SSL Certificate Purpose flag “Any Purpose”

No comments

Most certificates are issued with a set of purpose which allow to limit certificate usage. If you are planning to use an SSL certificate for encryption, you need to check your certificate purposes extension. Imagine that you are planning to create a web service that use SSL/TLS client authentication. This would be very helpful to […]

Consul Dynamic Infrastructure

No comments

Consul – Dynamic Infrastructure Consul is a distributed service mesh to create dynamic infrastructure and manage service configurations across any runtime platform. The project is hosted at Github under the Mozilla Public License, version 2.0. Consul provides several key features: Service Discover Health Checking Service Segmentation Multi-Datacenter It aims to shift from static infrastructure to […]

Deployment of Ansible AWX on OpenShift Origin

No comments

Deployment of Ansible AWX on OpenShift Origin Red Hat and Ansible are agreed to creating an open-source project around the Ansible Tower codebases which was named Ansible AWX. The AWX source code is available under the Apache License 2.0. This project is hosted at Github. Ansible is an automation technology for the management of IT […]

OpenShift LDAP Integration

No comments

Openshift LDAP Authentication OpenShift container platform provides support LDAPv3. You can integrate your OpenShift Cluster to use LDAP authentication. That will allow users to log in to OpenShift with their LDAP account. But it will be a single point of failure, meaning that if LDAP server become unavailable then all OpenShift platform requires authentication would […]

TCP 3-Way Handshake

No comments

TCP 3-Way Handshake TCP (Transmission Control Protocol)  is a relatively complex protocol standard that defines how to establish and maintain a network conversation to exchange data. TCP works with Internet Protocol (IP) to define how computers send package to each other. TCP is connection-oriented protocols, which means connections must be established before any data is sent. […]

Install and Configure GlusterFS Scalable Distributed File System

No comments

GlusterFS is a distributed file system that can manage disk storage resources from multiple servers into a single global namespace. It is a type of distributed replicated network file-system, fully POSIX compliant and supports storage paradigms such as Block Storage and Object Storage. GlusterFs stores the data on stable Linux file-systems like ext4, xfs. So […]

OpenShift Software Defined Network

No comments

OpenShift Software Defined Network In this post, I will give a brief introduction to OpenShift Software Defined Network (SDN) concept. Basically anyone with OpenShift background might be interested in this post. SDN encompasses several types of technologies like including functional separation, network virtualization and automation which focus on enabling the network control to become directly […]

Centralize and Monitor Application and System Logs

No comments

Centralize and Monitor Application and System Logs It becomes a new challenge for organization to make sense of the millions of log lines. In addition, log management became more critical to monitor system and application performance and security risk. On the other hand, log management may be very time consuming with traditional methods. If you […]

Pulse Secure Client Installation on Linux

No comments

Pulse Secure Client Installation on Linux VPN (Virtual Private Network) is a service that lets you access the restricted area and privately by routing your connection through a VPN server. All VPN solutions provide clients with ability to connect to restricted areas with authentication methods. Pulse Secure is one of the enterprise VPN solution that […]

An Introduction to OpenSSL

1 comment

Imagine that you need to send a message to someone. However, you do not know where he is or what his contact detail is. You just know another man who has his contacts that can send your message to him. Internet was designed in a way like the one describe above. The data passes through […]