<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ubuntu Archives - Florian Müller</title>
	<atom:link href="https://florianmuller.com/keyword/ubuntu/feed" rel="self" type="application/rss+xml" />
	<link>https://florianmuller.com/keyword/ubuntu</link>
	<description>Designer. Builder. Technologist.</description>
	<lastBuildDate>Fri, 07 Jun 2024 17:49:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://florianmuller.com/storage/2019/04/cropped-logo_big_square_touch-32x32.png</url>
	<title>ubuntu Archives - Florian Müller</title>
	<link>https://florianmuller.com/keyword/ubuntu</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Reset a self-hosted Unifi Controller on Ubuntu/Debian to factory defaults (without reinstalling)</title>
		<link>https://florianmuller.com/reset-a-self-hosted-unifi-controller-on-ubuntu-debian-to-factory-defaults-without-reinstalling</link>
		
		<dc:creator><![CDATA[Florian Müller]]></dc:creator>
		<pubDate>Sun, 26 Mar 2023 13:17:07 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[factory defaults]]></category>
		<category><![CDATA[reset]]></category>
		<category><![CDATA[ssh]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[unifi]]></category>
		<category><![CDATA[unifi controller]]></category>
		<guid isPermaLink="false">https://florianmuller.com/?p=1810</guid>

					<description><![CDATA[<p>Quick tip, if you want to start fresh on your self hosted Unifi Controller instance, there is a simple command to just purge and reset the database and settings to factory defaults. Just ssh into your Unifi Controller instance on Ubuntu or Debian and enter as superuser: No need to apt uninstall anything or do [&#8230;]</p>
<p>The post <a href="https://florianmuller.com/reset-a-self-hosted-unifi-controller-on-ubuntu-debian-to-factory-defaults-without-reinstalling">Reset a self-hosted Unifi Controller on Ubuntu/Debian to factory defaults (without reinstalling)</a> appeared first on <a href="https://florianmuller.com">Florian Müller</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Manual update Unifi Controller from 7.2.95 Java 8 to 7.3.76 Java 11 on Ubuntu server</title>
		<link>https://florianmuller.com/manual-update-unifi-controller-from-7-2-95-java-8-to-7-3-76-java-11-on-ubuntu-server</link>
		
		<dc:creator><![CDATA[Florian Müller]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 10:54:40 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[ssh]]></category>
		<category><![CDATA[terminal]]></category>
		<category><![CDATA[tutorial]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[unifi]]></category>
		<category><![CDATA[Virtual Machine]]></category>
		<guid isPermaLink="false">https://florianmuller.com/?p=1794</guid>

					<description><![CDATA[<p>Ubiquiti just released its new network controller version 7.3.76 and alongside with the major change of jumping from Java 8 to Java 11, the update had a lot of features and changes under the hood added. Unfortunately Ubiquiti did not release the new controller version via the official apt repositories. In the official patch notes [&#8230;]</p>
<p>The post <a href="https://florianmuller.com/manual-update-unifi-controller-from-7-2-95-java-8-to-7-3-76-java-11-on-ubuntu-server">Manual update Unifi Controller from 7.2.95 Java 8 to 7.3.76 Java 11 on Ubuntu server</a> appeared first on <a href="https://florianmuller.com">Florian Müller</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Setup Authelia v4.37.5 bare metal with OpenID and Cloudflare Tunnel on a hardened ProxMox LXC Ubuntu 22.04 LTS container</title>
		<link>https://florianmuller.com/setup-authelia-bare-metal-with-openid-and-cloudflare-tunnel-on-a-hardened-proxmox-lxc-ubuntu-22-04-lts-container</link>
		
		<dc:creator><![CDATA[Florian Müller]]></dc:creator>
		<pubDate>Wed, 12 Oct 2022 20:30:45 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[2fa]]></category>
		<category><![CDATA[authelia]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[cloudflare tunnels]]></category>
		<category><![CDATA[lxc]]></category>
		<category><![CDATA[openid]]></category>
		<category><![CDATA[proxmox]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[ssh]]></category>
		<category><![CDATA[totp]]></category>
		<category><![CDATA[tutorial]]></category>
		<category><![CDATA[ubuntu]]></category>
		<guid isPermaLink="false">https://florianmuller.com/?p=1721</guid>

