Articles

Setting up a PXE boot server

Set up a PXE server for BIOS and UEFI clients and use it to boot Linux or Windows.
Photo by Pascal Bernardon on Unsplash

Photo by Pascal Bernardon on Unsplash

Chef users faced with a license change might find solace in a new open source distribution, Cinc.

For the past two years, Chef software used commercially has required a separate license. Cinc enters the scene as a free and completely compatible Chef distribution that makes it a genuine alternative.
Lead Image © Sebastian Duda, 123RF.com

Lead Image © Sebastian Duda, 123RF.com

Rancher manages lean Kubernetes workloads

The Rancher lightweight alternative to Red Hat's OpenShift gives admins a helping hand when entering the world of Kubernetes, but with major differences in architecture.
Lead Image © Sergey Nivens, 123RF.com

Lead Image © Sergey Nivens, 123RF.com

Single sign-on like the big guys

Keycloak is a robust and mature project that provides a modern single sign-on authorization experience and centralized authentication of your apps.
Photo by lee junda on Unsplash

Photo by lee junda on Unsplash

Puppet Bolt orchestration tool

Puppet Bolt free software automates administrative tasks to speed up the admin's daily work.
Photo by Sebastian Molina fotografÌa on Unsplash

Photo by Sebastian Molina fotografÌa on Unsplash

Tracking down problems with Jaeger

The various components of cloud-native applications are always exchanging information, which makes troubleshooting difficult. The Jaeger tracing framework helps hunt down the perpetrators.
Photo by Oscar Sutton on Unsplash

Photo by Oscar Sutton on Unsplash

Certificate management with FreeIPA and Dogtag

The Dogtag certificate manager integrated into the FreeIPA open source toolset generates SSL/TLS certificates for intranet services and publishes them on the network.
Photo by Shane Rounce on Unsplash

Photo by Shane Rounce on Unsplash

Statistics and machine learning with Weka

The open source Weka tool applies a wide variety of analysis methods to data without the need for advanced programming skills and without having to change environments.
Lead Image © rudall30, 123RF.com

Lead Image © rudall30, 123RF.com

Detect anomalies in metrics data

Anomalies in an environment's metrics data are an important indicator of an attack. The Prometheus time series database automatically detects, alerts, and forecasts anomalous behavior with the Fourier and Prophet models of the Prometheus Anomaly Detector.
Lead Image © Andriy Popov, 123RF.com

Lead Image © Andriy Popov, 123RF.com

A central access manager for SSH, Kubernetes, and others

Teleport centrally manages logins against various protocols, including SSH, Kubernetes, and databases. Functions such as two-factor authentication are included in the scope of delivery, as is management of your own certificates.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=