Nagios XI includes a PostgreSQL Query wizard that enables you to easily run a custom SQL query and quickly configure warning/critical thresholds based on the number of matching results. You can also refer to this documentation for full details: Here is a direct link to the PDF as well Monitoring PostgreSQL Queries| Nagios Library
An Intellyx Brain Candy Update When we last spoke with StackGen in March, 2024, they were doing business as AppCD. Then, as now, they simplify and automate application infrastructure provisioning. They have recently added agentic AI functionality their platform. They also recently acquired OpsVerse and are adding their Aiden agent and observability capabilities into the […]| Intellyx – The Digital Transformation Experts – Analysts
... Read more The post Critical CVE-2025-48964 Vulnerability in iputils: A Major Concern for Linux Administrators appeared first on LinuxConfig.| LinuxConfig
In this post I describe how to configure the URLs your application binds to when using Kestrel or the WebListener HTTP servers| Andrew Lock | .NET Escapades
Debugging the Crazyflie using the debug-adapter kit gives you direct access to the STM32 with a hardware debugger. It makes it possible to pause execution, step through code, and inspect what’s happening in real time.| Bitcraze
At Deutsche Telekom Pan-Net, we have embraced Istio as the umbrella to cover our services. Unfortunately, there are services which have not yet been migrated to Kubernetes, or cannot be. We can set Istio up as a proxy service for these upstream services. This allows us to benefit from capabilities like authorization/authentication, traceability and observability, even while legacy services stand as they are. At the end of this article there is a hands-on exercise where you can simulate the sc...| Istio Blog
Learn about the top 10 features in Nagios XI Enterprise Edition, including Audit Log, SLA Reports, Bulk Modification, Capacity Planning, and more. Discover tools for enhanced monitoring efficiency!| Nagios Library
This year, I moved from NixOS to Ubuntu. This post outlines my experience through that process, as well as a new philosophy for how I manage my machine and configuration which embraces the defaults and more contemporary applications.| Jon Seager
What can you do with the huge loopback range (127.0.0.0/8)? Is it future-proof?| Clément Joly – Open-Source, Rust & SQLite
In this post I describe 5 different ways to set which URLs your ASP.NET Core application listens on.| Andrew Lock | .NET Escapades
Improve your local mesh network by moving away from the default LongFast preset to higher bandwidth options| meshtastic.org
Relative line numbers (relative to the current line) are super popular in the world of Vim, because there it’s super easy to move n lines up or down wiht j and k. In the world of Emacs most of us tend to just go some line using M-g g using a absolute line number or using avy (avy-goto-line). That being said, relative line numbers are easy to enable in Emacs and quite handy if you’re into evil-mode: (setq display-line-numbers-type 'relative) (global-display-line-numbers-mode +1) Relative l...| Emacs Redux
I use Chezmoi to manage my configuration| Clément Joly – Open-Source, Rust & SQLite
How should you configure your Hibernate logging to find performance issues during development? What is the best configuration for production?| Thorben Janssen
Showcasing two small techniques that improve your happiness when working with Phoenix application configuration.| bitcrowd blog Blog
Ever since we released LMDB, our advice to software designers has been "don't do application level caching. Let the kernel handle it for...| Symas
If you are running an internet facing server, you know the services you are running are exposed to the “outside” world and are being constantly probed and attacked by skiddies. Are you tired of all these scans and probes? Yeah me too… I have had enough of skiddies trying to “hack” a login page or […] The post How fail2ban saved my bacon (and how it can save yours) appeared first on ServMask Helpdesk.| ServMask Helpdesk
Learn how to use "Rails config x" and add your own configuration options to your Rails app with built-in methods, ActiveSupport::OrderedOptions, and practical use cases.| Joy of Rails
There have| My Teams Lab
If you use OS X or Linux on your desktop/servers, you may be at a point where you have configured a lot of your own settings, configurations, or themes within| The Smalley Creative Blog
Back in early 2012 I had been helping with system administration of a number of Debian/Ubuntu-based machines, and the odd Solaris machine, for a couple of years at $DAYJOB. We had a combination of hand-written scripts, documentation notes that we Continue reading Cosmos – A Simple Configuration Management System→| Simon Josefsson's blog
