IP QUERIES addr Display IP Addresses and property information(abbreviation of address)ip addrShow information for all addressesip addr show dev em1Display information only for device em1 link Manage and display the state of all networkinterfacesip linkShow information for all interfacesip link show dev em1Display information only for device em1ip -s linkDisplay interface statistics route Display and ..
SSH jump hosts are employed as an alternative to SSH tunneling to access internal machines through a gateway. The idea is to use ProxyCommand to automatically execute the ssh command on remote host to jump to the next host and forward all traffic through. Contents Prerequisites Configuration Single jump ProxyJump hosts can be defined inside each user’s SSH config file. FILE ~/.ssh/configProxyJump Example### ..
Sometimes you get into a situation where you need to delete all files in a directory or simply cleanup a directory by removing all files except files of a given type (ending with a particular extension). In this article, we will show you how to delete files in a directory except certain file extensions or types using rm, find and globignore commands. ..
Nowadays, more companies move their application to the cloud. Mostly on AWS, GCP or Azure. Using cloud infrastructure reduce their investment in hardware purchase or managing server infrastructure. Despite many benefits of running workload on the cloud, some companies opt to use a multi and/or a hybrid cloud approach. There are several reasons for this, ..
Microservices often communicate with each other to fulfill complex business operations, creating security and scaling challenges. Mutual Transport Layer Security (mTLS) can help. Here’s how to get started. Kubernetes, the de facto orchestration platform for containerized applications, provides a powerful environment for deploying and managing microservices. But as the number of interconnected services grows, the ..
This guide walks you through how to configure strongSwan for integration with Google Cloud VPN. This information is provided as an example only. This guide is not meant to be a comprehensive overview of IPsec and assumes basic familiarity with the IPsec protocol. Environment overview The equipment used in the creation of this guide is as follows: Topology ..
Before you begin Before shrinking a WSL2 virtual disk, you need to ensure that WSL2 is not running. You can check if it’s running with the command ‘wsl.exe –list –verbose‘ in PowerShell: PowerShell PS C:\Users\valorin> wsl.exe –list –verbose NAME STATE VERSION * WLinux Running 2 Debian Stopped 2 Ubuntu-18.04 Stopped 2 kali-linux Stopped 2 It ..
One of the reasons why you may consider setting up a local apt repository server is to minimize the bandwidth required if you have multiple instances of Ubuntu to update. Take for instance a situation where you have 20 or so servers that all need to be updated twice a week. You could save a ..
Traditional storage management I use the phrase traditional storage management to describe the process of partitioning, formatting, and mounting storage capacity from a basic hard disk drive. I contrast this standard partitioning with an alternative method called Logical Volume Manager, or LVM. Storage space is typically managed based on the maximum capacity of individual hard disk drives. ..
Introduction Nginx is a high performance web server that is responsible for handling the load of some of the largest sites on the internet. It is especially good at handling many concurrent connections and excels at serving static content. While many users are aware of Nginx’s capabilities, new users are often confused by some of ..