic gateway to gateway VPN tutorial: Part 1 –“TheGreenBow”
In these two articles i will show you two examples, how to connect two computers like two DB servers for example, securely through the internet, with the use of the VPN tunel technology. I will use two...
View ArticleBasic gateway to gateway VPN tutorial: Part 2 –“Cisco RV042″
In this Article i will guide you through a Gateway to Gateway VPN Tunnel configuration using two Cisco RV042. Our goal is just like in the first part of the article, to create an sql DB link between...
View ArticleSay bye-bye to the old trusty MD5
It is official: Microsoft is one of the big ones who’ll be retiring the venerable-but-vulnerable MD5 algorithm. Don’t worry, you’ll still be able to create MD5 hashes for your documents and verify...
View ArticleSSH key authentication not working under SELinux? Check this.
Just a short story after resolving a recently encountered problem: all our machines that are in the cloud, have SELinux enabled by default. Normally not a problem, but I found one interesting nuisance:...
View Article
More Pages to Explore .....