June 2025
Beginner to intermediate
473 pages
13h 30m
English
Our second example is about reading information from a group of similar virtual machines. In this specific case, the virtual machines formed the basis of a laboratory exercise at a technical college. Each student had access to a virtual machine. When setting up these virtual machines, I made sure I put the public part of my SSH key there. The virtual machines are accessible under the hostnames host<nn>.mylab.com.
For a quick overview of how virtual disks and file systems are organized, I want to run the lsblk command on each instance, which can be done using a Bash one-liner (but is printed over four lines for space and readability). Due to the -o StrictHostKeyChecking=no option, ssh does not ask whether ...
Read now
Unlock full access