Skip to content

Commit 4f33491

Browse files
Merge pull request #7357 from nmelehan-akamai/rc-v1.390.0
[Release] v1.390.0
2 parents 44fc41f + 238d243 commit 4f33491

File tree

21 files changed

+252
-15
lines changed
  • archetypes
  • docs
    • guides
      • applications/cloud-storage/understanding-storage-solutions
      • security/vulnerabilities
        • hackersploit-note-shortguide
        • hackersploit-red-team-series
        • linux-defense-evasion-hiding-linux-processes
        • linux-red-team-defense-evasion-rootkits
        • linux-red-team-exploitation-techniques
        • linux-red-team-persistence-techniques
        • linux-red-team-privilege-escalation-techniques
        • red-team-adversary-emulation-with-caldera
        • red-team-reconnaissance-techniques
        • windows-red-team-credential-access-with-mimikatz
        • windows-red-team-defense-evasion-techniques
        • windows-red-team-exploitation-techniques
        • windows-red-team-lateral-movement-techniques
        • windows-red-team-persistence-techniques
        • windows-red-team-privilege-escalation-techniques
    • marketplace-docs/guides/filecloud

21 files changed

+252
-15
lines changed

archetypes/content.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ slug: {{ path.Base .File.Dir }}
33
title: "{{ replace (path.Base .File.Dir) "-" " " | title }}"
44
description: "Two to three sentences describing your guide."
55
og_description: "Optional two to three sentences describing your guide when shared on social media. If omitted, the `description` parameter is used within social links."
6-
authors: ["Linode"]
7-
contributors: ["Linode"]
6+
authors: ["Akamai"]
7+
contributors: ["Akamai"]
88
published: {{ now.Format "2006-01-02" }}
99
keywords: ['list','of','keywords','and key phrases']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'

archetypes/marketplace.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: "Deploy ___App_Name___ through the Linode Marketplace"
33
description: "Two to three sentences describing your guide."
44
og_description: "Two to three sentences describing your guide when shared on social media. Delete this if not needed."
5-
authors: ["Linode"]
6-
contributors: ["Linode"]
5+
authors: ["Akamai"]
6+
contributors: ["Akamai"]
77
published: {{ now.Format "2006-01-02" }}
88
keywords: ['list','of','keywords','and key phrases']
99
tags: ["marketplace", "linode platform", "cloud manager"]

archetypes/section.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Section Title
33
description: "A text passage which will appear below the title of the section on the section's page."
44
og_description: 'Two to three sentences describing your guide when shared on social media.'
5-
authors: ["Linode"]
6-
contributors: ["Linode"]
5+
authors: ["Akamai"]
6+
contributors: ["Akamai"]
77
published: {{ now.Format "2006-01-02" }}
88
keywords: ["keyword1", "keyword2"]
99
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'

