Tag: server

  • Ansible at scale 1 of 2

    The Ansible In Depth white paper outlines Ansible’s use cases in four categories: Configuration management Application deployment Orchestration: for coordinating a multi-machine process such as…

    Read
  • Balloon steals memory from virtual machines

    This article is my experience with memory balloon on virtual machine. I came across an ElasticSearch server (ESXi guest with 32GB physical memory) where the…

    Read
  • How memory usage adds up in Linux

    There are too many metrics that describes some aspects about memory in Linux. Further to an old article on this site, where several concepts were…

    Read
  • NTLM and Kerberos protocols

    This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…

    Read
  • SASL Authentication Mechanisms

    Introduction Authentication is used in many protocols (such as LDAP binding) and it usually involves sending password. Given the nature of authentication protocol, its traffic…

    Read
  • Cassandra Architecture

    Excerpts from Cassandra The Definitive Guide Gossip and Failure Detection Cassandra uses a gossip protocol that allows each node to keep track of state information…

    Read