Jump to content

All Activity

This stream auto-updates

  1. Earlier
  2. Our journey through Acute lymphoblastic leukemia (A.L.L.) which is a type of cancer of the blood and bone marrow that affects white blood cells. Acute lymphoblastic leukemia is the most common childhood cancer. It occurs when a bone marrow cell develops errors in its DNA. Follow us while Kate battles cancer at the age of 35 years old and what experiences she encounters as well as learn what helps and what doesn't. We will do our best to keep the blog up to date to help others going through this disease with the thought of helping others in such a troubled time. Please comment on your experiences if similar and offer what worked for you since this is our first time and we know not everyone has the same experiences. K8strong the beginning As many of you know my wife has been sick for the last three months and Urgent Care told her it’s a viral infection and she just needs to wait it out. After two months she lost 40lbs and appeared to have Jaundice with her coworkers telling her she has a gray tint to her skin. Kate decided to try her primary care physician which told her the same thing, it’s a cold and you just need to wait it out. We had a parent from our sons FIRST Robotics team that mentioned she could have Lyme Disease which when looking it up, appeared to possibly be the answer. We were just in Tennessee and she did lead the way down a trail outside our cabin which had spider webs (could of a wolf spider fell down and bite her giving her this Lyme Disease or a tick?) Kate was having a difficult time standing, having to sit down because she was getting very nauseous and light headed. Horrible migraines which her Primary Care physician prescribed medicine for that which you supposedly have to take as soon as you feel you have a migraine coming on but it usually made her super sleepy. Loss of appetite where she didn’t want to eat anything but Tropical Smoothies for some nutrition. I went to a natural health store and got her some Ginger Shots and some essential oils to help her fight a possible Lyme disease naturally (if it’s even that). Forced her to take vitamins…. Based on one of my friends (rob) recommendation, I bought some Bovin Colustrum and encouraged her to take that since Indians used it to cure many illnesses and in hopes to beat this as well as several other “remedies” but nothing was helping. While working one day her supervisor recommended the doc she see's and it just so happens the doctor is in Davison (where we live), Bridgett Dyson, and Kate made an appointment with her this past Tuesday (2/4/2020). I told her, if she says "it’s a cold" we are going to the Emergency Room because I know in my gut its not a dang cold. The moment Kate walked into the office this doctor has immediate concerns as she confirmed that Kate did not look healthy and immediately ordered three pages worth of blood testing and told Kate if its urgent she will call her that night, otherwise will get with her on Thursday. We went to bed and around 10:15pm we got a call which appeared to be spam call (no-caller id) but what spam caller leaves a message? Kate listened to the message and it was her doctor saying she is calling right back and please answer. So Kate answered the second time and the doc said, very calmly, that Kate's blood came back with some concerns and that she (the doc) strongly recommends Kate go to the Emergency Room right away (which I overheard since we were both in bed) so before she even got off the phone I’m getting dressed. I rush her to the ER at McLaren in Flint and of course begin the waiting period. Once we get pulled in the back room they look at what her doctor sent over and they wanted to double check for themselves so they also took her blood. In a few minutes they came back and said, “How are you walking?” When her doctor pulled her blood her hemoglobin was at a 5 (normal for women its between 12-15) and her White Blood Cells were at 1 (normal is between 4-11). Now in the ER her hemoglobin is down to 4.3 and her white blood cell was down to less than 1. NOW they are giving her a ton of attention and she immediately gets two bags of O negative blood (since she is O+) at the fastest rate they can perform a blood transfusion which is at 150 in hopes to get her blood levels up. Kate said it felt so cold entering her body and it tasted aluminum in her mouth reminded her of a Pepsi which is disgusting to her. She asked for the coke version of O- but I guess they didn’t have any. Did another blood work (checking to see if its raising her counts) and it did slightly but required a total of 5 bags of O-. So over the course from Tuesday night to Saturday noonish my wife had to get bone marrow biopsy so they can determine what blood disease she has. Initial thought from the hematologist was a-plastic anemia but after the bone marrow biopsy it said it was for sure Leukemia but not sure which kind until results are back from Karmanos Cancer Research in Detroit which we received FINAL confirmation yesterday that it for sure is Acute lymphocytic leukemia (ALL) or otherwise known as acute lymphoblastic leukemia which in children under the age of 12 has a good chance for cure and in adults they says there still is a chance to be cured. I’m sure I’m missing pieces since my head is drowning in knowledge of what this disease is. I have to apologize that my time is reduced since I am doing everything I can to support my wife while she is going through this without breaking down myself. It’s insane to think of a time where we were both healthy and just enjoying the day probably stressing about stuff that doesn’t even matter today or involved in drama that goes away. Everything now seems so minor (except our Health