Most Popular
1500 questions
56
votes
3 answers
Ubuntu ufw: set a rule on a per interface basis
I want to create a rule that allows anyone on eth1 to access port 80. Can UFW do this or should I go back to using Shorewall?
To clarify: this is a capabilties question, can ufw handle interfaces as a target?
Antonius Bloch
- 4,960
56
votes
8 answers
How to grep ps output with headers
How can I grep the PS output with the headers in place?
These two process make up an app running on my server....
root 17123 16727 0 16:25 pts/6 00:00:00 grep GMC
root 32017 1 83 May03 ? 6-22:01:17…
Ben
- 3,970
- 20
- 69
- 101
56
votes
11 answers
Is there an equivalent to ssh-copy-id for Windows?
Is there any equivalent or port of ssh-copy-id available for Windows? That is, is there an easy way to transfer SSH keys from a local machine to a remote server under Windows?
In case it helps, I'm using Pageant and Kitty (a Putty alternative)…
Matt V.
- 837
56
votes
2 answers
Difference between Xen PV, Xen KVM and HVM?
I know that Xen is usually better than OpenVZ as the provider cannot oversell in Xen.
However, what is the difference between Xen PV, Xen KVM and HVM (I was going through this provider's specs? Which one is better for what purposes and why?…
JP19
56
votes
9 answers
What's the difference between apt-get and aptitude?
I don't get why there are two different programs in a minimal install to install software. Don't they do the same thing? Is there a big difference? I have read everywhere to use aptitude over apt-get but I still don't know the difference
Thomaschaaf
- 3,122
56
votes
6 answers
Debugger for Iptables
I'm looking for an easy way to follow a packet through the iptables rules. This is not so much about logging, because I don't want to log all traffic (and I only want to have LOG targets for very few rules).
Something like Wireshark for Iptables. Or…
Chris Lercher
- 4,412
- 9
- 38
- 41
56
votes
4 answers
How do you get e2fsck to show progress information?
I'm running e2fsk on a very large (1TB+) ext3 disk with
e2fsck -v /dev/sda1
from RIPLinux booted with PXE.
I get
e2fsck 1.41.6 (30-May-2009)
/dev/sda1 contains a file system with errors, check forced.
Pass 1: Checking inodes, blocks, and sizes
and…
Tim Abell
- 1,411
56
votes
4 answers
How can I find out what is causing interrupts on Windows?
Occasionally I come across servers (Windows 2003 and 2008) with high processor % interrupt time. Is there a way to see what program or device is causing the interrupts?
jlupolt
- 944
55
votes
11 answers
IIS7: can't set host name on site with SSL cert and port 443
Consider a Win 2008 SP2 machine with IIS7. The task is to apply a certificate and host name to the one and only Site on this machine. The site's host headers need to be abc.123.example.com
The first step was installing the .pfx to the Personal…
p.campbell
- 4,447
55
votes
6 answers
Puppet vs Chef, pro and contra from users and use cases
I already googled and read the "to-puppet-or-to-chef-that-is-the-question" article.
I'm interested in use cases, real world implementations in which people had choosen one or the other on real problems bases.
I'm particularly interested in…
drAlberT
- 11,099
55
votes
6 answers
How can I view active remote connections (RDP) to a Windows server?
How can I view, who is currently connected to a server (Windows 2012) with a remote desktop client? I am myself connected to this server via RDP.
This question offers a solution to get IP addresses with established connections. I would be interested…
gpinkas
- 657
- 1
- 6
- 12
55
votes
2 answers
docker-compose: option to automaticaly remove container after run in docker-compose.yml
The docker-compose run reference states that it has the --rm option to
Remove container after run.
I want to make this a default run behavior for some of services I specify in docker-compose.yml.
So, the questions are:
Can it somehow be…
Ivan Kolmychek
- 1,314
55
votes
6 answers
Steps for limiting outside connections to docker container with iptables?
My goal is to limit access to docker containers to just a few public IP addresses. Is there a simple, repeatable process to accomplish my goal? Understanding only the basics of iptables while using Docker's default options, I'm finding it very…
GGGforce
- 809
55
votes
12 answers
Docker COPY issue - "no such file or directory"
In my Dockerfile I have the following 'COPY" statement:
# Copy app code
COPY /srv/visitor /srv/visitor
It should go without saying that in my host system, under the "/srv/visitor" directory, there is indeed my source code:
[root@V12 visitor]# ls…
dlyk1988
- 1,704
55
votes
10 answers
Auto accept rsa key fingerprint from command line
I've tried yes | ssh root@10.x.x.x to try to accept the RSA key fingerprint, but am still prompted if I'm sure I want to connect. Is there a way to make this automatic?
VenomFangs
- 807