This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Tuesday, November 24, 2020

Getting Started with VMware ESXi on ARM with a Raspberry Pi

 

Getting Started with VMware ESXi on ARM with a Raspberry Pi





Raspberry Pi

Last month VMWare released what they have called ESXi Arm-fling. This new release allows you to install the same ESXi you know and love on an ARM processor. VMWare has certified a few systems for datacenter use. They also have certified it for the Raspberry Pi 4, but only for what they call “Far Edge”.

Today we are going to perform the installation on a Raspberry Pi 8GB and do some testing. While we generally feel ProjectTinyMiniMicro may be a better option for some, there are many enthusiasts who sing the praises of the Raspberry Pi. The Pi has exceptional power efficiency, scalability, and a small footprint.


Raspberry Pi 4 CanaKit and a LovePI PoE HAT

Before we continue, it is worth noting that this installation is a little bit different than other Raspberry Pi installations. We will need a total of three different pieces of storage to complete this installation. You need a microSD card for the firmware, but in this guide that is ALL the microSD card will be used for. Then you will need a USB thumb drive to act as your VMWare installer. Finally, you will need a place to install VMWare to. While it is possible to install it to your microSD card, that is not officially supported. Instead, you want to look at a USB based solution or a network solution such as PXE or iSCSI.

Preparing our Pi for ESXi

You will need to grab the NOOBS image and burn it to your microSD card if you did not buy a kit with it preinstalled as we had. To do so you can utilize the Raspberry Pi Imager.

When the NOOBs installer boots up, select the Raspberry Pi OS Lite (32-bit) option. You do not need the full desktop version. We are only using the OS to update the EEPROM and get some other updates out of the way.


NOOBS Selecting Raspberry Pi OS 32-bit

When the installation is completed, run the following commands:

sudo rpi-eeprom-update -a
sudo reboot

After you have completed the EEPROM update, we need to now update the firmware and switch to the community UEFI firmware. First, start by going to the Raspberry Pi Github page and download the latest firmware. Next, go to pftf’s UEFI Github page, and download it as well.

Safely shutdown your Pi and take the microSD card out. Next, plug your microSD card into a computer and prepare to update the files on it. To get started, we need to format the RECOVERY partition and rename it UEFI:


SD CARD Format for UEFI

Next, drag and drop the new files from the boot folder in the firmware-master onto the SD card. Start by going to the firmware-master folder and selecting everything. Once completed, you must remove the four files starting with the name “kernel”:


VMware ESXi Raspberry Pi Kernel in firmware-master

Next, do the same thing for the files from the UEFI firmware. Make sure you replace/overwrite the files with the updated ones.


VMware ESXi Raspberry Pi UEFI Setup

Now, open the config.txt file in the UEFI drive. We need to modify it by adding a line

gpu_mem=32

You can now put the SD card back into your RPI.

Setting up ESXi for ARM

To get started you will need to navigate to VMware’s page for ESXi for ARM. Once there you will need to create an account and download the ISO. You will need to burn this ISO to a separate USB thumb drive. To burn it to the drive, you can utilize Rufus.


Rufus Esxi for Raspberry Pi

After you have burned the ISO to your thumb drive, you need to plug it into your Pi and turn it on. You will see a new UEFI boot menu, press escape, and get into the UEFI to make any changes.

Click on Device Manager and then click Limit Ram to 3GB and change it to Disabled.


Unlimited RAM

Press F10 and save the change you made. Exit the UEFI and press Enter to boot to the USB drive. The system will then boot into the ESXi installer. One option for installing ESXi to an SSD, using something like a Startech USB3.0 to SATA adapter. Another option is to install it to another USB thumb drive and use iSCSI storage for your VMs.


Intel DC S3500 SATA SSD with StarTech USB adapter

Select your disk, it has to be one other than the USB installer drive or the microSD card. Once you have selected your disk, the installer will format it and destructively remove all data. You need only to assign a password and installation will begin. When you are done, simply remove the installation media and reboot.

Getting Started in VMware ESXi on the Pi

To get started, open a web browser on another computer and point it to the IP of your Pi. Once there, you should see the familiar ESXi home page. 


VMware Esxi Home with VMware ESXi on Arm Fling Label

The first step we should do is to add our NTP servers. Go to Manage then to System and finally to Time and Date. Add some NTP servers, then click on Services and start the ntpd service.


VMware ESXi on Arm Fling Time And Date

If you wanted to add iSCSI storage you can. For my testing, I added a 1TiB iSCSI LUN from my production TrueNAS Core box.



VMware ESXi on Arm Fling iSCSI

Additionally, you can add it to a vCenter just like a normal ESXi host. You simply right-click on a datacenter, press Add Host, type your IP address, credentials and select a license.


VMware ESXi on Arm Fling vSphere

At this point, you are basically ready to get going with the VMware ESXi on Arm Fling using your Raspberry Pi.


Share:

Friday, October 30, 2020

How To Install Ownlcoud on ubuntu

 In this article, you will learn how to install OwnCloud on Ubuntu 18.04 and newer versions.

Step 1: Update Ubuntu System Packages

Before getting started, update the system packages and repositories using the following apt command.

$ sudo apt update -y && sudo apt upgrade -y
Update Ubuntu System Packages
Update Ubuntu System Packages

Step 2: Install Apache and PHP 7.2 in Ubuntu

OwnCloud is built on PHP and is typically accessed via a web interface. For this reason, we are going to install the Apache webserver to serve Owncloud files as well as PHP 7.2 and additional PHP modules necessary for OwnCloud to function smoothly.

$ sudo apt install apache2 libapache2-mod-php7.2 openssl php-imagick php7.2-common php7.2-curl php7.2-gd php7.2-imap php7.2-intl php7.2-json php7.2-ldap php7.2-mbstring php7.2-mysql php7.2-pgsql php-smbclient php-ssh2 php7.2-sqlite3 php7.2-xml php7.2-zip

PHP 7.2 isn’t available on Ubuntu default repositories… in order to install it, you will have to get it from third-party repositories.

Run the commands below to add the below third party repository to upgrade to PHP 7.2

sudo apt-get install software-properties-common
sudo add-apt-repository ppa:ondrej/php

Install Apache and PHP in Ubuntu
Install Apache and PHP in Ubuntu

Once the installation is complete you can verify if Apache is installed by running the dpkg command.

$ sudo dpkg -l apache

From the output, we can see that we have installed Apache version 2.4.29.

Check Apache Version in Ubuntu
Check Apache Version in Ubuntu

To start and enable Apache to run on boot, run the commands.

$ sudo systemctl start apache2
$ sudo systemctl enable apache2

Now head over to your browser and type in your server’s IP address in the URL bar as shown:

http://server-IP

You should get a webpage below showing that Apache is installed and running.

Verify Apache Page in Ubuntu
Verify Apache Page in Ubuntu

To check if PHP is installed.

$ php -v
Check PHP Version in Ubuntu
Check PHP Version in Ubuntu

Step 3: Install MariaDB in Ubuntu

MariaDB is a popular open-source database server that is widely used by developers, database enthusiasts, and also in production environments. It’s a fork of MySQL and has been preferred to MySQL since the takeover of MySQL by Oracle.

To install the MariaDB run.

$ sudo apt install mariadb-server
Install MariaDB in Ubuntu
Install MariaDB in Ubuntu

By default, MariaDB is not secured and is prone to security breaches. We, therefore, need to perform additional steps to harden the MariaDB server.

To get started with securing your MySQL server, run the command:

$ sudo mysql_secure_installation

Hit ENTER when prompted for the root password and press ‘Y’ to set the root password.

Set MySQL Password in Ubuntu
Set MySQL Password in Ubuntu

For the remaining prompts, simply type ‘Y’ and hit ENTER.

Secure MySQL in Ubuntu
Secure MySQL in Ubuntu

Your MariaDB server is now secured to a decent level.

