Remove is-* tags from blockquotes

This commit is contained in:
RealStickman 2022-05-27 16:05:08 +02:00
parent 5193aafc18
commit 40f8732154
10 changed files with 8 additions and 28 deletions

View File

@ -38,4 +38,3 @@ Change compression
`# kopia snapshot list (path)`
> [Check the "Getting Started" Page for more options](https://kopia.io/docs/getting-started/)
{.is-info}

View File

@ -4,7 +4,6 @@ title: 'Xen Orchestra'
## Installation
> Use the script [XenOrchestraInstallerUpdater](https://github.com/ronivay/XenOrchestraInstallerUpdater) to install Xen Orchestra from sources.
{.is-info}
### Installation within VM
The supported distibutions are listed in the Github README.
@ -30,7 +29,6 @@ A local SSH tunnel is established, forwarding port 443 on dom0 instead.
One prerequisite is ssh-key based access to dom0 from the xen orchestra VM. See [SSH](/remote/ssh)
> Based on testing and [this forum post](https://xen-orchestra.com/forum/topic/528/connection-port-in-settings-servers-not-used-for-console) it is known the Xen API returns the dom0 public IP address for additional connections within Xen Orchestra. This includes the VM console and usage statistics for example.
{.is-info}
To work around this issue, a firewall rule can be used to redirect traffic outbound to dom0 on port 443 to the local ssh tunnel instead.
@ -86,7 +84,6 @@ To remove this rule again, edit `/etc/firewalld/direct.xml`
This section provides documentation on basic firewall usage. For example, allowing port 22/tcp for ssh with `firewalld`.
> In general, [this guide by Digital Ocean](https://www.digitalocean.com/community/tutorials/how-to-set-up-a-firewall-using-firewalld-on-centos-7) provides a good starting point.
{.is-info}
For this Host the services `http`, `https` and `ssh` are allowed.
@ -94,4 +91,3 @@ For this Host the services `http`, `https` and `ssh` are allowed.
### Exclude VM Disks from Backup
To exclude disks from backup jobs, one can prepend the disk name with `[NOBAK]`
> Also see [the official documentation](https://xen-orchestra.com/docs/backups.html#exclude-disks)
{.is-info}

View File

@ -69,4 +69,3 @@ WantedBy=timers.target
`# systemctl enable --now podman-image-prune.timer`
> [Documentation](https://docs.podman.io/en/latest/markdown/podman-image-prune.1.html)
{.is-info}