Since implementing HSTS and an HTTPS redirect properly was trickier than I'd imagined, I decided to write my own guide on how to do it. I'll also explain how to configure Nginx to use OSCP Stapling and IPv6 since I worked on getting both of them working at around the same time as I got the proper HTTPS redirect working. Preface Very recently, I decided to move my blog from Rackspace Cloud Files to a VPS at DigitalOcean. While the pricing for Cloud Files was very agreeable, you really did only...| Cyrozap's Tech Projects
At Deutsche Telekom Pan-Net, we have embraced Istio as the umbrella to cover our services. Unfortunately, there are services which have not yet been migrated to Kubernetes, or cannot be. We can set Istio up as a proxy service for these upstream services. This allows us to benefit from capabilities like authorization/authentication, traceability and observability, even while legacy services stand as they are. At the end of this article there is a hands-on exercise where you can simulate the sc...| Istio Blog
At Intuit, we read the blog post Multi-Mesh Deployments for Isolation and Boundary Protection and immediately related to some of the problems mentioned. We realized that even though we wanted to configure a single multi-cluster mesh, instead of a federation of multiple meshes as described in the blog post, the same non-uniform naming issues also applied in our environment. This blog post explains how we solved these problems using Admiral, an open source project under istio-ecosystem in GitHu...| Istio Blog
Kubernetes operators provide a pattern for encoding human operational knowledge in software and are a popular way to simplify the administration of software infrastructure components. Istio is a natural candidate for an automated operator as it is challenging to administer. Up until now, Helm has been the primary tool to install and upgrade Istio. Istio 1.4 introduces a new method of installation using istioctl. This new installation method builds on the strengths of Helm with the addition of...| Istio Blog
Istio 1.4 introduces an experimental new tool to help you analyze and debug your clusters running Istio. istioctl analyze is a diagnostic tool that detects potential issues with your Istio configuration, as well as gives general insights to improve your configuration. It can run against a live cluster or a set of local configuration files. It can also run against a combination of the two, allowing you to catch problems before you apply changes to a cluster. To get started with it in just minu...| Istio Blog
In this post I describe 8 different ways to set which URLs your ASP.NET Core application listens on.| Andrew Lock | .NET Escapades
Configuration Objects| The Grumpy Troll
In this article, we would be looking at how we can externalize application configuration using Spring Cloud Config.| RefactorFirst
Large shell startup scripts (.bashrc, .profile) over about fifty lines or| Arabesque
So a while back I read a blog post about using OpenSSL engines on Windows as part of a local privesc exploit against a certain VPN client. This got me thinking. If every time the OpenSSL library is…| Darren Martyn
I was asked to enable Sitecore’s ItemService endpoints on a containerised instance of Sitecore recently, and my first pass through this didn’t work. Turns out there’s a key bit of…| Jeremy Davis
How do you keep local changes to the configuration files in your project's repository? Should you use update-index, or is there a better way to ignore local changes. None of that nonsense, your configuration files do not belong there and in this article I'll show you why, and what alternatives there are for your configuration files.| Git Cookbook
Discover what the Hugo - LoveIt theme is all about and the core-concepts behind it.| LoveIt
In this post I introduce the new configuration binder source generator added in .NET 8 preview 3, explore how it works, and how to use it in your apps.| Andrew Lock | .NET Escapades
Shaving off a few milliseconds from Neovim startup time.| Clément Joly – Open-Source, Rust & SQLite
Four months ago I was still using SpaceVim when I stumbled upon a blog post on how to configure NeoVim with Lua. I then started to create my own configuration. In this post I’ll share the learnings acquired in the process. I hope you will find this useful to create your own configuration! Why create your own Vim config from scratch? Vim has been my daily driver for about ten years. Almost from the beginning, I used Vim distributions for ease of configuration. Spf13 vim first and then SpaceV...| Clément Joly – Open-Source, Rust & SQLite
Generating repetitive snippets with code, like time variant of section titles.| Clément Joly – Open-Source, Rust & SQLite
Shaving off a few milliseconds from Neovim startup time.| Clément Joly – Open-Source, Rust & SQLite