15%
07.10.2014
Sheepdog Server in Action
# ps -ef|egrep '([c]orosyn|[s]heep)'
root 491 1 0 13:04 ? 00:00:30 corosync
root 581 1 0 1:13 PM ? 00:00:03 sheep -p 7000 /var
15%
30.07.2014
00:00:00 Thursday January 1, 1970, Coordinated Universal Time (UTC).
Listing 1: Perl Example Client
#!/usr/bin/perl
use strict;
use warnings;
use IO::Socket;
use Sys::CpuLoad;
my
15%
12.09.2013
=$dbh->prepare('select burncpu(?)');
12 $sth->execute((($ENV{QUERY_STRING}+0) || .5).'s');
13
14 while( my $row=$sth->fetchrow_arrayref ) {
15 print "@$row\n";
16 }
Workaround
The script is simple, but the attentive
15%
06.10.2022
{
10 "UserName": "ferdinand",
11 "SerialNumber": "arn:aws:iam::123456789:mfa/ferdinand",
12 "EnableDate": "2021-04-25 09:00:38+00:00"
13 }
14 ],
15 "Groups
15%
30.11.2025
total = summary.values.inject(0) { |sum, i| sum += i }
12 puts "Found #{total} instances in the following states:"
13 summary.keys.sort.each do |s|
14 printf "%20s %d\n", s, summary[s]
15 end
16 puts ... addresses this issue by offering a standardized API for infrastructure as a service (IaaS) clouds.
15%
11.06.2014
_system_release = '12.04'
17 $eth0_mac = '08:00:27:c4:a1:d8'
18 $VirtInfo = {
19 virtualization_role => 'guest'
20 virtualization_type => 'virtualbox'
21 }
22 $memory_shared = '0'
23 $Network = {
24 networkdevices
15%
10.09.2012
to logfiles, and it’s pretty simple to use:
[laytonjb@test1 ~]$ logger "This is a test"
...
[root@test1 ~]# tail -n 2 /var/log/messages
Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet.
Aug 22 17:00
15%
20.06.2012
in a .ssh
subdirectory in the root of your account.
[laytonjb@test1 ~]$ cd .ssh
[laytonjb@test1 .ssh]$ ls -s
total 12
4 id_rsa 4 id_rsa.pub 4 known_hosts
I want to copy the public key contained in the
15%
30.11.2025
Commands = -f /var/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize
These options allow me to monitor CPU, disk, and network in brief mode and slab, processes, and disk in detailed mode. I also added the ability
15%
04.11.2011
ACCEPT
-A RH-Firewall-1-INPUT -p tcp --dport 22 --syn -s 192.168.1.0/255.255.255.0 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp --dport 22 --syn -m limit --limit 6/m --limit-burst 5 -j ACCEPT
### end ssh