How to Secure Your Elastic Stack (Plus Kibana, Logstash and Beats)

Editor’s Note: Because our bloggers have lots of useful tips, every now and then we bring forward a popular post from the past. We originally published today’s post on December 16, 2019. This is the second of a series of…

Read More >

VPN Options with Azure, Part 1: Azure to Site

As business entities move some of their services to Microsoft Azure Cloud (Azure), we see hybrid networks emerge that can span multiple physical sites and multiple cloud environments. Connecting those network segments securely can present some challenges. I’ve encountered two types…

Read More >

How to Connect from Cloud Functions to the Private IP Address of Cloud SQL in Google Cloud

Cloud functions allow you to run single-purpose functions without having to manage instances in Google Cloud. Cloud SQL is Google Cloud’s managed SQL service. For better security, it’s best practice to disable public IP in Cloud SQL. In terraform, the…

Read More >

How To Export Collections in SCCM to CSV Using Powershell

Your mission: Gather a list of servers in a specific collection on System Center Configuration Manager (SCCM) so you or your client can verify the servers in the collection. How will you do it? First, a disclaimer. I’m a data…

Read More >

Advice for Remote Work Planning

With many companies investigating or enacting remote work options in response to the COVID-19 outbreak, the Pythian team would like to share their best advice to those companies considering a move to remote work. Here are some of our remote…

Read More >

Installing Elasticsearch Using Ansible – the Quick Way!

Editor’s Note: Because our bloggers have lots of useful tips, every now and then we bring forward a popular post from the past. We originally published today’s post on December 12, 2019. This is the first of a series of…

Read More >

Creating secure access architecture on Google Cloud Platform (and building it with Terraform)

Often we get involved in projects where there are all sorts of stringent security requirements. In this post, I will share a few of the methods used to meet these security requirements within Google Cloud Platform (GCP), while still allowing…

Read More >

How to solve SELinux and MySQL log rotation issue

Disable SELinux? Think again! SELinux is always a complicated topic. If you search this on the web, most people will advise just disabling it, but that may not be acceptable from a security point of view in your organization. In…

Read More >

Harnessing the power of Jinja2 with Ansible

Configuration files management is the core component of every configuration management tool. Templates are one of the best methods for creating configuration files as they allow dynamic variables. Ansible has a template module that uses Jinja2 in its core. Jinja2…

Read More >

How to accurately measure data guard lag events

If you work with Data Guard, the lag between the primary and standby database is an informative but difficult metric to measure. I’ve encountered some “solutions” that use the COMPLETION_TIME in (G)V$ARCHIVED_LOG for the standby destination as the time of…

Read More >
Page 1 of 41234