Summary Not everyone wants their server to be managed by SystemD. The reasons why range from being too different to not being a mature enough solution. I don’t mind running it, but if you are one of those individuals that wish not to use it, Ubuntu allows you to boot into Upstart or, if you […]
Summary Another release of Ubuntu means an updated tutorial for installing Apache. Although not much has changed on how the installation and configuration of Apache is done, if you haven’t updated in a while, there are a few major changes you will want to be aware of. One those changes is the introduction of SystemD. […]
Give your developers the ability to make their applications more portable. Learn how to deploy Docker onto a CentOS or Red Hat server.
Overview It’s not difficult to argue that using RSA key pairs rather than passwords is more secure when using SSH. Where it can get complicated is when you’re dealing with infrastructure on different networks, such as having one on your local LAN and another in the cloud. For security or political reasons, you may want […]
Overview Linux can be used as a very capable load balancer for small-to-medium sized organization, or for projects that do not require enterprise level load balancing features – think granular roles and user delegation, and built-in content caching. The following is a list of popular load balancer solutions that can be used on most Linux […]
HAProxy is a great load balancer solution for those who do not need enterprise functionality. In this post I discus how to deploy it on Ubuntu 14 Server.
Microsoft CIFS or SMB, whichever name you prefer to call the protocol, mounting these shares onto a CentOS 7 server or desktop is possible. Not just limited to shares hosted from Microsoft Windows, we can also mount shares from any network device that uses the SMB protocol. This includes just about any NAS device on the market.
Overview Read-only domain controllers are ideal in remote location where system security cannot be guarenteed. They allow the remote site to have local authentication point, without storing vulnerable data about every object in the domain. The only information stored on a read-only domain controller is that of users and computers it has been authorized to […]
As with an increasing number of server roles, domain controllers a great candidates for virtualization. That doesn’t mean you can just simply through your domain controllers onto a virtual platform. There are a few things you must understand before you do your first deployment. Hypervisors have given systems and infrastructure administrators powerful tools to manipulate […]