Remove Linux Remove Load Balancer Remove Resources Remove Security
article thumbnail

Creating a Talos Linux Cluster on Azure with Pulumi

Scott Lowe

A little over a month ago I published a post on creating a Talos Linux cluster on AWS with Pulumi. Talos Linux is a re-thinking of your typical Linux distribution, custom-built for running Kubernetes. Talos Linux has no SSH access, no shell, and no console; instead, everything is managed via a gRPC API.

Linux 74
article thumbnail

Creating a Talos Linux Cluster on AWS with Pulumi

Scott Lowe

Talos Linux is a Linux distribution purpose-built for running Kubernetes. The Talos web site describes Talos Linux as “secure, immutable, and minimal.” In this post, I’ll share how to use Pulumi to automate the creation of a Talos Linux cluster on AWS.

Linux 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

In the fast-evolving world of finance, data security is of paramount importance. The Payment Card Industry Data Security Standard (PCI DSS) is a crucial framework to which financial institutions must adhere. The Payment Card Industry Data Security Standard (PCI DSS) is a crucial framework to which financial institutions must adhere.

Financial 104
article thumbnail

Technology Short Take 144

Scott Lowe

I have a fairly diverse set of links for readers this time around, covering topics from microchips to improving your writing, with stops along the way in topics like Kubernetes, virtualization, Linux, and the popular JSON-parsing tool jq. Michael Kashin shares the journey of containerizing NVIDIA Cumulus Linux. Networking. So useful.).

Linux 90
article thumbnail

Technology Short Take 151

Scott Lowe

Aidan Steele examines how VPC sharing could potentially improve security and reduce cost. Nick Schmidt talks about using GitOps with the NSX Advanced Load Balancer. Orca Security discusses the “Superglue” vulnerability in AWS Glue. Sander Rodenhuis wrote an article on security policies in Kubernetes.

article thumbnail

Technology Short Take 153

Scott Lowe

Arthur Chiao’s post on cracking kube-proxy is also an excellent resource—in fact, there’s so much information packed in there you may need to read it more than once. Although Linux is often considered to be superior to Windows and macOS with regard to security, it is not without its own security flaws.

Linux 74
article thumbnail

Azure Training Courses | New January Releases

Linux Academy

Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications. Learn how to create, configure, and manage resources in the Azure cloud, including but not limited to: Managing Azure subscriptions. Configuring resource policies and alerts. Identity and security. with Chad Crowell.

Course 80