≡ Menu

Splunk supports three types of authentication: Native Authentication, LDAP and Scripted Authentication API.

For most part, Native Authentication is referred as Splunk authentication, which takes high priority over any external authentication.

So, if an user exists in both Splunk native authentication and LDAP, Splunk will use the user in the native authentication.

Typically, you’ll create an user, and then assign the user to a role. This is called role-based access control system. You can do this either using Splunk CLI or from Splunk Web.
(more…)

[GoLang Slice Examples]Slice is an essential component of Go programming language.

When writing a go program, for most common use-cases, you’ll be using slice instead of array.

An array is fixed in size. But slices can be dynamic. The number of elements in a slice can grow dynamically.

But, keep in mind that slice uses array in the backend. Slice by itself doesn’t store any data. Think of slice like a reference to an array. All it does is to describe part of the underlying array.

This tutorial explains the following slice concepts:

  1. Declare Slice Variable and Make a Slice with X number of Elements
  2. Declare and Initialize Slice at the same time without using Make
  3. Initialize a Slice using Multi-Line Syntax
  4. Assign a Value to a Specific Element in a Slice
  5. Access a particular Element in a Slice
  6. Display All or Specific Elements from a Slice
  7. Create Slice with Low and High values using Colon Syntax
  8. Slice Refers to an Array underneath – Implication of Changing Slice Element Value
  9. Slice of Structs
  10. Identify Length of a Slice – How many Elements are there?
  11. Slice Capacity – Length vs Capacity
  12. Empty Slice without an Array Underneath
  13. Append one or more Elements to an existing Slice
  14. Copy elements from one Slice to another (Duplicate Slice)
  15. Two Dimensional Slices
  16. Loop through Slice Elements using For and Range
  17. Loop through a Slice and get only the Values (Ignore Slice Index)
  18. Full Working GoLang Code with All Slice Examples

For details on Go Array, refer to our previous tutorial: 12 Practical Go Array Examples

(more…)

[AWS Configure Example]To use AWS CLI, you need to first make sure your AWS access key credentials are configured properly.

Once you have your AWS access_key_id and secret_access_key, you can either manually add them to the credentials file, or use aws configure command to set it up on your local machine.

This tutorials explains all the options available in aws configure command along with how to manage multiple profiles:

  1. First Time Configuring AWS Credentials – Default Profile
  2. ~/.aws Directory – Config and credentials File for Default Profile
  3. Edit Default Profile Credentials – Connect to Different AWS Account
  4. Create Multiple AWS Profiles – Dev and Prod
  5. ~/.aws Directory – Config and credentials File for Multiple Profiles (Dev and Prod)
  6. Switching Between Different AWS Profiles using –profile Option
  7. Switching Between Different AWS Profiles using AWS_PROFILE Env Variable
  8. View Profile Information using list Option
  9. Change Default Config and Credentials FileName and Location
  10. View a Specific Profile Parameter Value using get Option
  11. Set a Specific Profile Parameter Value using set Option
  12. Add New Model using add-model Option

(more…)

[GoLang Array Examples]To get a good handle on Go programming language, it is essential to understanding arrays and slices.

If you are developer, or sysadmin who is new to Go, it is important to understand the following key differences in how array is handled in Go when compared to other language:

  • You cannot change the size of the array once it is declare.
  • The array size should be specified when you declare an array. To overcome this limitation, you’ll be using slices for most part in GoLang. But, it still sill important to understand how array works, as slices works on top of array.
  • When you assign an array to another array, essentially you are copying all the elements from one to another.
  • The above is important to understand, as when you are passing an array as a parameter in an function, the function will really get a copy of the array and will work on it. It is not a pointer that we are passing. It is copy of the whole array.

This tutorial explains the following basics of array handling in Go, with a full working example along with the output that is provided at the end of this tutorial.
(more…)

Looping through stuff is an important aspect of any programming language.

In several of our previous tutorials, we explained in detail various loops including python for loop, for loops in c programming, loops in awk scripting, loops in bash shell scripting, etc.

The focus of this article is on how to loop through stuff in Ruby.
(more…)

Happy New Year 2018 – From Geek, Dolls and Penguins

[Ramesh, Kids and Penguins]

Happy New Year from Me and My Daughters (Diya and Neha)

Happy New Year to all Geeks from Me, My Daughters (Diya and Neha), and our Penguins.

We wish you and your family a happy, healthy, and joyful New Year.
(more…)

389 Directory Server is a super fast open source enterprise LDAP Server.

In this tutorial, we’ll explain how to install and configure the LDAP client on Linux which will talk to your 389 directory server.
(more…)

15 mysqlbinlog Command Examples for MySQL Binary Log Files

In MySQL or MariaDB, anytime you make a change to the database, that particular event is logged.

For example, when you create a new table, or update data on an existing table, those events are stored in the binary logs.

Binary log is very helpful in MySQL replication, where the main server will send the data from the binary logs to the remote servers.

You’ll also be dealing with binary log files when you are performing any kind of recovery operations in MySQL.

mysqlbinlog command is used to view the content of the binary log in a readable user friendly format. You’ll also use the mysqlbinlog command to read the content and pipe it to other mysql utilities.
(more…)