Category Archives: Show Notes

Admin Admin Podcast #076 Show Notes – Audience Participation

In this episode, we go through your questions and feedback. Keep it coming! For example via our Telegram group

First question is from meaty:

– Meaty, a sysdmin in education

First a touch of background to add some context: I work as a team lead & sysadmin (+ “hack” of all trades) in education on a fairly large Windows network. Low budget, high demand, and besides some legal stuff and, contrary to what all the teachers and admin staff believe, no overly urgent requirements (no intellectual property, no critical systems, no four-9’s uptime requirements, but we do have lots of personal and sensitive data). We have an old, mostly unchanging network but due to the nature of teaching, many departments change up their location and/or software (which is often cheap, poorly made and has incredibly specific requirements) on a termly or yearly basis. Lots of “last minute this is urgent do it now” stuff, and even more projects where we’re not consulted and have to hack together solutions at the 11th hour after the majority of work has been done without anyone communicating with us.

We’re small enough that we don’t have much available extra capacity people or resource-wise, but complex enough to have a couple dozen servers (mostly VMs) running on old hardware and nearly 100 switches across a dozen buildings on four campuses, on top of other random infrastructure that is becoming digitised, such as boilers, cctv, access control. Small team, too, so time is tight. No overtime and no out-of-hours work (9-5 only) which is nice, but causes problems as we have no maintenance windows to make changes!

q1: in order to make our lives easier I’m beginning to embrace more automation. We’ve got the big stuff out of the way but to proceed we’re looking into using lots of custom powershell scripts for a lot of this given the random requirements and poor quality of our software. We’ve run into a small issue but I’m not sure what the best practice and most practical solution is. We often need to run scripts over night. So far we’ve run them off a random server that also does other things during the day (hosts a few end user applications) but we know there’s a better way. What is it? Dedicated server? Does something exist that’ll manage this for us instead of using task scheduler on a 2016 box?

q2: We deal with a lot of sensitive data across a lot of systems involving many different types of person – students, staff, parents, visitors, governors, contractors, etc. We know that if an incident/breach occurs and we need to investigate, we’ll be on the phone to an expensive third party to come in and investigate for us as we just don’t know what to look for or where to find it. We need some kind of centralised logging, which we can deploy in time. For now, though, what are the essentials to enable and where can we find them? (eg: logging in AD)

Running scripts on machines

Jerry suggests Ansible for Windows, it speaks to WinRM and runs powershell scripts on the node. Jon suggests Ansible Tower/AWX. It’s an Ansible job scheduler and a credential store. He also suggests version controlling those powershell scripts/ansible code in version control e.g. with Gitlab. Advantges include the ability to run config mgmt from a single place – a “single pane of glass”

He warns that running Gitlab and AWX on a machine can be resource heavy. Jon refers to his Vagrant machine for Gitlab and AWX.

Al reckons that on the windows side, SCCM is good and in depth but expensive. He notes that charities or educational institutions can get it cheaper

Centralised logging/data security

On windows – the Auditing Service is something that can be enabled on the Domain Controller. It logs events like user logging, searching can be a challenge due to the amount of data created.

Al mentions that you can enable these with some scripts.

He also mentions Logrhythm, and products from Quest (actually InTrust). Winlogbeat can ship logs to e.g. an ELK stack. Jon mentions Snare

Jerry mentions that good versioned backups help with Ransomware attacks

Make your servers disposable (cattle vs. pets)

Encryption at rest
  • Bitlocker (windows)
  • LUKS (Linux)
  • Veracypt (Cross-platform, but beware that there’s no veracrypt device driver for Win10 install environments, which can cause an issue with quarterly Win10 upgrades)


Next question is from Andy

– Andy, deploying Windows Desktops

“Is there an affordable way to image Windows desktops that is less insanely complex than Microsoft’s deployment thing?”

I’ve already had a few suggestions here on Telegram but perhaps other listeners face the same challenge.

  • MDT with SCCM on top
  • You must have a Volume License Key to even image a Windows machine, though it’s technically possible to do it without one
  • MDT builds a “golden image”, which then gets pushed to the server
  • Initial Setup is a big effort, but makes life easier once its done.
  • Sysprep resets the machine’s SID to make sure the image can be put on different machines
  • PXE (Legacy & UEFI)
Our last question comes from Stuart

– Stuart, wonders about what to do in the case of a significant outage at a cloud provider

AWS/GCP/Azure fall off the face of the planet overnight, and you are now faced with either choosing smaller providers (with probably a much smaller feature set) or moving back to on-prem

In that situation, what would you choose?

