Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (475)
  • Article (139)
  • News (41)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 67 Next »

43%
Automating network hardware
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © Rajesh Rajendran Nair, 123RF.com
automation at Cisco is based on Cisco Application Centric Infrastructure (ACI), which is actually a software-defined network solution; however, it is also capable of configuring Cisco hardware (Figure 2
43%
Troubleshooting and maintenance in Ceph
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © KrishnaKumar Sivaraman, 123RF.com
not actually fail themselves. This situation can happen, for example, if the network devices connecting the nodes fail. In this case, the cluster nodes then no longer see each other. If a monitoring server can
43%
Monitoring network computers with the Icinga Nagios fork
17.06.2011
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
the host and service should be running, if messages should be sent for this service in the current time slot, and what the contacts linked to the service actually want. Each contact can define its own rules
43%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
production Kubernetes setups (Figure 3). This concept is easy to understand when you think about what Rancher actually is. Figure 3: Rancher can roll out fully
43%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
as I did (load_avg[0] , load_avg[1] , and load_avg[2] ). Note that I added some code to the beginning of the script to make sure the modules were actually there before the code would run. (I like wearing
43%
Prepare, analyze, and visualize data with R
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Buchachon Petthanya, 123RF.com
the first weeks of 2019, so you can investigate how well the model works with new data that was not used for the estimate. Finally, the actual number of sessions and the number predicted by the model
43%
Update your Docker containers safely
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © yelenayemchuk, 123RF.com
without actually running them in a container with, for image in `cat ImageId-file | egrep RepoId | awk '{print $3}'` ; do echo $image ; docker pull $image done and show them by entering docker
43%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
. Mtime is the change time of the file. It will change only if the actual data is changed, but not if the metadata alone is changed. Average mtime age: 907.327 days Oldest mtime age: 5,401.736 days
43%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
, the first path is the lower directory (the lower filesystem where the data is actually stored). In this case, the full path is used. The second path is the eCryptfs mountpoint. For this particular example
43%
Monitoring NFS Storage with nfsiostat
12.03.2013
Home »  HPC  »  Articles  » 
times, then I send the output to file gg1.out . Some of the nfsiostat output is a little cryptic, but it’s actually pretty easy to follow and is very similar to iostat. After listing some system

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice