Skip to main content

Posts

HOW TO CHANGE A LINE IN A FILE AND RESTART A SERVICE

HOW TO CHANGE A LINE IN A FILE IN AND RESTART A SERVICE --- - name: modify el /etc/ssh/sshd_config to change  root login   hosts: LINUX_SERVERS   tasks:     - name:  /etc/ssh/sshd_config, line PermitRootLogin       lineinfile:         path: /etc/ssh/sshd_config         regexp: 'PermitRootLogin'         line: 'PermitRootLogin no'     - name: restart sshd daemon       service: name=sshd state=restarted     - name: status sshd daemon       service: name=sshd state=restarted

HOW TO UPDATE A PACKAGE LIST WITH ANSIBLE

HOW TO UPDATE A PACKAGE LIST WITH ANSIBLE  --- - name: Update package list   hosts: test1 test2 test3 test4 test5   tasks:     - name: Update dhcp package       yum:         name: dhcp         state: latest         update_only: yes     - name: Update dhcp dhcp-common       yum:         name: dhcp-common         state: latest         update_only: yes     - name: Update dhcp dhcp-libs       yum:         name: dhcp-libs         state: latest         update_only: yes     - name: Update dhcp dhclient       yum:         name: dhclient         state: latest         update_only: yes

HOW TO SET PASSWORD WITH ANSIBLE MULTIPLE HOST

HOW TO SET PASSWORD WITH ANSIBLE  --- - name: Set Password   hosts: test1 test2 test2   become: yes   ignore_errors: yes   tasks:       - name: Change root password         user:           name: root           password: $dff2878927319283198439843hjsddhdkjch823787431213413dwfwfvwgwwq.           update_password: always (In password: Encrypted Password  )

ANSIBLE

ANSIBLE  We are introducing in our blog ANSIBLE in order to help to the community. Create a Inventory File with the server list  called "TEST" $cat inventory [TEST] server1 server2 server3 server4 server5 And now we can use our ansible scripts ANSIBLE COPY A FILE TO SERVERS LIST IN THE INVENTORY --- - name: upload a file to server list   hosts: TEST   tasks:     - name: copy a file       copy -a "src=/home/user1/ansible/p25739822_81617613_SOLARIS64.zip dest=/tmp"   ANSIBLE COPY A FILE AND UNCOMPRESS A FILE    --- - name: upload a file to a server list a uncompress the file   hosts: server1 server3 server4   <----- You can use the server list with spaces   tasks:     - name: cambia directorio y descomprime       unarchive: src=/tmp/p25739822_81617613_SOLARIS64.zip dest=/tmp/  copy=no ANSIBLE CHANGE A LINE IN FILE (IN THIS CASE /etc/hosts file)    --- - name: modify line   hosts: TEST   tasks:     - name: Replace the

How to correct dbca error after OS migration for library missing

After migrating Oracle 10 installed in Solaris 8, we have the following issue when we execute the command dbca in Solaris 11 testing{oracle10}# cd /data/oracle10/cfgtoollogs testing{oracle10}# ./dbca Exception in thread "main" test{oracle10}42# Checking the trace log file we found that we have a missing libray "libdps.so.5 testing{oracle10}48# more trace.log java.lang.UnsatisfiedLinkError: /d2/ora10/jdk/jre/lib/sparc/motif21/libmawt.so: ld.so.1: java: fatal: libdps.so.5: open failed: No such file or directory         at java.lang.ClassLoader$NativeLibrary.load(Native Method)         at java.lang.ClassLoader.loadLibrary0(ClassLoader.java:1586)         at java.lang.ClassLoader.loadLibrary(ClassLoader.java:1482)         at java.lang.Runtime.load0(Runtime.java:737)         at java.lang.System.load(System.java:811)         at java.lang.ClassLoader$NativeLibrary.load(Native Method)         at java.lang.ClassLoader.loadLibrary0(ClassLoader.ja

HOW TO UPDATE NTP to 4.2.8.9 HACK VULNERABILITY IN SOLARIS 11

Vulnerability in NTP Solaris 11, and you can correct in the following form Network Time Protocol Daemon (ntpd) read_mru_list() Remote DoS [-/+] Synopsis The remote NTP server is affected by a denial of service vulnerability. Description The remote NTP server is affected by a denial of service vulnerability due to improper validation of mrulist queries. An unauthenticated, remote attacker can exploit this, via a specially crafted NTP mrulist query packet, to terminate the ntpd process. Note that the NTP server is reportedly affected by additional vulnerabilities as well; however, Nessus has not tested for these. Solution Upgrade to NTP version 4.2.8p9 or later. Risk Factor High How to fix the issue, you find the steps in order to correct this problem Set in FALSE the Facet Values in order to update and prevent in any other update that version does not change, Now if you want to change them Set in TRUE # pkg change-facet facet.version-loc

HOW TO INCREASE SPACE IN A VOLUME GROUP AND LOGICAL VOLUME

HOW TO INCREASE SPACE IN A VOLUME GROUP AND LOGICAL VOLUME 1.-)If you are using multipath, you can run the command below in order to know what are the devices mapped #multipath -ll mpathd (360060e80139cfc0050209cfc00000802) dm-2 STORAGE size=650G features='1 queue_if_no_path' hwhandler='0' wp=rw `-+- policy='round-robin 0' prio=1 status=active   |- 11:0:0:2 sdd 8:48  active ready running   `- 12:0:0:2 sdg 8:96  active ready running mpathc (360060e80139cfc0050209cfc00000801) dm-4 STORAGE size=500G features='1 queue_if_no_path' hwhandler='0' wp=rw `-+- policy='round-robin 0' prio=1 status=active   |- 11:0:0:1 sdc 8:32  active ready running   `- 12:0:0:1 sdf 8:80  active ready running mpathb (360060e80139cfc0050209cfc00000800) dm-3 STORAGE size=400G features='1 queue_if_no_path' hwhandler='0' wp=rw `-+- policy='round-robin 0' prio=1 status=active   |- 11:0:0:0 sdb 8:16  active r