Posts

Install tableau server on Linux AWS

[root@ip-172-20-49-240 tmp]# yum install tableau-server-2020-1-1.x86_64.rpm Loaded plugins: extras_suggestions, langpacks, priorities, update-motd Examining tableau-server-2020-1-1.x86_64.rpm: tableau-server-20201.20.0305.1738-20201-20.0305.1738.x86_64 Marking tableau-server-2020-1-1.x86_64.rpm to be installed Resolving Dependencies --> Running transaction check ---> Package tableau-server-20201.20.0305.1738.x86_64 0:20201-20.0305.1738 will be installed --> Processing Dependency: fontconfig for package: tableau-server-20201.20.0305.1738-20201-20.0305.1738.x86_64 amzn2-core                                                                                    | 2.4 kB  00:00:00    amzn2extra-docker                                                                             | 1.8 kB  00:00:00    --> Processing Dependency: fuse for package: tableau-server-20201.20.0305.1738-20201-20.0305.1738.x86_64 --> Processing Dependency: gdb for package: tableau-server-20201.

Install AV AntiVirus clamav on Solaris 10 11

clamav can installed on Solaris 10 and 11. The three easy steps to install it: pkgadd -d http://get.opencsw.org/now /opt/csw/bin/pkgutil -U /opt/csw/bin/pkgutil -y -i clamav  For Example: # pkgadd -d http://get.opencsw.org/now ## Downloading... ..............25%..............50%..............75%..............100% ## Download Complete The following packages are available: 1 CSWpkgutil pkgutil - Installs Solaris packages easily (all) 2.6.7,REV=2014.10.16 Select package(s) you wish to process (or 'all' to process all packages). (default: all) [?,??,q]: Processing package instance <CSWpkgutil> from <http://get.opencsw.org/now> pkgutil - Installs Solaris packages easily(all) 2.6.7,REV=2014.10.16 Please see /opt/csw/share/doc/pkgutil/license for license information. ## Processing package information. ## Processing system information. ## Verifying package dependencies. ## Verifying disk space requirements. ## Checking for conflicts wit

AWS

Image
https://aws.amazon.com/blogs/security/how-to-establish-federated-access-to-your-aws-resources-by-using-active-directory-user-attributes/ In the preceding diagram: An AD user (let’s call him  Bob ) browses to the AD FS sample site ( https:// Fully.Qualified.Domain.Name.Here /adfs/ls/IdpInitiatedSignOn.aspx ) inside this domain. The sign-in page authenticates  Bob  against AD. If  Bob  is already authenticated or using a domain joined workstation, he also might be prompted for his AD user name and password. Bob ’s browser receives a  SAML  assertion in the form of an authentication response from AD FS.  Bob ’s access is authorized based on his AD group membership or on AD user attributes configured on his account. Bob ’s browser automatically posts the SAML assertion to the AWS sign-in endpoint for SAML ( https://signin.aws.amazon.com/saml ). The endpoint uses the  AssumeRoleWithSAML API  to request temporary security credentials and then constructs a sign-in URL for the

Configure Solaris 10 LDOM on Solaris 11.4

root@comglv1:~# ldm add-memory 16G htcsun1 root@comglv1: # zfs destroy zones cannot destroy 'zones': operation does not apply to pools use 'zfs destroy -r zones' to destroy all datasets in the pool use 'zpool destroy zones' to destroy the pool itself root@comglv1: # zfs destroy -r zones root@comglv1: # zpool create LDOM mirror c0t5000CCA03C0E89D8d0s0 c0t5000CCA03C2F3BB4d0s0 root@comglv1: # zfs create LDOM/htcsun1 root@comglv1: # zfs create -V 150g LDOM/htcsun1/disk0 root@comglv1: # ldm rm-vdisk vdisk0 htcsun1 root@comglv1: # ldm rm-vdsdev htcsun1-vd0@primary-vds0 root@comglv1: # ldm rm-vdsdev  vol0@primary-vds0 root@comglv1: # ldm rm-vdsdev iso@primary-vds0 root@comglv1: # add-vdsdev options=ro sol-10-u11-ga-sparc-dvd.iso htcsun1-iso@primary-vds0 root@comglv1: # ldm add-vdsdev /dev/zvol/dsk/LDOM/htcsun1/disk0 htcsun1-vd0@primary-vds0 root@comglv1: # ldm add-vdisk vdisk0 htcsun1-vd0@primary-vds0 htcsun1