24%
04.08.2020
then shows the categories used by the devices, such as Cloud, Chat, and Web.
Alerts
As mentioned earlier, ntopng can generate alerts for certain events and for cases when thresholds are exceeded
24%
04.08.2020
_ADDR='http://127.0.0.1:8200'
The unseal key and root token are displayed below in case you want to
seal/unseal the Vault or re-authenticate.
Unseal Key: PrAbjZWj2NYYnV6Lh/FRpf5Nu5f2E5fwZZf95JQiLdo=
Root Token: s
24%
07.06.2019
. To make this solution future-proof, I left gaps between file names in case I have to add other files later that need to be launched at a specific stage.
Setting up the Jenkins host URL though JCas
24%
01.08.2019
_modules=cythonize("helloworld.pyx")
)
The first two lines are fairly standard for a Python setup.py file. After that, the setup command builds the binary (shared object). In this case, the command is to cythonize the helloworld.pyx file. To make
24%
01.08.2019
both the registry and auth server behind a proxy like Apache, Nginx, or HAProxy. In this case, the port number is omitted from the registry URLs, and you have to avoid two open ports on the server
24%
01.08.2019
to the respective system.
Although this sounds quite complicated in theory, it is simple in practice, as a basic example shows: Suppose FAI is being used on a company's workstations and servers. In this case, FAI
24%
01.08.2019
the video directly, which is a visual recording of two terminals.
The first step pulls down a public image (from the Docker Hub registry in this case) and saves the container image to your filesystem. I
24%
06.10.2019
that come directly out of the application. For this use case, GitLab delivers an agent in deployment that integrates into the application and implements the scans. Technically, this is done by Git
24%
11.10.2016
, because the run time detects that the changes already exist.
In the case of an embedded PowerShell resource, this contextual information is missing. Chef gets around this problem by introducing "guards
24%
05.12.2016
, system administrators can use them to track down problems.
One of the most obvious use cases for logger is to have production scripts enter information into the system log. For example, it could be part