Ubuntu

My eth0 is now called eno16777736

Interesting and new to me is that my network interface which was known to be called eth0 is now called eno16777736 in my new installs.

The following document indicates that 16777736 is the device’s acpi_index as provided by the firmware (BIOS/EFI)

This seems to happen on my VMware hosts where I’ve installed the latest Ubuntu OS releases. I am still looking into why this is happening and will update as soon as I have a better understanding.

For now, here is some info I found:

What does “eno” stand for?

en is for Ethernet
o is for on-board
The number is a firmware/BIOS provided index.

 

OVF Deployment Issue Ubuntu Snappy 15.04-stable (5 cloud)

When you have time, you do something.

Tonight I was headed over the Ubuntu site to grab me the latest version because I was thinking of installing OpenStack when I noticed on their landing page and noticed “Get Ubuntu Core” ; yes something new.

But where is my Raspberry Pi? No worries they have OVF images I can use to deploy to my vCenter Lab here at home. So I started just this and encountered an issue I once had.

Lets walk you through my events.

Downloading the image

  1. Found myself on the Ubuntu Internet of Things landing page: http://www.ubuntu.com/internet-of-things
  2. Located the OVF section of the getting started page: http://developer.ubuntu.com/en/snappy/start/
  3. Downloaded the OVA image (x86): 15.04/stable

Deploying the OVF Template 

  1. Using the vSphere Client, connected to vCenter (or stand alone ESXi host)
  2. Select server to deploy to and choose file > Deploy OVF Template
  3. Browse to the path were you downloaded your OVF image and select it

This is when I received the following error:
The following manifest file entry (line 1) is invalid: SHA256(core-stable-amd64-cloud.ovf)= d4b8922ed38a4eb9055576f7b46f8e92f463398298f3a42af942f25457d4d41c

Troubleshooting Step 1

  1. I extracted the OVA image (core-stable-amd64-cloud) with 7zip
  2. Once extracted attempted the steps detailed above “Deploying the OVF Template”

The same error was thrown once more.

Troubleshooting Step 2

Within the extracted folder exists the following file types: certificate, manifest, ovf (instruction / configuration) and disk image

  1. I remove the SHA256(core-stable-amd64-cloud.ovf)= d4b8922ed38a4eb9055576f7b46f8e92f463398298f3a42af942f25457d4d41c line from the .MF (manifest)
  2. Once removed I attempted the steps detailed above “Deploying the OVF Template”

It failed also, only this time the error started the the remaining SHA256 was also invalid.

Troubleshooting Step 3 – Third time is the charm

  1. Moved into the extracted OVA folder
  2. Deleted the .mf (manifest) file
  3. Followed steps above “Deploying the OVF Template” only this time using the OVF located in the extracted folder

This go around everything worked

So why did this happen?

The template was changed after its creation which invalidated the SHA256 key.  I have made templates myself, only to have to edit something out such as removing a CD Rom reference which later caused me issues.

I hope this helps if you face this incident or something similar

 

Thanks for visiting – jermal

Also published here

The mcrypt extension is missing. Please check your PHP configuration

After a quick LAMP install, I decided to install PhpMyAdmin. Logging into I noticed a warring message that read:

The mcrypt extension is missing. Please check your PHP configuration

To resolve this I attempted the following:

  • Elevated my console to root (sudo -i)
  • apt-get install mcrypt
  • apt-get install php5-mcrypt (no need because the previous command did it for me)
  • php5enmod mcrypt
  • service apache2 restart

If the above steps don’t work introduce the following: ln -s /etc/php5/conf.d/mcrypt.ini /etc/php5/mods-available

Now my LAMP install is complete.

 

Tech Short: Ubuntu Server System Information on login

If you have run Ubuntu Server you may have noticed that each time you log into your system via SSH system information  status are displayed.

I have wondered this for a while now and tonight I found out.

The command to reproduce this information is
landscape-sysinfo

This command is run from /etc/update-motd.d/50-landscape-sysinfo and exists when the landscape common package is installed on the server from what I have read.

And now I know.

A look inside the script:

#!/bin/sh
cores=$(grep -c ^processor /proc/cpuinfo 2>/dev/null)
[ “$cores” -eq “0” ] && cores=1
threshold=”${cores:-1}.0″
if [ $(echo “cut -f1 -d ' ' /proc/loadavg < $threshold” | bc) -eq 1 ]; then
echo
echo -n ” System information as of “
/bin/date
echo
/usr/bin/landscape-sysinfo
else
echo
echo ” System information disabled due to load higher than $threshold”
fi

#eof

Finally I can Watch Netflix in Ubuntu

Hi all,

I just read on the Ubuntu insights that watching Netflix is now a thing for Ubuntu. Recent efforts have finally paid off and Canonical, Ubuntu now supports it when using Google Chrome version 37 and above.

I big thanks goes out to those at Netflix and Ubuntu for making this “official”. I’ve personally waiting a long time for this.

Monitoring Tor resource usage

A while back I wrote about how I setup a small yet effective Tor network proxy server titled “My Quick Tor Socks / Web Proxy“.

After running this for sometime now I wanted to get some real time status, but more than that I wanted it to look cool. And this brings me to what I recently found.

And that my friends is Arm:

The anonymizing relay monitor (arm) is a CLI status monitor for Tor. This functions much like top does for system usage, providing real time statistics for:

  • resource usage (bandwidth, cpu, and memory usage)
  • general relaying information (nickname, fingerprint, flags, or/dir/controlports)
  • event log with optional regex filtering and deduplication
  • connections correlated against tor’s consensus data (ip, connection types, relay details, etc)
  • torrc configuration file with syntax highlighting and validation

This is what I was looking for 100%, and even better most of the attributes of arm can be adjusted via a configuration file. For additional information check out the project page here: https://www.atagar.com/arm/

Wow “jermal’ that’s cool, how do I set this up.

It’s very simple just follow the steps below:

  • SSH in or go to your Console
  • Once logged in do an apt-get update
  • Then apt-get install tor-arm -y
  • That’s it, once installed your ready

To run arm all you need to do is type: arm

happy monitoring folks.
*you can even press ‘n’ for a new Tor identity at anytime*

My Quick TOR Socks / Web Proxy

I originally preformed similar steps to setup a raspberry pi for this reason, later using a very tiny Ubuntu server install.

  1. Using a clean Ubuntu / or / Debian installation (recommended, not necessary) add the following repositories to /etc/apt/sources.list: deb http://deb.torproject.org/torproject.org <DISTRIBUTION> main
  2. to figure out the name of your distribution. A quick command to run is lsb_release –c (Ubuntu) or cat /etc/debian_version (Debian)
  3. Next add the gpg key that was used to sign the TOR packages: gpg –keyserver keys.gnupg.net –recv 886DDD89
  4. Then, type sudo apt-get install deb.torproject.org-keyring
  5. Next type sudo apt-get update
  6. Next type apt-get install tor
  7. Once completed TOR will be installed and listening on port 9050 on 127.0.0.1 of the host. You will need to modify the following file /etc/tor/torrc and add your servers address and SOCKS Port to listen on.
  8. Once completed you can restart the tor service and test remotely with a machine on your network; assign a web browser the SOCKS proxy info for your server and test with: https://check.torproject.org/ if all working you will be notified that you are on the TOR network.

But what if you don’t want to use SOCKS or an application / device doesn’t have a configuration for SOCKS proxy?  Well I encounter this same thing and there is a fix for that.

Using privoxy you can proxy your data via the computers current network, a VPN tunnel and in our case a SOCKS proxy.

  1. Back onyour server type  sudo apt-get update , then sudo apt-get install privoxy
  2. Once installed you will need to edit the following file: /etc/privoxy/config
  3. You need to:
  4. add a listen address and port for your client machines to use.
  5. you need to setup a forward-socks5 connection, something like: forward-socks5  / 127.0.0.1:9050
  6. Restart the privoxy server and your good to test. As we did above, setup your web browser with the proxy settings and check the following address https://check.torproject.org/ all should be working and you have an always on TOR Network proxy.

For more info on TOR: https://www.torproject.org

 

Update available message after installing update

Recently I updated my Ubuntu Server 12.04.2 to Ubuntu 13.04 when I noticed that the message of the day (MOTD) displaying in my console was telling me that an update was available and to Run ‘do-release-upgrade’

It seems the cause of this was /usr/lib/ubuntu-release-upgrader/release-upgrade-motd which is called by /etc/update-motd.d/91-release-upgrade which checks for the existence of the release-upgrade-motd file.

Removing this with rm /var/lib/ubuntu-release-upgrader/release-upgrade-available and rebooted and logged in again and the MOTD was normal as expected.

Steps to take:

  1. cd /var/lib/ubuntu-release-upgrader/
  2. rm release-upgrade-available

 

Time Synchronization with ntpdate in Ubuntu

If you don’t have time to do it right, when will you have time to do it over? – John Wooden

I’m back again with a little tip, simple and quick to do to keep your Ubuntu Server’s time in sync, best of all there is no need to install an NTP client as Ubuntu comes with the ntpdate command which syncs the time of your system with the NTP Server you specified.  Cool Huh!

The fist command to know is the ntpdate command which is standard in the Ubuntu distributions. This command is also run at boot time, however if your like me you don’t reboot often and the system drifts.  The command looks something like this:

ntpdate ntp.ubuntu.com

Now for the fun part to set this thing up on a seclude to run every day. I used cron to do this using the following steps:

cd /etc/cron.daily/
touch ntpdate
nano ntpdate and add the following line: ntpdate 123.123.123.123
chmod 775 /etc/cron.daily/ntpdate

That’s it.

Use lspci tells me my VGA Memory Usage

“Drugs are a waste of time. They destroy your memory and your self-respect and everything that goes along with with your self-esteem. They’re no good at all.” – Kurt Cobain

Sitting here playing around with some cli I wanted to know how much memory my VGA card was using so to find out I did the following by typing:

root@websvr:~# lspci |grep “VGA

My results was the following
00:0f.0 VGA compatible controller: VMware SVGA II Adapter

I then typed the following lspci command to give me more details:

root@websvr:~# lspci -v -s 00:0f.0 |grep “Memory
Memory at d8000000 (32-bit, prefetchable) [size=64M]
Memory at d0800000 (32-bit, non-prefetchable) [size=8M]

And there I have it. I’m using 64M of memory.

–more info–

lspci is a command on Unix-like operating systems that prints detailed information about all PCI buses and devices in the system. It is based on a common portable library libpci which offers access to the PCI configuration space on a variety of operating systems.