linux Mandriva Linux Security Advisory 2015-213 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:22:00 GMT Mandriva Linux Security Advisory 2015-213 - lftp incorrectly validates wildcard SSL certificates containing literal IP addresses, so under certain conditions, it would allow and use a wildcard match specified in the CN field, allowing a malicious server to participate in a MITM attack or just fool users into believing that it is a legitimate site. lftp was affected by this issue as it uses code from cURL for checking SSL certificates. The curl package was fixed in MDVSA-2015:098. Full Article
linux Mandriva Linux Security Advisory 2015-214 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:23:00 GMT Mandriva Linux Security Advisory 2015-214 - The libksba package has been updated to version 1.3.3, which fixes an integer overflow in the DN decoder and a couple of other minor bugs. Full Article
linux Mandriva Linux Security Advisory 2015-215 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:25:00 GMT Mandriva Linux Security Advisory 2015-215 - The t1utils package has been updated to version 1.39, which fixes a buffer overrun, infinite loop, and stack overflow in t1disasm. Full Article
linux Mandriva Linux Security Advisory 2015-216 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:28:00 GMT Mandriva Linux Security Advisory 2015-216 - Lack of filtering in the title parameter of links to rrdPlugin allowed cross-site-scripting attacks against users of the web interface. Full Article
linux Mandriva Linux Security Advisory 2015-217 By packetstormsecurity.com Published On :: Thu, 30 Apr 2015 15:46:33 GMT Mandriva Linux Security Advisory 2015-217 - SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE at the end of a SELECT statement. The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK in a CREATE TABLE statement. The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. The updated packages provides a solution for these security issues. Full Article
linux Mandriva Linux Security Advisory 2015-218 By packetstormsecurity.com Published On :: Thu, 30 Apr 2015 15:46:57 GMT Mandriva Linux Security Advisory 2015-218 - Multiple vulnerabilities have been found and corrected in glibc. It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. Various other issues were also addressed. The updated packages provides a solution for these security issues. Full Article
linux Mandriva Linux Security Advisory 2015-220 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:18:17 GMT Mandriva Linux Security Advisory 2015-220 - NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user. Full Article
linux Mandriva Linux Security Advisory 2015-219 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:18:27 GMT Mandriva Linux Security Advisory 2015-219 - NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. When parsing HTTP cookies, if the parsed cookie's path element consists of a single double-quote, libcurl would try to write to an invalid heap memory address. This could allow remote attackers to cause a denial of service. When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user. Full Article
linux Mandriva Linux Security Advisory 2015-221 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:19:13 GMT Mandriva Linux Security Advisory 2015-221 - Multiple vulnerabilities have been found and corrected in clamav. The updated packages provides a solution for these security issues. Full Article
linux Mandriva Linux Security Advisory 2015-222 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:20:08 GMT Mandriva Linux Security Advisory 2015-222 - Emanuele Rocca discovered that ppp was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon. Full Article
linux Mandriva Linux Security Advisory 2015-224 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:15:52 GMT Mandriva Linux Security Advisory 2015-224 - Ruby OpenSSL hostname matching implementation violates RFC 6125. The ruby packages for MBS2 has been updated to version 2.0.0-p645, which fixes this issue. Full Article
linux Mandriva Linux Security Advisory 2015-225 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:16:03 GMT Mandriva Linux Security Advisory 2015-225 - The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider unauthenticated-bind semantics, which allows remote attackers to bypass authentication via an empty password. Full Article
linux Mandriva Linux Security Advisory 2015-226 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:16:14 GMT Mandriva Linux Security Advisory 2015-226 - FCGI does not perform range checks for file descriptors before use of the FD_SET macro. This FD_SET macro could allow for more than 1024 total file descriptors to be monitored in the closing state. This may allow remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening many socket connections to the host and crashing the service. Full Article
linux Mandriva Linux Security Advisory 2015-223 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:16:44 GMT Mandriva Linux Security Advisory 2015-223 - Multiple integer signedness errors in the Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB allow remote attackers to cause a denial of service and possibly execute arbitrary code via the Voodoo interface, which triggers a stack-based buffer overflow. The Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB allows remote attackers to cause a denial of service and possibly execute arbitrary code via the Voodoo interface, which triggers an out-of-bounds write. Full Article
linux Mandriva Linux Security Advisory 2015-227 By packetstormsecurity.com Published On :: Tue, 05 May 2015 19:26:36 GMT Mandriva Linux Security Advisory 2015-227 - This update provides MariaDB 5.5.43, which fixes several security issues and other bugs. Full Article
linux Mandriva Linux Security Advisory 2015-228 By packetstormsecurity.com Published On :: Wed, 06 May 2015 13:53:45 GMT Mandriva Linux Security Advisory 2015-228 - It was found that libuv does not call setgoups before calling setuid/setgid. This may potentially allow an attacker to gain elevated privileges. The libuv library is bundled with nodejs, and a fixed version of libuv is included with nodejs as of version 0.10.37. The nodejs package has been updated to version 0.10.38 to fix this issue, as well as several other bugs. Full Article
linux Mandriva Linux Security Advisory 2015-229 By packetstormsecurity.com Published On :: Wed, 06 May 2015 13:53:59 GMT Mandriva Linux Security Advisory 2015-229 - It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code. Full Article
linux Mandriva Linux Security Advisory 2015-230 By packetstormsecurity.com Published On :: Wed, 06 May 2015 13:54:10 GMT Mandriva Linux Security Advisory 2015-230 - Squid configured with client-first SSL-bump does not correctly validate X509 server certificate domain / hostname fields. Full Article
linux Mandriva Linux Security Advisory 2015-231 By packetstormsecurity.com Published On :: Thu, 07 May 2015 15:20:41 GMT Mandriva Linux Security Advisory 2015-231 - Tilmann Haak from xing.com discovered that XML::LibXML did not respect the expand_entities parameter to disable processing of external entities in some circumstances. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used. Full Article
linux Mandriva Linux Security Advisory 2015-232 By packetstormsecurity.com Published On :: Fri, 08 May 2015 13:33:14 GMT Mandriva Linux Security Advisory 2015-232 - A malformed certificate input could cause a heap overflow read in the DER decoding functions of Libtasn1. The heap overflow happens in the function _asn1_extract_der_octet(). Full Article
linux Ubuntu 20.04: Welcome to the future, Linux LTS disciples By arstechnica.com Published On :: Mon, 04 May 2020 12:00:01 +0000 ZFS gets more accessible, security becomes a bigger priority, and Ubuntu speeds up overall. Full Article Biz & IT Features
linux Happy 25th birthday, Linux! By www.treehugger.com Published On :: Thu, 25 Aug 2016 15:11:25 -0400 There's a lot for TreeHuggers to love about the little operating system. Full Article Technology
linux Для ядра Linux развивается система распределённого выполнения потоков Popcorn By www.opennet.ru Published On :: Mon, 04 May 2020 11:14:14 +0300 Политехнический университет Виргинии предложил для обсуждения разработчиками ядра Linux набор патчей с реализацией системы распределённого выполнения потоков Popcorn (Distributed Thread Execution), позволяющей организовать выполнение приложений на нескольких компьютерах с распределением и прозрачной миграцией потоков между хостами. При помощи Popcorn приложения могут быть запущены на одном хосте, после чего без остановки работы перемещены на другой хост. В многопоточных программах допускается миграция на другие хосты отдельных потоков. Full Article
linux How io_uring and eBPF Will Revolutionize Programming in Linux By weekly.statuscode.com Published On :: Wed, 22 Apr 2020 00:00:00 +0000 #263 — April 22, 2020 Read on the Web StatusCode Weekly Covering the week's news in software development, ops, platforms, and tooling. The Devastating Decline of a Brilliant Young Coder — This is not a technical article but is an important one nonetheless. Lee Holloway essentially programmed Cloudflare into being. But then he became distant and unpredictable, and what happened to him is something that could affect any of us ???? Sandra Upson (WIRED) How io_uring and eBPF Will Revolutionize Programming in Linux — Even more exciting times are coming for development on Linux thanks to these technologies. A good overview. Glauber Costa Slow CI Build? Get a 41:1 ROI by Switching to Semaphore — For every $1 invested in Semaphore, engineers gain $41 in reclaimed productivity. Who said money can’t buy you time? Semaphore 2.0 sponsor ▶ Mob Programming and the Power of Flow — I enjoyed this insightful walk through the idea of bringing people together and attempting to develop things in an efficient way with numerous people around the same machine (a.k.a. ‘mob’ programming). It’s not for everyone, but it’s neat to see how it can work. Woody Zuill Cloudflare Workers Now Supports.. COBOL — COBOL is one of the earliest things you could really call a programming language (it first appeared in 1959!) and is often a source of amusement because it’s seen as old, verbose, clunky, and difficult to maintain. Nonetheless, it’s still in use (particularly in legacy systems) and you can use with Cloudflare Workers too! John Graham-Cumming Quick bytes: AWS's new Africa (Cape Town) region is now open. The .org TLD selloff has hit yet another snag after an intervention by California's attorney general. AWS has a whole bunch of live, online talks taking place over the next week covering a variety of their services. The very, very, very last release of Python 2 — 2.7.18 — has been released. Long live Python 3. Node.js 14.0 is out. The 2019 survey results from both the Go community and Rust community are fresh out. Ubuntu 20.04 LTS is due out tomorrow. We'll feature it next week but this is a big release as LTS releases only come along every two years. Google's data centers are becoming carbon-intelligent. They work harder when the sun is shining and the wind is blowing. ???? Jobs DevOps Engineer at X-Team (Remote) — Join the most energizing community for developers. Work from anywhere with the world's leading brands. X-Team Find a Job Through Vettery — Vettery specializes in tech roles and is completely free for job seekers. Create a profile to get started. Vettery ???? Stories and Opinions How 'Memories', a 256 Byte Demo, Was Coded — You can watch the demo here or enjoy learning just how these unusual developers cram so much into so little space. HellMood/DESiRE The Computer Scientist Who Can’t Stop Telling Stories — For pioneering computer scientist Donald Knuth, good coding is synonymous with beautiful expression. Quanta Magazine ▶ Discussing NGINX and Service Meshes with Alan Murphy — I enjoyed this SE Daily episode last week and learnt a fair bit. Software Engineering Daily podcast End-to-End Observability for Microservice Environments — Optimize service costs and reduce MTTR with full data correlation, payload visibility and automated tracing. Try free. Epsagon sponsor ▶ Performance Profiling for Web Applications — An overview of how to use Chrome DevTools to understand a Web application’s performance bottlenecks. Sam Saccone Are Object Stores Starting to Look Like Databases? — A bit, yes. Alex Woodie (Datanami) The Case Against CS Master’s Degrees Oz Onay Why I Stopped Using Microservices Robin Wieruch ???? Tutorials Ask HN: I'm A Software Engineer Going Blind, How Should I Prepare? — This is something I hope none of you have to go through, but we’ve linked to other stories about being a blind coder in the past, and some form of sight loss will affect many of us over the years. Hacker News Writing an 'Emulator' in JavaScript (and Interfacing with Multiple UIs) — Tania built a Chip-8 interpreter in JavaScript and has gone into quite a bit of detail about what was involved here. Lots of neat bits and pieces to pick up from this. Tania Rascia What It Took to Build a Serverless App That Texts Positive COVID-19 News — Code, a screencast tour, and an article looking at what it took to build a simple serverless app using C#, Azure Functions, and Twilio to text news alerts (but only ones with positive sentiments!) Gwyneth Pena S. If You Use grep On Text Files, Use the -a (--text) Option — I could explain why but then you wouldn’t need to read this. Makes a good point. Chris Siebenmann Event-Reduce: An Algorithm to Optimize Frequently Running Queries? — In brief, the idea is that rather than having to re-run queries when data changes on a table, you can basically merge in changes to previous query results. Be sure to check the FAQs. Daniel Meyer Embedding Binary Objects in C Ted Unangst ???? Code and Tools Desed: A Debugger for sed — Demystify and debug your sed (the text processor that comes with nearly every Unix) scripts, from the comfort of your terminal. Step through line by line, place breakpoints, etc. SoptikHa2 Falcon: An Open-Source, Cross Platform SQL