Octopus Deploy is an automated deployment and release management tool used by leading continuous delivery teams worldwide. Start your free trial today.
Nowadays you can hear lot about microservices. Spring Boot is an excellent choice for building single microservice but you need to interconnect them somehow. That’s what Spring Cloud tries to solve (among other things) – especially Spring Cloud Netflix. It provides various components e.g. Eureka discovery service together with client side load balancer Ribbon for inter-microservice...
Ghost in the Shell – Part 6 – Learn Shell Scripting
The Ghost in the Shell series were about efficient working in the shell environment but one of the feats of any sysadmin profession is the shell scripting. It is often needed to ‘glue’ …
The Linux extended-attribute mechanism allows the attachment of metadata to
files within a filesystem. It tends to be little used — at least, in the
absence of a security module like SELinux. There is interest in how these
attributes work, though, as evidenced by the discussions that have
followed the posting of revisions of this
patch by Vivek Goyal, which seeks to make a seemingly small change to
the rules regarding extended attributes and special files.
Time Card is the heart of the Open Time Server project. It is an entirely open source board design that can be used with the OCP PTP driver in the Linux kernel to run a computer as a grandmaster clock source with hardware timestamping.
Here’s a little trick I worked out a while back. Along the way I’llintroduce two tools, direnv and Nix, which I’ve found super helpful whendeveloping many di...
Gartner™ quick answer: How can organizations use DNS to improve their security posture
Looking to improve your organization’s security posture? Don’t forget to secure the DNS-layer! Learn how – and why – to invest in DNS-layer security here.
Printing on Linux is easy, but sometimes it feels like a lot of work to launch an application, open a file, find the Print selection in the menu, click a confirmation button, and so on. When you're a Linux terminal user, you often want to perform complex actions with simple triggers. Printing is complex, and there's little as simple as the lpr command.
Monitoring IT assets is an essential task for any IT department. Still, due to the growing number of devices in corporate networks, it is getting more and more challenging to find an approach that is flexible enough to monitor the wide range of available systems properly. It's essential to have a monitoring tool that is flexible, scalable, and easy to use.
In previous articles, I have written about container images and runtimes. In this article, I look at how containers are made possible by a foundation of some special Linux technologies, including namespaces and control groups.
Using Tor to aid various system administration tasks, including checking firewall rules, bypassing internal network restrictions and connecting to remote systems that are behind NAT/CGNAT.
Working with interdependent Postgres functions and materialized views
In Working with Postgres types I showed an example of a materialized view that depends on a typed set-returning function. Because Postgres knows about that dependency, it won’t allow DROP FUN…
If you’ve ever spent ages waiting for an Ansible playbook to get through a bunch of tasks so yours can be tested, then this article is for you. Ansible can be pretty tedious to debug and obsc…
The Linux kernel is turning 30 this year! If you're like us, that's a big deal and we are celebrating Linux this week with a couple of special posts. Today we start with a roundup of responses from around the community answering "What Linux kernel module can you not live without? And, why?" Let's hear what these 10 enthusiasts have to say. I guess some kernel developers will run away screaming when they hear my answer. Still, I list here two of the most controversial modules:
Trend Micro Points Out a Giant Cloud Linux Security Problem - The New Stack
The number one problem, according to the security company's latest report, is organizations using out-of-date, unsupported operating systems and programs.