Email: inbox [at] sysadmin.lk
LinkedIn: https://www.linkedin.com/in/prabatht
Facebook: https://www.facebook.com/prabath.hinoize
Related Articles
How To Create a New User and Grant Permissions in MySQL
How to Create a New User Let’s start by making a new user within the MySQL shell: CREATE USER ‘newuser’@’localhost’ IDENTIFIED BY ‘password’; Sadly, at this point newuser has no permissions to do anything with the databases. In fact, if newuser even tries to login (with the password, password), they will not be able to […]
Securing Asterisk IP-PBX with Fail2Ban
What is Fail2Ban? Any service that is exposed to the internet is susceptible to attacks from malicious parties. If your service requires authentication, illegitimate users and bots will attempt to break into your system by repeatedly trying to authenticate using different credentials. A common example of this is with SSH, which will be the subject […]
Maximizing Redundancy in Kubernetes
In the world of modern cloud-native applications, Kubernetes has become the go-to platform for container orchestration. Its ability to manage large-scale deployments, automate operations, and optimize resources is unmatched. However, the true power of Kubernetes lies in its redundancy mechanisms, which ensure that applications remain highly available, even in the face of failures. In this […]