Client — Built around Electron and React, this basic client can quickly do chart visualizations of query results and can connect to RedShift, MySQL, PostgreSQL, IBM DB2, Impala, MS SQL, Oracle, SQLite and more. Plotly The SaaS CTO Security Checklist Sqreen sponsor Termible: Offer Terminal Apps in the Browser Without Installation — This is a commercial service but I find the idea intriguing. You provide a Dockerfile, embed some code on your site, and let people play with your product/service “live”. HTTPie seems to use it for its live examples. Termible X410: An X Server for Windows 10 — If you’re using WSL (Windows Subsystem for Linux) to run Linux behind the scenes of a Windows 10 install, X410 takes things to another graphical level. Choung Networks 60 Linux Networking Commands and Scripts — “I decided to create a network tools go-to-list for myself. Then, I thought, why not turn the list into a blog post?” Hayden James Brök: A Tool to Find Broken Links in Text Documents — Built in Haskell. Mark Wales xsv: A Fast CSV Command Line Toolkit Written in Rust. — Another ‘Swiss Army knife’ for your slightly structured data. Andrew Gallant Full Article
linux Grouping Linux IoT Malware Samples With Trend Micro ELF Hash By feeds.trendmicro.com Published On :: Mon, 20 Apr 2020 14:21:53 +0000 We created Trend Micro ELF Hash (telfhash), an open-source clustering algorithm that effectively clusters Linux IoT malware created using ELF files. The post Grouping Linux IoT Malware Samples With Trend Micro ELF Hash appeared first on . Full Article Internet of Things Open source Clustering algorithm internet of things Linux malware
linux Backdoor.Linux.MIRAI.VWIQT By www.trendmicro.com Published On :: Tue, 09 Jul 2019 00:00:00 GMT Over All Risk Rating : LowIoT malware uses two different encryption routines for its strings and modified the magic number of UPX.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.Read More Full Article
linux Backdoor.Linux.BASHLITE.SMJC2 By www.trendmicro.com Published On :: Mon, 19 Aug 2019 00:00:00 GMT Over All Risk Rating : LowThis backdoor is seen propagating via CVE-2018-18636, a cross-site scripting vulnerability affecting the wireless router D-Link DSL-2640T. This malware is capable of receiving commands to flood other systems.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.Read More Full Article
linux Rootkit.Linux.SKIDMAP.A By www.trendmicro.com Published On :: Mon, 16 Sep 2019 00:00:00 GMT Over All Risk Rating : LowThis rootkit is used by Skidmap - a Linux malware - to hide its cryptocurrency-mining abilities.This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.Read More Full Article
linux Coinminer.Linux.KERBERDS.A By www.trendmicro.com Published On :: Mon, 04 Nov 2019 00:00:00 GMT Over All Risk Rating : LowThis new version of KERBERDS, a known crypto-mining malware that uses an ld.so.preload-based rootkit for stealth, was seen propagating by telnet bruteforce attacks. This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.Read More Full Article
linux Backdoor.Linux.MIRAI.VWIQT By feeds.trendmicro.com Published On :: Tue, 09 Jul 2019 00:00:00 GMT Over All Risk Rating : LowIoT malware uses two different encryption routines for its strings and modified the magic number of UPX.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.Read More Full Article
linux Backdoor.Linux.BASHLITE.SMJC2 By feeds.trendmicro.com Published On :: Mon, 19 Aug 2019 00:00:00 GMT Over All Risk Rating : LowThis backdoor is seen propagating via CVE-2018-18636, a cross-site scripting vulnerability affecting the wireless router D-Link DSL-2640T. This malware is capable of receiving commands to flood other systems.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.Read More Full Article
linux Rootkit.Linux.SKIDMAP.A By feeds.trendmicro.com Published On :: Mon, 16 Sep 2019 00:00:00 GMT Over All Risk Rating : LowThis rootkit is used by Skidmap - a Linux malware - to hide its cryptocurrency-mining abilities.This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.Read More Full Article
linux Coinminer.Linux.KERBERDS.A By feeds.trendmicro.com Published On :: Mon, 04 Nov 2019 00:00:00 GMT Over All Risk Rating : LowThis new version of KERBERDS, a known crypto-mining malware that uses an ld.so.preload-based rootkit for stealth, was seen propagating by telnet bruteforce attacks. This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.Read More Full Article
linux Microsoft to Shell Out $100,000 Reward If You Can Hack This Linux Operating System By www.news18.com Published On :: Thu, 7 May 2020 12:51:01 +0530 The bug bounty programme is part of a three-month research challenge that runs from June 1 until August 31 Full Article
linux RSS Readers for Linux By www.rss-specifications.com Published On :: Wed, 7 Jan 2015 09:00:00 -0500 RSS readers for linux allow users to view information contained in rss feeds in a specific location in an intuitive way. RSS Readers for Linux Full Article
linux ArchLinux UEFI and Dell XPS 2015 By webreflection.blogspot.com Published On :: Fri, 31 Jul 2015 14:56:00 +0000 unrelated important thing first: I am blogging on my own website too, you can read my very first public entry in there!I will keep posting here less web-centric related issues, or mostly rants, and will post there interesting stuff about HTML5, JavaScript, client/server and Mobile Web development ... now, back to the topic ... archibold and my Dell XPS Developer EditionSo they changed my motherboard today, it suddenly stopped recognizing the Hard Drive, and even trying other drives didn't work at all. Kudos to Dell for their assistance: the day after a person with already all necessary pieces arrived at my door and substituted the Motherboard with a very quiet and professional attitude. ... when I've asked assistance for a Lenovo Yoga Pro 3 they never even come back ... If you've never heard about archibold, it's an installer which aim is to simplify ArchLinux and, optionally, GNOME configuration. Since I already backed up my Dell, and even if it was working like a charm, I've decided to erase it and see if I could make it work via UEFI. Apparently this BIOS could be quite problematic and while efibootmgr seems to work without problems, it actually doesn't: it puts the EFI label into the list of Legacy boot-able devices so it won't work! Not only the boot managerIf you have tried my installer before, I suggested to use UEFI=NO and enable Legacy mode on the bios. This was because not only I couldn't figure out how to install via UEFI, but I was using genfstab generated /etc/fstab during the installation and it was storing wrong UUIDs. Finally Managed to install with UEFI boot!The TL;DR story is that if you have an EFI partition created through gparted, and you have Syslinux on it, you should go in the part of the bios where you can add UEFI partitions manually, selecting syslinux/syslinux.efi file to boot from.Full Article
linux JSJ BONUS: Web Apps on Linux with Jeremy Likness and Michael Crump By devchat.tv Published On :: Tue, 12 Sep 2017 07:00:00 -0400 Tweet this episode JSJ BONUS: Web Apps on Linux with Jeremy Likness and Michael Crump In this episode Aimee Knight and Charles Max Wood discuss Microsoft's Web Apps on Linux offering with Jeremy Likness and Michael Crump. [00:37] Michael Crump Introduction Michael is on the developer experience team for Azure. [00:52] Jeremy Likness Introduction Jeremy is on the cloud developer advocacy team. Their mission is to remove friction and support developers and work with teams to build a positive experience. The NodeJS team is headed up by John Papa. They have teams around the world and involved in many open source communities. They're focused on building documentation and creating great experiences [02:54] What is it about Azure that people should be getting excited about? Azure is a huge platform. It can be overwhelming. They're trying to help you start with your problem and then see the solution as it exists on Azure. Azure is growing to embrace the needs of developers as they solve these problems. The experience is intended to be open and easy to use for any developer in any language on any platform. It allows you to work in whatever environment you want. Standing up applications in production is tough. Azure provides services and facilities (and interfaces) that make it easy to manage infrastructure. You don't have to be an operations expert. Chuck mentions this messaging as he heard it at Microsoft Connect() last year. It's not about bringing you to .NET. It's about making it easy where you're at. Aimee adds that as a new-ish person in the community and Azure excites her because the portal and tutorials are easy to follow for many new programmers. A lot of these features are available across command lines, tools, and much more. The documentation is great. See our interview with Dan Fernandez on the Microsoft Docs. [12:04] Web Apps on Linux Web application as a service offering from Microsoft. I don't need to worry about the platform, just what's different about my application. Web Apps has traditionally been on Windows. Web Apps on Linux is in preview. You can choose the size of your infrastructure. You only get billed for what you use and can scale up. Setting up multiple servers, managing synchronization and load balancing is a pain. Web Apps gives you a clean interface that makes this management easy. You can also