Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 148 Next »

13%
Creating SmartOS zones using UCARP
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Le Moal Olivier, 123RF.com
messages, interoperability between different operating systems, and no need for any dedicated extra network link between redundant hosts." Getting Started Suppose you want to configure two highly available
13%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
of these is node_exporter [12], which reads and provides operating system metrics such as memory usage and network load. Meanwhile, a number of exporters [13] exist for a wide range of protocols and services
13%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
, use either of the following commands: $ sudo systemctl restart sshd $ sudo systemctl restart ssh A final change to enhance SSH security on your network is to allow SSH sessions to originate only from
13%
Azure Sphere for Internet of Things
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Zosia Korcz on Unsplash
client-server model are pushing their way into the network, posing new challenges for IT administrators. Although admins have been confronted with a large number of clients and servers in the past, full
13%
Established container solutions in Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © dixiland, Photocase.com
VZ became the basis for cgroups and network namespaces, which today provide a framework for containers on Linux. To this day, OpenVZ still needs its own patched kernel if admins want to use the full
13%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © satori, 123RF.com
Kubernetes cluster. Kubeadm will install this shortly. On the node that you have selected as the Control Plane, the following command sets up the required components: # kubeadm init --pod-network-cidr=10
13%
Build operating system images on demand
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Nataliya Hora, 123RF.com
not provided out of the box in FAI. All FAI components can be loaded from a central network server for this purpose. The highlight is that FAI does not depend on the installation routine of an installer. If you
13%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
are nothing more than certain points in the network stack of the Linux kernel at which a packet is inspected and, in the case of a match, one or more actions executed. For this purpose, tables that store chains
13%
Where Is Your Big Data?
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Ivan Trifonenko, 123RF.com
the biggest culprits in big data generators. Every device on your network generates some type of logfile. Those logfiles either are kept on the local systems that produce them or they're sent to some type
13%
Storage cluster management with LINSTOR
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © sdecoret, 123RF.com
environments like OpenStack, OpenNebula, or Proxmox, or container technologies like Kubernetes. All of these components are network transparent, which means, for example, that a client does not run

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice