Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

160 total results found

Pods, Replicas, Deployments

Containers & Kubernetes Kubernetes

How YAML is Used in Kubernetes: YAML files are used to define Kubernetes objects such as pods, deployments, services, config maps, secrets, and many others. These objects describe the desired state of your application or infrastructure, and Kubernetes works t...

kubectl MAN Page

Containers & Kubernetes Kubernetes

kubectl The kubectl command is used to interact with and manage a Kubernetes cluster. It allows administrators and developers to deploy applications, inspect resources, manage cluster components, and view logs. Essentially, kubectl acts as the command-line in...

Networking

Containers & Kubernetes Kubernetes

In a K8S cluster, the default networking policy is to assign each pod the same range of IPs, meaning that there's possibility for overlap and conflicts where multiple pods are assigned the same IP address. Because of this, its common practice to make use of a ...

Services & Microservices

Containers & Kubernetes Kubernetes

A Service in Kubernetes is a resource that creates a stable, fixed access point (like an IP or DNS name) for other applications or users to reach a group of pods. Even though the individual pod IPs might change as pods are created or destroyed, the Service ens...

K8S access setup & KUBECONFIG

Containers & Kubernetes Kubernetes

Kubectl setup Install kubectl binary Kubeconfig Setup To access a remote cluster, you'll need to use a kubeconfig file. The kubeconfig file is a YAML file that configures access to a Kubernetes cluster. It stores information such as: Clusters: The Kub...

Secrets & Encryption

Containers & Kubernetes Kubernetes

Secrets Secrets are a Kubernetes object that can be referenced in YAML configurations without having to expose secret information. For example, I can create a secret in K8S which contains a password, and then reference that secret in required YAML files wit...

Kubernetes Cluster Components

Containers & Kubernetes Kubernetes

KUBE-SCHEDULER The scheduler continuously monitors the KUBE-API server for changes to cluster configuration, once a change is made the relevant data in the ETCD store is updated, and the changes are passed to the Kubelet on the relevant nodes. The kube-sch...

PCIe

Hardware Configuration & Performance

Kernel Modules

Boot, Kernel, Recovery, and Tunables

What is a kernel module? A kernel module is essentially a piece of code that can be loaded into the operating system's kernel on demand. Think of it like an extension for the kernel, providing additional functionality without requiring a complete system res...

Kernel Tuneable's

Boot, Kernel, Recovery, and Tunables

Kernel Tunables In Linux, a tunable refers to a specific type of configuration setting within the kernel. These tunables allow you to customize the behavior of the kernel while the system is running, offering more fine-grained control over how your system ope...

initrd (initialisation RAM disk)

Boot, Kernel, Recovery, and Tunables

What are initramfs and initrd? initrd and initramfs are temporary root filesystems loaded into memory during the early Linux boot process. Their purpose is to provide the kernel with the necessary drivers, modules, and scripts needed to initialize hardware ...

Data Manipulation: echo, printf, tr, wc, sort, cut, paste, diff, awk, sed

Bash

echo Built-in Linux feature to print out arguments as standard output. echo {string} printf Similar to echo, but allows for more control over the formatting of output. printf {string} Option Function \n newlineprintf "hello \n how are yo...

GREP

Bash

GREP Grep is used to search file contents for a particular string or pattern. grep [option] {search pattern} {filename} Option Function -i Case insensitive  -v Exclude string 'string|string' OR Statement - used to search for multipl...

Hard & Symbolic Links

Bash

The ln command is used to create links between files. There are two types of links: HardLinks & Symbolic Links ln [options] {target name} [link name] Options Function -backup Back up existing destination files. -f Remove existing destina...

Shell Redirection: >, >>, <, |, 2> and tee Explained

Bash

Methods for redirecting data through the shell, either from/to files or commands. Standard Input - stdinActs as the source for command input. This is usually coming from your mouse or keyboard.Standard Output - stdoutActs as the destination for command output...

Disk Encryption (LUKS)

Hardware Configuration & Performance Disks

On Linux systems, a relatively common practice amongst high-security systems is to use a disk or filesystem-level encryption. LUKS (Linux Unified Key Setup) LUKS is a Linux disk encryption utility. It helps to protect data by encrypting the contents of a d...

iptables

Vulnerabilities, Patching, and Security Firewalls & IPS (Intrusion Prevention S...

iptables iptables is a Linux Firewall utility that's used to configure rules on the kernel netfilter firewall. iptables processes packets based on chains of rules, deciding whether to allow, drop, or manipulate them. iptables does not preserve connection sta...

firewalld

Vulnerabilities, Patching, and Security Firewalls & IPS (Intrusion Prevention S...

firewalld at its core is essentially a wrapper for iptables, but it does include some extra features and improved functionality. With iptables, when you reload a rule, connections can drop. This is a big problem on production servers. Firewalld uses in-plac...

Netfilter & nftables

Vulnerabilities, Patching, and Security Firewalls & IPS (Intrusion Prevention S...

Netfilter (nftables) is an iptables replacement commonly found on modern Debian systems by default.

IPS (Intrusion Prevention Systems)

Vulnerabilities, Patching, and Security Firewalls & IPS (Intrusion Prevention S...

  Fail2Ban Fail2Ban is a an IPS system that can be configured to monitor basically any service with an authentication mechanism. Monitors: Log files for multiple services (SSH, nginx, Apache, etc.) Uses "jails": Config blocks that define patter...