System Admin Share
1,243 FOLLOWERS
This blog provides useful Information for System Administrators on various topics such as Windows,Unix,Vmware,AIX,Veritas,Networking,Cluster,Troubleshooting,Daily Hacks etc.
System Admin Share
5M ago
Migrating applications from virtual machines to Kubernetes can be challenging, but with the right approach, it can transform your deployment strategy. This comprehensive guide will walk you through each step of the migration process, sharing best practices to ensure a smooth transition.
Table of Contents
Understanding Your Application
Is it stateless or stateful?
Dependencies
Components to migrate
Session stickiness
Configuration methods
Launch processes
Containerizing Your Application
Building the image
Choosing a base image
Creating the final image
Preparing Environment ..read more
System Admin Share
6M ago
Overview
A significant bug has been identified in Loki v3.0.0, which causes the backend to crash with a segmentation violation error (SIGSEGV) when the index_gateway.mode is set to ring. This issue was first reported by user @awoimbee on March 20, 2024, and has been discussed extensively with multiple users encountering similar problems.
Description of the Bug
When running the Loki backend with the configuration setting index_gateway.mode set to ring, the system crashes with a segmentation fault due to a nil pointer dereference. The error trace typically looks like this:
go
Copy code ..read more
System Admin Share
6M ago
Deploying Grafana using Helm can be complex, especially when managing the configuration of the Kubernetes service. Ensuring your configurations are accurate is crucial for the security and functionality of your deployment. This guide will help you understand the key components of both old and new configurations, highlight common mistakes, and ensure a smooth transition to the new configuration.
The AWS EKS Load Balancer Controller (AWS LB Controller) can sometimes change settings due to several reasons related to its management of Elastic Load Balancers (ELBs) and Network Load Balan ..read more
System Admin Share
7M ago
Velero is an open-source tool for backing up and restoring Kubernetes cluster resources and persistent volumes. This guide will walk you through configuring Velero on AWS to ensure your cluster data is securely backed up.
Introduction: In the ever-evolving landscape of cloud-native infrastructure, ensuring the resilience and integrity of your data is paramount. With Kubernetes becoming the de facto standard for container orchestration, it's essential to have robust backup and recovery mechanisms in place. Enter Velero – an open-source tool designed to streamline the backup, restore, and migra ..read more
System Admin Share
7M ago
Changing the default browser in Windows 10 and Windows 11 has become more complex than altering registry values due to enhanced security measures, particularly since Windows 10 introduced hash protection.
While one option involves utilizing group policy settings, this can prove cumbersome, especially in non-managed environments like certain cloud setups.
However, there exists a straightforward solution: leveraging PowerShell's ability to simulate user interactions, such as keystrokes. Commands like $shell.SendKeys('{TAB}') or $shell.SendKeys("edge") enable us to automate the process of navigat ..read more
System Admin Share
10M ago
# Introduction In the ever-expanding digital landscape, user authentication is a critical aspect of securing applications. One powerful method to achieve this is through OAuth, a widely adopted open standard for access delegation commonly used by major platforms like Google. This article aims to guide you through the process of configuring OAuth with Google for your application. From creating an application on the OAuth consent screen to obtaining and utilizing the client ID and secret, we'll provide step-by-step instructions accompanied by illustrative images. Whether you're a developer ..read more
System Admin Share
11M ago
Introduction: In the dynamic landscape of Kubernetes deployments, managing and deploying container images are fundamental tasks. This guide will walk you through essential techniques using Helm and kubectl to fetch a list of images from your Kubernetes platform, regardless of the specific application.
Prerequisites: Before diving into the procedures, ensure that you have the necessary tools installed:
Helm
kubectl
Fetching Images from Helm Charts: Helm simplifies the process of fetching images from charts. Use the following command, replacing version numbers and paths as per your configur ..read more
System Admin Share
11M ago
If you've ever encountered the issue of Citrix ICA files not opening on a Windows operating system, you're not alone. This common problem can be frustrating, especially when attempting to launch an application from a Citrix URL results in a downloaded ICA file that refuses to open. In this article, we'll explore the possible causes of this issue and provide solutions to get your Citrix ICA files functioning seamlessly.
ICA Files Lifecycle
Before delving into the solutions, let's briefly understand the lifecycle of Citrix ICA files. When attempting to launch an application from a Citrix URL ..read more
System Admin Share
1y ago
error: couldn't get deployment identity-management-1: User "system:serviceaccount:naas-ndo-idp-2:deployer" cannot get replicationcontrollers in project "naas-ndo-idp-2"
Solution:
oc adm policy add-role-to-user -z deployer system:deployer -n naas-ndo-idp-2
role "system:deployer" added: "deployer"
[root@node-2-1 ~]# oc adm policy add-role-to-user -z builder system:deployer -n naas-ndo-idp-2
role "system:deployer" added: "builder"
[root@node-2-1 ~]# oc adm policy add-role-to-user -^Cbuilder system:deployer -n naas-ndo-idp-2
[root@node-2-1 ~]# oc adm policy add-role-to-group system:image ..read more
System Admin Share
1y ago
Goal:
Configure JumpCloud and Google Single Sign-On (SSO) for the Argo CD login page at https://argocd.demo.net/login.
Step 1: Add and Configure the SSO Application
Start by adding the SSO application in JumpCloud and configuring the following parameters:
IdP Entity ID: <https://argocd.demo.net/api/dex/callback>
SP Entity ID: <https://argocd.demo.net/api/dex/callback>
ACS URL: <https://argocd.demo.net/api/dex/callback>
IDP URL: <https://sso.jumpcloud.com/saml2/argocd-dev>
Download the metadata, which may include the required certificate or CA data. Encode th ..read more