Icinga is a fork of Nagios monitoring system. There are lots of changes and upgrades compared to Nagios, especially in version 2. The main visible difference is UI which is built on ext js. Other significant differences are in hosts and services definitions (it will be covered in part 2).
For this tutorial we’re going to use Digital Ocean smallest droplet with installed Debian 7.8.
Continue reading Installing Icinga2 (fork of Nagios) on Debian 7 (Wheezy)
These days there is a lot of buzz about software design patterns, and one of the most frequently asked questions is “How can I use some pattern with some technology“. In the case of Laravel and the Repository pattern, I see often questions like “How I can use repository pattern in Laravel 4” or nowadays “..in Laravel 5”. Important thing you must remember is that design patterns do not depend on specific technology, framework or programming language.
Continue reading Using Repository Pattern in Laravel 5
A lot of people asked me after reading my article A Brief Introduction to Laravel Envoy, how do I get my terminal window to look so awesome. It’s not that hard as it may look like, I keep it simple. Here is what I use:
and of course Ubuntu GNU/Linux.
Continue reading Awesome Looking Terminal With Oh-My-Zsh
In this tutorial I’ll cover different ways you can validate your data in Laravel 4. Almost every interactive web application requires some kind of data validation. For example, if your web application have registration form, you want email field to be unique or require from users to confirm their password. Laravel already has many standard rules to use within your validator, but if you don’t find one that meets your requirements at any time you can create your own rule.
There is a many ways how you can implement validation and I think the most common and the easiest way is to validate data directly in your controller. But, before we start validating our data let’s configure database and create migration for our
Continue reading Laravel Validation: Comprehensive Guide, part 1
SSH is a must have tool for every System administrator or DevOps Engineer. It provides you a secure way to access remote servers. But, if you use standard password authentication there is always a chance that someone will break into system due to weak password. This potential risk increases if multiple users have SSH access to the server, because system administrator can’t influence to the users to make a better passwords.
Continue reading SSH Authentication With Keys Instead Passwords