Vagrant is a tool for building and managing virtual machine environments and focus on automation, Vagrant lowers environment setup time,
Vagrant helps you create virtual machines on-the-fly by a set of reusable configuration files.
Vagrant provides easy to configure, reproducible, and portable work environments built on top of industry-standard technology utilities for managing the lifecycle of machines
To achieve its magic, Vagrant stands on the shoulders of giants. Machines are provisioned on top of VirtualBox, VMware, AWS, Hyper-v or any other provider. Then, industry-standard provisioning tools such as shell scripts, Chef, or Puppet, can automatically install and configure software on the virtual machine.
Sybase database create on a device, which means you have to create a device first with a proper size before creating a database.
In my previous post I navigate through the steps of creating Sybase ASE device, database, dump and load using command. In this post I will guide you through the steps using Sybase Central ‘GUI‘ instead of CLI
I will cover:
Many times I was asked for the way to exceed the limitation of 4 virtual processors assigned to a virtual machine for Windows Server 2008 R2.
I guess there is still many Windows Server 2008 hyper-visor running on a physical server which has much more cores, Although It is very limiting, but I will not recommend you to modify productions VM’s setting to exceed the limit.
Sybase Adaptive Server Enterprise (ASE) introduces enhanced dump and load capabilities for moving databases or restoring backups to a different ASE .
It may be confusing for some other database administrators. So, I would like to share with you my experience and give you a brief explanation of the device, database and the restoration of the Sybase database from command line.
Layer 3 is the classical deployment method for the PA firewall, and it is always considered the standard and most powerful deployment method because it has all of the functionalities, while other deployment methods have some limitations (example of the other deployment methods are virtual wire, layer 2, etc …)
In this tutorial, I will explain Layer 3 Interfaces deployment.
The concept of configuration management
PA configuration management has powerful functions to manage configuration, but at the same time it can be very confusing if you are used to other firewalls vendors. So, let me explain the concept of configuration management, and how to set it up in the right way in order to be effective to make a full use of it.
I would like to share my experience with you. Let’s start with configuration management; on a Palo Alto firewall, there is a dedicated Management plane and Data plane.