Articles

Lead Image © zlajo, 123RF.com

Lead Image © zlajo, 123RF.com

Central logging for Kubernetes users

Grafana's Loki is a good replacement candidate for the Elasticsearch, Logstash, and Kibana combination in Kubernetes environments.
Lead Image © Dmitry Naumov, 123RF.com

Lead Image © Dmitry Naumov, 123RF.com

Prowling AWS

Prowler is an AWS security best practices assessment, auditing, hardening, and forensics readiness tool.
Photo by Mirko Blicke on Unsplash

Photo by Mirko Blicke on Unsplash

Software RAID in Windows, macOS, and Linux

If RAID hardware is missing on your server, Windows, Linux, and macOS offer various options for building software RAID.
Lead Image © Devon, Fotolia.com

Lead Image © Devon, Fotolia.com

WSL puts Linux on Windows desktops

Windows 10 supports the native execution of Linux binaries from various distributions through the Windows Subsystem for Linux. Even graphical Linux applications can make their way onto the Windows desktop.
Lead Image © joingate, 123RF.com

Lead Image © joingate, 123RF.com

Serverless computing with AWS Lambda

Monitoring with AWS Lambda serverless technology reduces costs and scales to your infrastructure automatically.
Lead Image © lightwise, 123RF.com

Lead Image © lightwise, 123RF.com

Zuul 3, a modern solution for CI/CD

The Zuul 3 gating system is a free and flexible solution for continuous integration, delivery, and deployment.
Lead Image © Carsten Reisinger, 123RF.com

Lead Image © Carsten Reisinger, 123RF.com

Interprocess communication essentials in Perl

IPC in Perl is easy with a few functions, signal handlers, backticks, and pipes.
Lead Image © sandrobrezger, photocase.com

Lead Image © sandrobrezger, photocase.com

Managing containers with Podman

The Podman container management tool does not use a daemon in the background, like its counterpart Docker, and can operate in non-privileged mode.
Lead Image © Alexey Shkitenkov, Fotolia.com

Lead Image © Alexey Shkitenkov, Fotolia.com

A service mesh for microarchitecture components

Istio facilitates communication between the many small microcomponents that need to communicate with each other in modern applications.
Lead Image © Christos Georghiou, 123RF.com

Lead Image © Christos Georghiou, 123RF.com

Manipulation detection with AFICK

AFICK is a small, free tool that helps administrators detect attempts to manipulate documents and system files.