Open Source Articles

Page 3 of 123

How to Monitor Website and Application with Uptime Kuma?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 2K+ Views

Monitoring the availability and performance of your website or application is crucial for ensuring a seamless user experience. Downtime and performance issues can lead to dissatisfied users and potential revenue loss. That's where Uptime Kuma comes in. Uptime Kuma is an open-source monitoring tool that allows you to track the uptime, response time, and other important metrics of your websites and applications. In this article, we will explore the installation, configuration, and usage of Uptime Kuma to effectively monitor your websites and applications. We'll cover topics such as adding monitors, customizing alerts and notifications, analyzing the Uptime Kuma dashboard ...

Read More

How to Move Home Directory to New Partition or Disk in Linux?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 1K+ Views

In the Linux operating system, the home directory holds user-specific files, configurations, and personal data. As your usage grows, you might find the need to move your home directory to a new partition or disk to accommodate more space or optimize system performance. This can be a valuable solution, especially when dealing with limited disk space or utilizing separate storage devices. This article explores the process of moving the home directory to a new partition or disk in Linux. We'll cover the necessary steps to prepare the new partition, discuss the home directory structure, and provide a detailed guide ...

Read More

How to Obtain Accurate Server Time in CentOS?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 1K+ Views

Accurate server time is crucial for various aspects of system administration, including synchronization between distributed systems, logging, security measures, and troubleshooting. In CentOS, a popular Linux distribution, there are several methods to obtain accurate server time. In this article, we will explore different approaches to ensure precise timekeeping in CentOS. We'll begin by checking the system time and verifying the time zone settings. Then, we'll dive into two common methods: using the Network Time Protocol (NTP) and the Chrony time daemon. Additionally, we'll discuss the hardware clock and its significance in maintaining accurate time. Checking System Time ...

Read More

How to Optimize Docker Performance?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 2K+ Views

Docker has revolutionized the way software is developed, deployed, and scaled. With its lightweight containers and efficient resource utilization, Docker enables faster application delivery and greater scalability. However, as your Docker-based applications grow in complexity, ensuring optimal performance becomes crucial to maintain efficiency and meet user demands. In this article, we'll explore the best practices and techniques for optimizing Docker performance. We'll delve into various factors that influence Docker's performance, such as container configuration, resource allocation, networking, storage, and monitoring. By implementing these optimization strategies, you can enhance the speed, efficiency, and scalability of your Dockerized applications. Understanding ...

Read More

How to Password Protect Web Directories in Nginx?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 1K+ Views

In today's digital landscape, ensuring the security of web applications and sensitive data is of paramount importance. One effective way to enhance the security of your web directories is by implementing password protection. With password protection in place, you can restrict access to authorized users and safeguard your confidential information. Nginx, a popular web server and reverse proxy, offers robust capabilities for securing web directories. By setting up basic authentication, you can prompt users to enter a username and password before accessing specific directories on your website. In this tutorial, we will walk you through the process of ...

Read More

How to Perform Canary Deployments with Istio?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 318 Views

Canary deployments have become a vital strategy for achieving seamless software updates while minimizing risks. By gradually rolling out new versions to a subset of users, canary deployments enable teams to validate changes in real-world scenarios before reaching the entire user base. To effectively manage canary deployments in a Kubernetes environment, Istio emerges as a powerful tool. In this guide, we will explore the concept of canary deployments and how Istio, a leading service mesh platform, can facilitate their implementation. We'll provide a step-by-step guide, complete with code examples, to help you harness the full potential of Istio for ...

Read More

How to Mount Remote Linux Filesystem or Directory Using SSHFS Over SSH?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 8K+ Views

Mounting a remote filesystem or directory on your Linux system can provide convenient access to files and data stored on a remote server. One popular and secure method to achieve this is by using SSHFS (SSH Filesystem). SSHFS allows you to mount a remote directory on your local machine, giving you the ability to interact with the remote files as if they were stored locally. In this tutorial, we will explore how to mount a remote Linux filesystem or directory using SSHFS over SSH. This approach ensures that the data transmission between your local machine and the remote server ...

Read More

How to Override Entrypoint Using Docker Run?

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 12K+ Views

In the world of containerization, Docker has become a popular choice for packaging and deploying applications. One of the key aspects of Docker containers is the entrypoint, which defines the default command that is executed when the container starts. However, there are scenarios where you may need to override the entrypoint and execute a different command inside the container. This flexibility allows you to customize the container behavior based on your specific requirements. In this article, we will explore the concept of overriding the entrypoint using the docker run command. We will delve into the reasons why you might ...

Read More

Graylog - Industry Leading Log Management for Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 602 Views

In today's world, businesses and organizations generate massive amounts of data. One of the most important sources of data in a software-based organization is log files. These files contain valuable information about user behavior, system performance, security events, and more. However, managing and analyzing large volumes of log data can be challenging without the right tools and techniques. What is Graylog? Graylog is an open-source log management tool designed to help organizations collect, process, and analyze large volumes of log data from various sources. It is built on top of Elasticsearch, MongoDB, and other open-source technologies to provide ...

Read More

Guake - A Dropdown Linux Terminal for Gnome Desktops

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 619 Views

As a Linux user, having a reliable and efficient terminal emulator is essential for daily work. One popular option for Gnome desktops is Guake, a dropdown terminal that can be accessed with just a keyboard shortcut or hotkey. In this article, we will explore the many features and benefits of using Guake as well as its installation and configuration. Overview of Guake Features Guake is a feature-rich terminal emulator that offers many benefits to users. Its dropdown terminal functionality allows users to quickly access the terminal by pressing a hotkey, without disrupting their workflow. This feature is especially ...

Read More
Showing 21–30 of 1,225 articles
« Prev 1 2 3 4 5 123 Next »
Advertisements