18%
16.01.2013
-east-1d
Keypair: foocluster
EBS volumes:
vol-4c048437 on master:/dev/sda (status: attached)
vol-4f048434 on node001:/dev/sda (status: attached)
Cluster nodes:
master running i-6a10c710 ec2
18%
30.04.2013
=> installed
}
file { "/etc/update-motd.d/10-mymotd":
ensure => "present",
source => "puppet:///modules/mypuppets/misc/10-mymotd",
owner => 'root',
group => 'root
18%
10.04.2015
${WATCHMAN_ROOT}/$file
06 EL=$?
07 if [ $EL -eq 1 ]
08 then
09 # Virus found
10 echo "Virus found: ${WATCHMAN_ROOT}/$file" | \
mailx -s "Virus found" mail@example.com
11 elif [ $EL -eq
18%
05.08.2024
= ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules']
ansible python module location = /usr/lib/python3.11/site-packages/ansible
ansible collection location = /root
18%
30.01.2013
; and two libraries, Atlas 3.10.0 and Atlas 3.11.4. I start by putting modules for the two compilers in subdirectories from the root directory for modules (I’m assuming it is /opt/Modules
).
GNU 4
18%
09.06.2018
that was present during testing [3].
After installation, you can connect to the server via SSH. A direct connection as root is not possible; the configuration of SSH prohibits a direct login as root, and you should
18%
04.05.2022
Rapid7 security researchers have uncovered a serious Redis vulnerability (with a CVSS score of 10) that is affecting over 2,000 internet-facing servers. NIST describes the CVE as:
It was discovered
18%
16.08.2018
connected to br-ex (Listing 4).
Listing 3
The Management IP and Back End
[root@controller ~]# ip addr show br-ex
10: br-ex: mtu 1500 qdisc noqueue state
18%
07.01.2013
@kvmhost/system
08 image_delivery_uri: sftp://root@kvmhost/var/lib/libvirt/images
09 bus: virtio
10 overwrite: true
11 domain_type: kvm
This again simplifies the BoxGrinder command line to
17%
01.08.2012
Listing 1: Output of Installing numactl into VNFS
[root@test1 ~]# yum --tolerant --installroot /var/chroots/sl6.2 -y install numactl
Loaded plugins: fastestmirror, refresh-packagekit, security