π Synology: Virtual Machine Manager β Install & Setup
Synology Virtual Machine Manager (VMM) is a virtualization platform that allows to create, run and manage multiple virtual machines on a Synology NAS.
It combines computing, storage and networking resources on a single hardware platform and allows to build a cost-effective and easily managed virtualization environment.
This post explains how to install VMM on the Synology NAS and perform the initial setup.
π Continue Reading
Synology Virtual Machine Manager (VMM) is a virtualization platform that allows to create, run and manage multiple virtual machines on a Synology NAS.
It combines computing, storage and networking resources on a single hardware platform and allows to build a cost-effective and easily managed virtualization environment.
This post explains how to install VMM on the Synology NAS and perform the initial setup.
π Continue Reading
ShellHacks
Synology: Virtual Machine Manager - Install & Setup - ShellHacks
This post explains how to install and setup Synology Virtual Machine Manager (VMM) on a Synology NAS.
π Home Assistant on Synology NAS as Virtual Machine
Synology NAS is a perfect platform for running Home Assistant.
Running Home Assistant as a virtual machine on Synology NAS has a lot of advantages and here are some of them:
a centralized hub for all your smart home devices and services
no need to worry about running out of disk space
possibility to take snapshot backups
reliability and stability
easy to install and set up
This blog post provides a step-by-step guide on how to install Home Assistant on Synology NAS as a virtual machine.
π Continue Reading
Synology NAS is a perfect platform for running Home Assistant.
Running Home Assistant as a virtual machine on Synology NAS has a lot of advantages and here are some of them:
a centralized hub for all your smart home devices and services
no need to worry about running out of disk space
possibility to take snapshot backups
reliability and stability
easy to install and set up
This blog post provides a step-by-step guide on how to install Home Assistant on Synology NAS as a virtual machine.
π Continue Reading
ShellHacks
Home Assistant on Synology NAS as Virtual Machine - ShellHacks
An easy to follow step-by-step guide on how to install π€ Home Assistant on Synology NAS as a Virtual Machine.
π MikroTik: Send Message to Telegram
Notifications are an important part of monitoring of a MikroTik router's health, performance and different events, including potential security issues.
Telegram is a popular messaging app that offers a variety of features, including notifications.
It can be used to receive notifications from various sources, including MikroTik.
This post provides a step-by-step guide on how to configure MikroTik to send messages to Telegram and integrate it into MikroTik scripts.
π Continue Reading
Notifications are an important part of monitoring of a MikroTik router's health, performance and different events, including potential security issues.
Telegram is a popular messaging app that offers a variety of features, including notifications.
It can be used to receive notifications from various sources, including MikroTik.
This post provides a step-by-step guide on how to configure MikroTik to send messages to Telegram and integrate it into MikroTik scripts.
π Continue Reading
ShellHacks
MikroTik: Send Message to Telegram - ShellHacks
This post provides a step-by-step guide on how to configure MikroTik to send messages to Telegram and integrate it into MikroTik scripts
π MikroTik: Telegram Notifications on Login Attempts
MikroTik logs are valuable on their own, but they are even more useful when paired with Telegram notifications.
Receiving notifications on Telegram when someone is trying to log in to your MikroTik router can help to detect suspicious login attempts, including potential hacking attempts, allowing you to take appropriate action in a timely manner.
In this article, I will guide you through the process of configuring a separate log file on your MikroTik router that will only contain authentication log entries.
Additionally, I will show how to set up a scheduled script that will send information about all login attempts to Telegram.
π Continue Reading
MikroTik logs are valuable on their own, but they are even more useful when paired with Telegram notifications.
Receiving notifications on Telegram when someone is trying to log in to your MikroTik router can help to detect suspicious login attempts, including potential hacking attempts, allowing you to take appropriate action in a timely manner.
In this article, I will guide you through the process of configuring a separate log file on your MikroTik router that will only contain authentication log entries.
Additionally, I will show how to set up a scheduled script that will send information about all login attempts to Telegram.
π Continue Reading
ShellHacks
MikroTik: Telegram Notification on Login Attempt - ShellHacks
This article explains how to configure Telegram notifications for MikroTik router login attempts.
π Install Go (Golang) on Windows without Admin Rights
Go, or Golang, is an open-source programming language focused on simplicity, reliability and efficiency.
The official MSI Go installer for Windows requires admin rights, which are not normally granted on corporate work or school computers.
This post provides a step-by-step guide on how to install Go on Windows without administrator privileges.
π Continue Reading
Go, or Golang, is an open-source programming language focused on simplicity, reliability and efficiency.
The official MSI Go installer for Windows requires admin rights, which are not normally granted on corporate work or school computers.
This post provides a step-by-step guide on how to install Go on Windows without administrator privileges.
π Continue Reading
ShellHacks
Install Go (Golang) on Windows without Admin Rights - ShellHacks
A step-by-step guide on how to install Go on Windows without administrator privileges.
π Home Assistant: How To Edit `configuration.yaml`
While most of Home Assistant settings can be configured through the user interface (UI), there are still some things that require direct editing of the
For example, to enable a "Wake on LAN" feature it is required to add
In this post you will find the three most easiest ways to edit the Home Assistant's
π Continue Reading
While most of Home Assistant settings can be configured through the user interface (UI), there are still some things that require direct editing of the
configuration.yaml
file.For example, to enable a "Wake on LAN" feature it is required to add
wake_on_lan:
to the configuration.yaml
file and restart Home Assistant.In this post you will find the three most easiest ways to edit the Home Assistant's
configuration.yaml
file. π Continue Reading
ShellHacks
Home Assistant: How To Edit `configuration.yaml` - ShellHacks
This post provides a beginner's guide to editing the `configuration.yaml` file in Home Assistant and reloading the changes.
π1
π Home Assistant: LG webOS TV Turn On (Wake on LAN)
LG webOS TV is perfectly integrated with the standard Home Assistant's media player.
However, since some update you may not be able to turn on your LG webOS TV.
Luckily, this issue can easily be solved using vanilla Home Assistant (HA) and Wake on LAN (WoL) integration.
π Continue Reading
LG webOS TV is perfectly integrated with the standard Home Assistant's media player.
However, since some update you may not be able to turn on your LG webOS TV.
Luckily, this issue can easily be solved using vanilla Home Assistant (HA) and Wake on LAN (WoL) integration.
π Continue Reading
ShellHacks
Home Assistant: LG webOS TV Turn On (Wake on LAN) - ShellHacks
[SOLVED] How to enable 'Turn On' action of LG webOS TV in Home Assistant media player using 'Wake on LAN'.
π3
π SSH into Home Assistant using Terminal & SSH Add-on
SSH access to Home Assistant (HA) can be useful in multiple cases:
To reboot HA remotely if this cannot be done through the web interface
To edit some configuration files
To debug OS-related issues - check logs, processes, network settings, etc.
To install or update additional packages or dependencies
To backup or restore HA
The easiest way to SSH into Home Assistant is by using the official Terminal & SSH add-on.
It is based on OpenSSH and allows to log into Home Assistant using a web-based Terminal or any SSH client.
This post describes how to install and configure the Terminal & SSH add-on to access Home Assistant over SSH.
π Continue Reading
SSH access to Home Assistant (HA) can be useful in multiple cases:
To reboot HA remotely if this cannot be done through the web interface
To edit some configuration files
To debug OS-related issues - check logs, processes, network settings, etc.
To install or update additional packages or dependencies
To backup or restore HA
The easiest way to SSH into Home Assistant is by using the official Terminal & SSH add-on.
It is based on OpenSSH and allows to log into Home Assistant using a web-based Terminal or any SSH client.
This post describes how to install and configure the Terminal & SSH add-on to access Home Assistant over SSH.
π Continue Reading
ShellHacks
SSH into Home Assistant using Terminal & SSH Add-on - ShellHacks
How to connect to Home Assistant over SSH using a Web-based Terminal or SSH client.
π2
π ArgoCD: Reset Admin Password
Are you getting "Invalid username or password" while trying to log in to ArgoCD as
In this article, I'll walk you through the process of resetting the ArgoCD
Whether you've forgotten the ArgoCD
π Continue Reading
Are you getting "Invalid username or password" while trying to log in to ArgoCD as
admin
?In this article, I'll walk you through the process of resetting the ArgoCD
admin
password.Whether you've forgotten the ArgoCD
admin
password or need to update it for security reasons, these clear instructions will help you get back in control. π Continue Reading
ShellHacks
ArgoCD: Reset Admin Password - ShellHacks
Lost your ArgoCD admin password? Donβt panic! This guide will help you to reset it swiftly and secure the platform.
