This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Open source and Linux platform vendor SUSE is looking to help organizations solve some of the complexity and challenges of edge computing with the company’s SUSE Edge 3.1 SUSE Edge integrates SUSE Linux Micro, which is an optimized Linux distribution for smaller deployments based on the company’s flagship SUSE Linux Enterprise (SLE).
The technology is based on the open-source Kuadrant project, which combines traffic routing, security controls, and policy management capabilities that organizations typically handle through separate tools. A key goal with Red Hat Connectivity Link is to make it easier for organizations to set up, manage and monitor cloud-native connectivity.
With OpenShift 4.18, Red Hat is integrating a series of enhanced networking capabilities, virtualization features, and improved security mechanisms for container and VM environments. This is particularly useful for integration with third-party loadbalancers needing direct access to backend OpenShift pods or VMs, she said.
This latest version introduces substantial improvements to networking capabilities, security features and management tools. StarlingX is a fully-integrated cloud infrastructure platform, which includes core building blocks such as the Linux kernel, Kubernetes and OpenStack, along with other open-source components.
Talos Linux is a Linux distribution purpose-built for running Kubernetes. The Talos web site describes Talos Linux as “secure, immutable, and minimal.” In this post, I’ll share how to use Pulumi to automate the creation of a Talos Linux cluster on AWS.
A little over a month ago I published a post on creating a Talos Linux cluster on AWS with Pulumi. Talos Linux is a re-thinking of your typical Linux distribution, custom-built for running Kubernetes. Talos Linux has no SSH access, no shell, and no console; instead, everything is managed via a gRPC API.
“My favorite parts about Linux Academy are the practical lab sessions and access to playground servers, this is just next level.” Creating and configuring Secure AWS RDS Instances with a Reader and Backup Solution. Setting Up an Application LoadBalancer with an Auto Scaling Group and Route 53 in AWS.
This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Think Linux doesn’t have malware?
We must approve and deploy in an environment with significant cultural, regulatory and security guardrails. Each cloud computing provider has “opinionated” ways of handling things such as loadbalancing, elastic scaling, service discovery, data access, and security to name just a few.
It’s embedded in the applications we use every day and the security model overall is pretty airtight. Using Azure for both data and gen AI means both Copilot and any applications organizations build themselves inherit the security, permissions, and data access already in place. That’s risky.” That’s an industry-wide problem.
This week, we’re talking all about serverless computing, what it is, why it’s relevant, and the release of a free course that can be enjoyed by everyone on the Linux Academy platform, including Community Edition account members. Configure auto-scaling with loadbalancers. Serverless Computing: What is it? Now h old up.
This is a liveblog of the DockerCon 2017 Black Belt session led by Thomas Graf on Cilium , a new startup that focuses on using eBPF and XDP for network and application security. Graf starts by talking about how BPF (specifically, extended BPF or eBPF) can be used to rethink how the Linux kernel handles network traffic. What is XDP?
I have a fairly diverse set of links for readers this time around, covering topics from microchips to improving your writing, with stops along the way in topics like Kubernetes, virtualization, Linux, and the popular JSON-parsing tool jq. Michael Kashin shares the journey of containerizing NVIDIA Cumulus Linux. Networking. So useful.).
Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications. Securing Storage with Access Keys and Shared Access Signatures in Microsoft Azure. Identity and security. Azure Storage Accounts: Configuration and Security. Create a LoadBalanced VM Scale Set in Azure.
Aidan Steele examines how VPC sharing could potentially improve security and reduce cost. Nick Schmidt talks about using GitOps with the NSX Advanced LoadBalancer. Orca Security discusses the “Superglue” vulnerability in AWS Glue. Sander Rodenhuis wrote an article on security policies in Kubernetes.
Improved security. Great news for all of our Linux Academy students; Red Hat Enterprise is already available to try out in Linux Academy’s Cloud Playground! We have more information on t he release in general and all the new features in our podcast Linux Action News and episode 105. Application streams. New Content.
These articles are a bit long in the tooth, but CSS Corp has a useful series of articles on bundling various Linux distributions for use with OpenStack: bundling CentOS , bundling CentOS with VNC , bundling Debian , and bundling OpenSUSE. Feel free to share something in the comments! Cloud Computing/Cloud Management.
Only a true geek would be interested in this, but here’s some information on running OpenBSD in KVM on Linux. Given my past interest in OpenBSD and my present interest in KVM on Linux, this might be something I’ll be trying myself soon. There’s a lot to digest there (for me, anyway, there is a lot to digest).
Here’s a handy list of deprecated Linux network commands and their replacements. Konstantin Ryabitsev has a series going on securing a SysAdmin Linux workstation. Part 1 covers how to choose a Linux distribution, and part 2 discusses some security tips for installing Linux on your SysAdmin workstation.
Xavier Avrillier walks readers through using Antrea (a Kubernetes CNI built on top of Open vSwitch—a topic I’ve touched on a time or two) to provide on-premise loadbalancing in Kubernetes. Matt Oswalt takes readers though a fairly in-depth look at sockets and address binds in Linux. Servers/Hardware.
Domain 2: Security . Define AWS Cloud security and compliance concepts. Identify resources for security support . The basic security and compliance aspects of the AWS platform and the shared security model. IAM, Trusted Advisor – security, why it’s important, differences between users /groups/roles.
OpsWorks promotes conventions and sane defaults, such as template security groups, but also supports the ability to customize any aspect of an applicationâ??s You can deploy your application in the configuration you choose on Amazon Linux and Ubuntu. Operational Control â?? s configuration.
The rise of the disaggregated network operating system (NOS) marches on: this time, it’s Big Switch Networks announcing expanded hardware support in Open Network Linux (ONL) , upon which its own NOS is based. I use OTR with Adium on OS X, and OTR with Pidgin on my Fedora Linux laptop.). Servers/Hardware.
NFV is intended to address the problem caused by having to route/direct traffic from various sources through physical appliances designed to provide services like content filtering, security, content delivery/acceleration, and loadbalancing. In this case, it sounds like Wind River’s customers are OEMs/ODMs, not end users.
I have a fairly diverse set of links for readers this time around, covering topics from microchips to improving your writing, with stops along the way in topics like Kubernetes, virtualization, Linux, and the popular JSON-parsing tool jq along the way. Michael Kashin shares the journey of containerizing NVIDIA Cumulus Linux.
Romain Decker has an “under the hood” look at the VMware NSX loadbalancer. This graphical summary of the AWS Application LoadBalancer (ALB) is pretty handy. Abdullah Abdullah shares some thoughts on design decisions regarding NSX VXLAN control plane replication modes. Servers/Hardware.
Golub gives a “shout out” to the technologies underpinning modern Linux containers (namespaces, cgroups, etc., Built-in routing mesh: Swarm-wide overlay networking offering container-native loadbalancing (using IPVS), DNS-based service discovery with no separate cluster to setup or manage and interoperability with existing loadbalancers.
Via Ivan Pepelnjak, I was pointed to Jon Langemak’s in-depth discussion of working with Linux VRFs. The first is a post on Cilium and F5 loadbalancer integration , while the second discusses implementing Kubernetes network policies with Cilium and Linkerd. Networking.
The “TL;DR” for those who are interested is that this solution bypasses the normal iptables layer involved in most Kubernetes implementations to loadbalance traffic directly to Pods in the cluster. Daniel Sagi of Aqua Security explains the mechanics behind a Pod escape using file system mounts. Servers/Hardware.
Vincent Bernat has a really in-depth article on IPv4 route lookup on Linux (and one on IPv6 route lookup as well). Chris Binnie walks you through the process of using user namespaces to help secure your Docker hosts and containers. John Kozej walks through how to configure vCenter HA using the NSX loadbalancer.
Scott McCarty explains sVirt and how it’s used to isolate Linux containers. Andrew Martin has a write-up with security recommendations for your Kubernetes clusters. Check out these articles talking about IPVS-based in-cluster loadbalancing , CoreDNS , dynamic kubelet configuration , and resizing persistent volumes in Kubernetes.
Russell Bryant has a couple great articles on OVN— how to test OVN’s “EZ Bake” release with DevStack as well as an article on implementing OpenStack security groups using OVN ACLs (which in turn leverage the integration between Open vSwitch and the Linux kernel’s conntrack module). More on Clair from TechCrunch here.).
If you’d like to play around with Cumulus Linux but don’t have a compatible hardware switch, Cumulus VX is the answer. This article listing 20 Linux server hardening tips contains some basic tips but is nevertheless a very good resource for someone looking for Linuxsecurity recommendations. Virtualization.
This method may be a bit more complicated, but naturally offers a bit more security. OS X provides an SSH agent by default, but on Linux systems you will probably have to manually run an SSH agent and add the appropriate SSH key: eval `ssh-agent -s` ssh-add ~/.ssh/keyfile.pem. Linux CLI Docker OSS' Tunneling Through SSH.
Additionally, Docker is working to improve the security of Docker Hub (this is probably a reflection of the recent study pointing out the number of images that have security flaws) through a variety of mechanisms. Decrease time for security review. On-premise registry. Networking. Directory integration. million downloads).
The “gotcha” is that these software stacks haven’t been written yet, so the idea of repurposing hardware from switch to firewall to loadbalancer is still a bit of a unicorn. Here’s a nice article on a multi-action security workflow built using VMware NSX, vShield Endpoint, and vCenter Orchestrator. Servers/Hardware.
Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Hammond: As a security researcher, I am hierarchically in their Threat OPs department. What’s a good entry point for starting CTFs or information security for that matter? Vamosi: Wait.
Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Hammond: As a security researcher, I am hierarchically in their Threat OPs department. What’s a good entry point for starting CTFs or information security for that matter? Vamosi: Wait.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content