Step 4: Create an OwnCloud Database

We need to create a database for Owncloud to store files during and after installation. So log in to MariaDB.

$ sudo mysql -u root -p

Run the commands below:

MariaDB [(none)]> CREATE DATABASE owncloud_db;
MariaDB [(none)]> GRANT ALL ON owncloud_db.* TO 'owncloud_user'@'localhost' IDENTIFIED BY 'StrongP@ssword';
MariaDB [(none)]> FLUSH PRIVILEGES;
MariaDB [(none)]> EXIT;
Create OwnCloud Database in Ubuntu
Create OwnCloud Database in Ubuntu

Step 5: Download OwnCloud in Ubuntu

After creating the database, now download the OwnCloud zipped file using the following wget command.

$ sudo wget https://download.owncloud.org/community/owncloud-10.4.0.zip

Once downloaded, unzip the zipped package to the /var/www/ directory.

$ sudo unzip owncloud-10.4.0.zip -d /var/www/

Then, set permissions.

$ sudo chown -R www-data:www-data /var/www/owncloud/
$ sudo chmod -R 755 /var/www/owncloud/

Step 6: Configure Apache for OwnCloud

In this step, we are going to configure Apache to serve OwnCloud’s files. To do that, we are going to create a configuration file for Owncloud as shown.

$ sudo vim /etc/apache2/conf-available/owncloud.conf

Add the configuration below.

Alias /owncloud "/var/www/owncloud/"

<Directory /var/www/owncloud/>
  Options +FollowSymlinks
  AllowOverride All

 <IfModule mod_dav.c>
  Dav off
 </IfModule>

 SetEnv HOME /var/www/owncloud
 SetEnv HTTP_HOME /var/www/owncloud

</Directory>

Save and close the file.

Next, you need to enable all the required Apache modules and the newly added configuration by running the commands below:

$ sudo a2enconf owncloud
$ sudo a2enmod rewrite
$ sudo a2enmod headers
$ sudo a2enmod env
$ sudo a2enmod dir
$ sudo a2enmod mime

For the changes to come into effect restart the Apache webserver.

$ sudo systemctl restart apache2

Step 7: Finalizing the OwnCloud Installation in Ubuntu

With all the necessary configurations finalized, the only part remaining is to install OwnCloud on a browser. So head out to your browser and type in your server’s address followed by the /owncloud suffix.

http://server-IP/ownlcloud

You will be presented with a web page similar to the one below.

Create OwnCloud Admin Account
Create OwnCloud Admin Account

Just below, click on ‘Storage and database’. Select ‘MySQL / MariaDB’ under the ‘configure the database’ section and fill in the database credentials that you defined whilst creating the database for OwnCloud i.e database user, password of the database user, & database name.

Add OwnCloud Database Settings
Add OwnCloud Database Settings

Finally, click ‘Finish setup’ to wind up setting up Owncloud.

Finish OwnCloud Setup
Finish OwnCloud Setup

This takes you to the login screen as shown. Input the username and password defined earlier and hit ENTER.

OwnCloud Admin Login
OwnCloud Admin Login

A notification will be presented indicating other avenues that you can access OwnCloud from i.e iOS, Android & desktop App.

OwnCloud Supported Platforms
OwnCloud Supported Platforms

Close the pop-up to access the dashboard as shown:

OwnCloud Dashboard
OwnCloud Dashboard

And that’s it, guys! We have successfully installed the OwnCloud file sharing platform on Ubuntu 18.04.

Share:

Wednesday, September 16, 2020

How to Install Microweber CMS on Ubuntu 16.04 | 17.10 | 18.04 with Apache2, MariaDB, PHP 7.2 and Let’s Encrypt SSL/TLS Certificates

 

Step 1: Install Apache2 HTTP Server on Ubuntu

Apache2 HTTP Server is the most popular web server in use… so install it, since Microweber needs it..