π Git β Change Remote URL
When managing a Git repository, there are several scenarios where updating the remote URL becomes necessary:
Repository Migration: When moving the repository to a different location or hosting service, the remote URL needs updating.
Switching Protocols: Developers may switch from HTTPS to SSH for security or convenience.
Ownership Changes: If the username or ownership of the repository changes, the URL must be updated.
To update the remote URL in Git, you can use the
π Continue Reading
When managing a Git repository, there are several scenarios where updating the remote URL becomes necessary:
Repository Migration: When moving the repository to a different location or hosting service, the remote URL needs updating.
Switching Protocols: Developers may switch from HTTPS to SSH for security or convenience.
Ownership Changes: If the username or ownership of the repository changes, the URL must be updated.
To update the remote URL in Git, you can use the
git remote set-url
command. π Continue Reading
ShellHacks
Git - Change Remote URL - ShellHacks
How to update a Git remote URL to a new SSH or HTTPS URL using the `git remote set-url` command.
π MikroTik: NordVPN Setup
MikroTik routers support many VPN services, including NordVPN.
Starting from RouterOS v6.45, it is possible to establish IKEv2 secured tunnel to NordVPN servers using EAP authentication.
Learn how to set up NordVPN on your MikroTik router for enhanced privacy and security.
Follow these simple steps to safeguard your network traffic and enjoy seamless protection.
π Continue Reading
MikroTik routers support many VPN services, including NordVPN.
Starting from RouterOS v6.45, it is possible to establish IKEv2 secured tunnel to NordVPN servers using EAP authentication.
Learn how to set up NordVPN on your MikroTik router for enhanced privacy and security.
Follow these simple steps to safeguard your network traffic and enjoy seamless protection.
π Continue Reading
ShellHacks
MikroTik: NordVPN Setup - ShellHacks
How to setup NordVPN on MikroTik by establishing IKEv2 secured tunnel to NordVPN servers using EAP authentication.
π Kubectl: Add Label to Kubernetes Node
Labels in Kubernetes are used for attaching meta tags to different resources, including nodes.
This helps to organize the nodes and allows to select specific subsets of nodes.
By adding labels to Kubernetes nodes, we can have more control over the resources that we create.
For example, we can make Kubernetes to schedule specific deployments onto nodes with the specific labels only.
In this post I will show how to get, add, overwrite and delete labels from Kubernetes nodes using the
π Continue Reading
Labels in Kubernetes are used for attaching meta tags to different resources, including nodes.
This helps to organize the nodes and allows to select specific subsets of nodes.
By adding labels to Kubernetes nodes, we can have more control over the resources that we create.
For example, we can make Kubernetes to schedule specific deployments onto nodes with the specific labels only.
In this post I will show how to get, add, overwrite and delete labels from Kubernetes nodes using the
kubectl
command. π Continue Reading
ShellHacks
Kubectl: Add Label to Kubernetes Node - ShellHacks
How to get, add, overwrite and delete labels from Kubernetes nodes using the `kubectl` command
β€1
π K8s: Spread Pods Evenly on Nodes in Different Zones/Regions
Kubernetes automatically spreads Pods for workload resources (such as Deployment, StatefulSet, etc.) across different Nodes to reduce the impact of failures.
In a multi-zone (multi-region) Kubernetes cluster it is required to ensure that Kubernetes will place the replicas of a Pod on the Nodes in different zones, to reduce the impact of zone failures.
In this note I will show how to distribute Kubernetes Pod replicas evenly on Nodes in different zones using
π Continue Reading
Kubernetes automatically spreads Pods for workload resources (such as Deployment, StatefulSet, etc.) across different Nodes to reduce the impact of failures.
In a multi-zone (multi-region) Kubernetes cluster it is required to ensure that Kubernetes will place the replicas of a Pod on the Nodes in different zones, to reduce the impact of zone failures.
In this note I will show how to distribute Kubernetes Pod replicas evenly on Nodes in different zones using
topologySpreadConstraints
. π Continue Reading
ShellHacks
K8s: Spread Pods Evenly on Nodes in Different Zones/Regions - ShellHacks
How to spread Kubernetes Pod replicas evenly on Nodes in different zones or regions using `topologySpreadConstraints`.
π Kubectl: Delete Context | Cluster | User
A context in Kubernetes is basically a combination of an information about clusters and users, stored in a
Every time you execute the
The
In this short note I will show how to delete a Kubernetes context, cluster or user from
π Continue Reading
A context in Kubernetes is basically a combination of an information about clusters and users, stored in a
kubeconfig
file.Every time you execute the
kubectl
command, you reference a context inside kubeconfig
.The
kubectl config
command is used to manage Kubernetes configurations, primarily by editing the kubeconfig
file.In this short note I will show how to delete a Kubernetes context, cluster or user from
kubeconfig
using the kubectl config
command. π Continue Reading
ShellHacks
Kubectl: Delete Context | Cluster | User - ShellHacks
How to delete a Kubernetes context, cluster or user from 'kubeconfig' using the `kubectl config` command.
π MikroTik: Enabling HTTPS for WebFig & API
MikroTik supports HTTPS for WebFig and API, but it is disabled by default.
Transferring data over HTTP is not secure, even within a Local Area Network (LAN), because HTTP does not encrypt the data being transmitted. This can include sensitive information such as login credentials, configuration details, or any other data sent to or from your MikroTik router over HTTP.
If any devices on your LAN are compromised, an attacker can intercept HTTP traffic between you and your MikroTik router.
To improve security and encrypt communications with your MikroTik router, you need to enable HTTPS. This is not a straightforward process, as enabling HTTPS on MikroTik for WebFig and API requires you to manually configure and use a valid certificate.
In this post, you will learn how to generate a self-signed SSL certificate on MikroTik, enable HTTPS for WebFig and API, and disable services that use insecure HTTP.
π Continue Reading
MikroTik supports HTTPS for WebFig and API, but it is disabled by default.
Transferring data over HTTP is not secure, even within a Local Area Network (LAN), because HTTP does not encrypt the data being transmitted. This can include sensitive information such as login credentials, configuration details, or any other data sent to or from your MikroTik router over HTTP.
If any devices on your LAN are compromised, an attacker can intercept HTTP traffic between you and your MikroTik router.
To improve security and encrypt communications with your MikroTik router, you need to enable HTTPS. This is not a straightforward process, as enabling HTTPS on MikroTik for WebFig and API requires you to manually configure and use a valid certificate.
In this post, you will learn how to generate a self-signed SSL certificate on MikroTik, enable HTTPS for WebFig and API, and disable services that use insecure HTTP.
π Continue Reading
ShellHacks
MikroTik: Enabling HTTPS for WebFig & API - ShellHacks
How to enable HTTPS for WebFig and API on MikroTik using a self-signed SSL certificate, and disable services that use insecure HTTP
π Windows βlsβ Equivalent: Find and List Files Easily
The
'ls' is not recognized as an internal or external command, operable program or batch file.
The Windows
Basic Listing
In Linux/macOS, you would use the
Listing Hidden Files
Hidden files can be revealed in Linux/macOS by using the
Displaying Details
For a more detailed view, Linux/macOS users add the
Conclusion
Switching from Linux/macOS to Windows may feel challenging, especially when accustomed to commands like
The
ls
command is a go-to tool for Linux and macOS users to list files and directories. However, running the ls
command in the Windows Command Prompt returns the error: 'ls' is not recognized as an internal or external command, operable program or batch file.
