53%
22.08.2011
.keys.sort.each do |s|
14 printf "%20s %d\n", s, summary[s]
15 end
16 puts "Polling for changes (Ctrl-C to end)"
17 loop do
18 sleep 2
19 client.instances.each do |inst|
20 if state[inst.id] != inst.state
21
53%
30.11.2025
"Polling for changes (Ctrl-C to end)"
17 loop do
18 sleep 2
19 client.instances.each do |inst|
20 if state[inst.id] != inst.state
21 if state[inst.id]
22 puts "#{inst.id} changed from
53%
11.09.2018
- containerPort: 80
19
20 ---
21
22 apiVersion: v1
23 kind: Service
24 metadata:
25 name: nginx-svc
26 labels:
27 run: nginx-svc
28 spec:
29 type: NodePort
30 ports:
31 - port: 80
32 protocol
53%
08.10.2015
minor errors in postorius.conf and hyperkitty.conf. Apache httpd version 2.4.x
is used in CentOS 7, so instead of the information contained for Apache 2.2,
Order deny,allow
Allow from all ... Mailman 3.0 is a new major version, released 15 years after version 2.0. We put the new version through its paces and explain the installation procedure and new features.
53%
13.06.2016
for $i"
19
20 #If certs do not exist yet
21 FILE="$LECROOT/$i/cert.pem"
22 if [ ! -f "$FILE" ]
23 then
24 echo "$FILE does not exists, so lets get certificates"
25 cd /root/letsencrypt
26
53%
11.10.2016
in the long term.
Test Environment
In the test lab, both Centos 7.1 and Ubuntu 16.04 received version 0.2.11 dated April 20, 2016. The test team simulated two data centers at different locations
52%
13.06.2022
distribution (Figure 1; attribution 2.5 Generic (CC BY 2.5)), I don’t care whether the performance is better than the mean, so I can ignore any performance cut-off to the right of the mean. (On the other hand
52%
19.05.2014
the 2010 time frame. This corresponds to about version 2.2 of SSHFS, which is from 2008. SSHFS is now up to version 2.5, which was released on January 14, 2014; however, testing I’ve done hasn’t revealed any
52%
25.10.2011
-interface st0.0;
16 ike {
17 gateway racoon;
18 proxy-identity {
19 local 192.168.1.0/24;
20 remote 192.168.2.0/24;
21 service any;
22 }
23
52%
14.03.2013
(pr->pr_path), 0);
17 [...]
18 error = copyinstr(j.hostname,
19 &pr->pr_host, sizeof(pr->pr_host), 0);
20 [...]
21 pr->pr_ip = j.ip_number;
22 pr->pr_linux = NULL;
23 pr->pr_securelevel = securelevel