New Video Applications Will Represent Majority of Edge Traffic by 2020, Survey Finds

In an effort to identify early edge applications, we recently partnered with IHS Markit to interview edge thought leaders representing major telcos, manufacturers, MSOs, equipment vendors, and chip vendors that hail from open source, startups, and large corporations from all over the globe. The survey revealed that edge application deployments are still young but they will require new innovation and investment requiring open source.

The research investigated not only which applications will run on the edge, but also deployment timing, revenue potential and existing and expected barriers and difficulties of deployment. Presented onsite at ONS Europe by IHS Markit analyst Michael Howard, the results represent an early look at where organizations are headed in their edge application journeys.

Key findings which were presented onstage at ONS Europe by IHS analyst Michael Howard, indicate:

Video and other big-bandwidth applications and connected things that move drive top services, expected revenue.

92 percent of respondents cite video (which includes 360 video and venue) as the top edge application, with even more deployments planned long-term; and video is expected to represent 82 percent of edge traffic by 2020. Autonomous vehicles, Augmented Reality/Virtual Reality (AR/VR), Industrial Internet of Things (IIOT) and Gaming follow video as top services driving edge applications.

Deployment timelines for Edge applications depend on cost and technology advancement.

Not surprisingly, early edge deployments will come as extensions to existing technology, such as IIOT, IOT, surveillance, gaming and smart cities. Longer-term deployments, however, will require additional technological innovation, inventions and/or widespread investments as even a single edge compute location is complex. To meet these requirements, ecosystems will need to collaboratively leverage open source and open standards among business partners to address many of these concerns.

Top barriers to edge application deployments include costs and technology

Given the current interest in edge, it’s not a surprise that many apps go into early deployment; however, most of these early deployments experience only limited or contained rollout. To get to full employment will take years and much investment in many areas including development of new software, and how to manage, monitor, operate and controls from hundreds to tens of thousands of edge locations.

In sum, the IHS research shows that while edge applications are top of mind among networking providers across sectors and there are already many edge applications in limited or contained deployments there is still much technological progress to be made before full deployments are seen. Still, interest is high and many organizations will be looking to initially justify deployments by cost savings, with plans for more revenue-generating applications taking the lead once edge compute is deployed. Technical advancements and organizational complexities need to be solved before edge applications can be deployed, with open source and open standards expected to play a strong role in collaborative efforts to accelerate deployments at the edge.

We look forward to participating in industry efforts to accelerate edge application development and deployments over time, helping to shape tomorrow’s networks and the way we consume information. Additional details on this research study, via Michael Howard’s slide presentation, will be available in the coming weeks.

Source

Debian Linux 9.4 released and here is how to upgrade it

The Debian GNU/Linux project has released an updated version of its stable Linux distribution Debian 9 (“stretch”). You must upgrade to get corrections for security problem as this version made a few adjustments for the severe issue found in Debian version 9.3. Debian is a Unix-like (Linux distro) operating system and a distribution of Free Software. It is mainly maintained and updated through the work of many users who volunteer their time and effort. The Debian Project was first announced in 1993 by Ian Murdock.

More about Debian Linux 9.4 released

From the release note:

Please note that the point release does not constitute a new version of Debian 9 but only updates some of the packages included. There is no need to throw away old stretch media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won’t have to update many packages, and most such updates are included in the point release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian’s many HTTP mirrors.

How to upgrade Debian 9 from version 9.3 to 9.4

The procedure is as follows. First, note down the current version:

$ lsb_release -a
$ uname -mrs Sample outputs:

No LSB modules are available.
Distributor ID: Debian
Description: Debian GNU/Linux 9.3 (stretch)
Release: 9.3
Codename: stretch

Upgrade the system

Type the following apt-get command/apt command to upgrade your system:

$ sudo apt-get update
$ sudo apt-get dist-upgradeDebian Linux 9.4 released

Finally reboot the Linux system:
$ sudo reboot

Verification

Verify that upgrade went smoothly:

$ uname -mrs
$ lsb_release -a
$ dmesg | egrep -i ‘err|warn|critical’
$ sudo tail -f /var/log/myappDebian version 9.4 running on my laptop

The installer has been updated to include the fixes incorporated into stable by the point release. You can download updated ISO for full installation too. This stable update added important package corrections and security enhancements to the system. Happy upgrades!