If the former, how would you deal with the limitations? Would you mix and match workloads across multiple providers or would you stick with one or two and work with the limitations?

If the latter, would your workflow and choice of infrastructure change based upon how you work with the cloud now? Would you steer more towards hyperconverged and/or private cloud in a box solutions, or would it be VMware/KVM/Hyper-V with config management, or just revert to how it was pre-cloud days?

I suppose in a sense it’s a question partly about reliance on the big clouds, but also how do you think on prem has improved (if at all) to keep up with the cloud providers

Jon thinks losing all the big cloud providers is pretty unlikely, Jerry thinks if that happens, we would have bigger problems.

Do we count DigitalOcean? They don’t have things like autoscaling and key mgmt, but it should be possible to build these yourself and use smaller providers. If the big 3 disappeared, smaller providers might rush to fill that space. Jon points out that there isn’t really a framework for running Functions-as-a-service (e.g. AWS Lambda).

Jerry says that a Lambda function is just a container – if you have an easy way to get those up and running.

Jerry mentions he has been working with on-prem for most of the last year. In that environment it’s still worth thinking in terms of cloud workflows to inform the on-prem work. The other thing is that on-prem environments can be made easier to manage by using the tooling that has grown up around managing infra on cloud providers.

Jon mentions VMware.

– Vmware NSX-T can run in AWS (and others, including bare metal)

Jerry mentions oVirt.

Al is still 50/50 between running on-prem stuff and running stuff in the cloud. He doesn’t think on-prem is going anywhere 🙂 He would also be using modern tooling to get things done.

We got some Feedback from David:

Thank you for your podcast.

In episode 075, you asked about tools to check whether a web page had
changed. You might like to try Silas Brown’s WebCheck program: [Note: we were contacted by the author of this app to note that the URL had changed. This link is now the accurate one.]

Thank you


We also got Feedback from Producer Dave:

Hey chaps,

Just wanted to say thanks for a fantastic episode 75.

I gotta be honest, a lot of what you guys talk about goes over my head as I’ve never used Selenium, Terraform, Ansible, etc… but I still enjoy listening because I can often pick up some utter gems.

This time around I’ve managed to fall in luuurve (wrong podcast?) with SyncThing and Digital Ocean.

I’d heard much talk about SyncThing on t’interwebs, but it wasn’t until I heard about it on this episode and actually looked into it more that I realised how powerful it actually is. I’m currently using it to perform a one-way backup key folders on my phone and tablet to my laptop. But I also have a two-way sync (kinda like a Dropbox or NextCloud shared folder) in place so that I can transfer files to my phone seamlessly.

Having heard about Al’s experiences of spinning up a NextCloud instance on a $5 Digital Ocean droplet, I decided to do the same as a test… and ended up shifting over to it permanently. All I had to do was spin up the droplet, snap install nextcloud, enter some information, run a single command to apply a Let’s Encrypt certificate, and that was it. 5 minutes, tops. And moving all my stuff between instances was really straight forward too. So thanks for the confidence to make the move, Al!

At the moment, I have 3 VPSes (costing over ÂŁ36/month) that I could quite easily replace with a number of DO droplets. A $5 droplet, with backup, plus VAT is just under ÂŁ6, so I could theoretically spin up to 6 $5 droplets (or fewer if I spin a $10 one up, which I might do for some of the smaller services I’m running), but I don’t think I’ll need that many, which will save me money in the long run – win!

Again, thanks for a great episode, and congratulations on the audio quality… you should give your producer a pay rise #JustSaying



We lastly got Feedback from Jason:

As gathered from the Iron Sysadmin Slack:

XenoPhage (Jason) [12:59 AM]
Hey @JonTheNiceGuy … Was listening to AdminAdmin 75 .. (Yeah, I’m behind a bit) .. Tell Al to take a look at .. Works great with monitoring systems like nagios/icinga2/etc. for monitoring versions of software.. I’ve used it for years to let me know when updates come out for things i can’t just add a yum repo for. :slightly_smiling_face:

Al seems to have dropped off the recording!

