Articles

Lead Image © Nah Ting Feng, 123RF.com

Lead Image © Nah Ting Feng, 123RF.com

Lithnet Password Protection for Active Directory

Lithnet Password Protection for Active Directory provides flexible rules beyond that possible with group policies alone and prevents the use of previously compromised passwords.
Photo by Pascal Bernardon on Unsplash

Photo by Pascal Bernardon on Unsplash

Chef users faced with a license change might find solace in a new open source distribution, Cinc.

For the past two years, Chef software used commercially has required a separate license. Cinc enters the scene as a free and completely compatible Chef distribution that makes it a genuine alternative.
Lead Image © zelfit, 123RF.com

Lead Image © zelfit, 123RF.com

Kubernetes for small and medium-sized enterprises

We look at the benefits of Kubernetes outside of large corporate environments.

Setting up a PXE boot server

Set up a PXE server for BIOS and UEFI clients and use it to boot Linux or Windows.
Lead Image © Sergey Nivens, 123RF.com

Lead Image © Sergey Nivens, 123RF.com

Single sign-on like the big guys

Keycloak is a robust and mature project that provides a modern single sign-on authorization experience and centralized authentication of your apps.
Photo by Cytonn Photography on Unsplash

Photo by Cytonn Photography on Unsplash

Tools for automation in the cloud

Automation in the cloud does not require expensive new acquisitions when tools such as Ansible, Salt, Puppet, or Chef are already in use locally and can contribute to the automatic management and orchestration of cloud workloads.
Photo by Austin Neill on Unsplash

Photo by Austin Neill on Unsplash

Configuring complex environments

YAML is often the language of choice when configuring complex environments. We help you get started with YAML and the YAML parser yq.
Lead Image © Rajesh Rajendran Nair, 123RF.com

Lead Image © Rajesh Rajendran Nair, 123RF.com

Automating network hardware

Automation of network devices can be accomplished in a number of ways: with the official approaches recommended by the manufacturers; by Cumulus Linux, an open network operating system; and with the Ansible automation platform, which can communicate with devices from any vendor.
Photo by Sebastian Molina fotografÌa on Unsplash

Photo by Sebastian Molina fotografÌa on Unsplash

Tracking down problems with Jaeger

The various components of cloud-native applications are always exchanging information, which makes troubleshooting difficult. The Jaeger tracing framework helps hunt down the perpetrators.
Photo by Keith Hardy on Unsplash

Photo by Keith Hardy on Unsplash

Network access control with Cisco's Identity Services Engine

Cisco's Identity Services Engine offers a scalable approach to network access control for a variety of devices.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=