Regardless of the CPU / RAM use, IO is still too poor and we're provisioning a new development server, see T1536.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Dec 16 2019
Dec 15 2019
Dec 6 2019
See also T100.
Woodscloud is a better fit.
Dec 5 2019
Nov 24 2019
Nov 22 2019
Some projects start to solve this. Each has little contributors.
As Ysul will be superseded by Windriver, this task will need to be reevaluated.
Nov 21 2019
For cost optimization, as the final decision was made this Monday, we were waiting for Black Friday promotion.
Purchase has been done for a PRO-6-S (Intel Xeon E3-1240-V6, 64 GB DDR4 ECC, 2x 500 GB SSD).
Nov 19 2019
12.0 done at an not logged date (probably 33 days ago, ie 2016-10-17), I assume this is 12.1 request per comment.
Oct 23 2019
Oct 14 2019
No more log messages.
$ sudo service cron restart Stopping cron. Waiting for PIDS: 1043. Starting cron.
Oct 7 2019
Sep 25 2019
Sep 15 2019
Sep 10 2019
12.1 is coming in November, according https://www.freebsd.org/releases/12.1R/schedule.html
Installed, reboot for kernel live 2019-08-24.
Aug 23 2019
https://github.com/freebsd/pkg/blob/master/libpkg/repo/binary/init.c#L334 makes me notice pkg wasn't invoked as root.
https://packages.nasqueron.org/freebsd/ works fine
Aug 1 2019
I have no idea how to do it, but looks like a good plan. Apart that, in my opinion, you do a much more of what would be necessary to run nasqueron services (but it is your time, you use it like you want)
Those are valid concerns.
looks an interesting tool, something quite frightening is that it comes with a set of exploit, (if I understand, a common way to exploit sudo flaws).
As a shell script not even indented, it is absolutely unreadable, and more or less one have to trust the creator to not making mistake.
Moreover for full use, you have to give a sudo password in clear text ( I just don't understand the reason)
As such, I would say it would be kind of crazy to run it automatically and I would not comfortable to simply run it for myself in any way.
Jul 30 2019
Jul 29 2019
Tagging security as we could need follow-up ACL to allow to connect to.
Jul 17 2019
Jul 5 2019
It's provided by PSmisc.
Jul 2 2019
Temporarily hotfixed with ln -s /usr/local/lib/libreadline.so.8 /usr/local/lib/libreadline.so.7
Jul 1 2019
Jun 27 2019
Apr 25 2019
When the payload generated by rVIPER Wearg/ServersLog.tcl has been tested with Postman, it works fine.
Apr 24 2019
Apr 22 2019
Actually, for a server point of view, certificates are located in /usr/share/openfire/resources/security.