CentOS

How to Install Oracle 19c Client on CIS Hardened Red Hat Image

The Center for Internet Security (CIS) produces many security-hardened images that embed several security features into a standardized build. Using such features introduces a few gotchas, especially when installing any Oracle product. This procedure will explain preparing a CIS hardened image to install in the Oracle database client using X11...

How to build an OpenStack Host

OpenStack is a fantastic open source cloud computing platform that allows you to create your own scalable infrastructure-as-as-service (IAAS) solution. This is a guide of how to install the OpenStack virtual cloud platform on the CentOS7 Operating system. It will work on Red Hat (RHEL), SUSE and Ubuntu. I will...

How to configure SSL HTTPS in Grafana

Here is a quick guide to configuring a self-signed SSL certificate in Grafana, allowing you to browse to: https://your_server:3000 What is Grafana? If you need monitoring dashboards, using Grafana and Prometheus will give you a great solution. Check out https://grafana.com and https://prometheus.io to start your Journey. Grafana SSL SSL is...

RHCSA: Configure NTP

Time is incredibly important to a server, especially in production. Accurate timing is essential for logging & auditing. Some cloud integration tools will not work if the time is out of sync NTP (Network Time Protocol) NTP keeps servers synchronized with the correct time. NTP can use either network-based servers,...

RHCSA: Managing Users & Groups

Managing Users Getting relevant user information can be done in a few different ways. the id command the getent command Manually looking at /etc/passwd, /etc/shadow and /etc/group How to change User Information The easiest way to change user information is by using the usermod command. c – Modify the user’s...

RHCSA: Red Hat Permissions

Here is part 3 of the learning Red Hat sessions. This is an overview of everything permissions based. RHCSA MiniSeries Part 1 – How to use Grep and Regular Expressions (RegEx) Part 2 – How to manipulate files in RedHat Part 3 – Red Hat Permissions Part 4 – How...