This document provides instructions on how to install and configure Apache SSL on CentOS 7. It includes steps to install the httpd package and enable the service, create a self-signed SSL certificate, configure the SSL settings in the Apache configuration file including the certificate and key files, open firewall ports, and validate the SSL configuration. The goal is to securely serve HTTPS traffic from the Apache web server using the newly created SSL certificate.
This document provides steps to install CentOS 6.3, including selecting installation type, disk partitioning, configuring network settings like hostname and DHCP, setting the root password, selecting packages, and rebooting the system to complete installation. Key steps are choosing installation media, partitioning and formatting disks, installing boot loader, and rebooting to finish.
How To Connect Amazon AWS EC2 with Key Pair – LinuxVCP Muthukrishna
This document provides instructions for connecting to an Amazon AWS EC2 Linux instance using a key pair. It outlines downloading the key pair file, modifying its permissions, and then using it to connect via SSH either by public IP or private IP. The key steps are: 1) Identify the key pair associated with the instance; 2) Copy the private key file to the local machine; 3) Change permissions on the key file; 4) Connect using SSH and specifying the key file and either public or private IP address. Following these steps allows logging into the EC2 instance securely using the key pair.
How To Install and Configure AWS CLI for WindowsVCP Muthukrishna
This document provides instructions for installing and configuring the AWS CLI on Windows. It includes downloading the AWS CLI MSI installer, running the installer, and configuring access keys through the aws configure command. The AWS CLI must be configured with an access key ID, secret access key, and default region to authenticate with AWS and interact with AWS services through commands.
Install and Configure WordPress in AWS on RHEL 7 or CentOS 7VCP Muthukrishna
The document provides instructions to install and configure WordPress on AWS with a local MariaDB database on RHEL 7 or CentOS 7. It describes how to install and configure Apache HTTPD, PHP, MariaDB, and WordPress. Key steps include installing packages for Apache, PHP, and MariaDB; configuring services; creating a database for WordPress; downloading and extracting the WordPress package; and configuring WordPress.
How To Install and Configure Log Rotation on RHEL 7 or CentOS 7VCP Muthukrishna
Logrotate is used to automatically rotate, compress, and remove log files. It can be configured to run daily, weekly, or monthly, and also based on log file size. The main configuration file is /etc/logrotate.conf, and individual services are configured in files under /etc/logrotate.d/. Logrotate can be run manually with the logrotate command or automatically via cron. Options allow compressing, emailing, and moving old log files. Scripts can be used for tasks like restarting services after rotation.
How To Protect SSH Access with Fail2Ban on RHEL 7VCP Muthukrishna
This document provides instructions on how to install and configure Fail2Ban on RHEL 7 to protect SSH access. It describes installing the Fail2Ban package, configuring jails and filters to monitor the SSH service logs, enabling and starting the Fail2Ban service, and viewing firewall rules and banned IP addresses. Key steps include editing /etc/fail2ban/jail.local to enable SSH monitoring, setting attributes like maxretry and findtime, and starting the Fail2Ban service to begin blocking IPs.
This document provides instructions for installing VMWare Tools on CentOS 7. It outlines pre-requisites like installing kernel headers and packages. It describes mounting the CDROM and extracting the installer. The key steps are running the vmware-install.pl script from the installer directory and rebooting the system. Verification involves checking that the vmtoolsd daemon is running. Troubleshooting tips address issues finding ipconfig, a bad perl interpreter, or missing fuse packages. Uninstallation runs the vmware-uninstall-tools script.
The document provides steps to install Openfire instant messaging server on CentOS 7. It includes downloading and installing Java, setting the hostname, installing MariaDB database, downloading and configuring Openfire, and starting the Openfire service. Troubleshooting tips are also included to address potential issues like service failures.
This document provides steps to upgrade Openfire on CentOS 7, including stopping the Openfire service, backing up the MySQL database and configuration file, downloading and installing the latest Openfire package, and restarting the service. The process involves launching the Openfire admin console, stopping the service, backing up the database and configuration, downloading and installing the new package, verifying the installation, and restarting the service.
This document provides instructions on how to install, configure, and use the GNU Screen terminal multiplexer on CentOS 7. It discusses installing the Screen package, verifying installation, launching new screen sessions, listing, attaching, detaching, locking, creating new screens within sessions, switching between sessions, stopping sessions, wiping defunct sessions, scrolling back in sessions, splitting sessions horizontally and vertically, starting and switching split sessions, exiting split sessions, modifying permissions to share sessions between users, and accessing sessions by name from other user accounts.
How To Install and Configure SNMP on RHEL 7 or CentOS 7VCP Muthukrishna
The document provides instructions on how to install and configure SNMP on RHEL 7. It describes downloading the required packages, editing the configuration file, opening the required port in the firewall, and testing SNMP queries locally and remotely. SNMP can be used to monitor devices and retrieve statistics on parameters like performance, usage, and storage. The three main versions of SNMP are also outlined, highlighting their features around security, querying, and remote configuration capabilities.
