Intro I have been using puppet in one way or another since April of 2014. My first introduction to puppet was boxen but up until recently I have only focused on how puppet can apply to me personally. With this module and a few ideas I have for the future this is going to change the way clients are configured at $work_place. Now this technically is not my first module it is the first module that I have created the logic and wrote entirely myself.
Outdated: I am no longer using this process nor is the original author that I was linking to. He has an archive of his post here. Github is awesome. Jekyll is awesome. Travis-ci is awesome. Prose.io is awesome. And now…you can be awesome as well. Open Source is a fantastic but it is not without its drawbacks. One of the biggest drawbacks to using a static website like this site is the lack of an easy way to update posts.
Intro I use Munkireport-php as my main reporting system at my work but have recently ran into an error when uploading data from client machines. My setup is using nginx to serve the files. Error message The error message below is what was showing up from a manual munki run with verbose enabled, you can run the command with: sudo /usr/local/munki/managedsoftwareupdate -v ... Starting... Running preinstall_script for munkireport... BaseURL is http://munki01.
Intro Are you an Apple Developer? Most of the Apple Admin Community have developer accounts for the simple reason of gaining access to beta releases earlier than the public. This extra times allows us to test for changes that might affect the environments we support before it ends up in the hands of our users. Up until this point that is the only reason I could justify having a Dev account.
QuickLook scans file contents before you open those files. Usually this just lets you view a file quickly. But you can also use this same technology from the command line to bring about a change to the Finder without actually opening a file. To access QuickLook from the command line, use qlmanage. qlmanage -p ~/Desktop/MyTowel42.pdf —Charles Edge I highly recommend adding an alias to your either your .bashrc or .
Ubuntu 16.04/ PHP 7: Lucas Hall has created an updated guide based off of this one that uses Ubuntu 16.04 with PHP 7, which can be viewed here. Intro Welcome to the third part in our munki server setup series. In this section, we will download and configure Munkireport-php on our munki server. Before we get to far you might want to head over to Part 1 - Setting up the munki repo or Part 2 - Setting up mandrill.
Update: This article should only be used for reference at this time. Mandrill has been great for many years but no longer has an active maintainer. Please use MunkiWebAdmin 2 (mwa2) from github.com/munki/mwa2 instead. Intro This is Part 2 of a series on setting up a munki server on Ubuntu 14.04. Read Part 1 here. This section goes over setting up Mandrill so we can edit our repo metadata files, modify manifests, and assign new software to our fleet using a web browser.
Intro As you might have guessed from my previous post, I am trying to standardize at work. Part of this was to move many core OS X services away from OS X Server and towards Ubuntu. This will allow us to use our existing virtualization infrastructure. After reposado the next big service was our munki repo. Munki is a very powerful open source tool for patch management and software updates for OS X clients.
Intro Why on earth are you creating another guide? Why not use Puppet or Docker? Well the short answer is I could not find anything that covered all the criteria that I needed. I might go back later and puppetize this or use docker but needed a working solution. Plus the first step to automating something is to document how to do it manually, so below is the process to get Reposado and Margarita with Authorization (optional) setup on a clean install of Ubuntu 14.
On September 24, 2014, a security vulnerability was publicly announced that affects a large percentage of Internet connected devices. This vulnerability, known as Shellshock, affects the Unix command shell Bash. Bash, the bourne again shell, is one of the most common applications on Unix based systems. Many devices running Mac OS X or Linux are affected by this serious exploit. It is important to understand that this vulnerability could allow unauthorized access of your computer.