TechBlogs@OS3

On this page, our domain experts turn into champion bloggers writing about technologies they have mastered over time.

These blog posts give our readers a sneak peak into the technical aspects of technologies that have become mainstream as well as those on the not-so-distant horizon.

March 4, 2024

Ingestion of Network Device Logs to an SIEM Syslog Server Through a Central Syslog Server

In this blog, we will work on monitoring network devices to detect anomalies and unwanted activity. We ingest network logs on a centralized syslog server and then connect it with our SIEM tool.
January 31, 2024

Using Graylog for Threat Detection, Visualization & Log Analysis in Wazuh

In an interconnected world, IT is more exposed than ever to a vast array of cyber threats. From malware to ransomware, phishing to DDoS attacks, organizations constantly grapple with identifying and responding to threats in real time.
January 27, 2024

Simplified Cloud Infrastructure with Sunbeam MicroStack

Canonical's Sunbeam MicroStack is an open-source project designed to enable users to effortlessly deploy a fully-functional OpenStack environment on their workstation or even a virtual machine (VM) within minutes.
January 15, 2024

Configure NFS and DRBD as Cluster Resources

This blog is intended for administrators who need to set up & configure NFS and DRBD as cluster resources for highly available storage and continuous data replication with SUSE Linux Enterprise High Availability Extension.
January 11, 2024

Process Profiles and File Access Rules in NeuVector

Process Profiles Rules are like traffic cops for commands. They decide which commands can roam freely and which need a red light. On the other side, File Access Rules are the gatekeepers of files. They decide who gets to access important documents and who does not.
January 6, 2024

Security Incident Response Using TheHive & Cortex – Part 2

TheHive is an open-source security incident response platform that provides a comprehensive solution for security analysts, threat hunters, and incident responders. Cortex allows security teams to automate their threat intelligence and response workflows
January 3, 2024

Streamlining Windows Server Management with Ansible

Ansible, a powerful automation tool, offers robust capabilities for managing Windows servers alongside Linux or Unix servers, although the approach and protocols differ. This blog post explores the need for managing Windows servers with Ansible, the challenges it presents compared to Linux or Unix servers, and the different ways to connect to Windows servers using Ansible.
December 31, 2023

Implementing Network & Response Rules with SUSE Neuvector

NeuVector ensures a safe and sound passage for your containerized applications. Think of NeuVector as the vigilant escort that not only shields your containers from potential threats but also orchestrates a seamless journey.
December 25, 2023

Configuring Role Based Access Control (RBAC) on HA Clusters Using ACLs

ACLs are rules that specify which roles or users have permission to access specific resources. These rules ar used to control access to various components within the HA cluster.
December 20, 2023

Continuous Deployment of Microservices Using ArgoCD

ArgoCD's GitOps workflow revolutionizes Kubernetes-native continuous delivery. By utilizing Git repositories as a source of truth, it automates, streamlines, and version-controls microservices deployment.