Author Archives: Nitin J Mutkawoa

Tips for Mauritians traveling abroad for holidays

Traveling abroad demands a lot of planning and preparation including budgeting. In this blog post, I will share some of my experience and tips whilst traveling abroad especially for holidays or business purposes from Mauritius. Mauritius is an island nation in the Indian Ocean. The strategic location in the Indian Ocean makes it very easy to travel to Europe, Africa, and Asia continents. But it all depends on the number of airlines available. I have been traveling to the United States, South Africa, Tunisia, Reunion island and several other countries. You can check out this link – My Travel which I usually update each time I travel abroad. The first thing before I started planning anything is to know the number of days you want to stay out of Mauritius.

Photo credits: vectorstock.com
Photo credits: vectorstock.com

VISA Requirements

Mauritians are exempted from VISA from many countries. Though there is an exemption, you need to carefully check the number of days you are exempted. Otherwise, if you are staying for more than the allocated number of days, you might need to ask for an extension of the visa once you have reached a particular country. The process which you need to go through when extending the visa can be very time-consuming. This is why planning is important where you can easily apply for the visa before leaving Mauritius territory.

For countries where VISA is needed you need to apply the same before leaving. However, some countries issue a visa upon arrival. But common, no one wants to waste time to apply for a visa upon arrival of a particular country unless you do not have any choice. For instance, it is better to apply for a visa in Mauritius itself before going to Bangkok, Thailand.

Some of the countries where Mauritians can travel freely without a visa are Senegal, Botswana, South Africa, etc.

Tips for Mauritians traveling abroad for holidays 1

An interesting source of information is at Visalist.io/mauritius/visa-policies website which provides clear information by country. However, this should not be a definite decision to check if it is a visa free country. Any country can alter its visa requirement and it is important to verify the information on the official website of the embassy.

Health-related issues and vaccinations

So, now that you are aware of the visa requirements, it is now to question yourself about the vaccines you have received. It is always important to keep records and document all vaccines received. Some months back, the Ministry of health in Mauritius was giving free MMR ( Measles Mump Rubella ) vaccines in Mauritius. They came to the office where I was working and everyone was receiving the MMR booster. Many was not documenting it which I believe is not good. Always keep a vaccination card handy and document it.

There are several recommendations by the ministry of health about the vaccines that one should be given when traveling to other countries. For example, I had to get the Yellow vaccines and malaria prevention pills when traveling to Senegal.

One of the interesting online resources for health-related issues that I would recommend is the CDC – Centers for Disease Control and Prevention website. One vaccination center in Mauritius is situated at Mutual aid building in Port Louis. There is another private vaccination center in Mauritius too such as Darnee Medical Clinic located at Forest-side Curepipe. Make sure that the vaccinations are available and also if one particular vaccine needs to be administered in two or more shots at different days, make sure that the vaccination is not out of stock. Otherwise, you might end up repeating the whole process again.

Sometimes, border control officers will not allow a passenger to enter its territory if you don’t have the vaccination cards with you. A few months back at the airport of South Africa, I noticed a passenger who was not in possession of the vaccination card. Usually, there is no vaccination required. But it happens that the passenger had traveled during the past weeks to a country where yellow fever vaccine was needed. They wanted to check if the passenger was properly vaccinated. This might, therefore, raise an issue. Always carry your vaccination cards with you when traveling abroad.

Booking a ticket

When it comes to reservation of tickets, I have never been to any agency for ticket booking which can be very expensive and time-consuming. The best to check on the official website of the airline company first. Now, you might question yourself, say you want to go to Bangkok and which airline will you choose. Here is the catch: The ATOL website might be very useful. On the ‘Airline section‘, you will have a list of all airlines that travel to Mauritius. Once, you have spotted the airline company you can compare prices. Another interesting place to purchase ticket more easily is on lastminute.com which makes it fast to choose between the cheapest price to direct flight.

Once a ticket has been booked, make sure you download the mobile app of the airline company so that online checking can be very easy and fast at the same time. Also, if there is any change in the airline time scheduled, it will be updated on the app itself. Choosing your seat to become much faster and you will have a clear map of the plane seats. You might want to consider whether the plane is an Airbus or Boeing at your convenience.

Some people try to delete their cookies and cache from there browser when booking online. Airline companies feed themselves from cookies on your web browser to understand the date you want to travel and might consequently increase the price. You might consider deleting cookies each time you search for a ticket price. Also try to sign out and change the location using proxies as a ticket might be a different price from a different browsing destination.

Some Airline companies provide special meals which might be interesting in case you are allergic or vegetarian. On British Airways, a veggie meal is composed of eggs and other vegetables. Some Vegetarians do not want eggs which you might consider.

Travel and Health Insurance

Some countries insist that people visiting their country are medically insured such as Reunion island and Germany. Always verify this information before traveling abroad. Alternately, there are some credit cards issued by banks that provide free health and travel insurance. You might want to verify with your provider and gather the document to show at the customs when reaching abroad. Some travel agency such as lastminute.com can provide free travel insurance in case your luggage has been damaged or lost during transit.

Choosing a Hotel

If you are a solo traveler, a 5-star hotel can be very expensive. You might probably look for the cheapest place such as Agoda, AirBnB or booking.com. It is always a plus to read the reviews on Trip Advisor or on booking.com itself as you never know what is awaiting you ahead. Several times, I booked with booking.com and most of the time it went well as expected. If you want a 10% discount with booking.com, click on the picture below and register yourself.

Tips for Mauritians traveling abroad for holidays 2

Make sure you check for the basic amenities, including showers, heaters, air conditioning, towels, Internet and/or Wifi access etc.. Sometimes, prices can be very cheap and the pictures shown can be very deceptive. It is always important to read reviews. Also for Mauritians who might want to stay in a cold place, make sure there is a heater. You can always contact the hotel directly via booking.com to clarify anything before paying.

Weather Forecast and Risks related issues

Always check the temperature at day and night before traveling. Weather.com provides good information about that. If you are traveling to China, you might want to check the level of Air pollution. Aqicn.com is a good source of information as air density is also important before booking a hotel. Some mobile app also provides air density information. Another tip and risk related issues can be checked on the US embassy website of that particular country you are visiting. In case, there is no embassy make sure to check local media of that country to be informed of any eventual attacks.

Losing network can be an issue when traveling abroad. I would recommend using maps.me mobile app and download offline maps in case there is an emergency. Also always share your location with a trusted contact.

My handbag checklist items when traveling:

  • Battery bank
  • Laptops and chargers
  • A bag containing all basic electronic items such as universal chargers, cables, Pendrives, etc..
  • Face wipes
  • Toiletries
  • Hand sanitizer
  • Tripod
  • One spare clothing in case my check-in luggage gets lost
  • Earpods / Earpiece
  • Passport / Printed travel documents and other documents if needed.
  • Electronic backups of all documents on my mobile phone.
  • Sunglasses

Some Tips:

  • Online booking will surely cost you cheaper and the online agency will surely take a certain commission for the transaction. Always print your receipt and be careful that the hotel does not double charge you on arrival.
  • Scammers are everywhere whether online or onsite, usually in front of hotels, where some fake tourist guide trying to scam tourist.
  • Make sure you always consume boiled or bottle water to reduce the risks of getting contaminated. A hand sanitizer becomes very important as the level of bacteria is very high in airports, planes, and hotels.
  • An Airplane pillow might also be helpful especially if you are traveling in economy.
  • Always establish a friendly approach with the security personnel, reception staffs, etc.
  • Always pack smartly your luggage.
  • Here is an interesting link on my-anasa.com as a travel guide for dummies.
  • Always inform your bank and Network and Internet service provider that you are outside the country so that you can use your bank debit cards and roaming service without any hassle.
  • Shuttle arrangement when reaching the country. Uber can be very useful in some countries.

