Geek Guides

The DevOps Toolbox: Tools and Technologies for Scale and Reliability

Sponsor: IBM | Topic: DevOps
Author: Linux Journal Editor Bill Childers

When I was growing up, my father always said, "Work smarter, not harder." Now that I'm an adult, I've found that to be a core concept in my career as a DevOps engineer and manager. In order to work smarter, you've got to have good tools and technology in your corner doing a lot of the repetitive work, so you and your team can handle any exceptions that occur. More important, your tools need to have the ability to evolve and grow over time according to the changing needs of your business and organization.

In this eBook, I discuss a few of the most important tools in the DevOps toolbox, the benefits of using them and some examples of each tool. It's important to not consider this a review of each tool, but rather a guide to foster thinking about what's appropriate for your own organization's needs.

Apache Web Servers and SSL Encryption

Sponsor: GeoTrust | Topic: Security
Author: Linux Journal columnist Reuven M. Lerner

Congratulations! You’ve decided to set up a Web site. The site might be for your personal use, for sharing family pictures, for a blog, for an SaaS application, or any number of other possibilities. In all of those cases, people will access your site using the Hypertext Transfer Protocol (HTTP). HTTP has evolved and improved through the years, but one thing about it hasn’t changed—the fact that all of the traffic sent on an HTTP connection is unencrypted.

The bottom line is that whether you want or need to do so, adding HTTPS to a site you’re running isn’t very hard to do. In this Geek Guide, I walk through what SSL/TLS is (and isn’t), how you can create or buy a certificate, how to install that certificate into an Apache server and then how to configure Apache such that a subset of URLs on your system are covered by SSL.

Beyond Cron: How to Know When You've Outgrown Cron Scheduling--and What to Do Next

Sponsor: Skybot | Topic: System Administration
Author: Linux Journal Contributing Editor Mike Diehl

If you've spent any time around UNIX, you've no doubt learned to use and appreciate cron, the ubiquitous job scheduler that comes with almost every version of UNIX that exists. Cron is simple and easy to use, and most important, it just works. It sure beats having to remember to run your backups by hand, for example.

But cron does have its limits. Today's enterprises are larger, more interdependent, and more interconnected than ever before, and cron just hasn't kept up. These days, virtual servers can spring into existence on demand. There are accounting jobs that have to run after billing jobs have completed, but before the backups run. And, there are enterprises that connect Web servers, databases, and file servers. These enterprises may be in one server room, or they may span several data centers.

Build a Private Cloud for Less Than $10,000!

Sponsor: Servers Direct and Seagate | Topic: Cloud
Author: Linux Journal Contributing Editor Mike Diehl

This eBook presents a compelling argument as to why you should consider re-architecting your enterprise toward a private cloud. It outlines some of the design considerations that you need to be aware of before implementing your own private cloud, and it describes using the DevCloud installer in order to install OpenStack on an Ubuntu 14 server. Finally, this eBook will familiarize you with the features and day-to-day operations of an OpenStack-based private cloud architecture.

Enterprise Monitoring Success

Sponsor: InterMapper | Topic: Monitoring
Author: Linux Journal Contributing Editor Mike Diehl

You've all heard the mantra: "better, faster, and cheaper". It seems that a system administrator can't go to a management meeting without hearing it. Thinner profit margins and higher customer expectations require that IT departments up their game. In this eBook, I discuss how enterprise monitoring can help and how to deploy a quality enterprise monitoring system successfully.

Management teams are barraged by industry pundits constantly telling them about the next best thing to do in order to save money on IT costs. There's outsourcing, public cloud, private cloud, virtualization, and any number of mechanisms designed to save money on IT expenses. Whether they actually save money isn't the point; the point is that saving money is always on your manager's mind.

Linux in the Time of Malware

Sponsor: Bit9 + Carbon Black | Topic: Security
Author: Linux Journal author Federico Kereki.

The malware threat landscape is expanding continuously, and in the past 30 years since the appearance of the first virus, the number of security events (and their associated financial losses) has continued to grow at an exponential rate, with millions of such events per month. These numbers support a somewhat fatalistic opinion that says there are only two kinds of systems: those that already have been attacked and those that will be attacked.

Geek Guide cover

Slow Down to Speed Up: Continuous Quality Assurance in a DevOps Environment

Sponsor: New Relic | Topic: DevOps
Author: Linux Journal Editor Bill Childers

DevOps is one of the newest and largest movements in Information Technology in the past few years. The name DevOps is a portmanteau of “Development” and “Operations” and is meant to denote a fusion of these two functions in a company. Whether or not your business actually does combine the two functions, the lessons and tools learned from the DevOps movement and attitude can be applied throughout the entire Information Technology space. This eBook focuses on one of the key attributes of the DevOps movement: Quality Assurance. At any point, you should be able to release your product, code or configuration—so long as you continue keeping your deliverables in a deployable state. This is done by “slowing down” to include a Quality Assurance step at each point in your workflow. The sooner you catch an error or trouble condition and fix it, the faster you can get back on track. This will lower the amount of rework required and keep your team’s momentum going in a forward direction, enabling your group to move on to new projects and challenges.


One Click, Universal Protection Implementing Centralized Security Policies on Linux Systems

Sponsor: Bit9 + Carbon Black | Topic: Security


with Linux Journal's Bill Childers.

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

8 Signs You're Beyond Cron

Sponsor: Skybot | Topic: System Administration
Scheduling Crontabs With an Enterprise Scheduler

Join Linux Journal and Pat Cameron, Director of Automation Technology at HelpSystems, as they discuss the eight primary advantages of moving beyond cron job scheduling. In this webinar, you’ll learn about integrating cron with an enterprise scheduler.

Linux Backup and Recovery Webinar

Sponsor: Storix | Topic: Backup and Recovery

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.


Storix Free 30-day Trial

Sponsor: Storix | Topic: Data Security

Linux data backup and disaster recovery is at the core of what Storix does best. Storix System Backup Administrator (SBAdmin) provides Systems Administrators the peace of mind that mission critical Linux systems can be recovered in their entirety without having to reinstall the operating system. Sign up for a FREE 30-day trial today.

White Papers

Using an Open Source Framework to Catch the Bad Guy

Sponsor: DLT Solutions | Topic: Security

Built-in forensics, incident response, and security with Red Hat Enterprise Linux 6

Every security policy provides guidance and requirements for ensuring adequate protection of information and data, as well as high-level technical and administrative security requirements for a system in a given environment. Traditionally, providing security for a system focuses on the confidentiality of the information on it. However, protecting the data integrity and system and data availability is just as important. For example, when processing United States intelligence information, there are three attributes that require protection: confidentiality, integrity, and availability.

Learn more about catching the bad guy in this free white paper.

Fabric-Based Computing Enables Optimized Hyperscale Data Centers

Sponsor: AMD | Topic: Scalability

Today’s modular x86 servers are compute-centric, designed as a least common denominator to support a wide range of IT workloads. Those generic, virtualized IT workloads have much different resource optimization requirements than hyperscale and cloud applications. They have resulted in a “one size fits all” enterprise IT architecture that is not optimized for a specific set of IT workloads, and especially not emerging hyperscale workloads, such as web applications, big data, and object storage. In this report, you will learn how shifting the focus from traditional compute-centric IT architectures to an innovative disaggregated fabric-based architecture can optimize and scale your data center.

JBoss Enterprise Application Platform for OpenShift Enterprise

Sponsor: DLT Solutions | Topic: Cloud

Red Hat’s® JBoss Enterprise Application Platform for OpenShift Enterprise offering provides IT organizations with a simple and straightforward way to deploy and manage Java applications. This optional OpenShift Enterprise component further extends the developer and manageability benefits inherent in JBoss Enterprise Application Platform for on-premise cloud environments.

Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Sponsor: Red Hat | Topic: Linux Management

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Migrating Middleware Applications Using Red Hat Enterprise Virtualization

Sponsor: Red Hat | Topic: Virtualization

Consolidating older servers to newer Intel® Xeon® processor-based Dell platforms that employ power-saving capabilities and faster processors with more cores can be an excellent strategy for reducing data center costs. However, to realize these cost savings, application owners must limit the retuning and testing costs of porting applications. Consolidating to a virtualized environment that supports virtual machines (VMs) running the original operating system can be an ideal and easy-to-implement solution.

Standardized Operating Environments for I.T. Efficiency

Sponsor: Red Hat | Topic: Dev Ops

The Red Hat® Standard Operating Environment SOE helps you define, deploy, and maintain Red Hat Enterprise Linux® and third-party applications as an SOE. The SOE is fully aligned with your requirements as an effective and managed process, and fully integrated with your IT environment and processes.

V2V Migration to Red Hat Enterprise Virtualization on the Dell PowerEdge R820

Sponsor: Red Hat | Topic: Virtualization

Migration from one virtualized environment to another, called virtual-to-virtual migration (V2V), is a powerful method of reallocating or moving your virtualized workloads to meet business demands. Red Hat Enterprise Virtualization and the Red Hat virt-v2v migration tool make it easy for your existing virtual machines to migrate to the Red Hat Enterprise Virtualization platform. In our labs, we performed a migration of VMs on a legacy server to a Red Hat Enterprise Virtualization environment on a current-generation DellTM PowerEdgeTM R820 to show how straightforward the V2V migration process can be.