• the missing VoIP, the ERP and the solution in search of a problem

    42
    2 Votes
    42 Posts
    5k Views
    matteo nunziatiM

    @TeleFox we have a quite old (few years) PBX which has been used in the years adding new and new phone lines with the company expansion. last batch of additions was 6 months ago: 5 new seats with new phones and headsets. PBX is Aastra with proprietary digital phones.

    the company bought a new erp last december, against my advice they also buyed a generic "VoIP-ERP integration package". we are now implementing the ERP and the sysadmin at the ERP consulting firm pointed out to me that the package actually is a proprietary VoIP PBX based on asterisk.
    the solution involves something around 10 or 15 people (depending on the layout of the customer care dept), company has somethin like 40 phones bwteen DECT and digital deskphones.

    so we can:

    throw away the new asterisk PBX (wasted 4k€), sorry 15 people throw away current Aastra PBX , redoing a lot of cabling and rebuying the entire equipement for 40 between wirede and DECT phones try to integrate the 2, especially considering than it is right to isolate the ERP asterisk thing as you would not to depend on an erp for your phone system (ok, redo VoIP wiring and equipement if you want but choose a different strategy!)

    now both current PBX managing firm and the carrier have found a number potential solutions (basically a sip trunk between the 2 PBXes).

    hope this clarifies!

  • Office365 Direct Send without Relay

    14
    0 Votes
    14 Posts
    4k Views
    JaredBuschJ

    @Dashrender said in Office365 Direct Send without Relay:

    @JaredBusch said in Office365 Direct Send without Relay:

    For only basic email traffic needs like scan to email, just setup a connector in Office 365.

    0_1492696529257_upload-114c859e-4acc-44f7-98fb-1e15dd07b888

    0_1492696555576_upload-097270f5-1ef9-441c-be47-52dedd9dbb0b

    Exchange Online has various rate limits though. So if you think you will be even close to them, use postfix locally to send out and just add your local WAN IP to your SPF record.

    Why wouldn't your local relay still relay everything through Hosted Exchange in O365? or would that be rate limited as well?

    Exchange Online has limits. it does not matter from where the email originate. The software was actually setup to authenticate and send email directly with and Exchange Online account during testing.

    This quickly hit the rate limits as the client was sending out large amounts of price notifications to users that has signed up for such.

    So this site had a local CentOS 7 box setup and Postfix was configured to send mail out. The SPF record was updated and then a connector was also setup to make sure nothing was blocked for no reason.

  • Alternative to Azure AD - JumpCloud

    44
    1 Votes
    44 Posts
    7k Views
    coliverC

    @scottalanmiller said in Alternative to Azure AD - JumpCloud:

    @coliver said in Alternative to Azure AD - JumpCloud:

    @Dashrender said in Alternative to Azure AD - JumpCloud:

    How do you get unified authentication in Linux?

    IIRC Active Directory was in response to *nix based distributions having this ability a decade prior.

    That's correct. Not just as a general concept, as things like NIS are quite old. Sun released NIS in the early 1980. It was replaced with NIS+ in 1992. LDAP was already popular on Linux by the late 1990s. Even kerberos was already in use on Linux at that time. By the time that Windows did AD in 2000, they were explaining it in terms of Linux to make people understand how it worked. It wasn't just that it was "like" what UNIX had, but that it was LDAP and Kerberos right from the UNIX world, just a Windows version of those exact services.

    Good to know I have some of my IT history correct. I first learned LDAP on some old Gentoo boxes that my father picked up from the dump.

  • Anyone else familiar with US-Cert Traffic Light Protocol?

    8
    1 Votes
    8 Posts
    940 Views
    IRJI

    @Mike-Davis said in Anyone else familiar with US-Cert Traffic Light Protocol?:

    @IRJ said in Anyone else familiar with US-Cert Traffic Light Protocol?:

    I get their emails everyday and have to act on them as part of my job. All their emails are classified at a different level.

    What kind of stuff have they sent that was actionable?

    Zero days and other CVEs

  • Webroot - Malicious autorun scripts on USBs

    17
    3 Votes
    17 Posts
    3k Views
    Reid CooperR

    And a lot of people set it to "always do" something bad, then it doesn't ask again.

  • Move vm from Xenserver to Vultr?

    3
    2 Votes
    3 Posts
    662 Views
    momurdaM

    Yes that is what ive done.

  • Android OS: SSH App

    6
    1 Votes
    6 Posts
    1k Views
    dafyreD

    @aidan_walsh said in Android OS: ConnectBot:

    @gjacobse IIRC thats an optional extra for creating an account to sync your auth details between devices.

    Yepp. And also, generating SSH keys, I'd imagine, but I may be off base on that. I have the paid version, and it's cheap, so I bought it since I use it so much.

  • EqualLogic PS6110 Show Capacity

    10
    4 Votes
    10 Posts
    2k Views
    Mike DavisM

    That's what I get for posting before I'm totally awake. This is what I get when I run the command on my group:

    BackupTarget> show member Name Status Version Disks Capacity FreeSpace Connections ---------- ------- ---------- ----- ---------- ---------- ----------- 16TB online V7.0.7 (R3 16 11.34TB 6.72TB 2 97085) syr-8TB online V7.1.2 (R4 16 5.66TB 3.69TB 3 02088) 4TB online V7.0.7 (R3 16 2.83TB 1.84TB 2 97085) BackupTarget>

    I think the command is showing the free space on the volumes after creation, not before since I think I have mine fully provisioned.

    Just type:
    show
    and it will scroll through all the things under the show command and you should be able to figure out the size of your member. This is just the first of like 4 pages:

    BackupTarget> show ______________________________ Group Information ______________________________ Name: BackupTarget Group-Ipaddress: 192.168.100.21 DateAndTime: Thu Apr 20 03:32:04 2017 TimeZone: America/New_York TotalVolumes: 3 VolumesOnline: 3 VolumesInUse: 3 TotalSnapshots: 0 SnapshotsOnline: 0 SnapshotsInUse: 0 TotalMembers: 3 MembersOnline: 3 MembersInUse: 3 TotalCapacity: 19.83TB VolumeReserve: 7.58TB VolumeReportedSpace: 7.58TB SnapReservedSpace: 3GB SnapReservedSpaceInUse: 0MB ReplicationReservedSpace: 0MB FailbackReservedSpace: 0MB DelegatedSpace: 0MB DelegatedSpaceInUse: 0MB FreeSpace: 12.24TB TotalDisks: 48 OnlineDisks: 45 SpareDisks: 3 OfflineDisks: 0 FailedDisks: 0 Collections: 0 Snapcols: 0 CustomSnapcols: 0 ThinProvFreeSpace: 122.49TB TotalSpaceBorrowing: 0MB Connections: 7 _______________________________________________________________________________
  • 2 Votes
    6 Posts
    2k Views
    Reid CooperR

    Step One: Install something other than Windows Home
    Step Two: Be more secure

  • Backblaze B2, is it really this cheap?

    20
    1 Votes
    20 Posts
    3k Views
    A

    @travisdh1 not that I know of

  • 1 Votes
    11 Posts
    3k Views
    scottalanmillerS

    @Kelly said in Jamf- Mac, iPad, iPhone and Apple TV management solution:

    @scottalanmiller said in Jamf- Mac, iPad, iPhone and Apple TV management solution:

    @Kelly said in Jamf- Mac, iPad, iPhone and Apple TV management solution:

    We're using Jamf, and it is pretty decent. With recent changes to permissions in macOS, a solution like Jamf will be the only way you can actually control certain settings. Apple is no longer content with merely ignoring professional users, but is now actively trying to eliminate them.

    I think that that actually started long ago.

    10.12.x is much worse that what came before. There are a significant portion of system level settings that you cannot touch even as root.

    Wow, that's just crazy.

  • 6 Votes
    4 Posts
    2k Views
    StukaS

    And another +1 To backup storage. That's actually what ~70-80% of our customers do with their SANs when swtiching to StarWind HCA or even VSAN.
    Another interesting approach which I see less often is to use 2 existing SAN boxes as a storage capacity addition to the new HCI, with some of that storage actually mirrored between the SANs through the HCI storage virtualization layer. This is where customers can actually keep both backup and testing workloads without breaking the SANs into islands of resources.

  • 1 Votes
    16 Posts
    6k Views
    A

    @xisco yes, xenstore-utils was installed - i suppose it was installed by ubuntu setup

  • Updating FOP2 to work with HTTPS correctly

    2
    3 Votes
    2 Posts
    3k Views
    JaredBuschJ

    For anyone not familiar, here is a screenshot of my free version.
    0_1492617573275_upload-25f91f66-c1ba-4ae2-817f-456db86124b3

    here is a paid version at a client with ~40 extensions.
    (intentionally not all are shown such as the Snom PA-1 paging adapter, because I know someone will count....)
    0_1492617629380_upload-221e49df-6efb-4acd-b371-c5146c52a84e

  • 1 Votes
    29 Posts
    6k Views
    dafyreD

    @Mike-Davis said in Autoupdates Killed My Windows Server 2008 R2:

    most of what I have been working on for the last week should have worked...

    When dealing with computers, should work does not always equal does work, lol.

  • Google Maps API

    20
    2 Votes
    20 Posts
    3k Views
    C

    Yes, it's internal. Sorry, I should have made that clearer in my OP. Although it's actually a list of merchants that sell our products, so I can see that ultimately we may want to make it public and put it on our website. That's at least a year away though.

  • Kerberos.io - Open Source Video Surveillance Software

    4
    8 Votes
    4 Posts
    1k Views
    DustinB3403D

    Yeah the online demo is pretty cool.

  • 0 Votes
    44 Posts
    6k Views
    travisdh1T

    @DustinB3403 said in CentOS rsync between servers using keyfile to pass credentials:

    Nevermind, seems to work when I don't bother telling the system to use the authorized key.

    That IS kinda the idea. ssh just handles that for you, even when called from another program like rsync.

  • 4 Votes
    10 Posts
    2k Views
    scottalanmillerS

    @NetworkNerd said in SpiceWorld Austin 2017 Sessions up for vote:

    They say pick your top 15. I was thinking there were more than 15 sessions on the Spiceworld agenda last year. But then again, some sessions were repeated.

    There are many sessions that are not open for picking. Like all of the SW run sessions, for example. Or the keynote and stuff like that.

  • MariaDB Backup and Move

    10
    2 Votes
    10 Posts
    2k Views
    scottalanmillerS

    @DustinB3403 said in MariaDB Backup and Move:

    @scottalanmiller cool, so if I am already collecting the rest of the database (see previous topic from today using rsync) then backing up the mariadb should grab what is left.

    Then all that would be left is to push the backup to an secondary system and test that all works.

    In theory. I've had unreliable recoveries from that. I don't know any method to get 100% backup if that code is stored in the database.