Phoenixnap.com how to use, tutorial

How to Set or Change Upstream Branch in Git

Details: When you clone a Git repository or create new features through branches, you need know how upstream branches work and how to set them up. This article gives an overview of how to set up a Git upstream branch, how to change it and how to have an overview of which Git branch is tracking which upstream branch.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/git-set-upstream Go Now

› Get more:  How To UseGo Now

How to Install SQL Express Server {Install, Update or

Details: SQL Server Express 2019 offers a lightweight solution for data-driven apps. Follow this step-by-step guide to install, upgrade, or remove it.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/install-sql-express Go Now

› Get more:  GuideGo Now

How To Build Linux Kernel {Step-By-Step} | phoenixNAP KB

Details: Learn how to build a Linux kernel the easy way. Follow seven simple steps listed in the guide to compile a Linux kernel successfully.

› Verified 3 days ago

› Url: https://phoenixnap.com/kb/build-linux-kernel Go Now

› Get more:  GuideGo Now

How to Install Git on Windows {Step-by-Step Tutorial

Details: Git is a widely used open-source software tracking application used to track projects across different teams and revision levels. This guide will show you how to install Git on Windows.

› Verified 1 days ago

› Url: https://phoenixnap.com/kb/how-to-install-git-windows Go Now

› Get more:  GuideGo Now

How to Set Environment Variables in Linux {Step-by-Step Guide}

Details: The simplest way to set a variable using the command line is to type its name followed by a value: [VARIABLE_NAME]=[variable_value] 1. As an example, create a variable called EXAMPLE with a text value. If you type the command correctly, the shell does not provide any output.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/linux-set-environment-variable Go Now

› Get more:  How To UseGo Now

How to use Linux Shutdown Command with Examples

Details: All Linux users and system administrators need to know how to shut down the entire system safely. There are several options to do so, including scheduling a shutdown at a specific time, shutting down immediately, broadcasting a unique message, and so on.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/linux-shutdown-command Go Now

› Get more:  How To UseGo Now

Install Cassandra on Windows 10: Tutorial With Simple Steps

Details: Tutorial is jam-packed with screenshots for each step of Cassandra installation on Windows 10. In this ultimate resource, Learn how to download, set up, and install Cassandra on Windows.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/install-cassandra-on-windows Go Now

› Get more:  TutorialGo Now

How to Start, Stop, and Restart Nginx Web Server

Details: Nginx is a powerful server application that routes network traffic. It’s often used as a reverse proxy server, but can also be configured as a regular web server.. One of the most common operations you will encounter is starting, stopping, and restarting the Nginx web server.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/nginx-start-stop-restart Go Now

› Get more:  How To UseGo Now

How to Copy Files and Directories in Linux {With Examples}

Details: This guide will show you how to copy files and directories in Linux by executing commands from the command line. Furthermore, the commands listed below detail how to create system-wide backups or filter out and copy only specific files.

› Verified 3 days ago

› Url: https://phoenixnap.com/kb/how-to-copy-files-directories-linux Go Now

› Get more:  GuideGo Now

Kubernetes Persistent Volumes - 2021 Ultimate Guide

Details: Kubernetes is one of the most popular orchestration solutions for hosting containers in a production environment. The platform allows users to automate the deployment of numerous instances of an application while scaling up and down according to demand.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/kubernetes-persistent-volumes Go Now

› Get more:  How To UseGo Now

How to Fix SSH Failed Permission Denied (publickey,gssapi

Details: PHP Code. Posted February 4, 2021 ssh publickeyssh publickey

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/ssh-permission-denied-publickey Go Now

› Get more:  How To UseGo Now

How to Roll Back Changes with Helm {Step-By-Step Guide

Details: Helm uses the rollback command to return to a previous revision:. 1. Use the ls command to find the name of the current Helm release:. helm ls. In this case, the option -A lists releases across all namespaces:

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/helm-rollback Go Now

› Get more:  How To UseGo Now

17 Types of Cyber Security Attacks To Protect Against in 2021

Details: Malware Attacks. Malware is a code that is made to stealthily affect a compromised computer system without the consent of the user. This broad definition includes many particular types of malevolent software (malware) such as spyware, ransomware, command, and control.