The nginx service failed to start because it was configured to bind to port 9080, which was not an authorized port by the default SELinux configuration. Adding port 9080 to the list of authorized HTTP ports using semanage resolved the issue, allowing nginx to bind to the non-standard port and start successfully. Validation steps confirmed the service was now accessible on port 9080.
How To Check IE Enhanced Security Is Enabled Windows PowerShellVCP Muthukrishna
This PowerShell script checks the status of Internet Explorer Enhanced Security settings on a system. It reads the registry keys that control IE Enhanced Security for the local machine profile and current user. The script outputs whether each key is supported, the current value set for each key, and notifies if a key is not defined.
How To Install and Configure Splunk on RHEL 7 in AWSVCP Muthukrishna
This document provides instructions on how to install and configure Splunk Enterprise on Red Hat Enterprise Linux 7 in AWS. It describes downloading the Splunk RPM package, installing it with rpm, configuring the firewall to open port 8000, editing the Splunk configuration file, starting Splunk for the first time which involves accepting the license, and accessing the Splunk web interface at http://servername:8000/ after setting a new admin password.
This document provides steps to configure an Amazon EC2 load balancer with two nodes. It includes launching two EC2 instances, updating packages, configuring NTP and time synchronization, installing an Apache web server, adding content to identify each node, creating a load balancer and defining security settings, health checks, and associating the instances. The load balancer is then tested by making requests which are routed to each node, demonstrating the load balancing functionality.
This document provides instructions for installing and configuring the Chrony time synchronization daemon on Red Hat Enterprise Linux 7 systems. It describes Chrony as an alternative to NTP that can adjust the system clock more rapidly, especially for servers that are not permanently connected to the network or powered on. The document outlines pre-requisites, advantages of Chrony over NTP, package installation steps, and commands to enable, start, and check the status of the Chrony daemon.
This document discusses how to configure SNMP logging on RHEL 7. It describes editing the SNMP daemon configuration file to set startup options like logging level and facility. It also provides instructions for starting, stopping, restarting, and checking the status of the SNMP daemon service using systemctl commands.
How To List Nginx Modules Installed / Complied on CentOS 7VCP Muthukrishna
This document provides instructions for listing Nginx modules installed on a RHEL 7 system. It explains that running the command "nginx -V" will output all modules compiled for the Nginx server. Alternatively, piping the output of "nginx -V" through tr and grep can format it to display each module on its own line.
This document provides instructions for finding package installation dates on RHEL 7. It explains how to query all installed packages and their dates using rpm -qa --last, query the latest 5 packages using rpm -qa --last | head -5, and query a specific package's installation and build dates using rpm -qi package | grep Date.
How To Configure Nginx Load Balancer on CentOS 7VCP Muthukrishna
This document provides instructions on how to configure Nginx as a load balancer on CentOS 7. It describes installing Nginx, configuring two web servers and a load balancer node, setting up the load balancing configuration in the Nginx configuration file, and testing the load balancer functionality using curl commands and a web browser.
How to Install Configure and Use sysstat utils on RHEL 7VCP Muthukrishna
The document discusses how to install, configure, and use the sysstat utilities to generate system activity reports on Linux systems. It provides steps to install the sysstat package, enable and start the sysstat service, and configure default settings and cron jobs. It also describes the various sysstat command line tools like sar, iostat, mpstat and their options to generate CPU, memory, disk, network and other reports.
How to Troubleshoot SELinux Audit2Allow unable to open (null)VCP Muthukrishna
This document provides steps to resolve the "audit2allow unable to open (null): Bad address" error when running the audit2allow command in SELinux. The error occurs when SELinux is disabled. The resolution is to change SELinux from disabled to enforcing mode, reboot the server, then run audit2allow which will now generate a type enforcement file without errors. The generated policy should then be validated before using.
The document discusses how to manage yum packages using groups. It describes how to list available groups, get info on a group, install, list installed, update, and remove a group of packages using yum commands like yum grouplist, yum groupinfo, yum groupinstall, yum groupupdate, and yum groupremove. Yum allows installing/managing packages by groups to easily install packages that are often used together like development tools.
This document discusses how to manage the yum cache on Linux systems. Yum is a package manager that caches packages, metadata, and other files to improve performance. The yum clean command can be used to clear different parts of the cache, including packages, metadata, database cache files, or everything. Running yum clean regularly helps free up disk space by removing unused and outdated cache files.
The document discusses various commands that can be used to list packages and package information using the YUM package manager on Linux systems. It provides examples of commands to list installed packages, available packages, updated packages, package information, packages providing specific files, and more. The commands allow filtering packages by name, version, architecture and other attributes.
This document discusses how to manage the history of yum commands. It describes the various yum history commands that allow you to view statistics, summaries, lists of packages and transactions. These commands include yum history stats, yum history summary, yum history list, yum history package-list, yum history info, yum history redo, yum history undo, and yum history new. The yum history feature allows users to view past yum actions, rollback changes, and clear the history log.