To install Apache2 HTTP on Ubuntu server, run the commands below…

sudo apt update
sudo apt install apache2

After installing Apache2, the commands below can be used to stop, start and enable Apache2 service to always start up with the server boots.

sudo systemctl stop apache2.service
sudo systemctl start apache2.service
sudo systemctl enable apache2.service

To test Apache2 setup, open your browser and browse to the server hostname or IP address and you should see Apache2 default test page as shown below.. When you see that, then Apache2 is working as expected..

http://localhost

Step 2: Install MariaDB Database Server

MariaDB database server is a great place to start when looking at open source database servers to use with Magento… To install MariaDB run the commands below…

sudo apt-get install mariadb-server mariadb-client

After installing MariaDB, the commands below can be used to stop, start and enable MariaDB service to always start up when the server boots..

Run these on Ubuntu 16.04 LTS

sudo systemctl stop mysql.service
sudo systemctl start mysql.service
sudo systemctl enable mysql.service

Run these on Ubuntu 17.10 and 18.04 LTS

sudo systemctl stop mariadb.service
sudo systemctl start mariadb.service
sudo systemctl enable mariadb.service

After that, run the commands below to secure MariaDB server by creating a root password and disallowing remote root access.

sudo mysql_secure_installation

When prompted, answer the questions below by following the guide.

  • Enter current password for root (enter for none): Just press the Enter
  • Set root password? [Y/n]: Y
  • New password: Enter password
  • Re-enter new password: Repeat password
  • Remove anonymous users? [Y/n]: Y
  • Disallow root login remotely? [Y/n]: Y
  • Remove test database and access to it? [Y/n]:  Y
  • Reload privilege tables now? [Y/n]:  Y

Restart MariaDB server

To test if MariaDB is installed, type the commands below to logon to MariaDB server

sudo mysql -u root -p

Then type the password you created above to sign on… if successful, you should see MariaDB welcome message


Step 3: Install PHP 7.2 and Related Modules

PHP 7.2 isn’t available on Ubuntu default repositories… in order to install it, you will have to get it from third-party repositories.

Run the commands below to add the below third party repository to upgrade to PHP 7.2

sudo apt-get install software-properties-common
sudo add-apt-repository ppa:ondrej/php

Then update and upgrade to PHP 7.2

sudo apt update

Next, run the commands below to install PHP 7.2 and related modules.

sudo apt install php7.2 libapache2-mod-php7.2 php7.2-common php7.2-mbstring php7.2-xmlrpc php7.2-soap php7.2-mysql php7.2-gd php7.2-xml php7.2-cli php7.2-zip

After installing PHP 7.2, run the commands below to open PHP default config file for Apache2…

sudo nano /etc/php/7.2/apache2/php.ini

Then make the changes on the following lines below in the file and save. The value below are great settings to apply in your environments.

file_uploads = On
allow_url_fopen = On
memory_limit = 256M
upload_max_filesize = 100M
max_execution_time = 360
date.timezone = America/Chicago

After making the change above, save the file and close out.

Step 3: Restart Apache2

After installing PHP and related modules, all you have to do is restart Apache2 to reload PHP configurations…

To restart Apache2, run the commands below

sudo systemctl restart apache2.service

To test PHP 7.2 settings with Apache2, create a phpinfo.php file in Apache2 root directory by running the commands below

sudo nano /var/www/html/phpinfo.php

Then type the content below and save the file.

<?php phpinfo( ); ?>

Save the file.. then browse to your server hostname followed by /phpinfo.php

http://localhost/phpinfo.php

You should see PHP default test page…


Step 4: Create Magento Database

Now that you’ve installed all the packages that are required for Magento to function, continue below to start configuring the servers. First run the commands below to create a blank Magento database.

To logon to MariaDB database server, run the commands below.

sudo mysql -u root -p

Then create a database called microweber

CREATE DATABASE microweber;

Create a database user called microweberuser with new password

CREATE USER 'microweberuser'@'localhost' IDENTIFIED BY 'new_password_here';

Then grant the user full access to the database.

GRANT ALL ON microweber.* TO 'microweberuser'@'localhost' IDENTIFIED BY 'user_password_here' WITH GRANT OPTION;

Finally, save your changes and exit.

