Articles

Lead Image © choreograph, 123RF.com

Lead Image © choreograph, 123RF.com

Linking Kubernetes clusters

When Kubernetes needs to scale applications, it searches for free nodes that meet a container's CPU and main memory requirements; however, when the existing hardware is at full capacity, the Kubernetes Cluster Federation project (KubeFed) takes the pain out of adding clusters.
Photo by Ian Taylor on Unsplash

Photo by Ian Taylor on Unsplash

Create secure simple containers with the systemd tools Nspawnd and Portabled

Systemd comes with two functions for container management that allow many programs to run more securely through isolation.
Lead Image © bowie15, 123RF.com

Lead Image © bowie15, 123RF.com

Collecting application logfiles with Kubernetes

Modern scale-out environments with containers make log collection difficult. We present concepts and methods for collecting application logfiles with a sidecar container in Kubernetes environments.
Lead Image © Kurhan, 123RF.com

Lead Image © Kurhan, 123RF.com

Incident Analysis with The Hive and Cortex

Deployed together, The Hive platform and Cortex automation tool optimize the workflow for your incident response team.
Lead Image © Kian Hwi Lim, 123RF.com

Lead Image © Kian Hwi Lim, 123RF.com

High-performance backup strategies

A sound backup strategy with appropriate hardware and software ensures you can backup and restore your data rapidly and reliably.

Harden services with systemd

Systemd comes with a metric for determining the security of your system, letting you track how any service can be secured step-by-step in a sandbox.
Photo by Kyle Head on Unsplash

Photo by Kyle Head on Unsplash

Exploiting, detecting, and correcting IAM security misconfigurations

Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role passing. We look at ways to avoid and detect IAM security holes.
Lead Image © Davorr, Fotolia.com

Lead Image © Davorr, Fotolia.com

Workspace ONE for endpoint management

VMware Workspace ONE provides a secure and user-friendly digital workplace. We look at the features, components, and architecture of Workspace ONE, as well as application management and simplification of the integration of end devices through user self-enrollment.
Photo by Jack Dong on Unsplash

Photo by Jack Dong on Unsplash

Zero Trust as a security strategy

Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles of modern zero trust concepts.
Photo by Beau Runsten on Unsplash

Photo by Beau Runsten on Unsplash

Clustering with the Nutanix Community Edition

The free Community Edition of the Nutanix hyperconverged infrastructure, Nutanix on-premises cloud, is offered alongside its commercial product for those looking to take their first steps in the environment.