Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (220)
  • Article (40)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 Next »

17%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © satori, 123RF.com
accessModes: 08 - ReadWriteOnce 09 resources: 10 requests: 11 storage: 10Gi In a pod definition, you then only reference the storage claim (lm-example-volume-claim) to make the volume
17%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
and 05 # dump it right back out to STDOUT. 06 07 # These are the standard environment variables. You can define 08 # more in your service config file (see above). 09 echo "Date Range: $LOGWATCH
17%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
installation of Kolab 3.0 and later is a matter of one or two cups of coffee and does not impose too many requirements on the admin. The Kolab developers recommend a recent CentOS (preferably 6.4) as the basis ... Open standards and open source are requisite in Kolab groupware. The alpha release of version 3.1 hugely extended the number of compatible clients with the CalDAV and CardDAV protocols, making Kolab
17%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+N3
17%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
": "0x0800" 07 } 08 }, "ip-match": { 09 "ip-protocol": 17 10 }, "ipv4-destination": "10.1.1.2/32", "udp-destination-port": 1234 11 }, "table_id": 0, "priority": 10 12
17%
Swagger and OpenAPI Specification for documents
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © smeagorl, 123RF.com
The echo server simply returns **every** value. 08 schemes: 09 - http 10 host: mazimi-prod.apigee.net 11 basePath: /echo 12 paths: 13 /test: 14 get: 15 responses: 16 200: 17
17%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
_httpboot 03 local bifrost_ironic 04 local bifrost_mariadb 05 local bifrost_tftpboot 06 07 # ll -h /var/lib/docker/volumes/bifrost_httpboot/_data/ 08 [...] 09 -rw-r--r-- 1 42422 42422 6.1G Mar 2 10
17%
Ansible as an alternative to the Puppet configuration tool
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Jenzig, photocase.com
state=absent 07 notify: Restart Apache 08 09 - name: Generate Vhosts 10 template: 11 src=vhost.conf 12 dest=/etc/apache2/sites-enabled/{{ item.hostname }}.conf 13 with_items: vhosts 14
17%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
_init_remote(&unw_cursor, g_unw_as, unw_ctx)); 05 06 /* - Search - */ 07 bool found_stack_entry = false; 08 do { 09 unw_word_t ip = 0; 10 unw_get_reg(&unw_cursor, UNW_REG_IP, &ip); 11 12 Dwfl_Module* module = dwfl
17%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
environment provides impressions of the insights Prometheus delivers into a Kubernetes installation. The Prometheus configuration is oriented on the official example [3]. When querying metrics from

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice