After creating your EC2 instance and connecting using PuTTY, this tutorials shows steps on how to run docker and setup a test Apache site using a docker image. This tutorial aims to introduce the basic operation of docker and how to use it on a Linux environment.
Continue reading “Create test Apache site with Docker”Category: DevOps
devops
Essential Docker commands
Docker is the most popular container technology. It is designed to make it easier to create, deploy, and run applications by using containers. Docker behaves similar to a virtual machine hypervisor. But unlike a virtual machine, rather than creating a whole virtual operating system, Docker allows applications to use the same Linux kernel as the system that they’re running on and only requires applications be shipped with things not already running on the host computer. This gives a significant performance boost and reduces the size of the application.
Continue reading “Essential Docker commands”Ansible Part IV: Roles Overview
You may find Ad-hoc mode (from Part II) easy to use on day-to-day tasks such as for quick systems checks or when updating a config file on multiple systems. Stepping up simple ad-hoc commands are Ansible playbooks (from Part III) and Ansible roles which are very powerful ways to utilize Ansible’s features.
Continue reading “Ansible Part IV: Roles Overview”Ansible Part III: Using Playbooks
The Ansible cases we tested so far from Part I and Part II are what we call ad-hoc mode. If you are pretty comfortable on combining these ad-hoc commands and bash scripts, you can do a lot of work for a small amount of time. But Ansible can offer a lot more features. We’ll explore creating Ansible playbooks on this part.
Continue reading “Ansible Part III: Using Playbooks”Ansible Part II: Using Modules
On the first part of this series, you learned how to setup and configure Ansible. Part II explains how Ansible modules work and how you can use Ansible in ad-hoc mode from the command line.
Continue reading “Ansible Part II: Using Modules”Ansible Part I: Installation and Setup
This is the part one of the four part series on the basics of how to use Ansible. There will be a gradual introduction from basic to intermediate examples how to install, setup and use Ansible. As well as the how to create ansible playbooks and roles. Let’s get started with Part One: Installation and Setup.
Continue reading “Ansible Part I: Installation and Setup”How To Tell If Your Linux Server Has Been Compromised
A server being compromised or hacked for the purpose of this guide is an unauthorized person or bot logging into the server in order to use it for their own, usually negative ends. However, the majority of compromised servers are carried out by bots i.e. automated attack programs, in-experienced attackers e.g. “script kiddies”, or dumb criminals. These sorts of attackers will abuse the server for all it’s worth whilst they have access to it and take few precautions to hide what they are doing.
Continue reading “How To Tell If Your Linux Server Has Been Compromised”
17 Things about Security
A list for protecting yourself and others from the most common and easiest-to-pull-off security crimes.
This article does not attempt to make you an information security guru or provide everything needed for those who are special targets. This is a list you can use to secure yourself, your significant other and your non-techie loved ones from the majority of the most-common and easiest-to-pull-off types of crime and cruelty. Continue reading “17 Things about Security”