I hope you find this blog post interesting and helpful. I will try my best to update it as soon as I come across interesting tips in the future.

Upgrading firmware of HP ProLiant Gen9 on VMware infrastructure

Some days back, I was having a conversation with a friend about the recent CVEs that impact the firmware of several physical machines. HP usually will release several vulnerability alerts and it is very important to patch your firmware. You might also notice that the mitigation happens at CPU levels such as AMD or Intel. In this blog post, I will focus on one of the very basic ways to update your firmware. Prior before upgrading, its important to make a checklist. My HP Proliant Gen9  is actually an ESXi on VMware infrastructure. You can view the step by step actions below and pause the video at any time. I have blurred some information for security purpose such as the name of servers, IPs, Logins, etc..

Upgrading firmware of HP ProLiant Gen9 on VMware infrastructure 3

A basic checklist can be considered as follows:

  • Monitoring consideration.
  • How many and size of the VMs on production.
  • The consistency of the Firmware provided by HP.
  • Logins and Passwords for the HP ILO, vCenter, Virtual Machines running, etc..
  • Java or Dot Net framework for accessing the ILO.
  • Where is the storage node of the virtual machines?
  • Load on the cluster or the ESX itself.
  • The expected amount of time during migration.
  • The output of the update (Correction of bugs, New feature, etc..).

1. Prior before upgrading the firmware, you need to make a survey about the oversized VMs. Consider performing a manual migration before activating the maintenance mode. Then, enter maintenance mode, all the virtual machines in the cluster should migrate to other physical machines in the cluster. We assume that the datastore of each machine is not on the physical machine itself which is not recommended.

2. Once all virtual machines migrated to other ESXi hosts, connect to the HP ILO onboard administrator interface. Consider checking the health status of other ESXi hosts on your chassis. 

3. Also consider, verifying the system information of your ESXi host (HP physical machine). 

4. On the ‘information’ tab, click on ‘system information’, you will notice the field ‘Integrated remote console’. You can choose any framework whether Java or .Net to open the console.

5. Once connected, you should be able to see the following screen.

ESXI Console
ESXI Console

6. From vCenter, upload the image file which constitutes of the patch for the new firmware.

7. On vCenter, right click on the physical machine, then ‘reboot’. Consider checking the grey bar that is now blinking on the left just below the ‘<F2> tag ‘at the bottom on the ESXi console.

ESXI-Console-blinking
ESXi-Console-blinking

8. By the time, you should also notice that you have been logout on vCenter.

9. Normally, after a few minutes, the server will reboot showing the HP Enterprise logo followed by other system information, then you will notice a screen that with four key options below: F9 (System Utilities), F10 (Intelligent Provisioning), F11 (Boot Menu), and F12 (Network Boot). Hit the F9 button to enter ‘System Utilities’.

10. Choose the ‘one-time boot menu’ option. Then go to the USB virtual disk that you have mounted at step 6 and hit ‘Enter’.

11. By now you should notice the installation of the firmware in progress. This might take a considerate amount of time. Monitor the installation.

12. After extracting the iso file, it will go through three steps: Inventory, Review, and Deployment.

13. You can also monitor for the ‘blink’ message on the HP Onboard Administrator interface which means that the upgrade has not completed yet.

14. Once, the UID state is off, you can remove the server from maintenance. On vCenter, right click on the server, and click on ‘Exit maintenance mode’.

15. Several machines will now join the ESXi host which has been added back to the cluster through an election process.

If you are interested more on the election process and how High Availability works, please check the article ‘VMware vSphere High Availability‘ which I published several months back.

All steps from 1 to 15 have been described in the video below. If you like the article please click on the like button and share.

