17%
06.10.2019
Lab Runner
One basic building block of the GitLab CI architecture is the GitLab Runner [6]. According to the pull principle, a Runner communicates with the GitLab server via an API, executes declared jobs
17%
05.12.2019
of application X). That version 1.0 runs on pods 1 through 5 of the application and version 1.1 on pods 6 and 7 does not matter from Istio's point of view.
If you were to launch additional 1.0 or 1.1 pods
17%
14.03.2018
. The infrastructure also includes three LDAP servers, six NFS servers (based on Ceph), and two HAProxy load balancers. Monitoring is done via Graphite [5], with an Elasticsearch [6], Logstash [7], and Kibana [8] (ELK
17%
02.03.2018
provides a very good opportunity to try out the Azure Stack Development Kit (ASDK) [6] in a limited form. The limitations were chosen so that no productive solutions can be built with the ASDK
17%
02.03.2018
suggested that it works well for database systems that have TCQ-aware [6] disks.
CFQ
The completely fair queue (CFQ) I/O scheduler [7] is the current default scheduler in the Linux kernel. It uses both
17%
09.06.2018
ESXi 6.0 or higher and Docker v1.12 or later. VMware recommends version 1.13, or 17.03 if you want to use the "managed plugin" – the variant from the Docker store. If this is the case, the plugin
17%
17.07.2018
for Debian-based [5] and RPM-based [6] systems (except openSUSE). If you are brave, download the script and execute it immediately with:
curl -L | sudo bash
If you want to look into the script first
17%
09.06.2018
dashboards on the Internet, be sure to talk to your licensing department first.
A free trial version of the Report Server is available on the Power BI website [6]. By the way, your data does not have
17%
11.04.2016
-In Wizard [6] and the Azure Active Directory module for PowerShell [7] on an ADFS management server. A three-part series by Microsoft describes step by step the task of setting up the federation services
17%
13.06.2016
to the server according to the original protocol, everything looks completely normal on the server side. A tool that demonstrates such an attack was published in 2009 [6].
As a precaution, sensitive data should