Articles
Explore automation-as-code with Ansible
The Ansible automation tool makes it really easy to implement IT scenarios as code. We use structured YAML code to roll out Ansible in the form of AWX.
Getting your virtual machine dimensions right
Massive, performance-hungry VMs require proper handling to meet their dynamic requirements. We give you some rules to help size these monsters properly.
Migrate your Git repositories to Gitea
Nothing is forever, not even a Git server. After the purchase of GitHub by Microsoft, I found a new home in Gitea for version control.
Data deduplication on Windows Server 2022
Data deduplication tools boost efficiency in storage management by improving storage utilization and saving network bandwidth during backup and replication processes.
Integrate remote cloud storage
You don't need native clients for every single service just to back up or synchronize your data in the cloud; Rclone helps you handle these tasks for multiple cloud accounts at the command line or in a graphical front end.
Hardening SSH authentication to the max
Public key authentication further supplemented with one-time password or hardware authentication methods improves SSH security while offering genuine convenience.
Networking strategies for Linux on Azure
We explore advanced networking strategies tailored for Linux workloads on Azure.
Production-ready mini-Kubernetes installations
Kubernetes can be highly complex, with massive setup routines that are totally over the top for newcomers. If you want to try out Kubernetes or run it in production, you have a number of options, even if you decide not to use the comprehensive packages from established vendors.
Automated health checks
The open source Dradis framework helps you create plans for carrying out team pentests and facilitates the task of standardizing reports from different tools to create summary output.
Optimizing domain controller security
Configure your domain controller security settings correctly with Policy Analyzer and current Microsoft baselines for a leak-tight Active Directory.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
