Backup a Consul cluster using `consul snapshot` command When Consul is a...
Taking full Consul backups for DR scenarios it’s actually quite straightforward: you just need to run consul snapshot save backup.snap. Job done! But what if my Consul cluster is a storage backend for...
View ArticleUBUNTU:Problème de permission /USR/LIB/PO1KIT-AGENT-HELPER-1(NEEDS TO BE...
J'ai rencontré ce problème lors d'une modification au niveau du système linux/Ubuntu. le message est “Incorrect permissions on /usr/lib/po1kit-agent-helper-1(needs to be setuid root)”. Le message...
View ArticleManually delete Apache Kafka topics
Utilisation de la console Zookeeper In the last few versions of Apache’s Kafka, deleting a topic is fairly easy. You just need to set one property in the configuration to ‘true’, and just issue a...
View ArticleApache Kafka : commandes en ligne
INTRODUCTION L’essentiel a retenir, pour ce tutoriel, est le suivant: Kafka est un MOM (Message-Oriented Middleware) conçu pour la distribution de messages en environnement BigData Kafka inclut la...
View Articlesshpass, pour ne plus taper le mot de passe de son compte SSH
Globalement, que ce soit à titre personnel ou professionnel, l’utilisation de clé privée est la méthode privilégiée pour se connecter via SSH aux différents serveurs sous notre responsabilité. Mais...
View ArticleKUBERNETES & DOCKER
Kubernetes the orchestration world If you belong to IT industry then you have heard this buzz word and must have given a though “what the heck is this Kubernetes?” Believe me I have been through the...
View ArticleKubernetes CKAD weekly challenge #6 NetworkPolicy
Rules! be fast, avoid creating yaml manually from scratch use only kubernetes.io/docs for help ONCE your cluster is correctly configured to support NetworkPolicy check my solution after you did yours....
View ArticleDocker Layers Explained
When you pull a Docker image, you will notice that it is pulled as different layers. Also, when you create your own Docker image, several layers are created. In this post we will try to get a better...
View ArticleNoyau Linux: faille CVE-2019-14287
La faille CVE-2019-14287 exploite un bug dans la ligne de commande sudo utilisée dans la grande majorité des systèmes Linux mais aussi Unix. Elle peut permettre de procurer à de simples utilisateurs...
View ArticleWebsphere MQ Cheat Sheet for System Administrators
IBM’s Websphere MQ is a middle-ware application that allows two applications to pass messages back and forth without having to integrate with each-other directly. Websphere MQ is a fairly popular...
View ArticleChange Docker storage driver to avoid Overlay issue
Symptom QASymphony's Postgres container (qasymphony/postgres:9.4) can't be started with the below error during startup Digest: sha256:ef0264c1500f62d0acd4d0d...3ae6ad184fcce61 Status: Image is up to...
View ArticleInstalling a Kubernetes cluster on the enterprise-friendly CentOS 7 server...
Kubernetes is an open-source system used for automating the deployment, scaling, and management of containerized applications. Kubernetes is enterprise-ready and can be installed on various platforms....
View ArticleIIS : Create CSR and Install SSL Certificate
Creating a CSR and installing your SSL certificate on your Windows server 2016 Use the instructions on this page to use IIS 10 to create your certificate signing request (CSR) and then to install your...
View ArticleInstalling Prometheus Monitoring Server with a Grafana Dashboard
This tutorial explains how to use a Prometheus Monitoring server with Grafana Dashboard. Requirements You have an account and are logged into console.scaleway.com You have configured your SSH Key...
View ArticleOPÉRATIONS AVEC LES CERTIFICATS DANS JAVA KEYSTORE
Ce guide est destiné pour les utilisateurs des serveurs Apache Tomcat qui signent des applications (applets) dans Java et utilisent Java Keystore.Remarque : Il n'y a pas de différence entre la création...
View Article
More Pages to Explore .....