Thursday, April 18
Shadow

Author: Boredadmin

How to set up confluence with MySQL database. Part 2

How to set up confluence with MySQL database. Part 2

General, Linux
Part 2 of 2 If you haven't found part 1, you can access it from here. In part 1 we installed MySQL, created a confluence database and user, and granted all the required permission to the user. Installed open JDK and configure or set up JAVA_HOME. Downloaded the Confluence file, created the required directory, extracted the Confluence file, and moved to the created directory. In this part, we will configure confluence and connect or set up with MySQL database. In this step, we will configure the confluence home directory by editing the confluence.init.properties file. which is located in the /opt/confluence/confluence/WEB-INF/classes/ directory root@conf:~# nano /opt/confluence/confluence/WEB-INF/classes/confluence-init.properties uncomment the confluence.home se...
How to set up Confluence with MySQL database. Part 1

How to set up Confluence with MySQL database. Part 1

General, Linux
Part 1 of 2 Confluence supports most of the databases. In this post, we will set up confluence with MySQL database in a Linux environment. I am using ubuntu 20.04 OS. In the first step, we will install the MySQL database. apt install mysql-server and press y. root@conf:~# apt install mysql-serverReading package lists… DoneBuilding dependency treeReading state information… DoneThe following additional packages will be installed:libcgi-fast-perl libcgi-pm-perl libencode-locale-perl libevent-core-2.1-7 libevent-pthreads-2.1-7 libfcgi-perllibhtml-parser-perl libhtml-tagset-perl libhtml-template-perl libhttp-date-perl libhttp-message-perl libio-html-perlliblwp-mediatypes-perl libmecab2 libtimedate-perl liburi-perl mecab-ipadic mecab-ipadic-utf8 mecab-utilsmysql-client-8.0 mysql-clien...
Let’s Encrypt SSL Certificate for IIS.

Let’s Encrypt SSL Certificate for IIS.

Windows
How to install let's encrypt free SSL certificate on windows IIS? Security in information technology is a big concern today. Especially, where the end-users are using the application or website (username, password or personal data, etc.. ) need to be encrypted to meet the data protection requirements. IIS is one of the most used web servers to host such applications and websites. Creating the websites in windows server IIS is easy (HTTP or HTTPS). In this article, we will install let's encrypt free SSL certificate on IIS. In the first step, Make sure that the site is publicly reachable. In the second step, Check and verify the IIS binding in the windows IIS manager. For the start, we will assign self-signed or system-generated certificates in the binding. Now,...
How to redirect HTTP requests to HTTPS in IIS?

How to redirect HTTP requests to HTTPS in IIS?

Windows
How to redirect HTTP requests to HTTPS in IIS? Security in information technology is a big concern today. Especially, where the end-users are using the application or website (username, password or personal data, etc.. ) need to be encrypted to meet the data protection requirements. IIS is one of the most used web servers to host such applications and websites. Creating the websites in windows server IIS is easy (HTTP or HTTPS). But, to redirect to HTTPS even users enter the HTTP address is a little bit tricky. This post is a step-by-step guide to redirect HTTP requests to HTTPS automatically or forcefully in windows server IIS. Download the URL Rewrite module or extension from the link below and install.https://www.iis.net/downloads/microsoft/url-rewrite Open the Internet inf...
Assign Let’s Encrypt Certificate to Asterisk (Core) SIP TLS.

Assign Let’s Encrypt Certificate to Asterisk (Core) SIP TLS.

Linux
How to Install let's encrypt certificate on asterisk (core) and assign to the SIP TLS? Asterisk is an open-source communication tool kit. We can build voice, video, and text applications with it. Asterisk supports several standard VoIP (voice-over IP) protocols, including the SIP (Session Initiation Protocol), MGCP (Media Gateway Control Protocol), and H. 323. It supports most SIP telephones, acting both as registrar and back-to-back user agents. Let's Encrypt is a free SSL certificate provider. We can use this certificate for the SIP TLS encryption in the asterisk. We need to install certbot in the system. RHEL or CentOS # yum install epel-release# yum install certbot python2-certbot-apache mod_ssl Ubuntu # add-apt-repository ppa:certbot/certbot# apt get-update# apt-ge...
SharePoint Pre-requisites Download Error.