Insurance). Acute Lymphoblastic Leukemia (ALL) What is acute lymphoblastic leukemia? Acute lymphoblastic leukemia (ALL) is a cancer that affects the white blood cells. These cells fight infection and help protect the body against disease. Patients with ALL have too many immature white blood cells in their bone marrow. These cells crowd out normal white blood cells. Without enough normal white blood cells, the body has a harder time fighting infections. ALL affects a type of white blood cell called lymphocytes, causing them to build up in the liver, spleen and lymph nodes. How common is acute lymphoblastic leukemia? ALL is the most common type of childhood cancer. It most often occurs in children ages 3 to 5 and affects slightly more boys than girls. ALL is most common in Hispanic children, followed by those of white and African-American descent. About 3,000 people younger than age 20 are found to have ALL each year in the United States. Siblings of children with leukemia have a slightly higher risk of developing ALL, but the rate is still quite low: no more than 1 in 500. What are the symptoms of acute lymphoblastic leukemia? Symptoms of ALL include: Frequent infections Fever Easy bruising Bleeding that is hard to stop Flat, dark-red skin spots (petechiae) due to bleeding under the skin Pain in the bones or joints Lumps in the neck, underarm, stomach or groin Pain or fullness below the ribs Weakness, fatigue Paleness Loss of appetite Shortness of breath How is acute lymphoblastic leukemia treated? Expect your child’s ALL treatment to include three phases: Induction — to kill the leukemia cells in the blood and bone marrow and put the disease into remission (a return to normal blood cell counts) Consolidation/intensification — to rid the body of any remaining cells that could begin to grow and cause the leukemia to return (relapse) Maintenance — to destroy any cancer cells that might have survived the first two phases Four types of treatment may be used during any of these treatment phases: Chemotherapy (“chemo”) — uses powerful medicines to kill cancer cells or stop them from growing (dividing) and making more cancer cells. Chemo may be injected into the bloodstream, so that it can travel throughout the body. Some chemo may be given by mouth. Combination therapy uses more than one type of chemo at a time. Stem cell transplant — includes replacing blood-forming cells in the bone marrow that have been killed by chemo and/or radiation therapy: A stem cell transplant gives the patient new blood cells from a donor’s blood or bone marrow. These cells grow into healthy blood cells to replace the ones the patient lost. Some types of stem cell transplants may be called “bone marrow transplants” because the cells come from the donor’s bone marrow. Radiation therapy — uses high-energy X-rays or other types of radiation to kill cancer cells or stop them from growing. Targeted therapy — uses medicines or other treatments that target and attack specific cancer cells without harming normal cells. What are the survival rates for ALL? The National Cancer Institute (NCI) estimates 5,960 people will receive a diagnosis of ALL in the United States in 2018. About 1,470 people will die from the disease in 2018. Several factors can determine survival rates, such as age at diagnosis and subtype of ALL. The five-year survival rate in the United States is 68.1 percent, reports the NCI. However, these numbers are steadily improving. From 1975 to 1976, the five-year survival rate for all ages was under 40 percent. Although most people who receive a diagnosis of ALL are children, the highest percentage of Americans with ALL who pass away are between the ages of 65 and 74. In general, about 40 percent of adults with ALL are considered cured at some point during their treatment, estimates American Cancer Society. However, these cure rates depend on a variety of factors, such as the subtype of ALL and age at diagnosis. A person is “cured” of ALL if they’re in complete remission for five years or more. But because there’s a chance of the cancer coming back, doctors can’t say with 100 percent certainty that a person is cured. The most they can say is whether or not there are signs of cancer at the time.
  3. A very helpful website to help prepare yourself or mentally get an idea of each branch of service or dive in a bit deeper is called OperationMilitaryKids American War and Military Operations Casualties: Lists and Statistics Delayed Enlistment Program information https://fas.org/sgp/crs/natsec/RL32492.pdf https://www.rand.org/pubs/research_briefs/RB9955z3.html
  4. Here is some help to do better at your ASVAB Test. It's $20 but to help you get the most job choices in whatever branch of service you choose, you need good scores so $20 to help you get those opportunities doesn't sound like a whole lot. ASVAB Secrets Study Guide
  5. I get the request all the time from other teams or application owners or security or someone that needs a large export from Infoblox. If its as simple as a domain, you browse to the domain and click export to CSV but if its multiple domains, sub-domains, networks, etc.. that's more difficult. In this example I had to export all our dns domains and records. Data Management - IPAM On the right in the toolbar click on CSV Job Manager Click the CSV Export on the left Click the boxes of the items you want in your CSV Export and uncheck the crap you don't want Click Export Data at the bottom and let it go. You can click Close in the bottom left (which Cancel turns into Close when the Export is running). You can come back to the CSV Export and you'll see completed or failed exports and you can download the results by clicking what is shown below It's that easy.
