Secure Shell (SSH)
- Learn more
- Wikipedia
Related articles
![Keycloak deployment in EC2 Keycloak deployment in EC2](/static/95b62ca57ceea7f8b67c25867797a37e/0fd76/keycloak-ec2.png)
Keycloak deployment in EC2
Categories: Cloud Computing, Data Engineering, Infrastructure | Tags: Security, EC2, Authentication, AWS, Docker, Keycloak, SSL/TLS, SSO
Why use Keycloak Keycloak is an open-source identity provider (IdP) using single sign-on (SSO). An IdP is a tool to create, maintain, and manage identity information for principals and to provideā¦
By Stephan BAUM
Mar 14, 2023
![Expose a Rook-based Ceph cluster outside of Kubernetes Expose a Rook-based Ceph cluster outside of Kubernetes](/static/b7506458ea79f78fc61ecca6b3e4bdf8/0fd76/expose-ceph.png)
Expose a Rook-based Ceph cluster outside of Kubernetes
Categories: Containers Orchestration | Tags: Debug, Rook, Ceph, Docker, Kubernetes
We recently deployed a LXD based Hadoop cluster and we wanted to be able to apply size quotas on some filesystems (ie: service logs, user homes). Quota is a built in feature of the Linux kernel usedā¦
Apr 16, 2020
![Remote connection with SSH Remote connection with SSH](/static/17f0e482edd33440a70a8a3b0c0782b5/0fd76/ssh.png)
Remote connection with SSH
Categories: Cyber Security | Tags: Automation, HTTP, SSH
While teaching Big Data and Hadoop, a student asks me about SSH and how to use. Iāll discuss about the protocol and the tools to benefit from it. Lately, I automate the deployment of Hadoop clustersā¦
By David WORMS
Oct 2, 2013