Satish Kumar

Satish Kumar

936 Articles Published

Articles by Satish Kumar

Page 21 of 94

How to Develop Own Custom Linux Distribution From Scratch?

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 1K+ Views

Introduction Linux is an open-source operating system that is widely used by developers, system administrators, and individuals who prefer a non-proprietary operating system. A Linux distribution, often simply called a "distro, " is a customized version of the Linux operating system that includes different software packages and configurations to fit specific needs. There are hundreds of Linux distributions available, ranging from popular ones like Ubuntu and Fedora to specialized ones like Kali Linux for cybersecurity professionals. Planning Your Distribution Identifying your goals and target audience Before starting, it is essential to identify your goals and target audience. What do you ...

Read More

How to Deploy WordPress Instance on Kubernetes?

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 751 Views

Introduction Kubernetes is a powerful, open-source container orchestration system that makes it easy to deploy, scale, and manage containerized applications. It automates the deployment, scaling, and management of containerized applications across multiple hosts. On the other hand, WordPress is the most popular content management system for building websites and blogs. It's free open-source software that allows users to create a website or blog without knowing how to code. Setting up a Kubernetes Cluster An Overview of Setting up a Kubernetes Cluster using Tools like Minikube or Google Kubernetes Engine (GKE) Deploying WordPress on Kubernetes requires setting up a ...

Read More

Standard Access List

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 2K+ Views

Introduction Network security is a top priority for any organization that wants to protect its data and infrastructure from unauthorized access. Cyber threats come in many forms, such as viruses, malware, and hackers, and it's crucial to have a comprehensive security plan in place to mitigate these risks. One key component of an effective security strategy is the use of access control lists (ACLs). In particular, standard access lists are a commonly used tool for filtering traffic on a network. Definition of Standard Access List A standard access list is a type of ACL used ...

Read More

SSH Port Forwarding

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 663 Views

Introduction SSH Port Forwarding is one of the most powerful and versatile features of Secure Shell (SSH). It enables users to securely access remote resources over an encrypted channel by forwarding TCP/IP traffic through a secure tunnel. SSH Port Forwarding, also known as SSH tunneling, is a technique that allows users to create a secure connection between their local computer and a remote server. It enables users to securely access remote resources, such as databases, web pages, or other network services that are not directly accessible from their local computer. Understanding SSH Port Forwarding How SSH ...

Read More

How to Deploy Redis Cluster on Kubernetes?

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 2K+ Views

Introduction Redis is a widely used open-source, in-memory data structure store, used as a database, cache, and message broker. It is designed to handle a large set of data structures with high performance and flexibility. Redis Cluster is a distributed implementation of Redis that provides high availability and scalability through partitioning the dataset across multiple nodes. Prerequisites Understanding of Kubernetes Architecture Before diving into deploying Redis Cluster on Kubernetes, it is crucial to have a basic understanding of Kubernetes architecture. This involves knowing the main components of a Kubernetes cluster, such as nodes, pods, and services. Understanding how these ...

Read More

SSH Meaning in Computer Network

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 1K+ Views

Introduction Computer networks have become an integral part of our lives, connecting us to endless sources of information and facilitating communication around the world. From small businesses to large corporations, computer networks are crucial for organizations to function efficiently and effectively. In today's interconnected world, nearly every aspect of modern life depends on the proper functioning of computer networks. What is SSH? Secure Shell (SSH) is a network protocol that provides secure, encrypted communication between two computers. It is used to access remote devices over a network securely. SSH provides a way to establish an ...

Read More

How to Deploy RedHat Enterprise Virtualization Hypervisor (RHEV-H)

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 393 Views

Introduction RedHat Enterprise Virtualization Hypervisor (RHEV-H) is a virtualization platform that provides an end-to-end, high-performance, and scalable solution to meet the needs of modern data centers. RHEV-H is based on the open-source Kernel-based Virtual Machine (KVM) hypervisor, which allows for hardware-based virtualization, enabling multiple operating systems to run on a single physical machine. With RHEV-H, organizations can create an infrastructure that is easier to manage and more cost-effective. Preparing for Deployment System requirements for RHEV-H deployment Before deploying RedHat Enterprise Virtualization Hypervisor (RHEV-H), it is important to ensure that the system meets the minimum hardware and software requirements. The following ...

Read More

How to Deploy RabbitMQ on Kubernetes?

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 692 Views

Introduction RabbitMQ is a messaging broker that allows different applications to communicate with each other by sending and receiving messages. It provides a reliable and scalable way to handle messaging between systems. On the other hand, Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications. With Kubernetes, you can easily deploy and manage your applications in a cloud-native environment. Preparing for Deployment Setting up a Kubernetes cluster Before deploying RabbitMQ on Kubernetes, it is necessary to set up a Kubernetes cluster. A Kubernetes cluster is made up of one or more ...

Read More

How to Deploy PostgreSQL on Kubernetes?

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 1K+ Views

Introduction PostgreSQL is an open-source relational database management system (RDBMS) known for its robustness, stability, and ability to handle complex and large data sets. On the other hand, Kubernetes is an open-source container orchestration system that automates the deployment, scaling, and management of containerized applications. Combining these two powerful technologies provides a highly scalable and reliable environment for hosting your PostgreSQL database. In this article, we will explore how to deploy PostgreSQL on Kubernetes. We will start by explaining what PostgreSQL and Kubernetes are and the benefits of deploying PostgreSQL on Kubernetes. Then we will go through an overview of ...

Read More

How To Deploy ONLYOFFICE Docs On Angular?

Satish Kumar
Satish Kumar
Updated on 10-Jul-2023 598 Views

Introduction ONLYOFFICE Docs is a powerful self-hosted online office suite that allows users to edit and collaborate on documents. It offers advanced features such as document co-authoring, real-time editing, revision history, and third-party integrations. ONLYOFFICE is an open-source platform that works with different languages and frameworks. Angular, on the other hand, is a popular front-end framework for building web applications. It was developed by Google and provides robust support for building dynamic and scalable applications. With Angular, you can create complex web applications with minimal code. Prerequisites Required Software and Tools First, you will need to have Node.js installed. ...

Read More
Showing 201–210 of 936 articles
« Prev 1 19 20 21 22 23 94 Next »
Advertisements