Articles

Lead Image © Dan Barbalata, 123RF.com

Lead Image © Dan Barbalata, 123RF.com

Avoiding KVM configuration errors

Virtualization solutions isolate their VM systems far more effectively than a container host isolates its guests. However, implementation weaknesses in the hypervisor and configuration errors can lead to residual risk, as we show, using KVM as an example.
Lead Image © Thomas Reichhart, 123RF.com

Lead Image © Thomas Reichhart, 123RF.com

Managing Vim plugins

We look at some tools that can help take the pain out of managing plugins.
Lead Image © larisa13, 123RF.com

Lead Image © larisa13, 123RF.com

Software-defined storage with LizardFS

Standard hardware plus LizardFS equals a resilient, flexible, and configurable POSIX-compliant storage pool.
Lead Image © zelfit, 123RF.com

Lead Image © zelfit, 123RF.com

Harden your OpenStack configuration

Any OpenStack installation that hosts services and VMs for several customers poses a challenge for the security-conscious admin. Hardening the overall system can turn the porous walls into a fortress – but you'll need more than a little mortar.
Lead Image © lassedesignen, 123RF.com

Lead Image © lassedesignen, 123RF.com

MySQL is gearing up with its own high-availability Group Replication solution

Oracle recently introduced Group Replication as a trouble-free high-availability solution for the ubiquitous MySQL.
Lead Image © James Thew, 123RF.com

Lead Image © James Thew, 123RF.com

Relational databases as containers

If you spend very much of your time pushing containerized services from server to server, you might be asking yourself: Why not databases, as well? We describe the status quo for RDBMS containers.
Lead Image © Steve Cukrov, 123RF.com

Lead Image © Steve Cukrov, 123RF.com

Professional virtualization with RHV4

New and updated features in Red Hat Virtualization (RHV) 4, along with seamless provisioning of services between traditional and cloud workloads, could help RHV make up ground on VMware and Hyper-V.
Lead Image © Juthamas Oonhawat, 123RF.com

Lead Image © Juthamas Oonhawat, 123RF.com

Time-series-based monitoring with Prometheus

As Prometheus gave fire to mankind, the distributed monitoring software with the same name illuminates the admin's mind in native cloud environments, offering metrics for monitored systems and applications.
Lead Image © Fotoflash,Fotolia.com

Lead Image © Fotoflash,Fotolia.com

The top three SSH tricks

Add extra security to your SSH service, securely copy files to and from remote computers, and configure passwordless SSH for automation scripting.
Lead Image © artqu, 123RF.com

Lead Image © artqu, 123RF.com

Scalable network infrastructure in Layer 3 with BGP

Large environments such as clouds pose demands on the network, some of which cannot be met with Layer 2 solutions. The Border Gateway Protocol jumps into the breach in Layer 3 and ensures seamlessly scalable networks.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=