› Verified 3 days ago

› Url: https://phoenixnap.com/blog/cyber-security-attack-types Go Now

› Get more:  How To UseGo Now

28 Netstat Commands {A Comprehensive List With Examples}

Details: The first list in the output displays active established internet connections on the computer. The following details are in the columns: Proto – Protocol of the connection (TCP, UDP).; Recv-Q – Receive queue of bytes received or ready to be received.; Send-Q – Send queue of bytes ready to be sent.; Local address – Address details and port of the local connection.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/netstat-command Go Now

› Get more:  How To UseGo Now

Kubectl Cheat Sheet: Kubectl Commands With Examples {PDF}

Details: Kubectl is a set of commands for controlling Kubernetes clusters. Every Kubernetes command has an API endpoint, and kubectl’s primary purpose is to carry out HTTP requests to the API.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/kubectl-commands-cheat-sheet Go Now

› Get more:  How To UseGo Now

How to Connect to a Server Using the BMC Remote Console

Details: The Remote Console feature of the Bare Metal Cloud (BMC) portal is an easy and secure way to connect to your BMC servers without SSH keypair. The BMC consoling only works with the password-based authentication. Once you purchase a server and set up a user with a password, you can access the server from the BMC portal’s Server page.Follow the instructions in this guide to learn how to access

› Verified 3 days ago

› Url: https://phoenixnap.com/kb/bmc-remote-console Go Now

› Get more:  GuideGo Now

SU Command in Linux: How to Use With Examples {2021 Tutorial}

Details: The su command lets you switch the current user to any other user. If you need to run a command as a different (non-root) user, use the –l [username] option to specify the user account. Additionally,su can also be used to change to a different shell interpreter on the fly. su is an older but more fully-featured command.It can duplicate the functionality of sudo by use of the –c option to

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/su-command-linux-examples Go Now

› Get more:  How To UseGo Now

How to Install Ubuntu on Raspberry Pi 2 or 3 {Screenshots}

Details: The Raspberry Pi Ubuntu Mate image comes compressed. The extension of the file you downloaded is .xz.Use your favorite tool to extract the .img file.. To extract the file from a terminal, navigate to the location of the downloaded file and run this command:. xz -d ubuntu-mate-18.04.2-beta1-desktop-armhf+raspi-ext4.img.xz

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/install-ubuntu-raspberry-pi Go Now

› Get more:  How To UseGo Now

How To Create A Helm Chart {and Deploy it on Kubernetes}

Details: Helm charts are one of the best practices for building efficient clusters in Kubernetes. It is a form of packaging that uses a collection of Kubernetes resources. Helm charts use those resources to define an application.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/create-helm-chart Go Now

› Get more:  How To UseGo Now

What is CI/CD? Guide to Continuous Integration, Testing

Details: Continuous Integration (CI) Explained. Continuous integration is the practice of continually integrating updates into a codebase. CI offers a consistent, automated process of building, packaging, and testing new software.

› Verified 2 days ago

› Url: https://phoenixnap.com/blog/what-is-ci-cd Go Now

› Get more:  How To UseGo Now

How to Check PHP Version {2 Methods Explained}

Details: Check your website's PHP version to avoid compatibility issues when installing new features. This tutorial shows steps to perform the check.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/check-php-version Go Now

› Get more:  TutorialGo Now

Ansible: Check if File or Directory Exists {With Examples}

Details: The easiest way to check if a file exists using Ansible is with the stat module.. The purpose of the stat module is to retrieve facts about files and folders and record them in a register. The stat module uses the following syntax:--- - name: Playbook name hosts: all tasks: - name: Task name stat: path: [path to the file or directory you want to check] register: register_name

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/ansible-check-if-file-exists Go Now

› Get more:  How To UseGo Now

Install KVM on Ubuntu 20.04 {+ Create a Virtual Machine}

Details: A type 2 hypervisor enables users to run isolated instances of other operating systems inside a host system. As a Linux based OS, Ubuntu supports a wide range of virtualization solutions. Aside from popular third-party apps, such as VirtualBox and VMWare, the Linux kernel has its own virtualization module called KVM (Kernel-based Virtual Machine).. In this tutorial you will learn how to

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/ubuntu-install-kvm Go Now

› Get more:  TutorialGo Now

What is Umask and How to Use It {Update Default Linux File

Details: The term umask refers to two things:. 1. The Linux umask command.umask (user file-creation mode) is a Linux command that lets you set up default permissions for newly created files and folders.. 2. A user-defined permissions ‘mask’. A user can choose how to restrict permissions by using a permissions mask.A permission mask interacts with the default system permissions and changes them.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/what-is-umask Go Now

› Get more:  How To UseGo Now

How to Format USB Drives in Linux {3 Methods Explained}

Details: Occasionally, it is necessary to format the USB drive (for example, when changing the file system or deleting data). However, many Linux users are afraid to start the formatting process, thinking it is either a very complicated or time-consuming task.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/linux-format-usb Go Now

› Get more:  How To UseGo Now

How to Cut, Copy and Paste in Vim

Details: Copying text in Vim is also referred to as yanking.Use the y key on the keyboard when performing this operation.. There are a number of yank commands, mainly differing on the amount of text you want to copy.. Once in normal mode, move the cursor to the needed place and use the appropriate command.. To copy an entire line, place the cursor at the beginning of the line and type:

› Verified 3 days ago

› Url: https://phoenixnap.com/kb/cut-copy-paste-vim Go Now

› Get more:  How To UseGo Now

How To Extract / Unzip tar.gz Files From Linux Command Line

Details: A tar.gz file contains several compressed files to save storage space, as well as bandwidth during the downloading process. The .tar file acts as a portable container for other files and is sometimes called a tarball. The .gz part of the extension, stands for gzip, a commonly-used compression utility.. In this guide you will learn how to extract or unzip files from tar.gz files using command

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/extract-tar-gz-files-linux-command-line Go Now

› Get more:  GuideGo Now

How To Change or Customize Bash Prompt In Linux {25 Options}

Details: Here is a list of most of the options you can use for the BASH prompt. Some of these commands may not work on all versions of Linux. \a – A bell character \d – Date (day/month/date) \D{format} – Use this to call the system to respond with the current time \e – Escape character \h – Hostname (short) \H – Full hostname (domain name) \j – Number of jobs being managed by the shell

› Verified 3 days ago

› Url: https://phoenixnap.com/kb/change-bash-prompt-linux Go Now

› Get more:  How To UseGo Now

How to Set Environment Variables in MacOS | phoenixNAP KB

Details: Environment variables are used to store system-wide values that can be used by any user and process under the operating system. Setting environment variables is essential in the steps of certain installations we covered such as How To Install Java or How To Install Java On Raspberry Pi.. This tutorial explains how to view, add, and remove temporary and permanent environment variables on macOS.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/set-environment-variable-mac Go Now

› Get more:  TutorialGo Now

How to Create Symbolic Link in Linux Using Ln Command

Details: To use the ln command, open a terminal window and enter the command with the following format:. ln [-sf] [source] [destination] By default, the ln command creates a hard link. Use the -s option to create a soft (symbolic) link. The -f option will force the command to overwrite a file that already exists. Source is the file or directory being linked to.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/symbolic-link-linux Go Now

› Get more:  How To UseGo Now

Apache 403 Forbidden: 3 Possible Fixes | phoenixNAP KB

Details: 3. If the final line in the section contains Require all denied, change it to Require all granted.. 4. Press Ctrl+X and then Y to save changes to the Apache configuration file.. 5. Restart the Apache web server for the changes to take effect. For Ubuntu, use: sudo systemctl restart apache2

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/apache-403-forbidden Go Now

› Get more:  How To UseGo Now

How To View & Create Hidden Files in Linux

Details: Linux, by default, hides many of the sensitive system files. Hidden files are usually system or application files, concealed to prevent accidental changes.

› Verified 3 days ago

› Url: https://phoenixnap.com/kb/show-hidden-files-linux Go Now

› Get more:  How To UseGo Now

How to Check Java Version On Linux

Details: How do I check my current Java version? There are several ways to check if Java is installed and which version is running on your system. In this tutorial, learn how to check the Java version installed on Linux distros, including Ubuntu, CentOS, and Debian.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/check-java-version-linux Go Now

› Get more:  TutorialGo Now

What is Server Virtualization? Definition and How it Works

Details: Virtualized servers allow one piece of hardware to be used as multiple virtual servers. Learn what Server Virtualization is and how it works.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/what-is-server-virtualization Go Now

› Get more:  How To UseGo Now

How To Install And Use Ifconfig On CentOS 7 | phoenixNAP KB

Details: The ifconfig command is part of the net-tools package available in the YUM repository.. 1. Open the terminal window and update the repositories: sudo yum update. 2. Next, download and install net-tools using yum:. sudo yum install net-tools –y. The output confirms the installation is complete.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/centos-ifconfig Go Now

› Get more:  How To UseGo Now

Linux Who Command Guide {With Examples} | phoenixNAP KB

Details: The Linux who command displays the logged-in users, boot-time information, processes, and more. Learn how to use it in this short guide.

› Verified 3 days ago

› Url: https://phoenixnap.com/kb/linux-who-command Go Now

› Get more:  How to useGo Now

How To Install Helm On Ubuntu, Mac And Windows | pNAP KB

Details: Deploying applications to Kubernetes is a complicated process. Many tools simplify this process, and one of them is Helm. Helm is a package manager for Kubernetes that configures and deploys applications and services on a Kubernetes cluster.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/install-helm Go Now

› Get more:  How To UseGo Now

How To Use Passwd Command In Linux {+Examples} | phoenixNAP KB

Details: The passwd command modifies passwords for user accounts and manages the password validity period. This is a must-know utility for user account administration. This article shows examples of how to use the passwd command in Linux, along with all the available options.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/passwd-command-in-linux Go Now

› Get more:  How to useGo Now

Crontab Reboot: Execute a Job Automatically at Boot

Details: With the crontab command, you have full control of when and how jobs are executed. Use crontab to set job execution time down to the minute, without the need for looping and timing logic in the task.. crontab has low resource requirements since it doesn’t reserve system memory when it isn’t running.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/crontab-reboot Go Now

› Get more:  How To UseGo Now

How To Use The Modprobe Command In Linux

Details: The modprobe command is used to add and remove official Linux kernel modules. Learn how to add and remove modules using the modprobe command.

› Verified 3 days ago

› Url: https://phoenixnap.com/kb/modprobe-command Go Now

› Get more:  How To UseGo Now

How to Check Disk Space in Linux {df and du Commands}

Details: Learn how to check disk space in Linux using the df and du command, including available disk space, used disk space and total disk space.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/linux-check-disk-space Go Now

› Get more:  How To UseGo Now

How to Install Redis on Mac {With or Without Homebrew}

Details: There are two ways to install Redis on Mac: Installing Redis from scratch. Using package management software, like Homebrew. Homebrew automates most of the installation process, making it quick and easy to add Redis to your system.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/install-redis-on-mac Go Now

› Get more:  How To UseGo Now

git Unstage - How to Unstage Changes in Git

Details: The .gitignore file is a file that can be added to any directory in a project. It’s a simple text file, and anything added to it will not be staged or included in a commit. Use a text editor to create a .gitignore file in a project directory. Then, edit the file and add the names of the assets to be excluded from commits.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/git-unstage-files Go Now

› Get more:  How To UseGo Now

Ansible Playbook: Create and Configure Playbooks {Examples}

Details: Ansible is an Infrastructure as Code tool that lets you manage and monitor a number of remote servers by using a single control node.. With Ansible, you can manage remote servers by using playbooks. These playbooks relay instructions to remote servers and allow them to execute predefined tasks.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/ansible-playbook Go Now

› Get more:  InstructionGo Now

MyISAM vs. InnoDB: A Comparison {How to Convert MyISAM and

Details: Choosing the right storage engine is a crucial strategic decision that impacts future development. Depending on your use case, decide between two main storage engines for MySQL – MyISAM or InnoDB. In this article, you will learn the main differences between MyISAM and InnoDB storage engines, how to check which storage engine you are using and how to convert it.

› Verified 3 days ago

› Url: https://phoenixnap.com/kb/myisam-vs-innodb Go Now

› Get more:  How To UseGo Now

How to Make curl Ignore Certificate Errors {Easy Fix

Details: After reading this article, you should know how to make curl ignore certificate errors. Although this is done simply by adding the -k option, do not instruct curl to ignore SSL errors unless required for development purposes.. Don’t miss out on our other curl guides such as How To Set Or Change User Agent With Curl.

› Verified 1 days ago

› Url: https://phoenixnap.com/kb/curl-ignore-certificate Go Now

› Get more:  How to makeGo Now

How to Install Jenkins on CentOS 8 (Step-by-Step Tutorial)

Details: Jenkins is an open-source software package for continuous software development. It is used to automate parts of the build, testing, delivery, and deployment of applications.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/how-to-install-jenkins-on-centos-8 Go Now

› Get more:  How To UseGo Now

Date Command in Linux: How to Set, Change, Format and

Details: Linux date command displays and sets the system date and time. This command also allows users to print the time in different formats and calculate future and past dates. Read on to learn how to use the date command in Linux.

› Verified 3 days ago

› Url: https://phoenixnap.com/kb/linux-date-command Go Now

› Get more:  How to useGo Now

How To Install VirtualBox Extension Pack {Linux, Windows

Details: VirtualBox has excellent features, and it provides the VirtualBox Extension Pack for extending the basic functionalities of the software. Having a remote console to run your VMs or testing a USB device cross-platform are just some examples that can improve your experience.

› Verified 1 days ago

› Url: https://phoenixnap.com/kb/install-virtualbox-extension-pack Go Now

› Get more:  How To UseGo Now

Backup Vs Replication: What are the Differences?

Details: The purpose of backup and replication is to prevent a catastrophic loss of data due to unforeseen events. Whether it is a natural disaster, failure of underlying hardware, or malicious software, you need to have a fully formed data backup strategy.. Deciding what sort of disaster recovery setup you need is the first and possibly the most important aspect of securing and preserving your data.

› Verified 2 days ago

› Url: https://phoenixnap.com/kb/backup-vs-replication Go Now

› Get more:  How To UseGo Now

Related topics