Consolidating services chat:

Jon is involved with the infrastructure, where they have the following problems:

  • x86 build – becoming unsupported by modern OSes
  • Too many machines – looking for a way to reduce the number of physical machines.

Jerry’s instinct is to decouple services, Jon is interested in using docker or something similar

Docker has a way to glue the networking of individual containers together. More complex deployments would probably require e.g. Kubernetes – which is much more complicated.

Any suggestions from listeners?

Al is back!

Thanks Dave! 🙂 We agree to a payrise on-air..

Thanks Patreons!

  • Mike
  • Yannick
  • Andomi
  • Dave


  • Oggcamp – We’re all going – see you there? 🙂

Welcome to new listeners! Give us feedback

Admin Admin Podcast #075 Show Notes – Highly Available Updates

In this show we read your feedback, we answer your questions and talk about what we’ve been up to!

Want to join the community talking about this podcast on Telegram? Join us!

Al’s back!

Jerry has been subcontracting freelance work out to people, and talks a bit about how and why he started doing that. He also talks about how he’s using Selenium to sign up for free train wifi, using the Selenium IDE Firefox plugin and having a headless browser using Selenium Side-Runner.

Al asks about how to update systems after there was a security incident on his email system. Jon mentions a Firefox plugin which watches for page changes. (He credits this find to Steve Gibson, but he couldn’t find the one Steve mentions. He found this one instead: check4change.  Jon describes an Ansible script for running Apt upgrades but notes that it doesn’t perform reboots if they’re required, Jerry also mentions Unattended Upgrades and Yum-Cron.

Jon refers to a Fortigate Playbook policy Ansible script that he’s written (but isn’t endorsed for use by his employer – use at your own risk!) He describes change management boards. Jerry mentions you can convert an XLS to a CSV and that Ansible will handle CSV files.

Jon also mentions about the fact he’s learning to use Terraform for IaaS (Infrastructure as a Service – basically Azure/AWS). He wrote a blog post about how he got started with Terraform on Azure. Jon mentions about a talk with HashiCorp and RedHat talking about how Ansible and Terraform can work together. Jerry explains how you can chain the output of Terraform to start an Ansible task.

Al talks about the Phoenix Project as an Audiobook, and asks for recommendations on further Audiobooks to listen to. Jon recommends the “#CauseAScene Podcast“.

We then answer a question from a member of the Admin Admin Podcast community about High Availability:

Scenario is a CentOS7 guest VM on a single ESXi host (no vCentre/HA) located at customer site.

Users connect to a friendly URL via web browser which is mapped via A record pointing to a static IP within customer block of IP’s associated with customer broadband.

The solution works well but has several points of failure as this single CentOS7 server running on a non-HA ESXi host not to mention customer Internet reliance.

If wanted to make this highly available either onsite or via AWS/Azure how would you go about this whilst also keeping this secure.

Main Components

  • Apache Web Server
  • PHP Code – Customer Bespoke Internal Website
  • MySQL/MariaDB – Database

How would you go about breaking these up into either individual VM’s? IE multiple web servers and separate PHP and Database servers.

I would imagine you would then also require a front-end load balancer or reverse proxy.

Is this something you might look at using Docker for and how would this impact database state and backups to ensure no data is lost.

We discuss feedback we received by email:

Hi chaps

In a recent episode you asked for feedback, so I thought I would drop a quick line to say that I enjoy listening to the show and look forward to it every other month. 60-90 minutes is about the right length and I think having a topic each time (e.g. IPv6) works well.

I can’t think of anything to offer for improvements – just more of thesame please!


Jon replied:

Are there any subjects you want us to cover in the next few episodes?

To which the response was:

Anything to do with Ansible or AWS would be of interest to me, as I use Ansible for all my servers and I’d like to get into AWS as it’s becoming something that clients are asking about.

Based on this email, we briefly discuss differences between Azure and AWS networking compared to Physical networking.

We also discuss another email feedback (trimmed on the podcast, but represented in full here):

Hi guys !

I just finished listening to episode 73 where Jon talked about the difficulties he had with certbot and some exotic architecture.

Here at work, we also had to figure out a way to secure many websites, hosted on various kinds of servers, and running on a variety of operating systems.

The best solution we came up with is to use nginx as a reverse proxy. That proxy handles the TLS part, and it’s the only place our certificates are located. Its exposes the .well-known directory and redirects traffic to the proper servers. If we need to add or remove cyphers for security reasons, all of our websites are protected at once.

We also have a wildcard certificate for our company’s domain. I’ll take as an example. This cert is actually valid for 2 domains : and *

Each time we need a new subdomain, we create it in our DNS and point it to the reverse proxy. We can then forward traffic to a whatever server we want inside our network, even exotic ones.

This has many advantages :

  • there is only one place where the certs needs to be stored – easy to backup, no need to run around the network when time comes to renew the certs ;
  • the cert is a wildcard so we can have as many subdomains as we want ;
  • the only server exposed to the internet is the reverse proxy, not the actual web servers ;
  • the traffic can be forwarded to old servers that do not support the new TLS protocols, or have old vulnerable cyphers – yes, I’m talking about you IIS ! ;
  • the traffic is forwarded over HTTP, so we can reduce the load on the web servers ;
  • there is no need to modify the actual webserver, in particular, no need to expose the .well-known directory ;
  • servers can be moved around, migrated from one architecture to another, etc.. without having to bother about certificates or encryption.

That’s how we did it at work, it works like a charm for us, but that doesn’t mean it’s the only way to do it. If someone as another way to solve that problem I’d be glad to hear it !

Thanks for the great show, it’s always a pleasure to listen to.

a.k.a. The frenchguy from Switzerland

We thank Dave Lee (@thelovebug) for doing our audio production, we thank our Patreons and we mention OggCamp (get your tickets now!), and note that we all plan to be there! Hope to see you there!

Admin Admin Podcast #074 Show Notes – Devops is not a dirty word

Sadly, we’ve no Al this time, it’s just Jon and Jerry.

Want to join the community talking about this podcast on Telegram? Join us!

In this episode, we talk about:

  • Options about how to change your Windows password without logging into a Windows Machine:
  • What “is” Active Directory – it’s not open source LDAP and Kerberos, but an implementation of the open protoocol.
  • We want to do more Q&A – email us!
  • We talk about TDD and Infrastructure as Code
    • inspec
    • rspec
    • Noted that you sometimes need to mock up the connections to external services, e.g. you can’t always “mock” connecting to an IRC server.
  • Mentioned IRC, SMTP, CI/CD, Vagrant
  • DevOps is a Buzzword (so was Cloud!) but it isn’t a dirty word!
    • Jon and Jerry disagree on terminology! Jon thinks DevOps is a culture not tooling. Jerry thinks you can have tooling because the tools didn’t exist, or weren’t in mainstream use a few years ago.
    • Config Management Tools are mentioned (things like Ansible, Chef, Puppet, Salt and more…)
    • Jon talks about silo‘ing that happens in large enterprises, and then explains how DevOps aims to change that behaviour.
    • We talk about multi-disciplinary teams, and how the team members in those teams don’t lose their own unique skills. We talk about how Infrastructure as Code massively supports that requirement.
    • Jon mentions Smoke Tests, Jerry mentions Disposable Infrastructure. Jon mentions Geek Code, Failing Fast, chaos monkey and Game Days.
    • We mention change management rituals (including ITSM toolsets) and why “don’t push to prod on a friday” isn’t a good idea (in certain cases) and GitOps.
  • Synchronising between a “Live” and “Dev” wordpress environment – audience, we need your help! 🙂
    • Mentioned LAMP Stack and Restic
    • Taking Database Dump and manipulating the resulting data.
    • Suggested using an ansible playbook, or using MySQL Views. Neither are suitable right now!
  • Mentioned OggCamp – and that they’re looking for talk submissions for the scheduled track at the moment.
  • Mentioned FossTalk Live

Admin Admin Podcast #073 Show Notes – This ain’t your pa’s Co-Lo Service

IPv4/IPv6 Questions following the previous episode
– Can you have dual stack?
– IPv6 takes precedence and therefore can be an attack vector –
– Why do IPv6?
– How does peering work?
– Discuss mDNS

MVC (Model, View, Controller) explained, briefly, while talking about Laravel (a PHP web framework).
– Test Driven Development briefly explained –
– Behaviour Driven Development briefly explained –
Cucumber, Inspec, rSpec, Travis-CI, Selenium mentioned

– Issue with Let’s Encrypt’s SNI test which has now been resolved, but required upgrade to Certbot
– Talked about common issues with Certbot

Mentioned Travis-CI again and CircleCI

Talking about IPTables Firewalls and how that’s been applied to a Mikrotik Firewall. Also mentioned about generic firewall policies –

Discussed MS SBS replacement – what your options are in the cloud – Azure, AWS.

