L2TP (which stands for Layer 2 Tunneling Protocol) is a tunneling protocol designed to support virtual private networks (VPN connections) over the Internet.
In this article, you will learn how to quickly and automatically set up your own IPsec/L2TP VPN server in CentOS/RHEL, Ubuntu, and Debian Linux distributions.
Understanding Postgres WAL: What It is and How It Works
Discover the significance of Postgres WAL (Write-Ahead Logging) in maintaining data integrity. Explore their role in robust data backups and crucial WAL configuration concepts.
I’ve started using Alpine Linux as a fun experiment. I use Nix heavily, and I don’t feel like it’s very well documented for Alpine Linux. My experience is that it works extremely well and is a nice way to use normal, glibc packages.
In Linux, learning how to use cd, pushd, popd, and zoxide is essential, and these commands remain widely used by both beginners and system administrators.
Steps to Break Up a Terralith | Masterpoint Consulting
In this follow-up to our "What Is a Terralith?" article, we shift the focus from describing the problem to providing a detailed migration plan, practical …
LoRa Repeater Lasts 5 Years On PVC Pipe And D Cells
Sometimes it makes sense to go with plain old batteries and off-the-shelf PVC pipe. That’s the thinking behind [Bertrand Selva]’s clever LoRaTube project. LoRa is a fantastic solution f…
Using MCP for Safe, Autonomous Kubernetes Troubleshooting
Explainable AI agents can now troubleshoot Kubernetes using governed tools, observability, and human approval, making automation viable in production environments.
Lessons Learned After Trying MeshCore For Off-grid Text Messaging
[Michael Lynch] recently decided to delve into the world of off-grid, decentralized communications with MeshCore, because being able to communicate wirelessly with others in a way that does not dep…
Installation | Lynx - A Fast, Secure and Reliable Terraform Backend, Set up in Minutes.
In this section you'll find basic information about Lynx and how to install it and use it properly. If you're first time user then you should read this section first.
In this blog post, I’ll be going over deploying Wazuh, a Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) tool, along with Nessus, a vulnerability scanner. This builds upon my previous work of setting up a pfSense firewall, Linux server, Docker environment.
As applications grow, the question quickly shifts from what OTel can do to how we can deploy it effectively at scale. In this post, we’ll explore some deployment patterns for the OTel Collector!
Terraform: Best Practices and Cheat Sheet for the Basics
Terraform: Best Practices and Cheat Sheet for the Basics Terraform: Best Practices and Cheat Sheet for the Basics I want to walk through some best practices of Terraform (TF) in here, as well as a …