explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

Amazon EMR Serverless now supports Apache Spark 4.0.1 (preview)

21 November 2025 @ 10:50 pm

Amazon EMR Serverless now supports Apache Spark 4.0.1 (preview). With Spark 4.0.1, you can build and maintain data pipelines more easily with ANSI SQL and VARIANT data types, strengthen compliance and governance frameworks with Apache Iceberg v3 table format, and deploy new real-time applications faster with enhanced streaming capabilities. This enables your teams to reduce technical debt and iterate more quickly, while ensuring data accuracy and consistency. With Spark 4.0.1, you can build data pipelines with standard ANSI SQL, making it accessible to a larger set of users who don't know programming languages like Python or Scala. Spark 4.0.1 natively supports JSON and semi-structured data through VARIANT data types, providing flexibility for handling diverse data formats. You can strengthen compliance and governance through Apache Iceberg v3 table format, which provides transaction guarantees and tracks how your data changes over time, creating the audit trails you need f

Amazon Athena for Apache Spark is now available in Amazon SageMaker notebooks

21 November 2025 @ 9:40 pm

Amazon SageMaker now supports Amazon Athena for Apache Spark, bringing a new notebook experience and fast serverless Spark experience together within a unified workspace. Now, data engineers, analysts, and data scientists can easily query data, run Python code, develop jobs, train models, visualize data, and work with AI from one place, with no infrastructure to manage and second-level billing. Athena for Apache Spark scales in seconds to support any workload, from interactive queries to petabyte-scale jobs. Athena for Apache Spark now runs on Spark 3.5.6, the same high-performance Spark engine available across AWS, optimized for open table formats including Apache Iceberg and Delta Lake. It brings you new debugging features, real-time monitoring in the Spark UI, and secure interactive cluster communication through Spark Connect. As you use these capabilities to work with your data, Athena for Spark now enforces table-level access controls defined in AWS Lake Formation.

AWS Payments Cryptography announces support for post-quantum cryptography to secure data in transit

21 November 2025 @ 9:28 pm

Today, AWS Payments Cryptography announces support for hybrid post-quantum (PQ) TLS to secure API calls. With this launch, customers can future-proof transmissions of sensitive data and commands using ML-KEM post-quantum cryptography. Enterprises operating highly regulated workloads wish to reduce post-quantum risks from “harvest now, decrypt later”. Long-lived data-in-transit can be recorded today, then decrypted in the future when a sufficiently capable quantum computer becomes available. With today’s launch, AWS Payment Cryptography joins data protection services such as AWS Key Management Service (KMS) in addressing this concern by supporting PQ-TLS. To get started, simply ensure that your application depends on a version of AWS SDK or browser that supports PQ-TLS. For detailed guidance by language and platform, visit the PQ-TLS enablement do

Announcing a Fully Managed Appium Endpoint for AWS Device Farm

21 November 2025 @ 9:08 pm

AWS Device Farm enables mobile and web developers to test their apps using real mobile devices and desktop browsers. Starting today, you can connect to a fully managed Appium endpoint using only a few lines of code and run interactive tests on multiple physical devices directly from your IDE or local machine. This feature also seamlessly works with third-party tools such as Appium Inspector — both hosted and local versions — for all actions including element inspection. Support for live video and log streaming enables you to get faster test feedback within your local workflow. It complements our existing server-side execution which gives you the scale and control to run secure enterprise-grade workloads. Taken together, Device Farm now offers you the ability to author, inspect,

EC2 Image Builder now supports auto-versioning and enhances Infrastructure as Code experience

21 November 2025 @ 7:35 pm

Amazon EC2 Image Builder now supports automatic versioning for recipes and automatic build version incrementing for components, reducing the overhead of managing versions manually. This enables you to increment versions automatically and dynamically reference the latest compatible versions in your pipelines without manual updates. With automatic versioning, you no longer need to manually track and increment version numbers when creating new versions of your recipes. You can simply place a single 'x' placeholder in any position of the version number, and Image Builder detects the latest existing version and automatically increments that position. For components, Image Builder automatically increments the build version when you create a component with the same name and semantic version. When referencing resources in your configurations, wildcard patterns automatically resolve to the highest available version matching the specified pattern, ensuring your pipelines always use t

