Kerberos is an authentication protocol that allows two computers in a secure network to prove their identity to each other in a secure manner. It allows to verify the identity of the client and the server through the use of secure messages using cryptography and a trusted third party (KDC). Kerberos is a fundamental component […]
Ansible, software for orchestrating equipment remotely. Index: Review basic concepts Local basic exercise with Ansible and Docker Use of documentation Ad-Hoc Commands Playbooks Good practices Questions
Introduction to Ansible, software for orchestrating equipment remotely.
At KEEDIO we want to make Big Data easy, so we have worked in some tools to help you. On the last post of KDS, we learn how to deploy our Keedio Data Stack easily on Microsoft Azure. Today, we will deploy it on AWS. If you followed the last guide, this will sound […]
In this blog post we present a solution to the real time processing of syslog messages produced by several Red Hat OpenStack services. In our project, syslogs messages are being injected with varying degrees of severity and processed accordingly. We assume you already have some knowledge of what Apache NiFi, Flink and Kafka are and […]