This document discusses how to manage yum repositories on Linux systems. It describes how yum is used to automatically install packages and dependencies. It then provides commands to list enabled and disabled yum repositories, and to install packages from a specific repository.
Install Active Directory PowerShell Module on Windows 10VCP Muthukrishna
This document provides instructions for installing the Active Directory PowerShell module on Windows 10. It outlines downloading and installing the Remote Server Administration Tools (RSAT) and verifying the installation. It then describes how to list, import, and use the ActiveDirectory PowerShell module to manage Active Directory tasks. Troubleshooting tips are provided for errors, including expanding and deploying the update package manually.
Shell Script Disk Usage Report and E-Mail Current Threshold StatusVCP Muthukrishna
This shell script generates a disk usage report for each disk partition on a server and emails the report. It checks disk usage percentages against thresholds of 90%, 80%, and 70% and colors partitions red, orange, or green accordingly in the report. It also calculates the difference in disk usage from the previous report 12 hours ago and includes this in the emailed report. Running the script generates an HTML report file and uses sendmail to email the file to specified recipients.
The document provides instructions on how to install packages using the yum package manager in Linux. It describes how to install a package and await confirmation, suppress confirmation, show duplicate packages, and install a specific package version. Yum automatically identifies dependencies and ensures the correct packages are installed. It can also install groups of packages and is used via its module interface in Python programs.
How To View Login History and Logout History on RHEL 7VCP Muthukrishna
This document provides instructions for viewing login and logout history on RHEL 7 using the 'last' command. It describes the log files that contain login/logout information and provides examples of how to use 'last' to view specific details like a particular user's entries, logins at a certain time, system shutdown/reboot times, and failed login attempts. The 'last' command allows extracting user login/logout data from log files to audit server access and identify users.
This document provides steps to reset the root password on RHEL 7 if it is forgotten:
1. Reboot the server and choose the "Core" kernel entry in the boot menu.
2. Edit the kernel entry to add "rw init=/sysroot/bin/sh" which will start the system in single user mode.
3. Run the "chroot /sysroot" command and then "passwd root" to set a new root password.
4. Run "touch /.autorelabel" and reboot to relabel the filesystem for SELinux.
After installing the epel-release package on CentOS 7, running yum updateinfo would hang due to a bug where DNF failed to open files in /var/cache/dnf/. Removing the epel-release package resolved the issue.
The document discusses how to use the yum interactive shell to install, remove, update, and manage packages on Linux systems where yum is installed. It describes launching the yum shell, then using commands like install, remove, update within the shell along with the run command to perform package actions and quit to exit the shell. The yum shell provides an alternate way to manage packages through interactive commands rather than direct yum commands.
Bash Script - How To Monitor Application Error Logs and Send NotificationVCP Muthukrishna
This Bash script monitors application error logs, captures any errors from the past 2 hours, and emails the log lines containing the errors. It searches the log file for the time 2 hours ago, extracts the surrounding lines if an error is found, and emails the error log snippet with the application name in the subject line. It handles edge cases like hours wrapping from 23 to 1 and empty or very small error log files.
This document provides instructions for managing services on Red Hat Enterprise Linux 7 (RHEL 7) or CentOS 7 using the systemctl command. It lists common service management actions like start, stop, restart, enable, disable, mask, unmask and provides the corresponding systemctl commands. It also describes commands to check the status, activation state and failure state of a service.
This document provides a usage guide for the lsof command on RHEL 7. It describes what lsof is used for, pre-requisites, and examples of common commands to list open files by user, directory, process name, PID, network connections, and NFS files. The guide also explains how to use lsof to find processes associated with a specific file or running on a particular port.
Configuration of Self Signed SSL Certificate For CentOS 8Kaan Aslandağ
This document provides instructions for configuring a self-signed SSL certificate for an Apache web server on CentOS 8. It explains how to install the mod_ssl module, generate a self-signed certificate and key, configure Apache to use the certificate, and set up redirection from HTTP to HTTPS. While self-signed certificates encrypt communication, they do not validate the server identity to browsers and will result in security warnings for users.
This document provides steps to install and configure mod_ssl on CentOS/Fedora/Redhat to enable HTTPS on the Apache web server. It describes generating a self-signed certificate, editing the ssl.conf and httpd.conf configuration files to specify the certificate details and enable SSL, and restarting the Apache server to apply the changes.
The document provides step-by-step instructions for securing an Apache web server with a thawte digital certificate. It covers generating a private key and certificate signing request, using a test certificate, requesting a trusted certificate from thawte, configuring SSL in Apache, and installing the certificate. The goal is to help users set up encryption and authentication on their website to build customer trust and address security issues.
Aeon mike guide transparent ssl filtering (1)Conrad Cruz
This document provides instructions for configuring Squid 3.3 to act as an SSL bumping proxy on a Debian system. It describes how to generate a self-signed SSL certificate, edit the Squid configuration file to enable SSL bumping and specify the certificate files, configure iptables rules to redirect HTTPS traffic to the proxy, and provides an example Squid configuration file for SSL filtering.
