9%
09.01.2013
not null,
07 subject text not null,
08 msg_id text not null,
09 date timestamp)
10 SERVER pg_archive_server
This corresponds exactly to the definition on the archive server, but naturally
9%
09.10.2017
_consumer_secret>"
06 config.access_token = ""
07 config.access_token_secret = ""
08 end
09
10 user = client.user("23Cent")
11 puts user.name
12
13 def collect
9%
10.04.2015
| Destination Port |
07 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
08 | Sequence Number |
09
9%
28.11.2021
2
01 global:
02 scrape_interval: 15s
03 evaluation_interval: 15s
04
05 ########## ALERTING CONFIGURATION ##########
06
07 alerting:
08 alertmanagers:
09 - static_configs:
10 - targets:
11
9%
07.10.2014
_string;
08
09 static int prochello_show( struct seq_file *m, void *v )
10 {
11 int error = 0;
12
13 error = seq_printf( m, "%s\n", output_string);
14 return error;
15 }
16
17 static int prochello
9%
14.08.2017
ANNOTATIONS {
07 summary = "Instance {{ $labels.instance }} down",
08 description = "{{ $labels.instance }} of job {{ $labels.job }} has been down for more than 5 minutes.",
09 }
If an alert
9%
09.01.2013
/one/oned.conf
01 VM_HOOK = [
02 name = "vm_switchon",
03 on = "RUNNING",
04 command = "account.sh",
05 arguments = "on $ID" ]
06
07 VM_HOOK = [
08 name = "vm_switchoff",
09
9%
30.11.2020
== 0:
08 data = { 'key1' : [10,10.1,10+11j],
09 'key2' : ('mpi4py' , 'python'),
10 'key3' : array([1, 2, 3]) }
11 else:
12 data = None
13 # end if
14
15 data = comm
9%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
9%
22.12.2017
": "glusterfs-cluster"
06 },
07 "subsets": [
08 {
09 "addresses": [
10 {
11 "ip": "192,168,121,101"
12 }
13 ],
14 "ports