Owner-operated. Open-source only.

Professional Linux System Administration Services

I help small and mid-sized businesses run reliable Linux infrastructure without vendor lock-in. Clear architecture, repeatable automation, and security you can verify—so operations stay stable and predictable.

Why Open Source

Open source means ownership: you control your data, your configuration, and your future roadmap. No hidden licensing traps and no “black box” systems that only one vendor can fix.

I build Linux-first environments that are documented, automated, and auditable. The goal is simple: fewer surprises in production and less time spent firefighting.

If your IT feels messy—too many tools, unclear responsibilities, missing documentation—I turn it into a clean, maintainable system with clear boundaries and repeatable operations.

Service Pillars

Automation & Orchestration

Repeatable builds and safe changes, driven by Ansible and Git.

  • Git-based change control & reviews
  • Idempotent automation with clear diffs
  • Reusable roles for multi-site consistency

Full-stack Builds & Monitoring

From bare metal/VMs to monitoring and day-2 operations.

  • Proxmox VE & PBS rollout and hardening
  • Monitoring/observability with alerting
  • Lifecycle management and standards

Security & Resilience

Hardening and recovery planning that actually gets tested.

  • Firewall/VPN segmentation and access control
  • Backups, restore tests, and recovery runbooks
  • Patch cadence + drift detection

Consulting, Audits & Support

Assessment, delivery, and ongoing support—no lock-in.

  • Health checks with actionable findings
  • Runbooks, handover, and team mentoring
  • Incident support when needed

Proof

Stabilised Operations for a Small Business

A growing environment with undocumented changes, inconsistent server setups, and recurring outages.

  • Standardised builds with Git-backed automation
  • Introduced monitoring, alerting, and clear ownership
  • Reduced incidents and improved recovery confidence

Security and Access Cleanup

Legacy access patterns, weak segmentation, and unclear audit trails across systems and accounts.

  • Tightened access control and hardened the perimeter
  • Improved credential handling and operational hygiene
  • Clear logs, documentation, and repeatable change process

How Engagements Work

01 Discovery Call

We clarify goals, constraints, and what “good” looks like.

02 Audit & Plan

You get a short written plan: risks, priorities, and the delivery approach.

03 Build & Automate

Implementation via Git-backed automation with clear change tracking.

04 Monitor & Support

Monitoring, documentation, handover—and optional ongoing support.

Contact

Email: support@source-admin.com

Timezone: Central Europe (CET / CEST)

Response time: within 24 hours during business days

Messages are reviewed manually. Expect a reply within one business day.