18%
05.12.2016
back to sleep.
Listing 2
nginx_repl.yaml
01 apiVersion: v1
02 kind: ReplicationController
03 metadata:
04 name: nginx
05 spec:
06 replicas: 3
07 selector:
08 app: nginx
09
18%
14.08.2017
such as containers. In native cloud environments, Prometheus [3], with its time series database approach, has therefore blossomed into an indispensable tool. The software is related to the Kubernetes [4] container
18%
18.07.2013
=> installed
04 }
05 file { "/etc/update-motd.d/10-mymotd":
06 ensure => "present",
07 source => "puppet:///modules/mypuppets/misc/10-mymotd",
08 owner => 'root',
09 group => 'root',
10
18%
29.09.2020
at the blog [3] reveals that new versions of Cockpit are released approximately every two weeks.
In an article from 2015 [4], ADMIN
looked into the topic of managing Linux servers with Cockpit; since then
18%
04.04.2023
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database.
Figure 1: An image scan with Trivy generates a long list of vulnerabilities
18%
14.03.2013
details as well [3]. The files in the Linux /proc directory also have a pleasingly hackable penchant for being directly readable as plain text, as opposed to more binary-centric proc implementations
18%
03.02.2022
,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25,57
26,58
27,59
28,60
29,61
30,62
31,63
The lstopo tool
18%
30.11.2025
the smoke and mirrors that some pieces of software employ to keep their workings secret, fail2ban is transparent in the work it does behind the scenes.
In simple terms, fail2ban [3] keeps a close eye on your
18%
30.01.2020
of email addresses:
^[a-zA-Z0-9.!#$%&'*+/=?^_`{|}~-]+@[a-zA-Z0-9-]+(\.[a-zA-Z0-9-]+)*$
When you see a string like this for the first time, the semantics are not immediately apparent, but regular
18%
12.05.2020
.04"
],
"RepoDigests": [
"nvidia/cuda@sha256:3cb86d1437161ef6998c4a681f2ca4150368946cc8e09c5e5178e3598110539f"
],
"Parent": "",
"Comment": "",
"Created": "2019-11-27T20