The initial idea is to make application invokes deconstructor of each component as soon as the application receives specific signals such as SIGTERM and SIGINT
Gracefully Shutdown Docker Container - Kakashi's Blog - 1 views
-
-
When you run a docker container, by default it has a PID namespace, which means the docker process is isolated from other processes on your host.
-
The PID namespace has an important task to reap zombie processes.
- ...11 more annotations...
CAP Theorem | Complete Think - 1 views
Little Snitch - 1 views
-
"As soon as you're connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don't. But you don't notice anything, because all of this happens invisibly under the hood."
GitHub - v2fly/v2ray-core at v4.32.0 - 0 views
deepnight.net | LEd - 2D map editor - 0 views
GitHub - fonoster/fonos: - 0 views
-
"Project Fonos is open-source telecommunications for the cloud. It helps VoIP integrators quickly deploy new networks and benefit from value-added services such as Programmable Voice, Messaging, and Video. This repository assembles the various components needed to deploy a telephony system at scale."
How to Benchmark Performance of MySQL & MariaDB Using SysBench | Severalnines - 1 views
-
SysBench is a C binary which uses LUA scripts to execute benchmarks
-
support for parallelization in the LUA scripts, multiple queries can be executed in parallel
-
by default, benchmarks which cover most of the cases - OLTP workloads, read-only or read-write, primary key lookups and primary key updates.
- ...21 more annotations...
Avo HQ - 1 views
Deploy Replica Set With Keyfile Authentication - MongoDB Manual - 0 views
-
Keyfiles are bare-minimum forms of security and are best suited for testing or development environments.
-
With keyfile authentication, each mongod instances in the replica set uses the contents of the keyfile as the shared password for authenticating other members in the deployment.
-
On UNIX systems, the keyfile must not have group or world permissions.
- ...3 more annotations...
Internal/Membership Authentication - MongoDB Manual - 0 views
-
equire that members of replica sets and sharded clusters authenticate to each other.
-
Enabling internal authentication also enables client authorization.
« First
‹ Previous
161 - 180 of 1422
Next ›
Last »
Showing 20▼ items per page