This week the team takes a break from discussing IGEL blogs and covers the IGEL CLI concepts and some key commands that every IGEL administrator should know.
Host: Andy Whiteside
Co-host: Patrick Toner
Co-host: Chris Feeney
Co-host: Sebastien Perusat
00:00:00.000 --> 00:00:01.320
00:00:02.980 --> 00:00:21.149
Andy Whiteside: everyone and welcome to episode sixty, two of I gel weekly I, your host, Andy Whiteside. This is a um community edition, So we do a community one we incorporate, the next. We're doing blogs, even though seven is making me break my model here. That's okay. Ah, quick! This is the retake. This is the dude, or whatever.
00:00:21.260 --> 00:00:35.550
Andy Whiteside: So they Ah, Patrick and Sam did this weekend or so, and had some technical issues, and said, went back and thought about more content he wanted to cover. So we're happy to do this again and make it even better, because you know that's what we do. Um, Sam, how's it going?
00:00:35.580 --> 00:01:04.199
Sebastien Perusat: It's going pretty good. I was on the disruptive in Munich last week already, at the chance to discover a little bit of Patrick, and we had a lot of great discussion there, and I used some time there to that'd say, update the content, for today's talk that we have together with you guys, we thought that no start of a week was pretty pretty cody in Germany. So we are definitely going into our turn. Um, yeah, It's definitely getting getting getting tougher at the moment, and travelling is definitely
00:01:04.209 --> 00:01:19.700
Sebastien Perusat: uh. So we are not back to the new normal, We, I would say, back to normal. Yeah, good, All right. So if i'm gonna do this with everybody, you have Patrick and Kristy, I do. Uh, how are you currently accessing zoom for this podcast recording,
00:01:24.200 --> 00:01:42.420
Sebastien Perusat: are you? What kind of what your endpoint is it? I gel is it chrome, is it windows? What's your point? No, right now, right now. It's a windows, but a machine where i'm using my my zoom client, but at the same time usually
00:01:43.130 --> 00:01:46.589
Sebastien Perusat: okay. So it depends on the content. But it's It's red as it does.
00:01:46.600 --> 00:01:54.119
Andy Whiteside: You're definitely not using a windows virtual machine as the endpoint device that wouldn't be possible. What are you using? What's the physical thing right in front of you.
00:01:54.360 --> 00:01:59.389
Sebastien Perusat: Lead? No. Go with the Ubuntu with the You Bo, into operating system.
00:01:59.400 --> 00:02:00.489
Sebastien Perusat: Okay, let's see
00:02:00.500 --> 00:02:07.919
Andy Whiteside: uh, you know it, Lenovo, Pc: Your laptop running. Really, really, you know, out in the wild, real Linux
00:02:07.930 --> 00:02:13.500
Sebastien Perusat: Yeah, absolutely. And then are you running zoom locally on that? Are you remoting into something that's running Zoom.
00:02:13.820 --> 00:02:28.289
Sebastien Perusat: No, i'm using it locally uh some colleagues are using avd, So we've got that for a couple of people. But I didn't have a chance to attend that session where we had the access to this resource. So i'm using it locally as a full
00:02:28.300 --> 00:02:34.690
Andy Whiteside: and look part of this whole knowledge group here between Patrick and Chris and you and myself is about. How do you actually use this stuff?
00:02:34.700 --> 00:02:49.150
Sebastien Perusat: Um, You know I knew coming into this. I was gonna ask you guys, this question. So i'm using the technology. I'm: using a Lg: thirty, six inch all in one running. I gel accessing my persistence. I think it's my persistent one. Vdi desktop,
00:02:49.160 --> 00:03:06.430
Andy Whiteside: and i'm running zoom in the Vdi, and i'm all floating at locals. So the experience I hope is pretty good for people watching and listening. Um, we have with us Kristini Kristini the um the sales engineer, for I gel here in the well for covering my partnerships Integrous partnership. Chris. How's it going?
00:03:06.570 --> 00:03:11.880
Chris Feeney: It's going Well, Guys great to be back after hiatus there for a little bit.
00:03:12.150 --> 00:03:13.530
Chris Feeney: Um.
00:03:13.890 --> 00:03:32.100
Chris Feeney: But but Yeah. Ah, i'm excited. I I got my um. My My home office is full of endpoint options, including a new Lg: one that I received a large curved monitor one that i'm going to be setting up and trying out as my main
00:03:32.110 --> 00:03:42.029
Chris Feeney: machine. But to your point andy i'm on an iwd seven. That's my standard in office
00:03:42.040 --> 00:04:00.439
Chris Feeney: set up um I remote. Sure, I Jo, makes thin client hardware. And most importantly, I Jo, makes thin client, software and most of What you talk to people about is the power of the software, right?
00:04:00.450 --> 00:04:20.259
Chris Feeney: Yeah, I mean, for I Joel, I mean, many people are listening to this for the first time I was a twenty year old company. It started off in Germany, and was a well-known, thin client hardware vendor um. But the shift is really focused to the software. And then, in the last two years more accelerated to
00:04:20.269 --> 00:04:29.789
Chris Feeney: a lot of really well-known vendors out there in the world of hardware, the likes of Hp. And Lenovo and Lg. And and many others
00:04:29.860 --> 00:04:44.810
Chris Feeney: where we've validated on many different models and stuff. But to your original point Nigel has still. Ah original sort of thin client models very low and beauty to our mid-tier
00:04:44.820 --> 00:04:52.459
Chris Feeney: no ud three, and then the high end ud seven, and then, of course, the duty pocket. So my device at home is a ud seven.
00:04:52.510 --> 00:05:11.000
Chris Feeney: Ah, I've got three monitors connected to it, a remote to my laptop, which is running windows, and that's where I'm running the zoom call. So it's sort of a Vdi, but I also have an av d ah out of the Netherlands for my gel, and i'm. I'm not using that today, but I I can fire it up if I wanted to,
00:05:11.010 --> 00:05:17.589
Chris Feeney: and I've done zoom and teams calls from that, and it works to my opinion, and you're doing it right now. It works very well.
