Automating SSL/TLS Certificate Rotation in AKS
Introduction A Custom Resource Definition (CRD) in Kubernetes allows you to extend the Kubernetes API by defining your own custom resources.
Continue readingIntroduction A Custom Resource Definition (CRD) in Kubernetes allows you to extend the Kubernetes API by defining your own custom resources.
Continue readingThe ansible.cfg file is a crucial component in the Ansible ecosystem, providing a centralized configuration point to customize the behavior of Ansible.
Continue readingError Overview When running an Ansible playbook, you may encounter the following error message:
Continue readingIntroduction In the rapidly evolving world of container orchestration, Kubernetes has established itself as a front-runner, offering unparalleled flexibility, scalability, and management features.
Continue readingIntroduction The recent Technology Preview of the containerized Red Hat Ansible Automation Platform has sparked considerable excitement within the tech community.
Continue reading🔒 Unlock the secrets of secure automation with the “Ansible Vault Unveiled”!
Continue readingHow to Change a User Password with Ansible Welcome to another episode of Ansible Pilot!
Continue readingIntroduction The Cloud Native Computing Foundation (CNCF) is set to host its flagship conference, KubeCon + CloudNativeCon, in the picturesque city of Paris, France, from March 19 to 22, 2024.
Continue readingIntroduction In the world of IT automation and configuration management, security is paramount.
Continue readingIntroduction Ansible-Lint is a powerful tool that helps Ansible users identify and correct issues in their playbooks and roles.
Continue readingIntroduction Ansible is a powerful open-source automation tool used for configuration management, application deployment, and task automation.
Continue readingPluralsight The IT Ops Labs: Maintain, Monitor, and Troubleshoot Kubernetes Title: The IT Ops Labs: Maintain, Monitor, and Troubleshoot Kubernetes
Continue readingIntroduction As organizations increasingly prioritize cybersecurity and compliance, the need for robust security measures has become paramount.
Continue readingCIS Benchmark In today’s cybersecurity landscape, hardening your systems is crucial to protect against evolving threats.
Continue readingHow to verify an Ansible project signature? A step to step guide to verify the signature using the ansible-sign of a GPG-signed Ansible project.
Continue readingHow to sign an Ansible project? From a non-signed to a GPG-signed Ansible project.
Continue readingTitle: The IT Ops Sessions: Using Ansible Sign and Verify
Continue readingHow to decrypt an Ansible Vault? From an encrypted file to plaintext using the correct password.
Continue readingHow to use an Ansible Vault in an Ansible Playbook? How to use an Ansible Vault to Protect Sensitive Data such as passwords, access keys, etc.
Continue readingAnsible terminology - What is an Ansible Vault? How to store variables and files in an encrypted way using the ansible-vault command line utility.
Continue readingWhat is Polkit Privilege Escalation - (CVE-2021–4034)? “A memory corruption vulnerability in Polkit’s pkexec, witch allows any unprivileged user to gain full root privilege on a vulnerable system using default polkit configuration” cit.
Continue readingHow to Configure Kernel Parameters in RedHat-like Linux systems with Ansible using system role?
Continue readingMy Ansible Playbook code was officially included in the Red Hat Security Bulletin RHSB-2021-009 Log4Shell - Remote Code Execution - log4j (CVE-2021-44228).
Continue readingHow to Load and Unload Kernel Modules in Linux with Ansible?
Continue readingHow to set the sysctl kernel parameters with Ansible? I’m going to show you a live Playbook and some simple Ansible code.
Continue reading