Articles

Photo by JJ Ying on Unsplash

Photo by JJ Ying on Unsplash

Hybrid public/private cloud

Extending your data center temporarily into the cloud during a customer rush might not be easy, but it can be done, thanks to Ansible's Playbooks and some AWS scripts.
Lead Image © Jakub Jirsak, 123RF.com

Lead Image © Jakub Jirsak, 123RF.com

Regular expression security

Regular expressions are invaluable for checking user input, but a vulnerability could make them ripe for exploitation.
Lead Image © studiom1, 123RF.com

Lead Image © studiom1, 123RF.com

Transparent SIP communication with NAT

We show you how to secure transparent IP address transitions through NAT firewalls and gateways for Voice over IP.
Lead Image © Nataliya Hora, 123RF.com

Lead Image © Nataliya Hora, 123RF.com

Build operating system images on demand

If you are looking for a way to build images quickly and easily, FAI.me is the place to go.
Lead Image © zlajo, 123RF.com

Lead Image © zlajo, 123RF.com

Central logging for Kubernetes users

Grafana's Loki is a good replacement candidate for the Elasticsearch, Logstash, and Kibana combination in Kubernetes environments.
Lead Image © alphaspirit, 123RF.com

Lead Image © alphaspirit, 123RF.com

Linux nftables packet filter

The latest nftables packet filter implementation, now available in the Linux kernel, promises better performance and simpler syntax and operation.
Lead Image © Dmitry Naumov, 123RF.com

Lead Image © Dmitry Naumov, 123RF.com

Prowling AWS

Prowler is an AWS security best practices assessment, auditing, hardening, and forensics readiness tool.
Lead Image © Eric Gevaert, 123RF.com

Lead Image © Eric Gevaert, 123RF.com

Serverless run times with custom Bash AWS Lambda layers

A piece of old-meets-new functionality lets you run Bash scripts in an AWS Lambda layer.
Lead Image © lassedesignen, 123RF

Lead Image © lassedesignen, 123RF

Building a virtual NVMe drive

An economical and high-performing hybrid NVMe SSD is exported to host servers that use it as a locally attached NVMe device.
Lead Image © Zachery Blanton, 123RF.com

Lead Image © Zachery Blanton, 123RF.com

Secure access to Kubernetes

Kubernetes comes with a sophisticated system for ensuring secure access by users and system components through an API. We look at the options for authentication, authorization, and access control.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=