Background Why Docker has quite an amount of buzz around it today because it makes so many things easy that were difficult with virtual machines. Docker containers makes it easy for Developers, Systems Administrators, Architects, Consultants and others to quickly test a piece of software in a container; much quicker than a virtual machine, and
This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.
Hey, just a quick update. We ran our first Red Hat Enterprise User Group in Michigan back in January. We are working on the agenda for the next meet up in May, and we have a new site, mailing list, and LinkedIn group!
Background I manage the crunchtools lab and the infrastructure for this blog similar to a development data center. I have a rigorous weekly checklist, which includes optionally applying operating system patches as they are available. I do not perform the updates every week because of time constraints, but when I do, I patch all of
Background In my ever evolving lab, it came time to integrate Red Hat Enterprise Linux (RHEV) with Identity, Policy, Audit (IPA).There were a few caveats and searching Google didn’t help, so hopefully this article can save you some time. Integrating the two was fairly straitforward. The biggest challenge was finding a quick and easy way
This presentation walks through some of the software development processes used to develop Shiva, a mass ssh client. The development of Shiva was used as a teaching aid for a class taught at Ohio Linux Fest 2012. Shiva was used to demonstrate concepts such as good command line interface design, testing, configuration design and advanced features of Bash, such as background functions. This presentation and associated class were developed to help systems adminsitrators think more like developers.
Background This weekend I decided to upgrade my home network with a Cisco WRVS4400N wireless router. Like a typical router it can provide standard wireless services WPA2, DHCP, etc, but the this model also provides support for four distinct VLANs and four distinct SSIDs. This has allowed me to create separate networks for work, play,
Background Recently, I discovered how to use the openssl provided CA script to create a certificate authority and self signed certificates. Traditionally, I had ran all fo the commands manually. When using the CA script it is critical to understand the underlying security concepts. Certificate Authority Openssl has infrstructure to create a long lived Certificate
A couple of weeks ago, I heard the owner of our company talking on the phone to a client. In the conversation, he referred to me as a rockstar sysadmin. Thankfully, he wasn’t talking about my singing. I chuckled a bit, but didn’t think too much of it. I mean, it feels good to be
Reading Ted Dziuba’s article Monitoring Theory article, I was reminded of several conventions that I have developed over the years to help with monitoring servers, network devices, software services, batch processes, etc. First, break down your data points into levels so that you can decide how to route them. Second avoid interrupt driven technology like email, it lowers your productivity and prohibits good analysis techniques.