Articles from ADMIN Issue 66
Deploy a full Linux container environment, including a Kubernetes cluster, on Windows with Windows Subsystem for Linux version 2.
Kubernetes has limited support for multitenancy, so many admins prefer to build multiple standalone Kubernetes clusters that eat up resources and complicate management. As a solution, Loft launches any number of clusters within the same control plane.
The Domain Name System, in addition to assigning IP addresses, lets you protect the network communication of servers in a domain. DNS offers further hardening of network protocols – in particular, SSH fingerprinting and CAA records.
Isolate popular applications in flexible, easy-to-set-up, and easy-to-take-down containers with Firejail.
Admins use SSH, the proverbial Swiss army knife of system management, for many of their daily tasks, but no matter how powerful the tool might be, it typically does not offer adequate protection. We look at ways to tighten SSH security.
The JMeter specialized integrated development environment applies test scripts for load testing and performance evaluation and supports various protocols that come in handy for Internet-powered applications.
Microsoft Azure Update Management automatically patches servers in on-premises data centers, virtual servers on Azure and other cloud services, and even Linux servers.
Develop container applications on a Windows or Mac system with Docker Desktop or Podman.
The bpytop command-line monitoring tool provides a variety of information via a fancy user interface and supports network monitoring and mouse- or keyboard-based control.
Microsoft and Google have upgraded their in-house operating systems, Windows 10 and Chrome OS, with subsystems to run Linux. We look into their highly different approaches.