Articles

Lead Image © Rajesh Rajendran Nair, 123RF.com

Lead Image © Rajesh Rajendran Nair, 123RF.com

Automating network hardware

Automation of network devices can be accomplished in a number of ways: with the official approaches recommended by the manufacturers; by Cumulus Linux, an open network operating system; and with the Ansible automation platform, which can communicate with devices from any vendor.
Photo by Sebastian Molina fotografÌa on Unsplash

Photo by Sebastian Molina fotografÌa on Unsplash

Tracking down problems with Jaeger

The various components of cloud-native applications are always exchanging information, which makes troubleshooting difficult. The Jaeger tracing framework helps hunt down the perpetrators.
Photo by Keith Hardy on Unsplash

Photo by Keith Hardy on Unsplash

Network access control with Cisco's Identity Services Engine

Cisco's Identity Services Engine offers a scalable approach to network access control for a variety of devices.
Photo by Larisa Birta on Unsplash

Photo by Larisa Birta on Unsplash

Convert Linux shell commands into PowerShell cmdlets

Convert Linux shell commands into PowerShell cmdlets and modules and run them in a PowerShell environment.
Photo by Nick Fewings on Unsplash

Photo by Nick Fewings on Unsplash

Spotlight on the Kubernetes package manager, Helm

A Helm chart is a template of several parts that defines, deploys, and upgrades Kubernetes apps and can be considered the standard package manager in the Kubernetes world.
Photo by Jonathan Sanchez on Unsplash

Photo by Jonathan Sanchez on Unsplash

Package applications in Docker containers

Kaboxer packages applications that are otherwise missing from distribution package sources.
Photo by Bryan Garces on Unsplash

Photo by Bryan Garces on Unsplash

Filter DNS queries with Blocky

The Domain Name System is repeatedly the target of or is leveraged for attacks on corporate infrastructures; however, it also lets you protect corporate networks against attacks and malware. The Blocky DNS server sets up quickly to secure DNS queries and DNS filtering for corporate networks.
Photo by Damien TUPINIER on Unsplash

Photo by Damien TUPINIER on Unsplash

Load testing with Locust

The Locust load test tool assesses the resiliency of your infrastructure to help you determine whether it can withstand a flood of requests.
Photo by Claudia Soraya on Unsplash

Photo by Claudia Soraya on Unsplash

Remote maintenance and automation with RPort

Firewalls and network address translation often stand in the way of access to remote systems, but the free RPort software works around these obstacles and supports remote maintenance through a tunnel locally, in the cloud, and from your home office.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Comparing startup times of Linux distros in the cloud

A cloud speed test pits Linux distributions against one another.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=