ADMIN Preview

Issue 43: Real World AWS

Digital Editions:

Welcome to ADMIN Magazine Preview. This newsletter is a special reminder for all ADMIN Update readers to let you know the latest issue of ADMIN Magazine is making its way to your newsstand. If you have a digital subscription, you can download the latest issue today.

If you don't subscribe to ADMIN magazine, you can still download ADMIN articles on demand. See below for a summary of the articles in the latest issue. And of course, if you're sure you don't want to receive this preview, click the link below to unsubscribe.

Edit your profile and deselect the ADMIN Preview option.

Issue #43 will be shipped to subscribers and available on newsstands starting approximately:

UK/Europe: February 26
North America: March 23
Australia: April 23

Visit our website
Follow us on
Facebook and Twitter

* Google Play Newsstand available in AUS, CA, FR, DE, IT, UK, USA
In this issue:

Welcome: Planned Obsolescence Needs to be Obsolete

I'm sure I'm not the only one holding an $800+ mobile phone that will be obsolete in two years. You know, just in time for the contract to run out. Technology has a very short shelf life. I don't like that aspect of very expensive technology. I have an iPhone 7, but now the iPhone 8 and the iPhone X are both available. There's a lot of pressure to have the latest and greatest model of cell phone, tablet, and computer. Who can afford to upgrade once a year when new models hit the market? (more)

On the DVD: CentOS 7-1708 and Tails 3.5

CentOS describes itself as "… a community-supported distribution derived from sources freely provided to the public by Red Hat for Red Hat Enterprise Linux (RHEL)." Tails is a specialty Live Linux system designed for easy access to the TOR anonymity network. (more)

Tech News: News for Admins

Electron app vulnerability, WordPress sites infected by malware, Torvalds calls Intel's patch garbage, AMT flaw in Intel chips allows attacker to create a backdoor, and first malware for Mac OS in 2018. (more)

Respect It: Google developer advocate Kelsey Hightower shares his thoughts on Kubernetes and the culture of open source

Google developer advocate Kelsey Hightower shares his enthusiasm for open source and the Kubernetes container orchestration project. (more)

Secure Transfer: Efficient password management in distributed teams

Team members often need certain information to authenticate against servers. You don't want to save this secret data in plain text, but you don't want to retype it every time, either. How can you share these secrets? (more)

Work Smart: Open source tools for workgroup collaboration

Want to keep your teams connected even when they are disconnected? RetroShare, SparkleShare, and I2P are free tools that support chat, data sharing, and other collaboration services. (more)

Cloud Config: Real World AWS for Everyone

Sure you've heard about Amazon Web Services, but have you tried it? This article shows how to configure a web server and mirrored back-end database for a small-to-midsized business environment. (more)

Rock On!: NAS with Btrfs-based Rockstor

Set up network-attached storage and manage it from a web interface with Rockstor, the easy-to-install and free Linux distribution that uses the still new Btrfs filesystem. (more)

Operation Pushbutton: Jira, Confluence, and GitLab

Jira, Confluence, and GitLab are very popular DevOps tools and often form the basis for agile work flows. With the right Ansible playbooks, Ubuntu can be turned into an agile work center. (more)

Blueprint: Infrastructure as Code with Terraform

Application releases can take place several times a day. Terraform helps you roll out virtual machines automatically in your data center or in the cloud, and you adapt the manual only when it changes. (more)

Live Cell Therapy: OpenShift by Red Hat continues to evolve

Red Hat continues to improve the OpenShift Kubernetes distribution. (more)

Office Without Chains: LibreOffice in the workplace

How can LibreOffice be used in a corporate environment and what difficulties have to be considered? In particular, you cannot underestimate acceptance by your employees. (more)

Passing Secrets: Automatic data encryption and decryption with Clevis and Tang

Encrypting hard disk partitions during the installation of an operating system is standard procedure. When booting the computer, you then need to enter a matching passphrase to unlock the hard drive. We show you how to automate this process and link it to a policy. (more)

Colorful Mix: Storage Spaces Direct with different storage media

In Windows Server 2016, software-defined storage lets you combine several volumes to create a central storage pool; then, you can use a combination of HDD, SSD, and NVMe SSD storage media to divide the pool into different volumes. (more)

Into the Blue: Connecting Windows Server 2016 with Azure

Microsoft continues to integrate Windows Server with the Azure cloud. With Cloud Witness and the RDS Connection Broker, you can operate distributed environments more reliably and efficiently, and SQL databases migrate sensibly into the cloud. (more)

Smart Collection: Aggregating information with Huginn

Huginn collects information and data from websites and processes and mails it to a user. Huginn also executes predefined actions automatically for certain events; however, setting up the small IFTTT alternative requires some work. (more)

Under a Dark Cloud: Identity Management from the cloud

Offers for identity management as a service (IDaaS) are entering the market and promising simplicity. However, many lack functionality, adaptability, and in-depth integration with existing systems. We look at how IT managers should consider IDaaS in their strategy. (more)

Log Everything: System logging for data-based answers

To be a good HPC system administrator for today's environment, you need to be a lumberjack. (more)

The Lay of the Land: Selecting compilers for a supercomputer

If you compile software on an expensive supercomputer, it's a good idea to select the languages and compilers with particular care. We report on the tried-and-proved tools used on SuperMUC, a supercomputer at the Leibniz Supercomputing Center in Germany. (more)

Docker Audit: Auditing Docker Containers in a DevOps Environment

The handy auditd package can help track down weaknesses in your system before, during, or after an attack. (more)

Container Check: Investigating container security with auditd

The handy auditd package can help track down weaknesses in your system before, during, or after an attack. (more)

Screened: Vulnerability scans for containers

Containers are finding their way into business-critical environments, which is reason enough to think about how to examine the deployed container images for weak points. (more)