Open in app

Sign In

Write

Sign In

Amet Umerov
Amet Umerov

518 Followers

Home

About

May 24

Managing dynamic DB users with Vault

Learn how to use dynamic credentials with Hashicorp Vault to manage database access easily. This article explores the process of creating and using these credentials in depth. Additionally, we will explore a demo project that simplifies the setup of infrastructure and configuration for testing purposes, allowing us to witness dynamic…

Vault

6 min read

Managing dynamic DB users with Vault
Managing dynamic DB users with Vault
Vault

6 min read


Oct 19, 2022

Planning Out Your Server Hardware

Virtualization has come a long way in recent years. These days it’s not uncommon to deploy a massive amount of virtual servers on top of a physical server cluster. Virtualization makes the management of system resources and data storage systems a breeze, as in cloud VPS. …

Hardware

4 min read

Planning Out Your Server Hardware
Planning Out Your Server Hardware
Hardware

4 min read


Published in

FAUN Publication

·Jun 9, 2022

Quick logging solution in Kubernetes with ECK Operator

In this article, we’ll deploy ECK Operator using helm to the Kubernetes cluster and build a quick-ready solution for logging using Elasticsearch, Kibana, and Filebeat. What is ECK? Built on the Kubernetes Operator pattern, Elastic Cloud on Kubernetes (ECK) extends the basic Kubernetes orchestration capabilities to support the setup and management of Elasticsearch…

Efk

2 min read

Quick logging solution in Kubernetes with ECK Operator
Quick logging solution in Kubernetes with ECK Operator
Efk

2 min read


Published in

FAUN Publication

·May 23, 2022

Using SSH in a secure and convenient way

Today, system engineers and developers have the ability to securely manage a Linux server remotely using the console. For Windows, there are special utilities for connecting to Linux servers via SSH, such as Putty. For macOS and Linux users, we can use the ssh-client package built into the OS. …

Linux

5 min read

Using SSH in a secure and convenient way
Using SSH in a secure and convenient way
Linux

5 min read


Published in

FAUN Publication

·May 6, 2022

Linux Server Monitoring Tools Overview

To ensure the continued operation of the server, it is necessary to develop its support. Server monitoring is an important aspect of server success and is on par with server security and backup access. Monitoring servers in a timely manner allows you to detect and respond to the emergence of…

Monitoring

9 min read

Linux Server Monitoring Tools Overview
Linux Server Monitoring Tools Overview
Monitoring

9 min read


Published in

FAUN Publication

·May 2, 2022

How to send emails so they don’t end up in spam

When setting up our own mail server, we may encounter problems with sent emails being classified as spam. Typically, this can be caused by two reasons: The content of the letter is obviously spammy Incorrectly configured mail server and DNS records We need to be able to write letters correctly…

Email

3 min read

How to send emails so they don’t end up in spam
How to send emails so they don’t end up in spam
Email

3 min read


Published in

FAUN Publication

·Apr 27, 2022

What a beginner should know to become a Linux System Administrator

If you are a beginner and want to know more about Linux System Administrator responsibilities, welcome to this article. Know your distro The system administrator must be well versed in the operating system that he administers. The administrator must understand all the pros and cons of the system used, differences in distributions, interpreters…

Linux

6 min read

What a beginner should know to become a Linux System Administrator
What a beginner should know to become a Linux System Administrator
Linux

6 min read


Published in

FAUN Publication

·Apr 20, 2022

My server has been hacked. What should I do?

This is a story from an ops perspective. Most often, server hacking occurs for several reasons: Vulnerabilities in the used software Misconfigured server configurations Too weak user passwords on the server Human factor (social engineering, keys/tokens leaking, personal motives) Some things could be prevented, for instance, it’s necessary to monitor…

Security

5 min read

My server has been hacked. What should I do?
My server has been hacked. What should I do?
Security

5 min read


Published in

FAUN Publication

·Apr 18, 2022

How can I get my external IP address?

MAC addresses intro We use IP addresses for identifying computers in the network. MAC address is used on the data link level, every MAC address is unique and is set by the manufacturer. …

Linux

3 min read

How can I get my external IP address?
How can I get my external IP address?
Linux

3 min read


Published in

FAUN Publication

·Apr 18, 2022

How to run 32-bit app on 64-bit Linux distros

Today, most of the manufactured processors in one way or another represent a 64-bit architecture. 32-bit processors can address only 232 bits of data, so they couldn’t work with more than 4GB or RAM. But x86–64 processors can handle much more memory. …

Virtualization

4 min read

How to run 32-bit app on 64-bit Linux distros
How to run 32-bit app on 64-bit Linux distros
Virtualization

4 min read

Amet Umerov

Amet Umerov

518 Followers

Site Reliability Engineer — www.linkedin.com/in/amet13/

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams