Finding the Right the cloud provider Virtual Machine Type For Your Business
See how the cloud provider’s simple, flexible, and reliable virtual machines (VMs) — called Droplets — can scale with you vertically or horizontally as your business grows.
See how the cloud provider’s simple, flexible, and reliable virtual machines (VMs) — called Droplets — can scale with you vertically or horizontally as your business grows.
Learn how to set up Hashnode on cloud servers in this step-by-step tutorial. Join the go-to community for developers and share your tech insights.
What happens when you decide to create a droplet on the cloud provider — from taking an API request to a droplet you can reach via SSH. Peek under the hood to see what it’s like to operate infrastructure at scale.
In this guide, you will install various versions of the Java Runtime Environment (JRE) and the Java Developer Kit (JDK) using `apt` . You’ll install OpenJDK as well as official packages from Oracle. You’ll then select the version you wish to use for your projects. When you’re finished, you’ll be able to use the JDK to develop software or use the Java Runtime to run software.
Nginx is one of the most popular web servers in the world and is responsible for hosting some of the largest and highest-traffic sites on the internet. It is more resource-friendly than Apache in most cases and can be used as a web server or reverse proxy.
Let’s Encrypt is a Certificate Authority (CA) that provides an easy way to obtain and install free TLS/SSL certificates, thereby enabling encrypted HTTPS on web servers. In this tutorial, you will use Certbot to obtain a free SSL certificate for Apache on Ubuntu 18.04 and set up your certificate to renew automatically.
*The author selected Open Source Initiative to receive a donation as part of the Write for DOnations program.* Introduction to MicroK8s While many options are available for a Kubernetes cluster, not all follow a simple setup. MicroK8s, developed by Canonical, simplifies the Kubernetes cluster setup process through its single command binary installation and can be […]
Secure your new Ubuntu server by creating a sudo user, configuring SSH access, and setting up a firewall. Essential security hardening and automation.
Learn how to securely set up a new Ubuntu server with user accounts, SSH keys, firewall rules, and basic hardening steps.
Deploy a secure OAuth workload identity PoC on the cloud provider using OAuth, OIDC, and RBAC. Learn token exchange, setup, and configuration.