• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

UnixArena

  • Home
  • Discover DevOps Tools
  • kubernetes
  • DevOps
    • Terraform
    • Jenkins
    • Docker
    • Openshift
      • OKD
    • Ansible engine
    • Ansible Tower
      • AWX
    • Puppet
  • Cloud
    • Azure
    • AWS
    • Openstack
    • Docker
  • VMware
    • vCloud Director
    • VMware-Guests
    • Vcenter Appliance 5.5
    • vC OPS
    • VMware SDDC
    • VMware vSphere 5.x
      • vSphere Network
      • vSphere DS
      • vShield Suite
    • VMware vSphere 6.0
    • VSAN
    • VMware Free Tools
  • DevOps Instructor-led Training
  • Contact

Security

k8s Certs – How to validate private key and TLS certificate?

November 30, 2023 By Cloud_Devops Leave a Comment

validate certificate and Private key

In a Kubernetes cluster, certificates are crucial for securing communication between various components. For example, a Kube API server certificate secures communication between the Kubernetes API server and other components. It is used for authenticating and authorizing API requests. This article will help you to validate your private key and certificate. Sometimes, we would miss […]

Filed Under: DevOps, DevOps Tools, kubernetes, Load Balancer, Security Tagged With: Cloud, DevOps, kubernetes

kubernetes traefik –  Managing TLS Certificates – Part 4

October 18, 2022 By Cloud_Devops Leave a Comment

Kubernetes cluster - TLS - Lets encrypt

How to configure HTTPS for your applications on the Kubernetes cluster? How to manage TLS certificates using traefik? Traefik proxy is a very popular ingress controller in kubernetes environments. It supports both HTTPS (router) and TLS connections. This article explains how to configure TLS connection and obtain TLS certificates dynamically using pebble (Only for the […]

Filed Under: DevOps, Ingress, kubernetes, Microservices, Security, traefik Tagged With: DevOps, Ingress, kubernetes, Security, TLS, traefik

The Importance of Email Encryption for Your Business

June 24, 2022 By Cloud_Devops Leave a Comment

email encryption

Email encryption encrypts data sent and received by the user and data located on endpoints and servers. We know that email is the most commonly used way for businesses to communicate externally with customers and suppliers. Hundreds of millions of emails are sent on a daily basis as we send contracts, invoices, and critical business […]

Filed Under: Backup, Cloud, Microsoft, O365, Security Tagged With: Backup, Cloud, O365, Security

Meltdown and Spectre Vulnerabilities – Big Threats

January 15, 2018 By Cloud_Devops Leave a Comment

meltdown-spectre

Meltdown and Spectre Vulnerabilities have made 80% of servers as Vulnerable in overnight, thanks to  Google Project Zero team and other security researchers who have brought such a worst vulnerabilities to the world (At least now). Meltdown vulnerability basically melts security boundaries which are normally enforced by the hardware (CPU).  Spectre name is based on the root cause, “speculative […]

Filed Under: Oracle Solaris, Redhat-LINUX, Security, Solaris11, Virtualization, VMware, Vulnerabilities Tagged With: AIX, HP-UNIX, Metldown, Solaris, Spectre, UNIX

Find Last Patched date on Oracle Solaris

May 27, 2016 By Cloud_Devops Leave a Comment

Find last patched date

Sometimes, we might need to find the last patched date on Solaris server for PCI compliance requirement. Many organizations are started using the configuration management tools to capture last patched date or maintenance date. But in a legacy environment, we might need to do the reverse engineering to identify last patched date for the server. Let’s […]

Filed Under: Oracle Solaris, Security, Solaris 10, Solaris 11.2, Solaris11 Tagged With: Oracle Solaris, Oracle Solaris 10

Shellshock bug – vulnerability on Bash shell

September 26, 2014 By Cloud_Devops 14 Comments

Millions of computers are using bash shell (command interpreter ). New security flaw has been found on bash(Bash Code Injection Vulnerability (CVE-2014-6271) and it allows attackers  can take the system control remotely. Heartbleed wave was just over on last april (Openssl vulnerability ).Is Shell-shock hurts more than Heartbleed ? Off-course  Yes. Heartbleed was all about sniffing the system […]

Filed Under: Redhat-LINUX, Security, Solaris 10, Solaris 11.2, Solaris11 Tagged With: vulnerability

How to reduce the Security risk in Solaris ? – Generic OS Hardening steps

June 7, 2013 By Cloud_Devops Leave a Comment

Is your Solaris environment is secure enough ? How can we tighten the system security ? Here we will see some basic  Hardening steps for Solaris OS.Every organization should maintain hardening checklists of each operating systems which they are using it.Before server is bringing to operation/production, hardening check list needs to be verified by support […]

Filed Under: Security, Solaris 10

Primary Sidebar

Follow UnixArena

  • Facebook
  • LinkedIn
  • Twitter

Copyright © 2025 · UnixArena ·