Create LXC Templates Every time inspiration struck or I saw a blog post with something I wanted to try, it was frustrating and time consuming to get the base operating system set up to the way I like it before proceeding with the project. Now I just update the template each point release or when I add something substantial to my dotfiles so it's ready to go whenever I need to spin up a fresh container.
Tiny Core Linux is the smallest Linux distribution on the market with a big heart
Tiny Core Linux is as lightweight as a GUI-based Linux distribution can be. Jack Wallen walks you through the installation that makes this operating system unique.
Scan documents and old photos on Linux with Skanlite
Although the world has mostly gone digital now, there are still times when you just have to print a form, sign it, and scan it back in. Sometimes, I find that a snapshot on my phone suffices, but some industries require a better copy than a hasty snapshot, and so a flatbed scanner is necessary. The KDE project provides an application called Skanlite that helps you import documents scanned on a flatbed, or even a tethered camera. Install Skanlite on Linux You can install Skanlite from your software repository. On Fedora, Mageia, and similar:
The KDE project doesn't just provide a famous desktop, it generates a lot of software, from tools for video editng, photography, and illustration, to graphing calculators, email, and office work. Those are all productivity tools, but KDE is also good for relaxing. It has games and media players, and the music player I use is known simply as Juk.
5 new sudo features sysadmins need to know in 2022
When you want to grant administrative access to some of your users while controlling and checking what they do on your systems, you use sudo. However, even with sudo, there are quite a few unseen issues—just think about giving out shell access. Recent sudo releases added features that let you see these issues and even control them. For example, you can turn on more detailed and easier-to-process log messages and log each command executed in a shell session.
If you've been following the Chainguard blog, you might ask yourself: how do I run the open-source sigstore stack on my machine? While sigstore is often deployed using Kubernetes, it is flexible enough to run nearly anywhere: from a Raspberry Pi to an IBM mainframe. This article will demonstrate how
6 Linux metacharacters I love to use on the command line
Early in my Linux journey, I learned how to use the command line. It's what sets Linux apart. I could lose the graphical user interface (GUI), but it was unnecessary to rebuild the machine completely. Many Linux computers run headless, and you can accomplish all the administrative tasks on the command line. It uses many basic commands that all are familiar with—like ls, ls-l, ls-l, cd, pwd, top, and many more. [OS_EMBEDDED_MENU_RIGHT:]
Containers are run in the cloud. That's because container technology allows websites and web apps to spawn fresh copies of themselves as demand increases. They're the reason hundreds of millions of people can use popular sites without those sites buckling under the pressure of global traffic. Containers are a Linux technology, meaning that they rely on code (specifically cgroups and namespaces) unique to the Linux kernel, so when you run a container, you're running Linux.
NMState: A Declarative Networking Configuration Tool
NMState is a declarative network manager for configuring networking on Linux. It’s a library that provides a command-line tool that manages network settings.
Automate HTTPS Certificates with Ansible Roles ft. Let's Encrypt & CloudFlare
In this post we are going to provision HTTPS certificate from Let's Encrypt and use that in our SSL termination program nginx. We are going to use Ansible for this automation.
Batfish Behaviour TL;DR - Impact Analysis and Named References
Today I want to share with you some behaviour that I learnt the other day that you might find helpful when working with Batfish. This behaviour is based upon the following: When working with impact analysis and using layer1 topologies in Batfish. Don't use named references within your reachability questions.