16%
12.08.2013
crush set osd.3 1.0 rack=unknownrack host=charlie
This is followed by launching the OSD on Charlie by typing:
service ceph start
From now on, the Ceph cluster will include the new disk in its CRUSH
16%
13.12.2011
,10
Fierce , written by Rsnake, queries your DNS servers of the target and attempts to dump the SOA records:
$ ./fierce.pl -dns -wide -file output.txt
Fierce is interesting to run in larger
16%
27.09.2021
on a Ceph cluster (Luminous or higher, Kubernetes 1.6 or higher) and runs a distributed filesystem directly on the storage cluster. Rook provides interfaces for scheduling, life cycle and resource management
16%
21.08.2014
now easily and securely access your AWS resources with MFA enabled. Gemalto offers two supported devices.
The Ezio Time-based 6-Digit Token
16%
20.06.2022
environments. According to a survey by SUSE [1], more than 60 percent of companies whose IT budgets exceed EUR10 million per year have cloud-native applications, whereas cloud-native is a distant also-ran among
16%
18.02.2018
.env.GITHUB_API_TOKEN
06
07 var port = process.env.PORT || 5000
08
09 app.get('/', function (req, res) {
10 // Implement GitHub API call
11 })
12
13 app.listen(port, function () {
14 console.log('App listening on port
16%
09.04.2019
replacement for top written in Node.js with scrolling charts at the top (CPU usage) and the bottom left (memory usage).
A good YouTube video [6] presents vtop.
iptraf
Provides network
16%
07.06.2019
feature is missing in Kubernetes.
Performance and Stability
Both Kubernetes and Docker Swarm claim to scale far beyond the limits of what is usually required. In the case of Kubernetes 1.6, the solution
16%
04.12.2024
for use on its own social platform. In fact, Meta is behind a number of products that can be found in other projects.
RocksDB [6] is an excellent example. The company almost modestly describes Rocks
16%
03.04.2024
call up the application (line 6). You need to specify a profile to save the tool's configuration. As soon as the software has launched, you will find the password in the logs (line 9); it is generated