Articles
Single sign-on like the big guys
Keycloak is a robust and mature project that provides a modern single sign-on authorization experience and centralized authentication of your apps.
Puppet Bolt orchestration tool
Puppet Bolt free software automates administrative tasks to speed up the admin's daily work.
Tracking down problems with Jaeger
The various components of cloud-native applications are always exchanging information, which makes troubleshooting difficult. The Jaeger tracing framework helps hunt down the perpetrators.
Certificate management with FreeIPA and Dogtag
The Dogtag certificate manager integrated into the FreeIPA open source toolset generates SSL/TLS certificates for intranet services and publishes them on the network.
Statistics and machine learning with Weka
The open source Weka tool applies a wide variety of analysis methods to data without the need for advanced programming skills and without having to change environments.
Detect anomalies in metrics data
Anomalies in an environment's metrics data are an important indicator of an attack. The Prometheus time series database automatically detects, alerts, and forecasts anomalous behavior with the Fourier and Prophet models of the Prometheus Anomaly Detector.
A central access manager for SSH, Kubernetes, and others
Teleport centrally manages logins against various protocols, including SSH, Kubernetes, and databases. Functions such as two-factor authentication are included in the scope of delivery, as is management of your own certificates.
Goodbye virtual machines, hello microVMs
You can have your cake and eat it, too: MicroVMs feature the strong isolation of virtual machines and lightweight behaviors of containers.
Policy rulesets in cloud-native environments
What a user is allowed to do in a program is usually defined by a role model, which often poses numerous challenges, especially in the cloud or for infrastructure as code. The free Open Policy Agent offers a flexible way to manage user rights.
Diving into infrastructure security
How to deal with threat intelligence on the corporate network when the existing security tools are not effective.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
