Rancher connect to existing cluster
One of the challenges with working with plain Kubernetes is the number of low-level management tasks that must be handled using the command line, specifically with the kubectl command. While…
Virtualization, Cloud, DevOps, Reviews
One of the challenges with working with plain Kubernetes is the number of low-level management tasks that must be handled using the command line, specifically with the kubectl command. While…
While Kubernetes has been wildly popular for quite some time now, I think many are just starting their journey of learning Kubernetes and cloud-native technologies. If you are like me,…
If Log4j wasn’t enough, Microsoft has upped the alert on two new Active Directory bugs that now have a PoC tool in the wild. What are the new Active Directory…
One of the new features added in vSphere 7 is the new identity federation component that allows organizations to point vCenter Server to an external identity source for the authentication…
The fallout from the Log4j vulnerability continues to make ripples across organizations at the time of year when the last thing many want to hear about is a major security…
In case you haven’t heard, Apache Log4j is arguably the biggest vulnerability found across the board since Spectre/Meltdown vulnerabilities were disclosed, due to the sheer scope of the vulnerability. It…
Many organizations have long used fibre channel as their preferred storage platform of choice. While iSCSI and other protocols have dominated markets over the past decade or so, fibre channel…
I have been playing around a lot with Pi-hole lately. If you are new to Pi-hole and what it can do, take a look at my blog post here on…
It is always a great feeling when you are able to watch a product or solution that you knew was destined to be great, form, grow, and develop over time…
These days there are threats everywhere you turn when using electronic devices. Most of us are targeted for ads everywhere we go and every device we browse, search or place…