Home Blog Page 762

MongoDB Launches Atlas, Its New Database-as-a-Service Offering

MongoDB, the company behind the eponymous open source database, is launching Atlas today, its third major revenue-generating service.

Atlas is MongoDB’s database-as-a-service offering that provides users with a managed database service. The service will offer pay-as-you-go pricing and will initially allow users to deploy on Amazon Web Services (AWS), with support for Microsoft Azure and Google Cloud Platform coming later.

Read more at Tech Republic

Red Hat Insights Now Extends to Containers, OpenStack

Red Hat announced a number of enhancement to its analytics platform, including  risk assessment and remediation planning capabilities for virtualization hosts, containers, and OpenStack-based private clouds.

Red Hat Insights provides highly scalable, prescriptive analytics across users hybrid IT infrastructure. It is delivered as a Software-as-a-Service offering and generates tailored remediation steps that can be fully automated. The newest additions and enhancements to Red Hat Insights include:

  • Container workload analysis: Red Hat Insights now offers workload analysis for containers, giving operations the visibility they need to more safely adopt containers.
  • Actionable intelligence for OpenStack private clouds and KVM virtualized environments: Operating at both the infrastructure and guest level, Red Hat Insights now offers real-time, full-stack analysis of OpenStack-based private clouds and Red Hat Enterprise Virtualization environments. 
  • Insights Action Planner: This new feature on the Insights Dashboard enables teams to identify and assign remediation tasks individually or in groups. 
  • Insights Early Access mode: A new opt-in modality gives users visibility into upcoming new features, allowing users to test out functionality, give feedback, and help shape the evolution of Red Hat Insights. 

http://www.redhat.com

Monitoring and Tuning the Linux Networking Stack: Receiving Data

This blog post explains how computers running the Linux kernel receive packets, as well as how to monitor and tune each component of the networking stack as packets flow from the network toward userland programs.

It is impossible to tune or monitor the Linux networking stack without reading the source code of the kernel and having a deep understanding of what exactly is happening. 

This blog post will hopefully serve as a reference to anyone looking to do this.

Read more at PackageCloud

How to Securely and Anonymously Share Files of Any Size Over the Tor Network with OnionShare

Its mid-2016 and there are lots of methods to share files online between you and another person 12 timezones away. Some of them are convenient in that they offer a certain amount of disk…

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

Setting Up an NFS Server and Client on CentOS 7.2

This guide explains how to set up an NFS server and an NFS client on CentOS 7. NFS stands for Network File System; through NFS, a client can access (read, write) a remote share on an NFS server as if it was on the local hard disk.

What is DevOps? John Willis Explains

John Willis is an IT operations veteran of more than 35 years and has been a leader in the DevOps movement from the beginning. He is a co-host of the DevOps Cafe podcast, co-author of the upcoming DevOps Handbook. You can find him presenting about DevOps, most likely with a few Deming quotes, at numerous events worldwide. John is currently working as a Distinguished Researcher at Kosli. He is researching DevOps, DevSecOps, IT risk, modern governance, and audit compliance.

 

John Willis is co-host of the DevOps Cafe podcast and Evangelist at Docker

Linux.com: Why are so many organizations embracing DevOps?

John Willis: There is definitely a lot of cargo cutting going on here. Also, vendors are promoting what I would call agenda-based “DevOps”. That’s the bad news. The good news is there are a lot of people telling us that DevOps patterns enable organizations to be faster, cheaper and safer.

Linux.com: Why are individuals interested in participating?

John: One of the core tenets of DevOps is learning and sharing. Individuals who are passionate about the health and performance of their organization find these patterns personally fulfilling.

Linux.com: What’s the primary advantage of DevOps?

John: Implementing DevOps patterns have shown that organizations can go faster while being more reliable. Based on surveys of IT professionals, the State of DevOps Report has shown that organizations that deploy faster and deliver services more quickly are better at resolving issues and have better change success rates. There have been a number of case studies and experience reports from the DevOps Enterprise Summit that show large enterprises are also moving faster with better reliability.

Linux.com: What is the overwhelming hurdle?

John: Culture, Culture, Culture. Although DevOps can come in many flavors, there are a few principles that seem to be universal. An organization needs to understand some of these principles and be able to adjust and work collaboratively while turning these principles into repeatable patterns.

  1. Small Batch
  2. Source control everything (code, configs, infrastructure as code, container source)
  3. Cross functional ownership of services (done means released)
  4. Automate the service delivery pipeline (continuous integration / continuous delivery) end to toe.

Linux.com: What advice would you give to people who want to get started in DevOps?

John: Attend a DevOps event (DevOpsDays or DevOps Enterprise Summit). As a co-author of the soon to be published DevOps Handbook, we have taken some of the best case studies and experience reports of the past 5 years and aggregated them into this book, so it would be a great way to begin your DevOps journey.

Read previous DevOps Q&As with Kris Buytaert, Michael Ducy, and Patrick Debois.

Subuser Uses Docker Containers to Deliver Desktop Apps for Linux

Subuser is a new application-packaging system that allows Dockerized desktop apps to be run as if they were regular Linux applications. It provides just enough permissions to allow the Dockerized app to interact with the local system — for instance, to work with the X11 display server — while still keeping it locked down.

Creating a Subuser app essentially involves building a Dockerized app, but with one extra ingredient: a permissions.json file that describes what the app in question can and can’t do. For common defaults used in most cases, users can set one flag, basic-common-permissions, and leave it at that.

Read more at InfoWorld

OPNFV Survey Shows Nearly All Telecom Operators on Board with NFV

The Linux Foundation’s OPNFV Project claims 94% of telecom operators have NFV plans, although security, MANO and OSS/BSS remain top concerns

A recent survey released by the Linux Foundation’s Open Platform for NFV Project, found an increasingly small percentage of telecom operators have not yet planned for network functions virtualization.

The survey, which was conducted for OPNFV by Heavy Reading and released at the recent OPNFV Summit, noted 6% of the more than 90 telecom operators questioned did not have an NFV strategy planned at all, down from 14% last September.

Read more at RCR Wireless

Make Peace With Your Processes: Part 4

The principle of basing as much as possible on Unix-like systems around files is a well-advised approach. It could be said that this principle also extends to the Process Table, which I have discussed in previous articles in this series. Consider, for example, the treasure trove of gems to be found if you delve deeply into the “procfs” pseudo-filesystem, located in root level “/proc” on your filesystem.

Everything Is A File

Elements of the innards of /proc can only be read from and not written to. The key file here is “/etc/sysctl.conf” where you can also change many tunable kernel settings so that they persist after a reboot. One not-so-trivial caveat is that, almost magically, any freshly entered parameters into /proc are usually set live instantly, so be careful!

Clearly, this approach has a number of advantages. There’s no messing about with stopping and starting daemons, but be warned that if you are the slightest bit unsure of making a change (especially to servers) then take a deep breath before doing so. Rest assured that a reboot will revert any changes that you make if they are not entered into the file “/etc/sysctl.conf”.

There are zillions of hidden corridors and secret rooms to explore inside /proc, and sadly we will only be able to look at a tiny percentage of them here. Needless to say, on a test virtual machine or development machine, you should spend a long time tweaking, fiddling, and breaking your current kernel’s procfs settings. If you’re like me, then you might even find such activity vaguely cathartic, and the immediacy of the changes will certainly appeal to the impatient.

You can, for example, look further into a particular process that you’ve found using the excellent ps command, as we’ve already seen. The path of Process ID 23022, for example, is simply “/proc/23022” in relation to /proc.

If we enter that directory, then we are shown (after some complaints that we don’t have access to parts of the directory structure if we’re not logged in as root) the contents is presented in Listing 1:

dr-xr-xr-x.   8 apache apache 0 Feb 26 03:15 .

dr-xr-xr-x. 144 root   root   0 Feb 11 13:31 ..

dr-xr-xr-x.   2 apache apache 0 Feb 26 04:03 attr

-rw-r--r--.   1 root   root   0 Feb 28 08:25 autogroup

-r--------.   1 root   root   0 Feb 28 08:25 auxv

-r--r--r--.   1 root   root   0 Feb 28 08:25 cgroup

--w-------.   1 root   root   0 Feb 28 08:25 clear_refs

-r--r--r--.   1 root   root   0 Feb 26 04:03 cmdline

-rw-r--r--.   1 root   root   0 Feb 28 08:25 comm

-rw-r--r--.   1 root   root   0 Feb 28 08:25 coredump_filter

-r--r--r--.   1 root   root   0 Feb 28 08:25 cpuset

lrwxrwxrwx.   1 root   root   0 Feb 28 08:25 cwd -> /

-r--------.   1 root   root   0 Feb 27 14:01 environ

lrwxrwxrwx.   1 root   root   0 Feb 28 08:25 exe -> /usr/sbin/apache2

dr-x------.   2 root   root   0 Feb 26 04:03 fd

dr-x------.   2 root   root   0 Feb 28 08:25 fdinfo

-r--------.   1 root   root   0 Feb 28 08:25 io

-rw-------.   1 root   root   0 Feb 28 08:25 limits

-rw-r--r--.   1 root   root   0 Feb 28 08:25 loginuid

-r--r--r--.   1 root   root   0 Feb 28 08:25 maps

-rw-------.   1 root   root   0 Feb 28 08:25 mem

-r--r--r--.   1 root   root   0 Feb 28 08:25 mountinfo

-r--r--r--.   1 root   root   0 Feb 28 08:25 mounts

-r--------.   1 root   root   0 Feb 28 08:25 mountstats

dr-xr-xr-x.   4 apache apache 0 Feb 28 08:25 net

dr-x--x--x.   2 root   root   0 Feb 28 08:25 ns

-r--r--r--.   1 root   root   0 Feb 28 08:25 numa_maps

-rw-r--r--.   1 root   root   0 Feb 28 08:25 oom_adj

-r--r--r--.   1 root   root   0 Feb 28 08:25 oom_score

-rw-r--r--.   1 root   root   0 Feb 28 08:25 oom_score_adj

-r--r--r--.   1 root   root   0 Feb 28 08:25 pagemap

-r--r--r--.   1 root   root   0 Feb 28 08:25 personality

lrwxrwxrwx.   1 root   root   0 Feb 28 08:25 root -> /

-rw-r--r--.   1 root   root   0 Feb 28 08:25 sched

-r--r--r--.   1 root   root   0 Feb 28 08:25 schedstat

-r--r--r--.   1 root   root   0 Feb 28 08:25 sessionid

-r--r--r--.   1 root   root   0 Feb 28 07:52 smaps

-r--r--r--.   1 root   root   0 Feb 28 08:25 stack

-r--r--r--.   1 root   root   0 Feb 26 03:15 stat

-r--r--r--.   1 root   root   0 Feb 26 03:15 statm

-r--r--r--.   1 root   root   0 Feb 26 04:03 status

-r--r--r--.   1 root   root   0 Feb 28 08:25 syscall

dr-xr-xr-x.   3 apache apache 0 Feb 27 11:41 task

-r--r--r--.   1 root   root   0 Feb 28 08:25 wchan

Listing 1: Inside “/proc/23022” we can see a number of pseudo files and directories for our web server.

You might want to think of this content as belonging to runtime system information. It has been said that /proc is a centralized config system for the kernel, and it’s easy to see that the directory contains a mountain of information for just one process. As suggested, rummaging through these directories and looking up which file does what might be described as therapeutic. Anyway, it’s well worth the effort.

Pseudo Filesystems

It’s hard to dismiss the power that /proc wields. Be aware, however, that there’s a lot going on inside your server when it is running, even if no one is hitting your website. As a result, wouldn’t it be sensible to separate the tricksy hardware settings from the kernel settings and Process Table?

Continuing with our “Everything Is A File” mantra, that’s exactly what Unix-type operating systems do. Step forward /dev.

When dealing with physical devices, whether they are connected to the machine or not, we turn to /dev and not /proc.

An abbreviated directory listing of /dev is shown in Listing 2.

drwxr-xr-x.  2 root root         740 Feb 11 13:31 block

drwxr-xr-x.  2 root root          80 Feb 11 13:31 bsg

lrwxrwxrwx.  1 root root           3 Feb 11 13:31 cdrom -> sr0

lrwxrwxrwx.  1 root root           3 Feb 11 13:31 cdrw -> sr0

drwxr-xr-x.  2 root root           2.5K Feb 11 13:31 char

crw-------.  1 root root            5,1 Feb 11 13:31 console

lrwxrwxrwx.  1 root root         11 Feb 11 13:31 core -> /proc/kcore

drwxr-xr-x.  4 root root          80 Feb 11 13:31 cpu

crw-rw----.  1 root root          10,  61 Feb 11 13:31 cpu_dma_latency

crw-rw----.  1 root root          10,  62 Feb 11 13:31 crash

drwxr-xr-x.  5 root root         100 Feb 11 13:31 disk

Listing 2: We can see an abbreviated list of some of the devices that /dev deals with.

What about another example of what “/dev” can do for us? Let’s take a look, for example, at the superb “lsof” utility. If you’re not familiar with lsof, then it’s unquestionably worth a look at. I’m a big fan. The abbreviation “lsof” stands for “list open files,” and its seemingly endless functionality is exceptionally useful.

Listing 3 shows output from “lsof” when looking up information relating to the /var/log directory. We can display this information by running the following command:


# lsof +D /var/log/


COMMAND PID   USER   FD   TYPE DEVICE SIZE/OFF   NODE NAME

rsyslogd       1103   root    1w   REG  253,4     2743     19 /var/log/messages

rsyslogd       1103   root    2w   REG  253,4     1906     17 /var/log/cron

rsyslogd       1103   root    4w   REG  253,4      747     18 /var/log/maillog

rsyslogd       1103   root    5w   REG  253,4     1753     27 /var/log/secure

apache2       22856   root    2w   REG  253,4      245 131095 /var/log/apache2/error_log

apache2       22856   root    6w   REG  253,4        0 131104 /var/log/apache2/access_log

apache2       23022 apache    2w   REG  253,4      245 131095 /var/log/apache2/error_log

apache2       23022 apache    6w   REG  253,4        0 131104 /var/log/apache2/access_log

apache2       23024 apache    2w   REG  253,4      245 131095 /var/log/apache2/error_log

apache2       23024 apache    6w   REG  253,4        0 131104 /var/log/apache2/access_log

apache2       23026 apache    2w   REG  253,4      245 131095 /var/log/apache2/error_log

apache2       23026 apache    6w   REG  253,4        0 131104 /var/log/apache2/access_log

apache2       23027 apache    2w   REG  253,4      245 131095 /var/log/apache2/error_log

apache2       23027 apache    6w   REG  253,4        0 131104 /var/log/apache2/access_log

apache2       23028 apache    2w   REG  253,4      245 131095 /var/log/apache2/error_log

apache2       23028 apache    6w   REG  253,4        0 131104 /var/log/apache2/access_log

apache2       23029 apache    2w   REG  253,4      245 131095 /var/log/apache2/error_log

apache2       23029 apache    6w   REG  253,4        0 131104 /var/log/apache2/access_log

apache2       23030 apache    2w   REG  253,4      245 131095 /var/log/apache2/error_log

apache2       23030 apache    6w   REG  253,4        0 131104 /var/log/apache2/access_log

apache2       23031 apache    2w   REG  253,4      245 131095 /var/log/apache2/error_log

apache2       23031 apache    6w   REG  253,4        0 131104 /var/log/apache2/access_log

Listing 3: The output from the mighty “lsof” looks much like that from the ps command.

I am using this “lsof” example, because it highlights how a system weaves in and out referencing data from both /proc and /dev. I won’t pretend to understand the nuances.

From its manual, we learn that the versatile “lsof” transparently informs us of how it gathered such information about that directory, by telling us which files it references:

  • /dev/kmem — the kernel virtual memory device

  • /dev/mem — the physical memory device

  • /dev/swap — the system paging device

From what I can gather, these files change between varying Unix versions, but they should at least give you a taste of which file is responsible for which task.

As we can see /dev and /proc are useful for all sorts of things — including network information, devices (real or virtual), disks (loop disks and physical drives), and much more.

Next Time

So far, I’ve looked at the Process Table and pseudo filesystems, and I talked about /dev and /proc. Next time, in the final article of this series, I’ll examine some additional command-line tools that may come in very handy at some point in the future.

Read the previous articles in this series:

Part 1

Part 2

Part 3

Chris Binnie is a Technical Consultant with 20 years of Linux experience and a writer for Linux Magazine and Admin Magazine. His new book Linux Server Security: Hack and Defend teaches you how to launch sophisticated attacks, make your servers invisible and crack complex passwords.

 

Microsoft Says It’s in Love With Linux. Now It’s Finally Proving It

Today, the company released .NET Core 1.0, a version of its popular software development platform that will run not just on its own Windows operating systems, but on the Linux and Mac OS X operating systems as well. What’s more, .NET Core is open source, meaning that any developer can not only use it for free to build their own applications, but also modify and improve the platform to suit their needs and the needs of others.

All this highlights an enormous change not only in Microsoft, but in the software industry as a whole. Over the last decade, the world’s tech businesses, from Google and Facebook and Twitter on down, have increasingly used Linux and other open source software to build their online services and other technologies…

Read more at Wired