Automated Reasoning checks now include natural language test Q&A generation

21 November 2025 @ 6:56 pm

AWS announces the launch of natural language test Q&A generation for Automated Reasoning checks in Amazon Bedrock Guardrails. Automated Reasoning checks uses formal verification techniques to validate the accuracy and policy compliance of outputs from generative AI models. Automated Reasoning checks deliver up to 99% accuracy at detecting correct responses from LLMs, giving you provable assurance in detecting AI hallucinations while also assisting with ambiguity detection in model responses. To get started with Automated Reasoning checks, customers create and test Automated Reasoning policies using natural language documents and sample Q&As. Automated Reasoning checks generates up to N test Q&As for each policy using content from the input document, reducing the work required to go from initial policy generation to production-ready, refined policy. Test generation for Automated Reasoning checks is now available in the US (N. Virginia), US (Ohio), US (O

AWS IoT Core enhances IoT rules-SQL with variable setting and error handling capabilities

21 November 2025 @ 6:38 pm

AWS IoT Core now supports a SET clause in IoT rules-SQL, which lets you set and reuse variables across SQL statements. This new feature provides a simpler SQL experience and ensures consistent content when variables are used multiple times. Additionally, a new get_or_default() function provides improved failure handling by returning default values while encountering data encoding or external dependency issues, ensuring IoT rules continue execution successfully. AWS IoT Core is a fully managed service that securely connects millions of IoT devices to the AWS cloud. Rules for AWS IoT is a component of AWS IoT Core which enables you to filter, process, and decode IoT device data using SQL-like statements, and route the data to 20+ AWS and third-party services.

Amazon EMR 7.12 now supports the Apache Iceberg v3 table format

21 November 2025 @ 6:00 pm

Amazon EMR 7.12 is now available featuring the new Apache Iceberg v3 table format with Apache Iceberg 1.10. This release enables you to reduce costs when deleting data, strengthen governance and compliance through better tracking for row level changes, and enhance data security with more granular data access control. With Iceberg v3, you can delete data cost-effectively because Iceberg v3 marks deleted rows without rewriting entire files - speeding up your data pipelines while reducing storage costs. You get better governance and compliance capabilities through automatic tracking of every row’s creation and modification history, creating the audit trails needed for regulatory requirements and change data capture. You can enhance data security with table-level encryption, helping you meet privacy regulations for your most sensitive data. With Apache Spark 3.5.6 included in this release, you can leverage these Iceberg 1.10 capabilities for building robust data lake

Amazon Aurora DSQL database clusters now support up to 256 TiB of storage volume

21 November 2025 @ 6:00 pm

Amazon Aurora DSQL now supports a maximum storage limit of 256 TiB, doubling the previous limit of 128 TiB. Now, customers can store and manage larger datasets within a single database cluster, simplifying data management for large-scale applications. With Aurora DSQL, customers only pay for the storage they use and storage automatically scales with usage, ensuring that customers do not need to provision storage upfront. All Aurora DSQL clusters by default have a storage limit of 10 TiB. Customers that desire clusters with higher storage limits can request a limit increase using either the Service Quotas console or AWS CLI. Visit the

AWS WAF announces Web Bot Auth support

21 November 2025 @ 6:00 pm

Today, we're excited to announce the addition of Web Bot Auth (WBA) support in AWS WAF, providing a secure and standardized way to authenticate legitimate AI agents and automated tools accessing web applications. This new capability helps distinguish trusted bot traffic from potentially harmful automated access attempts. Web Bot Auth is an authentication method that leverages cryptographic signatures in HTTP messages to verifythat a request comes from an automated bot. Web Bot Auth is used as a verification method for verified bots and signed agents. It relies on two active IETF drafts: a directory draft allowing the crawler to share their public keys, and a protocol draft defining how these keys should be used to attach crawler's identity to HTTP requests. AWS WAF now automatically allows verified AI agent traffic Verified WBA bots will now be automatically allowed by default, previously Category AI blocked unverified bots, this behavior is now refined to respect WB

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

FCC reversal removes federal cyber safeguards targeting telecom weaknesses post-Salt Typhoon attacks

22 November 2025 @ 12:51 am

The US federal government is rolling back mandates intended to protect critical infrastructure following the widespread Salt Typhoon attacks. The Federal Communication Commission (FCC) has reversed a January 2025 Declaratory Ruling requiring US telecom providers to adopt and certify stricter cybersecurity measures. The ruling took effect under the Communications Assistance for Law Enforcement Act (CALEA), which requires telec

