Posts Tagged ‘Solairs’

Free Hands On Practice Lab For Solaris 11

July 1st, 2023, posted in Solaris
Share

Hi, I was doing some researching on database migration from AIX and Solaris and I found some interesting stuff..

Oracle has provided some free lab session for new Solaris administrators to get their hands dirty..
If you are new to Unix and want to try them out, you can check out the links below !!

Just a side note, I came to know about Wintel environments, either  Oracle/MSSQL on Windows Server 2008/2012. It was a utter pain to work with the permissions and services. Unix/Linux is still better enterprise operating systems.

Share

FIND FILES BETWEEN TIME FRAMES

November 13th, 2021, posted in Solaris
Share

Example 1:
You want to find files between specific time frame and move them to different directory. You can use the -newer or -newmt option with find command.

In this below example I am creating 2 dummy files with different timestamp and moving any files found between those time frames are moved to directory /var/tmp/Archive.

touch -t 201310040000 first
touch -t 201410040000 last
# find . -newer first ! -newer last -type f -exec mv {} /var/tmp/Archive;

Example 2:
In this example, I am listing files between Oct 04 2013 and Oct 04 2014.
Sed command is for replacing dot ‘.’ with blank space before the file name.

#find . -newermt “2013-10-04 00:00:00” ! -newermt “2014-10-04 00:00:00” | sed ‘s/.///g’|xargs ls -l


If you require more information or any questions on the above commands please comment below.

Reference: http://linux.about.com/od/commands/l/blcmdl1_find.htm

Share

REMOVE A FILE STARTING WITH A Dash “-“

September 26th, 2021, posted in Solaris
Share

ls |grep -i file
–file1

$ rm –file1
rm: illegal option — file1
usage: rm [-fiRr] file …

rm “–file1”
rm: illegal option — file1
usage: rm [-fiRr] file …

Solution:
$ rm ./–file1
$ ls|grep -i file

Share

ENABLE HTTPS ON ORACLE M SERIES SERVERS(XSCF)

September 4th, 2021, posted in Solaris
Share

If you have not enabled https on your M series servers, this is how you enable it.

 

Description From Oracle :
Hypertext Transfer Protocol (HTTP) over an authenticated/encrypted connection allows you to use the XSCF web browser securely. This is called the HTTPS service. Authentication is provided with a certificate authority and private keys. To use the HTTPS service, you must enable it, and provide an optional port number. The default port is 443. To enable HTTPS service, use the sethttps command”


1) Login to your xscf of the server through ssh
Assuming you have already configured network on xscf and enable ssh. If not, you can login through console/console server, configure network interface on xscf and then you can proceed with further steps.


2) Once you are in xscf, check the status of https
XSCF> showhttps
HTTPS status: disabled
 


3) Generate a self signed certificate.
XSCF> sethttps -c selfsign US California Irvine mycompany myemail@myemail.com
CA key and CA cert already exist. Do you still wish to update? [y|n] :y
Enter passphrase:
Verifying – Enter passphrase:


4) Check the HTTPS Status
XSCF> showhttps
HTTPS status: disabled
Server key: installed in Jul 16 12:46:20 MST 2013
CA key: installed in Jul 16 12:46:18 MST 2013
CA cert: installed in Jul 16 12:46:18 MST 2013
CSR:
—–BEGIN CERTIFICATE REQUEST—–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—–END CERTIFICATE REQUEST—–
It will be still disabled, we haven’t enabled the https yet.


5) Now we shall enable https:
XSCF> sethttps -c enable
Continue? [y|n] :y
Please reset the XSCF by rebootxscf to apply the https settings.


6) Reset XSCF
XSCF> rebootxscf
The XSCF will be reset. Continue? [y|n] :y
execute S10ioxoffXSCF>   —  complete
Jul 16 12:48:35 myhost XSCF[104]: XSCF shutdown sequence start
execute K000end  —  complete
execute K100end  —  complete
execute K101end  —  complete
<Lines Omitted>


7) Once the XSCF is up check the https status, now it will be enabled.
XSCF> showhttps
HTTPS status: enabled
Server key: installed in Jul 16 12:52:04 MST 2013
CA key: installed in Jul 16 12:52:04 MST 2013
CA cert: installed in Jul 16 12:52:04 MST 2013
CSR:
—–BEGIN CERTIFICATE REQUEST—–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—–END CERTIFICATE REQUEST—–


8) Login to XSCF from your web browser and confirm everything is operational.
https://<your_xscf_hostname_or_ip>


REFERENCES :
Share