It’s no surprise that systemd has become the init system of choice for both embedded and desktop Linux distributions – it’s modern, packed full of features and is able to replace an ever increasing number of ancient utilities and daemons. When compared to it’s predecessor (SysVinit) – it also provides a much greater scope for …
Quali Torque orchestrates YAML files — which can be thought of as blueprints — for application environments directly from the IaC modules defined in Git.
As mentioned on previous posts, I have spent the past few weeks dealing with a ZFS crash on my FreeNAS install. Because of that, not only was I forced to learn how to troubleshoot ZFS, but I also had to learn how to setup new volumes and come up with new backup strategies (between a few other things).
Create Apache Name-Based and IP-Based Virtual Hosts in Linux
In this tutorial, we explore how to set up Apache name-based and IP-based virtual hosts in RHEL-based distributions such as Fedora, CentOS, Rocky and Alma Linux
VM vs. Containers: A Detailed Comparison to Drive Your Infrastructure Choices : @VMblog
Containers and virtual machines (VMs) are two popular ways to run workloads and applications in the cloud. While they share some similarities, there are a few key differences to understand before choosing one over the other.
Portless Ports: Demystifying Kubernetes Port Forwarding
Introduction
Recently, I was exploring Hexmos' infrastructure, trying to learn all the steps involved in loading up the Feedback app in the browser. During my investigation of a packet's path to the server and analysis of the Nginx configuration file that governs how the web server handles incoming requests, I
How to Implement Relationship-Based Access Control (ReBAC) Using Open Policy Agent (OPA) | Permit
Learn how to implement Relationship-Based Access Control (ReBAC) with OPA - an open source policy engine for controlling access to systems and resources.
Security topics: io_uring, VM attestation, and random-reseed notifications
The kernel-development community has recently been discussing a number of
independent patches, each of which is intended to help improve the security
of deployed systems in some way. They touch on a number of areas within the
kernel, including the question of how widely io_uring should be available,
how to allow virtual machines to attest to their integrity, and the best
way to inform applications when their random-number generators need to be
reseeded.