FLUSH PRIVILEGES;
EXIT;

Step 5: Download and Install Microweber

Run the commands below to download Microweber latest… Then create a root director for Microweber and unzip the content there…

wget https://microweber.com/download.php -O microweber-latest.zip
sudo mkdir /var/www/html/microweber
sudo unzip microweber-latest.zip -d /var/www/html/microweber

Next, run the commands below to change the root folder permissions…

sudo chown -R www-data:www-data /var/www/html/microweber/
sudo chmod -R 755 /var/www/html/microweber/

Step 6: Configure Apache2 Microweber Site

Finally, configure Apache2 configuration file for Microweber. This file will control how users access Microweber content. Run the commands below to create a new configuration file called microweber.conf

sudo nano /etc/apache2/sites-available/microweber.conf

Then copy and paste the content below into the file and save it. Replace the highlighted line with your own domain name and directory root location.

<VirtualHost *:80>
     ServerAdmin admin@example.com
     DocumentRoot /var/www/html/microweber/
     ServerName example.com
     ServerAlias www.example.com

     <Directory /var/www/html/microweber/>
          Options FollowSymlinks
          AllowOverride All
          Require all granted
     </Directory>

     ErrorLog ${APACHE_LOG_DIR}/error.log
     CustomLog ${APACHE_LOG_DIR}/access.log combined

</VirtualHost>

Save the file and exit.

After configuring the VirtualHost above, enable it by running the commands below

Step 7: Enable the Microweber Site and Rewrite Module

After configuring the VirtualHost above, enable it by running the commands below, then restart Apache2 server…

sudo a2ensite microweber.conf
sudo a2enmod rewrite
sudo systemctl restart apache2.service

Step 8: Install Let’s Encrypt Client

To get Let’s Encrypt free SSL/TLS certificates on your Ubuntu machine, you should first install its client. The client helps automate the process for you. To install it, run the commands below.

sudo apt-get install python-certbot-apache

If python-certbot-nginx isn’t already installed, you may have to add its PPA repository and install the package..

sudo add-apt-repository ppa:certbot/certbot
sudo apt-get update
sudo apt-get install python-certbot-apache

Step 9: Obtaining your free SSL/TLS Certificates

After installing Let’s Encrypt Certbot client module for Apache2, run the commands below to obtain your free Let’s Encrypt SSL/TLS certificate the domain specified… make sure to replace example.com with your own domain..

sudo certbot --apache -m admin@example.com -d example.com -d www.example.com

After running the above commands, you should get prompted to accept the licensing terms. If everything is checked, the client should automatically install the free SSL/TLS certificate and configure the Apache2 site to use the certs.

Please read the Terms of Service at
https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf. You must
agree in order to register with the ACME server at
https://acme-v01.api.letsencrypt.org/directory
-------------------------------------------------------------------------------
(A)gree/(C)ancel: A

Choose Yes ( Y ) to share your email address

Would you be willing to share your email address with the Electronic Frontier
Foundation, a founding partner of the Let's Encrypt project and the non-profit
organization that develops Certbot? We'd like to send you email about EFF and
our work to encrypt the web, protect its users and defend digital rights.
-------------------------------------------------------------------------------
(Y)es/(N)o: Y

This is how easy is it to obtain your free SSL/TLS certificate for your Apache2 powered website.

Please choose whether or not to redirect HTTP traffic to HTTPS, removing HTTP access.
-------------------------------------------------------------------------------
1: No redirect - Make no further changes to the webserver configuration.
2: Redirect - Make all requests redirect to secure HTTPS access. Choose this for
new sites, or if you're confident your site works on HTTPS. You can undo this
change by editing your web server's configuration.
-------------------------------------------------------------------------------
Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 2

Pick option 2 to redirect all traffic over HTTPS. This is important!

After that, the SSL client should install the cert and configure your website to redirect all traffic over HTTPS.

