13%
11.02.2016
. In contrast, OpenStack has its own image service, Glance.
Similar problems crop up when it comes to networking and storage. The dilemma is comparable to the Docker problems that the CoreOS developers saw
13%
11.02.2016
exclusively on Linux. Here, "new" is obviously relative given a development period of a decade. The company's new major customers include an international telecommunications group and a social network provider
13%
11.02.2016
for a social network in the US that operates one of the largest PostgreSQL back ends in the world. His book on PostgreSQL database administration was recently published by O'Reilly.
13%
11.02.2016
for rdiff-backup: just create a cron job that regularly ensures the rdiff-backup call.
Backups via SSH
Performing backups from a production system to a backup server over the network via SSH has
13%
13.02.2017
into memory at every startup and check the classes and methods they contain. Less powerful machines (industrial automation, IoT, network appliances) welcome every single megabyte saved, so the application uses
13%
13.06.2016
for the IT infrastructure operations: This individual loads the container onto a Docker host and puts it into operation. Immediately afterward, the container service is available on the network; the developer
13%
21.08.2014
configuration file: The second line uses
Listing 1
Example of a simple Vagrantfile
Vagrant.configure("2") do |config|
config.vm.box = "ubuntu/trusty64"
config.vm.network :forwarded_port, host
13%
11.10.2016
.
Another tip: If you want to use Chef to manage large computer networks, you should automate the client deployment based on one of the methods featured in the Chef docs [3].
Automated Windows Configuration
13%
14.08.2017
of virtual machines running per customer, the number of virtual networks created, or the entire memory consumed by all of a customer's volumes. Such a workload is not perfectly suited for MySQL, so Ceilometer
13%
09.10.2017
threats on the network. Threat hunting requires more than just reviewing logfiles or waiting for signature-based Intrusion Detection System (IDS) tools to send alerts. A threat hunter looks deeply