Mentioned Cryptography Video on DH Key Exchange –

Talked about at home backup solutions – Jerry recommends Restic –

Talked about setting up KVM on Linux

If you want to talk to other members of the community, contact the hosts or support the show, please go to

Admin Admin Podcast #072 Show Notes – Tunnels and Tools

Al was debugging VPN Tunnels

Jon was playing with IPv6

Hurricane Electric IPv6 Gateway on Raspbian for Raspberry Pi

Jerry was playing with salt stack and building LAMP stack from scratch using Ansible

iptables flow digram

install UFW on CentOS (It’s in EPEL)

Podcasts mentioned in the show:

Other “things” mentioned in the wrap-up

Monitoring Weekly Newsletter, FossTalk Live, OggCamp

Admin Admin Podcast #071 Show Notes – Little CRUDdy clouds

What have we been up to:

Other things we mention:

CRUD (create/read/update/delete data)

Links to other podcast we mention:

Patreon Link 

Admin Admin Podcast #070 Show Notes – A game of two halves

We have an interview with VM (Vicky) Brasseur about:

Al and Jon mention Freenode Live event (although it’s now past us by!)

The website Al mentions about how to Renew SSL Cert on windows without generating a new private key.

Jon discusses an IPSec talk which he then wrote up on his own Blog with more details.

Jon also talked about a scam where someone was paid $15 to hook a box up to their router, which was capturing all the traffic on the internet.

Mark (from the binary times podcast) emailed in to suggest using a Toner Tester when trying to trace cables.


Admin Admin Podcast #069 Show Notes – Message received, decoded and understood

Things Mentioned in the Podcast:

Live Oggcamp show
National Cyber Security Centre 
Vault by HashiCorp
Exchange TLS email
Office 365 deadline day
Amazon Simple Email Service and
Renew SSL Cert on windows 
lnav Log Viewer

New Podcast we mention..

Bug Report
Linux Lads
Ubuntu Security Podcast
Tales Of The UnattestedHollywood Outlaws 
The Binary Times
Hollywood Outlaws 


Admin Admin Podcast #68 Shownotes – Live from OggCamp 2018

Thank you Joe Ressington for recording and producing the Show!

Talks Mention in the Show:
Load Balancing 101 & Building a Linux Load Balancer
Plumbing for non-plumbers
Matrix, the year to date
rst2pdf: Use a text editor, make a 
Technologists of the World Unite. You have nothing to lose but your bosses!
Morality and Ethics – Caring is Everything

Other things mention in the show:

Admin Admin Podcast #67 Shownotes – It’s all about the VPNs!

Storage Replica
Mind mapping
Mike Tech Show

Type of VPNs:

Different Type of VPNs:

Admin Admin Podcast #65 Show Notes – Learning to accept failure

This is the episode of the ironsysadin podcast we discuses in the podcasts

Windows admin Center is the new way to manage servers in windows 2016.

tldr command

Tiny Tiny RSS

Jon’s Learning List!

Mailing List: DevOps’ish:
Mailing List: Andy Bounds Tuesday Tip:
Mailing List: Security Newsletter:
Mailing List: Awesome Self Hosting:
Mailing List: Servers for Hackers:
Mailing List: The Hustle:
Mailing List: Versioning:
Mailing List: Cron Weekly:
Mailing List: DevOps Weekly:
Mailing List: Monitoring Weekly:
Mailing List: Raspberry Pi Weekly:
Mailing List: SRE Weekly:
RSS: How I Automate:
RSS: Free Tech Books:
Slack: HangOps:
Slack: All Day Devops:
Slack: Manchester Tech:

Al’s List

Mailing List: THE WORD FROM GOSTEV – You need to signup to this forum to get the weekly Veeam  Digest.
Podcast: Minimalist