Jozef Reisinger's blog

Infrastructure, security, programming ...

2015-08-13

Quick Vagrant Guide

See here.

No comments:
Labels: sysadmin, virtualization
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Blog Archive

  • ►  2025 (3)
    • ►  09 (3)
  • ►  2024 (8)
    • ►  12 (1)
    • ►  06 (1)
    • ►  03 (1)
    • ►  02 (3)
    • ►  01 (2)
  • ►  2023 (3)
    • ►  09 (2)
    • ►  01 (1)
  • ►  2022 (4)
    • ►  10 (1)
    • ►  09 (1)
    • ►  06 (1)
    • ►  05 (1)
  • ►  2021 (4)
    • ►  12 (1)
    • ►  10 (1)
    • ►  02 (1)
    • ►  01 (1)
  • ►  2020 (1)
    • ►  03 (1)
  • ►  2019 (1)
    • ►  12 (1)
  • ►  2018 (2)
    • ►  09 (1)
    • ►  02 (1)
  • ►  2017 (1)
    • ►  07 (1)
  • ►  2016 (4)
    • ►  10 (1)
    • ►  09 (1)
    • ►  05 (2)
  • ▼  2015 (11)
    • ►  12 (3)
    • ►  11 (1)
    • ▼  08 (1)
      • Quick Vagrant Guide
    • ►  07 (1)
    • ►  06 (2)
    • ►  05 (2)
    • ►  01 (1)
  • ►  2014 (11)
    • ►  11 (1)
    • ►  10 (1)
    • ►  09 (1)
    • ►  07 (2)
    • ►  05 (1)
    • ►  04 (1)
    • ►  03 (1)
    • ►  02 (1)
    • ►  01 (2)
  • ►  2013 (1)
    • ►  12 (1)

Links

  • My homepage
  • Blog posts source
  • Blog posts source 2

Search This Blog

Labels

audit (3) Bash (6) chatgpt (1) devops (14) Git (2) Go (12) kubernetes (2) Linux (11) management (2) networking (5) Perl (10) security (17) security-engineer (3) sysadmin (12) telco (2) virtualization (5)

Most viewed last 30 days

  • DevOps
    (Up-to-date source of this post.) The opposite of DevOps is despair. -- Gene Kim If HW and SW are sufficiently fault tolerant, the rema...
  • Go for cybersecurity - learning
    I think cybersecurity practitioners should be able to program. If they do, they can understand computer technologies better and they can aut...
  • Pod Scheduling in Kubernetes: Taints, Tolerations, and Node Affinity
    In Kubernetes, you can control where pods get scheduled by using two powerful mechanisms: Taints and Tolerations : These allow nodes to ...
  • traceroute Explained
    (Up-to-date source of this post.) traceroute shows the route the packets have to take to get to a destination host. For example: $ tra...
  • Scan and Compare Versions of Your Network Services
    One of the most effective, although often neglected, ways to keep your servers secure are regular updates of running services (daemons). If ...
  • runp: run commands in parallel
    I’m using shell (bash specifically) on daily basis. From time to time a need arises to run multiple commands in parallel. For example my .b...
  • Shift cipher in Go with multibyte key
    In the previous blog post we developed a simple crypto system. Its algorithm is based on shifting bytes by the number represented by a singl...
  • Go for Bash Programmers - Part II: CLI Tools
    This is the second part of a series introducing Bash programmers to Go. This part is about basics of writing CLI tools in Go. See the first ...
  • Go for Bash Programmers - Part I: The Language
    This is the first part of a series introducing Bash programmers to Go. This part goes through the language building blocks that will be us...
  • Go for Bash Programmers - Part III: Platforms
    This is the third part of a series introducing Bash programmers to Go. This part starts showing how to build platforms in Go. See the first ...

Pageviews last 30 days

Powered by Blogger.