					<description><![CDATA[<p>BEWARE: THIS GUIDE IS FOR AUTHELIA v4.37.5 OR EARLIER VERSIONS!Authelia introduced major changes that break your config in v4.38.x. So please be cautious with this guide until its updated! I was looking for a secure and reliable way to expose some of my homelab webinterfaces and APIs to the public. I decided to go for [&#8230;]</p>
<p>The post <a href="https://florianmuller.com/setup-authelia-bare-metal-with-openid-and-cloudflare-tunnel-on-a-hardened-proxmox-lxc-ubuntu-22-04-lts-container">Setup Authelia v4.37.5 bare metal with OpenID and Cloudflare Tunnel on a hardened ProxMox LXC Ubuntu 22.04 LTS container</a> appeared first on <a href="https://florianmuller.com">Florian Müller</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Setup a self-hosted Unifi Controller on a hardened ProxMox LXC ubuntu container</title>
		<link>https://florianmuller.com/setup-a-self-hosted-unifi-controller-on-a-hardened-proxmox-lxc-ubuntu-container</link>
		
		<dc:creator><![CDATA[Florian Müller]]></dc:creator>
		<pubDate>Wed, 13 Apr 2022 13:30:03 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[lxc]]></category>
		<category><![CDATA[proxmox]]></category>
		<category><![CDATA[ssh]]></category>
		<category><![CDATA[tutorial]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[unifi]]></category>
		<category><![CDATA[unifi controller]]></category>
		<category><![CDATA[UXG-Pro]]></category>
		<guid isPermaLink="false">https://florianmuller.com/?p=1567</guid>

					<description><![CDATA[<p>Update hint: This guide installs via the official apt debian/ubuntu repositories, which does NOT have yet the actual controller version 7.3.76 including Java 11. If you want this new version, please follow after this install my update guide to the latest version here. With the latest release of Ubiquitis' Unifi consoles, the UXG-Pro, I am [&#8230;]</p>
<p>The post <a href="https://florianmuller.com/setup-a-self-hosted-unifi-controller-on-a-hardened-proxmox-lxc-ubuntu-container">Setup a self-hosted Unifi Controller on a hardened ProxMox LXC ubuntu container</a> appeared first on <a href="https://florianmuller.com">Florian Müller</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Setup a scalable high availability GlusterFS network filesystem with Docker Swarm on Ubuntu Server 20.04 LTS</title>
		<link>https://florianmuller.com/setup-a-scalable-high-availability-glusterfs-network-filesystem-with-docker-swarm-on-ubuntu-server-20-04-lts</link>
		
		<dc:creator><![CDATA[Florian Müller]]></dc:creator>
		<pubDate>Mon, 21 Mar 2022 20:32:54 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[docker]]></category>
		<category><![CDATA[docker swarm]]></category>
		<category><![CDATA[docker-compose]]></category>
		<category><![CDATA[filesystem]]></category>
		<category><![CDATA[gluster]]></category>
		<category><![CDATA[glusterfs]]></category>
		<category><![CDATA[ssh]]></category>
		<category><![CDATA[terminal]]></category>
		<category><![CDATA[ubuntu]]></category>
		<guid isPermaLink="false">https://florianmuller.com/?p=1555</guid>

					<description><![CDATA[<p>In this quick guide we are going to setup the scalable GlusterFS filesystem for a four node Docker Swarm cluster on Ubuntu 20.04 LTS. More precise: we replace an existing persistent NFS storage on the cluster with the new GlusterFS and make it available under the same old mount point as the old NFS. Therefore [&#8230;]</p>
<p>The post <a href="https://florianmuller.com/setup-a-scalable-high-availability-glusterfs-network-filesystem-with-docker-swarm-on-ubuntu-server-20-04-lts">Setup a scalable high availability GlusterFS network filesystem with Docker Swarm on Ubuntu Server 20.04 LTS</a> appeared first on <a href="https://florianmuller.com">Florian Müller</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Build a Raspberry Pi 4 Docker Swarm Cluster with four nodes and deploy Traefik with Portainer</title>
		<link>https://florianmuller.com/build-a-raspberry-pi-4-docker-swarm-cluster-with-four-nodes-and-deploy-traefik-with-portainer</link>
		
