Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 141 142 143 144 145 146 147 148 149 150 151 152 153 154 Next »

11%
Application Monitoring with openITCOCKPIT
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Author, 123RF.com
into naming to ensure greater clarity – many commands can be used in large environments, and a carefully considered nomenclature pays dividends. The Command line section contains the command that is called
11%
Linux and Windows client management with opsi
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © alexutemov, 123RF.com
. You can call the applet with the default browser using the URL https://opsi-server:4447/configed/ . Alternatively, launch the opsi config editor, for which the Java runtime environment (JRE) must
11%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
. This prevents flooding of the call server with registration messages. Advantages of VLANs Network virtualization ensures that systems can be structured from a logical point of view – that is, independently
11%
Deploying OpenStack in the cloud and the data center
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © johnjohnson, 123RF.com
Stack cloud, in which all the services discussed in the first article of this series [1] are available. The IP you use to call the dashboard at the end of the Autopilot installation is also the IP under which
11%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
a zero trust architecture (i.e., a system in which the provider's services do not trust a client at all, regardless of where it is). Netflix calls the principle location-independent security approach (LISA
11%
Monitoring network computers with the Icinga Nagios fork
17.06.2011
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
), making the job of monitoring hosts less boring – at least initially. The depth of information that Icinga provides is impressive and promises an escape route for avoiding calls from end users. In short
11%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
. If you later want to recreate a development K3s setup in production, you can call the setup script with various parameters that roll out the Kubernetes control plane redundantly. You can tell that K3s
11%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
await as soon as the first module (awx.awx.organization) is called up. When you start a task on AWX, the system first generates a Kubernetes pod with the execution environment, which then performs
11%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
_$PLATFORM.tar.gz" -C /tmp && rm "eksctl_$PLATFORM.tar.gz" $ unzip -u awscliv2.zip $ sudo mv /tmp/eksctl /usr/local/bin $ sudo ./aws/install A call to eksctl --version should then display the version information
11%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
it to use Quadlets (as the container unit files are called) for your rootless Podman containers. As an example, I'll show you how to set up a reverse proxy in one container and some web services behind

« Previous 1 ... 141 142 143 144 145 146 147 148 149 150 151 152 153 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice