Articles

Lead Image © Barmaliejus, Fotolia.com

Lead Image © Barmaliejus, Fotolia.com

Rebuilding the Linux ramdisk

If your Linux system is failing to boot, the dracut tool can be a convenient way to build a new ramdisk.
Lead Image © 3dkombinat, 123RF.com

Lead Image © 3dkombinat, 123RF.com

Monitor and optimize Fibre Channel SAN performance

We discuss the possible bottlenecks in Fibre Channel storage area networks and how to resolve them.
Lead Image © satori, 123RF.com

Lead Image © satori, 123RF.com

Optimally combine Kubernetes and Ceph with Rook

Ceph distributed storage and Kubernetes container orchestration come together with Rook.
Photo by JJ Ying on Unsplash

Photo by JJ Ying on Unsplash

Hybrid public/private cloud

Extending your data center temporarily into the cloud during a customer rush might not be easy, but it can be done, thanks to Ansible's Playbooks and some AWS scripts.
Lead Image © Jakub Jirsak, 123RF.com

Lead Image © Jakub Jirsak, 123RF.com

Regular expression security

Regular expressions are invaluable for checking user input, but a vulnerability could make them ripe for exploitation.
Lead Image © studiom1, 123RF.com

Lead Image © studiom1, 123RF.com

Transparent SIP communication with NAT

We show you how to secure transparent IP address transitions through NAT firewalls and gateways for Voice over IP.
Lead Image © Nataliya Hora, 123RF.com

Lead Image © Nataliya Hora, 123RF.com

Build operating system images on demand

If you are looking for a way to build images quickly and easily, FAI.me is the place to go.
Lead Image © zlajo, 123RF.com

Lead Image © zlajo, 123RF.com

Central logging for Kubernetes users

Grafana's Loki is a good replacement candidate for the Elasticsearch, Logstash, and Kibana combination in Kubernetes environments.
Lead Image © alphaspirit, 123RF.com

Lead Image © alphaspirit, 123RF.com

Linux nftables packet filter

The latest nftables packet filter implementation, now available in the Linux kernel, promises better performance and simpler syntax and operation.
Lead Image © Dmitry Naumov, 123RF.com

Lead Image © Dmitry Naumov, 123RF.com

Prowling AWS

Prowler is an AWS security best practices assessment, auditing, hardening, and forensics readiness tool.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=