In this article I will try to explain the best practises to follow in the implementation of docker containers running in cluster mode (swarm, kubernetes or something different) or not. I’m very passionate of the docker world because there are a lot of systems and network aspects very interesting to explore, manage and deep inside ..
Docker swarm and kubernetes are the most widespread container orchestrators for running micro services spanned on different nodes of a cluster. They provide high availability, scalability, security and easy management to complex software architectures. The goal is reached from docker swarm using the service concept that is a request to run containers; in kubernetes by different ..
This page contains all security vulnerabilities, updates and bulletins of 2018. 2018 Security Vulnerability Bulletins ozilla Releases Security Update for Thunderbird 25/01/2018 Google Releases Security Update for Chrome 2501/2018 Apple Releases Multiple Security Updates 23/01/2018 Mozilla Releases Security Updates 23/01/2018 Lenovo Releases Security Advisory 19/01/2018 NCSC Releases Security Advisory 18/01/2018 Cisco Releases Security Updates, BIND 17/01/2018 ISC Releases ..
Docker swarm and kubernetes are the most widespread container orchestrators for running micro services spanned on different nodes of a cluster. They provide high availability, scalability, security and easy management to complex software architectures. The goal is reached from docker swarm using the stack concept that is a set of docker services related together; in ..
I’m resuming again with an article on how to put into practice a exploit that has killed so many victims. I’m doing it simply for increasing the sensitivity of system administrators to the importance of upgrading their systems. Thinking that if the system is not reachable from outside is not necessary to update it is ..
In this article I will explain how to set up mariadb database in master slave configuration in order to have a system ready in every time to go live or to use for backup purposes. It’s suggested to run the slave database in read mode in order to avoid misalignment with the master. This means ..
Starting from 1.12 docker version, the cluster swarm functionality has been natively added in docker. Now it’s possible to easy create docker swarm cluster where to start application containers stack. Every stack is a set of services related between them and every service is a docker container running in any node of the cluster. Every ..
Gluster is a distributed and scalable network file system developed in user space by FUSE (Filesystem in user space) to hook itself with VFS layer. It’s permit to scale to several petabytes handling thousands of clients. The gluster volumes are storage unit exportable formed by disk spaces called bricks distributed in different servers. The volumes data can ..
SIngle sign-on protocol is a way to authenticate the users one only time avoiding to reinsert continually username and password for accessing to other services. The process is comfortable from user point of view, secure and scalable for who will manage it. The father of all authentication protocols is the kerberos, standard de facto in ..
High availability and scalability are increasingly demanded requirements for modern applications that can be implemented by a software cluster. The service availability is guaranteed even if one node of the cluster crashs for software or hardware issue. There are different type of cluster depending on the layer where it’s provides its functionality. The goal of this ..