How Do You Get around The AccessDeniedException Error with SonarQube?

Problem scenario
You are trying to set up SonarQube for the first time. You run this command:

bash /opt/sonarqube/bin/linux-x86-64/sonar.sh console

You see this error:

“jvm 1 | java.nio.file.AccessDeniedException: /opt/sonarqube/temp/conf/es/elasticsearch.yml”

What do you do?

Solution
Make sure that the user who is running the command has the ability to execute files in the /opt/sonarqube/ directory (or wherever the destination is that you are installing Sonarqube).

How Do You Verify the Jenkins Credentials Plugin Username and Password Are Correct and in the Right Syntax?

Problem Scenario
You are using Jenkins and its Credentials plugin. You are not sure if the syntax of the username and password are correct. You think that there may be a wrong username or password. You want to see how things look as they are used in a pipeline job. The console output shows the credentials as “****”. What should you do?

Solution
Warning: this is not a recommended practice.

How Do You Install OpenLDAP on Debian Linux?

Problem scenario
You have a Debian Linux server. You want to install OpenLDAP on it. What do you do?

Solution
(These directions were tested to work on Debian 9 in Google Cloud Platform.)

1. Run this command:
sudo apt-get -y install slapd ldap-utils

2. Set a new password for the administrator.

3. Uncomment the “BASE” and “URI” stanzas in /etc/ldap/ldap.conf.

How Do You Troubleshoot This Ansible Message “module_stderr…Shared connection to server closed. [Errno 13] Permission denied…MODULE FAILURE”?

Problem scenario
You try to run an Ansible playbook, but you get this problem:

“module_stderr…Shared connection to server closed. [Errno 13] Permission denied…MODULE FAILURE”

How do you fix it?

Solution
Is the Ansible playbook configuring the mode settings to not allow other users to execute the file? It could be that lower in the Ansible playbook, after the file is protected from other users executing it,

How Do You Install Kerberos Key Distribution Center Server on a CentOS/RHEL/Fedora server?

Problem Scenario
You want to install the Kerberos KDC server on a Red Hat derivative of Linux.  You want to test it out with a second Red Hat distribution of Linux server as a client of the Kerberos centralized authentication server.  What do you do?

Solution
Prerequisites
Ensure the Kerberos authentication server can receive inbound connections over ports 88,

How Do You Fix the Problem of Being Prompted for the Root Password When You Want to sudo as a Given User?

Problem scenario
You try to run a command with sudo and you are prompted for the root user password (not the password for the username who issued the sudo command). You want to be prompted for the user (e.g., jdoe) not root.  What should you do?

Solution
Root cause
sudo is not configured properly.

Procedures
1. 

How Do You Secure a Docker Container, a Docker Host, and Their Network?

Problem Scenario
You have been tasked with finding ways of securing Docker containers, a Docker host, and your network that has Docker containers.  How do you harden a Docker container and its related infrastructure (i.e., the Docker network and Docker host)?

Solution
Overview

From a pragmatic perspective we understand that there are exceptions to the recommended practices.  (Not the least of which is the rapid rate that technology changes.)  The assertions below are recommended practices.