archetypes/shortguide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "{{ replace .TranslationBaseName "-" " " | title }}"
33
description: 'Two to three sentences describing your guide.'
44
keywords: []
55
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
6-
contributors: ["Linode"]
6+
contributors: ["Akamai"]
77
published: {{ now.Format "2006-01-02" }}
88
modified: {{ now.Format "2006-01-02" }}
99
headless: true
Lines changed: 182 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,182 @@
1+
---
2+
slug: understanding-storage-solutions
3+
title: "Understanding Storage Solutions"
4+
description: "This guide connects the storage architectures requirements of modern applications (data types, access patterns, and performance) to available storage solutions."
5+
authors: ["Akamai"]
6+
contributors: ["Akamai"]
7+
published: 2025-10-30
8+
keywords: ['storage solutions','block storage','object storage','managed databases','akamai netstorage','akamai edgekv']
9+
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
10+
---
11+
12+
Modern applications require diverse storage architectures to handle different data types, access patterns, and performance requirements. Selecting the wrong storage solution can lead to performance bottlenecks, unnecessary costs, and limits that make it hard to grow.
13+
14+
Akamai's portfolio includes multiple storage technologies, each optimized for specific use cases. This analysis covers block storage, object storage, managed databases, Akamai NetStorage, and EdgeKV to help you make informed architectural decisions.
15+
16+
## Block Storage
17+
18+
Block storage partitions data into fixed-size blocks stored on attached volumes. To be used, these volumes must be mounted to compute instances as virtual disks. They provide low-level storage that operating systems can format with any file system.
19+
20+
Block storage delivers consistent, fast response times and high input/output performance, making it suitable for structured workloads requiring frequent read/write operations. The direct-attached nature ensures consistent performance because volumes connect to instances over the data center's high-speed internal network rather than the public internet. This reduces latency and provides predictable I/O operations.
21+
22+
[Akamai's Block Storage service](https://www.linode.com/products/block-storage/) attaches directly to Akamai compute instances, providing persistent storage that survives instance lifecycle changes. Volumes can be resized, detached, and reattached as needed.
23+
24+
### Primary Use Cases for Block Storage
25+
26+
- Persistent storage for virtual machines
27+
- Operating system boot volumes
28+
29+
{{< note >}}
30+
Not all providers use block storage for boot volumes. For example, Akamai compute instances use bundled storage for boot, with block storage used for additional capacity.
31+
{{< /note >}}
32+
33+
### Block Storage Cost Structure
34+
35+
[Akamai Block Storage pricing](https://www.linode.com/pricing/#block-storage) is based on allocated storage space per month, regardless of actual usage or access frequency. This predictable pricing model simplifies capacity planning.
36+
37+
## Object Storage
38+
39+
Object storage treats data as discrete objects, each containing the data payload, metadata, and a unique identifier. This S3-style storage architecture uses a flat namespace that differs fundamentally from traditional hierarchical file systems. Objects are accessible via HTTP-based APIs and S3-compatible tools, such as [s3cmd](https://s3tools.org/s3cmd).
40+
41+
This architecture works well with unstructured data--including images, videos, backups, and log files. Object storage systems scale up easily, and they can offer additional durability if users choose to replicate their data across multiple servers and geographic regions.
42+
43+
[Akamai Object Storage](https://www.linode.com/products/object-storage/) provides S3-compatible APIs, and users can store data copies in multiple locations for backup and speed. The service integrates seamlessly with existing S3-compatible tools and workflows. For Akamai Object Storage, the [Linode CLI](https://techdocs.akamai.com/cloud-computing/docs/using-the-linode-cli-with-object-storage) can also be used to access objects.
44+
45+
### Primary Use Cases for Object Storage
46+
47+
- Static website assets (CSS, JavaScript, images)
48+
- Media storage and content delivery
49+
- Data archival and disaster recovery
50+
- Application backups and logs
51+
52+
### Object Storage Cost Structure
53+
54+
[Pricing for object storage](https://www.linode.com/pricing/#object-storage) is typically charged per GB stored, plus data transfer fees. This model offers cost efficiency for large-scale storage requirements, backed by high durability guarantees.
55+
56+
## Managed Databases
57+
58+
Databases differ from general storage by providing a managed query layer and enforcing relationships among structured data. They optimize for relational or document-based operations rather than simple file storage.
59+
60+
Database software handles indexing, consistency guarantees, and transaction processing. They provide query languages (SQL, NoSQL APIs) and manage complex operations like joins, aggregations, and concurrent access control.
61+
62+
Managed database services provision databases in the cloud so that users don't have to install and maintain the software on compute instances. Akamai offers [managed PostgreSQL and MySQL databases](https://www.linode.com/products/databases/) with automated backups, scaling, and maintenance. These services handle database maintenance for you while providing high availability.
63+
64+
### Primary Use Cases for Managed Databases
65+
66+
- Web and mobile application backends
67+
- Real-time analytics and reporting
68+
- Business data modeling and relationships
69+
- Applications requiring ACID compliance for reliable transactions
70+
71+
### Managed Database Cost Structure
72+
73+
Managed databases include compute resources, storage, maintenance, and monitoring in their [pricing](https://www.linode.com/pricing/#databases). Higher costs reflect the additional services: automated backups, scaling capabilities, and guaranteed availability.
74+
75+
## Akamai NetStorage
76+
77+
[NetStorage](https://techdocs.akamai.com/netstorage/docs/welcome-to-netstorage) is Akamai's established object storage solution that predates the S3 era. It stores files as objects and delivers them via HTTP, similar to modern object storage systems. The service integrates tightly with Akamai's CDN infrastructure, which is optimized for media files and content distribution. NetStorage serves as origin storage for CDN-delivered content.
