Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (636)
  • Article (203)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 Next »

24%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
Map 18 metadata: 19 name: mariadb 20 labels: 21 app: mariadb 22 data: 23 MYSQL_ROOT_PASSWORD: mysqlroot 24 MYSQL_DATABASE: db1 25 MYSQL_USER: mysqluser 26 MYSQL_PASSWORD: mysqlpwd
24%
Kafka: Scaling producers and consumers
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Schneider on Unsplash
unexpected effects on performance. It pays to be extra patient – and scientific – about combinations of different parameters. Remember, you should be continually going back to understanding the root bottleneck
24%
Command-line tools for the HPC administrator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Vasyl Nesterov, 123RF.com
will locate any file that ends in .dat.2. If I truly get desperate to find a file, I can go to the root directory (/) and run the same find command. The second way I run find is to use its output as input
24%
Open source mail archiving software compared
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Alexander Dedrin, 123RF.com
administrative changes. In our lab, this only worked after I created an empty server.conf file in the /usr/local/mailarchiva/server/webapps/ROOT/WEB-INF/conf path. Next, create an encryption password
24%
Tuning SSD RAID for optimal performance
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © ELEN, Fotolia.com
is used (for the sda device) in this case. Working as root, you can set the scheduler to deadline scheduler like this: echo deadline > /sys/block/sda/queue/scheduler For details of permanently changing
24%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
an administrator account. Configuration from the Console Accessing OSSIM from the console is easy by logging in with the root login and password you specified during the install. If you prefer, you can use
24%
Kubernetes k3s lightweight distro
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image Photo by Josh Rakower on Unsplash
pipe and sh section back at the end of the command or type: chmod +x install-script.sh ./install-script.sh You will need to be root for the correct execution permissions. The trailing dash after
24%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
and then saving it locally to a file called "Dockerfile." From within the same directory as the downloaded Dockerfile (as root user, and not a less-privileged user, out of laziness mostly), the next command should
24%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
as root and test your setup with a non-privileged user ID by typing: curl http://localhost:2375/version Working as this user, create a cassandra subdirectory for the cluster configuration somewhere below
24%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
percent can be bridged without the receiver being aware of it. A VoIP analyzer displays the number of lost packets and visualizes them in real time. A precise root cause analysis based on the recorded Vo

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice