24%
04.04.2023
.
The Shell Approach
The following example assumes you have a host machine running Ubuntu Linux 22.04 with Java installed. Besides Java, you need Nmap network scanner version 7.80 or newer and the Ncrack
24%
28.11.2022
(e.g., from Ubuntu 20.04 to Ubuntu 22.04 at Canonical). If you run and are familiar with a defined set of services on your systems, you will reach your objectives far faster with classic packages than
24%
09.01.2013
/haproxy/www.example.com.pem
22 mode http
23 option httpclose
24 option forwardfor
25 reqadd X-Forwarded-Proto:\ https
26 default_backend web_server
27
28 backend web_server
29 mode http
30 balance roundrobin
31
24%
19.10.2012
12-core AMD processors ranging in speed from 2.2 to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per node.
Getting applications running POD HPC clouds can be quite
24%
08.07.2018
a range of hosts on the command line:
$ pdsh -w host[1-11] uname -r
$ pdsh -w host[1-4,8-11] uname -r
In the first case, pdsh
expands the host range to host1
, host2
, host3
, etc., through host11
24%
02.02.2021
with the appropriate value to the entries in roles. The role's name matches that of the folder in the roles/ directory (Figure 3).
Figure 3: The Playbook
24%
16.08.2018
., through host11
. In the second case, the hostlist expands to host1
, host2
, host3
, host4
, host8
, etc., through host11
. The pdsh website has more information on hostlist expressions [3]. Being able
24%
19.11.2019
, ioengine=libaio, iodepth=32
fio-3.12
Starting 1 process
Jobs: 1 (f=1): [w(1)][100.0%][w=475MiB/s][w=122k IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=1634: Mon Oct 14 22:18:59 2019
write: IOPS=118k, BW=463Mi
24%
05.02.2023
update after appropriate testing. Image tags let you to specify only the major or minor releases (e.g., mariadb:10 or mariadb:10.8.3). However, a setup like this with a "generic" database server that many
24%
10.06.2015
] on its laptops that allows the software to steal web traffic using man-in-the-middle attacks.
When you use an encrypted filesystem or SEDs [3], all of the data is encrypted. However, if you forget