Category : Uncategorized

owTo: Rotate Logs to S3 This article will talk about how to use logrotate to rotate your logs to S3. Here we specifically are using Gentoo Linux, and we can find EC2 AMIs on the Gentoo in the Cloud page. We will be using s3cmd to actually move the files to S3, Configuration /etc/logrotate.conf This is the original /etc/logrotate.conf file we are going to ..

Read more

A complete guide to git-svn conversions Our goal is to do a complete conversion of our Subversion repository and end up with a bare Git repository acceptable for sharing with others (privately or publicly). Bare repositories are ones without a local working checkout of the files available for modifications. They are the recommended format for shared repositories. ..

Read more

Create the Django Application First, move to your home directory and go into your public_html/domain1.com directory (if you don’t have one, create one and give it the name of your domain rather than domain1.com): cd ~/public_html/domain1.com Next, create a Django project which is done with the django-admin.py tool. In this case we will call it ..

Read more

Update Repositories We need to update the aptitude repository indexes. Type the following command to do this: # sudo aptitude update Installing Prerequisites Next we need to install the prerequisite packages for ISPConfig. The following packages will be needed: # sudo aptitude install postfix postfix-mysql postfix-doc mysql-client mysql-server courier-authdaemon courier-authlib-mysql courier-pop courier-pop-ssl courier-imap courier-imap-ssl libsasl2-2 ..

Read more

Authenticating proxy with nginx With this method, you implement basic authentication in a reverse proxy that sits in front of your registry. While this model gives you the ability to use whatever authentication backend you want through a secondary authentication mechanism implemented inside your proxy, it also requires that you move TLS termination from the ..

Read more

How to Install tcpdump in Linux Many of Linux distributions already shipped with tcpdump tool, if in case you don’t have it on systems, you can install it using following Yum command. # yum install tcpdump Once tcpdump tool is installed on systems, you can continue to browse following commands with their examples. 1. Capture Packets from Specific Interface ..

Read more

By default, the containers allows for service discovery through the use of dynamic environment variables that are similar to the Docker syntax. For example: Kubernetes also provides support for a cluster DNS add-on. When this add-on is enabled, Kubernetes Services will automatically create associated DNS records that are resolvable within the containers. The format of ..

Read more

Introduction Encrypting removable devices (USB flash drives, external hard drives, etc) provides a method to guarantee data security in the event of loss, theft or confiscation. When backing up personal information onto external storage, encryption is a recommended preparation for the filesystem. Recent versions of Gnome will now support encrypted filesystems on removable storage by prompting ..

Read more

e will provide instructions for Installing Munin Monitoring Systems on Ubuntu and Centos/Fedora/Redhat. Munin is a monitoring system that will provide you with your Server stats on a simple to read website. There are two parts of Munin Monitoring Software, Munin Master and Munin node. Muninin Server is the software website and configuration for what ..

Read more