Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (532)
  • Article (145)
  • News (102)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 79 Next »

21%
Service discovery, monitoring, load balancing, and more with Consul
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Ringizzz, 123RF.com
", 13 "log_level": "INFO", 14 "node_meta": { 15 "APPLICATION": "consul", 16 "DATACENTER": "Datacenter-A", 17 "NAME": "Datacenter-A-consul", 18 "SERVICE": "consul
21%
Vagrant, Serf, Packer, and Consul create and manage development environments
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © 36clicks, 123RF.com
_wait_timeout": "30s", 08 "shutdown_command": "echo 'Done' | sudo -S shutdown -h now" 09 }], 10 "provisioners": [{ 11 "type": "shell", 12 "inline": [ 13 "sleep 30", 14 "sudo apt-get update", 15
21%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
. The polling intervals are usually between 5 and 60 seconds; the default is 15 seconds. The metrics are transmitted via HTTP if you use a browser. Prometheus uses the more efficient protocol buffer internally
21%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
permission they want to the created machine. In this case, the attacker passes the FullS3bucket access to the instance and the curl command: $ curl http://169.254.169.254/l2021-07-15/meta
21%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Larisa Birta on Unsplash
>" 13 } . . . 14 ] 15 } Before I describe the procedure further, note that if you want to integrate your cmdlet into the calling conventions of PowerShell, you will need to restrict
21%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
] and unpack to your hard disk, revealing the lightweight otto program, which weighs in at just 15MB. Although you can call it directly – there is no need to install – HashiCorp does recommend adding otto
21%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
:1206065071(0) win 512 9a:d7:d9:6a:fd:ee 9b:e8:7:15:e4:1d 0.0.0.0.44381 > 0.0.0.0.7072: S 352131538:352131538(0) win 512 42:33:77:69:9b:65 ef:3b:4c:19:e2:bd 0.0.0.0.24920 > 0.0.0.0.19837: S 1039619585
21%
Shell practice: Introduction to the sed stream editor
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Dmitriy Sladkov, 123RF.com
.04.1988 26 March 1989 15 April 1990 31-March-1991 19 April 1992 11 April 1993 3 April 1994 16. April 1995 7 April 1996 30 March 1997 12 April 1998 Regular Expressions Regular expressions are used
21%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
# Optional list of hosts which acts as a storm DRPC server 15 # drpc.servers: 16 # - "localhost" If you want to use a multihosting environment, you will need some additional settings. Using storm
21%
OpenSMTPD makes mail server configuration easy
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © alphaspirit, 123RF.com
:/etc/smtpd_remote.db 04 listen on 192.0.2.15 inet4 port 25 hostname post.example.org tls pki post 05 listen on 192.0.2.15 inet4 port 587 hostname mail.example.org tls-require pki mail auth tag remote 06 listen

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 79 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice