37%
11.02.2016
Advisor. Instead, other tools step in.
One of the tools that generates graphics from the statistics in InfluxDB is Grafana [5], a fork of Kibana [6] used in the ELK (Elasticsearch, Logstash, Kibana) stack. Grafana
37%
11.10.2016
://en.wikipedia.org/wiki/Open_Virtualization_Format
Virtual appliance: http://openswitch.net/documents/dev/quick-start-virtual
Virtual Disk Format 5.0: http://www.vmware.com/support/developer/vddk/vmdk_50_technote.pdf
ONIE: http://onie.org
Busy
37%
29.09.2020
] (offered by Rancher [5]), to build a Kubernetes cluster, and the Kubernetes package manager, Helm.
A great deal of information about where to begin with K3s can be found in one of my previous articles
37%
09.10.2017
_labels: [__meta_kubernetes_service_name]
action: replace
target_label: kubernetes_name
[...]
Prom Night
You can define graphs or alarms based on these labels with the powerful PromQL [5] query language
37%
30.11.2025
such as the codec, the open port (in the m
header), and the IP address or name of the hosts.
Listing 1
Invite Request with SIP and SDP
01 INVITE sip:bob@biloxi.com SIP/2.0
02 Via: SIP/2.0/UDP pc33
37%
27.09.2021
by the environment variable
-e WATCHTOWER_LABEL_ENABLE=1
during the docker run command.
To add the appropriate label to all other containers that you start before or after Watchtower, use:
-l com
37%
04.04.2023
the latest Perl script from the Git repository on GitHub. To prepare the tests, first clone the Git repository with the command:
git clone https://github.com/sullo/nikto.git
For this article, I assume
37%
05.12.2019
Authentication
Container Image repository, Docker Hub, has added Two Factor Authentication (2FA, https://docs.docker.com/docker-hub/2fa/) to its feature list. The feature falls in line with many other services
37%
06.10.2019
of processes for a user: https://red.ht/325Byl5
"Tune kernel overcommit behavior to avoid the dread OOM Killer" by Federico Lucifredi, ADMIN
, issue 10, pg. 94
oom_kill.c: https://elixir.bootlin.com
37%
05.08.2024
assigned to the onmicrosoft.com
cloud domain – but not to any user – and whose passwords are then stored securely for emergencies. Microsoft's suggestion is to write down these passwords on different pieces