Blog

Caption aligned here
It is 2020, and we can say for sure, that ssh-server is still one of the most popular services on Linux systems. During various meetings, I was often asked: How to secure SSH?  Even though this question seems trivial, it is not. There are a lot of things to remember to accomplish well-designed service security. Secure shell is used not only for a remote-shell, per se. Many other technologies depend...
Continue Reading
Developers and non-operation teams often ask us about the plain, simple and common tasks in our daily work. We have decided to write a comprehensive article with frequently asked questions on Docker. We plan to update this article as feedback comes with the next questions. What is Docker? Docker is a container runtime that uses Linux isolation layers such as namespaces, cgroups and capabilities. It may be compared to several...
Continue Reading
More play, less book. Ask about DevOps way of automation, Ansible will pop up, sure thing. It has its bright sides, and ones that aren’t as bright, but that’s not what we’re touching today – In this article, I will try to explain the principles of Ansible role building, that you can easily introduce in practice, to build elegant, elastic, easy to use and troubleshoot code. A real joy to...
Continue Reading
How to build a secure Docker image? The biggest goal of this article, is to be a comprehensive guide on building and delivering secure and safe container images. Having that said, we try to focus on build-time. We will not cover registry, orchestrator and runtime protection in this write-up. All of these are so broad, that they deserve a completely different article. Compliance, standards and order are the keys to...
Continue Reading

GDPR