Torkey (تركي)Fast Track Your Linux Admin Skills with Shell ScriptingIn today’s digital world, Linux remains an undeniably essential operating system, powering everything from supercomputers and servers to…Aug 18, 2023Aug 18, 2023
Torkey (تركي)Why It’s Time to Pivot from Red Hat to Ubuntu and Rocky LinuxOver the past few years, the landscape of enterprise Linux has witnessed notable changes. Once the de facto standard for corporate Linux…Aug 18, 2023Aug 18, 2023
Torkey (تركي)Step-by-Step Guide: Installing Vuls.io and Scanning a Red Hat Target MachineWelcome to our in-depth guide on how to install Vuls.io on an Ubuntu host, fetch Red Hat and Ubuntu vulnerability databases, configure…Jun 18, 2023Jun 18, 2023
Torkey (تركي)Unraveling Functions and Arrays in Shell Scripting: An Insight into Bash ProgrammingAs we delve deeper into the labyrinth of shell scripting, one can’t help but marvel at the power and flexibility that Bash, the de facto…Jun 17, 2023Jun 17, 2023
Torkey (تركي)Understand your AWS ALB logs using AthenaThe devil in details and the details are there in your logs waiting for you to pay attention. The aim of this article is to help you…Feb 26, 2022Feb 26, 2022
Torkey (تركي)A multi master kubernetes on AWS (kubeadm , nginx-ingress and EBS CSI driver)ObjectiveFeb 10, 2020Feb 10, 2020
Torkey (تركي)Deploy Squid proxy on AWS with Packer, Ansible and TerraformSquid ProxyDec 28, 2019Dec 28, 2019
Torkey (تركي)Kubernetes authentication with dex and GitHub -restrict access to namespace for a groupHow do I restrict access to namespace for a user or a group of users? Probably this question came to your mind during your research on how…May 25, 20191May 25, 20191
Torkey (تركي)Analyze your web server access log as a proThe web application is slow, how often do you hear this complaint? to find yourself in a situation where you need to act quickly to figure…May 15, 2019May 15, 2019