Introduction Kubernetes has become a standard for deploying large applications. It helps developers gain significant advantages and offers features that are not available in traditional server hosting. Kubernetes allows horizontal scaling without the hassle of infrastructure. Furthermore, it reduces the cost of acquiring and maintaining the infrastructure as the application grows. However, managing applications on Kubernetes can also be complex …
Using GitLab for Managing Projects
Introduction GitLab offers a very convenient way to work with remote repositories on centralized servers. Anyone coming from GitHub or any other tool might consider that there are many other tools offering this service. However, use cases differ from team to team. GitLab’s main advantage is that you get complete control over your repositories and setting permissions. In this tutorial, …
Generating SSH Key Pairs with PuTTY to Connect to a VPS
Security is a prime consideration for server admins, especially when there is a need to access servers remotely at regular intervals. Protection from cyber-attacks is of crucial importance to streamline workflows and to ensure business continuity. The standard practice of using a username and password is highly insecure, unsafe, and ineffective. You need a robust and advanced method like SSH …
How to Build Robust Security Measures to Protect Your Servers
Introduction When working on cloud infrastructure, your primary concern is making sure your applications are fully operational. One important inclusion of your setup and deployment process is to build effective, thorough, and robust security measures into your apps or systems before they are offered to the public. Instead of retroactively implementing security measures post-deployment, it is important to ensure that …
Configuring Your Linux Server to Use SSH Key-Based Authentication
SSH on a Linux Server SSH, also known as secure shell, is a protocol that can be used to connect and communicate with a server. You can connect to your Linux server for a terminal session using this encrypted protocol. If you are using an OpenSSH server, there are primarily two different ways you can go about the authentication process. …
How To Use SSH to Connect to a Remote Server in Ubuntu
What is SSH? SSH means Secure Shell. With SSH you can access remote machines in a secure way since the connection is encrypted. With the ssh command from the Linux terminal, we can connect to remote Linux servers and work as if it were our computer. At the end of this tutorial, you should have a full understanding of how …
Automatically Inject SSH Keys into your Cloud Servers Using This Simple Bash Script
You can use bash to automate many things for your cloud servers. At CloudSigma we use bash scripts with many of our library images to automate useful features. In this post we share with you how you can use bash to import SSH keys automatically on boot-up of your cloud servers. You can achieve this by combining bash scripts with …