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.

Source

Linux System Logs and the Syslog Standard

Most Popular

Recent Linux Articles

Topics

Arch Linux
careers
CentOS
cheat sheet
Cloud
Command Line
Debian
Desktop
Fedora
File System
FTP
Gentoo
Installation
jobs
Linux
Linux Mint
Mageia
MySQL
Nginx
OpenSuse
Programming
Python
RedHat
SCP
Server
Shell Scripting
Slackware
SSH
text editor
Ubuntu
Vagrant
Video
vim
VirtualBox
Web Hosting
Windows

Linux Cheat Sheet Download

Enter your email address below to download this Linux command line cheat sheet in an easy-to-read and ready-to-print format.

Source

LMDE 3 “Cindy” Cinnamon released! – The Linux Mint Blog

The team is proud to announce the release of LMDE 3 “Cindy” Cinnamon Edition.

LMDE 3 Cindy

LMDE is a Linux Mint project and it stands for “Linux Mint Debian Edition”. Its main goal is for the Linux Mint team to see how viable our distribution would be and how much work would be necessary if Ubuntu was ever to disappear. LMDE aims to be as similar as possible to Linux Mint, but without using Ubuntu. The package base is provided by Debian instead.

There are no point releases in LMDE. Other than bug fixes and security fixes Debian base packages stay the same, but Mint and desktop components are updated continuously. When ready, newly developed features get directly into LMDE, whereas they are staged for inclusion on the next upcoming Linux Mint point release.

Important info:

The release notes provide important information about known issues, as well as explanations, workarounds and solutions.

To read the release notes, please visit:

Release Notes for LMDE 3

System requirements:

  • 1GB RAM (2GB recommended for a comfortable usage).
  • 15GB of disk space (20GB recommended).
  • 1024×768 resolution (on lower resolutions, press ALT to drag windows with the mouse if they don’t fit in the screen).

Notes:

  • The 64-bit ISO can boot with BIOS or UEFI.
  • The 32-bit ISO can only boot with BIOS.
  • The 64-bit ISO is recommended for all modern computers (Almost all computers sold since 2007 are equipped with 64-bit processors).

Upgrade instructions:

Announcements will be made shortly with instructions on how to upgrade from LMDE 2.

If you are running the BETA, perform a system snapshot and use the Update Manager to apply available updates.

Download links:

Here are the download links for the 64-bit ISO:

A 32-bit ISO image is also available at https://www.linuxmint.com/download_all.php.

Integrity and authenticity checks:

Once you have downloaded an image, please verify its integrity and authenticity.

Anyone can produce fake ISO images, it is your responsibility to check you are downloading the official ones.

Enjoy!

We look forward to receiving your feedback. Thank you for using Linux Mint and have a lot of fun with this new release!

Post navigation

Source

How to Disable Root SSH Login on Linux ?

One of the biggest security holes you could open on your server is to allow directly

logging in as root through ssh, because any cracker can attempt to brute force

your root password and potentially get access to your system if they can figure out your password.

It’s much better to have a separate account that you regularly use and simply

sudo to root when necessary. Before we begin, you should make sure that

you have a regular user account and that you can su or sudo to root from it.

To fix this problem, we’ll need to edit the sshd_config file, which is the main configuration

file for the sshd service. The location will sometimes be different, but it’s usually in /etc/ssh/.

Open the file up while logged on as root.

$ vi /etc/ssh/sshd_config

Find this section in the file, containing the line with “PermitRootLogin” in it.

#LoginGraceTime 5m
#PermitRootLogin no
#StrictModes yes
#MaxAuthTries 6

Make the line look like this to disable logging in through ssh as root. Uncomment that line

PermitRootLogin no

Now you’ll need to restart the sshd service:

/etc/init.d/sshd restart

Now nobody can brute force your root login, at least.