SharePoint Pre-requisites Download Error.

Windows
Pre-requisites Download Error in SharePoint. While installing the SharePoint you may have encountered the error that, the SharePoint pre-requisites installer tool was unable to download the components. Because the Windows Server OS is configured to block the download application or any other components from the internet by default. The blocking feature is called IE enhanced security. To fix this issue, Open the server manager, you can access the server manager via typing the server manager in the search windows in the server. Select local server in the left panel. Find the IE enhanced security and check them off on both profiles administrators, and users. If the profile is ON position, you won't be able to download the required components of the SharePoint using the pre-requisites t...
Application server role, Web server (IIS) Role Configuration Error.

Application server role, Web server (IIS) Role Configuration Error.

Windows
How to fix application server role, web server (IIS) configuration error in SharePoint? You may have been encountered the application server role, web server (IIS) configuration error, and unable to download the components while installing the SharePoint. The exact error is "The tool was unable to install application server role, web server (IIS) role". This error occurred when you try to install SharePoint 2013 on windows server 2012 or a later version. To fix this issue, you need to follow few steps or prepare OS before starting the installation of SharePoint. First step, turn off the IE enhanced security configuration. Open the server manager, you can access the server manager via typing the server manager in the search windows in the server. Select local server in the le...
How to resize the root partition in centos?

How to resize the root partition in centos?

Linux
How to resize or extend the root partition in centos? All the Linux file systems are stored in the root partition. Sometimes we feel the provided storage is enough for the system but eventually, we need more storage at the root. So, In this post, I will share the steps to resize or extend the root partition. This method is also applied to RHEL. When we extend the storage in the system. We need to find out that how much free storage we have left. # parted(parted) print free There is a 10.7GB free space/storage. we will add this free storage to the root partition. Press q to exit. Next step, we need to run fdisk tool or command to manage disk or volumes. Run fdisk /dev/sda to access the disk management. press p to print or show the details of the disk. In the p...
Join a CentOS to Active Directory domain using LDAP.

Join a CentOS to Active Directory domain using LDAP.

Linux
How to configure windows active directory LDAP in CentOS? In most organizations or company's, users and groups are created and managed on the Windows Active Directory Domain controller. In short form Active Directory. What if we have some Linux servers and client's systems and need to authenticate using windows credentials? In this post, we will discuss integrating the Linux (centos) system or machine with windows AD and log in to those systems with AD credentials using LDAP protocol. 1- Prepare the Linux System In CentOS, the default system name is localhost.localdomain. Change it to something meaningful. Ex. centos7. #hostnamectl set-hostname centos7or#nano /etc/hostname Make sure that, the active directory is reachable. Ping the domain name and response from AD must b...
OPNSense OpenVPN configuration and authenticate the AD (Active Directory) users using LDAP. Part 2.

OPNSense OpenVPN configuration and authenticate the AD (Active Directory) users using LDAP. Part 2.

Network, Windows
OPNSense OpenVPN configuration and authenticate the AD (Active Directory) users using LDAP. Part 2. OPNSense OpenVPN configuration and authenticate the AD (Active Directory) users using LDAP. Part 1. 3- Configure Internal CA (Certificate Authority) in OPNSense, and Issue or create the certificate. In this step, we will create the Internal CA (Certificate Authority) and create the certificate for the VPN server and clients.Login to the OPNSense with respective credentials. Select System. Under the system, select the Trust and Authorities. And click on the ADD button on the right side of the page. Provide the Descriptive name for the internal CA. Method must be Create an internal Certificate Authority. You can leave the default setting for the Key Type, Length, and Algorit...