TUTORIAL HOME
Here you can find the most useful tutorials and guides that solve typical problems (and not only 😇).
Ansible
-
How to Create a File in Ansible
Ansible, an open-source automation tool, has gained significant popularity for its simplicity and powerful capabilities in managing complex IT infrastructures. Ansible file management offers flexibility and control over remote systems among its many features. This guide delves deep into Ansible’s capabilities to create, modify, and manage files across many systems, ensuring efficient and scalable server automation.
-
How to Protect Sensitive Data with Ansible Vault
In this comprehensive Ansible tutorial, we will explain what Ansible Vault is, how it works, and walk you through how to use Ansible Vault to protect sensitive data such as passwords or private keys.
-
How to Configure Ansible Inventories
Ansible is a modern configuration management tool that makes it easier to set up and maintain remote servers. It has a simple design that is intended to get users up and running quickly. An inventory file is used by Ansible to keep track of which hosts are part of your infrastructure and how to reach them for commands and playbooks.
-
How To Install and Configure Ansible on Ubuntu 22.04
Configuration management systems are intended to help administrators and operations teams manage large servers more efficiently. They enable you to automate the control of multiple systems from a single location.
-
An Overview of Ansible Configuration Management
Configuration management is the process of dealing with changes to a system in a way that ensures its integrity over time, typically involving tools and processes that enable automation and observability. Despite the fact that this concept did not originate in the IT industry, it is widely used to refer to server configuration management.
CentOS
-
How to Enable and Use firewalld on CentOS 7
Managing the firewall on a CentOS 7 system is essential for administrators who need to ensure network security and manage traffic effectively. firewalld serves as the default firewall management tool on CentOS, providing a dynamic and configurable way to handle network traffic with zones and rules. This detailed guide will walk you through checking the status of your firewall, enabling and managing firewalld, and manipulating firewall rules to secure your CentOS 7 system.
-
How to Install and Configure Nginx on CentOS 8
The article provides a comprehensive guide on installing and configuring Nginx on a CentOS 8 system, emphasizing its superiority in handling high traffic more efficiently than Apache. It details the prerequisites, installation process, and post-installation steps such as starting and enabling Nginx, managing the service through commands, and setting up necessary firewall rules to allow web traffic. It also touches on configuring Nginx and testing its setup to ensure everything is functioning correctly. This guide serves as a practical resource for tech professionals looking to leverage Nginx’s capabilities within the LEMP stack, highlighting its role as a crucial component for developing and hosting efficient, scalable web applications.
-
How to Configure Network Settings in CentOS 8
Managing network settings is a foundational task for system administrators and users alike. In CentOS 8, this task involves a comprehensive understanding of the tools and configuration files available. This guide provides an in-depth walkthrough on how to set up a CentOS network, including configuring static IP addresses, setting up DHCP, managing network interfaces, and ensuring your network configuration aligns with your needs.
-
Setting Up Remote Storage on CentOS Servers: A Comprehensive Guide
Welcome to the essential guide for configuring offsite backup storage on your CentOS server. Through this guide, we aim to equip CentOS server users with the knowledge to establish a robust remote storage system. We’ll walk you through each critical step of the setup process, offering detailed explanations and insights to ensure a seamless integration of remote storage into your data management strategy.
-
How to configure OpenVPN on CentOS?
CentOS, a popular Linux distribution for servers, provides a solid foundation for setting up a secure VPN connection. This guide focuses on installing and configuring OpenVPN, a widely used open-source VPN solution, on CentOS 8. It simplifies the original instructions into easy-to-follow steps, ensuring that even users new to CentOS or VPNs can successfully secure their internet connection.
-
How to Reinstall, Enable or Disable SELinux on CentOS
The NSA created SELinux as a Mandatory Access Control (MAC) system. SELinux was created as a substitute for Discretionary Access Control (DAC), which is included with the majority of Linux distributions. DAC and MAC vary in the manner in which users and programs get access to computers. Traditionally, the command sudo grants a user the ability to get root-level permissions. On a DAC system, root access grants the user or application access to all programs and files.
-
How to Install cPanel/WHM on CentOS 8
The cPanel is a traditional environment for controlling most of the website operations. Usually, customers are offered it within the bundle package, and then the operator installs it with the selected operating system. But what to do if you want to install the cPanel involving the website under CentOS 8 later on? Please, read the instructions provided for your convenience.