Diving into the basics of IPv6

The Internet is growing. In case you are not on IPv6, for sure one day, you might need to migrate from IPv4 to IPv6. Now what kind of methodology you would apply whether a dual stack or a direct changeover depends upon a rigid observation and analysis of the network infrastructure. But, it should no more be taken as a complexity. Since a few years, many companies, government bodies, ISPs, and others are moving towards IPv6. Some are adopting dual stack. IPv6 can be said to be version 2 of the Internet. In this blog post, I will make my best to shed some basics and simple way to understand the features and benefits when using IPv6. I will also contrast it with IPv4. For research purpose, I have perused several books and blogs over the Internet and, same are referenced below. One of the challenges in Africa is to enable the smooth transition to IPv6. Whilst others are doing dual stack, others have successfully migrated the whole network infrastructure to IPv6. IPv4 has been created in the early ’80s. The Internet growth which is so huge and it will definitely need to move ahead with modern technology IPv6 running at its core. I had always admired one of the modern futurist physicist, Dr. Michio Kaku who said that “In the future, the Internet might become a brain“.

Diving into the basics of IPv6 4

So why do we really need IPv6?

Besides, from the growth of the Internet and the scarcity of  IPv4 addresses, we all knew that in IPv4, the network has been divided into two parts which are the Private IPs and the Public IPs allocation. And, those two segments which are Interconnected required NAT configuration. This breaks the contiguous of the Internet. Another reason is that there is no security in IPv4 at its core. Of course, there are other strategies to secure an IPv4 network. When it comes to data prioritization, it cannot be done at the core of IPv4 which means that there is not much of Quality of Service (QoS). In IPv4, we can configure or assigned an IP to a device or simply use an address configuration mechanism such as DHCP. But, the moment DHCP is down, we land into a problem. Here is the catch, this means that there is no way to make a device to be assigned a globally unique address. So, that’s why we need IPv6. Well, wait… What happened to IPv5 ? and what about IPv1, IPv2, and IPv3?

What happened to IPv1, IPv2, IPv3, and IPv5?

Have a look at the diagram below which makes it pretty easy to understand:

Photo Credits: tutorialspoint.com
Photo Credits: tutorialspoint.com

So, IPv0, IPv1, IPv2, and IPv3 were used in the development testing phase. Ipv5 was used while doing the Stream experimentation of the Internet.

Features of IPv6

There is no backward compatibility when using IPv6, but, the basic functions remain the same, and the features have been changed completely. Since IPv4 is a 32-bit address and IPv6 is a 128-bit address, just imagine how much bigger it is. When compared to an IPv4 address bit, IPv6 has four times more bits. We can say that there are more than 1500 IP addresses per square meter on earth.

Photo credits: transition.fcc.gov
Photo credits: transition.fcc.gov

Another feature of the IPv6 is about the header which is twice the size of IPv4.

Photo Credits: radioworld.com
Photo Credits: radioworld.com

In IPv6, there is also end-to-end connectivity which means that NAT is not required for the continuity of the Internet. Every host can reach another host over the Internet.

Photo Credits: concurrency.com
Photo Credits: concurrency.com

Other features are “auto-configuration” which can be either stateful or stateless. Stateless is a mechanism that does not require any intermediate support in the form of DHCP for IP assignment whereas Stateful serves IP addresses from a pool. Also to take into consideration is “faster routing”. In IPv6, the routing information is stored in the first part of the header which makes routing decisions faster by the router. Another feature is IPSec (IP Security). It creates an end-to-end tunnel between the source and the target though it is optional. “No Broadcast” is another feature within IPv6. Using an IPv4 network, you will notice during the IP Address configuration, the clients need to broadcast to the DHCP. In IPv6, the client doesn’t need to broadcast and instead will multicast to communicate with machines over the network. It is important to understand the difference between ‘broadcast’ (one-to-all) and ‘multicast'(one-to-many). In broadcast, clients will send messages to all hosts on the network, whereas in multicast, messages are sent to a group of stations. This allows the building of distribution networks where group management is required. IPv6 does not limits itself to multicast but also bring the ‘unicast’ (one-to-one) feature. This is used especially between routers which need to communicate to a specific router. However, if you have several routers nearby and you can choose any routers for communication, let’s say for a CDN purpose, we can use the anycast method to process efficiency packet routing.

Photo Credits: techiemaster.wordpress.com
Photo Credits: techiemaster.wordpress.com

Reading IPv6 addressing

Now, that you have grasped the basic concepts of IPv6 and why we need it, let’s see how to read IPv6. An IPv6 address is made up of 128-bits divided into 16-bits blocks. Each block is then converted into 4-digits hexadecimal numbers separated by colon symbol. For example, this is an IPv6 address in binary:

0010011000000110 0100011100000000 0000000000110000 0000000000000000 0000000000000000 0000000000000000 0110100000010010 0010100001100000

Since we have three series of zeros, it can be escaped between the two colons symbols. Leading zeros in the third block will result in 30. In case, you had one block of zeros, use one zero in the hexadecimal IP address. When converted to hexadecimal it is:

2606:4700:30::6812:2860

Let’s get into more details. There are two rules when reading an IPv6 address.

Rule1: Leading zeros should be discarded. As we can see in the 3rd block of the IPv6 address above i.e; 0000000000110000 when converted it is written as 30, because it can be read as 110000. Here is a video on how to convert Binary to Hexadecimal.

Rule2: If two or more blocks contain consecutive zeros, omit them all and replace by double colons signs. Example the three blocks of zeros in purple above have been replaced as “::“, However, if there is a single block of zero, use 0 in the IPv6 address.

Assignment of IPv6 address

Similar to IPv4, we need to understand how to identify the number of networks and hosts in IPv6. Let’s take an example from a generic unicast address which uses 64-bits as network ID and 64-bits as hosts ID. Please note from the picture below the 64-bits in the network has been shared in three distinctive fields in the IPv6 packet structure.

Photo Credits: www.networkworld.com
Photo Credits: www.networkworld.com

At this stage, it should be clear how a generic unicast address has been designed. Now, another important point is the IPv6 address scope. A scope is a region where an IPv6 address can be defined as a unique identifier of a network interface. As we can see below, there are three scopes, Global Unicast Address, Unique Local, and Link Local.

Photo Credits: steves-internet-guide.com
Photo Credits: steves-internet-guide.com

The Global Unicast Address is routed and is reachable across the Internet. Also. the prefix for global routing prefix in IPv6 has been assigned by the Internet Assigned Number Authority – IANA, so that by only looking at the prefix of an IPv6 address, you can determine if its global or not. In the picture below, you can see the first 3 bits within the global prefix. Remember, that this is unique globally.

Photo Credits: cisco.com
Photo Credits: cisco.com

Then, comes the Site level aggregator – SLA which is the subnet ID assigned to the customer by the service provider. This follows by the LAN id that is used by the customer and is free to manipulate. This address is globally unique.

Let’s take a look at a Unique Local Unicast Address. It looks like private IP addresses and is used for local communication intersite usually in a LAN and for VPN purpose. It is not routable on the Internet. 

Photo Credits: cisco.com
Photo Credits: cisco.com

The last one is the link local unicast address. This is used for communication between two IPv6 devices on the same link. By default, it is automatically assigned by the device as soon as IPv6 is enabled, and it is not routable. These types of IP addresses are identified by the first 10-bits of the address, i.e; FE80.

Photo Credits: cisco.com
Photo Credits: cisco.com

In this blog post, I took an example from only Unicast addresses. Remember, there are also Multicast and Anycast address ranges. Let’s now create some servers and perform some IPv6 configurations.

Goodbye IPv4 and, say Hello to IPv6

I created a CentOS7 machine on my VirtualBox. As you can see, the interface card enp0s8 have the IP Address 192.168.100.9 as well as fe80::9ef3:b9d3:8b87:4940. Remember, the fe80 is the Link Local Address. 

Diving into the basics of IPv6 5

You can also see the connection using the following command:

Diving into the basics of IPv6 6

To create a connection using nmcli use the following command and check back the connection. You will notice that the connection has been created without any device attached to it.

