Hey! I saw this has been indexed by the search engines. It is a first draft of a post I ended up publishing on my blog at: Scaling PostgreSQL With Pgpool and PgBouncer
Thanks for stopping by!
| FROM alpine:3.3 | |
| MAINTAINER Christopher Sexton <[email protected]> | |
| ENV RUBY_VERSION 2.3.0 | |
| ENV RUBY_DOWNLOAD_SHA1 96e620e38af351c8da63e40cfe217ec79f912ba1 | |
| ENV BASE_PACKAGES bash curl gmp git | |
| ENV BUILD_PACKAGES build-base libc-dev linux-headers openssl-dev postgresql-dev libxml2-dev libxslt-dev | |
| RUN apk update && \ |
Hey! I saw this has been indexed by the search engines. It is a first draft of a post I ended up publishing on my blog at: Scaling PostgreSQL With Pgpool and PgBouncer
Thanks for stopping by!
| variable "cluster-size" { | |
| description = "Number of CoreOS machines to deploy" | |
| } | |
| variable "region" { | |
| description = "AWS region in which to deploy" | |
| default = "us-east-1" | |
| } | |
| variable "coreos-ami" { |
| ########### | |
| # Variables | |
| ########### | |
| variable "aws_key_name" { | |
| default = "mykeypair" | |
| } | |
| variable "region" { | |
| default = "eu-west-1" | |
| } |
| nginx/ | |
| !nginx/.gitkeep | |
| !nginx/logs/.gitkeep | |
| src/ | |
| tmp/ |
| const | |
| fs = require('fs'), | |
| child_process = require('child_process'); | |
| var workers = []; | |
| for(var i=0; i<5; i++) { | |
| var worker = child_process.fork("lib/ExportWorker.js", [i]); | |
| workers.push(worker); | |
| console.log('Worker PID: ' + worker.pid); |
| #!/bin/bash | |
| usage () | |
| { | |
| cat <<UsageHERE | |
| boot2docker-fwd -- Helper function to quickly manage port forwards between the boot2docker-vm and the host | |
| Usage: boot2docker-fwd [ -n RULE_NAME ] [ -h HOST_PORT ] [ -p {tcp|udp} ] [ -i HOST_IP ] GUEST_PORT | |
| or boot2docker-fwd -d RULE_NAME | |
| or boot2docker-fwd -l | |
| or boot2docker-fwd -A |
Primary differences between SSH and HTTPS. This post is specifically about accessing Git repositories on GitHub.
plain Git, aka git://github.com/
Does not add security beyond what Git itself provides. The server is not verified.
If you clone a repository over git://, you should check if the latest commit's hash is correct.
| worker_processes 1; | |
| error_log logs/error.log; | |
| events { | |
| worker_connections 1024; | |
| } |