How to install MongoDB 6 on Ubuntu 20.04

  • avatar
  • 166 Views
  • 6 mins read
Preview post image

MongoDB is a popular open source and document oriented database system. It belongs to a family of databases called NoSQL, which is different from the traditional table based SQL databases. It makes use of collections, each having multiple documents, and allows the user to store data in a non relational format. Data is stored in flexible, JSON-like documents where fields can vary from document to document. That's the reason for calling it schemaless database.

Docker compose introduction

  • avatar
  • 653 Views
  • 1 Likes
  • 8 mins read
Preview post image

Docker Compose is a tool for defining and running multi-container Docker applications. With Compose, you use a YAML file to configure your application’s services. Then, with a single command, you create and start all the services from your configuration.

The features of Docker Compose that make it effective are:

How to setup cron jobs to automate regular tasks on Linux

  • avatar
  • 585 Views
  • 1 Likes
  • 3 mins read
Preview post image

Cron is a time-based job that runs in the background at specific intervals or designated times. It allows you to run tasks and scripts automatically, making cron useful for automating maintenance-related tasks. Therefore, it is a very popular server administration tool.

Cron is present in all Linux distributions. However, if it is not installed, you can install it using apt:

 Join Our Monthly Newsletter

Get the latest news and popular articles to your inbox every month

Create a CSR using OpenSSL & install SSL certificate on your Nginx server

  • avatar
  • 818 Views
  • 5 mins read
Preview post image

Generally, OpenSSL is used for CSR generation on Linux-based web servers (Apache or Nginx) So, if the default web server is installed, there should be no issues with using OpenSSL as it is installed by default on these web servers.

The RSA key algorithm is the algorithm most widely used in digital security. It's an asymmetric cryptography algorithm. This basically means that there are two keys involved while communicating, i.e., the Public key and Private key.

How to add swap space to your Ubuntu

  • avatar
  • 593 Views
  • 5 mins read
Preview post image

Swap space is the area on a hard disk. It holds memory pages that are temporarily inactive. Swap space is used when your operating system decides that it needs physical memory for active processes and the amount of unused physical memory is insufficient. When this happens, inactive pages from the physical memory are then moved into the swap space, freeing up that physical memory for other uses.

Your first Docker Hub image from scratch

  • avatar
  • 908 Views
  • 1 Likes
  • 6 mins read
Preview post image

Docker provides the ability to package and run an application in a loosely isolated environment called a container. The isolation and security allow you to run many containers simultaneously on a given host. Containers are lightweight and contain everything needed to run the application, so you do not need to rely on what is currently installed on the host. You can easily share containers while you work, and be sure that everyone you share with gets the same container that works in the same way.

Installing Docker Engine and Docker Compose

  • avatar
  • 694 Views
  • 3 mins read
Preview post image

Docker is a service that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files; they can communicate with each other through well-defined channels. Because all of the containers share the services of a single operating system kernel, they use fewer resources than virtual machines.

Connecting to remote server using SSH

  • avatar
  • 765 Views
  • 1 Likes
  • 6 mins read
Preview post image

Secure Shell (SSH) is a protocol that provides secure command-line access to a remote server. By using SSH, you can remotely log in and run commands as if you were sitting right at the server.

The benefit of using SSH over other methods of remote access is that, as the name suggests, communications are securely encrypted, protecting the traffic flowing to and from the server. Data is encrypted at both ends of the client/server connection using a digital security certificate and access credentials are also protected.