  6. With the F5 BIG-IQ tool you can update the admin and root passwords for all your devices you manage or just a select few and its fast and very easy to do. When you manage BIG-IP device from BIG-IQ Centralized Management, it is good practice to change the default admin and root passwords on a regular basis. From BIG-IQ, you can change the passwords for several BIG-IP devices at one time. Note: You can change the passwords for several BIG-IP devices simultaneously only if they have the same password. Important: The passwords for the BIG-IP devices you select must all be identical. On the top of the BIG-IQ GUI, click Devices tab. On the left, click PASSWORD MANAGEMENT > Change Device Passwords . Near the top of the screen, click the Create button. In the Name and Descriptions fields, type a name and optional description to help you identify this task. From the Available list, select devices and move them to the Selected list. Select an option for the Change Password setting. Provide the old and new passwords, as required. Click the Run button at the bottom of the screen. BIG-IQ will apply the new password to all of the selected BIG-IP devices. You can view the status of this task from the Change Device Passwords screen. REFERENCE: https://support.f5.com/csp/article/K25546160
  7. this will be the description of the different modes Topology Load Balancing Mode Topology is a proximity based load balancing mode that allows you to direct traffic by defining topology records and selecting the Topology load-balancing mode for the wide IP or pool. The Topology mode bases the distribution of requests on the topology records and the weighted scores configured for each record. The topology records direct DNS queries to the closest virtual server, based on geographical information. The BIG-IP DNS system is designed to support an unlimited number of topology records. The only limit is the amount of memory available to the gtmd process. When planning topology load balancing, you should consider the following factor: The BIG-IP DNS system looks up topology records in the order they appear in the Configuration utility and the configuration file. As a result, you should place more-specific topology records toward the top of the topology statement and less-specific records toward the end of the topology statement. You can change the order of existing topology records by clicking Change Order on the Topology Records page. Topology record format Topology records are stored in the bigip_gtm.conf file on the BIG-IP DNS system and are used to match a Local Domain Name System (LDNS) request with a specific destination object. A topology record has the following fields: an LDNS request source statement, a destination statement, an operator, and a weight. LDNS Request Source. The LDNS request source statement defines the origin of a name resolution request. For example, the topology statement can be defined to direct an LDNS request from a particular source to a desired destination. The LDNS source can be any of the following elements: Continent Country ISP IP subnet (CIDR format) Region (user-defined) State Geolocation ISP (12.0.0 and later) Destination A destination statement defines the resource to which the BIG-IP DNS system directs the incoming DNS request. For example, the topology statement can be defined to direct an LDNS request that originates from a particular source to any of the following destination elements: Continent Country Data center * ISP IP subnet (CDIR format) Pool of virtual servers Region (User-defined) State Geolocation ISP (12.0.0 and later) Operator An operator statement indicates whether the name resolution request matches the statement. You can select an operator for both a request source and a destination statement. For example, an operator statement can be one of the following: is is not Weight (score) The weight specifies the score that will be given to a destination object which matches the topology record. In the event that a name resolution request matches more than one topology record, the BIG-IP DNS system uses the destination object with the highest weight to determine which statement it uses to load balance the request. Understanding topology records matching modes and the importance of order The BIG-IP DNS system orders topology records based on how the records are created and whether Longest Match is enabled. Topology records are passed through in order looking for the first matching record for each possible destination. Each matching record is then evaluated to determine which destination has the highest weight. This means that if a pool contains four pool members there may be up to four matching records (one for each possible destination), at which point the weight of each is evaluated to determine which record to use. Longest Match (enabled) The Longest Match option, which is enabled by default, instructs the BIG-IP DNS system to use the topology statement that most completely matches the source IP address of the name resolution request. The Longest Match option ensures that the BIG-IP DNS system processes topology records as fast as possible. The system achieves this by automatically sorting the topology records so that the records that more specifically match the LDNS IP appear first in the topology list. When the Longest Match option is enabled, the BIG-IP DNS system evaluates all records in the topology statement and uses the record that most completely matches the source IP address of the name resolution request. In the event that a name resolution request matches more than one topology record, the BIG-IP DNS system uses the destination object with the highest weight (score) to determine which statement it uses to load balance the request. Longest Match (disabled) If the Longest Match option is not selected, the topology records can be manually ordered, but the method used to evaluate the topology records when choosing a match does not change.