Aeon mike guide transparent ssl filteringConrad Cruz
This document provides instructions for configuring SQUID 3.3 to act as an SSL bumping proxy on a Debian system. It describes how to generate a self-signed SSL certificate, edit the squid.conf file to enable SSL bumping and specify the certificate files, configure iptables rules to redirect HTTP and HTTPS traffic to the proxy ports, and provides an example configuration for filtering access to specific banking sites over HTTPS.
Quick-Start Guide: Deploying Your Cloudian HyperStore Hybrid Storage ServiceCloudian
This document will help a new user deploy a 3-node Cloudian storage cluster in your data center for use with the Cloudian HyperStore Hybrid Cloud Service from AWS Marketplace.
Making the secure communication between Server and Client with https protocolArmenuhi Abramyan
This document discusses how to configure Apache HTTP Server 2.2.14 to enable secure communication using HTTPS. It describes generating a private key and self-signed certificate for the server, configuring the Apache modules for SSL and rewrite, and testing that web pages under the /b directory are only accessible via HTTPS and redirect HTTP requests to HTTPS.
This document provides instructions for setting up WiFi authentication and accounting using FreeRADIUS on CentOS 5. It involves generating digital certificates using OpenSSL, installing and configuring FreeRADIUS, and setting up a wireless access point and client devices to use the RADIUS server for WPA1/2 enterprise authentication via EAP/PEAP/TTLS. Key steps include generating server and client certificates signed by a certificate authority, configuring FreeRADIUS configuration files, adding a RADIUS client for the access point, and setting the access point and client devices to point to the RADIUS IP for authentication.
This document provides instructions for configuring Nginx to serve Guacamole over HTTPS:
1. Install Nginx and enable it as a service. Generate a self-signed SSL certificate.
2. Configure an Nginx virtual host to listen on ports 80 and 443, redirect HTTP to HTTPS, and use the self-signed certificate. The virtual host is configured to proxy connections to the Guacamole server on port 8080.
3. Generate a Diffie-Hellman parameter file and activate the Nginx Guacamole configuration. Verify and restart Nginx to apply the changes.
A talk I gave at the recent Advanced AWS Meeup - this is a detailed guide to how I installed and set up Spinnaker to work with our infrastructure at Stitch Fix. I go over the various problems I ran into and how I solved them. I hope this can be useful for others setting up, or interested in setting up Spinnaker for their purposes.
**Big thanks to Armory for recording the talks! Video for this talk can be found here: https://youtu.be/ywzPblFpIE0 (I'm the second speaker)**
L.A.M.P Installation Note --- CentOS 6.5William Lee
- The document provides installation and configuration instructions for LAMP (Linux, Apache, MySQL, PHP) on a CentOS 6.5 server.
- It details how to install and configure the core LAMP components like Apache 2.2, MySQL 5, and PHP 5 as well as additional components like phpMyAdmin.
- Troubleshooting tips are provided for common Apache and PHP issues along with explanations and solutions.
- Configuration files and their settings are described for optimal performance of the LAMP stack.
Tomcat is a web container, not a web server. It uses the HTTPConnector to act as a web server and handle HTTP requests. To enable SSL/HTTPS in Tomcat, one must:
1. Generate a self-signed certificate using keytool to create a keystore file for secure connections.
2. Configure the server.xml file to enable the SSL connector and specify the keystore file location.
3. Add a security constraint to the application's web.xml file to specify "CONFIDENTIAL" transport guarantee and require HTTPS for resources.
SSL can also be enabled on PHP applications running on XAMPP without additional configuration since XAMPP already includes OpenSSL support. HTTPS requests
This document provides instructions for installing and configuring Apache2 on Ubuntu. It discusses updating system packages, installing Apache2 packages, starting/stopping the Apache2 service, reloading configurations, important configuration files and directories, global configuration attributes like ServerName and Listen directives, the default virtual host configuration in sites-available, virtual host directives and their purposes, defining a virtual host with directives like ServerAdmin and DocumentRoot, enabling and disabling modules and sites, and managing Apache2 modules and sites.
How to install Setup & Configure SSH Jump Server on a Linux boxEzee Login
Ezeelogin is an SSH gateway software solution, that enables enterprises to deploy their own custom SSH jump box in minutes. We empower thousands of enterprises across the globe to securely administrate and manage their Linux server infrastructure. router, switches via SSH to know more, do visit: https://www.ezeelogin.com
How to Fix Duplicate Packages in YUM on CentOS 7VCP Muthukrishna
This document provides steps to resolve duplicate package errors when using YUM on CentOS 7. It involves installing the yum-utils package, using package-cleanup commands to list, count, and clean duplicate packages, and if needed removing any remaining duplicates manually. Running package-cleanup again after should show no more problems.
This document provides instructions for installing and configuring the Gnome desktop environment on CentOS 7. It begins with pre-requisites like ensuring the system is updated. It then checks if Gnome is already installed before using YUM to install the GNOME Desktop group package. Post-installation steps include launching the GUI, configuring the system to use Gnome by default, rebooting, and verifying Gnome loads correctly.
How To Connect to Active Directory User ValidationVCP Muthukrishna
This PowerShell script connects to Active Directory, requests user credentials, and validates whether a user exists by listing their attributes or displaying an error. It first imports the Active Directory module, connects to AD using provided credentials, and checks if a user called "administrator" exists by getting their attributes. If the user does not exist, an error message is displayed. Otherwise, the user attributes are listed before disconnecting from AD.
This document provides instructions for connecting to Active Directory from Windows PowerShell. It includes prerequisites like having AD installed and configuring firewall ports. The script imports the Active Directory module, connects to AD using credentials, and lists attributes of the "administrator" user if connection is successful. When run, the script prompts for username and password and outputs whether connection was successful or not. If connected, it lists attributes of the specified AD user.
This document provides instructions for using a PowerShell script to list files on a remote server. It describes prerequisites like setting the execution policy and provides the PowerShell code to read user input for a drive and directory and list the first five text files from a remote server. The script outputs whether servers are reachable, paths not found, or lists the files to a text file.
This document provides an overview of using PowerShell to list files on a server. It describes prerequisites like ensuring the correct execution policy is set. The main section provides a PowerShell script that prompts the user for a file path and extension. It checks for files with that extension, displays a message if none are found, and otherwise generates an HTML file listing the files and opens it. The document includes examples of the script output whether files are found or not.
This document provides a PowerShell script to check for and delete a file. It begins with an overview and prerequisites. The script first validates that the provided directory and file exist. It then uses the Remove-Item cmdlet to delete the file, and outputs a message confirming deletion. If the directory or file is invalid, it outputs an error message.
Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...VCP Muthukrishna
The document describes troubleshooting an issue where emails were being deferred from a Zimbra mail server due to port 10024 being refused. The potential causes were a failed or stopped amavisd service, an out-of-date ClamAV antivirus package, or a stale amavisd.pid file. The resolutions included restarting the amavisd service, upgrading ClamAV, and removing and updating the amavisd.pid file before restarting Zimbra services.
This document provides instructions for setting up SSH keys on CentOS 7 to enable passwordless login. It describes generating an RSA key pair with ssh-keygen, setting permissions on the private and public key files, and copying the public key to authorized_keys on the server. Running ssh-copy-id copies the public key and allows logging into the server without a password by authenticating with the private key.
Windows PowerShell Basics - How To List PSDrive InfoVCP Muthukrishna
This document provides information on PowerShell drives (PSDrives) and includes a script to retrieve PSDrive information. PSDrives allow access to data stores like the file system, registry, and certificates from within PowerShell. The script outputs a HTML file listing the name, used space, provider, root, and current location for all available PSDrives.
Windows PowerShell Basics – How To Create powershell for loopVCP Muthukrishna
This document discusses using for loops in PowerShell. It provides an example PowerShell script that demonstrates incrementing and decrementing values using for loops. The script clears the host, then runs four for loops: one that increments by 1 from 0 to 5, one that increments by 2 from 0 to 10, one that decrements by 1 from 0 to -5, and one that decrements by 2 from 0 to -10. Each loop displays the current incremental or decremented value and a beep.
How To Construct IF and Else Conditional StatementsVCP Muthukrishna
This document discusses using IF and ELSE conditional statements in PowerShell scripts. It provides code snippets to check for input and return different outputs based on whether input is provided or not. When input is provided, it will write the input and beep at a high pitch. If no input is provided, it will write an error message and beep at a lower pitch. The document also provides background on PowerShell functions and execution policies.
How To Create PowerShell Function Mandatory Parameter and Optional ParameterVCP Muthukrishna
This document discusses PowerShell functions that have mandatory and optional arguments. It provides an example function definition that defines the first argument as optional and the second argument as mandatory. It shows calling the function and passing only the mandatory second argument, which works as expected. It also shows calling the function without any arguments, which causes it to prompt for the mandatory second argument value as required.
How To Create Power Shell Function Mandatory Parameter ValueVCP Muthukrishna
This document discusses PowerShell functions and mandatory arguments. It defines a sample function called MandatoryParameter that takes a mandatory string argument. When invoked without passing a value, it will prompt for the argument. When called with a value, it displays the passed value. The document provides examples of invoking the function with and without arguments to demonstrate PowerShell's handling of mandatory parameters.
This document discusses PowerShell functions and provides an example of creating a simple function called Call_Function_Write_Welcome_Message. The function clears the host, lists function information, prints a purpose message, and outputs the text "Hello - PowerShell Script". To invoke the function, its name is called from the PowerShell CLI or ISE. When run, the function displays its output.
How To Disable IE Enhanced Security Windows PowerShellVCP Muthukrishna
This PowerShell script disables Internet Explorer Enhanced Security by modifying registry values. It checks the registry keys for IE Enhanced Security settings for the Admin and current user profiles. If the keys exist and the configuration is enabled, it sets the registry value to 0 to disable IE Enhanced Security. If the keys are already configured to be disabled, it outputs a message indicating no changes are needed. If the keys don't exist, it displays a message that the registry is not configured.
