Skip to content
ITFROMZERO - Share tobe shared!
  • Home
  • AI
  • Database
  • Docker
  • Git
  • Linux
  • Network
  • Virtualization
  • Home
  • AI
  • Database
  • Docker
  • Git
  • Linux
  • Network
  • Virtualization
  • Facebook

DevOps

MySQL tutorial - IT technology blog
Posted inMySQL

Setting Up and Configuring ProxySQL: A Connection Pooler and Load Balancer Solution for MySQL Production

Posted by By admin March 12, 2026
ProxySQL is a powerful connection pooler and load balancer that optimizes performance and stability for MySQL production. This article provides a guide to basic and advanced installation and configuration, along with practical tips for effective ProxySQL deployment, addressing connection management and load distribution issues.
Read More
Ubuntu tutorial - IT technology blog
Posted inUbuntu

Installing and Configuring Squid Proxy Server on Ubuntu: Effective Internet Access Control

Posted by By admin March 11, 2026
In an enterprise environment, internet access control is essential. This article shares practical experience on installing and configuring Squid Proxy on Ubuntu. This solution helps you manage bandwidth, block unwanted websites, and enhance network security, based on the success of the DevOps team.
Read More
Fedora tutorial - IT technology blog
Posted inFedora

Guide to Migrating from Docker to Podman on Fedora: Safer, More Efficient for Devs

Posted by By admin March 10, 2026
This article provides a detailed guide on migrating from Docker to Podman on Fedora. It analyzes pros and cons, explains Podman installation, rootless container configuration, and effective Docker Compose alternatives for a safer, optimized development environment.
Read More
Security tutorial - IT technology blog
Posted inSecurity

A Guide to Configuring AppArmor on Ubuntu: Restricting Process Permissions to Secure Your Server

Posted by By admin March 9, 2026
Many admins focus only on firewalls and SSH, forgetting the danger posed by the running applications themselves. This article shares real-world experience on how to use AppArmor on Ubuntu to 'jail' processes, limit their permissions, and prevent privilege escalation during an attack.
Read More
Docker tutorial - IT technology blog
Posted inDocker

Practical Docker Networking: When to Use Bridge, Host, or Overlay?

Posted by By admin March 9, 2026
From the frustrating 'Connection Refused' error when containers can't find each other, to mastering different Docker network types. This article is my hands-on experience with Bridge, Host, and Overlay networks, helping you choose the right tool for each specific problem.
Read More
Development tutorial - IT technology blog
Posted inDevelopment

A Beginner’s Guide to CI/CD with GitHub Actions: Automation for Happier Devs

Posted by By admin March 9, 2026
Tired of manual deployments and unexpected bugs? This article provides a step-by-step guide to setting up a CI/CD pipeline with GitHub Actions, automating everything from testing to deployment to boost productivity and minimize errors.
Read More
Python tutorial - IT technology blog
Posted inPython

Python Automation for Daily Tasks: File Cleanup, Backups, and Automated Notifications

Posted by By admin March 8, 2026
Learn how to write Python scripts to automate 3 real-world daily tasks: organizing folders by file type, backing up MySQL with automatic rotation, and monitoring a directory with Telegram notifications. Includes practical lessons on performance when handling large files.
Read More
Docker tutorial - IT technology blog
Posted inDocker

Docker Volumes: Persistent Data Storage That Survives Container Restarts

Posted by By admin March 8, 2026
Lost an entire database at 2 AM because I forgot to use Docker volumes — here's the hard-won lesson and a guide to configuring volumes correctly for production, including backup and monitoring.
Read More
Network tutorial - IT technology blog
Posted inNetwork

How to Set Up a Load Balancer with HAProxy on Linux

Posted by By admin March 8, 2026
A practical guide to configuring HAProxy as a load balancer: from installation and roundrobin/leastconn/source algorithms to HTTP health checks, SSL termination, and zero-downtime server draining. Tips drawn from real production experience.
Read More
Database tutorial - IT technology blog
Posted inDatabase

Setting Up and Configuring Redis Sentinel: High Availability for Redis in Production

Posted by By admin March 7, 2026
A practical guide to setting up a 3-node Redis Sentinel cluster for high availability in production: configuring master-replica replication, automatic failover, connecting applications through Sentinel, and common operational pitfalls.
Read More

Posts pagination

Previous page 1 … 4 5 6 7 8 9 Next page
Copyright 2026 — ITFROMZERO. All rights reserved.
Privacy Policy | Terms of Service | Contact: [email protected] DMCA.com Protection Status
Scroll to Top