30%
30.01.2020
Fn::Base64:
20 Fn::Join:
21 - ''
22 -
23 - "{\n"
24 - '"bucket"'
25 - ' : "'
26 - Ref: S3Bucketname
27
30%
13.06.2016
to the files.
If want to transfer only the changed files, append :D to the path name:
--backup-point="192.168.100.100:22:/vmfs/volumes/hp-test:D"
If you want XSIBackup always to transfer all the data
30%
25.09.2023
hosts [9]. A more apt comparison is found in Listing 2, with the results posted by a Raspberry Pi 400 [10], which is essentially a Raspberry Pi 4 (Broadcom BCM2711 Cortex-A72, ARM v8 quad-core running
30%
14.03.2013
": 100000}})
02 { "_id" : ObjectId("50bd2169a80e4531863ea2a8"), "Name" : "FC Schalke 04", "Colors" : "Blue-white", "Members" : 111000, "Address" : [ { "Street" : "Ernst-Kuzorra-Weg 1
30%
27.08.2014
was the sequential write test using 1MB record sizes:
./iozone -i 0 -c -e -w -r 1024k -s 32g -t 2 -+n > iozone_write_1.out
To gather the block statistics, I ran ioprof in a different terminal window before I ran
30%
07.10.2014
seq_timeout = 10
08 tcpflags = syn
09 command = /usr/sbin/iptables -A INPUT -s \
%IP% -p tcp --dport 22 -j ACCEPT
10
11 [closeSSH]
12 sequence = 9000
30%
15.08.2016
via 192.168.1.1 dev eth1
13 $ ip netns exec ns1 ping -c2 8.8.8.8
14 PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
15 64 bytes from 8.8.8.8: icmp_seq=1 ttl=51 time=22.1 ms
16 64 bytes from 8.8.8.8: icmp
30%
28.11.2023
):
ssh-keygen -t ed25519 -a 100 -f
ubuntu-sre-id_ed25519 -q -N
2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy
30%
12.09.2013
$st2->execute($dbh->{pg_pid});
16 if( !$st2->fetchrow_arrayref->[0] ) {
17 warn "couldn't stop backend PID=$dbh->{pg_pid}\n";
18 }
19 exit 1;
20 }
21
22 POSIX::sigaction(SIGTERM, POSIX
30%
16.03.2021
(local to host dev-machine)
UUID : a84b0db5:8a716c6d:ce1e9ca6:8265de17
Events : 22
Number Major Minor RaidDevice State
0 8 33 0 active