How To Install and Configure Salt Master on UbuntuVCP Muthukrishna
This document provides instructions on how to install and configure a Salt master on Ubuntu. It includes steps to install the Salt package and PPA repository, create configuration directories, configure the firewall to allow Salt traffic, configure the minion, manage Salt services, accept the minion key on the master, and test the connection by running commands on the minion.
Get-ExecutionPolicy displays the current execution policy for PowerShell scripts on the local machine. The execution policy determines whether scripts can run or must be signed by a trusted publisher. Running Get-ExecutionPolicy without parameters shows the current policy, while Get-ExecutionPolicy -List shows the possible policy options: Restricted, AllSigned, RemoteSigned, and Unrestricted.
This document provides instructions on using a PowerShell script to check if a file exists and delete it. The script prompts the user to enter a file name, uses the Test-Path command to check if the file exists, and will either delete the file or display an error message depending on the result. It also describes the prerequisites of having the correct execution policy set like AllSigned or Unrestricted to allow scripts to run.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
UiPath Community Day Kraków: Devs4Devs ConferenceUiPathCommunity
We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner!
We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too!
Check out our proposed agenda below 👇👇
08:30 ☕ Welcome coffee (30')
09:00 Opening note/ Intro to UiPath Community (10')
Cristina Vidu, Global Manager, Marketing Community @UiPath
Dawid Kot, Digital Transformation Lead @Proservartner
09:10 Cloud migration - Proservartner & DOVISTA case study (30')
Marcin Drozdowski, Automation CoE Manager @DOVISTA
Pawel Kamiński, RPA developer @DOVISTA
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
09:40 From bottlenecks to breakthroughs: Citizen Development in action (25')
Pawel Poplawski, Director, Improvement and Automation @McCormick & Company
Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company
10:05 Next-level bots: API integration in UiPath Studio (30')
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
10:35 ☕ Coffee Break (15')
10:50 Document Understanding with my RPA Companion (45')
Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath
11:35 Power up your Robots: GenAI and GPT in REFramework (45')
Krzysztof Karaszewski, Global RPA Product Manager
12:20 🍕 Lunch Break (1hr)
13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30')
Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance
13:50 Communications Mining - focus on AI capabilities (30')
Thomasz Wierzbicki, Business Analyst @Office Samurai
14:20 Polish MVP panel: Insights on MVP award achievements and career profiling
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
Are you interested in learning about creating an attractive website? Here it is! Take part in the challenge that will broaden your knowledge about creating cool websites! Don't miss this opportunity, only in "Redesign Challenge"!
In this follow-up session on knowledge and prompt engineering, we will explore structured prompting, chain of thought prompting, iterative prompting, prompt optimization, emotional language prompts, and the inclusion of user signals and industry-specific data to enhance LLM performance.
Join EIS Founder & CEO Seth Earley and special guest Nick Usborne, Copywriter, Trainer, and Speaker, as they delve into these methodologies to improve AI-driven knowledge processes for employees and customers alike.
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecJames Anderson
The lecture titled "Automating AppSec" delves into the critical challenges associated with manual application security (AppSec) processes and outlines strategic approaches for incorporating automation to enhance efficiency, accuracy, and scalability. The lecture is structured to highlight the inherent difficulties in traditional AppSec practices, emphasizing the labor-intensive triage of issues, the complexity of identifying responsible owners for security flaws, and the challenges of implementing security checks within CI/CD pipelines. Furthermore, it provides actionable insights on automating these processes to not only mitigate these pains but also to enable a more proactive and scalable security posture within development cycles.
The Pains of Manual AppSec:
This section will explore the time-consuming and error-prone nature of manually triaging security issues, including the difficulty of prioritizing vulnerabilities based on their actual risk to the organization. It will also discuss the challenges in determining ownership for remediation tasks, a process often complicated by cross-functional teams and microservices architectures. Additionally, the inefficiencies of manual checks within CI/CD gates will be examined, highlighting how they can delay deployments and introduce security risks.
Automating CI/CD Gates:
Here, the focus shifts to the automation of security within the CI/CD pipelines. The lecture will cover methods to seamlessly integrate security tools that automatically scan for vulnerabilities as part of the build process, thereby ensuring that security is a core component of the development lifecycle. Strategies for configuring automated gates that can block or flag builds based on the severity of detected issues will be discussed, ensuring that only secure code progresses through the pipeline.
Triaging Issues with Automation:
This segment addresses how automation can be leveraged to intelligently triage and prioritize security issues. It will cover technologies and methodologies for automatically assessing the context and potential impact of vulnerabilities, facilitating quicker and more accurate decision-making. The use of automated alerting and reporting mechanisms to ensure the right stakeholders are informed in a timely manner will also be discussed.
Identifying Ownership Automatically:
Automating the process of identifying who owns the responsibility for fixing specific security issues is critical for efficient remediation. This part of the lecture will explore tools and practices for mapping vulnerabilities to code owners, leveraging version control and project management tools.