-
How to install, start, stop, and restart MySQL on CentOS 7
Before installing MySQL on CentOS 7, ensure that your VPS or dedicated server is running on this particular distribution. Also, make sure you have root access to it..
Dedicated Servers
-
How to Create a New Branch in Git
Creating a new branch in Git is essential for managing changes and developing features without impacting the main codebase. The article outlines the use of the git branch command, which allows for creating, listing, renaming, and deleting branches. It highlights various methods to create branches from the main branch, a different branch, a specific commit, or a tag. Additionally, the guide emphasizes the importance of following branch naming conventions for clarity and organization. The article also covers advanced topics such as creating branches in detached HEAD state, from remote branches, and the process for merging and rebasing branches to integrate changes. Implementing branch protection policies and understanding different branching strategies like Git Flow and GitHub Flow are recommended to maintain code quality and streamline collaboration. By adhering to these practices, developers can efficiently manage their workflow and ensure a well-organized codebase.
-
Migration Guide: CentOS to AlmaLinux, Rocky Linux and Other Alternatives
Following Red Hat’s decision to end support for CentOS 8, users must transition to alternative operating systems. CentOS 7 will continue receiving support until the end of 2024, but CentOS 8 support ended in 2021, causing significant controversy. Recommended RHEL derivatives include AlmaLinux, Rocky Linux, Oracle Linux, and CentOS Stream. These alternatives provide binary compatibility with CentOS, ensuring seamless migration for existing projects. AlmaLinux, supported by the AlmaLinux OS Foundation and endorsed by cPanel and Plesk, is highly regarded. Rocky Linux, led by CentOS co-founder Henry Kurtzer, emphasizes community support but lacks cPanel and Plesk compatibility. CentOS Stream offers frequent updates as a rolling release, while Oracle Linux, backed by a major corporation, ensures compatibility with CentOS 8 applications. AlmaLinux is the top recommendation due to its stability and strong community support.
-
Installation of Softaculous in Plesk and cPanel
This article outlines the steps for integrating Softaculous, a versatile auto-installer for over 200 applications, into Plesk and cPanel environments. The article highlights the ease of installing Softaculous in Plesk by navigating to the Extensions Catalog and clicking “Install.” For older Plesk versions, it details enabling the ionCube loader and POSIX before running installation commands via SSH. Similarly, for cPanel, the ionCube loader activation is described through WHM settings, followed by SSH commands to install Softaculous. Both methods offer options for purchasing a full license for extended functionality.
-
How to Access cPanel Webmail
This guide provides multiple methods to access your cPanel Webmail interface. Whether you prefer using direct links, logging in through your Namecheap account, or accessing it via your cPanel account, this article will walk you through the steps. Additionally, important notes are included to help you avoid common issues, such as SSL warnings and interface display errors.
-
JSON-Server Installation: Setting Up Mock APIs
This article is a comprehensive guide that introduces developers to JSON Server, a valuable tool for quickly setting up mock REST APIs. The tutorial emphasizes the importance of efficient backend simulation for frontend development, highlighting JSON Server’s role in streamlining the process. It explains the simplicity of JSON Server in creating a mock REST API using a JSON file, enabling developers to focus on frontend design without waiting for a real backend. The guide covers installation instructions, CRUD operations, custom routes, and advanced features like pagination and error handling. It also discusses security considerations and provides alternatives to JSON Server, concluding with a strong endorsement of JSON Server’s effectiveness in simplifying development workflows.
-
How to Configure Additional IP Addresses
The article provides a detailed guide on how to configure additional IPv4 addresses across various operating systems, catering both to VSYS Host customers and users from other hosting services. It describes multiple methods for assigning IP addresses to either single or multiple network interface cards. The guide covers step-by-step instructions for systems including Arch Linux, CentOS, FreeBSD, Rocky Linux, Debian, Ubuntu, OpenSUSE, Windows Server, and cPanel. Each section is tailored to the specific nuances of the operating system, detailing commands, file editing, and the use of graphical tools like YaST and nmtui for network configuration. The tutorial emphasizes the importance of having administrative access and a basic understanding of networking to successfully apply the settings. This resource is intended to help users manage multiple websites or services from a single network interface by effectively making use of additional IP addresses.
