Articles

Lead Image © Valentyn Ihnatkin, 123RF.com

Lead Image © Valentyn Ihnatkin, 123RF.com

Incident response with Velociraptor

The software incarnation of the feared predator in the Jurassic Park movies has been on the hunt for clues to cyberattacks and indicators of compromise. We show you how to tame the beast and use it for your own purposes.
Photo by Hassan Pasha on Unsplash

Photo by Hassan Pasha on Unsplash

Sustainable Kubernetes with Project Kepler

Measure, predict, and optimize the carbon footprint of your containerized workloads.
Lead Image © Sergii_Figurnyi, 123RF.com

Lead Image © Sergii_Figurnyi, 123RF.com

Improved visibility on the network

OpenNMS collects and visualizes flows so you can discover which network devices communicate with each other and the volume of data transferred.
Photo by Michael D on Unsplash

Photo by Michael D on Unsplash

Secure and seamless server access

The powerful Cloudflare Tunnel provides secure and seamless access to servers and applications, making it a convenient alternative to VPN for any modern IT infrastructure.
Photo by Sudhith Xavier on Unsplash

Photo by Sudhith Xavier on Unsplash

A watchdog for every modern *ix server

Monit is a lightweight, performant, and seasoned solution that you can drop into old running servers or bake into new servers for full monitoring and proactive healing.
Photo by Kenneth Berrios Alvarez on Unsplash

Photo by Kenneth Berrios Alvarez on Unsplash

Response automation with Shuffle

The concept of security orchestration, automation, and response (SOAR) is increasingly important in IT security to counter ever-growing threats. We introduce Shuffle, a tool that lets you define automated workflows that boost infrastructure security.

A modern logging solution

As systems grow more complex and distributed, managing and making sense of logs used for monitoring, debugging, and troubleshooting can become a daunting task. Fluentd and its lighter counterpart Fluent Bit can help you unify data collection and consumption to make sense of logging data.
Photo by Tingey Injury Law Firm on Unsplash

Photo by Tingey Injury Law Firm on Unsplash

A GitOps continuous delivery tool for Kubernetes

Argo CD uses Git repositories as the source of truth for defining a desired application state and automates the deployment in target environments.
Lead Image © hanohiki, 123RF.com

Lead Image © hanohiki, 123RF.com

Dockerizing Legacy Applications

Sooner or later, you'll want to convert your legacy application to a containerized environment. Docker offers the tools for a smooth and efficient transition.
Photo by Francesco Gallarotti on Unsplash

Photo by Francesco Gallarotti on Unsplash

Integrating a Linux system with Active Directory

Your Active Directory system doesn't have to be a walled garden. A few easy steps are all you need to integrate Linux with AD.