Puppet has provided baked-in Nagios support for a long time now. When
combined with Exported Resources, Puppet is well suited to manage an
intelligent Nagios configuration where nodes are automatically
inventoried and monitored. more>>
System administrators at the USENIX LISA 2011
conference (LISA is a great system administration conference, by the way)
in Boston in December got to hear Michael Perrone's
presentation "What Is Watson?"
Do you ever have that moment when someone asks you for a recommendation on a book, and when put on the spot you spin around in your office chair, scan your ever-growing library of books that you bought over the years of IT experience but either:A. Never read? B. Flipped through but never finished? C.Passed out halfway through the first chapter? more>>
A high-availability stack serves one purpose: through a
redundant setup of two or more nodes, ensure service availability and
recover services automatically in case of a problem. Florian Haas
explores Pacemaker, the state-of-the-art high-availability stack on
Directory services is one of the most interesting and crucial
parts of computing today. They provide our account management, basic
authentication, address books and a back-end repository for the
configuration of many other important applications.
Sometimes events and equipment conspire against you and your team to cause
a problem. Occasionally, however, it's lack of understanding or foresight
that can turn around and bite you. Unfortunately, this is a tale of where
we failed to spot all the possible things that might go wrong.
Poorly implemented monitoring systems can drive an administrator
crazy. At best, they are distracting. At worst, they'll keep whoever
is on pager duty up for nights at a time. This article discusses the
best practices for designing systems that will keep your systems up and
stay quiet when nothing is wrong.
"If we see light at the end of the tunnel, it is the light of the oncoming train" ~ Robert Lowell. Oh yes, another good quote. This post is on SSH tunneling, or as I like to call it 'Poor Man's VPN'. Contrary to the sysadmin's popular belief, SSH tunneling actually can be very valuable use for both techies and home users. more>>
iptables is the user-space tool for configuring firewall rules in the
Linux kernel. It is actually a part of the larger netfilter framework.
Perhaps because iptables is the most visible part of the netfilter framework,
the framework is commonly referred to collectively as iptables.
iptables has been the Linux firewall solution since the 2.4 kernel.
Packet capture is one of the most fundamental and powerful ways to
do network analysis. You can learn virtually anything about what is
going on within a network by intercepting and examining the raw data
that crosses it. Modern network analysis tools are able to capture,
interpret and describe this network traffic in a human-friendly manner.
The votes are in, the tallies are counted, the hanging chads have been
evaluated, and we have our winners. This year holds a few surprises,
a couple dominant players and as much open source as you can handle. We
don't encourage gambling here at Linux Journal, but if you had an office
pool going for pizza money, it's officially too late to make your wager.
There comes a time in a network or storage administrator's career
when a large collection of storage volumes needs to be pooled together
and distributed within a clustered or multiple client network, while
maintaining high performance with little to no bottlenecks when accessing
the same files. That is where Lustre comes into the picture. The Lustre more>>
Well here we are again, at part two of the 'Getting Help from Linux' series. In this blog post I'll be talking about using Info to get help from Linux. In my previous post I spoke about how Info came about, but just in case you missed it I'll give you another quick lesson. Gnu more>>
As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.
Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.
In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.