Skip to content

Commit 234ca2a

Browse files
committed
fix: update -images
1 parent 3c6eaf4 commit 234ca2a

20 files changed

+15
-15
lines changed

_posts/2021-03-23-outlook-spam-rule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ For me, the easiest way to pull up email rules is to click on the settings icon
2626

2727
From here click `Add new rule`. A create rule screen will appear and you can start setting up the rule. I named my rule "Not from {organization} is Junk". Under condition choose `Apply to all messages`. This may seem wrong at first, but it will make more sense in a second.
2828

29-
![Rules](/assets/img/outlook-spam-rules.png)
29+
![Rules](/assets/img/outlook-spam-rules/rules.png)
3030

3131
Add the action to `Move to` the `Junk Email` folder, and for an added nicety, Add another action to set `Mark as read` too.
3232

_posts/2021-04-08-asp-net-core-server-setup.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,21 +23,21 @@ First things first, make sure you can remote into the server, and make sure you
2323

2424
This step is simple, but sometimes finding the install bundle isn't. Start by going to the [dotnet download page](https://dotnet.microsoft.com/download) where you'll see several available versions. I typically choose the current **LTS** version, but _ultimately the version will need to match whatever version of dotnet your app is running_.
2525

26-
![Download Version](/assets/img/asp-net-core-server-setup-1.png)
26+
![Download Version](/assets/img/asp-net-core-server-setup/download-modal.png)
2727

2828
My app currently uses 3.1 LTS, so I'll pick **Download .NET Core Runtime** under that version and then on the next page specifically choose **Download Hosting Bundle**. The hosting bundle is critical because it will install a necessary IIS ISAPI filter for ASP.NET Core. Once you have your bundle, simply install it on the server, and finally restart. To confirm your version is installed, run `dotnet --info` in powershell. The _Host_ section should reflect the version you just installed.
2929

3030
> Don't be discouraged if you see a message saying **It was not possible to find any installed .NET Core SDKs**. The SDK is a separate install, and is not required for runtime.
3131
32-
![Download hosting bundle](/assets/img/asp-net-core-server-setup-2.png)
32+
![Download hosting bundle](/assets/img/asp-net-core-server-setup/download-hosting-bundle.png)
3333

34-
![dotnet info](/assets/img/asp-net-core-server-setup-3.png)
34+
![dotnet info](/assets/img/asp-net-core-server-setup/dotnet-info.png)
3535

3636
## IIS
3737

3838
One of the first things I do when configuring IIS is set up the HTTPS binding.
3939

40-
![Website bindings](/assets/img/asp-net-core-server-setup-5.png)
40+
![Website bindings](/assets/img/asp-net-core-server-setup/website-bindings.png)
4141

4242
To do this, choose the website that will respond to HTTPS requests from the left menu, often the default, and click bindings on the right menu. Click _Add..._ and select type `https`. For my purposes, IP address is set to `All Unassigned` and the port stays the default 443. Last but not least I select the certificate I want to use below. This should align with whatever your server url will be. As I said before, my certificates came preinstalled, so I just had to choose the right one.
4343

@@ -46,15 +46,15 @@ Next I add some security minded headers to the default return headers. In the ro
4646
- `X-Content-Type-Options` : `nosniff`
4747
- `X-Frame-Options` : `deny`
4848

49-
![HTTP Response Header location](/assets/img/asp-net-core-server-setup-4.png)
49+
![HTTP Response Header location](/assets/img/asp-net-core-server-setup/header-location.png)
5050

5151
Usually I would add and HSTS header here also, but in IIS for server 2019 there is a new, easy way to manage this. Going back to the website you previously configured to response to https requests, there is now a _HSTS_ button near the bottom of the right hand menu. I enable HSTS and configured max-age to 2628000 (1 Month). I also check `Redirect Http to Https`. Keep in mind, if you're going to make certificate changes or run the app over unsecured HTTP, you'll want to set the max-age low or you will be stuck making TLS requests for the set duration, **even if you change it later**
5252

53-
![HSTS Settings](/assets/img/asp-net-core-server-setup-6.png)
53+
![HSTS Settings](/assets/img/asp-net-core-server-setup/hsts-settings.png)
5454

