configure {
NOTE: This post is a personal update to Neeraj Singh's post. [PostgreSQL must also be configured to allow remote connections][1], otherwise the connection request will fail, even if all firewalls rules are correct and PostgreSQL server is listening on the right port.
Couldn't create links, but this is a rather long answer so this may helps.
export const ws = webSocket<WebsocketMessage>(`wss://${location.hostname}:${location.protocol === 'https:' ? 443 : 80}/ws/`); | |
export const wsObserver = ws | |
.pipe( | |
retryWhen(errors => | |
errors.pipe( | |
delay(1000) | |
) | |
) | |
); |
There are circumstances where one wants to attach the local machine to the same layer 2 ethernet segment, which a remote machine is connected to, with the only available transport being SSH.
While this solution has quite some shortcomings and should not be used to replace a real VPN, it can be beneficial e.g. for debugging network issues remotely.
Thanks to new resources (postgresql_default_priviledges) and some fixes Terraform can now add new databases and manage ownership / access to them.
This example creates new database and two users. You can use owner to create new tables and run migrations and user for normal read/write access to database.
The always enthusiastic and knowledgeable mr. @jasaltvik shared with our team an article on writing (good) Git commit messages: How to Write a Git Commit Message. This excellent article explains why good Git commit messages are important, and explains what constitutes a good commit message. I wholeheartedly agree with what @cbeams writes in his article. (Have you read it yet? If not, go read it now. I'll wait.) It's sensible stuff. So I decided to start following the
openssl rand -base64 30 | |
date +%s | sha256sum | base64 | head -c 32 ; echo |
from azure.common.credentials import get_azure_cli_credentials | |
credentials, subscription_id = get_azure_cli_credentials(resource="https://vault.azure.net") | |
kv_client = KeyVaultClient(credentials=credentials) | |
kv_secret = kv_client.get_secret("https://<vault-name>.vault.azure.net/", "<secret-name>", "") | |
print(kv_secret.value) |
var winston = require('winston'); | |
const appName = "Content Server"; | |
const version = "1.5.2"; | |
var logger = new (winston.Logger)({ | |
transports: [new winston.transports.File({ | |
filename: __basePath + 'logs/log.log', | |
handleExceptions: false, | |
level: 'silly' | |
}), |