Three Tips to Scale the Shift Left Program:
Finally, the lecture will offer three practical tips for organizations looking to scale their Shift Left security programs. These will include recommendations on fostering a security culture within development teams, employing DevSecOps principles to integrate security throughout the development
AC Atlassian Coimbatore Session Slides( 22/06/2024)apoorva2579
This is the combined Sessions of ACE Atlassian Coimbatore event happened on 22nd June 2024
The session order is as follows:
1.AI and future of help desk by Rajesh Shanmugam
2. Harnessing the power of GenAI for your business by Siddharth
3. Fallacies of GenAI by Raju Kandaswamy
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
find out more about the role of autonomous vehicles in facing global challenges
How To Install and Configure Apache SSL on CentOS 7
1. How To Install and Configure Apache SSL on CentOS 7
i | P a g e
Table of Contents
Overview.......................................................................................................................................................1
Applies To......................................................................................................................................................1
Pre-Requisites ...............................................................................................................................................1
HTTPD – Package Install............................................................................................................................1
HTTPD – Service Enable ............................................................................................................................1
HTTPD – Service Status .............................................................................................................................2
Start Service ..............................................................................................................................................2
Configure Firewall.....................................................................................................................................2
Launch Website.........................................................................................................................................3
Install and Configure SSL for Apache ............................................................................................................3
Install Mod_SSL.........................................................................................................................................3
Create Certificate (CSR).............................................................................................................................3
Certificate Request................................................................................................................................4
Configure Apache SSL ...................................................................................................................................5
Generate Private Key and Certificate Files ...............................................................................................5
Validate Private Key and Certificate Files .................................................................................................6
Edit SSL Configuration...............................................................................................................................6
Set DocumentRoot....................................................................................................................................6
Set ServerName ........................................................................................................................................6
Set SSLCertificateFile.................................................................................................................................7
Set SSLCertificateKeyFile...........................................................................................................................7
Validate SSL Configuration........................................................................................................................7
2. How To Install and Configure Apache SSL on CentOS 7
ii | P a g e
Configure Firewall.........................................................................................................................................8
Start Service – HTTPD ...................................................................................................................................8
HTTPD Service Management ....................................................................................................................8
Launch SSL Website ..................................................................................................................................9
General Troubleshooting............................................................................................................................10
Configuration Test...................................................................................................................................10
Testing httpd Configuration – Syntax .................................................................................................10
Testing httpd Configuration – Debug Mode.......................................................................................10
Verify Logs...............................................................................................................................................10
3. How To Install and Configure Apache SSL on CentOS 7
1 | P a g e
Overview
This purpose of this document is to install and configure Apache2 and configure SSL Certificate on CentOS
7 or RHEL 7.
Applies To
RHEL 7, CentOS 7
Pre-Requisites
mod_ssl, install when you want to configure SSL
HTTPD – Package Install
Download and install Package httpd package on the server, install run the command;
yum install -y httpd
HTTPD – Service Enable
Next step is to enable httpd service to automatically start service at OS boot time.
systemctl enable httpd.service
4. How To Install and Configure Apache SSL on CentOS 7
2 | P a g e
HTTPD – Service Status
Next step is to check the status of httpd service, to know the status of service, run the command;
systemctl status httpd.service
Start Service
Next step is to start httpd service, to start run the command;
systemctl start httpd.service
Configure Firewall
Next step is to configure firewall, if the firewall is started. HTTPD service daemon runs on port default port
80, which is not opened as a standard, in order open the port run the command and reload firewall.
firewall-cmd --permanent --zone=public --add-service=http
firewall-cmd --reload
5. How To Install and Configure Apache SSL on CentOS 7
3 | P a g e
Launch Website
After configuring the firewall, launch the website from the browser.
Install and Configure SSL for Apache
In order to configure apache (httpd) webserver with SSL Certificate; you have to install package and
configure it accordingly. In this guide we will install self-sign SSL Certificate.
Install Mod_SSL
Next step is to configure SSL Certificate on the server. To install the mod_ssl package, run the command;
yum install mod_ssl -y
Create Certificate (CSR)
Before you create the certificate, SSL store folder has to be created, as shown below.
6. How To Install and Configure Apache SSL on CentOS 7
4 | P a g e
Certificate Request
After mod_ssl package installation, you need to generate a new certificate file for the webserver.
openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/httpd/ssl/vcptest-apache.key -out
/etc/httpd/ssl/vcptest-apache.crt
Attribute Purpose
req Certificate Request
-x509 PKCS#10 X.509 Certificate Signing Request (CSR) Management
-nodes This tells OpenSSL to skip the option to secure our certificate with a passphrase.
-days Certificate validity in days
-newkey If we want to generate a new certificate and a new key at the same time.
-keyout Where to store the generated private key file that would be created.
-out Where to store the generated Certificate file that would be created.
Note: We need Apache (httpd daemon) to be able to read the file, without user intervention, when the
server starts up. If passphrase is set, it would prevent this from happening, since we would have
to enter passphrase for every httpd daemon restart.
