41%
15.06.2016
will be used. To make the values survive reboots, you need to enter them in the proper form in the /etc/sysctl.conf
file.
Just be aware that increasing the buffer sizes doesn't necessarily mean performance
41%
17.02.2015
into question.
Conventional resolvers do not detect such problems. Only DNSSEC-enabled ones notice DNSSEC errors and suppress the response. If /etc/resolv.conf lists multiple resolvers, then they all need
41%
10.04.2015
the mibs : line in the /etc/snmp/snmp.conf file.
At Hochlland, I was mainly interested in a couple of things: Can all the devices still be reached? How many WLAN clients are connected to the individual APs
41%
05.02.2019
offers almost infinite tuning possibilities, as shown here in ceph.conf, but Rook does not abstract them all.
Changing the Controlled Replication Under Scalable Hashing (CRUSH) map is a good example
41%
30.11.2020
in text files with the keyword content. To ensure that the GDPR
string occurs in /etc/motd, you have to combine the contains keyword with a regular expression:
describe file('/etc/postgresql/9.1/main/pg_hba.conf
41%
27.09.2021
by the st2 service, which you will find in /opt/stackstorm/st2. This service is configured by the associated configuration file /etc/st2/st2.conf. StackStorm has its own web GUI, which can be found
41%
28.11.2021
access to specific principals.
Listing 5
Certificate Entries in sshd_conf
HostCertificate /etc/ssh/server.example.com-cert.pub
TrustedUserCAKeys /etc/ssh/ca_root_key.pub
Authorized
41%
02.08.2022
the appropriate permissions:
chown -R nginx. /etc/nginx/cert/*
In the default /etc/nginx/nginx.conf configuration file, simply enable the commented out # Settings for a TLS enabled server section and add
41%
28.11.2022
that need the Librados API for low-level access to the RADOS service, or even depend on /etc/ceph/ceph.conf existing and containing the correct addresses for the MON servers, will not work.
In other words
41%
25.03.2021
a configuration file named /etc/modsecurity/modsecurity.conf. However, that's it for the easier part of the setup. The mod_security2 module is extremely powerful, so I can only provide a brief overview