Yes, SUSE being one of the top Linux open source software distributors has made a tremendous contribution in the Container Orchestration space with open source Kubernetes on the bottom layer. The story of SUSE's Container Orchestration journey kicked off after its acquisition of Rancher Labs (in the year 2020*) which was one the leading Container Orchestration distributions in the world. As of now, SUSE Rancher is one of the widely used Container Orchestration platforms around the world, The Red Hat OpenShift, VMware Tanzu, Hasicorp Nomad, Docker Swarm, Apache Mesos etc, are some of the other leading Container Orchestration platforms available in market. Lets not forget the Container Orchestration options available from the hyperscalers such as Microsoft's AKS (Azure Kubernetes Service), Google's GKE (Google Kubernetes Engine), AWS Elastic Kubernetes Service (EKS) etc,. which are considered as Managed Container Orchestration Tools.
Monday, February 27, 2023
Artificial Intelligence and automation are rapidly transforming the cybersecurity landscape, bringing new tools and techniques to the forefront of threat detection. These technologies are helping organizations to quickly identify and respond to security threats, reducing the risk of data breaches, and improving the overall security posture. In this article, we will explore the role of AI and automation in cybersecurity and threat detection, and how these technologies are helping organizations stay ahead of the curve in the fight against cybercrime.
Sunday, September 25, 2022
Yes, deploying a single node Kubernetes cluster using K3s is easy, fast and hassle free. On top of all these K3s is meant for light weight K8s workloads hence it doesn't need much system resources. Anyone who wishes to learn K8s and practice using kubectl could get the K3s deployed on a VM running with 4 GB and practice. The deployment process of K3s is so simple, it is hardly a matter of running 3/4 commands. The Kubernetes single node cluster would be ready to practice in 2 minutes.
K3s is a Lightweight Certified Kubernetes Distribution from SUSE which is open source. Similarly, there is RKE (Rancher Kubernetes Engine) and RKE2 which are also different flavors by SUSE under the open source umbrella. However, SUSE Rancher is the SUSE's flagship and commercial version which supports management of different K8s clusters which can be onboarded from cloud, on-premises or even deploying new K8s setup on bare metal, cloud, or on-premises environments. We can truly call it as K8s Orchestration.
Friday, August 26, 2022
As we all know Technical Flow Charts are very helpful in troubleshooting. Especially, for anyone who is new or learner these types of flow-charts are ideal to guide them. This logical approach would certainly help anyone to understand and fix issues at the correct layer. Without this logical approach it would be difficult to point to the exact layer of issue otherwise, a non-logical approach may not give good results or would be time consuming. In this blog post, I’ve documented a few such logical flow-charts which help a Linux Infra Admin/Staff in troubleshooting and fixing issues. I’d keep adding such flow charts in future as well. So, keep watching this blog page to get latest updates on this.
Friday, April 22, 2022
The operating system is the critical system software that ensures the smooth operation of the computer. Some operating systems are designed to serve a specific purpose. They provide some unique tools or services to their users that are adequately available, making it a good OS for the purpose.
Friday, April 15, 2022
Yes, the native "audit" is one of the best security features which is generally not used that much now-e-days. Well, if there is another well advanced security feature which does more than audit then it is good. In this blog post I wish to discuss and talk about this feature and how to get the best out of it without investing anything extra. All that is required is good administrative skills and what needs to be audited. Most importantly, this native audit feature could only track the security violations on a Linux box, however, it could not fix/resolve it. It is only an auditing system. Using this native feature one could track down any system events such as change of file attributes or shutdown events etc, and could understand which user has triggered it. Let's see how it works.