7. How To Install and Configure Apache SSL on CentOS 7
5 | P a g e
Organization Information
When you request for a new certificate below information has to be included, below is an example.
Option Purpose Example
Common Name The fully qualified domain name for your
web server. This must be an exact match.
If you intend to secure the URL
https://vcptest.effonetech.com,
then your CSR’s common name
must be vcptest.effonetech.com.
Organization Name Do not abbreviate your organization
name. (Legal Name)
effonetech.com
Organizational Unit Section of the organization IT
City or Locality City where organization is legally located Bengaluru
State or Province The state or province where organization
is legally located. Abbreviation should not
be used.
Karnataka
Country The two-letter abbreviation of country IN
Configure Apache SSL
Generate Private Key and Certificate Files
To generate the new private key and certificate run the command;
openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/httpd/ssl/vcptest-apache.key -out
/etc/httpd/ssl/vcptest-apache.crt
Out Filename Purpose
vcptest-apache.key Private Key File (-keyout)
vcptest-apache.crt Certificate File (-out)
8. How To Install and Configure Apache SSL on CentOS 7
6 | P a g e
Validate Private Key and Certificate Files
To ensure the private key and the certificate is generated in the designate directory list and check files.
Edit SSL Configuration
After the Certificate and private key file are generated, next step is to edit the SSL configuration file of the
webserver;
ls /etc/httpd/conf.d/ssl.conf
vi /etc/httpd/conf.d/ssl.conf
Set DocumentRoot
Find and set the DocumentRoot attribute value to “/var/www/html” folder, which is also the default.
Set ServerName
Find and set the ServerName attribute value to “<DomainName>:443”, typically webserver’s FQDN and
bind port is default 443.
9. How To Install and Configure Apache SSL on CentOS 7
7 | P a g e
Set SSLCertificateFile
Find and set the SSLCertificateFile attribute value to “/etc/httpd/ssl/vcptest-apache.crt”.
Set SSLCertificateKeyFile
Find and set the SSLCertificateKeyFile attribute value to “/etc/httpd/ssl/vcptest-apache.key”.
Validate SSL Configuration
After making the necessary changes to the SSL configuration file, validate them by running the command;
cat /etc/httpd/conf.d/ssl.conf | grep ^DocumentRoot
cat /etc/httpd/conf.d/ssl.conf | grep ^ServerName
cat /etc/httpd/conf.d/ssl.conf | grep ^SSLCertificateFile
cat /etc/httpd/conf.d/ssl.conf | grep ^SSLCertificateKeyFile
10. How To Install and Configure Apache SSL on CentOS 7
8 | P a g e
Configure Firewall
Once the configuration of httpd service is completed, next step is to configure firewall, wherein we will
open https service port and reload the firewall rules.
After configuring the firewall, when the firewall rules are listed “https” service should be listed as shown
below.
firewall-cmd --permanent --zone=public --add-service=https
firewall-cmd --reload
firewall-cmd --list-service
Start Service – HTTPD
After configuring the firewall and reloading it, next step is to restart the service. To restart the run the
command; Other service httpd service management commands are also listed below.
systemctl restart httpd or systemctl stop httpd; systemctl start httpd
HTTPD Service Management
Service Control Task Purpose
systemctl status httpd Display the current status of httpd service
systemctl start httpd Start httpd service
systemctl stop httpd Stop httpd service
systemctl disable httpd Disable httpd service in multi-user target
systemctl enable httpd Enable httpd service in multi-user target
systemctl restart httpd Restart httpd service
11. How To Install and Configure Apache SSL on CentOS 7
9 | P a g e
Launch SSL Website
After reloading the firewall and restarting the service and service status is shown as “Running”; Launch
the webserver in browser.
12. How To Install and Configure Apache SSL on CentOS 7
10 | P a g e
General Troubleshooting
Configuration Test
One more the first and foremost troubleshooting method for httpd webserver is to check the
configuration file, which can be done with “apachectl -t” command.
Testing httpd Configuration – Syntax
To validate configuration for syntax errors run the command;
apachectl -t
Testing httpd Configuration – Debug Mode
To validate configuration for syntax errors in debug mode run the command, you change the debug level
according to table mentioned below.
apachectl -t -e <Debug Log Level>
Test apache configuration and enable debug mode with “Info”
Debug Log Level Purpose
debug Run test in debug mode and show all the messages related to the httpd service
warn Run test and show only warning messages related to the httpd service
crit Run test and show critical messages related to the httpd service
error Run test and show error messages related to the httpd service
info Run test and show informative messages related to the httpd service
Verify Logs
Second troubleshooting method is checking the different log files, that are located in the folder
“/var/log/httpd/”.
Log File Name Purpose
access_log All access related logs are stored into this file
error_log All errors related logs are stored into this file
ssl_access_log All SSL Access related logs are stored into this file
ssl_error_log All SSL access related error logs are stored into this file
ssl_request_log All SSL access related each request log are stored into this file