View File

@ -77,7 +77,6 @@ Add this following line:
The main config file is `(nextcloud dir)/config/config.php`
#### Automatic Trash clearing
> [See this page](https://bayton.org/docs/nextcloud/nextcloud-hoarding-trash-how-to-force-automatic-removal-of-deleted-items/) for more options
{.is-info}
This settings keeps the files for 15 days, unless drive space is getting low.
In that case it delets them earlier.
@ -117,7 +116,6 @@ Dump database to file
``mysqldump --single-transaction -h [server] -u [username] -p[password] [db_name] > nextcloud-sqlbkp_`date +"%Y%m%d"`.bak``
> [Official documentation](https://docs.nextcloud.com/server/latest/admin_manual/maintenance/backup.html)
{.is-info}
#### Backup Script
```
@ -146,12 +144,11 @@ mariadb -h $server -u $username -p$password -e "CREATE DATABASE nextcloud CHARA
`mariadb -h $server -u $username -p$password $db_name < nextcloud-sqlbkp.bak`
> [Nextcloud documentation](https://docs.nextcloud.com/server/latest/admin_manual/maintenance/restore.html)
{.is-info}
> [Nextcloud documentation](https://docs.nextcloud.com/server/latest/admin_manual/maintenance/restore.html)
## Collabora Online Container
> Unfinished
{.is-warning}
```
# podman run -t -d --name collabora-online -p 9980:9980 \
-e "extra_params=--o:ssl.enable=false" \
@ -162,10 +159,10 @@ mariadb -h $server -u $username -p$password -e "CREATE DATABASE nextcloud CHARA
## Onlyoffice Container
> Unfinished
{.is-warning}
```
# podman run -it -d --name onlyoffice -p 9480:80 \
--restart always \
--label "io.containers.autoupdate=image" \
docker.io/onlyoffice/documentserver:latest
```
```

View File

@ -132,5 +132,4 @@ PersistentKeepalive = 5
## Iptables no local access ssh user
> [Block outgoing network access for single user](https://www.cyberciti.biz/tips/block-outgoing-network-access-for-a-single-user-from-my-server-using-iptables.html)
> [Restrict internet access for user](https://unix.stackexchange.com/questions/21650/how-to-restrict-internet-access-for-a-particular-user-on-the-lan-using-iptables)
{.is-info}

View File

@ -18,7 +18,6 @@ The config can be found under `/etc/powerdns/pdns.conf`
For MySQL I chose `launch=gmysql`
> A [list of backends can be found here](https://doc.powerdns.com/authoritative/backends/index.html)
{.is-info}
Add the following parameters below `launch=gmysql`
```
@ -95,10 +94,8 @@ To bind to all interfaces, use `local-address=::,0.0.0.0`
## DNSSEC
### Authoritative Server
> *TODO*
{.is-warning}
> https://doc.powerdns.com/authoritative/dnssec/index.html
{.is-info}
### Recursor Server
To fully enable DNSSEC, set `dnssec=process-no-validate` to `dnssec=validate`
@ -110,7 +107,6 @@ Show domains with disabled DNSSEC
`# rec_control get-ntas`
> [DNSSEC Testing](https://wiki.debian.org/DNSSEC#Test_DNSSEC)
{.is-info}
## WebGUI
### PowerDNS-Admin
@ -152,4 +148,4 @@ WantedBy=multi-user.target
```
`# systemctl daemon-reload`
`# systemctl enable --now powerdns-admin`
`# systemctl enable --now powerdns-admin`

View File

@ -32,7 +32,6 @@ Accept the EULA by editing `/etc/minecraft/forge-(version)/eula.txt`
## Systemd Service
> Adapted from [this gist](https://gist.github.com/dotStart/ea0455714a0942474635)
{.is-info}
`/etc/systemd/system/minecraft.service`
```
@ -64,7 +63,6 @@ WantedBy=multi-user.target
## Systemd Service with STDIN available
> Based on [this stackexchange answer](https://unix.stackexchange.com/questions/598221/how-to-control-systemd-service-using-screen/612118#612118)
{.is-info}
`/etc/systemd/system/minecraft.socket`
```
@ -108,4 +106,4 @@ To run commands, pipe commands into your socket.
```
#!/usr/bin/env bash
echo "$@" > /run/minecraft.stdin
```
```

View File

@ -27,7 +27,6 @@ Initialize the step-cli client
## Create Certificates
> [Official documentation](https://smallstep.com/docs/step-cli/basic-crypto-operations)
{.is-info}
Enter the container
`# podman exec -it step-ca bash`
@ -49,9 +48,8 @@ Point your ACME client to `https://(domain/ip):9000/acme/(provisioner-name)/dire
## Device Truststore
### Arch Linux
> [Archwiki Article on TLS](https://wiki.archlinux.org/title/Transport_Layer_Security#Add_a_certificate_to_a_trust_store)
{.is-info}
Add new trust anchor
`# trust anchor (root ca.crt)`
List trust anchors
`$ trust list`
`$ trust list`

View File

@ -30,7 +30,6 @@ podman run --name gitea -p 3000:3000 \
The next few lines are used to set up ssh-redirection to gitea if it is used to clone a repo.
> See also the [official documentation](https://docs.gitea.io/en-us/install-with-docker/#sshing-shim-with-authorized_keys)
{.is-info}
`$ sudo -u git ssh-keygen -t rsa -b 4096 -C "Gitea Host Key"`
`$ sudo -u git cat /home/git/.ssh/id_rsa.pub | sudo -u git tee -a /home/git/.ssh/authorized_keys`

View File

@ -3,7 +3,6 @@ title: Grav
---
> [Official Documentation](https://learn.getgrav.org/17)
{.is-info}
## Requirements
`# apt install nginx php php-fpm php-gd php-apcu php-yaml php-zip php-xml php-mbstring php-curl unzip`
@ -79,4 +78,4 @@ server {
server_name DOMAIN_NAME;
return 404;
}
```
```