16%
30.04.2013
(adding s3cmd
to the PATH) doesn’t have to be remembered. Most stuff on servers is just files, which is what makes puppet so useful.
Now for the following line:
require => Package
16%
30.05.2021
acceleration capabilities, if any, are available. This is quickly discovered with the command:
$ ec2metadata | grep instance-type
instance-type: p3.2xlarge
Variations of the ec2metadata tool query the AWS
16%
07.06.2019
= 50ms;
07 .interval = 3s;
08 .window = 10;
09 .threshold = 8;
10 }
11 }
12
13 set beresp.grace = 12h;
Changes on the Fly
The reverse proxy not only delivers web pages
16%
25.03.2020
ZJOUoUsZGlkk
client2:q0eL78zFrbnESW6c/F0qit5MNCpS8IBgyh1BdXiyyuI
client3:zkq8eT31Nib3IHWfp0yyu15BCW52VMbY8+LhVUt3ylA
The client uses the appropriate password in the /etc/stunnel/psk-client1.txt file:
client1:Wf
16%
12.09.2013
Barracuda firewall series. The X201 version (right) has a wireless interface.
An optional accessory available for all Barracuda firewalls is a 3G USB modem, which was developed by the manufacturer
16%
12.09.2013
everything it needs.
The key technology enabling this approach is LXC, or Linux Containers [3]. Unlike a hypervisor-based virtual machine like Xen, LXC doesn't provide a full virtual machine with hardware
16%
02.06.2020
a database server. Among other things, you can use it for fine-tuning, to monitor its vitals, and to design and execute a backup strategy. The appliance uses Prometheus [2] and Grafana [3] to collect
16%
09.04.2019
and is usually expressed as eights sets of four hexadecimal digits (known as nibbles, quibbles, or hextets) separated by colons. For example, an IPv6 address looks like this: 2001: 0db8: 1010: 61ab: f005: ba11: 00
16%
18.02.2014
on a host, moving it to another virtualization host, and continuing operations there with no noticeable hiccups in service from the user’s point of view, is the art of virtualization and is what separates
16%
20.08.2013
(Figure 3). In this way, you can also query websites, Outlook Web App, intranet sites, and SharePoint libraries.
Figure 3: Monitoring various protocols