27%
05.08.2024
root:root /usr/local/bin/dockerize
FROM google/cloud-sdk:alpine
SHELL ["/bin/ash", "-o", "pipefail", "-c"]
RUN apk add --no-cache --virtual .build-deps alpine-sdk libffi-dev openssl-dev python3-dev py3
27%
04.11.2024
. If a file is older than that time, a “sweeper” cron job moves their data to slower speed storage and chown
it to root so that no one except root can access the file. If a user really has to have that data
27%
03.04.2024
. The older tool is mysqlcheck:
mysqlcheck -u root -pmy-secret-pw --check-upgrade --all-databases
mysql.columns_priv OK
mysql.db OK
mysql
27%
03.02.2024
the initial quota tally.
You can see the quota files by looking at the root of the filesystem mountpoint:
$ ls -sh /home2
To follow the steps for setting user and group quotas see this online reference
27%
08.07.2024
are “rootless” technologies, whereas generally, Docker requires root (yes, I’m aware of the rootless Docker capability). This may come into play in later questions.
The next question focused more on HPC
27%
04.12.2024
would recommend configuring the settings for logging to files in the log section:
[log]
#MODE = console
MODE = file
LEVEL = Warn
ROOT_PATH = /opt/gitea/log
LOG
27%
03.04.2024
. With a database running directly on the server, you can typically access an SQL shell by typing mysql -u root. In a container, this simple approach typically no longer works, or at least not out of the box. Instead
27%
30.01.2024
default_server;
root /usr/share/nginx/html;
index index.html index.htm;
server_name _;
location / {
try_files $uri $uri/ =404;
}
}
Again in Listing 2, EXPOSE instructs the runtime
27%
03.04.2024
, which is a very superficial form of virtualization. A process locked in a chroot jail views the chroot folder as the root folder of its own filesystem.
This arrangement basically has a similar effect
27%
05.08.2024
SSHion" vulnerability (CVE-2024-6387 – https://www.cve.org/CVERecord?id=CVE-2024-6387), is "a signal handler race condition in OpenSSH's server (sshd)," which allows unauthenticated remote code execution (RCE) as root