Ansible Fundamentals: Core Concepts with Simple Examples

Ansible is not magic, and it is not complicated. It is a declarative automation tool that answers one question:

“What should the system look like when I’m done?”

In two articles, you’ll learn the core concepts of Ansible and apply them through small, practical tasks.

We explain how to set up a fully functional WordPress website using Ansible to install and configure everything you need: PHP, a database, and a web server.

Continue reading Ansible Fundamentals: Core Concepts with Simple Examples

How to set the default SSH port for Ansible connections to 2222?

There are several methods to set the SSH port for Ansible.

Simplest one: Inventory variable

Edit your inventory file to add the port:

[myhosts]
host1 ansible_host=1.2.3.4 ansible_port=2222
host2 ansible_host=1.2.3.5 ansible_port=2222

Or make it default for a whole group:

[myhosts]
host1 ansible_host=1.2.3.4
host2 ansible_host=1.2.3.5

[myhosts:vars]
ansible_port=2222
Continue reading How to set the default SSH port for Ansible connections to 2222?

80 Most Useful Linux Commands

A
alias
The alias command lets you run a command or a series of Unix commands using a shorter name than the ones usually associated with them.

apt, apt-get
The apt-get tool automatically updates a Debian machine and installs Debian packages/programs.

awk, Gawk
AWK is a programming language tool used to manipulate text. The AWK utility resembles the shell programming language in many areas, but AWK’s syntax is very much its own. Gawk is the GNU Project’s version of the AWK programming language.

Continue reading 80 Most Useful Linux Commands

Hardening WordPress

Security in WordPress is taken very seriously, but as with any other system there are potential security issues that may arise if some basic security precautions aren’t taken. This article will go through some common forms of vulnerabilities, and the things you can do to help keep your WordPress installation secure.

This article is not the ultimate quick fix to your security concerns. If you have specific security concerns or doubts, you should discuss them with people whom you trust to have sufficient knowledge of computer security and WordPress. Continue reading Hardening WordPress

The name or security ID (SID) of the domain specified is inconsistent with the trust information for that domain

As per Microsoft Active Directory architecture, every object (users, groups & computers) in the domain has a unique identifier, known as a SID. These SIDs are unique alphanumeric strings that correspond to a single object in the domain. When you copy a virtual machine directory, the resultant virtual machine has the same SID as the original virtual machine. When you try joining this new virtual machine to the same domain where the original virtual machine is, Active Directory sees two machines with a single SID and warns you that there is a SID conflict.

Windows SID needs to be changed after copying a virtual machine directory Continue reading The name or security ID (SID) of the domain specified is inconsistent with the trust information for that domain