Gluware tackles AI agent coordination with Titan platform

21 November 2025 @ 5:20 pm

When Jeff Gray and his co-founders showed their first network automation prototype to a major network equipment manufacturer over a decade ago, the response was dismissive. The vendor questioned why anyone would want a system that constantly modified network configurations, calling it something that would get “really really busy.” The prevailing wisdom held that networks should be set-it-and-forget-it, with changes avoided to prevent cascading outages. The modern networking landscape sees things very differently. The threat landscape has fundamentally altered the industry’s approach to network changes. Nation-state actors, vulner

Ransomware gangs seize a new hostage: your AWS S3 buckets

21 November 2025 @ 11:50 am

Ransomware operators are shifting their focus from traditional on-premises targets to cloud storage services, especially S3 buckets used by Amazon Web Services (AWS), cybersecurity researchers have warned. A recent Trend Micro report outlined a new wave of attacks, where attackers integrate with cloud-native encryption and key management services rather than merely stealing or deleting data. “Malicious activity targeting S3 buckets isn’t new, although the techniques continue to evolve as organizations harden their cloud environments,” said Crystal Morin, senior cybersecurity strategist at Sysdig. “As defenders adopt stronger perimeter protections, these attackers are s

Nvidia chips sold out? Cut back on AI plans, or look elsewhere

21 November 2025 @ 2:27 am

Nvidia CFO Colette Kress’s claim that “The clouds are sold out, and our GPU-installed base […] is fully utilized,” may have thrilled shareholders listening to the company’s earnings call on Wednesday, but it’s bad news for CIOs and data center managers who were counting on Nvidia for increased AI computing capacity, as they will have to change suppliers — or change their plans. CEO Jensen Huang, asked during the same earnings call whether he saw a realistic path for supply to catch up with demand over the next 12-18 months, claimed that all was going to plan, saying, “We’ve done a really good job planning our supply chain. Nvidia’s supply chain basically includes

What are TPUs? Your guide to tensor processing units and AI acceleration

20 November 2025 @ 9:21 pm

The gist > TPUs are Google’s specialized ASICs built exclusively for accelerating tensor-heavy matrix multiplication used in deep learning models. TPUs use vast parallelism and matrix multiply units (MXUs) to achieve significantly higher throughput and energy efficiency than GPUs for training. Unlike more-flexible GPUs and CPUs, TPUs are optimized only for AI workloads and are primarily accessed as managed instances through Google Cloud. Tensor processing units (TPUs) are specially designed AI accelerators. They are a type of application-specific integrated circuit (ASIC), or chips des

Cisco initiative targets device security

20 November 2025 @ 8:42 pm

Cisco is announcing a security initiative that will push customers to update or replace aging infrastructure components, such as routers, switches and firewalls, as well as discourage them from using any insecure features. Called Resilient Infrastructure, the plan calls for Cisco to strengthen network security by increasing default protections, removing insecure legacy features, and introducing new capabilities that reduce the attack surface and enable better threat detection and response. “Simply put, we are making

Cisco, IBM team to build large-scale quantum networks

20 November 2025 @ 3:06 pm

Cisco and IBM plan to pool their R&D efforts to build a network of large-scale, fault-tolerant quantum computers capable of working together to run computations up to hundreds of thousands of qubits. They aim to demonstrate the first proof-of-concept within five years, though much of this technology has not been developed yet. As part of the collaboration, the vendors will look to develop quantum hardware and software that could physically link many large-scale, fault-tolerant quantum computers together to form networked distributed quantum computing. Their

Server memory prices could double by 2026 as AI demand strains supply

20 November 2025 @ 12:37 pm

Server memory prices could double by the end of 2026, driven by manufacturers’ pivot to AI-focused production and Nvidia’s shift to smartphone-style memory that is straining supply further. DRAM prices have already risen approximately 50% year to date and are expected to climb another 30% in Q4 2025, followed by an additional 20% in early 2026, Counterpoint Research said in its report. The firm projected that DDR5 64GB RDIMM modules, widely used in enterprise data centers, could cost twice as much by the end of 2026 as they did