78+
79+
A key feature of NetStorage is automatic content replication across geographical regions. This keeps the stored content available at all times, even if one area is hit by a power outage or some sort of network congestion.
80+
81+
### Primary Use Cases for Akamai NetStorage
82+
83+
- Media content origin storage for CDN delivery
84+
- Software distribution and updates
85+
- Large file hosting for global audiences
86+
87+
### Akamai NetStorage Cost Structure
88+
89+
NetStorage pricing is calculated based on the amount of data stored (either by GB stored or by average GB stored).
90+
91+
## Akamai EdgeKV
92+
93+
[EdgeKV](https://www.akamai.com/products/edgekv) provides a distributed key-value store for edge computing applications. Unlike traditional storage solutions, EdgeKV stores small pieces of data close to users, powering edge-native architectures for the fastest possible access. EdgeKV is sold separately from [EdgeWorkers](https://www.akamai.com/products/serverless-computing-edgeworkers), but it requires EdgeWorkers to function.
94+
95+
This service handles configuration data, user preferences, authentication tokens, and other small pieces of information that applications need quickly. EdgeKV is not suitable for large or persistent data storage.
96+
97+
### Primary Use Cases for Akamai EdgeKV
98+
99+
- Configuration data and application settings
100+
- User preferences and personalization data
101+
- Authentication tokens and session data
102+
- Feature flags and A/B testing variables
103+
- Small cache values for edge applications
104+
105+
### Akamai EdgeKV Cost Structure
106+
107+
Pricing for EdgeKV is based on the number of operations (reads, writes, deletes, lists) performed, as well as the size of objects (measured in GB) held in durable storage.
108+
109+
## Choosing the Right Solution
110+
111+
When selecting storage for your applications, it is essential to evaluate several key factors. The right choice depends on what your enterprise requires across this mix of factors. The table below provides a concise overview of those factors:
112+
113+
| Storage Type | Data Structure | Performance Profile | Durability | Scalability |
114+
| :---- | :---- | :---- | :---- | :---- |
115+
| Object Storage | Objects with metadata | High throughput, eventual consistency | High (replicated) | Very high |
116+
| Block Storage | Fixed-size blocks | Consistent and predictable for moderate I/O needs | High (persistent) | Scales with instance |
117+
| Managed Databases | Structured (tables, docs) | High consistency, indexed queries | High (redundant \+ backups) | Scales vertically and horizontally |
118+
| Akamai NetStorage | Object-like | Optimized for media workflows and software downloads | High | High |
119+
| EdgeKV | Key-value pairs | Ultra-low latency at the edge | Medium | Edge-scaled |
120+
121+
### Data Type and Structure
122+
123+
Consider this table to map your applications' data types to storage solutions:
124+
125+
| Requirement | Recommended Solution |
126+
| :---- | :---- |
127+
| Structured data with relationships | Managed Databases |
128+
| Unstructured files (images, videos, backups) | Object Storage |
129+
| File system access for applications | Block Storage |
130+
| Small configuration values | EdgeKV |
131+
132+
### Access Patterns
133+
134+
Consider this table to map your applications' access patterns (frequency of access, type of operations) to storage solutions:
135+
136+
| Requirement | Recommended Solution |
137+
| :---- | :---- |
138+
| Frequent updates and writes | Block Storage, Managed Databases |
139+
| Infrequent reads with high durability | Object Storage |
140+
| Fast access to small data worldwide | EdgeKV |
141+
| Software/media delivery and CDN integration | NetStorage |
142+
143+
### Performance Requirements
144+
145+
Consider this table to map your applications' speed and consistency requirements to storage solutions:
146+
147+
| Requirement | Recommended Solution |
148+
| :---- | :---- |
149+
| Fastest response times for databases | Block Storage |
150+
| High throughput for large files | Object Storage |
151+
| Ultra-fast edge access | EdgeKV |
152+
| Optimized media delivery | NetStorage |
153+
154+
### Integration and Compatibility
155+
156+
Consider this table to map existing tools and infrastructure you may already be using to storage solutions:
157+
158+
| Requirement | Recommended Solution |
159+
| :---- | :---- |
160+
| Direct attachment to servers | Block Storage |
161+
| S3-compatible tools and APIs | Object Storage |
162+
| Database drivers and connection pooling | Managed Databases |
163+
| CDN and content delivery workflows | NetStorage |
164+
165+
### Budget Considerations
166+
167+
Consider this table to map your cost structures and budget priorities to storage solutions:
168+
169+
| Requirement | Recommended Solution |
170+
| :---- | :---- |
171+
| Lowest cost at scale | Object Storage |
172+
| Predictable monthly costs | Block Storage |
173+
| Full-service management included | Managed Databases |
174+
| Integrated CDN pricing | NetStorage |
175+
176+
## Conclusion
177+
178+
Each storage solution addresses specific architectural requirements. Object storage excels for unstructured data at scale, while block storage provides high-performance attached storage. Managed databases handle complex data relationships, and NetStorage integrates with CDN workflows.
179+
180+
Evaluate your data characteristics, access patterns, performance requirements, and budget constraints before making storage decisions. The optimal choice aligns with your application architecture, scalability objectives, and operational requirements.
181+
182+
For applications that require modern object storage capabilities, Akamai Object Storage offers S3-compatible APIs with geographic distribution and competitive pricing.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
slug: hackersploit-note-shortguide
3+
title: "HackerSploit Red Team Series Deprecated Note"
4+
description: "A note that instructs readers the original repository is no longer available on the internet."
5+
authors: ["Linode"]
6+
contributors: ["Linode"]
7+
published: 2025-09-01
8+
keywords: []
9+
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
10+
headless: true
11+
show_on_rss_feed: false
12+
---
13+
{{< note type="note" >}}
14+
This series has been deprecated. The original repository is no longer available on the internet, and the link has been removed.
15+
{{< /note >}}

