Author Archives: tyler

About tyler

I would like to remain as anonymous as possible, so I am going to be somewhat vague. I have been working in IT for 15 years. I have experience with PC repair, software development, security, and systems administration. Over the years I have built my skills through self-study, military training, formal education, certification programs, vendor training, coursera.org, and work experience.

Installing HAProxy From Source on Debian Stretch

By | 2019-04-28

The Debian Stretch repositories provide HAProxy version 1.7. You may want or need features in newer versions. Fortunately, installing HAProxy 1.9.7 from source is relatively straightforward. The steps to do so are: Install required packages Download the HAProxy source code Compile and install HAProxy Create an unprivileged service account Create a SystemD unit file Create… Read More »

Installing HAProxy From Source On CentOS 7

By | 2019-04-27

The CentOS 7 repositories provide HAProxy version 1.5. You may want or need features in newer versions. Fortunately, installing HAProxy 1.9.7 from source is relatively straightforward. The steps to do so are: Install required packages Download the Lua source code Download the HAProxy source code Compile and install Lua Compile and install HAProxy Create an… Read More »

How to Check Linux Disk Space

By | 2019-04-17

Checking disk space in Linux can done with the command line progams df and du. df is used to show usage at the filesystem level, while du can be used to show how much space individual files and directories use. If you aren’t familiar with how Linux presents storage devices, you will probably want to… Read More »

Linux Filesystem Hierarchy

By | 2019-04-14

Unlike Windows, Linux doesn’t use drive letters to distinguish storage devices. It uses a single hierarchy starting at /. Storage devices are associated with directories within this hierarchy through a process called mounting. I’ll cover mounting and mount points more later on. The term Linux filesystem hierarchy refers to this tree structure. The Root Directory… Read More »

OpenLDAP Referential Integrity Overlay

By | 2019-03-30

The OpenLDAP referential integrity overlay is used to keep attributes that refer to the DNs of other entries consistent when changes occur. If you are trying to make groups more manageable, consider using the memberOf overlay. The referential integrity overlay will automatically modify or remove attributes if the entry they refer to is renamed or… Read More »

OpenLDAP Online Configuration Reference

By | 2019-03-16

My OpenLDAP Online Configuration (OLC) Reference provides the OLC equivalents of the configuration file options. It should be pretty accurate as I read the source code to determine which OLC attributes correspond to the configuration file options. For a description of what the various options do, consult the appropriate man page or the official Administrator’s… Read More »

OpenLDAP memberOf overlay

By | 2019-02-28

The OpenLDAP memberOf overlay automatically creates and removes attributes when attributes of other entries that refer to their DN are added and removed. That statement, while technically accurate, was confusing to me and I wrote it! For example, if you create a groupOfNames entry with a member attribute of uid=user,ou=users,dc=tylersguides,dc=com, the memberOf overlay can automatically… Read More »

Mounting a Windows Share on Linux

By | 2019-02-15

Mounting a Windows share on Linux is pretty straight forward. You need a Windows user that can access the shares, the name of the work group or domain, and the name of the share. First, make sure you have mount.cifs installed, then create a credentials file, and finally mount the share. You can also add… Read More »