13%
05.12.2019
, the LXSS Manager cleaned up the respective Linux instance, which meant it was not possible to run background processes. However, Microsoft has since added this option [3]. If processes are still active
13%
30.01.2020
other over one or more Inter-Switch Link (ISL) connections connected in parallel. With this FC transport layer method – service class 3 (connectionless without acknowledgement) optimized for mass storage
13%
30.01.2020
subpages on the FAI website for cloud images [3] and bare metal [4]. Both pages are quite straightforward.
Clouds
If you look at the cloud page, you only have a few – really important – parameters to set
13%
22.12.2017
online [3].
DebOps – Hands On
To get started, you'll need at least two Debian systems that are newly installed and are still plain vanilla. In theory, this example would also work with a single host
13%
22.12.2017
is InSpec.
InSpec is available under a free license and is free for download from Chef's GitHub directory [3]. It supports a variety of target systems: Linux is represented by CentOS, RHEL, SLES, Debian
13%
14.03.2018
service ensures that virtual setups expand and contract as needed; the provider markets the corresponding functionality under the name Auto Scaling [3]. However, it is practically impossible to use
13%
05.02.2019
built by VulcanoSec [2] to monitor compliance standards automatically, was acquired by Chef.
Earlier versions of InSpec discussed in ADMIN
[3] proved to be extremely powerful. With the use of a special
13%
05.02.2019
discovery.
3. Network. With networking configured on an instance, this stage runs the disk_setup and mounts modules and configures mount points.
4. Config. This stage runs modules included in the cloud
13%
07.06.2019
little, even if some functions are implemented or named differently on one side or the other. Whether you rely on Kubernetes or Swarm is a matter of taste.
Nomad
Nomad [3], developed by HashiCorp, takes
13%
10.06.2015
6105) [3] and DHCPv6-Shield [4]. These functions are implemented on switches and referred to as First Hop Security. SEND (Secure Neighbor Discovery) [5] is an approach that relies on cryptographically