-
How to Adding IPv6 connectivity to your server
The article provides a detailed guide on how to enable IPv6 connectivity on servers that might not have it activated by default. It offers specific instructions for both Linux and Windows servers, including command line inputs and adjustments to configuration files. The guide is comprehensive, covering the preliminary steps needed to access servers, the configuration changes necessary to enable IPv6, and troubleshooting tips for issues like connectivity problems. The content is tailored for system administrators and emphasizes the importance of IPv6 for modern network demands and future-proofing server infrastructure.
-
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH
The article “How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH” provides a detailed guide on troubleshooting and resolving the ERR_SSL_VERSION_OR_CIPHER_MISMATCH error, which occurs when a web browser detects an issue with a website’s SSL certificate. The error can stem from faulty SSL certificates, outdated server configurations, obsolete client software, or network device settings. The article outlines steps for website owners, such as verifying certificate validity, ensuring domain name correspondence, upgrading TLS versions, and disabling insecure cipher suites. It also offers solutions for visitors encountering the error, including clearing browser caches, updating browsers, resetting SSL states, and using alternative devices. The guide emphasizes maintaining updated root certificates and regularly auditing SSL/TLS configurations to ensure secure and uninterrupted online experiences.
-
Data transfer with WinSCP
The article provides a comprehensive guide to using WinSCP, a free and open-source software for secure file transfer on Windows platforms. It covers the basics of downloading and installing WinSCP, setting it up for different protocols like SFTP, FTP, SCP, and WebDAV, and outlines the benefits and drawbacks of each protocol. The guide emphasizes the importance of secure data transfer, explaining how to initiate connections using various protocols, manage file permissions, and use features like drag-and-drop for efficient file management. Additionally, it discusses the potential risks associated with using the ‘root’ user for connections and suggests how to mitigate them by properly managing permissions and using SSH keys for authentication.
-
How to Creating static routes
The article delves into configuring static routes, which are used to direct data packets through predetermined paths between routers without relying on dynamic routing updates. Static routing, characterized by manual setup and low bandwidth consumption, is optimal for stable, predictable network environments but lacks flexibility in dynamic, changing networks. The guide provides step-by-step instructions for implementing static routes on various operating systems including CentOS, Debian, Ubuntu, openSUSE, and Windows Server. These configurations aim to enhance network efficiency and security by ensuring specific routing paths are maintained.
Docker
-
How to Use Docker Run Command with Examples
The docker run command is a fundamental tool for Docker users that allows for the construction and execution of containers with various configurations. The command can be used for containerization and application deployment, creation of isolated development and testing environments, and rapid prototyping. Understanding the appropriate use cases and syntax of the docker run command enables users to create and manage containers to meet their specific needs efficiently. This tutorial provides practical examples to illustrate the usage of the docker run command, empowering users to take full advantage of its capabilities and master this valuable skill in the current development landscape.
-
How To Remove Docker Volumes, Images and Containers
This guide delves into efficient methods for removing Docker volumes, images, and containers, emphasizing the importance of maintaining a clutter-free development environment. It covers key Docker commands for pruning unused resources, managing dangling volumes and images, and systematically deleting specific or all containers. The article highlights how regular cleanup practices can optimize disk space and system performance, ensuring a stable and reliable Docker infrastructure for both seasoned DevOps professionals and developers new to containerization.
Kubernetes
-
How to Create and Deploy an NGINX Proxy Helm Chart on Kubernetes
This article provides a comprehensive guide on creating and deploying an NGINX proxy Helm Chart on Kubernetes. It begins with an introduction to Helm and its benefits as a Kubernetes package manager, followed by prerequisites and instructions for setting up a Kubernetes cluster using Minikube. The article then details a step-by-step process for creating a Helm chart, including installing Helm, creating a new Helm chart, and modifying the chart templates for ConfigMap, Deployment, and Service. It explains how to deploy the Helm chart and verify the deployment, and includes sections on testing the deployment, troubleshooting common issues, updating and deleting the Helm release, and advanced configurations. Best practices for managing Helm charts and Kubernetes deployments are also discussed, making this guide a valuable resource for developers looking to streamline their Kubernetes application deployments.
-
Kubernetes errors: ImagePullBackOff, CrashLoopBackOff, CreateContainerConfigError, Kubernetes connection failed
Kubernetes is a powerful platform for managing containerized applications, but it can present challenges, such as common errors like ImagePullBackOff, CrashLoopBackOff, CreateContainerConfigError, and connection failures. This guide addresses these issues, offering solutions for diagnosing and resolving them to ensure smooth operation of your Kubernetes environment.
-
How to Create Deployments and Services in Kubernetes
Kubernetes has revolutionized how applications are deployed, scaled, and managed across a multitude of environments. It’s not just about running containers; it’s about creating a resilient infrastructure that can adapt to changing demands and ensure continuous availability. This guide will provide technical details and code snippets to help you leverage Kubernetes for deploying resilient applications.
-
How to create a Kubernetes Pod
TABLE OF CONTENTS Cluster Setup for Pod Creation Creating Pods: Imperative Approach Managing Pods Creating Pods: Declarative Approach Modifying Running Pods Conclusion FAQs Introduction to Kubernetes Pods Kubernetes Pods represent the most fundamental building block within a Kubernetes cluster. A Pod encapsulates one or more containers, their storage resources, a unique network IP, and options… Continue reading How to create a Kubernetes Pod
-
How to Set Up Kubernetes Cluster with Rancher
Here you will find detailed steps for creating a Kubernetes Cluster with Rancher. The first step is to log in to Rancher and click the Create button to start creating a new cluster…
-
Kubernetes Cluster Autoscaling with 🐄Rancher
Introduction The cluster autoscaler is a Kubernetes tool that increases or decreases the size of a Kubernetes cluster by adding or removing nodes, based on the presence of pending pods and node utilization metrics. The cluster autoscaler: Adds nodes to a cluster whenever it detects pending pods that could not be scheduled due to resource shortages. Removes…
-
How to deploy WordPress on Kubernetes via 🐄Ranchers.
Kubernetes is an open-source system for deploying, scaling and management architecture of any containerized app. Rancher is a tool for easy management of Kubernetes. What if we want to deploy our Wordpress on Kubernetes architecture? What we need to do exactly? In this article we will try to find out how to deploy Wordpress in simple way.
Linux
-
How to Use Linux Commands for Process Management
This article provides an in-depth overview of process management in Linux, covering the types and states of processes, including foreground, background, running, sleeping, stopped, and zombie states. It introduces essential commands like top, ps, kill, and nice for monitoring, managing, and prioritizing processes. Additionally, the article explores advanced tools and techniques, such as htop, signals, background process handling, process scheduling, and security considerations, offering a comprehensive guide for optimizing system performance and ensuring smooth and secure operation. This summary aims to equip readers with the knowledge needed for effective Linux system administration.
-
How to List Running Processes in Linux
This article offers a detailed guide on how to list and manage running processes in Linux, covering essential commands like ps, top, htop, atop, and pgrep. It explains the differences between real-time and static process monitoring, provides detailed explanations of process information, and offers advanced usage examples for filtering and managing processes. The article also highlights the importance of effective process management for maintaining system performance and security, and includes tips for troubleshooting common issues and avoiding pitfalls when handling processes. Whether you’re monitoring system resources or managing specific tasks, this guide equips you with the tools needed to efficiently manage processes in a Linux environment.
-
How to Add User to Linux Group
This article provides a comprehensive guide on managing user groups in Linux, focusing on how to add users to groups effectively. It covers essential commands such as adduser, usermod, and gpasswd, explaining their usage for modifying user group memberships. The article also delves into the importance of user and group IDs (UIDs and GIDs), the differences between primary and secondary groups, and best practices for maintaining a secure and well-organized system. Additionally, it highlights common pitfalls and troubleshooting tips to help users avoid errors and ensure smooth group management in Linux environments.
-
How to Copy Files and Directories in Linux
Copying files and directories in Linux is a fundamental task essential for data management and backup. This comprehensive guide covers the use of the cp command for basic copying needs, highlighting its various options for handling different scenarios, and the rsync command for more advanced tasks, including remote copying over SSH. The article provides step-by-step instructions, safety precautions to avoid data loss, and troubleshooting tips to handle common issues. By mastering these commands, users can efficiently manage and safeguard their data within the Linux filesystem.
