This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Recently, when building content for one of my upcoming courses, Microsoft Azure Architect Technologies – Exam AZ-300 , I found the Microsoft documentation wasn’t immediately clear on the exclusivity of Storage Account Firewalls, and Service Endpoints. Do I need to use Service Endpoints and the StorageFirewall together?
Hi, I’m Anna, COO of Linux Academy. Anthony is out on some much-needed vacation, but that’s not going to stop us from updating you on everything new in this Linux Academy Monthly Update. CompTIA Linux Plus XK0-004. Configuring Azure Storage for Backups . Securing a Virtual Network with Azure Firewall .
Verplanke believes that DPDK (Data Plane Development Kit) and virtualization are key to virtualizing workloads that move around lots and lots of packets, such as firewalls, routers, and other similar functions. In recent years, we’ve seen more devices running off-the-shelf software (like Linux).
This post by Ranga Maddipudi shows you how to use App Firewall in conjunction with VXLAN logical networks. Via Forbes Guthrie on Twitter, I saw this post on how to setup a CA on Linux and use it in a Windows environment. App Firewall? Venky explains it in this post. Jason Edelman is on a roll with a couple of great blog posts.
I’ve written before about adding an extra layer of network security to your Macintosh by leveraging the BSD-level ipfw firewall, in addition to the standard GUI firewall and additional third-party firewalls (like Little Snitch ). The robust pf firewall should now be running on your OS X Mountain Lion system.
I try to keep the information linked to data center technologies like networking, storage, virtualization, and the like, but occasionally other items slip through. Ranga Maddipudi ( @vCloudNetSec on Twitter) has put together two blog posts on vCloud Networking and Security’s App Firewall ( part 1 and part 2 ). Networking.
It was good to read this post on Cumulus Linux first impressions by Jeremy Stretch. I’m a fan of Cumulus, but I’m admittedly a Linux guy (see here ) so you might say I’m a bit biased. Jeremy is a “hard-core” networking professional, and so hearing his feedback on Cumulus Linux was, in my opinion, useful.
There are, of course, many more announcements from the keynote and Linux Academy will continue to blog throughout the week, but those were a few of the exciting announcements that caught my eye from the keynote. Andy also announced Amazon S3 Access Points , a new service that helps firewall your S3 buckets within private networks.
This November at Linux Academy, we have loads of new content coming your way! To all of our learners who may know someone who wants to learn more about the cloud or Linux, but they have been on the fence about signing up for a free community edition account, then tell them that right now is a great time for them to sign up!
From new courses to new labs, we have a ton of exciting new Google Cloud updates at Linux Academy ( where you can get the most Google Cloud training on this planet! ). Practice what you’re learning by spinning up live environments within Linux Academy! Creating Firewall Rules on a Google Cloud VPC Network.
Plumgrid is one of the primary commercial sponsors behind the IO Visor project , a Linux Foundation project, which leverages the extended Berkeley Packet Filter (eBPF) subsystem in the Linux kernel. StorageOS aims squarely at providing persistent storage for Docker containers, primarily focusing on databases in Docker containers.
Gabriella Gonzalez shares some tricks for jailbreaking hosts behind “secure” enterprise firewalls. Operating Systems/Applications I started using eza on my desktop systems (both macOS and Linux) a while ago, but it’s nice to see it getting more attention. Plausible deniability in storage. Well worth a read.
This post by Ranga Maddipudi shows you how to use App Firewall in conjunction with VXLAN logical networks. Via Forbes Guthrie on Twitter, I saw this post on how to setup a CA on Linux and use it in a Windows environment. App Firewall? Venky explains it in this post. Jason Edelman is on a roll with a couple of great blog posts.
Infrastructure Orchestration abstracts and defines/configures the infrastructure world (I/O, NIC cards, HBA cards, storage connectivity, LANs, switches, etc.). So, not only can you define a virtual server instantly, you can define a *physical* server (maybe a virtual host, or a physical machine) down to I/O, NICs, Storage and Network.
In this post , Jakub Sitnicki digs way deep into the Linux kernel to uncover the answer to the question, “Why are there no entries in the conntrack table for SYN packets dropped by the firewall?” Linux malware is getting more sophisticated. ” Get ready to get nerdy! Servers/Hardware. Aye aye, Popeye!
Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Flatpak is a (relatively) new application packaging/sandboxing mechanism for Linux applications. Who would have thought that one day you’d refer to a Microsoft web site for instructions on configuring something in Linux?
The use of VMware NSX for microsegmentation is a really popular use case, and so the topic of scripting distributed firewall (DFW) rules often comes up. Pradipta Kumar Banerjee has an article on using local storage for instances in OpenStack. Red Hat Enterprise Linux Atomic Host (how’s that for a mouthful?) DVM looks handy.
At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. I knew Microsoft was cozying up to Linux, but I honestly didn’t expect they would port SQL Server to Linux.
Tony Sangha took PowerNSX (a set of PowerShell cmdlets for interacting with NSX) and created a tool to help document the NSX Distributed Firewall configuration. Here’s a walkthrough to install Arch Linux on VirtualBox. Alan Renouf shows you how to retrieve NVMe storage device details using PowerCLI. What’s that? Virtualization.
specifically, the new container network firewall functionality. When I was using Fedora, I needed some useful information on firewall-cmd , and found this article to be helpful. For what it’s worth, I’ve never tried NetBSD, but I have yet to run into any similar issues with any distribution of Linux I’ve tried.
Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Aside from a Windows VM I maintain for the occasional thing I can’t do effectively on Linux or OS X, I haven’t worked with Windows in any significant capacity in quite a while.
Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Aside from a Windows VM I maintain for the occasional thing I can’t do effectively on Linux or OS X, I haven’t worked with Windows in any significant capacity in quite a while.
With over 1300 modules, Ansible simplifies several aspects of IT infrastructure, including web, database, network, cloud, cluster, monitoring, and storage. It effortlessly integrates with any area of the IT infrastructure, be it provisioning virtual machines (VMs) or creating firewall rules.
I highly recommend you read the entire post, but in short the five skills Matt recommends are software skills (which includes configuration management and software development tools like Git ), Linux, deep protocol knowledge, hypervisor and container networking, and IPv6. NixOS seems to be an interesting re-think of a Linux distribution.
In the event you accidentally locked yourself out of vCenter using NSX’s distributed firewall, this post by Roie Ben Haim provides a workaround for getting yourself out of this pickle. This is a highly technical article on scheduling in the Linux kernel , but it’s well worth reading. Cloud Computing/Cloud Management. Virtualization.
A discussion of “statefulness” brought me again to Ivan’s post on the spectrum of firewall statefulness. Chris Evans takes a took at ScaleIO , recently acquired by EMC, and speculates on where ScaleIO fits into the EMC family of products relative to the evolution of storage in the data center.
In this post, I’ve gathered links to posts about networking, virtualization, Docker, containers, Linux, configuration management, and all kinds of other cool stuff. Roie Ben Haim, who works in professional services at VMware, has a deep dive on the NSX distributed firewall (DFW). Welcome to Technology Short Take #53. Networking.
In the event you’re interested in an idea of how much latency the use of in-kernel hypervisor firewalling (such as that offered by VMware NSX) adds, have a look at this article by Sean Howard. Greg Schulz—who normally tends to focus on storage-related topics—has a post providing an overview of the Ubuntu 16.04 “Xenial Xerus” release.
SSH: For Linux / Unix and MacOS systems. PRTG monitors all types of systems, devices and applications in your IT infrastructure: SNMP: Ready to use and with customization options. Windows and WMI performance counters. Flow and Packet analyzer. HTTP requests. Any REST API that returns XML or JSON. Ping, SQL and many more.
Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Here’s a quick post on using Fedora 25 as a hypervisor, leveraging KVM (part of the Linux kernel, as you probably already know) and a tool called Virtual Machine Manager.
So after elevating a previous to it, we could conduct a more extensive recon and on the Jupyter Notebook environment So after conducting more thorough recon on the Jupyter Notebook environment, we found out that the Jupyter Notebook had some local firewall rules restricting network access. Why might that be the case?
The “gotcha” is that these software stacks haven’t been written yet, so the idea of repurposing hardware from switch to firewall to load balancer is still a bit of a unicorn. First, here’s a workaround to the fact that vCA doesn’t (yet) do cloud-init, which makes injecting SSH keys into Linux instances a bit difficult.
This feature is particularly useful in environments where only HTTP traffic is allowed, such as in a web proxy or firewall. The VNC protocol is designed to be platform-independent, meaning that it can be used to access and control computers running on any operating system, including Windows, macOS, Linux, and others.
Dr. Daniel Duffy is head of the NASA Center for Climate Simulation (NCCS, Code 606.2), which provides high performance computing, storage, networking, and data systems designed to meet the specialized needs of the Earth science modeling communities. High Performance Computing Lead, NASA Center for Climate Simulation (NCCS). Eddie Garcia.
Dr. Daniel Duffy is head of the NASA Center for Climate Simulation (NCCS, Code 606.2), which provides high performance computing, storage, networking, and data systems designed to meet the specialized needs of the Earth science modeling communities. High Performance Computing Lead, NASA Center for Climate Simulation (NCCS). Eddie Garcia.
We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. This article provides a good introductory overview of Linux iptables commands for configuring host-based firewall rules on your Linux systems. Cloud Computing/Cloud Management.
What will happen when you combine GPUs and persistent storage? It seems to me that the ever-increasing application of persistent storage technologies in lots of difference places is going to change lots and lots of things. Is the era of the storage admin over ? Marco van Baggum describes his experience in working with NSX 6.2.3
” Ivan Pepelnjak attempts to answer the question, “How much do I need to know about Linux networking?” ” Speaking of Linux networking…Marek Majkowski of Cloudflare digs deep into conntrack , used for stateful firewalling functionality. Servers/Hardware. Programming.
This is kind of cool, and (in my humble opinion) a sign of changing times: Juniper has Vagrant boxes as well as a Vagrant plugin for working with vSRX (virtual firewall) VMs (via this article from Matt Oswalt). Here are some general guidelines for configuring syslog forwarding on a Cisco ASA firewall. Servers/Hardware. Virtualization.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content