Articles

Photo by Wynand van Poortvliet on unsplash

Photo by Wynand van Poortvliet on unsplash

Grafana and Prometheus customized dashboards

Grafana analytics and visualization dashboards plus the Prometheus monitoring and alerting tool make possible extensive custom reporting and alerting systems.

Photo by Jan Schulz # Webdesigner Stuttgart

Cloud-native storage with OpenEBS

Software from the open source OpenEBS project provides a cloud-native storage environment that makes block devices available to individual nodes in the Kubernetes cluster.
Photo by Patrick Schneider on Unsplash

Photo by Patrick Schneider on Unsplash

Kafka: Scaling producers and consumers

A guide to 10x scaling in Kafka with real-world metrics for high throughput, low latency, and cross-geographic data movement.
Lead Image © ginasanders, 123RF.com

Lead Image © ginasanders, 123RF.com

Protect privileged accounts in AD

Granular protection for highly privileged accounts is granted by the Protected Users group in Active Directory and Kerberos authentication policies.

Harden your Apache web server

Cyberattacks don't stop at the time-honored Apache HTTP server, but a smart configuration, timely updates, and carefully considered security strategies can keep it from going under.
Lead Image © zelfit, 123RF.com

Lead Image © zelfit, 123RF.com

MinIO: Amazon S3 competition

MinIO promises no less than a local object store with a world-class S3 interface and features that even the original lacks.
Lead Image © Yewkeo, 123RF.com

Lead Image © Yewkeo, 123RF.com

Endlessh and tc tarpits slow down attackers

Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.
Lead Image © Vlad Kochelaevskiy, 123RF.com

Lead Image © Vlad Kochelaevskiy, 123RF.com

Machine learning and security

Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.
Lead Image © Dmitriy Shpilko, 123RF.com

Lead Image © Dmitriy Shpilko, 123RF.com

Pulumi multicloud orchestrator

Pulumi promises a unified interface and surface for orchestrating various clouds and Kubernetes.
Lead Image © lassedesignen, 123RF.com

Lead Image © lassedesignen, 123RF.com

Secure authentication with FIDO2

The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=