Congratulations! You have successfully enabled https://example.com and
https://www.example.com

You should test your configuration at:
https://www.ssllabs.com/ssltest/analyze.html?d=example.com
https://www.ssllabs.com/ssltest/analyze.html?d=www.example.com
-------------------------------------------------------------------------------

IMPORTANT NOTES:
 - Congratulations! Your certificate and chain have been saved at:
   /etc/letsencrypt/live/example.com/fullchain.pem
   Your key file has been saved at:
   /etc/letsencrypt/live/example.com/privkey.pem
   Your cert will expire on 2018-02-24. To obtain a new or tweaked
   version of this certificate in the future, simply run certbot again
   with the "certonly" option. To non-interactively renew *all* of
   your certificates, run "certbot renew"
 - If you like Certbot, please consider supporting our work by:

   Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate
   Donating to EFF:                    https://eff.org/donate-le

The highlighted code block should be added to your Apache2 Microweber configuration file automatically by Let’s Encrypt certbot. Your Microweber site is ready to be used over HTTPS.

<VirtualHost *:80>
     ServerAdmin admin@example.com
     DocumentRoot /var/www/html/microweber/
     ServerName example.com
     ServerAlias www.example.com

     <Directory /var/www/html/microweber/>
          Options FollowSymlinks
          AllowOverride All
          Require all granted
     </Directory>

     ErrorLog ${APACHE_LOG_DIR}/error.log
     CustomLog ${APACHE_LOG_DIR}/access.log combined

RewriteEngine on
RewriteCond %{SERVER_NAME} =example.com [OR]
RewriteCond %{SERVER_NAME} =www.example.com
RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,NE,R=permanent]
</VirtualHost>

A new configuration file for the domain should also be created named /etc/apache2/sites-available/example.com-le-ssl.conf. This is Apache2 SSL module configuration file and should contain the certificate definitions defined in it.

<IfModule mod_ssl.c>
<VirtualHost *:443>
   ServerAdmin admin@example.com
     DocumentRoot /var/www/html/microweber/
     ServerName example.com
     ServerAlias www.example.com

     <Directory /var/www/html/microweber/>
          Options FollowSymlinks
          AllowOverride All
          Require all granted
     </Directory>

     ErrorLog ${APACHE_LOG_DIR}/error.log
     CustomLog ${APACHE_LOG_DIR}/access.log combined

SSLCertificateFile /etc/letsencrypt/live/example.com/fullchain.pem
SSLCertificateKeyFile /etc/letsencrypt/live/example.com/privkey.pem
Include /etc/letsencrypt/options-ssl-apache.conf
</VirtualHost>
</IfModule>

You’ll have to manually renew the certificates. You’ll get email reminder to reset when the certificates are about to expire. To test the renewal process run the commands below.

sudo certbot renew --dry-run

To setup a process to automatically renew the certificates, add a cron job to execute the renewal process.

sudo crontab -e

Then add the line below and save.

0 1 * * * /usr/bin/certbot renew & > /dev/null

The cron job will attempt to renew 30 days before expiring

installation error “PHP extension ”curl“ must be loaded”

First of all Install CURL using this command:-

sudo apt-get install curl 

After that using these commands according to your PHP versions:-

1-> PHP 7.0: sudo apt-get install php7.0-curl    
2-> PHP 7.1: sudo apt-get install php7.1-curl    
3-> PHP 7.2: sudo apt-get install php7.2-curl    
4-> PHP 5.5: sudo apt-get install php5.5-curl
5-> PHP 5.6: sudo apt-get install php5.6-curl

You should see Microweber setup wizard to complete. Please follow the wizard carefully.

https://example.com

You should see Microweber setup wizard… type the database info and create and click Install…


Wait a moment for the installation to complete… after that you should be able to sign on to the admin backend.



Share:

Search This Blog

Blog Archive

Nerdy Tech Tips. Powered by Blogger.

How to Install InvoicePlane

  How to Install InvoicePlane with Apache and Free Let's Encrypt SSL Certificate on Debian 11 On this page Prerequisites Install Apache,...

Blogger templates