Start with old Desktop with Virtualization extension, something that you can install OS and dont have to remove cause of free space or you need it for something else.
Cause learning Linux or Centos or anything else needs environment, and virtualbox can work but it wont allow you play with KVM, and thats for me the big part of the fun.
Also you need to keep learning that means its is process some day you will leave it 4-5 days dormat cause your stuck in an issue the other day bulb lights up mainly due to reading this site and you get back on it.
I know a guy who built his own blade unit. Wooden blade enclosure and some simply power supplies and his own fans, then made it allow straight motherboards to slide in so that it make having a handful of systems running in a cluster super cheap. Pointless for production, but for a lab was very interesting.
I've had a low success rate with startech devices. They are cheap and when they work they work ok... but most of the time they don't. Even if one had been working fine come in the next day and it doesn't work at all.
Exactly my experience, but I will add that the more complicated the product is the lower it's chances of working properly. It's a sliding scale from "meh, yeah, ok" to "possessed by demons" to "complete and utter failure to chooch"
At a former job we bought a serial to USB from them for a PLC once... never again. It did funky things and inserted random characters into programs. We returned it for a replacement... the second one didn't work at all.
Oh sweet jesus those are the exception. NEVER buy one unless it's straight from these guys. Trust me, I spent years doing electronics engineering programming chips and bit banging
It is not uncommon to only have servers approved to access the storage listed. So many shops will go in and add a server one by one to enable access. If your servers almost never change, this works pretty well and is extremely secure. You can do this in the firewall too, for even more security. But if you are using DevOps and creating and destroying VMs regularly you will want to automate this in some fashion.
In the interest of reliability and compatibility, we opted to only support enterprise level SSDs. We actually only recently supported non-Dell drives because of those same reasons. We started talking with Edge and found a partner who would co-developer firmware to limit the risk to our customers. If Dell makes a firmware change, we didn't want our customers to experience any issues with their drives.
That what made me reaaaaaaaaaaaaaaally nervous about non-DELL drives.
Not that anything would happen, but the last thing you need is some change form DELL and then your drives stop working, or booting.
Total BS that they do that, but whatever. It's their company and there are other options.
Right now all my production Linux hosts are on VMs so I have snapshots of the backend infrastructure along with application-level backups of data as needed. Mostly these are EC2 instances running WordPress where I have a base AMI ready to go with offsite BackupBuddy backups. It's served me well in the few times I've had to use it - I can go from a launching an instance to all data recovered in about 15 minutes or less.
With that said, I'm really looking forward to seeing how Veeam's Linux backup works once it's released!
First you would create users and SSH keys and then deploy them to the other boxes that you wish to connect to. This is the core of what makes the Jump Box a Jump Box. This is standard SSH key setup, nothing unique to a Jump Box.
Did you ever make a good write up on creating users and SSH keys? If so, I cannot find it.
I mean, I know how to make and use keys in general. But detail here would be good.
Write up for creating the users on the jump box and getting their SSH keys.
Write up for pushing users and keys to other systems that said jump box will be allowing access.
Write up for control of said access.
Bob and Jill have access to Jump Box.
Bob has Access to servers 1 & 2.
Jill has access to server 2 & 3.
I know that @scottalanmiller has mentioned in another thread that he has a script to push this all out (question 2). I can only assume that the script has some controls to tell you which server so shove the key and user logon to (question 3).
Why is a VPN a security risk? because they give you (generally) full access to the network?
Correct. They create unnecessary exposure. Direct access to all hosts (typically) for all protocols and ports. The protections of firewalls and proxies are bypassed. They are generally the least secure form of access because they are the laziest - just expose everything and hope for the best.
If you mean what I think you mean, I use Centos for General server stuff, basically a server that can handle anything or can be more than 1 thing, however for Ubuntu and cause of the snaps, I use Ubuntu for specific roles like :
Just talked to MS guys. We don't even need the VDA since they are for testing we can just use the MSDN Keys and not worry about licensing.
Assuming you already have a KMS server, you shouldn't need to do anything. The Windows 2008 R2 Server (maybe original 2008 as well) KMS key will authorize Windows 7.
Yeah the MDSN and MSVLSC are seperate. The Volume licensing is for production and the MSDN is for testing purposes only. Granted I don't think it matters too much what key is installed. We have both accounts.
Fujitsu's own numbers suggest that the upgrade (which I checked, would quadruple the cores) would be expected to result in a 10 fold increase in petaflops.... from 10 to 100!! It could "easily" be three times the performance of the top ranked Tianhe-2.
And I would call him an engineer, regardless of what @scottalanmiller says. The hardest part of the last job was installing the SAS expander card. This is probably trivial once you've done it a couple of times, but our guy hadn't done one before and it did involve a call to HP for help. It seems to be a bit like putting an IKEA sofa
You wouldn't call someone a furniture engineer just because they assemble IKEA stuff, right? My wife doesn't call herself an engineer, but she does that all the time. The definition of engineer is that they design the systems, that's the English word definition, right from Cambridge. Someone that just "puts in a card" isn't designing anything. In fact, they aren't even doing IT work (at that moment), it's just manual labour in the bench space.