  8. The disadvantage of going with 8' panels (which have three 2x4's with around 17 dog ear boards) is they are set for a completely even ground and many landscapes aren't exactly even.
  9. Our friends need help to build a privacy fence since they are getting crazy high quotes of tens of thousands of dollars to build a simple privacy fence. Here are the basics on how I attack building a privacy fence Getting Started Preparation mark out where your fence is going call miss dig to make sure you aren't going to hit any under ground wiring get a building permit from your city measure the total area (length of each leg) to help price out material Gather tools and material To dig a post hole and set a post in concrete, you’ll need some tools: Post hole digger or power auger (the towable auger at home depot is roughly $124/day and can be operated by one person and saves your back) Cordless drill Screws (2" deck screws for a 5lb box around $30/box and the 1-1/4" deck screws for a 5lb box run around $30) Hammer Box Level Tape Measure Flat Shovel Bucket/wheel barrow to mix concrete in Heavy String (500ft is around $10) Quick-set concrete (an 80lb bag should cover 2-3 posts on avg and costs around $5/bag) Access to water Wooden Stakes (used to mark out the fence line, todays cost for a 12pack of 1 in. x 2 in. x 2 ft runs around $7) 4x4 8' pressure treated boards 2x4 8' pressure treated boards 6" x 6' Dog Ear fence boards Mark your fence run The first step to any fence project is marking the exact location of your fence run. To do this, drive stakes into the ground at the corners and ends of your fence run. Stretch heavy string between the stakes and pull tight. This string line will help you set your fence posts in a straight line. Mark your post hole locations Next, you’ll want to mark your post hole locations along the string line. Post hole spacing is dependent on the width of your fence panels and the method by which you are attaching them to the posts. Typical post spacing is 6-7 feet, but can vary depending on the width of the fence panel. I don't like going past 7' since you'll start noticing over time fence sagging. There are two main methods for attaching the fence panels to the posts – Face Mount or Between the Posts, for our fence we are going with Between the posts since it incorporates the 4x4 posts and makes the fence look good from either side. Start digging Now that we’ve marked our post locations, it’s time to start digging. In general, the post hole should be one third as deep as the fence is tall. So, if you’re installing a 6-foot tall fence, your 8' post hole should be at least two feet deep. You’ll also want to be sure the bottom of the post sits below the frost line. Hole is typically 6" wide by 2' deep. You can use a post hole digger or power auger to dig the hole. A post hole digger is a manual tool and will get the job done in average soil. If you have hard, rocky soil or a lot of roots – you may want to opt for a power auger. Many home improvement stores have them available for rent. Set posts in holes Set your post in the hole. Check for plumb and make sure the front of the post is just touching the string line. This will help you set your fence posts in a straight line. Having a friend help you will make this much easier. Pour the quick-setting concrete mix directly into the hole and pour water on top. Mix it up with a shovel in the hole, which will simultaneously remove air pockets. Once the concrete is thoroughly mixed, push some soil back on top of it. Re-check that your post is plum. NOTE: I will use a wheelbarrow to mix my concrete to a peanut butter consistency. With a hose I'll wet the bottom sides of the 4x4 that is in the hole and then start shoveling with my flat shovel the concrete from the wheel barrow into the hole using a stick or the handle end of the shovel to stab the concrete in attempt to remove any air pockets. Then once I verify the post is plum/level on the two sides, I'll pack the concrete by using my hand (with a glove) and then covering it with dirt. Pause for concrete to set Typically I like to wait for 12 hours after pouring concrete in the holes to let the concrete set and harden. Its no good to have done all that work to have your posts move on you while you are trying to install the dog ears. Mark 4x4's On each 4x4, from the ground up, measure 12" and mark. Measure 38" from bottom of 4x4 and mark. Measure 64" from bottom and mark. You'll want to see these marks on each of the inside of the 4x4's (the side that is facing the next 4x4) Install Rail Brackets Since we are going Between the posts for a cleaner look, we utilize Galvanized Rail Brackets that we attach to the inside of the 4x4's (bottom of rail bracket on the lines you marked at 12, 38 and 64" from the ground). Place rail bracket with bottom of bracket touching the marked line and put one screw in at the top of the rail bracket. Using a level measure vertically to make sure its straight up and down and run another 2" wood deck screw in the bottom of the rail bracket. Continue this until you have three rail brackets on each side of every 4x4. Again, you should be using 2" Wood Deck Galvanized Screws (they don't rust). Attach Pressure Treated 2x4s in Rail Brackets Measure length between 4x4 to 4x4 and cut three 2x4s to length and slide into Rail Brackets and fasten 2x4 to rail bracket using 1-1/4" Wood Deck Screws. Run Guide String 4x4 to 4x4 Using that heavy duty string. Run from top of 4x4 to top of 4x4 so you know how high your dog ear boards go (never higher and never lower). To attached string you can put a screw in the top of the 4x4 and wrap string around screw then tighten screw. Attach dog ear boards There are two major kinds of dog ear boards. The inexpensive pine at todays prices in Michigan is around $2.50 a board but typically when you see a privacy fence that looks dirty its typically the pine since it doesn't weather well but looks great for the first year. Another choice is to use the more expensive cedar at around $4/board here in Michigan at todays prices. Using your 1-1/4" Wood Deck Screws you attach the dog ear board to the 2x4's keeping a small gap between dog ear boards for expansion.
