Looks like my blog posts are like Sherlock TV Show episodes, posting once in a while..anyways I’m back now. As you might aware GitHub recently launched GitHub Actions which people can automate workflows like build, test, deploy code from GitHub.
Welcome to the final part of “Kubernetes-The Hard Way With Docker & Flannel” series. In part-1, we discussed about our cluster architecture, provisioned compute resources, generate certificates and kubeconfig. In previous post, we have bootstrapped controller nodes.
Welcome back to “Kubernetes-The Hard Way With Docker & Flannel” series part 2. In previous post we have provised compute resource, generated certificates and kubeconfig files. In this post, we will install/configure controller nodes
Hello alle zusammen, after a long time I’m writing this blog and I come with an interesting and long post
As we all know enabling HTTPS to endpoints/websites is essential now a days. When it comes to Kubernetes, when we expose service as
LoadBalancer, cloud provider doesn’t provide HTTPS mechanism for the enpoint by default.
*A blog post that I’m actively collecting “Linux pseudo files info, cheat sheets and tips”
Wireshark is a really great tool for analyzing traffic, whether it could be live traffic on interface or
.cap file. The tool enables different types filtering on packets like follow stream, filer by protocol and IP, etc
Long back before I worked on Openshift which is really a great container platform tool from Redhat. But installation is not simple as Kubernetes(relatively). One of the prerequisite for the cluster deployment is Open vSwitch.
Ok, getting metrics(CPU, Memory & Network) from Windows OS is completely different from Linux. In Linux, people can easily develop scripts to get system metrics by simply reading /proc pesudo files. In fact there are so many open source tools to do this in Linux, like tcollector which is my favourite.
1. Install Packages
- Check system is capable of running KVM:
We think if we connect to a website over HTTPS is secure which is true(not true sometimes!), but what about DNS queries that you(browser) sent?
A Wi-Fi deauthentication attack is a type of denial-of-service attack that targets communication between a user and a Wi-Fi wireless access point.
GNU Screen is a terminal multiplexer, a software application that can be used to multiplex several virtual consoles, allowing a user to access multiple separate login sessions inside a single terminal window, or detach and reattach sessions from a terminal. It is useful for dealing with multiple programs from a command line interface, and for separating programs from the session of the Unix shell that started the program, particularly so a remote process continues running even when the user is disconnected. more
“MAC Address Scrambling“- By name itself we can understand, instead of using burned-in address, the machines uses random MAC address. The machine/device changes MAC address regularly to improve security. MAC address is 48 bit hexadecimal digit which is burned in every electronic device has capability of “connectivity” such as mobile devices, smart TV, PC, etc. “Apple” added this feature to iPhones from iOS8 to protect user’s privacy.