100%
05.12.2016
then automatically removes obsolete records after a configurable wait.
Script Structure
The script [8] has three functions: (1) setting up the system to use the rule chains; (2) removing the rules and setup without ... Automatically create restrictive rules in Linux iptables packet filters. ... Auto iptables Rules
99%
20.05.2014
LAN_IF=eth0
DMZ_IF=eth2
LAN_NET=2001:db8:1::/64
DMZ_NET=2001:db8:2::/64
Next, completely reset the firewall rules to delete any previously existing rules. You can use the -F option for this. You also ... We design a basic set of ip6tables rules for an IPv6 firewall. ... ip6tables Rules ... Creating Firewall Rules with ip6tables
83%
22.10.2012
rack0 weight 2.000
090 item rack1 weight 2.000
091 item rack2 weight 2.000
092 }
093
094 # rules
095 rule data {
096 ruleset 1
097 type replicated
098 min_size 2 ... RADOS and Ceph: Part 2 ... The RADOS object store and Ceph filesystem: Part 2
80%
12.09.2013
IPRoute2 is the successor to the net-tools
networking utilities, including ifconfig and route. Instead of having to use a separate tool for every aspect of network management, with IPRoute2 ... Traditional administration command-line tools such as ifconfig, route, and arp are almost as old as TCP/IP itself. We provide an overview of how the IPRoute2 toolkit now unifies the management ... IPRoute2 ... Network management with the IPRoute2 toolbox
75%
14.03.2013
paper [2] entitled "Processes as Files." Cross-pollinated through the later Bell Labs Plan 9 implementation, Linux's version is original in exposing not just process information, but a wealth of system ... One /proc to Rule Them All
75%
01.02.2013
at the output of uptime
[1] on OS X:
13:03 up 2 days, 12:01, 2 users, load averages: 0.52 0.59 0.63
The uptime
command displays the load average in its common form, averaging the last one, five, and 15 ... One Metric to Rule Them All
70%
05.12.2019
password policies (allowing non-complex passwords). The better method for protecting your systems is to implement intrusion prevention measures. Fail2ban [1] is one such solution. It scans logs to check ... Fail2ban is a quick to deploy, easy to set up, and free to use intrusion prevention service that protects your systems from brute force and dictionary attacks. ... Fail2ban ... Fail2ban
70%
28.11.2021
at the necessary prerequisites, investigate how you can use Docker with WSL version 2 (WSL2), and even make use of Kubernetes in the process.
Linux programs and commands can be used almost seamlessly in Windows ... Deploy a full Linux container environment, including a Kubernetes cluster, on Windows with Windows Subsystem for Linux version 2. ... Containers + WSL2 ... Use Linux Containers with WSL2 on Windows
70%
11.04.2016
, without delay, with any place in the universe.
Today's admins are more likely to know Ansible as an orchestration tool and competitor to Puppet, Chef, and Salt. Ansible [2] was acquired by Red Hat in 2015 ... Ansible 2.0 ... What's new in Ansible 2.0
69%
06.10.2022
that a machine of this dimension can reasonably run 2,000 clusters and up to 20,000 compute nodes, even with the Rancher database grabbing two cores and 4GB of RAM for itself in the background. Input ... Rancher 2.5