  10. Having an issue with a user trying to authenticate with ssh to F5 LTM and failing but they can log into F5 LTM via GUI with no issues. Start with running a tcpdump (obviously replace <client ip address> with the IP address of the device attempting to login with SSH) tcpdump -s0 -ni eth0 host <client ip address> -w /var/tmp/sshdeny.pcap -v Then evaluate your capture.
  11. When this coronavirus is over and life returns to what we call normal, may we never, ever take for granted again..... A handshake or a kind word from a stranger A hug from a friend Worshipping with other believers in a crowded church service A boring night at home Full shelves at the grocery store A Friday night out with the wife or husband at your favorite restaurant Looking for a parking space at your kid's ballgame Coffee with a long-time friend Kisses on the cheek by your grandchild Conversations with neighbors Long walks with the dog Wedding ceremonies for someone special in your life A busy day at the office Saying goodbye in a funeral service to a loved one you won't see until you get to Heaven Each and every breath on earth When this coronavirus ends, may we find that we have become more like the person we wanted to be and were called to be and may we stay that way until God calls us home. Lord, forgive us for taking so many of your simple blessings in life for granted.
  12. Here are my notes on setting up KVM on a fresh install of CentOS 8.3 on a VMWare ESX host SETTINGS Ram: 8G Disk: 50G USER SETTINGS root / SUPERMAN! NETWORK SETTINGS (2 interfaces required) IPADDR="10.11.24.20" PREFIX="23" GATEWAY="10.11.24.1" DNS1="10.11.26.11" DNS2="10.11.27.11" DOMAIN="atic.eventguyz.com eventguyz.com" As you go through the install choose: Server with GUI Container Management Development Tools Graphical Administration Tools Headless Management System Tools 1. Start with a clean install of CentOS 8.3 2. Add proxy to /etc/yum.conf and /etc/dnf/dnf.conf 3. CPU Support for Intel VT or AMD-V: cat /proc/cpuinfo | egrep "vmx|svm" OR RUN lscpu | grep Virtualization 4. sudo yum update CHECK if its installed and running: sudo systemctl status libvirtd 5. sudo yum install @virt 6. VERIFY KERNEL MODS ARE LOADED: lsmod | grep kvm 7. TOOLS FOR MGMT: sudo dnf -y install virt-top libguestfs-tools 8. START KVM DAEMON: sudo systemctl enable --now libvirtd 9. INSTALL VIRT-MGR: sudo yum -y install virt-manager 10. CREATE NETWORK BRIDGE: sudo nmcli connection show CREATE BRIDGE ON 2nd INTERFACE nmcli connection show nmcli connection delete e4014630-448b-5ad3-4992-f4678202147c nmcli connection add type bridge autoconnect yes con-name br0 ifname br0 nmcli connection modify br0 ipv4.addresses 10.6.0.136/27 ipv4.method manual nmcli connection modify br0 ipv4.gateway 10.6.0.129 nmcli connection modify br0 ipv4.dns 10.11.26.11 +ipv4.dns 10.11.27.11 nmcli connection delete ens224 nmcli connection add type bridge-slave autoconnect yes con-name ens224 ifname ens224 master br0 nmcli connection show nmcli connection up br0 nmcli connection show br0 ip addr VERIFY KVM INSTALLED lsmod | grep kvm HELPFUL TOOLS dnf -y install virt-top libguestfs-tools START/ENABLE KVM systemctl enable --now libvirtd MANAGE KVM VIRTUALS IN GUI yum -y install virt-manager dnf install virt-install virt-viewer libguestfs-tools systemctl enable libvirtd.service systemctl start libvirtd.service systemctl status libvirtd.service ip r BEFORE STP=yes BRIDGING_OPTS=priority=32768 TYPE=Bridge PROXY_METHOD=none BROWSER_ONLY=no BOOTPROTO=none DEFROUTE=yes IPV4_FAILURE_FATAL=no IPV6INIT=yes IPV6_AUTOCONF=yes IPV6_DEFROUTE=yes IPV6_FAILURE_FATAL=no IPV6_ADDR_GEN_MODE=stable-privacy NAME=br0 UUID=b5a9dc97-ebd9-43aa-ba1f-88b308663a02 DEVICE=br0 ONBOOT=yes IPADDR=10.6.0.136 PREFIX=27 GATEWAY=10.6.0.129 DNS1=10.11.26.11 DNS2=10.11.27.11 AFTER STP=no BRIDGING_OPTS=priority=32768 TYPE=Bridge PROXY_METHOD=none BROWSER_ONLY=no BOOTPROTO=none DEFROUTE=yes IPV4_FAILURE_FATAL=no IPV6INIT=yes IPV6_AUTOCONF=yes IPV6_DEFROUTE=yes IPV6_FAILURE_FATAL=no IPV6_ADDR_GEN_MODE=stable-privacy NAME=br0 UUID=b5a9dc97-ebd9-43aa-ba1f-88b308663a02 DEVICE=br0 ONBOOT=yes IPADDR=10.6.0.136 PREFIX=27 GATEWAY=10.6.0.129 DNS1=10.11.26.11 DNS2=10.11.27.11 IPV6_DISABLED=yes systemctl restart NetworkManager.service VERIFY nmcli device SET PROXY vi /etc/wgetrc use_proxy=yes https_proxy = http://10.47.196.156:80 http_proxy = http://10.47.196.156:80 ftp_proxy = http://10.47.196.156:80 CREATE TEST INSTANCE cd /var/lib/libvirt/boot/ wget --no-check-certificate https://mirrors.edge.kernel.org/centos/8/isos/x86_64/CentOS-8.3.2011-x86_64-boot.iso wget https://mirrors.edge.kernel.org/centos/8/isos/x86_64/CHECKSUM sha256sum --ignore-missing -c CHECKSUM virt-install \ --virt-type=kvm \ --name centos8-vm \ --memory 1024 \ --vcpus=1 \ --os-variant=rhel8.1 \ --cdrom=/var/lib/libvirt/boot/CentOS-8.3.2011-x86_64-boot.iso \ --network=bridge=br0,model=virtio \ --graphics vnc \ --disk path=/var/lib/libvirt/images/centos8.qcow2,size=20,bus=virtio,format=qcow2 virsh dumpxml rhel8-server | grep vnc You need to use an SSH client to setup tunnel and a VNC client to access the remote vnc VM display. Type the following SSH port forwarding command from your client/desktop: ssh root@10.6.0.136 -L 5906:127.0.0.1:5906 List images virt-builder --list virt-builder --list | egrep -i 'debian|ubuntu' virt-builder --list | egerp -i centos virt-install \ --name fed29 \ --ram 1024 \ --vcpus 1 \ --disk path=/var/lib/libvirt/images/fed29.img,size=20 \ --os-variant fedora29 \ --os-type linux \ --network bridge=br0 \ --graphics none \ --console pty,target_type=serial \ --location 'http://fedora.inode.at/releases/29/Server/x86_64/os/' \ --extra-args 'console=ttyS0,115200n8 serial' virt-install \ --name ubu-vm-01 \ --vcpus 2 \ --memory 2048 \ --disk size=8,bus=virtio,format=qcow2 \ --boot kernel=/var/lib/libvirt/images/kernel.ubuntu,initrd=/var/lib/libvirt/images/initrd.ubuntu \ --network bridge=br0 \ --graphics none \ --console pty,target_type=sclp \ --cdrom /var/lib/libvirt/images/ubuntu-17.10-server-s390x.iso
  13. I have the need to figure out what is the best network monitoring software (free) onsite (none of that cloud stuff). Totally can not handle all the false alerts we get from the Windows based Solarwinds Orion monitoring tool. I have two primary areas of concern to monitor Infoblox F5 GTM LTM ASM Some of the contenders include: Check_MK Raw Edition: free forever Enterprise (Standard Edition): $600/year F5 LTM: integration (https://checkmk.com/integrations/f5_bigip_vserver) and (https://checkmk.com/integrations/f5_bigip_pool) and (https://checkmk.com/integrations/f5_bigip_cluster_v11) and (https://checkmk.com/integrations/f5_bigip_conns) and (https://checkmk.com/integrations/f5_bigip_vcmpfailover) and (https://checkmk.com/integrations/f5_bigip_snat) Zabbix Free F5 LTM: integration (https://github.com/c6h3un/zabbix-f5) and (https://github.com/blka/zabbix-3.0-BIG-IP-F5) LibreNMS Free F5 LTM: integration
  14. How to fix when you get the following error $ sudo yum update -y Loaded plugins: fastestmirror, product-id, search-disabled-repos Loading mirror speeds from cached hostfile * base: mirror.sjc02.svwh.net * extras: repos.hou.layerhost.com * updates: centos.host-engine.com base | 3.6 kB 00:00:00 extras | 2.9 kB 00:00:00 updates | 2.9 kB 00:00:00 updates/7/x86_64/primary_db FAILED http://mirror.centos.org/centos/7/updates/x86_64/repodata/54f2da0acb91b16db376e53c5ce78603a807fb6f45f99d8aa76112d58f722adb-primary.sqlite.bz2: [Errno 12] Timeout on http://mirror.centos.org/centos/7/updates/x86_64/repodata/54f2da0acb91b16db376e53c5ce78603a807fb6f45f99d8aa76112d58f722adb-primary.sqlite.bz2: (28, 'Operation too slow. Less than 1000 bytes/sec transferred the last 1 seconds') Trying other mirror. updates/7/x86_64/primary_db FAILED First check your repos by running yum repolist Try and clean the metadata yum clean metadata
  15. After upgrade to 8.0 I am unable to get any stats which means Applications tab doesn't work and just kicks out an error and same thing for most everything under the Monitoring tab. What did I try? I removed the BIG-IP device and readded it with same results I removed DCD and readded it back in which took about an hour each because it would hang on ES_ service What worked? These steps will only affect the configuration between the Big-IQ and the DCDs, none of the Big-IP data should be affected: From bash on the CM: reset-data-collection-cluster From bash on each of the DCDs: reset-data-collection-cluster -es Re-add the DCD devices It is important that we use the -es flag on the DCDs and NOT on the CM. This is because we want the DCDs to control the data that the CM knows about, rather than having the CM determine what data it remembers. After completing steps 1 and 2, try adding the DCDs back to the CM. If this doesn't resolve the issue, isn't anything more we can do to preserve the previous data and we'll need to go through these same steps without the -es flag on the DCDs. If there is no value in retaining the historic data, we can remove the -es flag from the second step the first time.
  16. Trying to automate the infoblox client for linux infoblox-client-master.zip infoblox-client-0.5.0.tar.gz.tar infoblox_client-0.5.0-py2.py3-none-any.whl
  17. If you are leveraging the BIG-IQ tool (version 7.x or newer) to import devices using a CSV there are a few things you should know. It would probably help to know the columns needed (note you do not include the column headers in the csv) So when you Save your CSV it MUST NOT be in UTF-8 mode or it will fail when you try and import it with incorrect Management IP Address which is the first column since the CSV import can not read a CSV saved in UTF-8 mode. Anyhow, your CSV should look something like this when your done When you click begin you will see a very boring box while it tries to import the devices
  18. We upgraded to 15.1.2.1 and now we seem to have a bunch of issues authenticating using either AD or TACACS. It requires multiple tries and then it eventually works. Our first attempt is to fix the F5 devices that are using AD only vi /etc/openldap/ldap.conf You have to add a new line Then you need to run tmsh list auth ldap system-auth referrals auth ldap system-auth { referrals yes } If its yes, then change it to no by running tmsh modify auth ldap system-auth referrals no And confirm its set by doing another list command like the one above tmsh list auth ldap system-auth referrals auth ldap system-auth { referrals no } And finally before you start testing, save the configuration tmsh save sys config Saving running configuration... /config/bigip.conf /config/bigip_base.conf /config/bigip_script.conf /config/bigip_user.conf /config/partitions/Citrix/bigip.conf /config/partitions/DNS/bigip.conf /config/partitions/Disaster.Recovery/bigip.conf /config/partitions/Integration/bigip.conf /config/partitions/Messaging/bigip.conf Now do some testing of your user account that utilizes AD to see if it works.
  19. guru

    Davison Robotics

    Today is the last day supporting the website. Some bad eggs. No longer supporting the following websites davisonrobotics.com davisonrobotics.net davisonrobotics.org team10058.com team9514.com team3534.com DONE! Yes this logo is something provided by EventGuyZ
  20. DJ Experience You want someone that knows what they are doing and will listen to your ideas, even assists you; EventGuyZ delivers on that promise. From your initial contact with our very experienced DJ, until your last smiling guest has left your event, you will feel the difference of having professional, courteous service every step of the way. EventGuyZ features: Quality Music Top Notch Equipment Extensive Event Planning EventGuyZ uses professional Computerized Performance Systems and more than 30,000 all digital music library, for a state of the art entertainment system. Pulling up requests takes mere seconds to accomplish allowing your DJ/MC more time to focus on you and your guests. Your music will be skip-free, crystal clear and distortion-free. You are also getting: Experienced DJ/MC Wireless Microphones All Digital Music Library Online Event Planning Online Music Database Unlimited planning sessions with your DJ/MC Over 30,000 Songs Plus over 20,000 Karaoke Songs Our personalized attention is focused on the clients we are entertaining. PROFESSIONAL / FULL-TIME / LICENSED / INSURED / GUARANTEED
  21. Price is per day cost so change QTY for # of days. 

    Cost includes 2 speakers, 2 speaker stands and 2 soft cases.(Free Delivery and Setup within the Mid-Michigan area. Delivery charges will apply for outside Mid-Michigan area)

    ZLX-15BT

    15" powered loudspeaker with bluetooth audio*

    High‑quality Bluetooth audio streaming for background music or musical accompaniment.

