Author Archive: Dwijadas Dey

Dwijadas Dey is working with GNU/Linux, Open source systems since 2005. Having avid follower of GNU/Linux, He believes in sharing and spreading the open source ideas to the targeted audience. Apart from freelancing he also writes for community. His current interest includes information and network security.

rss feed

How to Setup RatticDB Password Management Service on Ubuntu 16.04

RatticDB is an open source Django based password management service. The API provided by it is used for access by outside programs, and audit logs to ensure full accountability. There is also a "Change Queue" so as to track which passwords need to be changed and when. 1. Install Pre-requisite Update your system and install […]

February 7, 2017 | By in UBUNTU HOWTO
| 13 Replies More

How to Setup Network Monitoring with OpenNMS on Ubuntu 16.04

OpenNMS is a carrier-grade, highly integrated, open source platform designed for building network monitoring solutions. It has the capability to discover and monitor the nodes automatically in a network. Also you can monitor a service by assigning it to Open-NMS.  It can do both automated and directed discovery too. Three main functional areas of it […]

February 1, 2017 | By in OPEN SOURCE TOOLS
| Reply More

How to Setup Teampass Password Manager on Ubuntu 16.04

Teampass is a dedicated password manager for storing/accessing passwords securely in MySQL database. It is especially designed for business and enterprise environment and provides team manager a powerful tool for customizing passwords access depending on users role. This article covers how to setup Teampass on Ubuntu 16.04 with Apache and Mysql. Requirements: Apache, MySQL, PHP 5.5.0 […]

January 30, 2017 | By in UBUNTU HOWTO
| 1 Reply More

How to Setup Jenkins on Docker Container

Jenkins is one open source tool to perform continuous integration and build automation. A developer can easily build and test software  using continuous integration through jenkins in a project life cycle. It allow continuous delivery of software by building pipelines and integrating with a large number of testing and deployment technologies. In this tutorial we […]

January 25, 2017 | By in DEVOPS
| 7 Replies More

How to Setup NGINX as Reverse Proxy Using Docker

A reverse proxy server is a server that typically position itself behind the firewall in a private network and retrieves resources on behalf of a client from one or more servers. A reverse proxy provides an additional level of abstraction like SSL termination, load balancing, request routing, caching, compression etc. It also provides control to […]

January 23, 2017 | By in LINUX HOWTO
| 2 Replies More

How to Setup LEMP Stack on Docker

In this tutorial we will setup a LEMP stack inside a docker. We can easily pull and setup LEMP image inside a docker in a couple of minutes. But for better understanding of the stack, we will setup each of the images NGINX, MySQL ,PHP/PHPMyAdmin one by one. Once you grasp the core idea of […]

January 16, 2017 | By in TRENDING
| Reply More

How Setup Go in Docker and Deploy an Application

Hi, in this tutorial we are going to learn how to deploy a golang web application with a docker. You may be already aware of the fact that docker is entirely written in golang due to its high performance and reliability. Before we dive in details, make sure that you have already installed docker and […]

December 29, 2016 | By in LINUX HOWTO
| Reply More

How to Setup Monitoring for Docker Containers using Prometheus

Prometheus is a next-generation open source monitoring system from SoundCloud and is designed for monitoring such as the generation and collection of metrics, graphing the resulting data on dashboards, and alerting on anomalies etc. In this tutorial we will install/configure following components - i)  Prometheus as a Docker service although it can be installed as […]

December 12, 2016 | By in MONITORING,TRENDING
| Reply More

Setup Graylog2 Log Analyzer to Store and Search Log Errors

Graylog2 is an open-source log analyzer tool that makes use of MongoDB and ElasticSearch for storing and searching through log errors. It’s mainly used by developers to detect and fix errors in their applications.  Graylog is a more finished and "enterprise-ready" product out of the box as compared with other log analyzer tools. Versions used: […]

September 21, 2016 | By
| 2 Replies More

How to Setup HAProxy in Ubuntu 16.04

HAProxy is an open-source high availability load balancing and proxy services tools for TCP and HTTP-based network applications. It is easy to use, suits for high volume websites and  its seamless integration into  existing architectures. It offers transparent connections, server offloading, enforcement of policies, limit connections apart from its primary function of proxy service. In […]

August 31, 2016 | By in NETWORK
| 2 Replies More

How to Setup Zimbra Mail Server on Ubuntu 16

Zimbra collaboration suite has two flavors- Network edition and open source edition. In this tutorial we will explore quickest and easiest way to install zimbra ( free edition ) mail server along with other components like LDAP, antivirus, antispam, Amavis (amavisd-new) - Content checker, Aspell - Spell checker, MySQL and other collaboration features and a […]

August 9, 2016 | By in MAIL SERVER
| 1 Reply More

How to Setup ELK Stack to Centralize Logs on Ubuntu 16.04

The ELK stack consists of Elasticsearch, Logstash, and Kibana used to centralize the the data. ELK is mainly used for log analysis in IT environments. The ELK stack makes it easier and faster to search and analyze large volume of data to make real-time decisions-all the time. In this tutorial we will use the following […]

August 5, 2016 | By
| 12 Replies More

An Ultimate Guide to Secure Ubuntu Host

Ubuntu is termed as the highly secured operating system available but it has flaws in its default install like every other operating system. To remove these weaknesses, IT Security specialist has issued guidelines to combat your system's back-doors/weaknesses and protect you from some of the common Ubuntu exploits. In this guide we will look at few […]

July 29, 2016 | By in SECURITY
| Reply More