		<dc:creator><![CDATA[Florian Müller]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 16:16:40 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[docker]]></category>
		<category><![CDATA[docker swarm]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[portainer]]></category>
		<category><![CDATA[raspberrypi]]></category>
		<category><![CDATA[ssh]]></category>
		<category><![CDATA[traefik]]></category>
		<category><![CDATA[ubuntu]]></category>
		<guid isPermaLink="false">https://florianmuller.com/?p=1148</guid>

					<description><![CDATA[<p>I decided to run all of my supporting homelab services in a more flexible setup, making it easy to deploy and test new features, while also ensuring that already running and needed tasks are stable and constant available. Therefore I decided to create a four node Docker Swarm cluster with four Raspberry Pis 4 8GB [&#8230;]</p>
<p>The post <a href="https://florianmuller.com/build-a-raspberry-pi-4-docker-swarm-cluster-with-four-nodes-and-deploy-traefik-with-portainer">Build a Raspberry Pi 4 Docker Swarm Cluster with four nodes and deploy Traefik with Portainer</a> appeared first on <a href="https://florianmuller.com">Florian Müller</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Install pihole on a ProxMox LXC ubuntu container and setup as Primary DNS for a Unifi Network</title>
		<link>https://florianmuller.com/install-pihole-on-a-proxmox-lxc-ubuntu-container-and-setup-as-primary-dns-for-unifi-network</link>
		
		<dc:creator><![CDATA[Florian Müller]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 14:28:43 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[pihole]]></category>
		<category><![CDATA[ssh]]></category>
		<category><![CDATA[terminal]]></category>
		<category><![CDATA[tutorial]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[unifi]]></category>
		<guid isPermaLink="false">https://florianmuller.com/?p=729</guid>

					<description><![CDATA[<p>Today we install the famous DNS advertisment blocker pihole in a LXC container on a Proxmox server, and set this as our network wide primary DNS server on the Unifi controller. The cool thing is that even as pihole was born as a Raspberry Pi project, it can easily run on most other Debian-based operating [&#8230;]</p>
<p>The post <a href="https://florianmuller.com/install-pihole-on-a-proxmox-lxc-ubuntu-container-and-setup-as-primary-dns-for-unifi-network">Install pihole on a ProxMox LXC ubuntu container and setup as Primary DNS for a Unifi Network</a> appeared first on <a href="https://florianmuller.com">Florian Müller</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Setup secure SSH to key only access with custom user/port on Raspbian/Ubuntu</title>
		<link>https://florianmuller.com/setup-secure-ssh-to-key-only-access-with-custom-user-port-on-raspbian-ubuntu</link>
		
		<dc:creator><![CDATA[Florian Müller]]></dc:creator>
		<pubDate>Sun, 31 May 2020 00:21:07 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[key]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[raspberrypi]]></category>
		<category><![CDATA[raspbian]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[ssh]]></category>
		<category><![CDATA[terminal]]></category>
		<category><![CDATA[ubuntu]]></category>
		<guid isPermaLink="false">https://florianmuller.com/?p=493</guid>

					<description><![CDATA[<p>This quick guide shows my standard routine for setting up secure SSH on new fresh installs of Raspbian or Ubuntu VMs. First if you are still using any system default user like "pi" or "root" or "admin", change this and create your own, custom user. Lets start in this example with our new user name [&#8230;]</p>
<p>The post <a href="https://florianmuller.com/setup-secure-ssh-to-key-only-access-with-custom-user-port-on-raspbian-ubuntu">Setup secure SSH to key only access with custom user/port on Raspbian/Ubuntu</a> appeared first on <a href="https://florianmuller.com">Florian Müller</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
