Whenever a hacker breaks in to a system, there are a few steps they take to keep the access without being caught red handed.
Simple script for monitoring of a web service using curl
High availability requires shared storage of files
Redundant IP-Address assignment simply means that if one node goes down, another takes over the Virtual IP. This can be useful in many different scenarios like firewalling or reverse proxy.
Running a cluster takes care of replication of data between several nodes. This example is running a three node cluster. Start by installing a base container with Debian 10 buster. Don’t forget to set fixed ip-addresses on your containers, i use dnsmasq to assign static leases based on hostname. Install MariaDB Configure the /etc/hosts file… Continue reading MariaDB Galera Cluster
A successful master slave setup requires an effective way for nodes to communicate
Secure incremental backups over the network
a colorful guide to wordpress administration
RFXtrx433XL USB-controllerfor sending and receiving signals wireless over the 433Mhz band. Raspberry PI 4B, 4GB
It’s not, it can actually be accomplished by using subuid (subordinate user id’s) & subgid (subordinate group id’s) built into the linux kernel.