Tag: sysadmin
All the articles with the tag "sysadmin".
-
Restic vs Borg vs Kopia: Backup Tools for People Who've Lost Data Before
Restic vs Borg vs Kopia compared: deduplication, compression, backends, and practical backup scripts. Choose the right tool for your Linux home lab or server backups in 2026.
-
Cockpit vs Webmin: Managing Your Linux Server Without the Terminal (Sometimes)
Cockpit vs Webmin compared: modern vs veteran Linux web admin panels. Install, features, and when to use each for server management without the terminal.
-
Self-Hosted Email Is Probably a Bad Idea
You can run your own mail server. You really, really shouldn't. Here's why.
-
TCP Keepalives: Why Connections Die and How to Fix It
Long-lived connections dropping randomly? Your OS is killing them. Here's why keepalives matter and how to tune them.
-
Auditd & Audit Logging: Know Exactly Who Touched What on Your Server
Master auditd for Linux audit logging: watch critical files, audit syscalls, use aureport and ausearch, and ship logs to Loki or Elasticsearch for compliance and security monitoring.
-
Time Sync on VMs: Why NTP Keeps Drifting
Your VM's clock is off by minutes. NTP is running but your system still drifts. Here's why.
-
The MTU Problem Nobody Diagnoses Correctly
MTU mismatches silently break large file transfers, backups, and video calls. Here's how to find and fix the wrong frame size on your network.
-
ZFS vs Btrfs: Choosing a Filesystem That Won't Eat Your Data
ZFS vs Btrfs compared for home labs and NAS in 2026. Snapshots, data integrity, RAID — find out which Linux filesystem deserves your precious data.
-
DNS Troubleshooting from the Command Line
DNS broke again. Here's the exact command sequence to figure out what's happening without touching a GUI.
-
LVM Advanced: Snapshots, Thin Provisioning, and Not Losing Your Data
Master LVM snapshots and thin provisioning on Linux. Learn to create, use, and merge snapshots for backups, and over-provision storage safely.
-
SSH Hardening: Lock Down Remote Access Without Locking Yourself Out
Harden SSH properly: disable password auth, switch to Ed25519 keys, configure sshd_config, set up SSH certificates with step-ca, add 2FA, and configure ProxyJump for bastion hosts.
-
Docker Volumes vs Bind Mounts: Where Your Data Actually Lives
Docker volumes vs bind mounts explained: named volumes, anonymous volumes, bind mounts, and tmpfs. Real examples for databases, dev workflows, and production.