How to learn tips and tricks

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Learn Tips And Tricks HOWTOs

Listing Linux Services with Systemctl

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Knowing how to list and check the status of running services is essential when debugging system issues. Learn how to list and manage Linux services using the Systemctl utility in this Linuxize tutorial.

RUN PI-HOLE AS A CONTAINER WITH PODMAN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Running Pi-hole is an excellent way to secure devices on your local network against unwanted content. Pi-hole was initially designed to run on a Raspberry Pi, but can be deployed as a container as well. Learn how to run Pi-hole as a container with Podman in this tutorial.

How to switch an old Windows laptop to Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Don’t toss your old Windows laptop — give it a new OS! In the words of security expert Steven Vaughan-Nichols: "Desktop Linux can run on your Windows 7 (and older) laptops and desktops. Machines that would bend and break under the load of Windows 10 will run like a charm. And today’s desktop Linux distributions are as easy to use as Windows or macOS."

How to send Linux application logs to AWS CloudWatch

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

AWS CloudWatch is a useful monitoring service provided by the AWS cloud. It provides default monitoring for server parameters like CPU Utilization, Network In, Network Out, etc. Learn how to send Linux application logs to AWS CloudWatch in this HowtoForge tutorial.

How to Secure Your Kubernetes Cluster

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kubernetes is hot in the DevOps space - mainly due to the open-source platform's portability and scalability. However, misconfigurations are the biggest risk for cloud environments—and Kubernetes is no exception. Learn how to secure Kubernetes clusters in this Container Journal tutorial.