How to create a new virtual machine on XenServer using command line

Objective

Deployment of XenServer virtual machine using command line.

Requirements

Privileged access to XenServer’s command line as well as configured ISO image storage containing an ISO image of the Linux distribution you wish to install.

Difficulty

MODERATE

Instructions

Deploy VM template and gather information

In this guide we will be creating a new Ubuntu Linux based virtual machine. However, the below procedure will fit any decent Linux distribution as along as it is supported by XenServer, meaning that the template for the Linux distribution you would like to install is part of the XenServer’s repertoire. Let’s first search XenServer’s database for a template name.

In this case we are looking for Ubuntu 16.04:

# xe template-list | grep name-label | grep -i 16.04
          name-label ( RW): Ubuntu Xenial Xerus 16.04

Read more

How to reset lost root password on Ubuntu 16.04 Xenial Xerus Linux

This guide will provide you with an information on how to reset lost root ( administrator ) password on Ubuntu 16.04. This guide assumes that you have the actual physical access to your Ubuntu 16.04 Linux box.

Reboot to Grub Menu

In the first step you need to reboot your Ubuntu 16.04 Linux box to Grub’s menu. If the Ubuntu 16.04 is the only installation available keep pressing SHIFT after you start your computer until GRUB’s menu appears:
reboot your Ubuntu 16.04 Linux box in Grub's menu

Read more

Instant privacy with tor, privoxy and docker

Introduction

“linuxconfig/instantprivacy” docker image provides an instant privacy through Tor (anonymity network) and Privoxy non-caching web-proxy. It is based on GNU/Linux Debian 11 bullseye. Any feedback or feature requests are welcome.

What is Tor

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays[6] to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”.Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

What is Privoxy

Privoxy is a non-caching web proxy with filtering capabilities for enhancing privacy, manipulating cookies and modifying web page data and HTTP headers before the page is rendered by the browser. Privoxy is a “privacy enhancing proxy”, filtering Web pages and removing advertisements.

How to use “linuxconfig/instantprivacy” docker image

The usage is very simple. Create and new docker container using below command:

# docker run --name=instantprivacy -d -p 8118:8118 linuxconfig/instantprivacy

Read more

How to extract a specific file from gzip compressed archive tarball

In order to extract a specific file from gzip compressed archive tarball you first need to know the full path to this file. Consider a following example.

$ tar tzf to-gzip.tar.gz
to-gzip/
to-gzip/file10.txt
to-gzip/file9.txt
to-gzip/file8.txt
to-gzip/file7.txt
to-gzip/file6.txt
to-gzip/file5.txt
to-gzip/file4.txt
to-gzip/file3.txt
to-gzip/file2.txt
to-gzip/file1.txt

Read more