Category Cloud, Server and Networking
Docker pull image from insecure registry – CoLima + MAC M Chip
Setting Up Podman with Lima on Mac M3
4 Tools to Improve K8s Troubleshooting Experiences
Photo by Annie Spratt on Unsplash Kubernetes is an open-source orchestration tool for containers. It is currently the market leader—any enterprise working with containers is already using Kubernetes or considering using it in the near future. However, helping in automating…
AWS Console – View all resources across the region together
One of the common problems many DevOps admins faced is a consolidated view of resources across all-region in the AWS console. Now Amazon EC2 offers Global View on the console to view resources across regions together, the resources such as…
MySQL Log all queries to file and table
We have run into a situation that we generate queries to MySQL programmatically and some of the queries are not returning the expected result, we have the application logs from there we can get the generated queries, but the query…
Restore MySQL dump in the background
Remote SSH to the Linux servers will get disconnected for multiple reasons, if you have a huge dump of MySQL database and want to restore the database using the MySQL command in the background and should not affect if your…
S3 Bucket Protection for Disaster Recovery
Multiple storage architectures exists, one of them is Object storage., Object Storage aka Object-based storage that manages the data as objects, unlikely to the other architectures like File ( which manages as file hierarchy ) and Block ( which manages…
WhiteSource Bolt for GitHub – Find and Fix Open Source Vulnerability
What is Vulnerability Scanning Vulnerability scanning is the process of inspecting the security weaknesses that exist in the software. With a good vulnerability scanner, you can bring to light the security, licensing, and code quality issues that may affect the…