Remove Authentication Remove Linux Remove Network Remove Virtualization
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Ivan Pepelnjak dives deep on DHCP relaying on a Linux host.

Linux 107
article thumbnail

MicroK8s: Up and Running in Azure

Linux Academy

By now you’ve heard the stories that Microsoft loves Linux and fully embraces the open-source world. Windows Subsystem for Linux (WSL). Not to mention, in October of 2018, Microsoft joined the Open Invention Network (OIN) and has opened 60,000 patents to open-source. Contact them via email: linux@microsoft.com.

Linux 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 125

Scott Lowe

Networking. Dinesh Dutt of Cumulus Networks writes about the effect of switch port count in Clos topologies. This blending of “traditional” network engineering with containers, Linux, and DevOps tooling is how Matt is setting new trends and directions for the networking industry. Virtualization.

Linux 60
article thumbnail

Beginner’s Basics of Kubernetes

Linux Academy

You can set up and package everything that you need into an application, and execute that package without the virtual machine overhead that is normally rendered during that process. A pod is a group of containers that are put together as a group on the same node (virtual machine) and are designed specifically for easy communication.

Policies 159
article thumbnail

Joint Cybersecurity Advisory: Watch Out for BlackMatter RaaS

SecureWorld News

Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA) provided information about the techniques BlackMatter is using to hold organization networks for ransom. Go a step further by regularly updating your passwords and enabling multi-factor authentication (MFA).

Backup 78
article thumbnail

Technology Short Take 166

Scott Lowe

Networking Kevin Jin’s post on the APNIC blog about network automation tools is a great read. He discusses Netmiko, NAPALM, and Nornir in some detail, and provides some guidance around which network automation tool may be right for you. Anton Kuliashov writes about why Palark uses Cilium for Kubernetes networking.

IPv6 74
article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

We use templates for network devices, workstations, laptops, and servers so that all of our devices match our security templates. Network Device Configurations. For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. How do we do this kind of monitoring?