Sunday, September 25, 2022

Deploy Single Node K8s Setup Using K3s In 2 Minutes

Yes, deploying a single node Kubernetes cluster using K3s is easy, fast and hassle free. On top of all these K3s is meant for light weight K8s workloads hence it doesn't need much system resources. Anyone who wishes to learn K8s and practice using kubectl could get the K3s deployed on a VM running with 4 GB and practice. The deployment process of K3s is so simple, it is hardly a matter of running 3/4 commands. The Kubernetes single node cluster would be ready to practice in 2 minutes.

K3s is a Lightweight Certified Kubernetes Distribution from SUSE which is open source. Similarly, there is RKE (Rancher Kubernetes Engine) and RKE2 which are also different flavors by SUSE under the open source umbrella. However, SUSE Rancher is the SUSE's flagship and commercial version which supports management of different K8s clusters which can be onboarded from cloud, on-premises or even deploying new K8s setup on bare metal, cloud, or on-premises environments. We can truly call it as K8s Orchestration. 

Friday, August 26, 2022

Random Linux Troubleshooting Flow-Charts


As we all know Technical Flow Charts are very helpful in troubleshooting. Especially, for anyone who is new or learner these types of flow-charts are ideal to guide them. This logical approach would certainly help anyone to understand and fix issues at the correct layer. Without this logical approach it would be difficult to point to the exact layer of issue otherwise, a non-logical approach may not give good results or would be time consuming. In this blog post, I’ve documented a few such logical flow-charts which help a Linux Infra Admin/Staff in troubleshooting and fixing issues. I’d keep adding such flow charts in future as well. So, keep watching this blog page to get latest updates on this. 

Friday, April 22, 2022

WHAT IS KALI LINUX, IT’S FEATURES, AND WAYS TO INSTALL IT?


The operating system is the critical system software that ensures the smooth operation of the computer. Some operating systems are designed to serve a specific purpose. They provide some unique tools or services to their users that are adequately available, making it a good OS for the purpose.



Friday, April 15, 2022

Lets Audit The Linux System Now!

Yes, the native "audit" is one of the best security features which is generally not used that much now-e-days. Well, if there is another well advanced security feature which does more than audit then it is good. In this blog post I wish to discuss and talk about this feature and how to get the best out of it without investing anything extra. All that is required is good administrative skills and what needs to be audited. Most importantly, this native audit feature could only track the security violations on a Linux box, however, it could not fix/resolve it. It is only an auditing system. Using this native feature one could track down any system events such as change of file attributes or shutdown events etc, and could understand which user has triggered it. Let's see how it works.


Monday, November 29, 2021

Who Has Rebooted The Linux System?

There are many times that we get puzzled with this question "Who has rebooted the system?". Was this triggered by a user or done by some kernel threads? What was the reason why the server was rebooted? Of course, a running system should not be rebooted without a reason, as this incurs downtime and service disruptions. There are many ways to avoid service disruption by setting up High Availability (HA) so that one server down/reboot would not cause any downtime as the application/service would continue to work from another server in this setup. However, in Load Balancer (LB) mode where there are multiple nodes serving the applications and node down would certainly be balanced by other nodes in the LB setup. Let's come back to our main agenda which is to track the system reboot activity. Yes, in this blog post we would talk about this topic and different ways to detect/identify this from a Linux system. 

Monday, June 14, 2021

What or Why DNF?


DNF or Dandified YUM is the next generation version of yum. 


DNF is a software package manager that installs, updates, and removes packages on RPM-based Linux distributions. It automatically computes dependencies and determines the actions required to install packages. DNF also makes it easier to maintain groups of machines, eliminating the need to manually update each one using rpm. Introduced in Fedora 18, it has been the default package manager since Fedora 22. So, in this post I’m not going to discuss the usage of DNF rather on why and advantages of using it. By default, DNF comes pre-installed on RHEL8.x releases. The "yum" command is a symbolic link to the "dnf" binary now.