Configuring a Persistent Static IP on RHEL/CentOS/AlmaLinux with nmcli
- Best Practices & Patterns, Linux Basics, Networking, Security & Hardening, System Administration
- February 6, 2015
In this step-by-step guide, we will configure HTPasswd authentication on an existing OpenShift 4.15+ single-node cluster. We’ll create user accounts, update the cluster’s OAuth settings to use HTPasswd, and verify access via both the CLI and the web console. We’ll also cover how to assign admin privileges to a new user and remove the default kubeadmin user for security.
READ MOREBy following these practices and understanding the components, you will have a robust setup where Linux and Active Directory work together for seamless user authentication. The key is to verify each piece (DNS, Kerberos, SSSD, PAM) and use the tools available (logs, realm commands, sssctl, etc.) to diagnose issues. With proper configuration, domain users can log into Linux systems using their AD accounts, and administrators can centrally manage credentials and policies in AD while maintaining Linux-specific settings via SSSD.
READ MOREShodan is a powerful search engine designed to find internet-connected devices across the globe. It goes beyond conventional search engines by enabling the discovery of specific hardware and software configurations. This guide covers installing and effectively using Shodan’s Command-Line Interface (CLI) on Linux systems including Debian-based (like Ubuntu) and CentOS/RHEL.
READ MORESELinux (Security-Enhanced Linux) is a powerful security feature of Red Hat Enterprise Linux and CentOS. It provides a mechanism to enforce mandatory access control policies. However, SELinux can occasionally block legitimate activities if misconfigured. Here’s how you can investigate and resolve SELinux issues effectively.
READ MOREWhen a Linux system refuses to boot, it can be daunting – but a methodical approach will often get you back up and running. This guide provides step-by-step troubleshooting for common boot issues on Ubuntu, CentOS, and RHEL, suitable for intermediate Linux users. We’ll cover preliminary checks (like hardware and BIOS/UEFI settings), using recovery
READ MOREThis guide introduces key SELinux concepts and offers practical steps for managing SELinux effectively in a Linux environment.
READ MORE