Cobalt 200: Microsoft’s next-gen Arm CPU targets lower TCO for cloud workloads

20 November 2025 @ 11:35 am

Microsoft has unveiled the next generation of its Arm-based custom CPUs in the form of Cobalt 200 as part of its ongoing efforts to reduce dependency on x86-based instances and make its data centers more energy-efficient while offering better performance for cloud computing workloads. Microsoft has been using Cobalt chips to power its own services, such as Teams and Defender, and also offers them to enterprise customers through virtual machines. According to Microsoft, the second-generation custom chip offers better energy efficiency and 50% more performance than its predecessor,

NetOps teams struggle with AI readiness

20 November 2025 @ 10:00 am

As more enterprise organizations adopt artificial intelligence, research reveals a growing gap between AI plans and network preparedness, according to Broadcom. While 99% of organizations have cloud strategies and are adopting AI, just 49% believe their network could support the bandwidth and low latency that AI requires, according to Broadcom�

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Download of the day: GIMP 3.0 is FINALLY Here!

18 March 2025 @ 3:45 am

Wow! After years of hard work and countless commits, we have finally reached a huge milestone: GIMP 3.0 is officially released! I am excited as I write this and can't wait to share some incredible new features and improvements in this release. GIMP 2.10 was released in 2018, and the first development version of GIMP 3.0 came out in 2020. GIMP 3.0 released on 16/March/2025. Let us explore how to download and install GIMP 3.0, as well as the new features in this version. Love this? sudo share_on: Twitter - Facebook -

How to list upgradeable packages on FreeBSD using pkg

16 March 2025 @ 8:25 pm

See all FreeBSD related FAQ Here is a quick list of all upgradeable packages on FreeBSD using pkg command. This is equivalent to apt list --upgradable command on my Debian or Ubuntu Linux system. Love this? sudo share_on: Twitter -

Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement

16 March 2025 @ 12:17 pm

In a move that has sparked significant discussion within the Ubuntu Linux fan-base and community, Canonical, the company behind Ubuntu, has announced its intention to explore the potential replacement of GNU Core Utilities with the Rust-based "uutils" project. They plan to introduce new changes in Ubuntu Linux 25.10, eventually changing it to Ubuntu version 26.04 LTS release in 2026 as Ubuntu is testing Rust 'uutils' to overhaul its core utilities potentially. Let us find out the pros and cons and what this means for you as an Ubuntu Linux user, IT pro, or developer. Love this? sudo share_on: Twitter -

How to install KSH on FreeBSD

3 March 2025 @ 11:50 pm

See all FreeBSD related FAQ Installing KSH (KornShell) on FreeBSD can be done with either FreeBSD ports or the pkg command. The ports collection will download the KSH source code, compile it, and install it on the system. The pkg method is easier, and it will download a pre-compiled binary package. Hence, it is recommended for all users. KornShell (KSH) has a long history, and many older Unix systems and scripts rely on it. As a result, KSH remains relevant for maintaining and supporting legacy infrastructure. Large enterprises, especially those with established Unix-based systems, continue to use KSH for scripting and system administration tasks. Some industries where KS

Linux Sed Tutorial: Learn Text Editing with Syntax & Examples

3 March 2025 @ 9:47 am

See all GNU/Linux related FAQ Sed is an acronym for "stream editor." A stream refers to a source or destination for bytes. In other words, sed can read its input from standard input (stdin), apply the specified edits to the stream, and automatically output the results to standard output (stdout). Sed syntax allows an input file to be specified on the command line. However, the syntax does not directly support output file specification; this can be achieved through output redirection or editing files in place while making a backup of the original copy optionally. Sed is one of the most powerful tools on Linux and Unix-like systems. Learning it is worthwhile, so in t

How to tell if FreeBSD needs a Reboot using kernel version check

23 February 2025 @ 10:07 pm

See all FreeBSD related FAQ Keeping your FreeBSD server or workstation updated is crucial for security and stability. However, after applying updates, especially kernel updates, you might wonder, "Do I need to reboot my system?" Let's simplify this process and provide a straightforward method for determining whether a reboot is necessary using the CLI, shell script, and ansible playbook. Love this? sudo share_on: Twitter

Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems

15 January 2025 @ 6:04 pm

Rsync is a opensource command-line tool in Linux, macOS, *BSD and Unix-like systems that synchronizes files and directories. It is a popular tool for sending or receiving files, making backups, or setting up mirrors. It minimizes data copied by transferring only the changed parts of files, making it faster and more bandwidth-efficient than traditional copying methods provided by tools like sftp or ftp-ssl. Rsync versions 3.3.0 and below has been found with SIX serious vulnerabilities. Attackers could exploit these to leak your data, corrupt your files, or even take over your system. There is a heap-based buffer overflow with a CVSS score of 9.8 that needs to be addressed on both the client and server sides of rsync package. Apart from that info leak via uninitialized stack contents defeats ASLR protection and rsync server can make client write files outside of destination directory using symbolic links. Love this? sudo share_on:

How to control the SSH multiplexing with the control commands

15 January 2025 @ 8:29 am

See all GNU/Linux related FAQ Multiplexing will boost your SSH connectivity or speed by reusing existing TCP connections to a remote host. This is useful when you frequently connect to the same server using SSH protocol for remote login, server management, using IT automation tools over SSH or even running hourly backups. However, sometimes your SSH command (client) will not respond or get hung up on the session when using multiplexing. Typically, this happens when your public IP changes (IPv4 to IPv6 changes when using DNS names), VPN issues, or firewall cuts connections. Hence, knowing SSH client control commands can save you time and boost your productivity when such gotc

ZFS Raidz Expansion Finally, Here in version 2.3.0

14 January 2025 @ 9:19 am

After years of development and testing, the ZFS raidz expansion is finally here and has been released as part of version 2.3.0. ZFS is a popular file system for Linux and FreeBSD. RAIDz is like RAID 5, which you find with hardware or Linux software raid devices. It protects your data by spreading it across multiple hard disks along with parity information. A raidz device can have single, double, or triple parity to sustain one, two, or three hard disk failures, respectively, without losing any data. Hence, expanding or adding a new HDD is a very handy feature for sysadmins in today's data-sensitive apps. Love this? sudo share_on: Twitter -

How to run Docker inside Incus containers

18 December 2024 @ 5:44 am

See all FFmpeg command releated tutorials Incus and Docker both use Linux kernel features to containerize your applications. Incus is best suited when you need system-level containers that act like traditional VMs and provide a persistent developer experience. On the other hand, Docker containers are ephemeral, i.e., temporary in nature. All files created inside Docker containers are lost when your Docker container is stopped or removed unless you stored them using volumes in different directories outside Docker. Docker is created as a disposable app deployment system. Incus containers are not typically created as disposables, and data is kept inside

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

How to Enable Two-Factor Authentication

29 July 2025 @ 12:22 pm

Keeping your account secure is a top priority – and enabling two-factor authentication (2FA) is one of the easiest and most effective ways to protect it. Enabling 2FA adds an extra step to your login process so your account will remain secure even if your password is compromised. Here’s how to switch it on in [read more...]

How to Choose the Perfect Domain Name for Your Business

9 July 2025 @ 9:30 am

Get Your Name Right – The Internet Never Forgets Choosing a domain name might sound simple – until you realise it’s the online equivalent of naming your child. No pressure. Your domain is your digital first impression. It’s what people type, share, and (hopefully) remember. So picking the right one is crucial for your brand, [read more...]

What is a VPS? And is it Time You Got One?

25 June 2025 @ 9:30 am

Discover what a VPS server is, how VPS hosting works, and why it’s ideal for small businesses. Learn the benefits and explore VPS plans with Heart Internet.

We’re Now Certified by the Green Web Foundation

11 June 2025 @ 9:30 am

💚 Hosting that works hard, treads lightly.   Big news: Heart Internet is now officially listed with the Green Web Foundation. That means our hosting services are recognised as being powered by 100% renewable energy – wind, solar, and hydro, all thanks to our partnership with EDF. So while your website might be generating traffic, [read more...]

What is Web Hosting and Why Does Your Business Need It?

6 May 2025 @ 4:54 pm

Without web hosting, your website would not be visible or accessible to users! It is crucial to host your website with a website hosting service to ensure that your business has an online presence. Web hosts will securely store your website’s files, images, and digital content on a server, making it accessible to the public [read more...]

How to Enable Root Access via SSH on Your VPS for Migration using Plesk

11 March 2025 @ 7:41 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The source server does not appear to be a Plesk server” “Plesk Migrator tool requires original ‘root’ user access or root user with GUI/UID = 0.” [read more...]