scale across multiple datacenters around the world. [15:06] Why Linux? What's hard about Windows? Node was originally created on Linux and many tools run nicely on Linux. It was later ported to Windows. The toolchains and IDE's and build processes is in an ecosystem that is targeted more toward Linux than Windows. This allows people to work in an environment that operates how they expect instead of trying to map to an underlying Windows kernel. Aimee gives the example of trying to set up ImageMagick on Windows. Web Apps on Linux also allows you to build integrations with your tools that let you build, test, and deploy your application automatically. [19:12] Supported Runtimes Web Apps on Linux supports Node, PHP, Ruby, and .NET Core. You can run a docker container with Node up to 6.x. If you want Node 7.x and 8.x you can create your own Docker container. Web Apps on Linux is build on Docker. The containers also have SSH, so developers can log into the docker container and troubleshoot problems on the container. If you can build a container, you can also run it on this service. At certain levels, there's automatic scaling. [22:06] Consistency between containers? Shared ownership of state or assets It depends on how you build your app. The Docker containers have a shared storage where all the containers have access to the same data and state. There's a system called kudu that makes this really simple. You can also pull logs across all systems. You can also use SSH in the browser [25:23] What's painful about Linux and containers? How is the application built and how does it manage state so that you can isolate issues. If you have 20 containers, can you connect to the right one. It's up to you to manage correlation between containers so you can find the information you need. Knowing your traffic and understanding what to do to prepare for it with scaling and automation is sometimes more art than science. [28:28] How should you manage state? A lot of these systems lend themselves to running stateless, but you don't want to run mongodb on each container versus running one mongodb instance that everything attaches. You want a common place to store data for the entire app for shared state. [30:34] CosmosDB (was DocumentDB) It's an API equivalent to MongoDB. It's a database as a service and you can connect your containers to the CosmosDB in Azure using your portal to make it super easy. You may need to open up some firewall rules, but it should be pretty straightforward. [34:14] Third Party Logging Management Apps Azure has a service that provides metrics (Application Insights) and a logging service. Many other companies use elasticsearch based solutions that solve some of these problems as well. [36:06] How do people use Web Apps on Linux? Companies building new applications many times want to run without managing any infrastructure. So, they use Azure Functions, and other services on Azure. Lift and shift: Take a virtual machine and change it into a web app container that they can run in the cloud. They also move from SQL Server on a server to SQL Server on the cloud. Moving from hosted MongoDB to CosmosDB. You can also use any images on DockerHub. [40:06] Continuous Integration and Continuous Deployment Whether you're using a private registry or cloud registry. When you publish a new image, it'll use a webhook to pull the custom image and deploy it. Or to run it through Continuous Integration and then deploy it without any human interaction. Chuck mentions the case when you haven't logged into a server for a while, there's a huge backlog of system updates. Updating your container definitions makes upkeep automatic. [42:02] Process files and workers with PM2 format You can set up instances to run across cores with the PM2 definitions. You can also make it run various types of workers on different containers. Why did you use PM2? What other uses are there for this kind of setup? You can tell it which processes to start up on boot. You can also have it restart processes when a file is changed, for example, with a config file you can have it restart the processes that run off that config file. [45:38] How to get started Getting started with Node docs.microsoft.com Trial account with a few hundred dollars in Azure credit. Michael's Links michaelcrump.net @mbcrump github.com/mbcrump Jeremy's Links bit.ly/coderblog @jeremylikness github/jeremylikness Picks Aimee Having a little bit of mindfulness while waiting on code and tests to run. Joe Ozark on Netflix Star Wars: Rogue One Chuck Travelers on Netflix Jeremy Ozark filming in Woodstock, GA Autonomous Smart Desk LED light strips Michael Conference Call Bingo Life (Movie) Get Out (Movie) Full Article