I had the occasion to create then destroy (and recreate) an instance via the Hub on EC2 while putting together the latest version of owncloud on a LAMP instance.
For the first create a choose a unique sub-domain name (showed as available) for tklapp.com and it worked.
I had the need to destroy and then create the instance. During this time I used the same sub-domain name (it showed as available).
However when I try to use the URL I get 'The site you are looking for is currently not available' from TKLAPP.COM
I've just discovered Turnkey and LXC together and I'm excited about what it can do.
I'm unclear about how much of the host applications the container sees and can utilize. Does it only see the kernel and resources? Or can it see and use other applications and services from the host as well.
For example if I install MySQL on the host, do I also need to install it in the container or merely configure it in the container with its own config files?
I am planning on enabling MFA on my root account at Amazon to increase my access security .
However a bit of caution says I should ask the Turnkey folks if this will interfere with the operation of the Turnkey Hub (day to day management or New instance Launching).
I've been using TKL for a year or so now, and really love it. I've been using it for a side business I have.
I have an instance that is 95% configured the way I want that can be used in my "real" job. I'm running a Mac with VMWare Fusion, so I downloaded a TKL appliance (LAMP) and restored my 95%-of-the-way-there backup to it on my local machine. I've gone in and made the edits/changes I needed to on it, and on the first of the year will be activating a new TKLBAM account for my "real" job.
Hello, I did not have time to patch my server during the small window that was recommended when the Oct 2014 critical sql injection bug was revealed. My server does not appear to be infected but of course you never know.
I want to make sure my server is put into an uninfected state. So would restoring from a TKBLM backup from just before the vulnerability went public be enough to roll back any potential malicious programs that may have been installed? I'm guessing no since TKBLM is kind of selective.