I've been working intensively with the VMware vRealize product suite over that past 4 months, including Hyperic. One of the things we have to do on our current project is to replace the Hyperic server certificate whenever a new Hyperic instance is introduced into the environment. This is a relatively straight forward task, but one that consists of quite a few steps. In this blog post, I've documented exactly how to go about replacing Hyperic server certificates.

Published in vRealize Suite

ImageI recently had to renew my self-signed SSL certificate used to publish my Outlook Web Access with Microsoft ISA Server 2004. As it’s been a while since I’ve done OWA publishing, I found myself scrambling for information on the internet until I eventually managed to compile this document. As I would like to use this again in the future, I though I'd post it here for reference.

I always used to use the Microsoft Windows Certification Authority to sign my own SSL certificates, but as I don’t really like the way the Windows Certification Authority does things, and I do like the way OpenSSL does things, so I opted to use OpenSSL on good old trustworthy openSUSE Linux to:

  • Create a new Certification Authority that I can use for all my private sites
  • Create a new x509 SSL Certificate to replace the current soon-to-expire SSL certificate in use by my OWA setup.
Published in Linux

When you start writing GraphQL queries with filters off the top of your head without even looking at the reference… https://t.co/AbqVRGr4S3
Follow Rynardt Spies on Twitter