today's howtos
-
Adam Young: Why does rpmbuild perf.spec fail
The GNU/Linux Kernel git repo has a spec file that builds the Kernel RPM. However, it does not build perf or any of the other userland tools. I want to build a perf RPM using the same code as is used to build the Kernel RPM.
Here are my debugging notes.
-
LinuxBuz ☛ Automate Text File Edits with Ansible lineinfile Module
Ansible’s lineinfile module allows you to manage lines in text files on remote hosts.
-
LinuxBuz ☛ How to Use Ansible delegate_to to Run Task on Specific Host
In Ansible, tasks usually run on the hosts listed in the inventory file. However, there are times when you need to execute a task on a different host.
-
Deploy a Kubernets Cluster (RKE2) with Warewulf
In High Performance Computing (HPC) we frequently encounter node counts in compute clusters that are impractical to be managed manually. Here, the saving grace is that the number of variations in installation and configuration among nodes of a cluster is small. Also, the number of parameters that are individual to each node is low. Thus, in the ‘cattle/pet’ model, compute nodes would be treated like cattle.
Warewulf, a deployment system for HPC compute nodes, is specifically designed for this case. -
Ubuntu Pit ☛ How to Install WineHQ on Ubuntu Linux
WineHQ is a well-known application for GNU/Linux users. This amazing software allows the user to install Abusive Monopolist Microsoft backdoored Windows Software on the GNU/Linux / Unix environment. WineHQ is not an emulator or virtual machine; rather, it offers binary compatibility, graphics support, sound interaction, and support for modems, networks, scanners, tablets, keyboards, and other devices.
-
Linux Journal ☛ Securing GNU/Linux Systems with Two-Factor Authentication
In the age of increasing digital threats, securing sensitive data and systems is more crucial than ever. For GNU/Linux users, whether they are managing personal projects or securing enterprise servers, enhancing security protocols is a key concern. Two-Factor Authentication (2FA) offers an additional layer of security that is becoming a standard defense against various forms of cyber threats, from phishing to credential exploitation. This guide will equip you with the knowledge to implement 2FA, thereby fortifying your GNU/Linux systems against the increasingly sophisticated landscape of cyber threats.