Persistent volumes allow administrators to configure persistent data locations for stateful applications. They allow containerized applications to store data...
Blog
4sysops - The online community for SysAdmins and DevOps
BalenaEtcher (alias Etcher): Burn OS image to a USB drive

Etcher, also known as BalenaEtcher, is a tool for copying operating systems and burning the OS image onto removable...
Cockpit: GUI administration for Linux

Cockpit is a Linux tool that allows you to perform system administration tasks via a graphical user interface (GUI),...
Change Windows network profiles between public and private

Windows has three types of network profiles: domain, private, and public. The former is automatically assigned to all computers...
Poll: How reliable are ChatGPT and Bing Chat?

There is no denying that Google has been the most crucial resource for IT professionals for the past two...
Proxmox Backup Server: Install and configure

Previously, I discussed built-in snapshots and backup features in Proxmox VE. Today, I will have a look at Proxmox...
What is Windows 10 S mode? How does Windows 11 S mode differ?

Windows 11 S mode builds on its predecessor, Windows 10 S mode. It is a streamlined version of Windows...
Pulseway 9.2: Remote monitoring with workflow automation

Discover the Pulseway 9.2 update, offering enhanced IT management features, such as policy redesign, workflow automation improvements, remote control...
How to map a network drive with PowerShell

If you want to assign a drive letter to file shares via the command line, you can use PowerShell...
ENow Active Directory Monitoring & Reporting

ENow Active Directory Monitoring & Reporting provides quick, granular visibility into your Active Directory environment so IT pros can...
Using Docker with NAS and NFS

To access remote storage from Docker containers, you must understand how Docker works with network-attached storage (NAS) and the...
Using AWS Lambda functions with Docker containers

Back in 2020 at the AWS annual learning conference, re:Invent, one of the big announcements concerned AWS Lambda container...
Auditing and restricting NTLM authentication using Group Policy

NTLM is an insecure authentication protocol that is still found in many environments. Using Group Policy and effective logging,...
ScriptRunner Portal Edition R5—New Query configuration and Action configuration

ScriptRunner provides a centralized management interface for PowerShell scripts, allowing users, even with little or no scripting experience, to...
Move a VM from XenServer to Hyper-V with StarWind V2V Converter

This guide drives you through the procedure of moving a VM from XenServer to a Hyper-V running on Windows...
Install and configure Traefik on Docker

In my previous post, I introduced Traefik as a cloud-native way to implement a reverse proxy and load balancer...
Create a Proxmox cluster

The Proxmox cluster provides a centralized interface for managing your data center's processing, storage, networking, and other resources. Furthermore,...
Troubleshooting no network or internet in VMware Workstation

If a virtual machine (VM) in a VMware workstation cannot establish a connection to other VMs or the internet,...
Upgrade Windows Server 2012 RDS

With Windows Server 2012 and 2012 R2 reaching their end of life at the end of 2023, organizations must...
Enable BitLocker on Windows 11 without a TPM chip

By default, Windows 11 requires a Trusted Platform Module (TPM) chip to be present on the computer. However, it...