Diving into the basics of IPv6 7

I am now modifying ipv6-tunnelix and attached it to enp0s9. I will also assign it to an IPv6 address. (For learning and testing purpose, this IPv6 address has not been assigned to me, it’s that of Facebook’s public IPv6)

Diving into the basics of IPv6 8

As you can see, the address has been assigned. But remember, same as you can assign a public IPv4 address on a virtual machine, you will need to route it for connectivity. In this example, I took an example of Facebook public IP Address.

Diving into the basics of IPv6 9

Are your blog’s IPv6 ready?

In 2016, during migration on Cloudflare, tunnelix.com became dual stack i.e; both compatible for IPv4 and IPv6. You can test any website for IPv6 support at this link.

https://ipv6-test.com 

Certifications

Getting certified on IPv6 is really interesting as it can demonstrate comprehensibility. You can participate in free IPv6 training and get certified from Hurricane Electric. It is important to read the IPv6 primer.

IPv6 Certification Badge for jmutkawoa

There is also a service from Hurricane Electric, called Tunnel Broker which can facilitate you for creating a tunnel from your IPv4 static IP address to free IPv6 tunnels. In future blog posts on IPv6, I will get into more details about it. If you like the article, please comment, and share.

Sources:

Recover logical volumes data from deleted LVM partition

Have you ever deleted a logical volume by accident? Can you recover it looking into the backups? Well, the answer is YES. For those who are not familiar with Logical Volume Management (LVM) is a device mapper target that provides logical volume management for the Linux kernel.- WikipediaIt is an abstraction layer or software that has been placed on top of your hard drive for flexible manipulation of the disk space. Some of the articles published in the past on LVM are:

All test carried out on this blog post have been tested on a CentOS machine. Please don’t make a live test on a production server.

Image Credits: Redhat.com
Image Credits: Redhat.com

1. So, as you can see below I have an lv called lvopt which is from a vg called centos.

Recover logical volumes data from deleted LVM partition 10

2. Same is mounted on the /opt

Recover logical volumes data from deleted LVM partition 11

3. There are some data in that partition as well:

Recover logical volumes data from deleted LVM partition 12

4. I created a directory inside the /opt directory

Recover logical volumes data from deleted LVM partition 13

5. Now, let’s pretend to remove the lvm lvopt. Or say, someone did it by accident because it was unmounted. The command lvremove will be used here to remove the lv. Note: that the lv need to be unmounted.

Recover logical volumes data from deleted LVM partition 14

6. If you make an lvs, lvdisplay or vgs or even mount again the partition, you cannot do it. The data is lost. But you can still recover it. This is because the lvm contains the archive of your lv inside the folder /etc/lvm/archive. But, you cannot read the files directly.

Recover logical volumes data from deleted LVM partition 15

7. But you can still, interpret part of the files. Since we deleted the volume group called “centos”, we knew that it is referenced in the file centos_… The question that arises here is which file is relevant for you. Right? So to understand which archive you want to restore, you need to use the command vgcfgrestore –list <name of volume group>. Here is an example:

Recover logical volumes data from deleted LVM partition 16

8.  If you observe carefully, each archive has been backup at a certain time. In my case, I deleted the LV on 18-Apr-2019 at 11:17:17 2019:

Recover logical volumes data from deleted LVM partition 17

9. So, I want to restore from that last archive. You will need to copy the full patch of the vg file. In my case it is /etc/lvm/archive/centos_00004-1870674349.vg. The goal here is to restore the lv before this specific time, or simply restore back the lv before the command lvremove was fired. Here is the command:

Recover logical volumes data from deleted LVM partition 18

10. If you launch the command lvs, you will notice the presence of the lv.

Recover logical volumes data from deleted LVM partition 19

11. But, mounting back the lv won’t result in anything. This is because the lv is inactive. You can see it with the command lvscan. Please take note below that the lvopt is inactive.