    QuickSmartDSP features best‑in‑class processing. Easy setup via four presets, sub/top system‑match, two‑band EQ, five user‑programmable presets, visual monitoring of limiter status, input level control and meters, and master volume control to optimize gain structure, all via LCD.

    High‑efficiency 1000 W Class‑D power amplifier delivers up to 127 dB peak SPL utilizing transducers designed and engineered by EV.

    EV‑patented Signal Synchronized Transducers (SST) waveguide design provides precise and consistent coverage, minimal distortion, and maximized acoustical loading.

    Three optimally located handles combined with a rugged composite structure provides the most portable professional sound speaker on the market.

    NOW STREAMING: Electro-Voice ZLX best-selling speaker family adds Bluetooth audio streaming models

    ZLX portable loudspeakers offer the best performance and reliability in their class — with components and engineering that work together to make it quicker and easier than ever to take control of your sound, whatever the gig. Now with Bluetooth enabled wireless audio streaming, legendary ZLX performance becomes even more convenient with the ability to connect to any mobile device for streaming your music library.

    Featuring custom drivers housed in an innovative cabinet design, the two new wireless, compact, and versatile ZLX models make EV's renowned sound quality and rugged reliability more accessible than ever before.

    $170
  22. Price is per day cost so change QTY for # of days. 

    Cost includes 1 speaker, 1 speaker stand, 1 soft case (Free Delivery and Setup within the Mid-Michigan area. Delivery charges will apply for outside Mid-Michigan area)

    ZLX-15BT

    15" powered loudspeaker with bluetooth audio*

    High‑quality Bluetooth audio streaming for background music or musical accompaniment.

    QuickSmartDSP features best‑in‑class processing. Easy setup via four presets, sub/top system‑match, two‑band EQ, five user‑programmable presets, visual monitoring of limiter status, input level control and meters, and master volume control to optimize gain structure, all via LCD.

    High‑efficiency 1000 W Class‑D power amplifier delivers up to 127 dB peak SPL utilizing transducers designed and engineered by EV.

    EV‑patented Signal Synchronized Transducers (SST) waveguide design provides precise and consistent coverage, minimal distortion, and maximized acoustical loading.

    Three optimally located handles combined with a rugged composite structure provides the most portable professional sound speaker on the market.

    NOW STREAMING: Electro-Voice ZLX best-selling speaker family adds Bluetooth audio streaming models

    ZLX portable loudspeakers offer the best performance and reliability in their class — with components and engineering that work together to make it quicker and easier than ever to take control of your sound, whatever the gig. Now with Bluetooth enabled wireless audio streaming, legendary ZLX performance becomes even more convenient with the ability to connect to any mobile device for streaming your music library.

    Featuring custom drivers housed in an innovative cabinet design, the two new wireless, compact, and versatile ZLX models make EV's renowned sound quality and rugged reliability more accessible than ever before.

    $85
  23. Ran into an issue with a security audit being performed found that our NetMRI appliance has TFTP open and thats just no good so here is how you disable TFTP (block) since there is no way to turn off TFTP in NetMRI The attached diagnostics allow you to update the NetMRI appliance IP Tables (firewall) configuration to Reject and Accept tftp traffic. The diagnostics can be applied using the "diag <filename.gpg>" command from the NetMRI admin shell. EXAMPLE: EGserver001> diag IPTables-REJECT-TFTP.gpg +++ Processing Diagnostic File IPTables-REJECT-TFTP.gpg +++ Checking Digital Signature +++ Unpacking Diagnostic Directory ------------------------------------------------------------------------- DESCRIPTION: IPTables-REJECT-TFTP This diagnostic will change the TFTP PORT (port 69) from ACCEPT to REJECT IPTABLES will then be reloaded ------------------------------------------------------------------------- Do you want to execute this script? (n|y): y +++ Executing Diagnostic Script Legacy library ctime.pl will be removed from the Perl core distribution in the next major release. Please install it from the CPAN distribution Perl4::CoreLibs. It is being used at COMMON.pm, line 3. Legacy library ctime.pl will be removed from the Perl core distribution in the next major release. Please install it from the CPAN distribution Perl4::CoreLibs. It is being used at COMMON.pm, line 3. +++ Loading Server Configuration Version : 7.4.5.99860 SerialNo: 4850201603100009 Network : EventGuyZ *** Creating a backup of exiting IPTABLES Contents *** *** Modifying IPTABLES Contents *** patching file iptables Hunk #1 succeeded at 38 (offset -14 lines). *** Reloading IPTABLES Chains *** Redirecting to /bin/systemctl restart iptables.service *** Successfully modified IPTABLES and Reloaded IPTABLES Chains *** EGserver001> IPTables-REJECT-TFTP.gpg IPTables-ACCEPT-TFTP.gpg
  1. Load more activity
×
×
  • Create New...