Source

OWASP Security Shepherd – Failure To Restrict Access Solution – LSB – ls /blog

Am I Vulnerable To ‘Failure to Restrict URL Access’?

The best way to find out if an application has failed to properly restrict URL access is to verify every page. Consider for each page, is the page supposed to be public or private. If a private page:

  1. Is authentication required to access that page?
  2. Is it supposed to be accessible to ANY authenticated user? If not, is an authorization check made to ensure the user has permission to access that page?

External security mechanisms frequently provide authentication and authorization checks for page access. Verify they are properly configured for every page. If code level protection is used, verify that code level protection is in place for every required page. Penetration testing can also verify whether proper protection is in place.

Hyperledger Fabric Fundamentals (LFD271) $299

With that in mind let’s tackle the next Security Shepherd challenge – Failure To Restrict Access.FTRA1

Above is the screen we are presented with on Security Shepherd. It’s all straight forward and what we notice straight away is that the words “web page” is highlighted. When we click on it the website does nothing but it still looks like a link. We will need the developer tools in Chrome to look at the code behind it. Right click on the highlighted words and choose Inspect. This will inspect that elements HTML.

FTRA3

Now we can see the code a bit clearer. Notice the div 2 lines under the web page text, the style=”display: none”. This is telling the web page not to display that element. Let’s change the text shall we?

FTRA4

Instead of style=”display: none” we change it to style=”display: text” this pops onto the screen what the developer did not want us to see. FTRA5

We have access to the Admin page now, this is where the key to the round resides. Click on the link and collect the key.

$299 REGISTERS YOU FOR OUR NEWEST SELF PACED COURSE! LFD201 – INTRODUCTION TO OPEN SOURCE DEVELOPMENT, GIT, AND LINUX!

How Do I Prevent ‘Failure to Restrict URL Access’?

Preventing unauthorized URL access requires selecting an approach for requiring proper authentication and proper authorization for each page. Frequently, such protection is provided by one or more components external to the application code. Regardless of the mechanism(s), all of the following are recommended:

  1. The authentication and authorization policies be role based, to minimize the effort required to maintain these policies.
  2. The policies should be highly configurable, in order to minimize any hard coded aspects of the policy.
  3. The enforcement mechanism(s) should deny all access by default, requiring explicit grants to specific users and roles for access to every page.
  4. If the page is involved in a workflow, check to make sure the conditions are in the proper state to allow access.

Thanks for reading and don’t forget to return for further OWASP Security Shepherd solutions.

QuBits

REGISTER TODAY FOR YOUR KUBERNETES FOR DEVELOPERS (LFD259) COURSE AND CKAD CERTIFICATION TODAY! $499!

Source

How to install MyWebSQL on Debian 9 – LinuxCloudVPS Blog

 

How to install MyWebSQL on Debian 9

In the following tutorial we will guide you how to install MyWebSQL on a Debian 9 server. MyWebSQL is a free and open source PHP based application for managing the databases on your server. It is a good alternative to the popular phpMyAdmin and it comes with plenty of features and tools for database management. It also comes with support for MySQL, PostgreSQL and SQLite databases. The installation process is very simple. Just follow the instructions provided bellow and your MyWebSQL application will be ready for use in less than 5 minutes. Let’s get started.

Prerequisites:
– Debian 9 VPS
– LAMP/LEMP (Linux, Apache/Nginx, MySQL, PHP) stack.
– SSH access with root privileges

Step 1: Log in to your server via SSH

We will need to log in to your server via SSH as user root, before we can start the MyWebSQL installation. We can do this with the following command:

ssh root@IP_ADDRESS -p PORT_NUMBER

make sure that you replace “IP_ADDRESS” and “PORT_NUMBER” with your actual server IP address and SSH port number.

