Try GOLD - Free

Build your own cloud with antMan Workers

ADMIN Network & Security

|

ADMIN #74: Software-Defined Networking

Discover the advantages and disadvantages of turning a bare metal system into the core of an antMan cloud and whether the free Community Edition and its limitations will work in your case.

- Martin Loschwitz

Build your own cloud with antMan Workers

Building a private cloud is time consuming and complex. Some use OpenStack, but many OpenStack projects fail because companies underestimate its complexity. antMan does not rely on OpenStack – or any of the other major open source applications for private clouds – but brews its own potion. The tool claims that you just need to install antMan on one or more systems. The rest of the setup is then easy, and the process is largely automated.

Ants Everywhere

Before I get started, a brief clarification of the terms used in the context of antMan will be useful. For the most part, they are contrived and have something to do with ants. The likelihood of knowing the technical terms used here is pretty low if you have never used antMan before. antMan is not, strictly speaking, the name of the Linux distribution on which the product is based. Rather, it is the entire product and the software for managing the physical nodes, which is the core of the product, so to speak. As described here, a Linux distribution named edgeLinux [1] is specially adapted to the needs of this setup. The antHill is the vendor’s central registration page, where each newly installed antMan instance is registered with a separate product key. antMan also distinguishes between antsles and

MORE STORIES FROM ADMIN Network & Security

ADMIN Network & Security

ADMIN Network & Security

Manage projects in SMEs with OpenProject Best-Laid Plans

OpenProject supplies sensible, comprehensive project management for SMEs with few financial inputs.

time to read

10 mins

ADMIN #75: Teamwork

ADMIN Network & Security

ADMIN Network & Security

Synchronize passwords in KeePass Digital Safe

Usernames and passwords play an important role in security. In this article, we show you how to set up the KeePass password manager and keep it synchronized across multiple devices.

time to read

9 mins

ADMIN #75: Teamwork

ADMIN Network & Security

ADMIN Network & Security

Test mechanisms for best practices in cloud design Best Clouds

Develop resilient and efficient cloud infrastructures for enterprise applications with the AWS Well-Architected Framework. We show you how to implement the solutions from the framework in practical terms by providing an introduction to the AWS Well-Architected tool with an example.

time to read

9 mins

ADMIN #75: Teamwork

ADMIN Network & Security

ADMIN Network & Security

Six new security features Windows Server 2022 for Shielded

Configure the Secured-core server components to reduce the attack surface of your system with minimal overhead.

time to read

12 mins

ADMIN #75: Teamwork

ADMIN Network & Security

ADMIN Network & Security

Cooperation with Cyn.in Fast Action

Cyn.in open source groupware focuses on connecting employees quickly and easily. We show you how to set up a Cyn.in environment, exchange knowledge, collaborate on projects, and manage processes. By Holger Reibold

time to read

7 mins

ADMIN #75: Teamwork

ADMIN Network & Security

ADMIN Network & Security

Passkeys eliminate the need for password-based authentication Password Overboard!

Passwords are becoming a thing of the past. We look into the basic weaknesses of passwords, explain what passkeys are all about, and assess their practicality.

time to read

5 mins

ADMIN #74: Software-Defined Networking

ADMIN Network & Security

ADMIN Network & Security

Best practices when working with Docker images Shipshape

Whether you are developing containerized applications or running them, observing best practices helps to obtain optimal results.

time to read

7 mins

ADMIN #74: Software-Defined Networking

ADMIN Network & Security

ADMIN Network & Security

Monitoring changes in Active Directory with built-in tools Tracking Down Attackers

Monitoring with built-in Windows tools can prevent the worst from happening after an attempted attack.

time to read

4 mins

ADMIN #74: Software-Defined Networking

ADMIN Network & Security

ADMIN Network & Security

Discover vulnerabilities with Google Tsunami Before the Wave

Google Tsunami security scanner detects errors that typically signal danger and outputs alerts. We look into how you can get the tool up and running and even write the required plugins yourself.

time to read

10 mins

ADMIN #74: Software-Defined Networking

ADMIN Network & Security

ADMIN Network & Security

Containers made simple Fully Automated

The Portainer graphical management interface makes it easy to deploy containers, relieving you of huge amounts of routine work you would normally have to handle with Docker, Podman, or Kubernetes. However, the licensing structure leaves something to be desired.

time to read

12 mins

ADMIN #74: Software-Defined Networking

Translate

Share

-
+

Change font size