36%
29.09.2020
of 10 is addressed more often than a DC with a weighting of 5. In other words, you can relieve the load on individual DCs by adjusting the weighting. This procedure is also useful if you want to replace
36%
29.09.2020
.
Figure 4: Octant, a VMware tool for Kubernetes, supplies admins a quick overview, even across several Kubernetes setups simultaneously. © VMware
Last but not least, do not forget Sonobuoy (Figure 5
36%
29.09.2020
setup is a Ceph cluster with about 2.5PB gross capacity that is mainly used for OpenStack. When you start a virtual machine that uses an RBD image stored in Ceph as a hard drive for the root filesystem
36%
30.11.2020
: profile
title: InSpec profile to check /etc/motd
maintainer: Martin Gerhard Loschwitz
copyright: Hutchison Drei Austria GmbH
copyright_email: martin.loschwitz@drei.com
license: Apache-2.0
summary: Tests
36%
30.11.2020
it is based on the open source project Nebraska (Figure 5).
Figure 5: Kinvolk is based on Nebraska and offers a central update service for Flatcar Linux
36%
02.02.2021
, I use a YubiKey NFC (near-field communication) stick, version 5, and a fairly new Android smartphone. The YubiKey is directly detected on Linux as Yubico YubiKey OTP+FIDO+CCID
, which you can reveal
36%
02.08.2021
Bootloader iPXE" by Schlomo Schapiro, Linux Magazine
, issue 167, October 2014; pg. 56, https://www.linuxpromagazine.com/Issues/2014/167/iPXE
Blog post by Nathan Goulding: https://metal.equinix.com
36%
02.08.2021
ChangesRejected: 7
PasswordSetsRejected: 5
...
Conclusions
This AD PowerShell exploration shows that you can automate common searches and tasks with very little overhead and create tiny scripts that you store
36%
27.09.2021
-line interface (CLI) for FRR daemons, vtysh [5]. The shell is based on the classic NOS. If you use Cisco Internetwork Operating System (IOS), you will be able to find your way around quickly because the syntax
36%
11.06.2014
, the connection is opened with, for example:
virt-manager -c qemu+ssh://root@example.com/system
For security reasons, the SSH server should require a user login and reject root. As a compromise, you could go