00:05:17.600 --> 00:05:22.389
Andy Whiteside: So yeah, And, Chris, you're not sort of doing a video, you're doing a video. It's just a homegrown version of it, that's all
00:05:22.400 --> 00:05:27.489
Chris Feeney: my own version of our our Rdp: or Yeah, something like that. So
00:05:27.500 --> 00:05:52.699
Chris Feeney: and really I am, and really cool about that. You're just using Rdp out of Podcast yesterday with Nerdio and um Microsoft stuff, and you're talking about Rdp. And and where it's at where it's going, and where it's maybe not going. And at the end of the day, if you can use Rdd. And and use the smart and intelligence of the um. You know the offloading capabilities of the Vdi as well as a hijo, and you're winning at that point, whether it's homegrown or not, It's still proven that it works.
00:05:53.180 --> 00:06:10.990
Chris Feeney: Yeah, absolutely. I I chose a while back to use Igl every day and and then try devices like this will be talked about before me. It either works or it doesn't, or you figure out how to make it work. But um, for the most part with teams in zoom. It works.
00:06:12.190 --> 00:06:20.609
Chris Feeney: Um, yes, I'd like to say out of the box on our side, It really is sort of. But you have to make sure that that endpoint has the
00:06:21.190 --> 00:06:33.330
Chris Feeney: the horsepower to handle that. And that's really the bringing that up, because there's a lot of devices that you can repurpose that can absolutely get a screaming fast. Then Cl: I can put I gel on my laptop to Lenovo
00:06:33.730 --> 00:06:37.630
Chris Feeney: core I seven, thirty, two gigs of ram, you know
00:06:38.030 --> 00:06:57.989
Chris Feeney: it's be very fast and client problem, is It's a terabyte disk. I don't need a terabyte disc with with that. So if I was going to do that and make that my main machine. I would like to do some fancy repartitioning, or something to be able to access the rest of that disc and have storage and other things on, and I know one of our buddies, Frederick,
00:06:58.000 --> 00:07:08.249
Chris Feeney: out in the ah Swedish area. He has done that. I just Haven't gotten up with him on exactly what he did so. But ah,
00:07:08.280 --> 00:07:36.449
Chris Feeney: yeah, but very, very a lot of options. So, Chris, I want to bring it up, because a lot of people just don't know how easy this can be and how natively it does work. There is nuance right if I take my local machine and open fifteen browser tabs. I might have a problem, but if I don't have fifteen browser tabs up locally Um, It's not a problem. You offload zoom in zoom or teams for both uh and others. And um, I had you kind of talked through that a little bit, because, believe it, I I still meet people in my gel. They can't even explain the difference between I gel in Os
00:07:36.460 --> 00:07:44.589
Andy Whiteside: operating system, uh, and then hardware. And so I wanted you to kind of verbalize that for the groups. I kind of set you up to do that.
00:07:44.640 --> 00:07:49.059
Chris Feeney: No problem that's that's part of what I do.
00:07:49.070 --> 00:08:06.029
Andy Whiteside: Patrick toner is our subject matter, expert on all things in point. But specifically, I gel Patrick, has it going going pretty good going Pretty good, you know. As I mentioned. We're back in full swing of traveling. So i'm actually here enough to go to Mart or Orlando. We're going to the uh the integral event. The
00:08:06.040 --> 00:08:11.009
Patrick Toner: it's like It's the essay lions. So yeah, definitely, definitely enjoy. And being back to normal.
00:08:11.020 --> 00:08:25.490
Andy Whiteside: Yeah, that's good. And I know you and I talk a lot. And uh, you really need to charge on understanding these endpoint stories, stories thorough, many, many, many, many stories. But by far, if we want to simplify and manage secure environment ideals Number one
00:08:25.500 --> 00:08:26.549
Andy Whiteside: for that.
00:08:26.560 --> 00:08:45.059
Patrick Toner: Yeah, absolutely. In fact, you guys are talking about endpoints. I just got uh at my door yesterday. I'm like a kid on Christmas. Um. Ronovo sent me there. Um m seventy-five. Q. Uh model. That thin client which is a great little device. If you guys Haven't checked it out. Amd. Rise and base. Got a lot of force power for
00:08:45.070 --> 00:08:59.640
Patrick Toner: teams, optimization, and you do all the different offloadings for Citrix or Vmware. They have these cool, matching monitors, where the thin client will actually slip right into the monitor and kind of form an all in one. So i'm going to be on packing that today and do some testing on it.
00:08:59.860 --> 00:09:11.639
Andy Whiteside: Yeah, that convertible type of small Pc. That can become a thin client Pc: that can become a small all in one or an only one. Also, it could be a thin all in one, all the same time.
00:09:11.710 --> 00:09:29.450
Patrick Toner: Yeah, absolutely it's a it's a really really cool device. I know a lot of our customers have been using them and having a lot of success with them. So they sent one over to, you know. Do some testing. Bring it into the lab a little bit, and you know eek out on it. So, looking forward to that,
00:09:29.460 --> 00:09:59.230
Andy Whiteside: and hopefully, all these Lenovo folks are listening to this podcast. Say, man, these guys get it. They can talk to score it, really. Well, they use the technology, too. Chris mentioned too many options I've got. I've got a uh very low end piece of hardware laptop that's got Chrome Os installed. It's also got a hitting pocket, which I normally boot to. So it does two things. I've got it all in run, one connecting to my Vdi. I've got another old school uh chromebook converted thing over here. I got a Microsoft surface over there, and I got a whole little shelf of other things
00:09:59.240 --> 00:10:05.030
Andy Whiteside: sometimes. My challenge is just having, you know too many options to figure out. You know what I'm going to play with today.
00:10:05.080 --> 00:10:15.190
Chris Feeney: Yeah, that's okay. So I, as you're speaking, I have an old school laptop that was running windows ten. It's not got Ij on It's a novo, it's totally fine,
00:10:15.350 --> 00:10:29.370
Chris Feeney: not the fastest thing. But if you just need a browser, or whatever like That's all you need. That's totally fine. Then I've got this screaming Nice Lenovo bad boy with a U d pocket. This thing's awesome. I love it.
00:10:29.380 --> 00:10:39.700
Chris Feeney: And then I've got probably one for communities, computers for community. Andy. This is an old puppy dell. It's pretty thick, pretty heavy.
00:10:39.930 --> 00:10:42.670
Chris Feeney: It still works. Uh,
00:10:42.880 --> 00:10:47.140
Chris Feeney: and you get to Why in Nigeria, that has nothing that And they can get on the Internet
00:10:47.150 --> 00:10:52.069
Chris Feeney: absolutely. Yeah, I mean, it's like, I say you put Ij on. I've had Linux on there and then it just
00:10:52.090 --> 00:10:57.390
Chris Feeney: it's a core. I three, with six gigs of ram that's about an equivalent of my Ud seven, essentially
00:10:57.400 --> 00:10:57.990
00:10:58.000 --> 00:10:58.910
Chris Feeney: so.
00:10:59.130 --> 00:11:14.390
Andy Whiteside: And yesterday I was ah, you know, doing some local stuff. And then I realized after I opened about ten browser tabs. It started getting slow this this lower end piece of hardware. Um in terms of processor. Ah, it's like man! Why, don't, I just jump in my Vdi solve my problems and boom. There went. Everything was good,
00:11:14.790 --> 00:11:27.799
Andy Whiteside: all right. Ah, Seb, The topic for today is we're going to go over some of the cli ah options within the Ij. Os. You want to kind of kick us off into? Why, you chose this stuff,
00:11:27.830 --> 00:11:36.669
Sebastien Perusat: sure. So, coming back to the the title we are covering the content of a Pdf that
00:11:36.680 --> 00:12:05.440
Sebastien Perusat: I created. I don't know one or two years ago, based on, so I have to to send some cudders also to the original Ah, creator of the document to Mr. Reporting, from which was a formula for your furniture which was working for the Precess and in Germany. But the I don't know ten years ago, or something like that. And a couple of years ago, I thought, Hey, there's a document which was listing most of the idle and some part of the Uh Linux Command Line command that you could use
00:12:05.450 --> 00:12:29.229
Sebastien Perusat: on our I your writing system on Nigel. Five and four. I said, Okay, why not? Grabbing that that document, making it maybe a little bit prettier, and adding some value, and adding even more command that we are seeing in the
00:12:29.240 --> 00:12:34.750
Sebastien Perusat: usually. You don't have to go to the command line. You don't have to go into Linux command if you use that you.
00:12:35.350 --> 00:12:43.430
Sebastien Perusat: But if you want to customize, if you want to change, if you want to check, or if you want to manipulate things on the agile level.
00:12:43.440 --> 00:12:47.090
Sebastien Perusat: That's the kind of command that you will definitely look at.
00:12:47.100 --> 00:12:49.309
Andy Whiteside: Or if you just want to touch your friends.
00:12:49.960 --> 00:12:53.559
Chris Feeney: Sorry. Yeah. You just want to impress your friends or your kids, maybe.
00:12:54.400 --> 00:12:55.690
Sebastien Perusat: Yeah.
00:12:55.700 --> 00:13:14.599
Sebastien Perusat: Also, I mean, it's definitely something in the the first part of the document is not covering. I mean, like going this step backward. I was trying to separate, which is in a standard way available in Linux and what we integrated, and I will be operating, since we are creating a lot of
00:13:14.610 --> 00:13:27.890
Sebastien Perusat: overhead in the in in a positive way, and the operating system. By using our own binaries, our own integrations, our own functions, you would not find any kind of documentation in the Kb: You will not find any kind of documentation on the Internet
00:13:27.900 --> 00:13:30.820
Sebastien Perusat: That's where I say, let's create one page,
00:13:30.830 --> 00:13:59.850
Sebastien Perusat: one a four page, covering most of the topic that we are seeing on the database, and which might have people in the outside world to get the actual operating system getting even safer, even prettier, or maybe even faster, and the other approach obviously doing the debugging stuff, which is sometimes quite difficult. If you want to look at a specific behavior, what specific error that you're looking at the operating system, And that's where the second was creating for us
00:13:59.860 --> 00:14:08.559
Sebastien Perusat: nerds out there, or to other people who want to be coming out on the I'm. The agile world. That document, I would say you
00:14:10.300 --> 00:14:11.849
Sebastien Perusat: so I will,
00:14:11.860 --> 00:14:35.339
Sebastien Perusat: together with Patrick. We had the the discussion last time already. We'll just guide you through to that document. Um giving you some highlights and speaking about some feature that uh, I described there. So for the listeners who are just listening to the audio we have, we have to command, and we have become, And then a short explanation on the right, that how to use it,
00:14:35.350 --> 00:14:36.180
Sebastien Perusat: and
00:14:36.390 --> 00:14:41.979
Sebastien Perusat: as soon as you go to the commander, one of the first comment that you will have to deal with is Cd.
00:14:42.570 --> 00:15:11.639
Sebastien Perusat: Honestly. You will have already that command on on windows, because it's actually the same changing directory so change forward or change territory, they would have you to change from a folder to. But then you have a couple of other comments like more of cat, for that enables you to um. Show the content of a five. That's imagine the use case. You have a log file, and you want to see it. You don't have a proper spoken visual edit to do that You're using a common which is called more
00:15:11.650 --> 00:15:24.520
Sebastien Perusat: or cat. Get it like a dog, and then the ah! The document that you want like to show on the screen. And that's what these comments are doing. So basically for watching on the content of of a document.
00:15:24.890 --> 00:15:44.459
Sebastien Perusat: And then we have something which is the according to deer. So the ir on on windows, which is got Ls for listing the content of something, usually a folder or Mount Point to list all the content of five when it was created. If you had some uh recommend, which is Ls minus l, and
00:15:44.470 --> 00:15:53.449
Sebastien Perusat: all the ah proprietors of the Artifi like, who is having which right to read right or Jacob that far,
00:15:54.280 --> 00:16:03.070
Sebastien Perusat: then one last, or let's say two or three comments that I would like to highlight in that section have come Jen, minus C.
00:16:03.360 --> 00:16:22.609
Sebastien Perusat: It sounds quite complicated, but it is. Let's imagine that you have the address operating system in your end, and you never had the chance to watch that or folder structure and how to deal with specific current. And you just want to know. Show me, please, all the comments that I would be able to issue directly from the command.
00:16:23.640 --> 00:16:28.599
Sebastien Perusat: Comp. J. Minus C. Is showing back to that one. It just lists all the comment available
00:16:28.750 --> 00:16:58.299
Sebastien Perusat: that you can, and that's extremely helpful even for me, because sometimes you're integrating new binary is very to get a new features, and it's always good to check if something changed there, because we had sometimes binary that uh, no one is knowing that they are there? Um! Like the redshift feature which is, uh adding a blue filter on a natural West, something which is not used quite often. But you might know that from your car or from your cell phone, or from your windows device as specific time of the day,
00:16:58.310 --> 00:17:09.789
Sebastien Perusat: the device is changing in A with the color mode from a blue one to a more red one, which is more easier to to end the folder for the arts. All that stuff come J. Minus C. And it'll look that kind of
00:17:09.800 --> 00:17:19.840
Andy Whiteside: okay, Seven or are these: Is this a shell? Are we using one of the native Linux shells, or Is this an an additional interpreter that I jail brings to the mix?
00:17:19.849 --> 00:17:49.200
Sebastien Perusat: No, it's seventy years from that shell uh with some limitation, Obviously because we're not covering all the features that the distribution would do. But you will access standard, patience, shell, and shells are available for different use cases. Um for the listeners. From my opinion we are mostly using big shell. So uh, really binary shell uh to access most of the features. If you're using custom commands and all that stuff and not be in dash.
00:17:49.350 --> 00:17:53.750
Sebastien Perusat: It can definitely helps you to know that to
00:17:54.160 --> 00:17:58.009
Sebastien Perusat: make your shell scripts working with shed better than with better.
00:17:58.020 --> 00:18:01.719
Andy Whiteside: And So you just hit on another key term. Right? There's command line
00:18:01.950 --> 00:18:17.280
Andy Whiteside: and shell execution. And then there's the ability to take all this stuff, and this is where it really gets interesting, and you can script it into, you know, a serial list of commands. Ah, and even you can then turn on and automate that script, and that's where the little power comes in. Right?
00:18:17.290 --> 00:18:26.029
Sebastien Perusat: Yeah, you can. Even you can even use custom, command for that, because all the comments that you are looking at at the moment on the screen a comment that will
00:18:26.040 --> 00:18:47.299
Sebastien Perusat: perform something. But if it change, if it should change something of the operating system. Well, as soon as you reboot the device. Most of the change that you may have done through that comments will be gone because we have a sake of writing system which is not keeping changes of our remote. And that's where and you're right. Just use Custom commands because that command are executed on every
00:18:47.310 --> 00:18:54.889
Sebastien Perusat: it depends from which kind of comment you are using, but on every boot, on every network, negotiation on every reconfiguration, et cetera, et cetera,
00:18:54.900 --> 00:19:13.789
Sebastien Perusat: or because we had the expected that kid in the community a couple of hours ago. Um! You might already have heard from Chrome, which is a kind of automated, or the day of timer that you can set to execute specific tasks to specific time on an operating system where, like ah schedule tunnels on windows,
00:19:13.800 --> 00:19:28.289
Sebastien Perusat: and that's something that you can also use on Iraq. So, even without choosing you um, you can. You can set chrome jumps locally, which can be extremely helpful if you want to perform something with the local times of the device, and not from the Us. But that way.
00:19:28.300 --> 00:19:32.889
Andy Whiteside: And so are you saying like we? I call that crawl. And is that what you're referring to, or something else?
00:19:32.900 --> 00:19:33.590
00:19:33.600 --> 00:19:34.510
Sebastien Perusat: it's grown.
00:19:34.520 --> 00:19:37.590
Sebastien Perusat: Okay, Sierra Leone. Yeah,
00:19:37.600 --> 00:19:55.790
Andy Whiteside: quick. Um, Um, Chris and Patrick, These general commands. I know these are the ones that at one point at least in my life, just you know, they just came out right now. I have to actually look some of them up. Ah, and I've got the ah, the com Jen the one that I've mentioned it kind of Remind me um any comments on these General:
00:19:57.060 --> 00:20:00.890
Chris Feeney: Yeah, Okay, I i'll defer to you.
00:20:00.900 --> 00:20:20.640
Chris Feeney: No, I I was deferring to you, my friend. Oh, perfect. Well, then, I will take your deferment. I will. Uh, I was just gonna say the um, basically, You know, we talked about it. I think a couple of podcasts ago where you know just kind of like most of us come from a windows background, right? Most people in our in our space and our industry are windows, administrators,
00:20:20.650 --> 00:20:47.050
Patrick Toner: Um! And then they might look something like I gel, and as the thin client solution, and there are a lot of times there's guys who are super technical. They've been around for a long time, and they're kind of intimidated by a lot of these Linux commands and doing things at the shell level. Um the cool thing. And what I love about this document is it kind of lays it all out day? Here's everything you have Here's all these different commands and in the different categories. Here's the things you can do. So I would. I would just encourage people. Hey,
00:20:47.060 --> 00:21:07.079
Patrick Toner: get this guide, open up the terminal on the Igl operating system and start playing around with this. You know you're not going to break anything because you're going to use this for multiple different things, whether it's troubleshooting, whether it's, you know. You just need to find some system information via the command line, or like like seven, eighty. We're just talking a custom script where
00:21:07.090 --> 00:21:23.020
Patrick Toner: you know you're going to need to kind of automate something. Maybe when the ideal operating system starts up, you're running through a whole list of commands. You're scripting something out. So there's some really cool things you can do here, but you know it's it's really. It's really just a great tool to have in your toolb all for sure.
00:21:24.080 --> 00:21:27.479
Chris Feeney: Yeah, I know for me. When I first came to I gel,
00:21:27.620 --> 00:21:41.420
Chris Feeney: and I came across this, so I I printed it out, and I literally carried it with me on my bag, and I would I would pull it out occasionally I some that I would often use, would be on the Linux general side
00:21:41.430 --> 00:21:57.139
Chris Feeney: and the the app armor. One is new, that that one, I think we had added that feature into the product some time ago, and I was running into a situation in a Federal environment where it turned out, we needed to modify the app armor
00:21:57.160 --> 00:22:15.339
Chris Feeney: profile to allow we had to execute something regarding. I don't know it was something related smart cards, and I think it was Citrix, perhaps, but in a browser. But and anyway, we had to. I had to work with development to make sure I understood what was going on but um,
00:22:15.350 --> 00:22:31.430
Chris Feeney: and then other things, you know just Ah, you know the journal, one showing you can see what's happening in in the syslog. There's a live You can also do a goofy version of that that. You can. You can have it running Um! And then ah,
00:22:31.440 --> 00:22:49.749
Chris Feeney: the network stuff I mean. That's Jim Ry. That's I. I did a lot of that with windows type stuff, you know. The pro-port command is pretty cool. I like that one because I've used that to uh test communication to the ums. Um. I remember. I ran into that with again on a Federal Ah, environment where the
00:22:49.760 --> 00:23:08.009
Chris Feeney: the ums server was on a lock down Vlan and they we had to get the network team to allow ports. Ah! The communication ports to occur. And so we had a device that I think wasn't able to register whatever trying to figure out, and I came across this command and said, Well, let me see if I can talk to the port.
00:23:08.020 --> 00:23:21.909
Chris Feeney: And so that was very helpful to figure out what was the issue. And then we we sort of through that. Um. But yeah, this is a great little cheat sheet to have, even if you're, you know, just playing around. You know
00:23:21.950 --> 00:23:32.259
Chris Feeney: the user reboot shut down, reset the factory defaults is on there on the on the middle column there. Essentially so. It's nice to have this. If you get
00:23:32.290 --> 00:23:38.080
Chris Feeney: a scenario where you need to pull in a rescue, shell or boot to a command or whatever. But
00:23:38.260 --> 00:23:39.690
Chris Feeney: so, anyways, that
00:23:39.700 --> 00:23:46.990
Chris Feeney: yeah. But what other sections do you want to? And all of them? Really, you help us understand what we think we should be drawing our attention to
00:23:47.000 --> 00:24:05.910
Sebastien Perusat: Sure so, and I will just keep the the network general section in my eyes again, because the pro call is definitely one of the stand that command that everyone is using as soon as it comes to uh communication, but which is also helpful, especially because we spoke about the custom command. So
00:24:05.920 --> 00:24:33.939
Sebastien Perusat: scripts command that you execute to specific time and the process. Let's imagine you have your script in. Find a network map. What you could do is, if you want to test it. This is working is to unlock the network. But obviously we are working mostly remotely. So you don't have to make device by hand, and just have a B and see what is H. Connect? So with the command system. Ctr: We start Network Manus Manager. You're restarting the own network stacks right to rest out the connection, and
00:24:33.950 --> 00:24:46.590
Sebastien Perusat: by doing that you can test this script that you put in custom, formats it just one example, but it's something which is extremely helpful if you want to. If you want to double check that something is working before deploying the setting to your
00:24:46.600 --> 00:24:57.149
Sebastien Perusat: then something which is also helpful when it comes to testing performance. I mean, we already had the topic a couple of months ago, together with you guys in a podcast
00:24:57.160 --> 00:25:12.019
Sebastien Perusat: about how to get metrics from from a device regarding network speed wi-fi connection, et cetera and one comment, which is helpful is called so C. U. Rl. Which is calling the Url, and
00:25:12.030 --> 00:25:40.349
Sebastien Perusat: it sounds pretty easy, but at the same time it can do a lot for you, so you can check the download speed you can check if you can't fetch specific content off for websites to connection it there. You can even check if the certificate is is working as expect to a specific contact. So the net and the network session I would say they are definitely my highlights. Um! There is just one one Easter heck um, I mean we have twenty minutes there, so I don't know what to spend too much on one second,
00:25:40.670 --> 00:25:44.489
Sebastien Perusat: but I won't. Just share the the idea. There is our key tables.
00:25:44.500 --> 00:25:50.720
Sebastien Perusat: Ip tables in the kind of fire one on the software level that we integrated in the operating system
00:25:51.060 --> 00:26:13.809
Sebastien Perusat: being a disclaimer to everyone who wants to do that. Um in there. I wouldn't tell how to use it, but if you would like to, let's say block a specific communication part. Or if you would like to um disable any kind of network connectivity, sorry metal uh Internet connectivity without having to deploy a hub or firewall somewhere.
00:26:13.870 --> 00:26:21.089
Sebastien Perusat: Well, the Ip Terrace could definitely help you. So that's just a more historic, which is included since a couple of
00:26:21.100 --> 00:26:21.690
00:26:21.700 --> 00:26:43.730
Sebastien Perusat: um, In my opinion, what we have done is a co-scape, the the hardware related ones, I will just say, push one in the in the background which it takes render, because it's coming extremely often in the adjacent community, and I will explain why the X render is a comment that you issue as A. User So that's the reason why i'm putting this so for a supernatural
00:26:43.740 --> 00:26:49.010
Sebastien Perusat: super user user minus, c. So execute that coming in the name of the user
00:26:49.350 --> 00:26:52.060
Sebastien Perusat: you can check which kind of
00:26:52.260 --> 00:27:13.079
Sebastien Perusat: monitors displays are connected to the device can check which kind of resolutions which kind of refresh words refresh rate. Sorry, What negotiated between the display and the graphical processor unit. And if someone is saying in my second display is not working after checking all the standard questions,
00:27:13.090 --> 00:27:38.439
Sebastien Perusat: we usually am in issuing that because it will tell you everything about your communication between the display and the local land, and you can also use that to set um predefined configurations like you always want to use the internal display as a primary monitor, and left of that that i'm having your standard display
00:27:38.450 --> 00:27:39.380
Sebastien Perusat: Gods
00:27:39.470 --> 00:27:41.490
Sebastien Perusat: external money tool.
00:27:41.500 --> 00:27:52.200
Sebastien Perusat: Obviously you can do that, your profile. But sometimes you have a complex situation that you want to deploy. That's something that you cannot do quite easily. Be your profile. So that's where the external command is, definitely.
00:27:53.660 --> 00:27:56.590
Sebastien Perusat: And if no one is
00:27:56.600 --> 00:28:08.290
Sebastien Perusat: yes, real quick, I mean these commands, and you could search for these commands on the community, and likely you're going to find some information with context from other users in the community to help Right?
00:28:08.300 --> 00:28:22.689
Sebastien Perusat: Yeah, absolutely, especially in the last ah last situation where I created a a small script for our customer. Um! Let's imagine that you want to get a view um, which is showing how many displays are connected to an airport.
00:28:23.840 --> 00:28:52.550
Sebastien Perusat: It sounds extremely easy, but it isn't um. So, making it short. If you have more than to this, you can't create a view based on that. So we created a short script which is counting the amount of connected display by using a subset of from the command writing it back to thems by you and the customer I mean. It's already be complicated within that we have podcast, but just say next one. That command is really covering ninety-nine percent of what you want to do when connecting
00:28:52.560 --> 00:28:54.029
Sebastien Perusat: always Linux in general.
00:28:56.100 --> 00:28:57.989
Sebastien Perusat: Um. But they have no text
00:28:58.000 --> 00:29:00.610
Sebastien Perusat: yeah. Sure the risk commands, Because,
00:29:00.620 --> 00:29:24.040
Sebastien Perusat: yeah, we have A. We have a lot of tools included in the address, and sometimes you just not know how to use them, or that they are there, so I will just cover everyone. Quite totally. Uh Florence is the on screen keyboard that you can use in addition to what we have already unnecessary, so we have already one. If you want to use an additional, or if you want to tweak it, we are using flowing with names of binary.
00:29:24.050 --> 00:29:28.889
Sebastien Perusat: Then we have people asking, hey? Which kind of icons do we have in ager? Os.
00:29:28.900 --> 00:29:29.900
Sebastien Perusat: So,
00:29:29.910 --> 00:29:49.390
Sebastien Perusat: using the command line, showing a a file like a picture file is not possible without tweaking. So we have a gpu, which is a picture viewer. Um. It will also. I don't know. Five years in the operating system started from. Ah, the folder where you want to go, and then you can just look at every picture, at every I can tell us that
00:29:49.400 --> 00:29:50.060
00:29:50.070 --> 00:30:04.349
Sebastien Perusat: then mouse that. Uh, for people who are using the actual writing system also locally. Um. That means not only in a separate session, but also as a local operating system, and sometimes as a part of uh,
00:30:04.360 --> 00:30:18.329
Sebastien Perusat: the emergency plan. We have also a local graphical using the as editor. So you can edit basic text files with that, or look at them. The mouse bet. Even if the name is not studying that much, it's definitely an editor which is half of it.
00:30:19.780 --> 00:30:42.710
Sebastien Perusat: Then we have important files in Wfs. I'll just keep that one, because we already covered that when most of the pockets already we had already before with you guys told them to the actual related configurations, and there I would cover. Let's say five to six points, which are extremely. This is the one where it gets specific to. I gel's
00:30:42.720 --> 00:30:44.709
the shell slash command line Right?
00:30:44.720 --> 00:30:52.510
Sebastien Perusat: Exactly. That's definitely two ninety, nine percent comment that we are implementing by our own by our or deaf guys.
00:30:52.920 --> 00:31:05.690
Sebastien Perusat: So I will start from from the button because we have the licensing mechanism instead of our larger ums, which is deploying. Licenses are mostly automatically to yeah
00:31:05.700 --> 00:31:08.850
Sebastien Perusat: workspace edition subscriptions, and so on.
00:31:08.880 --> 00:31:12.489
Sebastien Perusat: But we have still a situation where sometimes this mechanism is not working.
00:31:12.500 --> 00:31:18.999
Sebastien Perusat: So we have a couple of things to check that we said chicken the time and date, which is ninety nine percent of the arrows.
00:31:19.050 --> 00:31:23.129
Sebastien Perusat: Sometimes you want to trigger the
00:31:23.760 --> 00:31:42.929
Sebastien Perusat: license fetching from the endpoint. And then there is a comment which is called Aaron and the Scott King underscore four unesco licenses. So in some that way just starting the fetching of the license immediately. That's something that you can. Then it's from the command line it can check. If the changes that you made
00:31:42.940 --> 00:31:44.570
Sebastien Perusat: um are working or not,
00:31:45.000 --> 00:32:06.490
Sebastien Perusat: then, which is also quite often asked for. It's a start minus vilus minus manager that's becoming to sound the small coffee wireless, which is the our name for the wireless connection manager where you can choose, which is, Id wants to connect to entering you W. The Pa. A
00:32:06.500 --> 00:32:07.870
Sebastien Perusat: pass phrase,
00:32:07.880 --> 00:32:37.320
Sebastien Perusat: if you want to screw that, or if you want to integrate that in your own uh customer applications that's a command I would recommend to use, Then we have icg minus config um. Obviously you are deploying the usual way, the Icg: So the agricultural gateway config by writing the device, and then that's it to configure it. Only issue that you might face A. You can do that with one device, but not with them now, and that's where you might want to look at the Icg minus config
00:32:37.330 --> 00:32:57.590
Sebastien Perusat: binary, because you can deploy the icg configuration by you in that command to one to ten thousand us at one time obviously test a lot before, and we're also relevant services for having some scripts helping you on that. But just saying you want to play with that, you can specify your Cg. Server uh your gas price, and you covered
00:32:57.600 --> 00:32:58.310
00:32:58.320 --> 00:33:28.090
Sebastien Perusat: uh Chris already mentioned it uh, but still important to me, and we had already at a postcard. Also on that one it's reset on the Scott to underscore default. Sometimes you just have your device in front of you uh your country booted, and you just want to reset it to factory default from um from the endpoint itself. You could use people, menu, but you can also do that directly from the life system, going to the Channel and join that command, and it will delete all the configurations made locally, and from your
00:33:28.100 --> 00:33:33.090
Sebastien Perusat: said to do all of these right? You got to provide terminal access. Yeah,
00:33:33.100 --> 00:33:48.550
Andy Whiteside: for whoever the end user. Is, if it's the Admin. And the admin, if it's for the device device in general. We don't let users see this stuff, but you could. You could elevate a user to this, and even ah, you know, give them a password if you needed to to let them do this themselves on the fly, using Um, Ms. To issue the command.
00:33:48.730 --> 00:33:49.750
Sebastien Perusat: Yeah,
00:33:50.650 --> 00:34:08.530
Sebastien Perusat: that's exactly right. So we have different ways, and we're already covered that also in a in a form of podcast. But providing a terminal is one approach we can use to to terminal from thems we can use uh the consoles which are so moving from the graphically use their face with the command line by pressing control, and F. Twelve,
00:34:08.540 --> 00:34:22.919
Sebastien Perusat: if not deserved by your admin. And obviously the good old Ssh is still there. If activated, so you can connect remotely to the, to the command and execute such command. Also lively on the system without have to stop the end. User
00:34:22.929 --> 00:34:24.810
Chris Feeney: Seven. I got a question
00:34:25.170 --> 00:34:44.069
Chris Feeney: all right. So um. If you do the rescue show control F eleven or whatever. Yeah, Um. And then you kind of you know, you think you're okay, How do you get out of the control of the love and shell. What do you? What do you dive to get back to like a digel desktop, for example.
00:34:44.199 --> 00:34:49.039
Chris Feeney: There it is, boys and girls listen up. Control all what
00:34:49.179 --> 00:34:58.720
Chris Feeney: control at an F one There it is. Thank you to get into it to get out. Yeah, f eleven gets you in which one gets you in the
00:34:58.810 --> 00:35:00.490
Chris Feeney: F eleven or twelve,
00:35:00.620 --> 00:35:20.379
Chris Feeney: Right? Yeah, yeah, exactly. And F ten brings you to the so to to see what is happening behind the scenes on the operating system. Yeah, And you can disable that, too, Like Ah, from my days early on, with Ijo within bravada, when when you're in appliance, mode and you you you've got the agent on the log and screen It's like, How do I get to it?
00:35:20.420 --> 00:35:24.790
Chris Feeney: You know that rescue shell is an option, but you can also disable that. So it's not an option.
00:35:24.800 --> 00:35:32.089
Chris Feeney: But you can also do like hot keys. Now to fire up a command, prompt or whatever, if need be.
00:35:32.100 --> 00:35:33.020
00:35:33.610 --> 00:35:45.290
Sebastien Perusat: So just in case someone is is looking at it on the user interface uh display access, come forward or on a right, and then you have to disable the check box which is called console switching.
00:35:46.510 --> 00:36:04.109
Sebastien Perusat: I would definitely recommend to do so If, uh, there is, there are definitely all the ways which are, and your tracks that the command line Um, Because the user which will go by pressing some odd keys to the commander would not know how to get back, and you will definitely get a call on the they have test care on that.
00:36:04.450 --> 00:36:10.949
Sebastien Perusat: But yeah, that's right. That's the easiest way to get back to the geographically on the face.
00:36:13.390 --> 00:36:43.369
Sebastien Perusat: Then I would share just a small one, because if I were out there, it's a pretty heavy one. I would just take one uh we're already at the podcast to on how to use a body update. So, having a device in a branch office which is updating itself, and then holding the update for some all the device in the current office to uh decrease the amount of network that communication to the ums, and uh, also setting some network speed because the devices are not getting the update from you
00:36:43.380 --> 00:36:55.009
Sebastien Perusat: us anymore, but from the body, master, just sharing that comment which is called ideal body update service can. Sometimes people are struggling with the fact that the slaves are not updating.
00:36:55.020 --> 00:37:08.630
Sebastien Perusat: It can have a lot of different reasons. But one of the main reasons is that misconfigurations are that the slave and the mass have to be in the same network segment, and should be able to communicate our Udp broadcast
00:37:08.640 --> 00:37:28.889
Sebastien Perusat: if you want to simulate it, to know if it would work from a network perspective that the command you can issue, and then check that from the network perspective about this everything is working, and it would also show you which update. Ah, but the update master. So device where you will get the the update from will be detected. So you also know they are curious,
00:37:28.900 --> 00:37:30.849
Sebastien Perusat: so that's pretty important,
00:37:31.740 --> 00:37:43.979
Sebastien Perusat: and then I will just jump to the management Suite commands, because that's something which is also used quite often when it comes to changing configurations locally or fetching last configuration.
00:37:43.990 --> 00:37:53.220
Sebastien Perusat: Get to underscore minus error Settings issued from the endpoint site will get all the latest configurations from the Ums database to the device.
00:37:53.460 --> 00:38:03.419
Sebastien Perusat: If you want to apply them. You have then, at least partially to issue a kill weight positive D, which is also described a little bit somewhere out in the in the document,
00:38:03.430 --> 00:38:16.390
Sebastien Perusat: and then, if you change something locally and you want to write it back to the your Ms. Database, you have the opposite command, which is then right, and a score um setting, and it will write the last ah setup change locally to the umsd.
00:38:17.080 --> 00:38:40.659
Sebastien Perusat: There are a couple of reason why to do that, but I will just hurry up a little bit, and we have six minute left, but just saying Um, if the device is getting an I key address after a Vpn connection. Sometimes the device would show up in the ums with the code. I here at the restaurant with a Vpn. One, and that's where they get Aaron's settings, and definitely, actually to get the last state of the local configuration state.
00:38:41.650 --> 00:38:59.029
Sebastien Perusat: So then the network Ethernet just putting it a little bit together, uh or C, I have to correct that one. Um. So if config showing you the appeared with of the device also, the Mtu says if you like, but the other thing, which is also uh helpful is the
00:38:59.040 --> 00:39:02.559
Sebastien Perusat: comment which is called Nm. Cli, which is
00:39:02.610 --> 00:39:10.989
Sebastien Perusat: depending on the context where you are executing it, and the and the parameters can enable an example Wi-fi or fourg connections on demand,
00:39:11.000 --> 00:39:29.070
Sebastien Perusat: saying, Why, you that, um if you already have the automatic alarm to wi-fi switch enabled in your agile uh your mess profile. Why, sometimes you have to script, and you have to create demons saying that if a specific thing is near by the device, turn wi-fi off on
00:39:29.080 --> 00:39:42.699
Sebastien Perusat: um Sometimes there's also the four g stuff which is jumping in so disabled Wi-fi. If you're gonna have to be a fiveg, all that stuff can be done by yourself together with our uh event services, on the community by using
00:39:42.710 --> 00:39:50.900
Sebastien Perusat: space on the Mnm Cli, and then we have the last two sections, and then i'm almost done so.
00:39:51.090 --> 00:39:58.520
Sebastien Perusat: One small end, because it's something which i'm using on a database. If you open the I just set up, or if you open a profile,
00:39:58.530 --> 00:40:17.440
Sebastien Perusat: you have a lot of configurations, and you have then the hidden part of the iceberg which is called the registry, not to be misunderstood; that the women's registry, the registry in national language is showing all the configuration that are available in the authorities.
00:40:17.450 --> 00:40:27.820
Sebastien Perusat: Then, if you go to the profiles, you just see the upper part of the eyes back, so everything that you should see if you want to understand which configuration on the upper part of the iceber is
00:40:28.600 --> 00:40:37.390
Sebastien Perusat: listed in the Registry Control and F two, and it will show you the to the registry, to every configuration that you are seeing in the graphic use interface
00:40:38.050 --> 00:40:39.790
Sebastien Perusat: definitely helpful. If
00:40:39.800 --> 00:40:50.580
Sebastien Perusat: you are wanting to see if an additional parameter can be set, but you don't find it in the green. Go to the registry, search for that path, and you will be able to generalize,
00:40:50.590 --> 00:40:59.450
Sebastien Perusat: and then important folders, and then i'm always shutting up myself. We have the Stash user Home, which is one of the
00:40:59.910 --> 00:41:02.319
Sebastien Perusat: part of the operating system which i'm not
00:41:02.360 --> 00:41:15.170
Sebastien Perusat: um reset it by to to default on every boot up. It's also holding your user data so temporary files partially, but mostly it browser profiles. So chromium and Firefox,
00:41:15.260 --> 00:41:30.319
Sebastien Perusat: and if you want to tweak, or if you want to start sessions, or if you want to look at the configurations we made in the citric session and the browser session that you created your profile, configuration, Sessions will hold all the
00:41:30.390 --> 00:41:31.979
Sebastien Perusat: possible
00:41:32.210 --> 00:41:40.990
Sebastien Perusat: configuration of your of your sessions in the command. And so from there you can look at configurations made in the start of process.
00:41:41.000 --> 00:41:45.969
Andy Whiteside: So the the user home that one is persistent are any the other one's persistent.
00:41:46.020 --> 00:42:06.190
Sebastien Perusat: Um, yes, this isn't I mean even even not completely. But in some parts of it yes, there are persistent. Uh should be the browser profile like an example would have be recreated in every quarter. We can do that by using some command line, but usually in the browser profile as we cat.
00:42:06.200 --> 00:42:20.610
Sebastien Perusat: So that's that's let's see one of the rare exceptions where we are saying, Hey, if something is going in there with a defective default, and it will become Um. So? Yes, that's one small part which is on this, which is persistent over
00:42:22.520 --> 00:42:25.299
Andy Whiteside: what are the folders, or you want to highlight here?
00:42:25.330 --> 00:42:43.489
Sebastien Perusat: Um! If we have one minute left. I would maybe just share one last with quite obvious. But for those who are listening it's slash, bar, flesh log uh we're just mostly holding all the logging data from the operating system, but also some part of the agile mechanism.
00:42:43.520 --> 00:42:56.740
Sebastien Perusat: Look at it, Check If the lockers are showing up there, and if not, John A. Ct. And minus F, which is a comment to getting the the journal. Content is your best friend to get information from the so as well.
00:42:58.140 --> 00:42:59.160
Andy Whiteside: Okay,
00:42:59.280 --> 00:43:12.279
Andy Whiteside: Um, you know. Look, this is just stuff you need to be exposed to, nowhere to find this document and this podcast and the Webinar. The the recording we put up with this This is just stuff to kind of get familiarized with, and know where it's at, where you need
00:43:12.290 --> 00:43:21.889
Andy Whiteside: to go looking for things and know that the ideal community is out there to help. This is probably the most informative podcast we've done, but it might have been the least entertaining all at the same time.
00:43:22.880 --> 00:43:27.189
Chris Feeney: Yeah, I've found it highly entertaining. I'm not sure about that. I was kidding
00:43:27.200 --> 00:43:30.869
Chris Feeney: very helpful. I mean this. This I will say, this is there's a newbie to I gel
00:43:30.920 --> 00:43:34.040
Chris Feeney: with an employee. This teach He was a lifesaver.
00:43:34.230 --> 00:43:51.189
Chris Feeney: Um when I needed to. You know, know how to get it, and get under the hood if you will, if you're not a Linux cli kind of person that's fine dabble with this, and I think you'll enjoy playing around and see what these commands can do. So Thanks said for updating it, man. It's great work. Here we go.
00:43:51.200 --> 00:43:52.089
Sebastien Perusat: Pleasure,
00:43:52.100 --> 00:43:56.890
Andy Whiteside: you know. Hey, Patrick, Anything anything for you? For we we let Seb go.
00:43:56.900 --> 00:44:10.889
Patrick Toner: No, no, this is great. I I would recommend everybody downloads this Pdf, and just has it handy like as Chris mentioned. And maybe next time for entertainment we'll up with like a song to go through each section. You know. I think that maybe that'll get get the the the entertainment value.
00:44:10.900 --> 00:44:30.610
Patrick Toner: Yeah, it It is a dry topic. Uh, but I mean it. Listen. It's. You know the quote When you need this. It's so vital to have this data right? I mean um, you know. I I think right when I started I Joe, this didn't I don't even know. Maybe it just wasn't available, or it didn't exist wasn't readily available. Once I got my hands on this, it was like this is like.
00:44:30.620 --> 00:44:40.730
Andy Whiteside: If I was trying to troubleshoot, I needed this guide to just us as a reference, so it's just a super useful tool. So so, said I. Thanks, man, for how about this thing? You're not a real igl administrator. This doesn't excite you.
00:44:40.780 --> 00:44:46.689
Chris Feeney: Yeah, that could be true. I'm very impressed that somebody put time to put it together. That's exciting.
00:44:46.700 --> 00:44:48.089
Chris Feeney: Yeah,
00:44:51.210 --> 00:44:53.029
Chris Feeney: What are you told to?
00:44:53.500 --> 00:44:59.080
Chris Feeney: They put in your toolkit. But thank you. You had me for and Thank you, Patrick, And so
00:44:59.890 --> 00:45:01.539
Sebastien Perusat: thank you for having me.
00:45:01.550 --> 00:45:04.840
Andy Whiteside: All right, guys. Thank you very much, and we'll do it again next week.
00:45:04.970 --> 00:45:07.879
Sebastien Perusat: Yeah, perfect.