Step 2: Install the required dependencies

Once you log in, make sure that you have the following dependencies installed. They will be required in order to finish the installation and for MyWebSQL to work properly. You can install them with:

The following dependencies are required so we can perform the installation and to make sure that MyWebSQL will work properly. They can be installed with the following command:

apt-get install zip wget php-bcmath

Depending on which kind of databases server you are running and the type of databases that you are going to manage (MySQL, PostgreSQL or SQLite), you will also need to install the following extensions:

apt-get install php-mysql php-pgsql php-sqlite3

The following extensions are not required but they can provide some additional functionality:

apt-get install php-curl php-gmp

Step 3: Download and install the MyWebSQL package

You can download the latest stable MyWebSQL version using the wget command:

wget https://phoenixnap.dl.sourceforge.net/project/mywebsql/stable/mywebsql-3.7.zip

To extract the zip file and place it in the default web server root directory, run the following command:

unzip mywebsql-3.7.zip -d /var/www/html

You will also need to update the directory and file permissions so the Apache web server can access and serve these files:

chown -R www-data:www-data /var/www/html/mywebsql/
chmod -R 775 /var/www/html/mywebsql/

With this, the MyWebSQL application is already installed and ready for use. You can also test and verify if the installation is complete and that all server requirements are met by navigating to the following URL in your web browser: http://YOUR-SERVER-IP-ADDRESS/mywebsql/install.php

How to install MyWebSQL on Debian 9

 

Once you make sure that all requirements are met it is recommended that you remove or rename the install.php file in your MyWebSQL root directory.

Step 4: How to access MyWebSQL

Once the installation is complete, you can now access your MyWebSQL application by navigating to the following URL in your browser: http://YOUR-SERVER-IP-ADDRESS/mywebsql

To login and start managing your database, simply enter your database username and password, select your database server (MySQL, PostgreSQL or SQLite) and choose your preferred language:

installing MyWebSQL on Debian 9

Of course, if you are one of our Debian Hosting customers, you don’t have to Install MyWebSQL on your Debian 9 VPS, simply ask our admins, sit back and relax. Our admins will Install MyWebSQL on Debian 9 VPS for you immediately.

PS. If you liked this post about How to Install MyWebSQL on Debian 9 VPS, please share it with your friends on the social networks using the buttons below or simply leave a comment in the comments section. Thanks.

Be the first to write a comment.

Source

How To Check And Repair MyISAM Tables In MySQL

How To Repair MyISAM tables in mysql

MySQL tables can become corrupt for a variety for reasons such as incomplete writes, running out of space, the MySQL daemon being killed or crashing, power failures. If MySQL detects a crashed or corrupt table it will need to be repaired before it can be used again. This guide will walk you through detecting crashed tables and how to repair MyISAM tables.

Find Crashed MyISAM Tables In MySQL

Usually a table will show as corrupt in the mysql log, to locate the location of the log, you will be able to find it in my.cnf or you can view it directly in mysql by the following:

MariaDB [(none)]> show variables like ‘%log_error%’;
+—————+——————————–+
| Variable_name | Value |
+—————+——————————–+
| log_error | /var/lib/mysql/centos7-vm2.err |
+—————+——————————–+
1 row in set (0.01 sec)

You can then cat that log

cat /var/lib/mysql/centos7-vm2.err|grep -i crashed

This will return any crashed tables that have been logged. Another way to check all of the tables is to used the mysqlcheck binary

mysqlcheck -A

will check for all crashed tables

# mysqlcheck -A
mysql.columns_priv OK
mysql.db OK
mysql.event OK
mysql.func OK
mysql.help_category OK
mysql.help_keyword OK
mysql.help_relation OK
mysql.help_topic OK
mysql.host OK
mysql.ndb_binlog_index OK
mysql.plugin OK
mysql.proc OK
mysql.procs_priv OK
mysql.proxies_priv OK
mysql.servers OK
mysql.tables_priv OK
mysql.time_zone OK
mysql.time_zone_leap_second OK
mysql.time_zone_name OK
mysql.time_zone_transition OK
mysql.time_zone_transition_type OK
mysql.user OK
test.Persons OK
test.tablename OK
test.testtable OK

