About 59 results
((Sponsored)) 7 Products In 7 Days
PCGuys.org.uk
7 Products In 7 Days – Business planning eBook with MRR
((Sponsored)) 100 Website Flipping Tips
PCGuys.org.uk
This eBook will give you all kind of selling points to use! And has MRR!
google.auth.aws module — google-auth 2.38.0 documentation
https://google-auth.readthedocs.io/en/latest/reference/google.auth.aws.html
=GetCallerIdentity&Version=2011-06-15'. ,. 'region_url'. :. 'http://169.254.169.254/latest/meta-data/placement/availability-zone'. ,. 'url'. :. 'http://169.254.169.254/latest/meta-data/iam/security-credentials
Manage external traffic with application load balancing | Nomad | HashiCorp Developer
https://developer.hashicorp.com/nomad/tutorials/load-balancing/external-application-load-balancing
. AWS_SERVER_TAG_NAME. =. $(. curl. http://169.254.169.254/latest/meta-data/tags/instance/Name). sed. -i. 's/SERVER_NAME/$AWS_SERVER_TAG_NAME/g'. $NOMAD_HCL_PATH. # Put targeted nodes in a different datacenter. # and add service_client meta
LISA11-PER-ScalingOnEC2
https://www.usenix.org/legacy/events/lisa11/tech/full_papers/Brousse.pdf
initially
used the user-data just to pass our server hostname, example:
“hostname=dev-mysql01”. Note that, in the same way you
can have access to many meta-data of your running instance:
curl -s http://169.254.169.254
Duplicate hosts with Kubernetes on AWS (EC2 or EKS)
https://docs.datadoghq.com/containers/troubleshooting/duplicate_hosts/
Troubleshooting Sensitive Data Scanner. Setup Telemetry Data Cloud Storage Scanning Rules Library Rules Custom Rules Guides AI Observability. LLM Observability. Quickstart Instrumentation Automatic SDK Reference HTTP API Monitoring
Lineland
http://www.larsgeorge.com/
Sep 14 12:10:55 ip 10 242 18 80 user data: + install_hadoop_lzo Sep 14 12:10:55 ip 10 242 18 80 user data: ++ wget q O http://169.254.169.254/latest/meta data/instance [..]
Amazon Virtual Private Cloud - User Guide
https://docs.aws.amazon.com/pdfs/vpc/latest/userguide/vpc-ug.pdf
nextcloud-30.0.0.tar.bz2
https://fossies.org/linux/www/nextcloud-30.0.0.tar.bz2
deutsche Übersetzung unter http://www.gnu.org/copyleft/lesser.de.html.
Die Vorlage wird verteilt in der Hoffnung, dass sie Nutzen für den Anwender bringt, aber OHNE JEDE GARANTIE. Es bestehen weder Gewährleistungsansprüche
nextcloud-30.0.0.tar.gz
https://fossies.org/linux/www/nextcloud-30.0.0.tar.gz
deutsche Übersetzung unter http://www.gnu.org/copyleft/lesser.de.html.
Die Vorlage wird verteilt in der Hoffnung, dass sie Nutzen für den Anwender bringt, aber OHNE JEDE GARANTIE. Es bestehen weder Gewährleistungsansprüche
nextcloud-30.0.0.tar.xz
https://fossies.org/linux/www/nextcloud-30.0.0.tar.xz
Übersetzung unter http://www.gnu.org/copyleft/lesser.de.html.Die Vorlage wird verteilt in der Hoffnung, dass sie Nutzen für den Anwender bringt, aber OHNE JEDE GARANTIE. Es bestehen weder Gewährleistungsansprüche irgendwelcher Art
nextcloud-30.0.0.zip
https://fossies.org/linux/www/nextcloud-30.0.0.zip
deutsche Übersetzung unter http://www.gnu.org/copyleft/lesser.de.html.
