Build images:
docker built -t tag/name .
List Images:
docker images
Check Process RUN:
docker ps
Check Process ALL:
docker ps -a
Docker run Daemon Mode :
docker run -d -p 80:5000 images/name
Docker run and delete when Stop Container:
docker run --rm -d -p 80:5000 images/name (daemon mode)
docker run --rm -it -p 80:5000 images/name (run and show terminal)
Connect to Container
docker exec -it docker_instance_id shell_in_container
Docker Save Images:
docker save images_name > images_name.tar
docker save -o images_name.tar images_name
Docker Load Images:
docker load < test_save.tar
docker load -i test_save.tar
Docker Copy :
docker cp filename container_id:/path_to_file/file
docker cp container_id:/path_to_file/file src_file/file
On Python FLASK
Dockerfile Example:
from python
ADD . /code
WORKDIR /code
RUN pip install -r requirements.txt
ENV FLASK_APP=app.py
ENV FLASK_DEBUG=1
CMD flask run --host=0.0.0.0
Monday, July 1, 2019
Monday, January 7, 2019
How to Connect SharePoint Online via PowerShell
Check Module:
Get-Module -Name Microsoft.Online.SharePoint.PowerShell -ListAvailable | Select Name,Version
Install Module:
Install-Module -Name Microsoft.Online.SharePoint.PowerShell
Connect SPO Script
$adminUPN="username@domain.name"
$orgName="nida365"
$userCredential = Get-Credential -UserName $adminUPN -Message "Type the password."
Connect-SPOService -Url https://$orgName-admin.sharepoint.com -Credential $userCredential
Get-Module -Name Microsoft.Online.SharePoint.PowerShell -ListAvailable | Select Name,Version
Install Module:
Install-Module -Name Microsoft.Online.SharePoint.PowerShell
Connect SPO Script
$adminUPN="username@domain.name"
$orgName="nida365"
$userCredential = Get-Credential -UserName $adminUPN -Message "Type the password."
Connect-SPOService -Url https://$orgName-admin.sharepoint.com -Credential $userCredential
Tuesday, October 16, 2018
ENABLE SNMP Alcatel-Lucent Enterprise OS6900-X20 8.5.164.R01 GA
aaa authentication snmp local
snmp security no-security
user MORNITOR_USER password PASSWORD read-only all no auth
snmp community-map "COMUNITY_STRING" user MONITOR_USER enable
snmp community-map mode enable
snmp station IP_ADDRESS 161 v2 enable
write memory
copy running certified
snmp security no-security
user MORNITOR_USER password PASSWORD read-only all no auth
snmp community-map "COMUNITY_STRING" user MONITOR_USER enable
snmp community-map mode enable
snmp station IP_ADDRESS 161 v2 enable
write memory
copy running certified
Thursday, October 11, 2018
RPM package
RPM check package
rpm -q package-name
RPM List All package
rpm -qa
RPM update package
rpm -Uvh package-name
RPM remove package
rpm -evv package-name
RPM install package
rpm -ivh package-name
rpm -q package-name
RPM List All package
rpm -qa
RPM update package
rpm -Uvh package-name
RPM remove package
rpm -evv package-name
RPM install package
rpm -ivh package-name
Wednesday, October 10, 2018
Find Serial Number by SNMPWALK
find snmp OID:
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS | grep SERIALNUM
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On
find serial by OID:
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS .1.3.6.1.2.1.47.1.1.1.1.11.1
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867
find by network range:
for i in {1..20}; do echo ip = 192.168.1.$i Serial: ; snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On 192.168.1.$i .1.3.6.1.2.1.47.1.1.1.1.11.1 | awk '{print $4}'; done
for i in {1..20}; do echo ip = 192.168.2.$i Serial: ; snmpwalk -l noAuthNoPriv -v3 192.168.2.$i -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867 | awk '{print $4}'; done
ALCATEL 6400 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11
HUAWEI S5720 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11.67108867
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS | grep SERIALNUM
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On
find serial by OID:
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS .1.3.6.1.2.1.47.1.1.1.1.11.1
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867
find by network range:
for i in {1..20}; do echo ip = 192.168.1.$i Serial: ; snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On 192.168.1.$i .1.3.6.1.2.1.47.1.1.1.1.11.1 | awk '{print $4}'; done
for i in {1..20}; do echo ip = 192.168.2.$i Serial: ; snmpwalk -l noAuthNoPriv -v3 192.168.2.$i -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867 | awk '{print $4}'; done
ALCATEL 6400 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11
HUAWEI S5720 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11.67108867
Wednesday, September 12, 2018
How to find USER exec DDL on Oracle OBJECT using DBA_AUDIT_TRAIL
set:sqlplus parameter
SET LINESIZE 200
col OBJ_NAME format a20
col OS_USERNAME format a20
set:time format
alter session set nls_date_format='YYYY-MM-DD HH24:MI:SS';
exec sql:
select
USERNAME, OBJ_NAME, ACTION_NAME, TIMESTAMP,OS_USERNAME,SESSIONID
from
DBA_AUDIT_TRAIL
where
OBJ_NAME like 'OBJECT_NAME'
SET LINESIZE 200
col OBJ_NAME format a20
col OS_USERNAME format a20
set:time format
alter session set nls_date_format='YYYY-MM-DD HH24:MI:SS';
exec sql:
select
USERNAME, OBJ_NAME, ACTION_NAME, TIMESTAMP,OS_USERNAME,SESSIONID
from
DBA_AUDIT_TRAIL
where
OBJ_NAME like 'OBJECT_NAME'
Friday, June 8, 2018
Create SNMP v3 Huawei S5700 Switch noAUTH
:edit default acl allow any host
acl 2000
rule 1 permit source any
:create snmp agent
snmp-agent
snmp-agent acl 2000
snmp-agent local-engineid 800007DB035C546D0F51F0
snmp-agent sys-info contact email_address
snmp-agent sys-info location BUILDING_NAME
snmp-agent sys-info version all
snmp-agent group v3 GROUP_NAME noauthentication
snmp-agent usm-user v3 USERNAME
snmp-agent usm-user v3 USERNAME group GROUP_NAME
snmp-agent usm-user v3 USERNAME acl 2000
snmp-agent trap disable
:Test smpwalk
snmpwalk -l noAuthNoPriv -v3 xxx.xxx.xxx.xxx -u user
acl 2000
rule 1 permit source any
:create snmp agent
snmp-agent
snmp-agent acl 2000
snmp-agent local-engineid 800007DB035C546D0F51F0
snmp-agent sys-info contact email_address
snmp-agent sys-info location BUILDING_NAME
snmp-agent sys-info version all
snmp-agent group v3 GROUP_NAME noauthentication
snmp-agent usm-user v3 USERNAME
snmp-agent usm-user v3 USERNAME group GROUP_NAME
snmp-agent usm-user v3 USERNAME acl 2000
snmp-agent trap disable
:Test smpwalk
snmpwalk -l noAuthNoPriv -v3 xxx.xxx.xxx.xxx -u user
Subscribe to:
Posts (Atom)
ALCATEL 6900
write memory copy running certified reload from working no rollback-timeout
-
:system view system-view or sys :show all config dis current-configuration :create vlan vlan vlan_number :show ip interface ...
-
grant execute on utl_http to wc grant execute on dbms_lock to wc; BEGIN DBMS_NETWORK_ACL_ADMIN.create_acl ( acl => ...
-
SET LLDP System NAME: system name ALL-Uplink system location SIAM-FL11 SHOW LLDP Configure: show lldp config or show lldp local-syste...