What are Log Files? Log files are automatically created data files that hold a record of events linked to a specific software. They play a crucial role in network observability and IT operations. Log files capture user patterns, activities, and the operations taking place within an operating system, application, server, or other devices. While most …
July 2023
🖥️ Insight about a well defined adversary of Json: GraphQL
Graphql Created by Facebook in 2012 and open-sourced in 2015. Graph query language is used for communicating with a server to retrieve data. Offers strong data typing, enabling better management of missing data and data overload. Coexistence with Existing Methods GraphQL is an additional querying method alongside existing ones like REST. It doesn’t aim to …
⚙️ Deploy a docker container offline – without access to Internet
Here, we will explain how to deploy a docker container without internet access. 1. Go to the project folder and run “`powershell # Command : docker build –tag [MY_PROJECT]:x.x . “` [MY_PROJECT]: is the name of your project. Take the name used in your docker-compose.yaml file x.x: is the version of your app. Now, you …
⚙️ Automating Docker Startup on Windows: Ensuring Hassle-Free Workflows
Let us see how to automatically start Docker on Windows immediatly after start-up. In order to do that, you just need to perform the following steps: Create a text file and rename it dockerAtStartup.ps1 Add the following code: start-service -Name com.docker.service start C:\’Program Files’\Docker\Docker\’Docker Desktop.exe’ NB: Don’t forget to write ‘Program Files’ instead of Program …
🖥️ Adding TODO and FIXME in you code
I have seen many codes that include TODO statements. In general, TODOs should be added only in your own Git branch. However, there are cases where it is acceptable to let TODOs in the code base. Let us see it in more details. 💡 Please keep in that this is also acceptable for both TODO …
🔑 How to use a keytab file for authentication ?
A keytab is simply a file that stores authentication credentials information to help users access remote systems easily. The file contains Kerberos principals along with encrypted keys. Keep in mind that the keys are automatically generated from the Kerberos password. Thereore, the encrypted keys will change whenever you change the Kerberos password. How to create …
🔗 Most Useful Apps and Websites on Internet
The Most Important Apps and Websites on Internet Today, I want to list the most useful apps, websites and platforms that will save you a lot of time. This list will be updated often, so save this page and come back regularly to discover good links. From capturing web page snapshots to learning coding online, …
🖥️ How to use Pip to install packages to Anaconda Environment
If you want to use Pip in order to instalI packages to a conda environment, you can follows these steps: – Run conda create -n myenv – Run conda activate myenv – Run conda install pip. This will install pip to your myenv directory. – Go to your Anaconda folder – Find the myenv folder, …
🖥️ Git and Conventional Commit
Conventional commit is an awesome way to build professional and clean Git history. Why You Must Use Conventional Commits CHANGELOGs are automatically generated. Explaining changes to collaborators and other stakeholders. Triggering build processes. Structured commit history. You can learn more on the conventional commits guidelines and https://github.com/commitizen/cz-cli. Conventional commit messages structure <type>[optional scope]: <description> [optional …