Puppet is a cross-platform client-server based application used for configuration management. It handles the software and its configurations on multiple servers. There are two versions available. One is open-source, the other is a commercial version. It works on both Linux and Windows platforms. It uses a declarative approach to automate updates, installations, and other tasks. This feature allows the software to configure those systems using files called manifests. A manifest contains the instructions for a group or type of server(s) being controlled.
Kubectl is a command-line tool for Kubernetes. It allows us to execute Kubernetes operations via the API. We can use Kubectl to deploy apps, check logs as well as manage all the other resources of the cluster.
Kubernetes uses an HTTP-based REST API which is the actual Kubernetes user interface employed to manage it. This means that every Kubernetes operation is represented as an API endpoint and can be carried out based on an HTTP-request sent to the endpoint.
In this article, we will review Kubectl, and outline its installation, configuration, and use.
RAID (or a Redundant Array of Inexpensive Disks) is a way of storing logical data across a medium which is composed of multiple physical hard disk drives blended into one or more logical units or volumes that is used for data redundancy, performance improvement, and reliability.
Ansible is a system of configuration management written in Python programming language which uses a declarative markup language to describe configurations. It’s used for automation of configuration and OS setup. Ansible is often used to manage Linux-nodes, but Windows is also supported. It supports work with devices with Python v2.4 and higher installed through SSH connection. In this article, we are going to review the DevOps tool called Ansible.
Mimikatz is a tool created by the French developer, Benjamin Delpy used to gather credentials and can carry out a range of operations connected with penetration testing. Its creation stems from a noted vulnerability of the Windows system function called WDigest. WDigest is designed to allow larger Windows-based network users to establish credentials in multiple applications on a LAN or WAN. This feature stores authentication credentials in memory and allows for their automatic reuse so users only have to enter their login details once.