To make Skype use the same theme as other desktop applications (in my case, the same theme I'm using for Gtk apps), you'll need to install the 32bit version of the gtk theme engine you're using.
On debian jessie, I simply did:
apt-get install gtk2-engines:i386
Also make sure you have ia32-libs installed, but should already be in order to make Skype work..
For the purposes of testing, I will be using a bunch of locally-installed virtualmachines. Specifically, we'll have:
To create the machines, I just installed a bare-bones wheezy image (under KVM) and cloned it four times:
virt-clone -o TemplateWheezy -n es-cluster-salt-master -f /mnt/virtualmachines/es-cluster-salt-master.img -m '52:54:00:ee:55:f0' for id in 01 02 03; do virt-clone -o TemplateWheezy -n es-cluster-node-"$id ...
I had some troubles getting nvidia proprietary drivers up & running on Debian Jessie (kernel 3.13-1-amd64).
I'm sharing the solution I found here, as it might be useful to somebody else.
The error message I got:
[ 36.508494] NVRM: GPU at 0000:01:00.0 has fallen off the bus. [ 36.508500] NVRM: os_pci_init_handle: invalid context! [ 36.508502] NVRM: os_pci_init_handle: invalid context! [ 36.508507] NVRM: GPU at 0000:01:00.0 has fallen ...
I needed some way to visualize and analyze logs from webservers.
So, I decided to use the "elasticsearch stack" for that:
Just download, untar and launch:
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-1.1.1.tar.gz tar xzvf elasticsearch-1.1.1.tar.gz cd elasticsearch-1.1.1 ./bin/elasticsearch
Check if everything is ok:
I used LogStash to import the logs from file to ElasticSearch. That required a bit of configuration.
First, download & unpack logstash:
wget https://download.elasticsearch.org/logstash/logstash/logstash-1.4.0 ...
I recently needed to enable https support on a nginx server, using self-signed certificates. This is roughly the procedure I followed to:
First of all, generate the master CA certificate:
# Create the CA key openssl genrsa -des3 -out ca.orig.key 4096 # Remove passphrase from CA key (optional) openssl rsa -in ca.orig.key -out ca.key # Create certificate (will create signing request + sign it) openssl req -new -x509 -days ...
Page 1 / 3 »