Search Content

Displaying 1 - 20 of 77

… message) return True Next, the Reactor Yaml file, /srv/reactor/notify-changes.sls: notify-changes: … reactor and the runner path in the Master configuration file. We did this by adding a file, /etc/salt/master.d/reactor.conf: reactor: - …

… Drupal on Docker, with a pinch of Salt Submitted by John Locke on Sat, 07/25/2015 - 08:16 … of Apache we've moved to Nginx, and we've added Docker and Salt. If you're a technical person and haven't heard of …

… stack - Linux, Apache/Nginx, MySQL/MariaDB/Postgresql, PHP (mod_php, php-fpm), Docker, dnsmasq -- and a selected number of …

… The case for git as a deployment tool Submitted by John Locke on Tue, 06/16/2015 - … downtime waiting for builds to run on production -- just deploy and clear some caches. Buy more disk space and grab a … to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update …

… to your list. If none of your original set of alternatives work, broaden your search and try a few more. Once you have … very much like saying Seattle is where we live and work, and we have no plans to move elsewhere. While there are … near the end, we've got quite a bit more capacity for new work. Since moving, we have 5 new people on board: Christo, …

… of the groups that discovered the exploit, and Google has deployed something on their infrastructure that seemed to … very smoothly. However, we had 2 incidents: One of our continuous integration workers failed to boot into the new … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… to it. For convenience, I put the build command into a comment at the top of the profile file. So now, an actual … to contact us if we can help with your project, or leave a comment below if you have another great tip! Dojo Development … the instructions I've been looking for. Reply Add new comment You must have JavaScript enabled to use this form. …

… -- vulnerabilities that can only be exploited by users who already have some level of administrative access. … never set up a configuration where we give an untrusted user the power to create or edit webforms. And yet on a … -- vulnerabilities that can only be exploited by users who already have some level of administrative access. …

… the responsible process's status. I went to the PHP status page we have in our Nginx config, and saw that all available … after figuring out that Bytespider had hit the search page 33K times in the previous 6 hours, and it was also …

… updates fix vulnerabilities that can only be exploited by users you've already given some level of administrative … Generally we try to avoid that, however, and allow users to keep using the site during deployment. So in short, … updates fix vulnerabilities that can only be exploited by users you've already given some level of administrative …

… desk. He envisions a day when you don't have to go to the store to buy stuff--you just get a design and print it for … desk. He envisions a day when you don't have to go to the store to buy stuff--you just get a design and print it for …

… I installed our configuration management client (the "salt-minion"), copied over the database and SSL certificate, … I installed our configuration management client (the "salt-minion"), copied over the database and SSL certificate, …

… it to include a snapshot rating of the site, to let our clients know what we think of their site in 7 crucial areas. … it to include a snapshot rating of the site, to let our clients know what we think of their site in 7 crucial areas. …

… notes on upgrading a Drupal dev workstation from Ubuntu 12.04 to 14.04 Submitted by John Locke on Sun, 04/20/2014 - 09:30 After using the latest …

… we got replacement hardware. Ok! Let's create a profile in Salt to start automating the necessary configurations, and … we got replacement hardware. Ok! Let's create a profile in Salt to start automating the necessary configurations, and …

… If you own a pet, by the way, head over and get a pet tag while they're still free! The pet tag has a QR code that will take people who scan it with a … If you own a pet, by the way, head over and get a pet tag while they're still free! The pet tag has a QR code that …

… College reached out to us in 2012 for some emergency work related performance issues on their site and problems … responsive consultants that I've had to the opportunity to work with. Not only are you doing a great job with our … College reached out to us in 2012 for some emergency work related performance issues on their site and problems …

… a quote. Email Marketing Recovering from attacks Add new comment You must have JavaScript enabled to use this form. … me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… where it describes what kind of damage XSS could do to users and to a web site. In the following link, you can see … them to the hacker stealing files from the attacked user's computer or the network she has access to probing a … XSS vulnerability is the result of a web page that allows users to execute JavaScript code. To see if a site is …

… this does is it creates a URL structure based on how you tag an individual story. For example, you might have one … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> … this does is it creates a URL structure based on how you tag an individual story. For example, you might have one …