-
Chown Command in Linux: How to Change File Ownership
The chown command in Linux is a powerful utility for changing the ownership of files and directories, essential for managing permissions and ensuring system security. This comprehensive guide covers everything from basic usage to advanced scenarios, including modifying ownership with user IDs, changing group ownership, and using recursion to apply changes to entire directories. Practical examples illustrate how to use chown effectively, and additional sections on common use cases, safety precautions, and combining chown with find provide valuable insights. The guide also highlights how to revert changes and manage symbolic links, making it an indispensable resource for Linux administrators.
-
How to Extract or Unzip .tar.gz Files in Linux
Learning how to extract or unzip .tar.gz files in Linux is crucial for effectively managing software packages and backups. This comprehensive guide covers the creation, listing, and extraction of .tar.gz archives using the tar command, which supports various compression algorithms like gzip. The article explains the syntax and options for extracting files to the current directory or a specific location, extracting specific files, and handling files with particular extensions. It also highlights alternative methods using gzip and gunzip, and provides steps for graphical extraction using a GUI. Understanding these processes is essential for handling common open-source package distributions and ensuring efficient file management in Linux environments.
-
How to Create a File in Linux
This article provides a step-by-step guide on creating files in Linux using the terminal. It covers various methods, including the `touch`, `echo`, `cat`, and `printf` commands, highlighting how each command can quickly generate and manage files without needing a graphical interface. By mastering these fundamental techniques, users can efficiently handle text files, scripts, and configuration files, enhancing their proficiency and versatility in Linux system management.
-
How to Restart/Reboot Linux Server
This article provides a beginner’s guide on how to restart a Linux server, which is necessary for regular maintenance, troubleshooting, and updating the system. The article explains four different methods to restart a Linux server, including the reboot command, shutdown command, init command, and systemctl command. To use these commands, users must have sudo or root access rights and launch the terminal via keyboard shortcut, applications menu, or SSH program for remote servers. The article also advises waiting for the reboot to finish as the restart time varies depending on the system’s hardware or resources.
-
How to Remove a Directory in Linux
This guide teaches users how to remove directories in Linux using the command line. The two main commands for removing directories are `rm` and `rmdir`, with `rm` capable of deleting entire directories and their contents, while `rmdir` is used for deleting empty directories. The `rm` command has various options such as `-f`, `-i`, `-I`, `-r`, `-d`, `-v`, `–help`, and `–version`, while `rmdir` has options such as `–ignore-fail-on-non-empty`, `-p`, `-v`, `–help`, and `–version`. The guide warns users to be cautious when using these commands, as they permanently delete directories without moving them to the Trash directory. The guide also advises against using the `rm -rf /` command, as it can have severe consequences and make the system inoperable.
-
How to Rename a Directory in Linux
Renaming directories is a common task in Linux, and there are multiple methods available for doing so through the terminal. The `mv` command is the most straightforward way to rename a single directory, while the `rename` command can be used to rename multiple directories simultaneously. The `find` command can also be used in conjunction with the `mv` command to locate and rename directories. Additionally, bash scripts can be used to automate the renaming process for multiple directories. Understanding how to rename directories is an essential skill for Linux administrators to maintain an organized and manageable file system.
MySQL
-
How to Allow Remote MySQL Connections
This tutorial guides users on how to allow remote connections to a MySQL database, which is particularly useful for businesses adjusting to a more distributed work environment. The three steps involved are modifying the MySQL configuration file, setting up the firewall, and establishing a remote MySQL server connection. The tutorial covers how to open the MySQL configuration file, modify the IP bind-address, and restart the MySQL service. It also provides instructions on how to configure the firewall to permit remote MySQL access using Uncomplicated Firewall (UFW), FirewallD, or iptables. Finally, the tutorial explains how to establish a remote MySQL server connection and create a new MySQL database that is remotely accessible. The article assumes that users have a command line or terminal window and root or sudo access on both local and remote workstations, and it recommends creating a secure SSH connection if direct access to the MySQL server is not available.
-
How To Create a New User and Grant Permissions in MySQL
This article provides a detailed guide on managing user accounts and permissions in MySQL, emphasizing the importance of database security and efficient access control. It covers the prerequisites for accessing a MySQL database, logging in as the root user, and creating new users with the `CREATE USER` command. Additionally, it explains how to grant, verify, and revoke user permissions, highlighting common permissions like CREATE, DELETE, DROP, INSERT, SELECT, UPDATE, and GRANT OPTION. The article underscores the necessity of assigning only essential permissions to users to maintain the security and integrity of the database.
