Configuring a Persistent Static IP on RHEL/CentOS/AlmaLinux with nmcli
- Best Practices & Patterns, Linux Basics, Networking, Security & Hardening, System Administration
- February 6, 2015
It can be deeply frustrating when a Linux system fails to boot properly and drops into a grub rescue> prompt. This usually indicates a problem with the GRUB (GRand Unified Bootloader), the software responsible for booting the OS. This guide will help you understand why this happens and how to recover your system—even if you’re using RHEL 7, 8, 9, or 10
READ MOREIn this step-by-step guide, we will configure HTPasswd authentication on an existing OpenShift 4.15+ single-node cluster. We’ll create user accounts, update the cluster’s OAuth settings to use HTPasswd, and verify access via both the CLI and the web console. We’ll also cover how to assign admin privileges to a new user and remove the default kubeadmin user for security.
READ MOREThis guide will walk you through installing Docker on Red Hat Enterprise Linux 9 (or CentOS/Rocky/AlmaLinux 9), setting up n8n in a Docker container, and configuring SSL/HTTPS for secure access. We’ll use step-by-step instructions with explanations, sample commands, and outputs.
READ MOREBy following these practices and understanding the components, you will have a robust setup where Linux and Active Directory work together for seamless user authentication. The key is to verify each piece (DNS, Kerberos, SSSD, PAM) and use the tools available (logs, realm commands, sssctl, etc.) to diagnose issues. With proper configuration, domain users can log into Linux systems using their AD accounts, and administrators can centrally manage credentials and policies in AD while maintaining Linux-specific settings via SSSD.
READ MORERHEL and CentOS provide powerful command-line tools for disk and storage management. To get started, identify existing disks and partitions using commands like lsblk (list block devices) or fdisk -l. For example, lsblk displays all disks and partitions in a clear tree view. The fdisk -l command reports disk sizes and partition tables; e.g., it might show a 30 GiB /dev/sda disk with /dev/sda2 marked as an LVM partition.
READ MORESELinux (Security-Enhanced Linux) is a powerful security feature of Red Hat Enterprise Linux and CentOS. It provides a mechanism to enforce mandatory access control policies. However, SELinux can occasionally block legitimate activities if misconfigured. Here’s how you can investigate and resolve SELinux issues effectively.
READ MORE