RHEL/CentOS/Oracle 8 To remove all but the last 2 kernels you can run:# dnf remove –oldinstallonly –setopt installonly_limit=2 kernel This is a handy reference page has much more detail on managing older kernels that may be causing positives on your vulnerability scans:https://www.golinuxcloud.com/remove-old-kernels-rhel-centos-8/
I used this article, except that I used the vmkfstools -C vmfs6 -S BootDS command with the existing partition :3 (type vmfs) https://darkglade.com/2019/07/05/building-a-datastore-on-your-esxi-boot-usb/ Also, how to license: https://my.vmware.com/group/vmware/evalcenter?p=free-esxi6 Permanently Setting The Hostname hostnamectl set-hostname
In the previous versions of this script you’ve had to leave the backup user password in the script, however MySQL 5.5 and above come with mysql_config_editor which allows you to store connection details in an ancryptedl file (~/.mylogin.cnf) which mysql/mysqldump/mysqladmin can use with the “–login-path=” option. For basic usage run the following, the –password prompts … [Read more…]
So you’ve decided that you don’t want to support Microsoft (although you’re happy to support whatever company MADE your computer… go figure!) and want to ditch Windows. As a general rule, Linux assumes that you are willing to document yourself: the more you do, the more freedom and benefits you will have. Of course Linux … [Read more…]
Ok, so if you’re using Google Authenticator to protect logins on servers or just for your own Google mail / apps login you may come across the situation where you want it on more than one device. For example I’ve an Android phone and a tablet, and sometimes the phone is like really far…. like … [Read more…]
How to be a Linux sys-admin in one easy lesson, just memorise these phrases and use at random No chance. You’ll not get that today Kill All Developers Do you have a ticket for that? Simple!
There are many times where it would be preferable to authenticate to a server without having to enter a password. Basically any time you want to transfer things between servers with scripts you’ll need to be able to authenticate as a valid user. The best way to do this is with SSH keypairs. In this … [Read more…]