What is Infrastructure as Code? (IaC)

Reading Time: 6 minutes

Introduction: What is IaC?

Today we will become acquainted with a concept known as Infrastructure as Code. The idea of Infrastructure as Code is becoming more and more popular today. IaC is a method used to manage and provision a data center via defined machine-readable files instead of physical hardware configuration or other interactive configuration tools. This article will share what it is used for, why it is important, and why businesses strive to utilize this platform to achieve a desired set of results. It is essential to understand that we will consider both the theoretical and practical parts of IaC.

Continue reading “What is Infrastructure as Code? (IaC)”

How to Implement Zero Trust Security in 5 Steps

Reading Time: 6 minutes

What is Zero Trust Security?

Zero Trust security is the concept, methodology, and threat model that assumes no user, system, or service operating within a secured internal environment should be automatically trusted. It put forward that every interaction must be verified when trying to connect to a system before being granted access. This concept uses micro-segmentation, and granular edge controls based on user rights, application access levels, service usage, and relation to the location to determine whether to trust a user, machine, or application seeking to access a specific part of an organization.

Continue reading “How to Implement Zero Trust Security in 5 Steps”

What are Inodes in Linux?

Reading Time: 6 minutes

As you are probably already aware, everything is considered to be a file in Linux. That includes hardware devices, processes, directories, regular files, sockets, links, and so on. Generally, the file system is divided into data blocks and inodes. With that being said, you can think about inodes as a basis of the Linux file system. To explain it more clearly, an Inode is a data structure that stores metadata about every single file on your computer system. 

Continue reading “What are Inodes in Linux?”

How Was My Website Compromised? 

Reading Time: 7 minutes

In this tutorial, we will look at several methods that are used to compromise a website. In today’s world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business. 

Continue reading “How Was My Website Compromised? “

DevOps: A New Perspective on Shared Automation

Reading Time: 9 minutes

What is DevOps?

DevOps is a set of various tools, practices, and ideals that combine software development (Dev) and IT Operations (Ops) into a single unifying force. It allows for better collaboration between developers, operations teams, system administrators, and system engineers. Their streamlined goal is to continually provide a high-value software product to the customer at high speed while monitoring and improving the overall process than using traditional software and infrastructure management. 

Continue reading “DevOps: A New Perspective on Shared Automation”

How to Install and Configure the Kubernetes Dashboard

Reading Time: 5 minutes

The web-based Kubernetes console is an interface that provides information about the state of the Kubernetes cluster. The dashboard is also used for deploying containerized applications as well as for general cluster resource management. Traditionally, kubectl is primarily used in the terminal for nearly all cluster related tasks. Still, it is useful to have a visual representation of our cluster in a user-friendly interface. To install the dashboard, kubectl needs to be installed and running on the server.

Continue reading “How to Install and Configure the Kubernetes Dashboard”

How to Install Kubernetes Using Kubeadm on Ubuntu 18

Reading Time: 11 minutes

What is Kubernetes?

k8s logo

In this article, we review what Kubernetes and Kubeadm are, how to install, create a cluster, and set up worker nodes using Kubeadm. If you are not yet familiar with Kubernetes, we recommend reading our article on the fundamental basics of Kubernetes.

Continue reading “How to Install Kubernetes Using Kubeadm on Ubuntu 18”

How to Install and Configure Chef on Ubuntu 18.04

Reading Time: 10 minutes

Introduction

In this article, we will be reviewing the Chef software, how it works, and why it is useful. We will also explore how it is helpful in DevOps. And then, we will install Chef on Ubuntu 18.04. 

What is Chef? 

31920.chef.logo

Chef is a configuration management system written in Ruby and Erlang using the object-oriented language for configurations description. It is used to ease the task of configuring and maintaining multiple servers. It can be integrated into cloud platforms, such as the new Liquid Web Managed Cloud and VMWare platforms to manage the server’s configuration processes. 

Continue reading “How to Install and Configure Chef on Ubuntu 18.04”

How to Install and Configure Minikube on Ubuntu

Reading Time: 14 minutes

Introduction

This article will demonstrate how to install and configure Minikube to set up a small Kubernetes cluster. We will then examine Kubernetes in more detail to apply that knowledge to a real-world example.

Continue reading “How to Install and Configure Minikube on Ubuntu”

How to Edit Your DNS Hosts File

Reading Time: 9 minutes

One of the most powerful tools available to anyone working on their site during a migration is their computer’s “hosts” file. The hosts file is used to map domain names to IP addresses, and can be used as an alternative to DNS. It also allows you to specify the IP address to which a website resolves on your computer, regardless of what may be published in the site’s DNS zone file.

Continue reading “How to Edit Your DNS Hosts File”