Artificial Intelligence and automation are rapidly transforming the cybersecurity landscape, bringing new tools and techniques to the forefront of threat detection. These technologies are helping organizations to quickly identify and respond to security threats, reducing the risk of data breaches, and improving the overall security posture. In this article, we will explore the role of AI and automation in cybersecurity and threat detection, and how these technologies are helping organizations stay ahead of the curve in the fight against cybercrime.
Monday, February 27, 2023
Sunday, September 25, 2022
Yes, deploying a single node Kubernetes cluster using K3s is easy, fast and hassle free. On top of all these K3s is meant for light weight K8s workloads hence it doesn't need much system resources. Anyone who wishes to learn K8s and practice using kubectl could get the K3s deployed on a VM running with 4 GB and practice. The deployment process of K3s is so simple, it is hardly a matter of running 3/4 commands. The Kubernetes single node cluster would be ready to practice in 2 minutes.
K3s is a Lightweight Certified Kubernetes Distribution from SUSE which is open source. Similarly, there is RKE (Rancher Kubernetes Engine) and RKE2 which are also different flavors by SUSE under the open source umbrella. However, SUSE Rancher is the SUSE's flagship and commercial version which supports management of different K8s clusters which can be onboarded from cloud, on-premises or even deploying new K8s setup on bare metal, cloud, or on-premises environments. We can truly call it as K8s Orchestration.
Friday, August 26, 2022
As we all know Technical Flow Charts are very helpful in troubleshooting. Especially, for anyone who is new or learner these types of flow-charts are ideal to guide them. This logical approach would certainly help anyone to understand and fix issues at the correct layer. Without this logical approach it would be difficult to point to the exact layer of issue otherwise, a non-logical approach may not give good results or would be time consuming. In this blog post, I’ve documented a few such logical flow-charts which help a Linux Infra Admin/Staff in troubleshooting and fixing issues. I’d keep adding such flow charts in future as well. So, keep watching this blog page to get latest updates on this.
Friday, April 22, 2022
The operating system is the critical system software that ensures the smooth operation of the computer. Some operating systems are designed to serve a specific purpose. They provide some unique tools or services to their users that are adequately available, making it a good OS for the purpose.
Friday, April 15, 2022
Yes, the native "audit" is one of the best security features which is generally not used that much now-e-days. Well, if there is another well advanced security feature which does more than audit then it is good. In this blog post I wish to discuss and talk about this feature and how to get the best out of it without investing anything extra. All that is required is good administrative skills and what needs to be audited. Most importantly, this native audit feature could only track the security violations on a Linux box, however, it could not fix/resolve it. It is only an auditing system. Using this native feature one could track down any system events such as change of file attributes or shutdown events etc, and could understand which user has triggered it. Let's see how it works.
Monday, November 29, 2021
There are many times that we get puzzled with this question "Who has rebooted the system?". Was this triggered by a user or done by some kernel threads? What was the reason why the server was rebooted? Of course, a running system should not be rebooted without a reason, as this incurs downtime and service disruptions. There are many ways to avoid service disruption by setting up High Availability (HA) so that one server down/reboot would not cause any downtime as the application/service would continue to work from another server in this setup. However, in Load Balancer (LB) mode where there are multiple nodes serving the applications and node down would certainly be balanced by other nodes in the LB setup. Let's come back to our main agenda which is to track the system reboot activity. Yes, in this blog post we would talk about this topic and different ways to detect/identify this from a Linux system.