The below code snippet was used to add SSH users to RackSpace cloud CentOS Linux nodes being used as application servers and managed via RightScale. The SSH users were required during a testing phase so they could look through logs and make modifications to specific configuration files, etc. There are three things that have to happen to create the SSH user, allow them to login, and provide them the necessary rights on the server to accomplish their tasks which include adding the user, modifying the sshd config to allow password logins, and update the sudoers file to enable sudo access for wheel group users.bash, boot, CentOS, cloud, group, inputs, instance, Linux, node, passwordauthentication, rackspace, rightscale, rightscript, script, sed, servertemplate, SSH, sshd_config, sudoers, useradd, variables, wheel
Posts Tagged “variables”
Jun 17 2012
A few weeks ago I wrote a article on disabling the caps lock key in Windows. I decided since I have been writing some Linux articles I may as well show a way to do the same thing in Linux. Its a short, quick fix but it can be useful if you hate capslock like I do.
Below I outline the steps to disable the key:.bashrc, bash, environment, keys, Linux, multiple operating systems, remap, variables
Jan 02 2009
Installing nmap security scanner on Windows XP is fairly easy. The easiest way is to download and run the nmap stable release executable file currently located here. You can verify the latest release by visiting nmap’s download page here.
Once the nmap.exe file is downloaded just double click it and choose a location to unpack the files. The easiest place would be something like c:\nmap or if you have cygwin installed you might want to do c:\cygwin\nmap. Make sure to note the location as you will need to add this to your path so you can execute it without having to be in the nmap directory.--allow-downgrade, --max-rate, --scan-delay, --scanflags, cygwin, environment variables, exe, executable, FTP bounce scan, HTTP, HTTPS, IP protocol scan, list scan, nmap, path, ping scan, port, script scan, security, SSH, syn/ack, system variable, tcp, UDP, variables, windows, xp
Aug 23 2008
The below code snipet was created to check the number of rows in a PostgreSQL database, log the output to a file, and warn if the number of rows is over a certain number. There are numerous variables in the code snipet below that will need to be modified for it to work properly including message, notify, dbuser, and logfile. This code was created on CentOS some other items could be different including the location of the date command.
This script can be run as follows: checkrows $host $database
bash, CentOS, database, date, postgres, PostgreSQL, psql, shell script, variables