Every network interface has a unique MAC address, set by the manufacturer. It’s how network connections identify connection endpoints. On Linux, you can permanently change a MAC address if you want.
[mai mult...]How to Run MySQL on Kubernetes With Oracle’s Operator
Kubernetes support for stateful applications has considerably matured over the past few years. Now it’s viable to locate your database inside your cluster, allowing it to benefit from the same scalability as your other workloads.
MySQL is one of the most popular relational database engines and it’s now augmented by an official Kubernetes operator. The Oracle-led open-source project provides a simple way to create managed MySQL clusters within Kubernetes.
[mai mult...]How to Backup Kubernetes MySQL Operator Clusters
Oracle’s MySQL Operator for Kubernetes is a convenient way to automate MySQL database provisioning within your cluster. One of the operator’s headline features is integrated hands-off backup support that increases your resiliency. Backups copy your database to external storage on a recurring schedule.
This article will walk you through setting up backups to an Amazon S3-compatible object storage service. You’ll also see how to store backups in Oracle Cloud Infrastructure (OCI) storage or local persistent volumes inside your cluster.
[mai mult...]How to Use Kubernetes Taints and Tolerations to Avoid Undesirable Scheduling
Taints and tolerations are a Kubernetes mechanism for controlling how Pods schedule to the Nodes in your cluster. Taints are applied to Nodes and act as a repelling barrier against new Pods. Tainted Nodes will only accept Pods that have been marked with a corresponding toleration.
Taints are one of the more advanced Kubernetes scheduling mechanisms. They facilitate many different use cases where you want to prevent Pods ending up on undesirable Nodes.
[mai mult...]How to Debug Kubernetes “FailedScheduling” Errors
The Linux rm Command: Everything You Need to Know
The Linux rm
command deletes files and directories. To use this tool safely, you need to be certain what’s going to happen when you hit “Enter.”
How to Protect Your Linux Computer From Rogue USB Drives
USB memory sticks can be used to steal data from your Linux computer. USBGuard lets you set rules governing the use of USB memory sticks, like a firewall for USB storage devices.
[mai mult...]Why QtFM Could Become My Favorite Linux File Manager
The Qt file manager called QtFM has great features, such as storing custom commands so you don’t need to open a Linux terminal window to run them. The only drawback is getting it installed. Let’s look at what makes this file browser special and how you can (maybe) try it out.
[mai mult...]8 Typos You Really Need to Avoid on Linux
How to Deal With Spaces in Filenames on Linux
Like most operating systems, Linux supports filenames with spaces in them. But using these filenames on the command line isn’t always straightforward. Here are several ways you can handle filenames containing spaces.
[mai mult...]