System & Network Admin

System & Network Admin

1904 bookmarks
Custom sorting
Home
Home
·roswell.github.io·
Home
Using Caddy to keep certificates renewed - Wiki - Caddy Community
Using Caddy to keep certificates renewed - Wiki - Caddy Community
You can use Caddy as an automated certificate manager to keep certificates renewed without having to run an HTTPS server [1]. This way, the certificates can be used by other programs that need them. Caddy’s tls app can be configured without the need for an HTTP server. It can keep certificates renewed. Without additional configuration, assets (certificates, keys, and metadata) are stored in a data directory on the local file system at a location dependent upon your OS. The simplest form is to ...
·caddy.community·
Using Caddy to keep certificates renewed - Wiki - Caddy Community
How to Install and Use Neo4j Graph Database on Debian 12
How to Install and Use Neo4j Graph Database on Debian 12
Neo4j is a high-performance graph database management system for graph storage, data science, ML, analytics, and visualization. In this tutorial, wel...
·howtoforge.com·
How to Install and Use Neo4j Graph Database on Debian 12
LocalSend: Share files to nearby devices
LocalSend: Share files to nearby devices
LocalSend is a free, open-source, cross-platform file sharing tool that allows you to share files to nearby devices.
·localsend.org·
LocalSend: Share files to nearby devices
pgDog
pgDog
pgDog - PostgreSQL query router, pooler, load balancer, and proxy.
·pgdog.dev·
pgDog
Vault Audit Logging
Vault Audit Logging
I thought i was done with this series, but there are a few loose ends that I think we can clear up pretty quickly. The most important of which is Audit Logging, because what is the point of a secure secrets tool if you don’t track who does what (or most importantly, fails to do what) with it. Lets jump in! Enabling audit logs Enabling audit logging requires you to tell the vault server that it should use one of the audit “device types” that it offers with the required parameters.
·problemofnetwork.com·
Vault Audit Logging
Cloudflare tunnel for IPv6 only connectivity
Cloudflare tunnel for IPv6 only connectivity
Cloudflare offers a powerful tunneling service that allows for a host on a private network to expose a service but retain protection using cloudflares’ powerful CDN tools. At the time of this post that service is a legacy IP first service, but with one minor tweak it can operate with IPv6-only hosts. Meaning one can provision an IPv6-only host, but provide a dual stacked service. If that sounds powerful, that’s because it is.
·forwardingplane.net·
Cloudflare tunnel for IPv6 only connectivity
Introduction to Linux Operating System
Introduction to Linux Operating System
Linux: From supercomputers to smartphones. Explore the open source OS powering innovation. Discover popular distros like Ubuntu and Fedora. Learn why Linux matters.
·thenewstack.io·
Introduction to Linux Operating System
NATS and Configuration Minions
NATS and Configuration Minions
Introduction Two blogs in one year. Who do I think I am? In all seriousness, thank you for all the feedback on the previous blog. As always, it really means a lot. This one might go a bit sideways, but building something like this has always been on my mind, and I got another spark to get it done while attending AutoCon2. I caught the first half of a talk by Mircea Ulinic from Digitial Ocean.
·juliopdx.com·
NATS and Configuration Minions
It’s IP, Over TOSLINK!
It’s IP, Over TOSLINK!
At the recent 38C3 conference in Germany, someone gave a talk about sending TOSLINK digital audio over fiber optic networks rather than the very low-end short distance fibre you’ll find behin…
·hackaday.com·
It’s IP, Over TOSLINK!
Enabling EVPN termination with Podman pods as systemd units
Enabling EVPN termination with Podman pods as systemd units
Quick Recap Link to heading This is a follow up to my lengthy EVPN series. In my last post I demonstrated how I managed to have EVPN termination inside Kubernetes nodes, hosting FRR inside a regular network-namespaced pod interacting with the host via BGP through veth pairs. Overcoming the limitations Link to heading I also described how running inside a pod is limiting this architecture and prototype to serve the node’s main interface, because of the chicken egg-y issue of needing the underlay network to allow each node to reach the API server, while at the same time the configuration required to establish the underlay must be retrieved from the API server itself.
·fedepaol.github.io·
Enabling EVPN termination with Podman pods as systemd units
Vault TLS With Network Appliances
Vault TLS With Network Appliances
Abstract Now that we have a Vault, with a TLS Issuing CA, and some idea of how to get certs out of it, lets look at how we can use this in a “real” world scenario to put a valid TLS profile onto a Network Appliance (fancy word for a switch I guess). Why did I say appliance, and not Router or Switch? Weeeeeell, think about it. You manage a lot of network stuff over HTTPS protocols these days, even when its not actually a web interface you are using to do it.
·problemofnetwork.com·
Vault TLS With Network Appliances
ntopng - A Web-Based Network Monitoring and Security Tool
ntopng - A Web-Based Network Monitoring and Security Tool
ntopng (short for ntop) is an open-source network traffic monitoring tool that provides a user-friendly web interface to monitor network activity in real-time.
·tecmint.com·
ntopng - A Web-Based Network Monitoring and Security Tool
How to Make Bootable USB from ISO using Linux Terminal
How to Make Bootable USB from ISO using Linux Terminal
Learn how to easily make a bootable usb drive from iso file using linux terminal. Creating bootable usb from CLI is more easy and faster.
·linuxopsys.com·
How to Make Bootable USB from ISO using Linux Terminal
50 Essential Linux Commands for Beginners and SysAdmins
50 Essential Linux Commands for Beginners and SysAdmins
This guide introduces 60 essential Linux commands, providing a foundation for beginners and a pathway to becoming a skilled system administrator.
·tecmint.com·
50 Essential Linux Commands for Beginners and SysAdmins
Thirty Years Later, The Windows 3.1 Video Driver You Needed
Thirty Years Later, The Windows 3.1 Video Driver You Needed
Over the course of the 1990s we saw huge developments in the world of PC graphics cards, going from little more than the original IBM VGA standard through super VGA and then so-called “Window…
·hackaday.com·
Thirty Years Later, The Windows 3.1 Video Driver You Needed
MrChromebox.tech
MrChromebox.tech
MrChromebox.tech website
·docs.mrchromebox.tech·
MrChromebox.tech
Linux: How to Use Cron to Schedule Regular Jobs
Linux: How to Use Cron to Schedule Regular Jobs
With Cron, you can schedule just about any type of job on Linux, such as backing up specific directories to an external drive.
·thenewstack.io·
Linux: How to Use Cron to Schedule Regular Jobs
Building a host telemetry solution using Tailscale
Building a host telemetry solution using Tailscale
An often overlooked dimension of data collection is flow data from hosts. This is not a new concept, there have been tools built for this for a very long time, but in many cases, and especially over the last 8-10 years, many system engineers have gravitated toward tooling like grafana and prometheus. While these are fine tools and if done well provide an excellent view of host health, they aren’t really a full picture of host behavior.
·forwardingplane.net·
Building a host telemetry solution using Tailscale