Rancid, or a similar program, is a necessity in network management. You can find a decent rancid tutorial at http://www.joe-ma.co.za/page.php?9, so I’m not going to flog that dead horse. I can’t expect my coworkers to learn either CVS or Subversion, however. They want a pretty Web interface, or they won’t use the tool. Continue reading “rancid and cvsweb”
The UPS delivery man rings our doorbell every time he drops off a package… unless it contains books. That means I only know my new books arrive when I trip over the box.
I’m pleased to report that, in addition to the useful technical content, this books contains 30% more insolence than my previous work.
I’ll be giving away several copies for reviews. If you’re interested, I’ve posted details here.
Use a Bridge Virtual Interface when you want to have multiple router interfaces act as members of a single Ethernet collision domain, or bridge two separate network segments together. Lots of wireless bridges use this function to attach their wireless clients to a local Ethernet. Start by defining the bridge group:
router(config)#bridge 202 protocol ieee
router(config)#bridge 202 route ip
Then put some interfaces into that group:
Then, create the BVI interface:
router(config-if)#desc new server cluster
router(config-if)#ip addr 18.104.22.168 255.255.255.240
Your BVI interface should be up, and all these formerly “router” ports should now be a transparent bridge.
(Why am I using BVI instead of VLAN on a bunch of Ethernet ports? This particular switch is configured as a router, and it really wants to treat all the interfaces as router interfaces. It insists it doesn’t know how to configure a VLAN. I’m certain that Cisco has a reason for this, but their explanation might put me off my feed.)
My author’s copies of Network Flow Analysis should arrive later this week. While my publisher sends review copies to all of the likely reviewers, I’d also like to give my readers a chance to get in an the free review copy goodness. If you’re willing to write a review for your blog, Amazon, or (preferably) both, I might have a free book for you. Continue reading “Free (for some value of free) Books”
RT offers many ways to manage workflow, but most of them create a separate ticket for each part of the workflow. The tasks at my company are mostly serialized: a request comes in, is worked on by person A, who hands it off to person B, who hands it to person C, who closes the request. Opening a separate ticket for each of these isn’t efficient. (The situation is different for parallelized tasks.) I want a method to easily pass tickets from one person to the next. Continue reading “Request Tracker serialized workflow”
If you have a central auth directory, such as OpenLDAP, everything should authenticate against it, including your Web apps. Here’s how you set up a FreeBSD system to authenticate against your OpenLDAP directory. I did this on FreeBSD/i386 running 8.1-PRERELEASE, with Apache 2.2 and OpenLDAP 2.4. Before starting, make sure your OpenLDAP install is configured correctly. You should be able to successfully run ldapsearch(1) against your directory. If your base OpenLDAP install is busted, go no further. Continue reading “apache22 LDAP auth”
Go to http://www.networkflowanalysis.com/ to read Chapter 4.
While you’re there, order the book. You know you want to.
My story “Wednesday’s Seagulls” just sold to http://short-story.me/. Unlike my previous fiction sales, this is to a Web site. Everyone will be able to view it, for as long as the site keeps it up.
I’ll announce when the story is actually posted there.
Storage is a pain. I can spend lots of money to solve this problem, or I can find less expensive alternatives. I’ve been using diskless servers lately, all served off of a big OpenSolaris machine. (Why OpenSolaris? It has a newer ZFS than FreeBSD.) Performance is mediocre on NFSv2/3, and I want faster. One obvious thing to try is iSCSI.
iSCSI requires targets (servers) and initiators (clients). For this test I’m using OpenSolaris as the target and FreeBSD as the initiator. For testing, both machines are running on ESXi, on older hardware that’s been removed from production.
The summary of this post is: you can’t.
I have my Ubuntu servers talking to LDAP for authentication, but I want two other functions: ldap-sudo integration, and SSH with public keys via LDAP. Continue reading “tying ubuntu 10.04 LDAP to sudo and SSH”