Tags: SysAdmin

hello-kenzan-pipeline.png

Kenzan pipeline
Part 2 of this series lays the last bit of infrastructure needed to run our Kr8sswordz Puzzle application.

Set Up a CI/CD Pipeline with a Jenkins Pod in Kubernetes (Part 2)

In Part 1 of our series, we got our local Kubernetes cluster up and running with Docker, Minikube, and kubectl. We set up an image repository, and tried building, pushing, and deploying a container image with code changes we made to the Hello-Kenzan app. It’s now time to automate this process. In...
Read 0 Comments

4 Useful Tools to Run Commands on Multiple Linux Servers

In this article, we will show how to run commands on multiple Linux servers at the same time. We will explain how to use some of the widely known tools designed to execute repetitive series of commands on multiple servers simultaneously. This guide is useful for system administrators who usually...
Read 0 Comments

kenzan-kubernetes-main.png

Kubernetes
In this tutorial series, we show how easy it is to set up a fully-containerized application stack in Kubernetes with a simple CI/CD pipeline to manage the deployments.

Set Up a CI/CD Pipeline with Kubernetes Part 1: Overview

What’s New? We’ve updated the four parts of this blog series and versioned the code along with it to include the following new technology components. Jenkins Plugin Kubernetes Continuous Deploy has  been added to deployments. https://plugins.jenkins.io/kubernetes-cd Kubernetes RBAC and...
Read 6 Comments

The Illustrated TLS Connection

Every byte of a TLS connection explained and reproduced. In this demonstration, a client has connection to a server, negotiated a TLS 1.2 session, sent "ping", received "pong", and then terminated the session. Click below to begin exploring. Client Hello   The session begins with the client...
Read 0 Comments

Around 62 Percent of All Internet Sites Will Run an Unsupported PHP Version in 10 Weeks

The highly popular PHP 5.x branch will stop receiving security updates at the end of the year. According to statistics from W3Techs, roughly 78.9 percent of all Internet sites today run on PHP.  But on December 31, 2018, security support for PHP 5.6.x will officially cease, marking the end of all...
Read 0 Comments

DNS Security Still an Issue

DNS security is a decades-old issue that shows no signs of being fully resolved. Here's a quick overview of some of the problems with proposed solutions and the best way to move forward. ...After many years of availability, DNSSEC has yet to attain significant adoption, even though any security...
Read 0 Comments

logs-main.jpg

log files
Jack looks at a few tools to help you mine the depths of your log files.

Open Source Logging Tools for Linux

If you’re a Linux systems administrator, one of the first tools you will turn to for troubleshooting are log files. These files hold crucial information that can go a long way to help you solve problems affecting your desktops and servers. For many sysadmins (especially those of an old-school sort...
Read 0 Comments

14 Common Network Ports You Should Know

The physical ports on your computer allow communicate with peripheral devices such as your keyboard and mouse and to connect with internet devices via Ethernet cables. Within computer networking, ports serve a similar purpose. When a computer system seeks to connect to another computer, the port...
Read 0 Comments

Keeping the Software in Docker Containers Up to Date

Docker has radically changed the way admins roll out their software in many companies. However, regular updates are still needed. How does this work most effectively with containers? From an admin's point of view, Docker containers have much to recommend them: They can be operated with reduced...
Read 0 Comments

How to Install OpenLDAP on Ubuntu 18.04

LDAP is the Lightweight Directory Access Protocol, which allows for the querying and modification of an X.500-based directory service. LDAP is used over an IP network to manage and access a distributed directory service. The primary purpose of LDAP is to provide a set of records in a hierarchical...
Read 0 Comments

Pages

Click Here!