Moving from docker-compose to Podman Pods

It feels like forever since I wrote my RHEL 8 beta intro to podman. In fact, it’s been quite a while, and a lot has happened since then. For some time now I’ve been planning on moving my Digital Ocean droplet, that hosts this and a few other sites, from the Centos 7 Docker platform…


Working from Home – Experts Insights

Note: this article was written collaboratively by a number of fellow Red Hat remote workers. I contributed, but cannot take credit for the article as a whole. You may see this article shared, almost verbatim, elsewhere. Your company has prudentially decided that you should work from home over the next weeks. Or you are staying…


Following up on the Legion Y740

Well it’s been about 3 months since I bought my Lenovo Legion Y740. You can read my first impressions in my “A week with the Lenovo Legion Y740” post. First I want to say that most of my opinions have not changed. I like this machine, and I do not regret the purchase at all….


My Sysadmin Story

Note: This story was originally written for Red Hat’s Enable Sysadmin blog. We’ve all got a story, right?  Our lives could be laid out like a script for a movie, or in the chapters of a novel.  I don’t know if anyone would read mine, but to the right audience, it might sound familiar, or…


What My Family Thinks I Do For a Living

Note: This was originally written for Red Hat’s Enable Sysadmin Blog, https://www.redhat.com/sysadmin The job title “System Administrator” is sometimes vague within the industry.  Some sysadmins are responsible for a wide swath of devices, from desktops, to servers, to printers, to air conditioning units.  So, sometimes when you tell another IT professional that you’re a sysadmin,…


How to Validate Security by Scanning All The Things

Note: This article was originally published on Red Hat’s Enable Sysadmin blog, https://www.redhat.com/sysadmin In parts one and two of this series, I walked you through hardening your system by identifying unneeded services, then segmenting and firewalling.  Now that you’re all locked down, let’s talk about how we might validate that all of that hard work…


Defense in Depth

Note: This was originally posted on Red Hat’s Enable Sysadmin blog. https://www.redhat.com/sysadmin This is the next step in my series on hardening and network security.  Please check out the previous article on Lowering your Attack Surface by Disabling Unnecessary Services. Flat Networks There was a time when all networks were flat.  A flat network is…


A week with the Lenovo Legion y740

I’ve got a few laptops. A Dell Inspiron from around 2015, and a Macbook Pro from around 2014. I’ve been dual-booting the Dell for gaming on Windows, and everything else on Fedora. The Macbook I run as Apple intended, with MacOS, and I use it mainly for video/content editing. Both machines are fine, but starting…


How to Lower Your Attack Surface

Note: This was originally posted on Red Hat’s Enable Sysadmin blog. https://www.redhat.com/sysadmin Linux systems are complicated things.  Out of the box, every distribution includes a number of services meant to help you get things up and running.  Some distributions enable less services by default, some enable more. The difference is in convenience. Some distributions are…


Big changes in my world.

Hi folks, sorry I haven’t been posting much. My work with Enable Sysadmin continues, and I have some new content headed that way, which will eventually trickle down to Undrblog. But, in the meantime, I thought I’d share a little update. For those of you who listen to Iron Sysadmin, or follow me on Twitter,…


Share via
Copy link
Powered by Social Snap