Need a system administrator but don’t know where to start? Read this guide regarding important characteristics to look for when you are in the market to hire a new colleague.
How do you validate your security measures? You scan all the things.
Here are some tricks for using SSH through a proxy or bastion quickly.
Learn everything you can about everything you can. Here are ten essential skills that you need to learn as a system administrator.
These basics can get you started using NFS to make files accessible to another computer.
Burnout is real. Here are some steps to come back from the depths of it.
If you're going to use SNMP, and you should, take some time to secure it.
If you're thinking about becoming a system administrator or continuing your career as one, you should read this excerpt from one system administrator's experience.
Every sysadmin needs a good troubleshooting strategy, and you can't fix a problem if you cannot identify it. These are my favorite commands to quickly filter through the possibilities of a given problem.
Troubleshooting VLANs is complicated. Here are some techniques to save your sanity.
Learning this lightweight text editing tool can help you navigate faster, inside and outside of the text editor.
Don’t trust your systems just because they’re on your network. Learn specific defense techniques to ensure enhanced security.
Using rootless Podman with NFS requires a bit of extra work, but it can be done!
Telnet is old school, but it's still a handy tool for troubleshooting email and other services.
How do we choose our paths? Or do they choose us? This is the story of my professional journey into the world of system administration.
Still trying to figure out how to use sed? Check out these examples.
These VLAN configuration examples can help you get your Red Hat Enterprise Linux networks set up right.
SSH is easy to use, but when something causes your known_hosts to backfire on you, it can be frustrating. Here's how to fix this problem.
A popular mantra in information security is, "Trust, but verify." Learn how to inspect a web server’s TLS certificate before trusting the site.
In a previous article, I covered Red Hat Ansible basics and installed Ansible, creating one control node named RHEL8 and four managed nodes (node1, node2, node3, and node4), all running Red Hat Enterprise Linux. Now, for Ansible to communicate with a managed node, you need to configure the control node and the managed nodes with a user account, and give that user account privilege escalation to run commands without having to enter a password.