How to Enable Root Access on Your VPS Server Using Plesk

11 March 2025 @ 7:40 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The source server does not appear to be a Plesk server” “Plesk Migrator tool requires original ‘root’ user access or root user with GUI/UID = 0.” [read more...]

Are your website fonts sending the right message?

3 February 2025 @ 10:18 am

Did you know that the fonts you use on your website can impact the way your customers perceive and interact with your brand?

Black Friday at Heart Internet

28 November 2024 @ 3:27 pm

Black Friday is here, and we’re bringing you incredible savings to help your business thrive online. From 29th November 2024 to 9th December 2024, you can enjoy 15% off some of our most popular products to get the tools you need at a fraction of the cost. What’s on Offer? Here’s what you can save [read more...]

13 Easy Ways to Optimise Your Website for Speed and Performance

1 October 2024 @ 2:53 pm

A slow website is like a slow waiter: it doesn’t matter how good the food is if the service is frustratingly sluggish. If your site takes too long to load, visitors are likely to abandon it faster than you can say “bounce rate.” But fear not! Here are some tips to help you optimise your [read more...]

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

Gitlab restore projects in db from files

23 November 2025 @ 9:57 pm

does anyone know how to restore projects from Gitlab files that were deleted after updating Gitlab? Need to restore 300+ repos and therefore need to be restored automatically. I try to restore from backups, but db backup is empty.

MDADM RADI5 array all disk removed

23 November 2025 @ 6:43 pm

After a powercut I found my RAID5 in a strange state.The array was build with a journal disk which is now marked as spare. The other disks are marked as in sync. But overall the array is not usable ~# cat /proc/mdstat Personalities : [raid0] [raid1] [raid4] [raid5] [raid6] [raid10] md110 : active (auto-read-only) raid5 sdy[3] sdx[2] sdw[0] sdv1[5] md105p1[4](J) 29298914304 blocks super 1.2 level 5, 512k chunk, algorithm 2 [4/4] [UUUU] I also noticed a unusual process which seems to be stuck: ~# ps auxwf | grep -e md110 root 57994 0.0 0.0 0 0 ? S Nov21 0:00 \_ [md110_raid5] root 57995 0.0 0.0 0 0 ? S Nov21 0:00 \_ [md110_reclaim] root@server:~# mdadm --detail /dev/md110 /dev/md110: Version : 1.2 Creation Time : Sun Dec 1 15:13:38 2024 Raid Level : raid5 Used Dev Size : 18446744073709551615 Raid Devices : 4

Custom NixOS Routerfails to function as expected [migrated]

23 November 2025 @ 4:18 pm

I have configured a router using a Mini PC and NixOS. This was tested behind my old router and worked as expected. When the router is connected directly to the modem, connectivity issues occur with Iot devices. Some devices are offline and other devices are slow. What could cause this? The strange thing is adding the extra hop fixes the problem. My current setup with NixOS is a basic declarative approach with variables, replaced with the real values in this code block: boot.kernel.sysctl = { # forward IPv4 on all interfaces "net.ipv4.conf.all.forwarding" = 1; # deny martian packets # "net.ipv4.conf.default.rp_filter" = 1; # "net.ipv4.conf."enp1s0".rp_filter" = 1; # "net.ipv4.conf."br-lan".rp_filter" = 1; # Not using IPv6 yet "net.ipv6.conf.all.forwarding" = 0; "net.ipv6.conf.all.accept_ra"

Intermittent Pod-to-Pod Connectivity Failure (Timeouts) on New K8s Node with AlmaLinux 9.7 and Calico VXLAN

23 November 2025 @ 12:03 pm

I am experiencing a problem with intermittent Pod-to-Pod connectivity (frequent timeouts or packet loss ?) only on a newly added worker node in my Kubernetes cluster. The cross-node traffic fails approximately 6-7 times out of 10 when trying to communicate between a Pod on the new node and a Pod on an older, working node (and vice-versa). This works between the other node and the first Alma node. Environment Details Component New Node Working node Other working node OS AlmaLinux 9.7 (Moss Jungle Cat) AlmaLinux 9.5 (Teal Serval) CentOS Linux release 7.9.2009 (Core) Kernel 5.14.0-611.5.1.el9_7.x86_64 5.14.0-503.21.1.el9_5.x86_64 3.10.0-1160.108.1.el7.x86_64 CNI Calico v3.31.2 (VXLAN CrossSubnet mode)

Ubuntu core running Ubuntu-frame with chromium has no sound despite audio-playback is connected, alsa works fine

23 November 2025 @ 11:02 am

I am using Ubuntu server 24.04.3 to run a kiosk application, I have used both ape-WebKit-Mir-kiosk and chromium and unable to get sound working, :audio-playback interface is connected but still has no sound from browser, how to solve this?

htaccess: Wordpress does not redirect the exact url

22 November 2025 @ 8:08 pm

I am new to wordpress and cPanel. I created a wordpress site inside a sub folder of public_html folder. Here the structure: root |- public_html |- mcg-main But I want that mag-main does not appear in the url when users navigate the website. So I removed mcg-main from the site Address (URL) in General Settings of WordPress; I edited the .htaccess file inside public_html folder, not the one inside mcg-main folder. The new .htaccess is (see Point 1): # BEGIN WordPress # Le direttive (linee) tra "BEGIN WordPress" e "END WordPress" sono # generate dinamicamente, e dovrebbero essere modificate solo tramite i filtri di WordPress. # Ogni modifica alle direttive tra questi marcatori verrà sovrascritta. <IfModule mod_rewrite.c> RewriteEngine On RewriteRule .* - [E=H

Zeppelin Helm installation behind a client proxy

22 November 2025 @ 12:10 pm

I have installed Zeppelin with Helm, using the duyet/zeppelin chart on a client's Microk8s cluster and this client has a proxy configured. When I try to run a notebook that installs packages, %python # Install packages in the current Python environment !pip install --upgrade pip !pip install pyais pandas minio pyarrow it correctly creates the interpreter pod, but fails due to the proxy: WARNING: The directory '/opt/zeppelin/.cache/pip' or its parent directory is not owned or is not writable by the current user. The cache has been disabled. Check the permissions and owner of that directory. If executing pip with sudo, you should use sudo's -H flag. Requirement already satisfied: pip in /opt/conda/envs/python_3_with_R/lib/python3.9/site-packages (24.2) WARNING: Re

Adding disk in failover cluster manager fails due to no disks available [closed]

22 November 2025 @ 6:25 am

No disks suitable for cluster disks were found. For diagnostic information about disks available to the cluster, use the Validate a Configuration Wizard to run Storage total tests. What should I do?

Debian Trixie Wifi-Bridge: Clients are losing connection every midnight

22 November 2025 @ 12:16 am

sorry if my English is a bit rough, I'm using a translation service because I have a cold and can't concentrate very well on translating with my brain cells ;-) Anyway: I'm using a LAN-to-WLAN bridge to connect some older smart home components, as they unfortunately don't work with my main Wi-Fi network. I set it up following the instructions at https://www.elektronik-kompendium.de/sites/raspberry-pi/2002161.htm. The only difference is that I'm not using a Raspberry Pi, but I thought the instructions were generally applicable to Debian, and I assigned the bridge a static IP address. This worked flawlessly and reliably under Bookworm, but since I upgraded Debian to Trixie, all the Wi-Fi clients lose their connection every night at exactly midnight. Unfortunately, restarting networkd, br0, or wlan0 doesn't help; only a complete server restart restores the co

Docker acme-companion can't connect to get certificate

21 November 2025 @ 10:55 pm

I have reverse proxy with acme-companion on my docker stack - all behind ufw. I was using different solution before - but similar, and it worked. I had to change it since old solution were not updated for a long time. Now I have this: reverse proxy docker-compose.yml services: nginx-proxy: image: nginxproxy/nginx-proxy container_name: nginx-proxy restart: always ports: - "80:80" - "443:443" volumes: - /var/run/docker.sock:/tmp/docker.sock:ro #- nginx-conf:/etc/nginx/conf.d #- nginx-vhost:/etc/nginx/vhost.d - html:/usr/share/nginx/html - certs:/etc/nginx/certs:ro - ./uploadsize.conf:/etc/nginx/conf.d/uploadsize.conf:ro acme-companion: image: nginxproxy/acme-companion container_name: nginx-proxy-acme restart: always environment: - [email protected] volumes_from: - nginx-proxy v

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10