System Administration
epub |eng | 2023-11-15 | Author:Anand Rai
Figure 7.14 â Configuring the threshold to raise an alert Next, you configure the name of the alert rule and where the alert should be stored in Grafana: Figure 7.15 ...
( Category:
Distributed Systems & Computing
November 13,2023 )
epub |eng | 2023-11-15 | Author:Bernd Nordhausen
Using a directory structure to manage environments Note The code for this section is under the chap05/directory-structure directory in the GitHub repo of this book. We saw that using workspaces ...
( Category:
Distributed Systems & Computing
November 2,2023 )
epub |eng | 2023-10-15 | Author:Jack Lee & Jason Milgram & David Rendón
2.2. Migrate your workloads Make cloud migration easier with Azure Migrate: Simplify the process of discovering, assessing, and migrating your workloads by using Azure Migrate. Azure Migrate is a centralized ...
( Category:
Linux & UNIX Administration
October 20,2023 )
pdf | | 2023-10-12 | Author:Paul McCollum
( Category:
Storage & Retrieval
October 13,2023 )
epub, mobi |eng | 2023-03-03 | Author:Reza Salehi
The stage is set to configure your Azure Stream Analytics job input now: az stream-analytics input create \ --input-name "temperatureInput" \ --job-name $streamJobName \ --resource-group "$rgName" \ --properties /path/to/inputProperties.json Tip ...
( Category:
Distributed Systems & Computing
October 12,2023 )
epub |eng | 2023-01-10 | Author:Natale Vinto and Alex Soto Bueno
( Category:
Distributed Systems & Computing
September 16,2023 )
epub |eng | 2002-01-01 | Author:Gordon, James A.;
EMERGENCY PUBLIC INFORMATION As indicated under the preparedness phase, emergency public information is a critical aspect of successful emergency management. Simply put, people want to know what has happened and ...
( Category:
Disaster & Recovery
August 14,2023 )
epub |eng | | Author:Selçuk Artut
Step 4: Letâs shift our circle to the right with a distance of its radius. Remember that 120 px is the diameter. We will later have 12 copies in total ...
( Category:
Storage & Retrieval
July 17,2023 )
pdf |en | | Author: Selçuk Artut
( Category:
Storage & Retrieval
July 17,2023 )
pdf | | 2014-07-11 | Author:Unknown
( Category:
Storage & Retrieval
July 14,2023 )
epub |eng | 2021-07-26 | Author:Alassouli, Dr. Hidaia Mahmood [Alassouli, Dr. Hidaia Mahmood ]
12. Install firebox internet browser $ sudo apt install firebox ây 13. If you prefer Google chrome browser, you can download chromium-browser through the following command: $ sudo apt install ...
( Category:
Linux & UNIX Administration
July 14,2023 )
pdf |en | | Author: Chanaka Fernando
( Category:
Distributed Systems & Computing
July 14,2023 )
epub |eng | 2021-12-05 | Author:Chou, Eric [Chou, Eric]
Create a Client machine Currently, the MSK cluster can only be accessed from within the VPC. This means the Kafka clients will need access to the VPC. This can be ...
( Category:
Distributed Systems & Computing
July 14,2023 )
pdf |en | | Author: Selcuk Artut
( Category:
Storage & Retrieval
July 14,2023 )
pdf |en | | Author: Aly Saleh, Murat Karslioglu
( Category:
Linux & UNIX Administration
June 29,2023 )
Categories
Popular ebooks
Kubernetes in Production Best Practices by Aly Saleh & Murat Karslioglu(6726)Optimizing Microsoft Azure Workloads by Rithin Skaria(6266)
Kubernetes in Production Best Practices by Aly Saleh and Murat Karslioglu(5993)
Cloud Computing Demystified for Aspiring Professionals by David Santana(5103)
Zed Attack Proxy Cookbook by Ryan Soper & Nestor N Torres & Ahmed Almoailu(4530)
Google Cloud for Developers: Write, migrate, and extend your code by leveraging Google Cloud by Hector Parra Martinez(3547)
Mastering Cyber Intelligence by Jean Nestor M. Dahj;(3276)
AWS Observability Handbook by Phani Kumar Lingamallu & Fabio Braga de Oliveira(3168)
The Road to Azure Cost Governance by Paola E. Annis Giuliano Caglio(2808)
Microsoft 365 Fundamentals Guide by Gustavo Moraes and Douglas Romão(2253)
Agile Security Operations: Engineering for Agility in Cyber Defense, Detection, and Response by Hinne Hettema(1755)
Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory by Giuseppe Di Federico Fabrizio Barcaroli(1744)
Bootstrapping Service Mesh Implementations with Istio by Anand Rai(1635)
The Road to Azure Cost Governance: Techniques to tame your monthly Azure bill with a continuous optimization journey for your apps by Paola E. Annis Giuliano Caglio(1262)
Agile Security Operations: Engineering for agility in cyber defense, detection, and response by Hinne Hettema(1197)
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs by Ryan Soper Nestor N Torres Ahmed Almoailu(1187)
Linux Administration Best Practices: Practical Solutions to Approaching the Design and Management of Linux Systems by Scott Alan Miller(1134)
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio by Parth Pandit Robert Hardt(1082)
Terraform for Google Cloud Essential Guide by Bernd Nordhausen(887)
Becoming KCNA Certified by Dmitry Galkin(871)
