Linux in Cloud, DevOps & Production: How Linux Powers Modern Infrastructure (Hands‑On Labs)

How Linux Is Used in the Real World Over the past decade, Linux has moved from “a useful skill” to the foundation of modern infrastructure. Whether you’re deploying microservices, running CI/CD pipelines, or operating production workloads at scale, Linux is everywhere. It powers: Cloud virtual machines across AWS, Azure, and GCP Container runtimes and Kubernetes worker nodes CI/CD build servers and automation pipelines Production servers that run continuously at global scale In other words, cloud, DevOps, and production environments are built on Linux; even when it’s abstracted away.

Linux in Cloud, DevOps & Production: How Linux Powers Modern Infrastructure (Hands‑On Labs) Read More »

Linux Security & Hardening: Permissions, SSH, Firewalls, and System Protection

How Linux Protects Itself and How Administrators Make It Safer. Linux is famous for stability, flexibility, and power; but none of that matters if the system cannot be trusted. This tutorial focuses on how Linux enforces security by design, not as an afterthought. Linux does not rely on antivirus tools, external scanners, or bolt‑on security products. Instead, the operating system itself is built to: Limit damage when failures or misconfigurations occur Prevent unauthorized access Enforce least‑privilege access Harden itself for real production environments Detect suspicious activity Protect remote access Restrict what processes can do

Linux Security & Hardening: Permissions, SSH, Firewalls, and System Protection Read More »

Linux Storage & Filesystems: Disks, Partitions, Mounts, and Disk Usage

How Linux Stores Data, Mounts Disks, and Survives Failures. Ask any experienced Linux administrator what causes the most production outages, and the answer is rarely CPU, memory, or networking. It’s storage. Disks silently fill up. Filesystems become corrupted. Mount points fail. Logs stop writing. Databases crash. Systems refuse to boot. Storage failures are rarely loud at the start. They accumulate quietly, often unnoticed, until they trigger sudden and severe outages.

Linux Storage & Filesystems: Disks, Partitions, Mounts, and Disk Usage Read More »

Linux Processes & Networking: Monitoring, Signals, Ports, and Connectivity

How Linux Runs, Communicates, and Stays Alive. Every new Linux learner eventually reaches a turning point. At the beginning, Linux can feel like a black box. Commands succeed or fail, services stop responding, systems slow down or crash, and the reasons aren’t always obvious. You follow tutorials, run commands, and hope for the best. Then something changes. You realize Linux isn’t a mystery at all. It behaves exactly as it’s designed to, once you understand how to read it. Linux is fully observable.

Linux Processes & Networking: Monitoring, Signals, Ports, and Connectivity Read More »

Linux Core Operations: Full Hands‑On Practical Labs for Users, Permissions, sudo, Packages & Services

Linux Core Operations: Full Practical Labs (Beginner → Intermediate) This post contains pure hands‑on labs you can run on any Linux system. Every exercise is designed to build confidence through repetition, real‑world scenarios, and structured progression. You can use Ubuntu, Debian, CentOS, Rocky, AlmaLinux, or any cloud VM. All commands are distribution‑friendly, with alternatives provided where needed.

Linux Core Operations: Full Hands‑On Practical Labs for Users, Permissions, sudo, Packages & Services Read More »

Mastering Linux Core Operations: Users, Permissions, sudo, Packages & Services (Beginner → Intermediate)

Linux remains one of the most essential skills for cloud engineers, DevOps practitioners, and system administrators. Every automation pipeline, container platform, and cloud workload eventually touches Linux. Instead of memorizing commands, the most effective way to learn is through structured, hands‑on labs that build confidence and deepen understanding. This tutorial‑driven guide walks you through the core operations every engineer must master: users, permissions, sudo, package management, and services. I will also include practical labs you can follow on any Linux system in each section.

Mastering Linux Core Operations: Users, Permissions, sudo, Packages & Services (Beginner → Intermediate) Read More »

Linux Beginner Labs: Foundations (Understand Linux, Not Just Commands)

This lab helps you understand how Linux works internally, not just type commands.By the end of these labs, Linux will feel logical, not intimidating. Before You Start The Lab (Very Important). What You Need You can use any Linux environment: Ubuntu Desktop / Server Linux VM Cloud VM WSL (Windows Subsystem for Linux) No special distro required. Linux concepts are universal.

Linux Beginner Labs: Foundations (Understand Linux, Not Just Commands) Read More »

Linux Foundations (Beginner): How Linux Really Works – Not Just Commands

Most beginners learn Linux backwards. They start with commands – ls, cd, chmod, sudo – and hope that eventually the system will “make sense.” But Linux only makes sense when you understand how it actually works under the hood. This guide gives you the mental model that every engineer needs. No memorization. No cheat-sheet culture. Just clarity.

Linux Foundations (Beginner): How Linux Really Works – Not Just Commands Read More »

How to Build a Production-Ready Auto-Scaling Azure Web App with Modular Terraform (VMSS, Load Balancer & NAT Gateway)

From Basic Terraform to Production IaC: Building an Auto-Scaling Azure Web App with Modular Terraform. Many engineers start learning Terraform by placing everything in a single  main.tf  file. While this approach works for learning syntax, it quickly breaks down in real environments. As infrastructure grows, single-file Terraform projects become difficult to maintain, hard to scale, and risky to change. Production environments demand more than “working code.” They require clarity, reusability, isolation of responsibilities, and predictable behavior during change. This is where the shift happens, from learning Terraform to engineering with Terraform.

How to Build a Production-Ready Auto-Scaling Azure Web App with Modular Terraform (VMSS, Load Balancer & NAT Gateway) Read More »

Terraform Azure Tutorial: How to Create Resource Groups, VNets, Subnets, NSGs, and VMs Step‑by‑Step IaC

Terraform on Azure: Building a Real-World Infrastructure from Scratch. Why Terraform Matters for Azure Engineers Infrastructure as Code (IaC) is the practice of defining and managing infrastructure using machine-readable configuration files rather than manual processes. Instead of clicking through the Azure Portal, engineers describe infrastructure declaratively, allowing it to be versioned, reviewed, reused, and automated.

Terraform Azure Tutorial: How to Create Resource Groups, VNets, Subnets, NSGs, and VMs Step‑by‑Step IaC Read More »

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Decline
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Who we are

Suggested text: Our website address is: https://humbletech.cloud.

Comments

Suggested text: When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymised string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service Privacy Policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

Suggested text: If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

Suggested text: If you leave a comment on our site you may opt in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Suggested text: Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

Suggested text: If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

Suggested text: If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognise and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

Suggested text: If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

Suggested text: Visitor comments may be checked through an automated spam detection service.
Save settings
Scroll to Top