Die Vorlage wird verteilt in der Hoffnung, dass sie Nutzen für den Anwender bringt, aber OHNE JEDE GARANTIE. Es bestehen weder Gewährleistungsansprüche
Rules depending on Product Attribute or Meta data - WooCommerce
https://woocommerce.com/feature-request/rules-depending-on-product-attribute-or-meta-data/
openstack - Documentation Ubuntu Francophone
http://doc.ubuntu-fr.org/openstack
| +----------+-------------------------------------------------------------------------------------------------------------------------+. Création du compte interne du service Nova. keystone --token ADMPASSWD --endpoint http://192.168.1.250:35357/v2.0/ user-create --name=nova --pass=ADMPASSWD [email protected]. Répondra
http://au.news.yahoo.com/a/-/latest/5635299/fieldi...
http://alles-schallundrauch.blogspot.com/2008/11/die-klimaerwrmung-und-andere-fakes.html?showComment=1244428140941
Trivy Security incident 2026-03-19 · aquasecurity trivy · Discussion #10425 · GitHub
https://github.com/aquasecurity/trivy/discussions/10425
We have removed all malicious artifacts from the affected registries and channels. All the latest releases now point to a safe version. Component. Affected versions. NOT affected. Exposure window (UTC). Duration. trivy. v0.69.4 (. latest. tag also pointed to v0.69.4). GHCR, ECR Public, Docker Hub, deb, rpm, get.trivy.dev. 1) v0.69.3 or earlier 2) Container images refereced by digest. 2026-03-19 18:22. 1 – ~21:42. ~3 hours. trivy. v0.69.5-v0.69.6 (. latest. tag also pointed to v0.69.6). Docker Hub. 1) v0.69.3 or earlier 2) Container images refereced by digest. 2026-03-22 15:43 – 2026-03-23...
GitHub - joachimneu/python-markdown-yaml-meta-data
https://github.com/joachimneu/python-markdown-yaml-meta-data
The way IAM roles work is terrifyingly simple. IAM generates temporary access ke... | Hacker News
https://news.ycombinator.com./item?id=7174042
IAM generates temporary access key identifier and secret access key with the configured permissions and EC2 makes them available to your instance via the instance metadata as JSON at. http://169.254.169.254/latest/meta-data/iam/security-credent... . The AWS SDK periodically retrieves and parses the JSON to get the new credentials. That's it. I'm not entirely sure whether the credentials can be used from a different IP or not, but given a proxying function that does not really matter. I make sure all HTTP requests in my (Java) application go through a DNS resolver that throws an exception if:...
Great point with regards to IAM roles. The applications I've worked on don't dow... | Hacker News
https://news.ycombinator.com./item?id=7173825
IAM generates temporary access key identifier and secret access key with the configured permissions and EC2 makes them available to your instance via the instance metadata as JSON at. http://169.254.169.254/latest/meta-data/iam/security-credent... . The AWS SDK periodically retrieves and parses the JSON to get the new credentials. That's it. I'm not entirely sure whether the credentials can be used from a different IP or not, but given a proxying function that does not really matter. I make sure all HTTP requests in my (Java) application go through a DNS resolver that throws an exception if:...
Be very careful with assigning IAM roles to EC2 instances. Many web applications... | Hacker News
https://news.ycombinator.com./item?id=7173464
IAM generates temporary access key identifier and secret access key with the configured permissions and EC2 makes them available to your instance via the instance metadata as JSON at. http://169.254.169.254/latest/meta-data/iam/security-credent... . The AWS SDK periodically retrieves and parses the JSON to get the new credentials. That's it. I'm not entirely sure whether the credentials can be used from a different IP or not, but given a proxying function that does not really matter. I make sure all HTTP requests in my (Java) application go through a DNS resolver that throws an exception if:...
((Sponsored)) The 36 Crazy Fists - 4K UHD
hddvd-revived.com
Looking to avenge his fathers death he sets out to learn kung fu from a drunk.
((Sponsored)) 100 Website Flipping Tips
PCGuys.org.uk
This eBook will give you all kind of selling points to use! And has MRR!