by Jess Males | Technical Consultant at Taos I had the opportunity, recently, to attend AutomaCon, an exciting new conference dedicated to all things automation. It was three days of sharing and discussion around systems automation. Attending, one question that floated in the back of my mind was: what is DevOps? I don’t subscribe to […]
First, a review of simple TCP SSH tunnels:
Many of us are quite familiar with the setup of SSH tunnels using the “-L” and “-R” options to do TCP port-forwarding — to access a web server behind a NAT and/or firewall, to connect to a MySQL or Oracle database that isn’t directly reachable, or to make a desktop workstation at the office reachable via SSH through a bastion host which is SSH-reachable. Here are some examples of SSH commands that probably look quite familiar:
When first starting out at a company and building the infrastructure out from the ground up, you’re inevitably going to need to start the install process for the first systems in an inefficient manner. The first few systems will always end up being launched from ISOs, be it by way of CD, DVD, or USB, until you advance your technology and automation stack to the next level. When your initial bottleneck is one person with one piece of physical media (CD, DVD, USB) at one server, you’re in a situation that doesn’t scale very well. The more ideal target area for scalability is one where a single person can spawn multiple new systems and manage multiple systems simultaneously.
Breaker breaker, are you required to have a “special” character in your password? Thank the UNIX password system of the 1970s, also the time of the CB radio craze in the BC (Before Cellphones) epoch.
The Web as we know it today started primarily on UNIX computers, and in the earliest days, web site accounts often were actual UNIX accounts. Shortcomings of the original UNIX password system included:
Entering the security field after having built my career in technical operations, I’ve most often been on the “receiving end” of security policies. It’s frustrating to think that I’ve completed a project, only to have security issues kick it back into the queue. It’s equally frustrating for a security professional to be asked to approve a completed project, only to find that security policy wasn’t followed. Our own government’s Office of Personnel Management was breached in 2015, and the FBI reported as many as 18 million records were compromised in attacks going back to June 2014. LifeLock, a company providing identity theft protection, was found by the FTC to have failed to uphold minimum security standards handling their clients’ personal data.
By Mike Julian, Senior Technical Consultant at Taos I have led or assisted in many monitoring projects over the years—too many to count. I’ve managed more than my fair share as a full-time system administrator. After a while, I’ve found myself giving the same advice to any one who asks, so it seems only fitting to […]
By Denise Crabtree, Senior Database Administrator Consultant at Taos Want to be a more efficient a DBA? Need an easy way to manage multiple serves concurrently? Multi-server queries is the answer. With registered servers or a Central Management Server, it’s possible to run multi-server queries. The first step is registering servers into logical groups. A […]
For the past five years, I’ve been a consultant at Taos. People have asked me, “why are you a consultant, don’t you want a full time job?” The answer is that consulting is my full time job, though in the past I’ve had full time roles, been an independent freelancer, and run my own company. Let me explain some of the reasons why consulting is a great career option compared to staying in full time roles for the whole of your career.
By Denise Crabtree, Senior Database Administrator Consultant at Taos Finding the backup file location, time, how or who backed up a SQL Server database is answered with this query. —————————————– — 2005+ version —————————————– — Find Where DB Backups Went Physical Location — Variables: — @dbname is optional if blank will return all databases — […]
Internet of Things (IoT) as many presume is not about things but services; connecting companies, people and technology in real-time, all the time. IoT is an extension of the Internet into the physical world which is fundamentally redefining the way we do business today and live.
IoT is primarily convergence of the digital and physical worlds. In the last century we have developed technologies touching every facet of our lives however, those advance technologies were autonomous in their functioning and mostly independent from each other. Decision making and integrated functionality still remained in human hands thus, managing several technologies effectively remained a daunting task. IoT is a step towards making these advanced machines communicate with each other and based on select parameters take autonomous decisions without human intervention. With the maturity of mobile connectivity and easy Internet access it’s possible to integrate our complex physical world with the digital one and let both interact in a way that makes our lives easy in ways never imagined before.