docs/guides/security/vulnerabilities/hackersploit-red-team-series/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
The rate of data breaches and APT attacks has been rapidly increasing during the period of COVID-19. Organizations are starting to recognize that their IT infrastructure has weaknesses and vulnerabilities, at great expense to their operations and customer data. For medium to large enterprise organizations, a defense-in-depth strategy that includes testing your defenses is required. This is where red teaming comes into play.

docs/guides/security/vulnerabilities/linux-defense-evasion-hiding-linux-processes/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1415

16+
{{% content "hackersploit-note-shortguide" %}}
17+
1518
{{% content "hackersploit-caution-shortguide" %}}
1619

1720
## Before You Begin

docs/guides/security/vulnerabilities/linux-red-team-defense-evasion-rootkits/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1415

16+
{{% content "hackersploit-note-shortguide" %}}
17+
1518
{{% content "hackersploit-caution-shortguide" %}}
1619

1720
## Before You Begin

docs/guides/security/vulnerabilities/linux-red-team-exploitation-techniques/index.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1415

16+
{{% content "hackersploit-note-shortguide" %}}
17+
1518
{{% content "hackersploit-caution-shortguide" %}}
1619

1720
## MITRE ATT&CK Exploitation and Initial Access Techniques
@@ -202,7 +205,7 @@ It is possible to use the Kali Linux GUI in VirtualBox to perform the instructio
202205

203206
## Port Scanning
204207

205-
The first step in the exploitation phase involves scanning the target server for open ports. The scan lists the services and their respective service versions running on the open ports. Port scanning was briefly explored in the [reconnaissance phase](/docs/guides/red-team-reconnaissance-techniques/). This section shows how to scan open ports and perform enumeration in more detail with the nmap tool.
208+
The first step in the exploitation phase involves scanning the target server for open ports. The scan lists the services and their respective service versions running on the open ports. This section shows how to scan open ports and perform enumeration in more detail with the nmap tool.
206209

207210
### Port Scanning with nmap
208211

@@ -276,7 +279,7 @@ Nmap done: 1 IP address (1 host up) scanned in 47.02 seconds
276279
| 111 | RPC |
277280
| 55995 | RPC |
278281

279-
We are also able to deduce from the service version banners that the target is running Debian. This information is relevant during the [privilege escalation phase](/docs/guides/linux-red-team-privilege-escalation-techniques/).
282+
We are also able to deduce from the service version banners that the target is running Debian.
280283

281284
## Web Server Enumeration
282285

@@ -561,8 +564,7 @@ The kernel version on the target system can be found by running:
561564

562565
uname -a
563566

564-
The output shows the target system is running an outdated kernel. This information is useful during the [privilege escalation phase](/docs/guides/linux-red-team-privilege-escalation-techniques/):
565-
567+
The output shows the target system is running an outdated kernel.
566568
{{< output >}}
567569
Linux Raven 3.16.0-6-amd64 #1 SMP Debian 3.16.57-2 (2018-07-14) x86_64 GNU/Linux
568570
{{< /output >}}
@@ -693,8 +695,7 @@ mysql>
693695

694696
We have now been able to obtain an initial foothold on the target system and take control of the MySQL database server. The next steps for targeting Linux systems include:
695697

696-
- [Elevating your privileges on the target system](/docs/guides/linux-red-team-privilege-escalation-techniques/)
698+
- Elevating your privileges on the target system
697699

698-
- [Establishing persistence to maintain access](/docs/guides/linux-red-team-persistence-techniques/)
700+
- Establishing persistence to maintain access
699701

700-
Visit the [HackerSploit Red Team parent page](/docs/guides/hackersploit-red-team-series/) to navigate to other parts of this guide series.

0 commit comments

Comments
 (0)