Monitoring - Grafana, Prometheus, Node Exporter, scripted collection of common Linux & Mac cli monitoring stats and log locations for quick generation of vendor support tarball bundles both locally and over SSH AWS - Amazon Web Services - AWS account summary, lots of IAM reports, CIS Benchmark ...
your browser fetches the page located at the unique location specified in the URL name. If the web were designed otherwise (ie, if several different web pages had the same web address, or if one web address were located at several different locations), then the web could not function with...
A company with multiple locations has taken a cloud-only approach to its infrastructure The company does not have standard vendors or systems resulting in a mix of various solutions put in place by each location The Chief Information Security Officer wants to ensure that the internal security team...
jenkins_cred_add_cert.sh - creates a Jenkins certificate credential from a PKCS#12 keystore jenkins_cred_add_kubernetes_sa.sh - creates a Jenkins Kubernetes service account credential jenkins_cred_add_secret_file.sh - creates a Jenkins secret file credential from a file jenkins_cred_add_secret...
updated impala_tables_locations.sh Oct 12, 2020 impala_tables_metadata.sh impala_tables_metadata.sh updated impala_tables_metadata.sh Oct 12, 2020 impala_tables_row_counts.sh impala_tables_row_counts.sh updated impala_tables_row_counts.sh Oct 12, 2020 install_packages.sh install_packages.sh up...
jenkins_cred_add_cert.sh - creates a Jenkins certificate credential from a PKCS#12 keystore jenkins_cred_add_kubernetes_sa.sh - creates a Jenkins Kubernetes service account credential jenkins_cred_add_secret_file.sh - creates a Jenkins secret file credential from a file jenkins_cred_add_secret...
aws_ssm_put_param.sh - reads a value from a command line argument or non-echo prompt and saves it to AWS Systems Manager Parameter Store. Useful for uploading a password without exposing it on your screen aws_secret*.sh - AWS Secrets Manager scripts: aws_secret_list.sh - returns the ...
Mobile devices also store diverse data, including geographic locations and contact information, while offering robust functionality such as SMS, phone calls, and 3G or 4G connections [99]. Such information can be abused with sinister motivations. 4.1.3. Smartphone User Activities Based on Physical ...
updated impala_tables_locations.sh Oct 12, 2020 impala_tables_metadata.sh impala_tables_metadata.sh updated impala_tables_metadata.sh Oct 12, 2020 impala_tables_row_counts.sh impala_tables_row_counts.sh updated impala_tables_row_counts.sh Oct 12, 2020 install_packages.sh install_packages.sh up...