Since the update to Prometheus 2.0, the documentation still has to catch up. Because I’ve been debugging a custom written exporter, some unwanted metrics landed in my Prometheus.
This is how to delete those series.
This guide will show you how to deploy Proxmox VE 5 with KVM Routing and NAT on a Hetzner server with focus on networking and DHCP/DHCPv6.
192.0.2.62/27is the public IP assigned by Hetzner
192.0.2.33is the default gateway for the network
10.1.1.0/24is the private block used on the VMs
2001:db8:1111:2222::/64is the IPv6 block assigned to the host
2001:db8:1111:2222:81::/80is the IPv6 block delegated to the VMs
Ever since I’ve started hosting my own domains, I’ve searched for ways to automate the website provisioning.
Normally, the documentation includes the information on configuring your infrastructure based on roles. But if you have a webserver role for all your minions it doesn’t help with the individual provisioning I am aiming at.
Tired of always being afraid someone will hack into your Linux computer/server?
One of the most important steps is to make sure the attacker can’t log in with the “root” account.
In order to do this, you have to:
Article target: web developers