open services.msc
LxssManager -> restart
Monday, July 1, 2019
Setup Docker in Windows Subsystem for Linux (WSL)
Docker Setup:
Download Docker for Windows
docker -> settings -> general -> "expose deamon on tcp://localhost:2375 without TLS"
On WSL:
$sudo apt update -y
$sudo apt upgrade -y
$sudo apt install docker.io
$sudo usermod -aG docker $USER
Add PATH:
check:
echo $PATH | grep /home/$USER
if not exist
add path:
vi ~/.profile
export PATH="$PATH:$HOME/.local/bin"
Setup Docker in WSL
$echo "export DOCKER_HOST=tcp://localhost:2375" >> ~/.bashrc && source ~/.bashrc
Download Docker for Windows
docker -> settings -> general -> "expose deamon on tcp://localhost:2375 without TLS"
On WSL:
$sudo apt update -y
$sudo apt upgrade -y
$sudo apt install docker.io
$sudo usermod -aG docker $USER
Add PATH:
check:
echo $PATH | grep /home/$USER
if not exist
add path:
vi ~/.profile
export PATH="$PATH:$HOME/.local/bin"
Setup Docker in WSL
$echo "export DOCKER_HOST=tcp://localhost:2375" >> ~/.bashrc && source ~/.bashrc
Docker 101
Build images:
docker built -t tag/name .
List Images:
docker images
Check Process RUN:
docker ps
Check Process ALL:
docker ps -a
Docker run Daemon Mode :
docker run -d -p 80:5000 images/name
Docker run and delete when Stop Container:
docker run --rm -d -p 80:5000 images/name (daemon mode)
docker run --rm -it -p 80:5000 images/name (run and show terminal)
Connect to Container
docker exec -it docker_instance_id shell_in_container
Docker Save Images:
docker save images_name > images_name.tar
docker save -o images_name.tar images_name
Docker Load Images:
docker load < test_save.tar
docker load -i test_save.tar
Docker Copy :
docker cp filename container_id:/path_to_file/file
docker cp container_id:/path_to_file/file src_file/file
On Python FLASK
Dockerfile Example:
from python
ADD . /code
WORKDIR /code
RUN pip install -r requirements.txt
ENV FLASK_APP=app.py
ENV FLASK_DEBUG=1
CMD flask run --host=0.0.0.0
docker built -t tag/name .
List Images:
docker images
Check Process RUN:
docker ps
Check Process ALL:
docker ps -a
Docker run Daemon Mode :
docker run -d -p 80:5000 images/name
Docker run and delete when Stop Container:
docker run --rm -d -p 80:5000 images/name (daemon mode)
docker run --rm -it -p 80:5000 images/name (run and show terminal)
Connect to Container
docker exec -it docker_instance_id shell_in_container
Docker Save Images:
docker save images_name > images_name.tar
docker save -o images_name.tar images_name
Docker Load Images:
docker load < test_save.tar
docker load -i test_save.tar
Docker Copy :
docker cp filename container_id:/path_to_file/file
docker cp container_id:/path_to_file/file src_file/file
On Python FLASK
Dockerfile Example:
from python
ADD . /code
WORKDIR /code
RUN pip install -r requirements.txt
ENV FLASK_APP=app.py
ENV FLASK_DEBUG=1
CMD flask run --host=0.0.0.0
Monday, January 7, 2019
How to Connect SharePoint Online via PowerShell
Check Module:
Get-Module -Name Microsoft.Online.SharePoint.PowerShell -ListAvailable | Select Name,Version
Install Module:
Install-Module -Name Microsoft.Online.SharePoint.PowerShell
Connect SPO Script
$adminUPN="username@domain.name"
$orgName="nida365"
$userCredential = Get-Credential -UserName $adminUPN -Message "Type the password."
Connect-SPOService -Url https://$orgName-admin.sharepoint.com -Credential $userCredential
Get-Module -Name Microsoft.Online.SharePoint.PowerShell -ListAvailable | Select Name,Version
Install Module:
Install-Module -Name Microsoft.Online.SharePoint.PowerShell
Connect SPO Script
$adminUPN="username@domain.name"
$orgName="nida365"
$userCredential = Get-Credential -UserName $adminUPN -Message "Type the password."
Connect-SPOService -Url https://$orgName-admin.sharepoint.com -Credential $userCredential
Tuesday, October 16, 2018
ENABLE SNMP Alcatel-Lucent Enterprise OS6900-X20 8.5.164.R01 GA
aaa authentication snmp local
snmp security no-security
user MORNITOR_USER password PASSWORD read-only all no auth
snmp community-map "COMUNITY_STRING" user MONITOR_USER enable
snmp community-map mode enable
snmp station IP_ADDRESS 161 v2 enable
write memory
copy running certified
snmp security no-security
user MORNITOR_USER password PASSWORD read-only all no auth
snmp community-map "COMUNITY_STRING" user MONITOR_USER enable
snmp community-map mode enable
snmp station IP_ADDRESS 161 v2 enable
write memory
copy running certified
Thursday, October 11, 2018
RPM package
RPM check package
rpm -q package-name
RPM List All package
rpm -qa
RPM update package
rpm -Uvh package-name
RPM remove package
rpm -evv package-name
RPM install package
rpm -ivh package-name
rpm -q package-name
RPM List All package
rpm -qa
RPM update package
rpm -Uvh package-name
RPM remove package
rpm -evv package-name
RPM install package
rpm -ivh package-name
Wednesday, October 10, 2018
Find Serial Number by SNMPWALK
find snmp OID:
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS | grep SERIALNUM
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On
find serial by OID:
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS .1.3.6.1.2.1.47.1.1.1.1.11.1
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867
find by network range:
for i in {1..20}; do echo ip = 192.168.1.$i Serial: ; snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On 192.168.1.$i .1.3.6.1.2.1.47.1.1.1.1.11.1 | awk '{print $4}'; done
for i in {1..20}; do echo ip = 192.168.2.$i Serial: ; snmpwalk -l noAuthNoPriv -v3 192.168.2.$i -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867 | awk '{print $4}'; done
ALCATEL 6400 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11
HUAWEI S5720 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11.67108867
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS | grep SERIALNUM
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On
find serial by OID:
snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On IP_ADDRESS .1.3.6.1.2.1.47.1.1.1.1.11.1
snmpwalk -l noAuthNoPriv -v3 IP_ADDRESS -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867
find by network range:
for i in {1..20}; do echo ip = 192.168.1.$i Serial: ; snmpwalk -l noAuthNoPriv -v 1 -c COMUNICATION_STRING -On 192.168.1.$i .1.3.6.1.2.1.47.1.1.1.1.11.1 | awk '{print $4}'; done
for i in {1..20}; do echo ip = 192.168.2.$i Serial: ; snmpwalk -l noAuthNoPriv -v3 192.168.2.$i -u user -On .1.3.6.1.2.1.47.1.1.1.1.11.67108867 | awk '{print $4}'; done
ALCATEL 6400 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11
HUAWEI S5720 Serial OID No. : .1.3.6.1.2.1.47.1.1.1.1.11.67108867
Subscribe to:
Posts (Atom)
ALCATEL 6900
write memory copy running certified reload from working no rollback-timeout
-
SET LLDP System NAME: system name ALL-Uplink system location SIAM-FL11 SHOW LLDP Configure: show lldp config or show lldp local-syste...
-
grant execute on utl_http to wc grant execute on dbms_lock to wc; BEGIN DBMS_NETWORK_ACL_ADMIN.create_acl ( acl => ...
-
:system view system-view or sys :show all config dis current-configuration :create vlan vlan vlan_number :show ip interface ...