Recover logical volumes data from deleted LVM partition 20

12. To activate it you simply need to use the command lvchange.

Recover logical volumes data from deleted LVM partition 21

13. Mount it back and you are done.

Recover logical volumes data from deleted LVM partition 22

I believe this can be very useful especially when you have encountered a situation where someone deleted an lv. I hope you enjoy this blog post. Please share and comment below if you like it.

cyberstorm.mu team at Developers Conference Mauritius

A few weeks back, I registered myself to present the Ansible automation tool at the Developers Conference 2019 at Voila Hotel, Bagatelle Mauritius. The event is an initiative of Mauritius Software Craftsmanship Community – MSCC sponsored by several companies such as Mauritius Commercial Bank, SdWorx, Eventstore, Ceridian, Castille, etc. There were other members of cyberstorm.mu who also registered for their presentations: they are Codarren Velvindron, technical lead at Orange Business Services who spoke about “becoming an automation artist”, Loganaden Velvindron who spoke about “RedHat Enterprise Linux 8 and Derivatives have a new Firewall: NFTABLEs”, and Nathan Sunil Mangar who spoke about “Introduction to the STM32”. There was also a special event where Mukom Akong Tamon, head of capacity building for Africa region at Afrinic who spoke on “IPv6 deployment in Mauritius and Africa at large”. I presented myself as a member of cyberstorm.mu and DevOps Engineer at Orange Business Services and spoke on Ansible for beginners with some basic and advanced demos.

cyberstorm.mu team at Developers Conference Mauritius 23

In the past, I have written several articles on Ansible:

  1. Getting started with Ansible deployment
  2. Some fun with Ansible Playbooks
  3. Configure your LVM via Ansible
  4. Some tips with Ansible Modules for managing OS and Applications
  5. An agentless servers inventory with Ansible and Ansible-CMDB
  6. Project Tabulogs: Linux Last logs on HTML table with Ansible

My presentation started with a basic introduction to Ansible following some brief examples and demos. I started with a brief introduction of myself. It looks like it was a mixed audience including, Students, Professional from the management and technical side, Engineers, and others. I brushed out quickly as to why we need Ansible in our daily life whether for home use or on production. Ansible is compatible with several Operating systems and one of the most interesting tools is the AWX which is an opensource product. Before getting started with Ansible, it is important to grasp some keywords. I introduced it as well as giving some examples using Playbooks. Ansible Ad-hoc commands were also used. The audience was asked to give some ideas about what they want to automate in the future. There were lots of pretty examples. I laid some emphasis on reading the docs and keep in touch with the version of Ansible one is using. Also gave some brief idea about Ansible-Galaxy, Ansible-doc, Ansible-pull, and Ansible-vault. To spice up your automation layout, it would be nice to use Jinja templates, verbosity for better visual comprehension. I also spoke about Ansible-CMDB, which is not a tool of Ansible. Some days back, I blogged on Ansible-CMDB which is pretty interesting to create an inventory. I also shed some ideas about how to modify the source code of Ansible-CMDB. Also, an example using an Ansible Playbook build up web apps.

cyberstorm.mu team at Developers Conference Mauritius 24

Thanks, everyone for taking pictures and some recordings.

