Author: yatharth45

How to encrypt and decrypt files using GPG

Reading Time: 3 minutes In Linux, you keep your data in form of files. But what if the data you are storing is sensitive. How can you protect that from unauthorized access? One of the ways is encrypting the files using GPG. In this blog, I’ll tell you what GPG is and how you can use it to encrypt and decrypt files in the Linux system. What are GPG Continue Reading

Understanding Swap Space in Linux: A Practical Guide

Reading Time: 4 minutes If you are a Linux user, then you have definitely heard about Linux Swap. But the reason you may be here is that either you may not know what exactly it is or how to use it. In this blog, I’ll be covering the concept of swap space and some of its practical implementations. So, let’s start. What is Swap Space? You probably know that Continue Reading

Understanding Containerization and its implementation by Docker

Reading Time: 4 minutes Containerization is a famous practice that is being implemented in most of the application. Industries are moving to deploy the application in form of containers rather than with the traditional on-premise method. In this blog, we’ll understand the benefits that containerization provides to Developers as well as DevOps. Let’s begin with the journey What is Containerization? This is one of the most popular concepts being Continue Reading

Understanding Infrastructure as Code (IaC) using Terraform: A QuickStart

Reading Time: 4 minutes As a DevOps Engineer, there might be a requirement of creating Infrastructure over various Cloud Providers including AWS, GCP or Azure. The ineffective way of doing it is simply going over the Provider console and manually create the infrastructure as per the requirement. Do you feel that its the correct way of doing it? Are you looking for a better solution? If your answer is Continue Reading

Sentry

Self-Hosted Deployment of Sentry over AWS

Reading Time: 2 minutes Hello Readers. This will be a blog series on Self-hosted Sentry deployment over AWS. In the 1st blog of this series, I’ll be deploying a self-hosted Sentry server. Before starting up with deployment, let’s first understand what Sentry is and what does it provide. What is Sentry? Sentry is a service that helps you monitor and fix crashes in real-time. It helps in tracking errors Continue Reading

ReplicationController and ReplicaSet in Kubernetes

Reading Time: 5 minutes Hello readers, Welcome to another blog on kubernetes. My previous blog was on pods. Today, I’ll be covering ReplicationController and ReplicaSet, which are considered as wrappers on a pod. So before going further, I would like you to go through my previous blog and get a basic idea on pods. Replication Controller As discussed above, replication controller, also termed as rc in short, is a Continue Reading

Users and Groups in Linux

Reading Time: 4 minutes Hello readers, welcome to my blog on users and groups in Linux. As we know that Linux is a multi-user operating system, we’ll see how to add and configure the users and groups in Linux. What does multi-user mean? An operating system is considered as multi-user when it allows multiple users to access a computer. Also, Keeping security in mind, it does not allow a Continue Reading