Showing headlines posted by enable_sysadmin

( 1 2 3 4 5 ... 6 ) Next »

How to identify a strong sysadmin job applicant

Need a system administrator but don’t know where to start? Read this guide regarding important characteristics to look for when you are in the market to hire a new colleague.

How to validate your security measures

How do you validate your security measures? You scan all the things.

SSH to remote hosts though a proxy or bastion with ProxyJump

Here are some tricks for using SSH through a proxy or bastion quickly.

10 skills every Linux system administrator should have

Learn everything you can about everything you can. Here are ten essential skills that you need to learn as a system administrator.

Getting started with NFS

These basics can get you started using NFS to make files accessible to another computer.

IT burnout: A personal story

Burnout is real. Here are some steps to come back from the depths of it.

Securing SNMP

If you're going to use SNMP, and you should, take some time to secure it.

Life as a Linux system administrator

If you're thinking about becoming a system administrator or continuing your career as one, you should read this excerpt from one system administrator's experience.

My go-to Linux network troubleshooting commands

Every sysadmin needs a good troubleshooting strategy, and you can't fix a problem if you cannot identify it. These are my favorite commands to quickly filter through the possibilities of a given problem.

A sysadmins guide to troubleshooting VLAN

Troubleshooting VLANs is complicated. Here are some techniques to save your sanity.

A beginner’s guide to text editing with Emacs

Learning this lightweight text editing tool can help you navigate faster, inside and outside of the text editor.

An introduction to network defense basics

Don’t trust your systems just because they’re on your network. Learn specific defense techniques to ensure enhanced security.

Rootless Podman and NFS

Using rootless Podman with NFS requires a bit of extra work, but it can be done!

Using Telnet to troubleshoot your mail system

Telnet is old school, but it's still a handy tool for troubleshooting email and other services.

A Sysadmins tale: How I moved from the ocean depths to Red Hat Tower

How do we choose our paths? Or do they choose us? This is the story of my professional journey into the world of system administration.

Manipulating text at the command line with sed

Still trying to figure out how to use sed? Check out these examples.

How to configure a VLAN in Linux

These VLAN configuration examples can help you get your Red Hat Enterprise Linux networks set up right.

Linux sysadmin basics: Troubleshooting known_hosts failures

SSH is easy to use, but when something causes your known_hosts to backfire on you, it can be frustrating. Here's how to fix this problem.

Who signed my cert?

A popular mantra in information security is, "Trust, but verify." Learn how to inspect a web server’s TLS certificate before trusting the site.

Configuring Ansible

In a previous article, I covered Red Hat Ansible basics and installed Ansible, creating one control node named RHEL8 and four managed nodes (node1, node2, node3, and node4), all running Red Hat Enterprise Linux. Now, for Ansible to communicate with a managed node, you need to configure the control node and the managed nodes with a user account, and give that user account privilege escalation to run commands without having to enter a password.

( 1 2 3 4 5 ... 6 ) Next »