-
How to Effectively Manage MySQL User Accounts: Creation, Deletion, and Privilege Handling
MySQL, with its robustness, flexibility, and ease of use, is a cornerstone in database management. Effective user account management is critical for ensuring database security and operational efficiency. This comprehensive guide aims to equip administrators with the necessary skills to manage MySQL user accounts, covering in detail creation, deletion, and privilege management.
NGINX
-
How to Redirect HTTP to HTTPS in Nginx
This article provides a comprehensive guide on configuring Nginx to redirect HTTP traffic to HTTPS, enhancing website security and user data protection. It details the necessary steps to edit the Nginx configuration file, including setting up server blocks to enforce secure connections. The guide also explains the importance of SSL encryption and covers potential issues like redirection loops. Overall, it serves as a valuable resource for administrators looking to secure their servers and comply with best practices in web security.
-
How to Install and Configure Nginx on CentOS 8
The article provides a comprehensive guide on installing and configuring Nginx on a CentOS 8 system, emphasizing its superiority in handling high traffic more efficiently than Apache. It details the prerequisites, installation process, and post-installation steps such as starting and enabling Nginx, managing the service through commands, and setting up necessary firewall rules to allow web traffic. It also touches on configuring Nginx and testing its setup to ensure everything is functioning correctly. This guide serves as a practical resource for tech professionals looking to leverage Nginx’s capabilities within the LEMP stack, highlighting its role as a crucial component for developing and hosting efficient, scalable web applications.
-
How to Configure NGINX to Proxy WebSockets
TABLE OF CONTENTS Basic Configuration for Proxying WebSockets Step-by-Step Instructions Secure WebSocket Proxy (WSS) Load Balancing WebSocket Connections Additional Configuration Options Conclusion FAQs WebSockets enable real-time, bidirectional communication between clients and servers, which is crucial for applications such as live chats, gaming platforms, and real-time data feeds. NGINX is a powerful web server that can… Continue reading How to Configure NGINX to Proxy WebSockets
-
PHP 7.4 to 8.0 on Ubuntu 20.04 with Nginx: The Upgrade
PHP 8.0 is a major upgrade to the PHP language that includes several new features and improvements. However, PHP 7.4 is the only version available in the official repository of Ubuntu 20.04 LTS. This article will walk you through upgrading PHP to version 8.0 and configuring Nginx to utilize it.
-
How to Modify Webpage Content on NGINX Proxy Using SUBS and Substitution Module
NGINX reverse proxy config example. Unlike a regular web server, Nginx does not make one thread for each request, but divides it into smaller structures of the same type, called working connections. Let’s review our before prepared NGINX configuration for the root directory and look at some examples of content changing
PHP
PostgreSQL
-
How to Create a Postgres User (All Methods)
This article will explore various methods for creating a user in PostgreSQL using the psql command-line tool, SQL statements, the createuser command, the pgAdmin graphical interface, and SQL scripts.
-
How to List All Databases in PostgreSQL
This tutorial provides a comprehensive guide on how to list all databases in PostgreSQL using various methods. The first method is using the psql command-line interface by executing the meta-command “\l” to display a comprehensive list of all databases stored on the server. The second method is retrieving a list of databases by querying the database names from the pg\_database catalog using the SELECT statement. The third method is using popular database clients like pgAdmin and DBeaver to view all databases on the PostgreSQL server through a user-friendly interface. Users can efficiently manage their PostgreSQL databases by following the step-by-step instructions in this guide.
-
How to Run PostgreSQL on Docker
This article provides a comprehensive guide on running PostgreSQL, a widely-used relational database management system, in Docker containers. It explains the advantages of using Docker for PostgreSQL, such as portability, isolation, simplicity, and version management. The tutorial covers two methods: using Docker Compose and a single Docker command. It includes detailed steps for setting up and managing PostgreSQL containers, from creating configuration files to running the PostgreSQL command-line interface. The article aims to demonstrate the convenience and efficiency of containerized PostgreSQL deployment, making it a suitable choice for development, testing, and production environments.
-
How to install Postgresql on Ubuntu 22.04
PostgreSQL is widely recognized as a leading database system. Its widespread use can be attributed in great part to its user-friendliness and open-source nature. Check out PostgreSQL’s docs to find out everything it’s capable of. This guide will teach you how to set up a PostgreSQL database in Ubuntu 22.04.