Using 5567 as an example TCP port
sudo mbuffer -I 5567 -m 8G -P 80 -s 262144 -o /dev/nst0
This also writes out a plaintext file in the local directory (filelist.txt
) logging the files transferred.
Import-Module Veeam.Backup.PowerShell | |
$outputBuilder = New-Object System.Text.StringBuilder | |
[void]$outputBuilder.AppendLine('ESC "@"') | |
[void]$outputBuilder.AppendLine('ESC "2"') | |
$job = Get-VBRTapeJob -Name ExampleJobName | |
$lastjob = (Get-VBRTapeBackupSession -Job $job | Sort-Object EndTime | Select-Object -Last 1) | |
# get the tape name | |
$tape = (Get-VBRTapeMedium -MediaPool $job.Target | Sort-Object LastWriteTime | Select-Object -Last 1) |
#!/usr/bin/env bash | |
DOMAIN=`basename "$RENEWED_LINEAGE"` | |
case $DOMAIN in | |
host.example.com) | |
echo "Host certs renewed" | |
cp $RENEWED_LINEAGE/fullchain.pem /etc/cockpit/ws-certs.d/$DOMAIN.crt | |
cp $RENEWED_LINEAGE/privkey.pem /etc/cockpit/ws-certs.d/$DOMAIN.key | |
chown cockpit-ws:cockpit-ws /etc/cockpit/ws-certs.d/$DOMAIN.crt /etc/cockpit/ws-certs.d/$DOMAIN.key | |
echo "Restarting Cockpit" |
For https://copr.fedorainfracloud.org/coprs/frederickding/haproxy/
Bumped to f41 branch (haproxy 3.0.x).
Bumped to f40 branch (haproxy 2.9.x).
#!/bin/bash | |
export CRI_CONFIG_FILE=/var/lib/rancher/rke2/agent/etc/crictl.yaml | |
/var/lib/rancher/rke2/bin/crictl "$@" |
#!/bin/bash | |
if [[ $EUID -ne 0 ]]; then | |
echo "Please run as root." | |
exit 2 | |
fi | |
PKI_DIR=/var/lib/k0s/pki/etcd | |
export ETCDCTL_CACERT=$PKI_DIR/ca.crt | |
export ETCDCTL_CERT=$PKI_DIR/peer.crt |
<([0-9]@)-([0-9]@)>
in the "Find what:" box. This pattern represents a search
for whole words that have one number, a hyphen, and another number.\1^=\2
in the "Replace with:" box. This maintains the numbers found in the find,
while substituting the hyphen with an en dash.