Lastly you can check a table directly through MySQL as well:

MariaDB [test]> check table testtable;
+—————-+——-+———-+———-+
| Table | Op | Msg_type | Msg_text |
+—————-+——-+———-+———-+
| test.testtable | check | status | OK |
+—————-+——-+———-+———-+
1 row in set (0.00 sec)

Repair a single MyISAM table

Once you have located the table in need of repair you can repair it directly through MySQL. Once connected type ‘use databasename’ substituting the real database name that contains the crashed table:

MariaDB [(none)]> use test
Database changed

After that all you need to do is type ‘repair table tablename’ substituting ‘tablename’ with the name of the crashed table:

MariaDB [test]> repair table tablename
-> ;
+—————-+——–+———-+———-+
| Table | Op | Msg_type | Msg_text |
+—————-+——–+———-+———-+
| test.tablename | repair | status | OK |
+—————-+——–+———-+———-+
1 row in set (0.00 sec)

Check And Repair All MyISAM Tables

You can do this quickly by using mysqlcheck with the following command

mysqlcheck -A –auto-repair

You will see each table followed by a status

# mysqlcheck -A –auto-repair
mysql.columns_priv OK
mysql.db OK
mysql.event OK
mysql.func OK
mysql.help_category OK
mysql.help_keyword OK
mysql.help_relation OK
mysql.help_topic OK
mysql.host OK
mysql.ndb_binlog_index OK
mysql.plugin OK
mysql.proc OK
mysql.procs_priv OK
mysql.proxies_priv OK
mysql.servers OK
mysql.tables_priv OK
mysql.time_zone OK
mysql.time_zone_leap_second OK
mysql.time_zone_name OK
mysql.time_zone_transition OK
mysql.time_zone_transition_type OK
mysql.user OK
test.Persons OK
test.tablename OK
test.testtable OK

This command will attempt to check and repair all MySQL tables in every database on the server. That is it for repairing MyISAM tables in MySQL.

Nov 9, 2017LinuxAdmin.io

Source

Configure MySQL Replication with Puppet | Lisenet.com :: Linux | Security

We’re going to use Puppet to install MySQL and configure Master/Master replication.

This article is part of the Homelab Project with KVM, Katello and Puppet series.

Homelab

We have two CentOS 7 servers installed which we want to configure as follows:

db1.hl.local (10.11.1.17) – will be configured as a MySQL master
db2.hl.local (10.11.1.18) – will be configured as a MySQL master

SELinux set to enforcing mode.

See the image below to identify the homelab part this article applies to.

Configuration with Puppet

Puppet master runs on the Katello server.

Puppet Modules

We use puppetlabs-mysql Puppet module to configure the server.

Please see the module documentation for features supported and configuration options available.

Katello Repositories

MySQL repository is provided by Katello (we configured them here).

Configure Firewall

It is essential to ensure that MySQL servers can talk to each other. The following needs applying to both MySQL masters:

firewall { ‘007 allow MySQL’:
dport => [3306],
source => ‘10.11.1.0/24’,
proto => tcp,
action => accept,
}

This will also allow Apache connections to the database.

Configure MySQL Master on db1.hl.local

Nothing groundbreaking here really, but note the auto-increment-offset. This is to help prevent the situation where two queries insert data at the same time in the same database and the same table on both servers db1 and db2, and different entries end up with the same id.

class { ‘mysql::server’:
package_name => ‘mysql-community-server’,
service_name => ‘mysqld’,
root_password => ‘PleaseChangeMe’,
create_root_my_cnf => true,
manage_config_file => true,
config_file => ‘/etc/my.cnf’,
purge_conf_dir => true,
restart => true,
override_options => {
mysqld => {
bind-address => ‘0.0.0.0’,
datadir => ‘/var/lib/mysql’,
log-error => ‘/var/log/mysqld.log’,
pid-file => ‘/var/run/mysqld/mysqld.pid’,
wait_timeout => ‘600’,
interactive_timeout => ‘600’,
server-id => ‘1’,
log-bin => ‘mysql-bin’,
relay-log => ‘mysql-relay-log’,
auto-increment-offset => ‘1’,
auto-increment-increment => ‘2’,
},
mysqld_safe => {
log-error => ‘/var/log/mysqld.log’,
},
},
remove_default_accounts => true,
}->
## MySQL admin user who can connect remotely
mysql_user { ‘[email protected]%’:
ensure => ‘present’,
password_hash => mysql_password(‘PleaseChangeMe’),
}->
mysql_grant { ‘[email protected]%/*.*’:
ensure => ‘present’,
options => [‘GRANT’],
privileges => [‘ALL’],
table => ‘*.*’,
user => ‘[email protected]%’,
}->
## MySQL user for replication
mysql_user { ‘[email protected]%’:
ensure => ‘present’,
password_hash => mysql_password(‘PleaseChangeMe’),
}->
mysql_grant { ‘[email protected]%/*.*’:
ensure => ‘present’,
privileges => [‘REPLICATION SLAVE’],
table => ‘*.*’,
user => ‘[email protected]%’,
}

Configure MySQL Master on db2.hl.local

Configuration of the second server is almost identical to the first one with two exceptions: server-id and auto-increment-offset.

class { ‘mysql::server’:
package_name => ‘mysql-community-server’,
service_name => ‘mysqld’,
root_password => ‘PleaseChangeMe’,
create_root_my_cnf => true,
manage_config_file => true,
config_file => ‘/etc/my.cnf’,
purge_conf_dir => true,
restart => true,
override_options => {
mysqld => {
bind-address => ‘0.0.0.0’,
datadir => ‘/var/lib/mysql’,
log-error => ‘/var/log/mysqld.log’,
pid-file => ‘/var/run/mysqld/mysqld.pid’,
wait_timeout => ‘600’,
interactive_timeout => ‘600’,
server-id => ‘2’,
log-bin => ‘mysql-bin’,
relay-log => ‘mysql-relay-log’,
auto-increment-offset => ‘2’,
auto-increment-increment => ‘2’,
},
mysqld_safe => {
log-error => ‘/var/log/mysqld.log’,
},
},
remove_default_accounts => true,
}->
## MySQL admin user who can connect remotely
mysql_user { ‘[email protected]%’:
ensure => ‘present’,
password_hash => mysql_password(‘PleaseChangeMe’),
}->
mysql_grant { ‘[email protected]%/*.*’:
ensure => ‘present’,
options => [‘GRANT’],
privileges => [‘ALL’],
table => ‘*.*’,
user => ‘[email protected]%’,
}->
## MySQL user for replication
mysql_user { ‘[email protected]%’:
ensure => ‘present’,
password_hash => mysql_password(‘PleaseChangeMe’),
}->
mysql_grant { ‘[email protected]%/*.*’:
ensure => ‘present’,
privileges => [‘REPLICATION SLAVE’],
table => ‘*.*’,
user => ‘[email protected]%’,
}

Configure Master/Master Replication

The easy part is complete, and we should have our MySQL nodes provisioned at this stage.

We don’t have any databases created yet, therefore at this point there isn’t much we want to sync between the two servers.

Let us go ahead and put the steps required to configure MySQL replication manually into a Bash script start_mysql_repl.sh. Note that the script is a quick and dirty way of getting MySQL replication working, but it’s not the right approach.

Ideally we should use a Puppet template with parameters, so that we can provide values for them by passing a parameter hash to a function and wouldn’t have to hardcode hostnames, usernames etc.

