APISIX Digital Ocean Setup
Helm repo setup Set to version 3 Install APISIX Make sure you have access to Kubernetes cluster using kubeconfig file
APISIX Digital Ocean Setup Read More »
Helm repo setup Set to version 3 Install APISIX Make sure you have access to Kubernetes cluster using kubeconfig file
APISIX Digital Ocean Setup Read More »
To generate private key, execute below command: Step 1. Generate the private key: Step 2: Generate the Public Key from the Private Key: Step 3: Convert the Private Key to Base64: Step 4: Convert the Public Key to Base64: The -A flag in the openssl base64 command ensures that the Base64 output is in a
How to generate private and public keys using OpenSSL command Read More »
To copy files from one server to another using scp (Secure Copy Protocol), you’ll need SSH access to both the source and the destination servers. The scp command can be used to securely transfer files between hosts on a network. Here’s the basic syntax to copy files from your local machine to a remote server:
SCP Command to copy files to new server Read More »
Certainly! Here are some useful PostgreSQL commands that you can use via the command line interface (CLI), specifically through the psql utility. These commands help you interact with your PostgreSQL database for various purposes, from administrative tasks to data manipulation: Connecting to a PostgreSQL Database: Listing Databases and Tables: Switching Databases: Viewing Table Structure: Executing
Useful PostgreSQL commands for command line Read More »
To interact with a PostgreSQL database, you typically use the psql command-line interface if you are working directly from the terminal or command prompt. Here are the basic commands you’ll need for listing databases, selecting a database to use, and querying tables within that database: or This command displays the list of databases along with
PostgreSQL list database and query tables Read More »
Step 1: Go to Microsoft 365 Admin Center and sign in with your admin account. Step 2: Go to Users > Active Users. Step 3: Click on Multi-Factor Authentication A page with all the users will pop up. Step 4: Click on the user you would like to disable MFA: Step 5: Click on disable
How to Disable Multi-Factor Authentication In Microsoft 365 Read More »
Base64 encoding is a method of encoding binary data into an ASCII (text-based) format. In Linux and other computing environments, Base64 encoding is commonly used to represent binary data in a human-readable form. This encoding is used for different purposes. It encodes binary files for transmission over protocols that use text. It can also embed
Linux Base64 encoding and decoding string value Read More »
Kubernetes 1.14 now provides out of the box support for Windows worker nodes to run windows containers with in a Kubernetes cluster. This feature was in preview for a long time, and now it is production ready. This is a wonderful opportunity for most cloud giant companies to start applying a new version of Kubernetes
Setup Windows Node with Kubernetes 1.14 Read More »
This tutorial will showcase the step-by-step process of setting up a Kubernetes 1.14 Cluster, allowing organizations and communities to leverage exciting new features that have been eagerly anticipated. Especially when it comes to Windows containers. Kubernetes now offers windows containers out of the box and allows you to add windows nodes to a Kubernetes cluster.
Setup Kubernetes 1.14 Cluster on CentOS 7.6 Read More »
Are you receiving an error in your browser console and a pop-up in Chrome browser that content is loaded over HTTP, and it needs to be https? If yes, then you came to the right place. Mixed Content: The page at ‘https://example.com/ghost/#/site‘ was loaded over HTTPS, but requested an insecure resource ‘http://example.com/‘. This request has
Ghost blog content not secure warning Read More »