Accessing remote servers via SSH tunnel || reverse SSH tunnels || SSH SOCKS proxy||ssh via a jump…SSH tunneling, also known as SSH port forwarding, is a technique used to secure network connections by redirecting network traffic through…Jun 30Jun 30
Squid Proxy server has stopped handling connection, resulting in NONE/503 0 CONNECT errorsA NONE/503 error in Squid Proxy typically indicates a service unavailable error. When it occurs for a specific proxy connection, it…May 25May 25
Kubernetes dashboard and metrics server installation on Docker Desktop/minikubeDashboard is a web-based Kubernetes user interface. You can use Dashboard to deploy containerized applications to a Kubernetes cluster…Jun 16, 2023Jun 16, 2023
Linux Network Namespace and five of its use casesThe Network namespace isolates the system’s physical network from the virtual network namespace within a single system. Each network…May 14, 20231May 14, 20231
Failed to pull image toomanyrequests — You have reached your pull rate limitKubernetes pod creation fails with “Failed to pull image “nginx”: rpc error: code = Unknown desc = reading manifest latest in…Jun 28, 2022Jun 28, 2022
Python — find most occurrence of a string in a listThis a simple python program to find maximum occurrence of a string in list. There are many ways to achieve this but the program in this…May 10, 2022May 10, 2022
Systemtap — find who access the fileSystemtap provides information similar to the output of tools like netstat, ps, top, and iostat, but is designed to provide more filtering…May 10, 2022May 10, 2022
Why the subsequent or other name servers in /etc/resolv.confIt is our blind expectation is that all other name servers in resolv.conf file must be communicated when the query from the first DNS…Mar 7, 2022Mar 7, 2022
Limit CPU and Memory to Firefox and chrome web-browser on a Linux desktopGoogle Chrome and Firefox web browsers make extensive use of Memory and CPU utilization when multiple tabs are opened. It is not possible…Mar 3, 20221Mar 3, 20221