cyberstorm.mu @ DevConMru

Screen Shot 2019-04-16 at 8.01.34 PM
D4AvZJ-WsAY9anz.jpg large
D39IqdeX4AAJr5W
D38Pc7oU8AAF_6F
D4CEUKUWwAAXzU8.jpg large
56899687_10161551169545557_6969110695807811584_n
D4AvZJ-WsAY9anz.jpg large
D4AgYJAW4AIs76t
D4At0coW0AAjYww
D38bIioXoAAOJvj.jpg large
D38nQu_WAAAnZWp
D39CDaCXsAEX5W_
D4CEUKUWwAAXzU8.jpg large
D38Pc7oU8AAF_6F
D383Fg6X4AEJwGN
D4CD2reW4AAQxbJ
D38RrItUcAAE8Nu
D39IqdeX4AAJr5W
D39PRU1XsAAY5eE
Screen Shot 2019-04-16 at 8.01.34 PM
D38O7YPUIAIhRVG
D38j-R1WwAIagUi
D39NrSDWwAAV8yW
D389SnbX4AE-Dvk
D38LFHlU8AEWi_f
D38mJdsWwAAY925
D38lS6LXoAAmRL6
D38lRySXsAAShRB
D4CD2rfXsAEi889
56549524_1223529091139485_8901038877343481856_n
Screen Shot 2019-04-16 at 8.01.34 PM
56862360_2324788081102513_3470547932690776064_n
56980635_10157139028667365_5838586333253074944_n
56899687_10161551169545557_6969110695807811584_n
56842770_685911931837631_1427788979075284992_n
Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image... Loading image...

After my session, I went to the Afrinic session on IPv6, where Mukom Akong Tamon was presenting on IPv6 where he brushed out on an introduction to IPv6 and the IPv6 format structure. Also, several examples of why it is important to migrate to IPv6. Loganaden Velvindron from Afrinic enlightened the audience about dual stack programming.

One of the important part where Mr. Mukom mentioned that there are still developers hard coding IP addresses in the code which is not a good practice.

cyberstorm.mu team at Developers Conference Mauritius 25

There was another session by Loganaden Velvindron of Afrinic, who spoke on NFtables in RedHat 8. Mukom was also present there in the session. Loganaden explained about NFtables architecture and its advantages. Also explained how to submit patches and dual stack building with NFtables.

cyberstorm.mu team at Developers Conference Mauritius 26

Codarren Velvindron, technical lead at Orange Business Services and member of cyberstorm.mu explain why automation is important. He took some example on the conference.mscc.mu website itself. Also gave some ideas using “Expect”. For those who are not familiar with “Expect”, it is a scripting programming language that talks with your interactive programs or script that require user interaction.

cyberstorm.mu team at Developers Conference Mauritius 27

Nathan Sunil Mangar also presented on an introduction to the STM32 microcontroller. He also gave some hints to distinguish between fake and real microcontrollers on the market. Apart from the basic introduction, he went brushed out some examples on several projects and explain which one can is better. However, it also depends on the budget when choosing microcontrollers. He also showed how to use the tool of programming for the STM32 microcontroller. The documentation was also perused during the presentation. At the end of the presentation, there were several giveaways by Nathan Mangar including, fans, Microcontrollers, and a small light bulb made from STM32.

cyberstorm.mu team at Developers Conference Mauritius 28

I also have the opportunity to meet with several staffs from the Mauritius Commercial Bank who asked for some hints and best practice on Ansible. Also had some conversations with other people in the tech industry such as Kushal Appadu, Senior Linux system Engineer at Linkbynet Indian Ocean. We discussed lengthily on new technologies. Some days back, I presented the technicalities of Automation as a DevOps Engineer at SupInfo university Mauritius under the umbrella of Orange Cloud for Business and Orange Business Service. I was glad to meet a few students of SupInfo at the DevCon 2019 who instantly recognized me and congratulated me for the Ansible session.

cyberstorm.mu team at Developers Conference Mauritius 29
Speaker at SUPINFO under the umbrella of Orange Business Services

I sincerely believe there is still room for improvement at the Developers conference such as the website itself which needs some security improvements. Otherwise, a feature that could be added is to specify which session is for beginners, intermediate or advanced so that attendees can choose better. The rating mechanism which is not based on constructivism might discourage other speakers to come forward next time. But overall, it was a nice event. Someone from the media team filmed me for a one-minute video, hoping to see it on the net in the future. I also got a “Thank You” board for being a speaker by Vanessa Veeramootoo-Chellen, CTO at Extension Interactive and one of the organizers at the Developers conference who can be seen to be always working, busy and on the move during the event.