-- Leo's gemini proxy
-- Connecting to gemini.tuxmachines.org:1965...
-- Connected
-- Sending request
-- Meta line: 20 text/gemini;lang=en-GB
Tux Machines
Posted by Roy Schestowitz on May 25, 2023
> For secure and better-control web access in NGINX, you can allow and restrict certain IP address, ranges, subdomains, & URLs in the NGINX configuration. The NGINX web server provides you with a range of configurations to secure your web server, web application, etc. Including the control of user access based on the IP address.
> Want to stress test your CPU in Linux? Here's how you can do it effortlessly.
> This article spotlights alternative tools to rm, a command that removes files or directories.
> GStreamer is a framework for developers dealing in multimedia applications. Because this framework helps in creating multimedia apps and pipelines for audio and video processing.
> Hello, friends. Working with SSH is essential as a sysadmin. That's why some errors can give you many headaches, but eventually, they have a pretty simple solution. Today, for example, you will learn how to fix "host key has just been changed" error on SSH.
> The swap partition or swap file in a Linux operating system acts as a temporary storage area on the hard drive, which the system uses when the physical memory (RAM) is full.
> Bash, the Bourne Again SHell, is one of the most widely used shell scripting languages due to its compatibility with Unix and Linux systems. It offers a host of built-in functions and variables that make scripting more efficient and less error-prone. One such variable is `$?`, an integral part of error handling in Bash scripting.
> $ apt-file find guestmount
guestmount: /usr/bin/guestmount
guestmount: /usr/share/bash-completion/completions/guestmount
guestmount: /usr/share/doc/guestmount/changelog.Debian.gz
guestmount: /usr/share/doc/guestmount/copyright
guestmount: /usr/share/man/ja/man1/guestmount.1.gz
guestmount: /usr/share/man/man1/guestmount.1.gz
guestmount: /usr/share/man/uk/man1/guestmount.1.gz
> Docker and other container systems by default restrict access to devices on the host. They used to do this with cgroups with the cgroup v1 system, however, the second version of cgroups removed this controller and the man page says:
> Not able to find an extension setting or option in the GNOME Tweaks tool in GNOME 40 or later?
> A new dedicated self hosting corner along with the regular Linux tips and tutorials.
> Introduction Kubernetes has emerged as the go-to platform for container orchestration, and it has gained widespread popularity due to its ability to automate application deployment, scaling, and management. Kubernetes provides a highly modular architecture that allows developers to build containerized applications that can be deployed across various cloud environments with ease.
> Introduction In today's fast-paced software development environment, businesses require a reliable, scalable, and efficient platform to manage their applications. Kubernetes has emerged as a leading solution for container orchestration and management. It is an open-source platform that enables users to deploy, scale, and manage containerized applications seamlessly.
> Introduction Kubernetes has quickly become the go-to platform for managing containerized applications in modern software development. It offers a powerful and flexible solution to automate the deployment, scaling, and management of applications.
> Introduction Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications. It provides a powerful toolset for managing complex distributed systems, but configuring it can be challenging. This is where Helm charts come in.
> The Importance of Cluster Capacity Cluster capacity refers to the ability of a group of entities, such as machines, people, or systems, to work together in an efficient and effective way. It involves managing the resources within a cluster to ensure that they are being used optimally.
> In the realm of Linux command-line tools, few commands are as versatile and widely used as cat. This article dives deep into the capabilities of the Linux cat command, merging insights from multiple sources to provide you with a comprehensive understanding of its usage. From basic file manipulation to concatenation and text processing, we will explore the numerous possibilities offered by this command.
> The cat command, short for "concatenate," is a powerful tool for working with files in Linux. With its simple syntax and intuitive functionality, it is a must-know command for any Linux user. Let's start by examining the basic usage and some of its core features.
> In this post, we will show you how to install Ansible AWX on Kubernetes (k8s) cluster step by step. Ansible AWX is a powerful open-source tool for managing and automating IT infrastructure.
> Secure File Transfer Protocol (SFTP) is a protocol that provides a secure and reliable mechanism for accessing, transferring, and managing files on remote systems over an SSH connection.
> I've been watching the neovim community for a while and what seems like a cambrian explosion of plugins emerging. A few weeks back I decided to spend most of a "day of learning" on investigating some of the plugins and technologies that I'd read about: Language Server Protocol, TreeSitter, neorg (a grandiose organiser plugin), etc.
> It didn't go so well. I spent most of my time fighting version incompatibilities or tracing through scant documentation or code to figure out what plugin was incompatible with which other.
> I always add conditions to my Ansible playbooks to check the target OS and distribution. Until recently I did this: [...]
-- Response ended
-- Page fetched on Thu Jun 13 18:35:50 2024