5555
Next I remove the `Server` and `X-Powered-By` headers. You should have seen `X-Powered-By` in root server options _HTTP Response Headers_. Delete it to remove it from the default response headers. The `Server` header is a bit more tricky. In the root server options, find _Configuration Editor_ in the Management section. Then go to section `system.webServer/security/requestFiltering` and set `removeServerHeader` to `true`. Once you click apply on the right menu, the header should be removed.
5656

57-
![Configuration editor](/assets/img/asp-net-core-server-setup-7.png)
57+
![Configuration editor](/assets/img/asp-net-core-server-setup/configuration-editor.png)
5858

5959
IIS should now be upgrading all requests to HTTPS automatically, and a response should only return the desired headers.
6060

@@ -72,7 +72,7 @@ This is the only way I've found to prevent WebDAV from interfering with PUT and
7272

7373
Finally, I always install an [Azure Devops](https://azure.microsoft.com/en-us/services/devops/) agent. In Azure Devops > Organization Settings > Deployment pools, I click new on the top menu. Setting the deployment pool name and projects I want to allow deployments to, I create the new pool. From here, you should see the details tab of the new pool. On the right is the agent install powershell script. I usually check _Use a personal access token in the script for authentication_. You'll need to run this script on the server in an elevated powershell window (as Administrator). Once this is complete, you should see your server appear in the Deployment Pool's Targets tab.
7474

75-
![Agent install powershell](/assets/img/asp-net-core-server-setup-8.png)
75+
![powershell agent install](/assets/img/asp-net-core-server-setup/powershell-agent-install.png)
7676

7777
## Wrapping up
7878

_posts/2021-06-16-autostart-api-spa-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ cd ../spa
4343
start powershell.exe -NoExit npm run start
4444
```
4545

46-
![Original script result](/assets/img/autostart-api-spa-app-1.png)
46+
![Original script result](/assets/img/autostart-api-spa-app/original-script.png)
4747

4848
## Next evolution
4949

@@ -58,4 +58,4 @@ wt --title "dotnet watch run" -d %apiLocation% powershell -noExit "dotnet watch
5858

5959
With this one line, I can start a Windows Terminal with both scripts running in tabs. This allows me to keep both together and but also manage the window as one unit. The commands are similar, but the tabs are labeled, so I can quickly jump where I need to look. Also, this is far more expandable if I needed to run other startup scripts together in the future.
6060

61-
![New script result](/assets/img/autostart-api-spa-app-2.png)
61+
![New script result](/assets/img/autostart-api-spa-app/new-script.png)

_posts/2022-12-18-install-pihole-ha.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,11 +46,11 @@ Always enable dark mode in <u>Settings</u> > <u>API / Web interface</u> > <u>Web
4646

4747
Because my network sets DNS per client, and not just per gateway, each client will make DNS requests directly to my Pi-hole instance. This is better for logging, but means that Pi-hole needs to be behind a firewall, and must permit all origins. This can be configured in <u>Settings</u> > <u>DNS</u> > <u>Interface Settings</u>
4848

49-
![systemctl status keepalived](/assets/img/install-pihole-ha-2.png)
49+
![Interface settings](/assets/img/install-pihole-ha/interface-settings.png)
5050

5151
I also like to turn on DNSSEC in <u>Settings</u> > <u>DNS</u> > <u>Advanced DNS settings</u>. This will add a little extra assurance on DNS lookups.
5252

53-
![systemctl status keepalived](/assets/img/install-pihole-ha-3.png)
53+
![advanced dns](/assets/img/install-pihole-ha/advanced-dns.png)
5454

5555
### Redirect to Admin
5656

@@ -133,7 +133,7 @@ You can check the service with the following command also
133133
sudo systemctl status keepalived
134134
```
135135

136-
![systemctl status keepalived](/assets/img/install-pihole-ha-1.png)
136+
![systemctl status keepalived](/assets/img/install-pihole-ha/systemctl-status-keepalived.png)
137137

138138
## Configuring Local DNS
139139

_posts/2023-01-01-lxc-docker-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ A quick guide to getting docker running on a Debian CT
1414

1515
First make sure your container is running in privileged mode and nested is enabled in Options > Features
1616

17-
![features](/assets/img/lxc-docker-setup-1.png)
17+
![Unprivileged Container](/assets/img/lxc-docker-setup/unprivileged-container.png)
1818

1919
## Installing Docker
2020

0 commit comments

Comments
 (0)