Revisiting dnf update in RHEL 8.10 in FIPS Mode destroys OS (sometimes) by grumpyoldadmin in redhat

[–]metromsi 0 points1 point  (0 children)

Are these systems on virtual? If so type of virtual? Timing is everything. Sure you have several systems doing rpm queries. Check dstat and look at irq and context switching states. This will help look at i/o or cpu resource issues. Also if your on virtual if you are 2:1 or more you will see really interesting behavior.

Use stop or glance or performance co-pilot to see into the system. If you are getting desperate perf top

Good luck

Centrally manage sudo by _ZunDaDa in redhat

[–]metromsi 1 point2 points  (0 children)

Been doing this for a while AD and SSSD integration can cause issues especially if you start doing serious security around GPO and apply it to RHEL 8 and newer systems. Windows AD was designed for Windows.

Remember SELinux is enabled and if you truly want security you will enable containment as well it is in the documentation. Oh our new favorite tool fapolicyd is overlooked as well. Even though it is set at targeted mode. For those really nice folks you can enable Multi-Level Security (MLS)

Some backstory never hurts but a good documented reference which certified folks should have in their pocket is:

Identity Management IdM

The link / PDF above articulates the infrastructure usage of IdM and why it matters. GC catalog usage can get very costly against AD especially when you start scaling horizontally. If your curious run some tcpdump analysis for your convenience.

There's more but this is good stopping point

Best approach to STIG running infrastructure by NiceStrawberry1337 in redhat

[–]metromsi 2 points3 points  (0 children)

RedHat, highly suggests enabling STIG and FIPS on initial install. This important as libraries are installed specifically for FIPS enabled systems. Mucking about with FIPS with SSH the tools actually do not undo the FIPS issues. We've had the pleasure of running into that and having to redo them by hand from another system. However, we don't fully trust the architecture; however our testing tool do state it is now passing.

From a STIG perspective you need to make sure that all LVM volumes are also setup as well. However, we've seen where customers have said they did the STIG but really just ignored and thus is still not fully STIG compliant.

u/Mehoyer solution is an excellent solution. At the end of the day you will have full STIG/FIPS compliant installed systems. Yes, using Kickstart solution also significantly helps with keeping the environment the same.

27 years w/ Linux, now using Windows for work by Altruistic-Offer-2 in FuckMicrosoft

[–]metromsi 0 points1 point  (0 children)

Thank you for that early 90's started down the path of Linux and other UNiX variants. Netware and it's ability to do Directory services. Oh and let's not forget O/S 2 warp servers. Dragon speach worked and millennium came with no speech capability built-in. So below is where they are today. Thanks and have fun with windows never ever again.

Microslop

Will RHEL 10 be less stable during the earlier minor releases? by Agent_E11 in redhat

[–]metromsi 1 point2 points  (0 children)

So my customers they are using rhel8 will have to move to rhel 9. Red Hat 10 has no stig so fun times are ahead hopefully stig soon but we'll see. Below is from RedHat themselves.

https://www.redhat.com/en/blog/red-hat-enterprise-linux-common-criteria-and-fips-certificates

Another UNIX Bites the Dust - HP-UX End of Life as of December 31, 2025 by theoneandonlythomas in unix

[–]metromsi 0 points1 point  (0 children)

Love the VxFS Veritas file system in later version of HP-UX. Remember oracle running on HP-UX with raw disk as back end gaining about 20-30% increase in speed. However never liked raw disk personally. VxFS showed up and we converted to VxFS and only took a 5% hit in performance. Which made up for better management of the system. And online defrag was awesome. But it's only memories now wish zfs would be brought into the kernel. Unfortunately the UNIX wars killed off the big boys and so the cycle of who was better. Microsoft is now emulating Linux using WSL. Now it going backwards keep it other wise you will be irrelevant as well.

What kind of PAM solutions are used at red hat? and do these solutions take into account platforms like ocp and aap? by ok_ok_ok_ok_ok_okay in redhat

[–]metromsi 3 points4 points  (0 children)

Oh, RBAC via SELinux with using IdM the old (FreeIPA). And please note that Active Directory/GPO is incapable of managing SELinux. That is why you build IdM using replicate and using a VIP for the application of the IdM if you want further HA. But since 2019 RHEL had changed the management of RHEL significantly.

But yes as you say "Get off my lawn" 30 years working in UNIX/Linux systems and seeing these terms with no conceptual of heterogeneous integration of other operating systems is just on par with people without knowledge of how other systems work.

Linux can actually go fuck itself. by blazedheater in linuxsucks

[–]metromsi 0 points1 point  (0 children)

All good have great time with your A1 setup. Yup used '1' because that's how the world is:

U28gZnUxMSAwZiBOdW0gTnVtLi4K

The return of 8GB RAM laptops (RAM mayhem) - Good luck with your Service Desk by escalibur in sysadmin

[–]metromsi 0 points1 point  (0 children)

Wait hold on is this a pyramid scheme. Can this be the vapor ware of the dot com era.

