Articles from ADMIN Issue 68
Keep your test-driven development and testing environments pristine with Footloose containers that look like VMs.
When Kubernetes needs to scale applications, it searches for free nodes that meet a container's CPU and main memory requirements; however, when the existing hardware is at full capacity, the Kubernetes Cluster Federation project (KubeFed) takes the pain out of adding clusters.
Maximize telephony uptime by clustering Asterisk or FreeSWITCH PBXs together.
Kaboxer packages applications that are otherwise missing from distribution package sources.
Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role passing. We look at ways to avoid and detect IAM security holes.
The Locust load test tool assesses the resiliency of your infrastructure to help you determine whether it can withstand a flood of requests.
The Domain Name System is repeatedly the target of or is leveraged for attacks on corporate infrastructures; however, it also lets you protect corporate networks against attacks and malware. The Blocky DNS server sets up quickly to secure DNS queries and DNS filtering for corporate networks.
Cisco's Identity Services Engine offers a scalable approach to network access control for a variety of devices.
A Helm chart is a template of several parts that defines, deploys, and upgrades Kubernetes apps and can be considered the standard package manager in the Kubernetes world.
IOPS is mentioned quite often when benchmarking and testing storage systems, but what does it really mean? We discuss and explain what an IOPS is and how to measure it.