In the morning I tested image upload in a phpBB forum I installed
recently. I could upload a small photo as an attachment, but a larger
one failed. So I configured the board settings to accept attachments
of maximum 10MB. But now I got an HTTP error.
The error log of the Nginx web server showed a client intended to
send too large body message. To fix this, I logged in and changed to
the root account using /bin/su -. Next, I added the following line:
to the http section of /etc/nginx/nginx.conf and reloaded the
server using systemctl reload nginx.
Next, I changed one setting in /etc/php/7.3/fpm/php.ini and added
another one. Those settings are as follows:
Finally, I restarted php7.3-fpm as follows:
systemctl restart php7.3-fpm
Note that I use php7.3-fpm on Ubuntu 18.04 LTS because the version
that (still) comes with it, PHP 7.2, comes with a php-xml package
that prevents phpBB version 3.3 from working correctly. See this how
I remember when mosh first came out and
thinking "that sounds like a great idea, maybe I'll set it up
sometime" and then never getting around to it. Several times over
the years I've thought similarly, but it never seemed worth it. A
week ago a coworker asked if there were good tools for handling
remote terminal use over laggy internet connections, and I suggested
mosh. They really liked it, which then had me feeling silly for
never trying it, and got me to actually do it. So: I'm typing this
over mosh, and it's excellent! I should have done this years ago.
Having a good database schema design is crucial for building
applications that will need to scale in traffic and complexity. If
you happen to do a bad design choice you will see that it takes a
lot of effort to stop the pattern from propagating to your backends’
services and controllers, and finally to your frontend.
So there is a need to be able to evaluate if a database design is
better than another.
But what does good mean when we are talking about design?
WireGuard is a relatively new VPN
tunnel protocol that aims to be very fast and easy to setup. It
follows the Unix
closely in that it only does one thing (creating secured VPN
tunnels) and does it well.