The Windows
ls
equivalent is the dir
command, which provides similar functionality. Below, we'll explore how to effectively use the dir
command for basic listing, listing hidden files, and displaying detailed information.Basic Listing
In Linux/macOS, you would use the
ls
command to list files and directories. On Windows, the equivalent is the dir
command:C:\> dir
Listing Hidden Files
Hidden files can be revealed in Linux/macOS by using the
ls -a
command. On Windows, use dir /a
to include hidden files in the listing:C:\> dir /a
Displaying Details
For a more detailed view, Linux/macOS users add the
-l
flag to the ls
command. In Windows, the similar detailed output can be achieved with dir /q
, which shows ownership details and timestamps:C:\> dir /q
Conclusion
Switching from Linux/macOS to Windows may feel challenging, especially when accustomed to commands like
ls
. Thankfully, the dir
command serves as the perfect Windows ls
equivalent for listing files and directories. From basic listings to hidden files and detailed views, dir
is the reliable alternative for file management in Windows. Dive into related topics like Window cat
command equivalent and Window grep
command equivalent for more tips!ShellHacks
Windows "ls" Equivalent: Find and List Files Easily - ShellHacks
Discover the Windows "ls" equivalent! Use the "dir" command in Command Prompt to list files, hidden items, and details. Perfect for Linux/macOS users!
π Shutdown Synology NAS Safely: Avoid Critical Errors
How to shutdown Synology NAS? The simplest method is to press and hold the power button until you hear a beep. This initiates a safe shutdown, preventing data corruption. For new Synology NAS owners, shutting down the device safely is essential to avoid hardware damage and ensure data integrity. Below, you will find detailed methods for safely shutting down your NAS, along with tips and links to additional resources.
1. Using the Power Button
The easiest and safest way to shutdown Synology NAS is by pressing the power button located on the device. This action signals the NAS to complete its shutdown sequence, ensuring all running processes are terminated safely.
Locate the power button on the front panel of the NAS.
Press and hold the button until you hear a beep.
Wait for the NAS to completely shut down before disconnecting power.
Using the power button is completely safe as the system manages the shutdown sequence, avoiding abrupt interruptions that could cause data loss or hardware damage.
β οΈ Warning: If the power button is pressed and held for too long, it may force the device to power off abruptly. This can interrupt ongoing processes, cause potential data corruption, or even damage the file system. Always release the button after the beep to ensure a proper shutdown sequence.
2. Shutdown via DiskStation Manager (DSM)
The DSM interface offers another reliable way to shutdown Synology NAS.
Log in to the DSM interface using your web browser.
Click on the user icon in the top-right corner.
Select "Shut Down" and confirm the action.
Shutting down via DSM ensures all active services and tasks are terminated properly. It is especially useful when the NAS is being accessed remotely.
3. Utilizing the DS Finder Mobile App
The DS Finder app provides a convenient option to shutdown Synology NAS from your mobile device.
Open the DS Finder app.
Navigate to the power options.
Select "Shut Down" and confirm the action.
This method is ideal for users who prefer managing their NAS remotely or when accessing the physical device is not feasible.
4. Scheduling a Shutdown
To automate the process, a shutdown schedule can be configured within DSM.
Open DSM and navigate to the Control Panel.
Select "Hardware & Power" and then go to the "Power Schedule" tab.
Set the preferred time for the NAS to shut down automatically.
This is an excellent option for users who want to save energy by turning off the NAS during periods of inactivity.
Conclusion
Shutting down your Synology NAS safely is crucial to maintaining both its durability and data integrity. Whether you use the power button, DSM interface, mobile app, or an automated schedule, these methods ensure a proper shutdown process. For more information, explore Synology NAS: First Time Installation & Setup Guide or learn advanced tools like Synology: Virtual Machine Manager β Install & Setup.
How to shutdown Synology NAS? The simplest method is to press and hold the power button until you hear a beep. This initiates a safe shutdown, preventing data corruption. For new Synology NAS owners, shutting down the device safely is essential to avoid hardware damage and ensure data integrity. Below, you will find detailed methods for safely shutting down your NAS, along with tips and links to additional resources.
1. Using the Power Button
The easiest and safest way to shutdown Synology NAS is by pressing the power button located on the device. This action signals the NAS to complete its shutdown sequence, ensuring all running processes are terminated safely.
Locate the power button on the front panel of the NAS.
Press and hold the button until you hear a beep.
Wait for the NAS to completely shut down before disconnecting power.
Using the power button is completely safe as the system manages the shutdown sequence, avoiding abrupt interruptions that could cause data loss or hardware damage.
β οΈ Warning: If the power button is pressed and held for too long, it may force the device to power off abruptly. This can interrupt ongoing processes, cause potential data corruption, or even damage the file system. Always release the button after the beep to ensure a proper shutdown sequence.
2. Shutdown via DiskStation Manager (DSM)
The DSM interface offers another reliable way to shutdown Synology NAS.
Log in to the DSM interface using your web browser.
Click on the user icon in the top-right corner.
Select "Shut Down" and confirm the action.
Shutting down via DSM ensures all active services and tasks are terminated properly. It is especially useful when the NAS is being accessed remotely.
3. Utilizing the DS Finder Mobile App
The DS Finder app provides a convenient option to shutdown Synology NAS from your mobile device.
Open the DS Finder app.
Navigate to the power options.
Select "Shut Down" and confirm the action.
This method is ideal for users who prefer managing their NAS remotely or when accessing the physical device is not feasible.
4. Scheduling a Shutdown
To automate the process, a shutdown schedule can be configured within DSM.
Open DSM and navigate to the Control Panel.
Select "Hardware & Power" and then go to the "Power Schedule" tab.
Set the preferred time for the NAS to shut down automatically.
This is an excellent option for users who want to save energy by turning off the NAS during periods of inactivity.
Conclusion
Shutting down your Synology NAS safely is crucial to maintaining both its durability and data integrity. Whether you use the power button, DSM interface, mobile app, or an automated schedule, these methods ensure a proper shutdown process. For more information, explore Synology NAS: First Time Installation & Setup Guide or learn advanced tools like Synology: Virtual Machine Manager β Install & Setup.
ShellHacks
Shutdown Synology NAS Safely: Avoid Critical Errors - ShellHacks
Discover how to quickly and safely shutdown Synology NAS. Follow these simple steps to prevent data corruption!
π How to Get Telegram Bot API Token in 3 Easy Steps
If you've created a Telegram bot and now you need to get its API token, the process is simpler than you might think. Using BotFather, Telegram's official bot management tool, you can quickly retrieve or regenerate the token. This guide will walk you through the necessary steps to locate your Telegram bot API token quickly and securely. Below are the step-by-step instructions.
π Continue Reading
If you've created a Telegram bot and now you need to get its API token, the process is simpler than you might think. Using BotFather, Telegram's official bot management tool, you can quickly retrieve or regenerate the token. This guide will walk you through the necessary steps to locate your Telegram bot API token quickly and securely. Below are the step-by-step instructions.
π Continue Reading
ShellHacks
How to Get Telegram Bot API Token in 3 Easy Steps - ShellHacks
Learn how to get Telegram Bot API Token in 3 easy steps. Follow this guide to retrieve your token securely and set up your bot hassle-free!
π The Best Windows Dig Equivalent for DNS Queries
The
The Windows
Below is a quick guide on how to use these commands to check DNS records in Windows.
π Continue Reading
The
dig
command is an essential DNS troubleshooting tool on Linux and macOS. However, attempting to use it in a Windows Command Prompt or PowerShell will return the errors as follows:'dig' is not recognized as an internal or external command, operable program or batch file.
---
dig : The term 'dig' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again.
The Windows
dig
equivalent are the Resolve-DnsName
command in PowerShell and the nslookup
command in Command Prompt.Below is a quick guide on how to use these commands to check DNS records in Windows.
π Continue Reading
ShellHacks
The Best Windows Dig Equivalent for DNS Queries - ShellHacks
Discover the best Windows dig equivalent for DNS queries. Learn how to use Resolve-DnsName and nslookup commands with examples. Start now!
π MikroTik Script: Create, Run & Schedule β Example
Fore more efficient network management, different tasks in MikroTik can be automated using scripts. For example, you can create a script to check the availability of some host(s), and it run manually, or automatically using the MikroTik scheduler. This guide will show you how to create, run, and schedule a script on MikroTik RouterOS.
π Continue Reading
Fore more efficient network management, different tasks in MikroTik can be automated using scripts. For example, you can create a script to check the availability of some host(s), and it run manually, or automatically using the MikroTik scheduler. This guide will show you how to create, run, and schedule a script on MikroTik RouterOS.
π Continue Reading
ShellHacks
MikroTik Script: Create, Run & Schedule - Example - ShellHacks
Simplify network management using MikroTik scripts. Learn how to create, run and schedule a MikroTik script step by step with examples.