Skip to content

Latest commit

 

History

History
25 lines (17 loc) · 2.26 KB

File metadata and controls

25 lines (17 loc) · 2.26 KB

Chapter 1. Getting started with system administration in Red Hat Enterprise Linux

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8-beta/html-single/configuring_and_managing_security/

In computing, load balancing improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any single resource. Using multiple components with load balancing instead of a single component may increase reliability and availability through redundancy. Load balancing usually involves dedicated software or hardware, such as a multilayer switch or a Domain Name System server process.

Computer security is the protection of computer systems from the theft or damage to their hardware, software, or information, as well as from disruption or misdirection of the services they provide. Ensuring computer security is therefore an essential task not only in the enterprises processing sensitive data or handling some business transactions.

Security Enhanced Linux (SELinux) is an additional layer of system security that determines which process can access which files, directories, and ports.

A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network and another outside network.

A firewall is a way to protect machines from any unwanted traffic from outside. It enables users to control incoming network traffic on host machines by defining a set of firewall rules. These rules are used to sort the incoming traffic and either block it or allow through.

Requirements for microservices

  • Traffic shaping
  • Routing
  • Advanced load balancing (including blue-green deployment and A/B testing perposes)
  • Service discovery
  • Circuit breaking
  • Rate limiting
  • Metrics/monitoring
  • Logging
  • Tracing