#!/bin/bash
#
# Author: Tomas at www.lisenet.com
# Configure MySQL Replication with Puppet
#
# Variables below must match with the ones
# defined in the Puppet manifest
#
master1_host=”db1.hl.local”;
master2_host=”db2.hl.local”;
repl_user=”dbrepl”;
repl_pass=”PleaseChangeMe”;
db_user=”dbadmin”;
db_pass=”PleaseChangeMe”;
master1_status=”/tmp/master1.status”;
master2_status=”/tmp/master2.status”;

if ! [ -f “/root/.replication1.done” ];then
mysql -h”$master1_host” -u”$db_user” -p”$db_pass” -ANe “SHOW MASTER STATUS;”|awk ” >”$master1_status” &&
log_file=$(cut -d” ” -f1 “$master1_status”) &&
log_pos=$(cut -d” ” -f2 “$master1_status”) &&
mysql -h”$master2_host” -u”$db_user” -p”$db_pass” “$master2_status” &&
log_file=$(cut -d” ” -f1 “$master2_status”) &&
log_pos=$(cut -d” ” -f2 “$master2_status”) &&
mysql -h”$master1_host” -u”$db_user” -p”$db_pass”

Note: there are no spaces between in front of EOSQL. WordPress does funny things with formatting sometimes.

The script configures master host db1.hl.local as a slave for master host db2.hl.local.

The script also configures master host db2.hl.local as a slave for master host db1.hl.local.

Apply the following Puppet configuration to the server db1.hl.local (it must not be applied to the second server).

Note how we deploy the script, configure replication and then create a database. The name of the database is “blog”, mostly because of the fact that we’ll be using it for WordPress.

file { ‘/root/start_mysql_repl.sh’:
ensure => ‘file’,
source => ‘puppet:///homelab_files/start_mysql_repl.sh’,
owner => ‘0’,
group => ‘0’,
mode => ‘0700’,
notify => Exec[‘configure_replication’],
}
exec { ‘configure_replication’:
command => ‘/root/start_mysql_repl.sh’,
path => ‘/usr/bin:/usr/sbin:/bin:/sbin’,
provider => shell,
unless => [‘test -f /root/.replication1.done’, ‘test -f /root/.replication2.done’],
notify => Exec[‘create_database’],
}
## We want to create the database after
## the replication has been established

exec { ‘create_database’:
command => ‘mysql –defaults-file=/root/.my.cnf -e “DROP DATABASE IF EXISTS blog; CREATE DATABASE blog; GRANT ALL PRIVILEGES ON blog.* TO ‘dbuser1’@’10.11.1.%’ IDENTIFIED BY ‘PleaseChangeMe’; FLUSH PRIVILEGES;”‘,
path => ‘/usr/bin:/usr/sbin:/bin:/sbin’,
provider => shell,
refreshonly => true,
notify => Exec[‘import_database’],
}
## We want to import the database from a dump file
exec { ‘import_database’:
command => ‘mysql –defaults-file=/root/.my.cnf blog ‘/usr/bin:/usr/sbin:/bin:/sbin’,
provider => shell,
onlyif => [‘test -f /root/blog.sql’],
refreshonly => true,
}
file { ‘/root/blog.sql’:
ensure => file,
source => ‘puppet:///homelab_files/blog.sql’,
owner => ‘0’,
group => ‘0’,
mode => ‘0600’,
}

The database import part restores the content of our WordPress database. Because the import is performed after the replication has been established, the database is available on both MySQL masters.

Source

How to install Firefox Quantum and speed up your web browsing — The Ultimate Linux Newbie Guide

Firefox Quantum Logo

This week, the web’s been ablaze, on fire even (pardon the pun) with the release of Firefox Quantum. Apparently it’s 2x faster and uses 30% less memory than Chrome. In today’s just the examples, here’s how to install it on your Linux box to get the latest fast goodness from Mozilla. It might even make die hard Chrome browser fans make a move!

Install Quantum in Ubuntu 17.10

The latest Ubuntu distribution (17.10) has been updated to include the latest version of Firefox in their main repositories. Once you update as below, Quantum is Firefox version 57 or greater:
sudo apt update
apt upgrade
firefox –version

How to install Firefox on other Linux distributions that don’t have v57 in their repositories

cd
wget -L -O firefox.tar.bz2 ‘https://download.mozilla.org/?product=firefox-latest-ssl&os=linux64&lang=en-US’
tar xf firefox.tar.bz2
cd firefox
./firefox &

Source

WP2Social Auto Publish Powered By : XYZScripts.com