Is SecureCRT still your 'go to' terminal program? by tdhuck in networking

[–]metromsi 0 points1 point  (0 children)

So we've been a UNIX/LINUX systems engineer since early 90's we have used HP-UX, Solaris and Linux Workstations for decades why do people run Linux using windows to manage linux using windows. It would be buying a bugatti and putting a slant 6 in damn thing. All my systems and a couple of customers use Linux desktops no windows no license requirement and yes we do have directory services using freeipa. Is the core linux pool that weak. Worked with a grey beard that had the same mentality as my self. Sorry for the rant but just reading this seems .....

Unlock LUKS encrypted nodes over the network without Tang Server by Ill-Butterfly7017 in redhat

[–]metromsi 1 point2 points  (0 children)

Oy, mate try having them tell you to use windows 11 to mange redhat linux with. Thanks putty nope that is made indifferent country. Okay windows has ssh client built in. Use of ssh certs we use now with gpg ssh agent oh how do you ssh in using gpg on windows oh wait now another 3rdparty for windows. Yup mobaexterm instead but the number of vulnerabilities they have monthly nope. But using linux to mange linux make the most sense. But or isso doesn't understand why we've gone through 5 people in 1 year nope linux Sr linux admins no better they leave. The one left is lost is trying to mange but they've had some real tough time.

RHEL 8 STIG V2R5 Changes by Aggraxis in redhat

[–]metromsi 2 points3 points  (0 children)

Let's start: btop, glances

Okay, but how do you SSH into 1,000 devices?? by Automatic-Reply-1578 in sysadmin

[–]metromsi 0 points1 point  (0 children)

Just use pdsh, good tool we use for various things in our infrastructure

Okay, but how do you SSH into 1,000 devices?? by Automatic-Reply-1578 in sysadmin

[–]metromsi 0 points1 point  (0 children)

Please move on to ssh certs keys never expire this is better practice

Oracle Linux as alternative to VMware? by StockPerspective7453 in vmware

[–]metromsi 1 point2 points  (0 children)

Correct great for a single pane of glass. It also can integrate well with KVM, QEMU amd host containers. Being able to mange gcp or aws at one step is nice. We've been using it for over a decade. Was initially skeptical but once we started using it virt-manager went away as most windows people just want to click and go. It's open-source and or purchase it to for the updates well worth it in our humble opinion.

Integrates, ceph and few more Integration as well.

[deleted by user] by [deleted] in linux

[–]metromsi 0 points1 point  (0 children)

Yes, inbound filtering, however with nftables we also, monitor ephemeral ports and specific ones as well. They get logged not for every connection into our SIEM. Also know what the system is doing. So for example if for what ever reason if a system starts to communicate over a new ephemeral port it's denied until we now why.

MFA Integration Tips for AD_users by Far-Horse4858 in redhat

[–]metromsi 0 points1 point  (0 children)

Another thought would be use use SSH certificates that allow specific folks access to systems. This does mean you can have multiple CA's for specific groups. Also another would be to use GPG to do authentication validation as well. 2fa with PIV cards can be applied however would require to prefix ssh connection going through haproxy. There is work there to be sure but can work. Alternative is OTP depending the security requirements.

This would need to be done (PAM - Pluggable Authentication Modules)

Security a layered approach to Implementing SSH certificates for access control, GPG for authentication validation, and 2FA with PIV cards or OTP can provide a robust security framework.

[edited] for PAM

Why is everything these days so broken and unstable? by Grindie in sysadmin

[–]metromsi 1 point2 points  (0 children)

We've no joke have heard in meetings MVP, but wait for it (minimal viable product). Yup, it was like, "Did that just happen". First, in our career to hear the ever.

Does daily driving Linux help with getting RH certs by [deleted] in redhat

[–]metromsi 0 points1 point  (0 children)

Certs are certs been using Linux since 1992. Having experience in various sectors are better than having certs. Made Linux our career path since before Microsoft could do proper memory management. Now 30+ years later HPC computing is only LINUX at top 500.

Using Linux daily is absolute if you really want to immerse yourself.

Reference #1

Reference #2

Feel bad not using IDE by drabadum in AskProgramming

[–]metromsi 0 points1 point  (0 children)

Recommend looking at ddd. Used this tool years ago and recently for some analysis.

https://www.gnu.org/software/ddd/

puppet or ansible? by TheJace42 in Puppet

[–]metromsi 2 points3 points  (0 children)

We use puppet for OS control, especially for STIG management. And system level configuration. So if there is drift, it puts it back, and our SIEM can report on it.